<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:atom="http://www.w3.org/2005/Atom"  version="2.0">
<channel>
    <atom:link href="https://www.cerias.purdue.edu/site/sas_podcast/rss" rel="self" type="application/rss+xml" />
        <title>Serious About Security</title>
        <link>http://www.cerias.purdue.edu/site/sas_podcast</link>
        <language>en-us</language>
        <copyright>&#x2117; &amp; &#xA9; 2012 Preston Wiley, Michael Hill, Keith Watson</copyright>
        <lastBuildDate>Sun, 12 Apr 2026 02:51:43 -0400</lastBuildDate>
        <generator>CERIAS Podcast Generator</generator>		
        <webMaster>webmaster@cerias.purdue.edu (CERIAS Webmaster)</webMaster>
        <ttl>1</ttl>
        
        <itunes:author>Preston Wiley, Mike Hill, and Keith Watson</itunes:author>
        <itunes:subtitle>A biweekly information security news and discussion podcast.</itunes:subtitle>
        <itunes:summary>Preston Wiley, Mike Hill, and Keith Watson discuss interesting topics in information security and privacy. This biweekly podcast covers topics that range from the latest software vulnerabilities to security tools to legal issues. The Serious about Security Podcast is brought to you by the Greater Lafayette Security Professionals (GLSP) group, Secure Purdue, and the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.</itunes:summary>
        <itunes:owner>
           <itunes:name>Keith Watson</itunes:name>
           <itunes:email>seriousaboutsecurity@cerias.purdue.edu</itunes:email>
        </itunes:owner>
        <itunes:explicit>No</itunes:explicit>
        <itunes:category text="Technology">
        <itunes:category text="Tech News" />
        </itunes:category>
        <image>
            <url>http://www.cerias.purdue.edu/assets/images/serious_about_security_140.png</url>
            <title>Serious About Security</title>
            <link>http://www.cerias.purdue.edu/site/sas_podcast/</link>
        </image>
        
        <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
        
        
        <item>
                <title>Serious About Security Episode 68: Disabling Webcam Lights and a Presidential Panel Recommends Changes for the NSA</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_68_december_19_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_68_december_19_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/g0bcVwVNosE" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning/">Research shows how MacBook Webcams can spy on their users without warning</a> by Ashkan Soltani and Timothy B.Lee (The Washington Post), <a href="http://www.washingtonpost.com/business/technology/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story_2.html">FBI&#8217;s search for &#8216;Mo,&#8217; suspect in bomb threats, highlights use of malware for surveillance</a> by Craig Timberg and Ellen Nakashima (The Washington Post), <a href="https://jscholarship.library.jhu.edu/handle/1774.2/36569">iSeeYou: Disabling the MacBook Webcam Indicator LED</a> by Matthew Brocker and Stephen Checkoway (Technical Report 13-02, Department of Computer Science, Johns Hopkins University)</li>
<li><a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">Liberty and Security in a Changing World</a> by The President&#8217;s Review Group on Intelligence and Communications Technologies, <a href="http://www.latimes.com/nation/politics/politicsnow/la-pn-white-house-nsa-surveillance-report-20131218,0,4544435.story">White House panel recommends new limits on NSA surveillance</a> by Ken Dilanian and Christi Parsons (Los Angeles Times), <a href="http://www.nytimes.com/2013/12/19/us/politics/report-on-nsa-surveillance-tactics.html?hp&amp;_r=1&amp;">Obama Is Urged to Sharply Curb N.S.A. Data Mining</a> by David E. Sanger and Charlie Savage (The New York Times), <a href="http://www.theguardian.com/world/2013/dec/18/nsa-bulk-collection-phone-date-obama-review-panel">Obama review panel: strip NSA of power to collect phone data records</a> by Dan Roberts and Spencer Ackerman (The Guardian), <a href="https://www.eff.org/deeplinks/2013/12/eff-statement-presidents-review-groups-nsa-report">EFF Statement on President&#8217;s Review Group&#8217;s NSA Report</a> by Rebecca Jeschke (The Electronic Frontier Foundation)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 20 Dec 2013 22:56:38 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode68-SeriousAboutSecurity.mp3" length="25804" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:26:13</itunes:duration>
                <itunes:subtitle>Episode 68: Disabling Webcam Lights and a Presidential Panel Recommends Changes for the NSA, December 19, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 67: Dial 00000000 for Launch and French Government Attempts to be Google</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_67_december_11_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_67_december_11_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/9M_6u3Gz2so" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.todayifoundout.com/index.php/2013/11/nearly-two-decades-nuclear-launch-code-minuteman-silos-united-states-00000000/">For Nearly Two Decades the Nuclear Launch Code at All Minuteman Silos in the United States was 00000000</a> by Karl Smallwood (Today I Found Out), <a href="http://www.huffingtonpost.com/2013/12/05/nuclear-missile-code-00000000-cold-war_n_4386784.html">&#8216;Secret&#8217; Nuclear Missile Launch Code During Cold War Was &#8216;00000000&#8217;</a> by Ryan Grenoble (The Huffington Post), <a href="http://www.theguardian.com/world/2004/jun/17/usa.oliverburkeman1">Zero protection from nuclear code</a> by Oliver Burkeman (The Guardian), <a href="http://web.archive.org/web/20040404013440/http://www.cdi.org/blair/permissive-action-links.cfm">Keeping Presidents in the Nuclear Dark</a> by Bruce Blair (Bruce Blair&#8217;s Nuclear Column), <a href="http://nakedsecurity.sophos.com/2013/12/11/for-nearly-20-years-the-launch-code-for-us-nuclear-missiles-was-00000000/">For nearly 20 years, the launch code for US nuclear missiles was 00000000</a> by Lisa Vaas (nakedsecurity blog), <a href="https://www.cs.columbia.edu/~smb/nsam-160/pal.html">Permissive Action Links</a> by Steven M. Bellovin</li>
<li><a href="http://googleonlinesecurity.blogspot.com/2013/12/further-improving-digital-certificate.html">Further improving digital certificate security</a> by Adam Langley (Google Online Security Blog), <a href="http://nakedsecurity.sophos.com/2013/12/09/serious-security-google-finds-fake-but-trusted-ssl-certificates-for-its-domains-made-in-france/">Serious Security: Google finds fake but trusted SSL certificates for its domains, made in France</a> by Paul Ducklin (nakedsecurity blog), <a href="http://gigaom.com/2013/12/09/google-catches-french-finance-ministry-pretending-to-be-google/">Google catches French finance ministry pretending to be Google</a> by David Meyer (GigaOM)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 13 Dec 2013 07:36:55 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode67-SeriousAboutSecurity.mp3" length="32665" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:33:16</itunes:duration>
                <itunes:subtitle>Episode 67: Dial 00000000 for Launch and French Government Attempts to be Google, December 11, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 66: Forward Secrecy and Botnet Gathered Passwords</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_66_december_6_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_66_december_6_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/jBdhdATjPVI" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/Forward_secrecy">Forward Secrecy</a> (Wikipedia), <a href="http://techcrunch.com/2013/11/22/twitter-enables-perfect-forward-secrecy-across-sites-to-protect-user-data-against-future-decryption/">Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Against Future Decryption</a> by Matthew Panzarino (TechCrunch), <a href="https://blog.twitter.com/2013/forward-secrecy-at-twitter-0">Forward Secrecy at Twitter</a> by Jacob Hoffman-Andrews (Twitter Engineering Blog), <a href="https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-important-web-privacy-protection">Pushing for Perfect Forward Secrecy, an Important Web Privacy Protection</a> by Parker Higgins (EFF Deeplinks Blog)</li>
<li><a href="http://www.washingtonpost.com/business/technology/google-facebook-payroll-accounts-targeted-in-major-password-theft-security-experts-say/2013/12/05/011a4fd8-5db6-11e3-bc56-c6ca94801fac_story.html">Google, Facebook, payroll accounts targeted in major password theft, security experts say</a> by  Hayley Tsukayama (The Washington Post), <a href="http://www.huffingtonpost.com/2013/12/04/stolen-passwords_n_4383950.html">2 Million Stolen Facebook, Yahoo And Google Passwords Posted Online</a> by Alexis Kleinman (The Huffington Post), <a href="http://blog.spiderlabs.com/2013/12/look-what-i-found-moar-pony.html">Look What I Found: Moar Pony!</a> by Trustwave SpiderLabs</li>
</ul>
                ]]></description>
                <pubDate>Sat, 07 Dec 2013 06:27:03 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode66-SeriousAboutSecurity.mp3" length="28057" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:28:32</itunes:duration>
                <itunes:subtitle>Episode 66: Forward Secrecy and Botnet Gathered Passwords, December 6, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 65: Yahoo! Encrypts and Healthcare.gov Has Some Security Issues</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_65_november_20_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_65_november_20_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/YuXYxajulik" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://yahoo.tumblr.com/post/67373852814/our-commitment-to-protecting-your-information">Our Commitment to Protecting Your Information</a> by Marissa Mayer (Yahoo!), <a href="http://bits.blogs.nytimes.com/2013/11/18/after-n-s-a-disclosures-yahoo-moves-to-encrypt-internal-traffic/?_r=0">After N.S.A. Disclosures, Yahoo Moves to Encrypt Internal Traffic</a> by Nicole Perlroth (NY Times Bits Blog), <a href="http://techcrunch.com/2013/11/18/yahoo-will-follow-google-in-encrypting-data-center-traffic-all-traffic-between-company-and-customers-by-q1-14/">Yahoo Will Follow Google In Encrypting Data Center Traffic, Customer Data Flow By Q1 &#8217;14</a> by Matthew Panzarino (TechCrunch), <a href="http://articles.washingtonpost.com/2013-09-06/business/41831756_1_encryption-data-centers-intelligence-agencies">Google encrypts data amid backlash against NSA spying</a> by Craig Timberg (The Washington Post)</li>
<li><a href="http://www.cnbc.com/id/101210663">Expert to warn Congress of HealthCare.gov security bugs</a> by Reuters, <a href="http://nakedsecurity.sophos.com/2013/11/18/hackers-throw-16-attacks-at-healthcare-gov-plus-a-dos-for-good-measure/">Hackers throw 16 attacks at HealthCare.gov plus a DoS for good measure</a> by Lisa Vaas (nakedsecurity blog), <a href="http://www.foxnews.com/tech/2013/11/19/healthcaregov-already-compromised-security-expert-says/">Healthcare.gov &#8216;may already have been compromised,&#8217; security expert says</a> by FoxNews.com</li>
</ul>
                ]]></description>
                <pubDate>Thu, 21 Nov 2013 04:26:58 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode65-SeriousAboutSecurity.mp3" length="23961" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:24:25</itunes:duration>
                <itunes:subtitle>Episode 65: Yahoo! Encrypts and Healthcare.gov Has Some Security Issues, November 20, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 64: Facebook Warns Adobe Users and IE 0&#45;day Injects Payload into Memory</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_64_facebook_warns_adobe_users_and_ie_0-day_injects_paylo</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_64_facebook_warns_adobe_users_and_ie_0-day_injects_paylo</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/NfdywUqkQH4" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://krebsonsecurity.com/2013/11/facebook-warns-users-after-adobe-breach/">Facebook Warns Users After Adobe Breach</a> by Brian Krebs (Krebs on Security), <a href="http://www.zdnet.com/facebook-mines-adobe-breach-data-for-reused-passwords-warns-users-to-change-them-or-disappear-7000023090/">Facebook mines Adobe breach data for reused passwords, warns users to change them or disappear</a> by Liam Tung (ZDNet), <a href="http://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/">Anatomy of a password disaster - Adobe&#8217;s giant-sized cryptographic blunder</a> by Paul Ducklin (naked security blog)</li>
<li><a href="http://www.pcpro.co.uk/news/security/385309/ie-zero-day-exploit-disappears-on-reboot">IE zero-day exploit disappears on reboot</a> by Shona Ghosh (PC Pro), <a href="http://threatpost.com/ie-zero-day-watering-hole-attack-injects-malicious-payload-into-memory/102891">IE Zero Day Watering Hole Attack Injects Malicious Payload into Memory</a> by Michael Mimoso (threat post)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 15 Nov 2013 08:18:54 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode64-SeriousAboutSecurity.mp3" length="21504" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:21:51</itunes:duration>
                <itunes:subtitle>Episode 64: Facebook Warns Adobe Users and IE 0&#45;day Injects Payload into Memory, November 14, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 63: The badBIOS Controversy and the NSA taps Google and Yahoo!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_63_november_6_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_63_november_6_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/4yRHxPEZvXI" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/">
Meet &#8220;badBIOS,&#8221; the mysterious Mac and PC malware that jumps airgaps</a> by Dan Goodin (Ars Technica), <a href="https://www.schneier.com/blog/archives/2013/11/badbios.html">badBIOS</a> by Bruce Schneier (Schneier on Security), <a href="http://www.pcworld.com/article/2060360/security-researcher-says-new-malware-can-affect-your-bios-be-transmitted-via-the-air.html">Security researcher says new malware can affect your BIOS; communicate over the air</a> by Ian Paul (PCWorld), <a href="http://www.tomsguide.com/us/security-expert-badbios-malware,news-17806.html">&#8216;BadBIOS&#8217; System-Hopping Malware Appears Unstoppable</a> by Marshall Honorof (Tom&#8217;s Guide), <a href="http://www.rootwyrm.com/2013/11/the-badbios-analysis-is-wrong/">The badBIOS Analysis Is Wrong.</a> by Phillip Jaenke</li>
<li><a href="http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html">NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say</a> by Barton Gellman and Askan Soltani (Washington Post), <a href="http://arstechnica.com/information-technology/2013/10/how-the-nsas-muscular-tapped-googles-and-yahoos-private-networks/">How the NSA&#8217;s MUSCULAR tapped Google&#8217;s and Yahoo&#8217;s private networks</a> by Sean Gallagher (Ars Technica), <a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/">How we know the NSA had access to internal Google and Yahoo cloud data</a> by Barton Gellman, Askkan, and Andrea Peterson (Washington Post)</li>
</ul>
                ]]></description>
                <pubDate>Sun, 10 Nov 2013 23:08:35 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode63-SeriousAboutSecurity.mp3" length="22835" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:23:16</itunes:duration>
                <itunes:subtitle>Episode 63: The badBIOS Controversy and the NSA taps Google and Yahoo!, November 6, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 62: Steps to Avoid Internet Surveillance and Big Corp Social Engineering Fails</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_62_october_30_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_62_october_30_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/XOCWeZvE49w" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance">Ten Steps You Can Take Right Now Against Internet Surveillance</a> by Danny O&#8217;Brien (EFF)</li>
<li><a href="http://threatpost.com/major-corporations-fail-to-defend-against-social-engineering/102733">Major Corporations Fail to Defend Against Social Engineering</a> by Michael Mimoso ()</li>
</ul>
                ]]></description>
                <pubDate>Fri, 01 Nov 2013 23:57:47 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode62-SeriousAboutSecurity.mp3" length="24678" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:25:09</itunes:duration>
                <itunes:subtitle>Episode 62: Steps to Avoid Internet Surveillance and Big Corp Social Engineering Fails, October 30, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 61: iCloud Insecurity and Avoid the Hacker Title</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_61_october_24_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_61_october_24_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/lx8QAfHo3xs" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/10/24/apples-icloud-iconundrum-does-convenience-mean-insecurity/">Apple&#8217;s iCloud iConundrum - does convenience mean insecurity?</a> by Chester Wisniewski (nakedsecurity), <a href="http://conference.hitb.org/hitbsecconf2013kul/vladimir-katalov/">Cracking and Analyzing Apple&#8217;s iCloud Protocols</a>&nbsp; by Vladimir Katalov (Hack in the Box Malaysia)</li>
<li><a href="http://www.theregister.co.uk/2013/10/23/hacker_loses_4th_amendment_rights_case/">Call yourself a &#8216;hacker&#8217;, lose your 4th Amendment right against seizures</a> by John Leyden (The Register), <a href="http://www.digitalbond.com/blog/2013/10/22/call-yourself-a-hacker-lose-your-4th-amendment-rights/">Call Yourself A Hacker, Lose Your 4th Amendment Rights</a> by Dale Peterson (Digital Bond), <a href="http://docs.justia.com/cases/federal/district-courts/idaho/iddce/4:2013cv00442/32488/8/0.pdf">Battelle Energy Alliance, LLC v. Southfork Security, Inc. et al</a></li>
</ul>
                ]]></description>
                <pubDate>Fri, 25 Oct 2013 06:32:54 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode61-SeriousAboutSecurity.mp3" length="19968" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:20:16</itunes:duration>
                <itunes:subtitle>Episode 61: iCloud Insecurity and Avoid the Hacker Title, October 24, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 60: Let&#8217;s Audit Truecrypt and Beware of Ransomware</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_60_october_17_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_60_october_17_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/YL4kI9sT8ko" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://istruecryptauditedyet.com/">Is Truecrypt Audited Yet?</a>, <a href="http://www.indiegogo.com/projects/the-truecrypt-audit">The TrueCrypt Audit Project</a>, <a href="http://arstechnica.com/security/2013/10/new-effort-to-fully-audit-truecrypt-raises-over-16000-in-a-few-short-weeks/">New effort to fully audit TrueCrypt raises $16,000+ in a few short weeks</a> by Cyrus Farivar (Ars Technica), <a href="http://blog.cryptographyengineering.com/2013/10/lets-audit-truecrypt.html">Let&#8217;s audit Truecrypt!</a> by Matthew Green (A Few Thoughts on Cryptographic Engineering)</li>
<li><a href="http://nakedsecurity.sophos.com/2013/10/12/destructive-malware-cryptolocker-on-the-loose/">Destructive malware &#8220;CryptoLocker&#8221; on the loose - here&#8217;s what to do</a> by Paul Ducklin (nakedsecurity), <a href="http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information">CryptoLocker Ransomware Information Guide and FAQ</a> by Lawrence Abrams (bleepingcimputer.com)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 18 Oct 2013 05:45:02 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode60-SeriousAboutSecurity.mp3" length="20992" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:21:21</itunes:duration>
                <itunes:subtitle>Episode 60: Let&apos;s Audit Truecrypt and Beware of Ransomware, October 17, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 59: Tor Stinks According to the NSA and Microsoft Follows Yahoo!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_59_october_9_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_59_october_9_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/wmxwZFlGtEE" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users&#8217; online anonymity</a> by Bruce Schneier (The Guardian), <a href="http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption">NSA and GCHQ target Tor network that protects anonymity of web users</a> by James Ball, Bruce Schneier and Glenn Greenwald (The Guardian), <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">&#8216;Tor Stinks&#8217; presentation &#8211; read the full document</a> on The Guardian</li>
<li><a href="http://nakedsecurity.sophos.com/2013/10/07/is-microsoft-recycling-old-outlook-com-and-windows-live-accounts/">Is Microsoft recycling old Outlook.com and Windows Live email accounts?</a> by Lee Munson (nakedsecurity blog), <a href="http://www.pcworld.com/article/2052586/microsoft-is-quietly-recycling-outlook-email-accounts.html">Microsoft is quietly recycling Outlook email accounts</a> by Andreas Udo de Haes (PC World)</li>
</ul>
                ]]></description>
                <pubDate>Sat, 12 Oct 2013 05:54:28 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode59-SeriousAboutSecurity.mp3" length="22528" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:22:55</itunes:duration>
                <itunes:subtitle>Episode 59: Tor Stinks According to the NSA and Microsoft Follows Yahoo!, October 9, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 58: Kids Crack iPad Security and Circle Security Avoids NIST Crytpo</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_58_october_2_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_58_october_2_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/3vWTqSwA3Lc" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.npr.org/blogs/alltechconsidered/2013/09/27/226654921/students-find-ways-to-hack-school-issued-ipads-within-a-week">Students Find Ways To Hack School-Issued iPads Within A Week</a> by Sam H. Sanders (NPR), <a href="http://www.latimes.com/local/lanow/la-me-ln-lausd-ipad-hack-20130925,0,6974454.story">LAUSD halts home use of iPads for students after devices hacked</a> by Howard Blume (LA Times)</li>
<li><a href="http://threatpost.com/silent-circle-moving-away-from-nist-ciphers-in-wake-of-nsa-revelations/102452">Silent Circle Moving Away from NIST Ciphers In Wake of NSA Revelations</a> by Dennis Fisher (threatpost)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 04 Oct 2013 21:11:31 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode58-SeriousAboutSecurity.mp3" length="27340" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:27:50</itunes:duration>
                <itunes:subtitle>Episode 58:  Kids Crack iPad Security and Circle Security Avoids NIST Crytpo, October 2, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 57: Follow&#45;ups on Java, Yahoo! recycling email addresses, and iPhone 5s fingerprint sensor</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_57_september_26_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_57_september_26_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/JcSiBfy6Uc4" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/09/17/oracle-java-fails-at-security-in-new-and-creative-ways/">Oracle Java fails at security in new and creative ways</a> by Chester Wisniewski (nakedsecurity blog)</li>
<li><a href="http://nakedsecurity.sophos.com/2013/09/25/recycled-yahoo-email-addresses-still-receiving-messages-for-previous-owners-passwords-included/">Recycled Yahoo email addresses still receiving messages for previous owners - passwords included</a> by Lee Munson (nakedsecurity blog)</li>
<li><a href="http://nakedsecurity.sophos.com/2013/09/22/chaos-computer-club-claims-to-have-cracked-the-iphone-5s-fingerprint-sensor/">Chaos Computer Club claims to have &#8220;cracked&#8221; the iPhone 5s fingerprint sensor</a> by Paul Ducklin (nakedsecurity blog), <a href="http://istouchidhackedyet.com/">Is Touch ID Hacked Yet?</a></li>
</ul>
                ]]></description>
                <pubDate>Mon, 30 Sep 2013 05:03:37 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode57-SeriousAboutSecurity.mp3" length="23244" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:23:40</itunes:duration>
                <itunes:subtitle>Episode 57: Follow&#45;ups on Java, Yahoo! recycling email addresses, and iPhone 5s fingerprint sensor, September 26, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 56: Apple&#8217;s iPhone 5S has a fingerprint reader</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_56_september_18_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_56_september_18_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/ni7ZrQ-j2IM" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://news.cnet.com/8301-13579_3-57603298-37/iphone-fingerprint-scanner-sparks-privacy-worries/">iPhone fingerprint scanner sparks privacy worries</a> by Charlie Osborne (CNet), <a href="http://www.bloomberg.com/news/2013-09-13/fingerprint-reading-iphone-seen-as-protection-against-nsa.html">Fingerprint-Reading IPhone Seen as Protection Against NSA</a> by  Todd Shields &amp; Allan Holmes (Bloomberg), <a href="http://www.cnn.com/2013/09/12/tech/mobile/iphone-fingerprint-privacy/index.html">How secure is your iPhone 5S fingerprint?</a> by Brandon Griggs (CNN), <a href="http://istouchidhackedyet.com/">Is Touch ID Hacked Yet?</a></li>
</ul>
                ]]></description>
                <pubDate>Sun, 22 Sep 2013 19:10:29 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode56-SeriousAboutSecurity.mp3" length="20684" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:20:59</itunes:duration>
                <itunes:subtitle>Episode 56: Apple&apos;s iPhone 5S has a fingerprint reader, September 18, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 55: The NSA allegedly weakens and attacks cryptography</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_55_september_12_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_55_september_12_2013</guid>
                <description><![CDATA[
                    <h2>Youtube</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/Wk95imEr6Xo" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption">Revealed: The NSA&#8217;s Secret Campaign to Crack, Undermine Internet Security</a> by Jeff Larson (ProPublica), Nicole Perlroth and Scott Shane (The New York Times), <a href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">Revealed: how US and UK spy agencies defeat internet privacy and security</a> by James Ball, Jullian Borger and Glenn Greenwald (The Guardian), <a href="http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0">N.S.A. Able to Foil Basic Safeguards of Privacy on Web</a> by Nicole Perlroth, Jeff Larson and Scott Shane (The New York Times), <a href="http://www.forbes.com/sites/kashmirhill/2013/09/10/how-the-nsa-revelations-are-hurting-businesses/">How The NSA Revelations Are Hurting Businesses</a> by Kashmir Hill (Forbes), <a href="http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents">NSA shares raw intelligence including Americans&#8217; data with Israel</a> by Glenn Greenwald, Laura Poitras and Ewen MacAskill (The Guardian)</li>
</ul>
                ]]></description>
                <pubDate>Sat, 14 Sep 2013 01:28:32 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode55-SeriousAboutSecurity.mp3" length="25190" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:25:38</itunes:duration>
                <itunes:subtitle>Episode 55: The NSA allegedly weakens and attacks cryptography, September 12, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 54: Password Complexity and Apple Products Have Trouble with Six Arabic Characters</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_54_august_30_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_54_august_30_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/qrTOQCdglUQ" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/08/16/anatomy-of-a-brute-force-attack-how-important-is-password-complexity/">Anatomy of a brute force attack - how important is password complexity?</a> by Paul Ducklin (nakedsecurity blog), <a href="http://redmondmag.com/articles/2013/08/14/password-complexity.aspx">How Important is Password Complexity</a> by Brien Posey (Redmond Magazine)</li>
<li><a href="http://nakedsecurity.sophos.com/2013/08/30/apple-apps-turned-upside-down-writing-right-to-left-youre-only-6-characters-from-a-crash/">Apple apps turned upside down writing right to left - you&#8217;re only 6 characters from a crash!</a> by Paul Ducklin (nakedsecurity blog), <a href="http://arstechnica.com/apple/2013/08/rendering-bug-crashes-os-x-and-ios-apps-with-string-of-arabic-characters/">
Rendering bug crashes OS X, iOS apps with string of Arabic characters (Updated)</a> by Andrew Cunningham and Dan Goodin (Ars Technica)</li>
</ul>
                ]]></description>
                <pubDate>Sun, 01 Sep 2013 06:01:43 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode54-SeriousAboutSecurity.mp3" length="24576" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:24:57</itunes:duration>
                <itunes:subtitle>Episode 54: Password Complexity and Apple Products Have Trouble with Six Arabic Characters, August 30, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 53: US Email Providers Close and Facebook Founder&#8217;s TImeline Hacked</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_53_august_21_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_53_august_21_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/G8lLBAlcdCE" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://silentcircle.wordpress.com/2013/08/09/to-our-customers/">To Our Customers</a> by Silent Circle, <a href="http://news.cnet.com/8301-13578_3-57597726-38/silent-circle-follows-lavabit-in-shuttering-encrypted-e-mail/">Silent Circle follows Lavabit in shuttering encrypted e-mail</a> by Steven Musil (CNet), <a href="https://lavabit.zendesk.com/entries/25151023-Important-Announcement">Important Announcement</a> by Ladar Levison (Lavabit LLC), <a href="http://www.globalpost.com/dispatch/news/regions/europe/russia/130712/edward-snowden-meeting-moscow-airport">Edward Snowden has applied for asylum in Russia</a> Live Blog from Global Post, <a href="http://www.groklaw.net/article.php?story=20130818120421175">Forced Exposure ~pj</a> by Pamela Jones (Groklaw)</li>
<li><a href="http://techcrunch.com/2013/08/18/security-researcher-hacks-mark-zuckerbergs-wall-to-prove-his-exploit-works/">Security Researcher Hacks Mark Zuckerberg&#8217;s Wall To Prove His Exploit Works</a> by Greg Kumparak (TechCrunch), <a href="http://nakedsecurity.sophos.com/2013/08/19/mark-zuckerbergs-own-facebook-timeline-hacked-by-palestinian-researcher/">Mark Zuckerberg&#8217;s own Facebook timeline hacked by Palestinian researcher</a> by Lee Munson (nakedsecurity blog)</li>
</ul>
                ]]></description>
                <pubDate>Thu, 22 Aug 2013 01:17:38 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode53-SeriousAboutSecurity.mp3" length="25088" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:25:30</itunes:duration>
                <itunes:subtitle>Episode 53: US Email Providers Close and Facebook Founder&apos;s TImeline Hacked, August 21, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 52: Blackhat and DEFCON Review</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_52_august_14_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_52_august_14_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="420" height="315" src="//www.youtube-nocookie.com/embed/MUGaagPj4Fs" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.ibtimes.co.uk/articles/496078/20130801/iphone-hacked-60-seconds-malicious-charger-mactans.htm">iPhone Hacked in Under 60 Seconds Using Malicious Charger</a> by David Gilbert (International Business Times), <a href="http://www.macobserver.com/tmo/article/apple-fixes-threat-from-fake-iphone-chargers-in-ios-7">Apple Fixes Threat from Fake iPhone Chargers in iOS 7 </a> by Bryan Chaffin (the Mac Observer), <a href="http://www.iphonehacks.com/2013/08/ios-7-fixes-malicious-charger-hack.html">Apple fixes Malicious Charger Hack in iOS 7</a> (iPhone Hacks)</li>
<li><a href="http://www.itworld.com/security/366872/black-hat-ad-networks-lay-path-million-strong-browser-botnet">Black Hat: Ad networks lay path to million-strong browser botnet</a> by Paul F. Roberts (IT World)</li>
<li><a href="https://securityledger.com/2013/08/samsung-smart-tv-like-a-web-app-riddled-with-vulnerabilities/">Samsung Smart TV: Like A Web App Riddled With Vulnerabilities</a> by Paul (the security ledger)</li>
</ul>
                ]]></description>
                <pubDate>Thu, 15 Aug 2013 17:48:50 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode52-SeriousAboutSecurity.mp3" length="25804" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:26:13</itunes:duration>
                <itunes:subtitle>Episode 50: Blackhat and DEFCON review, August 14, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 51: The Feds Hate Criminals using Tor and The Twitter Two&#45;Step (Auth)</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_51_august_7_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_51_august_7_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/a0w6oD--O-o" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/?mbid=social10467424">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a> by Kevin Poulsen (Wired), <a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a> by John Hawes (nakedsecurity blog)</li>
<li><a href="https://www.informationweek.com/security/attacks/twitter-overhauls-two-factor-authenticat/240159568">Take two: Twitter drops SMS for private keys stored on Android or iPhone smartphones, adds previously missing recovery capability</a> by Mathew J. Schwartz (Information Week), <a href="http://www.theregister.co.uk/2013/08/07/twitter_hardens_two_factor_authentication/">Twitter hardens two-factor authentication with app-based secure logins</a> by Neil McAllister (The Register), <a href="https://threatpost.com/new-twitter-login-verification-system-avoids-sms-codes/">New Twitter Login Verification System Avoids SMS Codes</a> by Dennis Fisher (threatpost)</li>
</ul>
                ]]></description>
                <pubDate>Fri, 09 Aug 2013 06:15:25 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode51-SeriousAboutSecurity.mp3" length="26624" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:27:05</itunes:duration>
                <itunes:subtitle>Episode 51: The Feds Hate Criminals using Tor and The Twitter Two&#45;Step (Auth), August 7, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 50: Data Breaches Galore!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_50_july_31_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_50_july_31_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/8N1psq0XLpw" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/07/30/personal-data-on-72000-staff-taken-in-university-of-delaware-hack/">Personal data on 72,000 staff taken in University of Delaware hack</a> by John Hawes (nakedsecurity blog), <a href="http://nakedsecurity.sophos.com/2013/07/26/stanford-university-hacked-becomes-latest-data-breach-victim/">Stanford University hacked, becomes latest data breach victim</a> by John Hawes (nakedsecurity blog), <a href="http://techcrunch.com/2013/07/25/stanford-university-hacked/">Stanford University Is Investigating An Apparent Security Breach, Urges Community To Reset Passwords</a> by Billy Gallagher (Tech Crunch), <a href="http://www.healthcare-informatics.com/news-item/university-massachusetts-announces-data-breach">University of Massachusetts Announces Data Breach</a> by Gabriel Perna (Healthcare Informatics), <a href="http://www.esecurityplanet.com/network-security/university-of-virginia-suffers-data-breach.html">University of Virginia Admits Data Breach</a> by Jeff Goldman (eSecurity Planet)</li>
</ul>
                ]]></description>
                <pubDate>Thu, 01 Aug 2013 22:06:25 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode50-SeriousAboutSecurity.mp3" length="29388" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:29:55</itunes:duration>
                <itunes:subtitle>Episode 50: Data Breaches Galore!, July 31, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 49: Apple Developer Site Hacked and Tumblr iOS Shared Their Passwords!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_49_july_24_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_49_july_24_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/dE_tizq8ACI" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://www.infosecurity-magazine.com/view/33555/apple-developer-site-breached/">Apple Developer Site Breached</a> InfoSecurity Magazine, <a href="http://nakedsecurity.sophos.com/2013/07/22/apple-takes-dev-center-down-for-days-finally-admits-we-got-owned/">Apple takes Dev Center down for days, finally admits, &#8220;We got owned!&#8221;</a> by Paul Ducklin (nakedsecurity blog), <a href="http://www.pcworld.com/article/2045004/researcher-claims-responsibility-for-security-breach-at-apple-developer-website.html">Researcher claims responsibility for security breach at Apple Developer website</a> by Lucian Constantin (PCWorld)</li>
<li><a href="http://www.theregister.co.uk/2013/07/17/tumblr_ios_uncryption/">D&#8217;OH! Use Tumblr on iPhone or iPad, give your password to the WORLD</a> by John Leyden (The Register), <a href="http://www.theregister.co.uk/2013/07/17/tumblr_ios_snafu_fixed/">Tumblr&#8217;s iOS fix for clear-text password login howler was WEEKS LATE</a> by John Leyden (The Register), <a href="http://nakedsecurity.sophos.com/2013/07/17/tumblr-security-lapse-iphone-and-ipad-users-update-your-passwords-now/">Tumblr security lapse - iPhone and iPad users update your passwords now!</a> by Lee Munson (nakedsecurity blog)</li>
</ul>
                ]]></description>
                <pubDate>Thu, 25 Jul 2013 19:20:29 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode49-SeriousAboutSecurity.mp3" length="24678" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:25:06</itunes:duration>
                <itunes:subtitle>Episode 44: Apple Developer Site Hacked and Tumblr iOS Shared Their Passwords!, July 24, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 48: Android App Packaging has a Hole and There&#8217;s Big Business in Exploits</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_48_july_16_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_48_july_16_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/ldn5NiZbcYM" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/07/10/anatomy-of-a-security-hole-googles-android-master-key-debacle-explained/">Anatomy of a security hole - Google&#8217;s &#8220;Android Master Key&#8221; debacle explained</a> by Paul Ducklin (nakedsecurity blog), <a href="http://www.tomshardware.com/news/Donut-Master-Key-Bluebox-Security-Exploit-cryptographic-signature,23447.html">Relax: Google, Carriers Patching Android &#8220;Master Key&#8221; Exploit</a> by Kevin Parrish (Tom&#8217;s Hardware), <a href="http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/">Uncovering Android Master Key that Makes 99% of Devices Vulnerable</a> by Jeff Forristal, Bluebox CTO (Bluebox blog)</li>
<li><a href="http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html">Nations Buying as Hackers Sell Flaws in Computer Code</a> by Nicole Perlroth and David E. Sanger (NY Times), <a href="http://www.vupen.com/english/services/lea-index.php">VUPEN Services</a>, <a href="http://yro.slashdot.org/story/13/07/14/1626201/business-is-booming-in-the-zero-day-game">Business Is Booming In the &#8216;Zero-Day&#8217; Game</a> on Slashdot</li>
</ul>
                ]]></description>
                <pubDate>Wed, 17 Jul 2013 00:55:45 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode48-SeriousAboutSecurity.mp3" length="24268" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:24:42</itunes:duration>
                <itunes:subtitle>Episode 48: Android App Packaging has a Hole and There&apos;s Big Business in Exploits, July 16, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 47: Club Nintendo has Hacked Accounts and the Emergency Alert System has a flaw</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_47_july_10_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_47_july_10_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/SeINlMI0uSk" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/07/09/nintendo-cracks-after-month-long-15-5-million-strong-hacker-bombardment/">Nintendo cracks after month-long, 15.5 million-strong hacker bombardment</a> by Lisa Vaas (nakedsecurity blog), <a href="https://www.networkworld.com/news/2013/070813-nintendo39s-fan-site-hit-by-271571.html">Nintendo&#8217;s fan site hit by illicit logins, 24,000 accounts accessed</a> by Jay Alabaster (Network World)</li>
<li><a href="http://www.ioactive.com/pdfs/IOActive_DASDEC_vulnerabilities.pdf">IOActive Security Advisory: DASDEC Vulnerabilities</a> by IOActive and Mike Davis, <a href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02">Monroe Electronics DASDEC Compromised Root SSH Key</a> by ICS-CERT, <a href="http://nakedsecurity.sophos.com/2013/07/10/did-brainless-flaw-in-us-emergency-alert-system-lead-to-epic-zombie-attack-warning/">Did brainless flaw in US Emergency Alert System lead to epic zombie attack warning?</a> by Lisa Vaas (nakedsecurity blog), <a href="https://www.securityweek.com/root-ssh-key-compromised-emergency-broadcast-systems">Root SSH Key Compromised in Emergency Alerting Systems</a> by Steve Ragan (Security Week)</li>
</ul>
                ]]></description>
                <pubDate>Thu, 11 Jul 2013 02:15:23 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode47-SeriousAboutSecurity.mp3" length="20275" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:20:34</itunes:duration>
                <itunes:subtitle>Episode 47: Club Nintendo has Hacked Accounts and the Emergency Alert System has a flaw, July 10, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 46: Privacy Tools!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_46_july_2_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_46_july_2_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/qIO-87zBv5g?rel=0" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Tools</h3>

<ul>
<li><a href="https://www.torproject.org/">Tor</a></li>
<li><a href="http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-hide-your-location-piques-nsas-interest-in-you/">Using Tor and other means to hide your location piques NSA&#8217;s interest in you</a></li>
<li><a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">VPN Services That Take Your Anonymity Seriously, 2013 Edition</a></li>
<li><a href="https://www.privateinternetaccess.com/">Private Internet Access</a>, VPN Service (used by Preston)</li>
<li><a href="https://www.boxcryptor.com/en/boxcryptor-classic">BoxCryptor Classic</a></li>
<li><a href="http://www.truecrypt.org/">TrueCrypt</a>
<li><a href="http://labs.bittorrent.com/experiments/sync.html">BotTorrent Sync</a></li>
<li><a href="https://guardianproject.info/apps/gibber/">Gibberbot</a></li>
<li><a href="https://crypto.cat/">Cryptocat</a></li>
<li><a href="http://www.pidgin.im/">Pidgin</a> and the <a href="http://www.cypherpunks.ca/otr/">Off-the-Record Messaging Plugin</a></li>
</ul>
                ]]></description>
                <pubDate>Wed, 03 Jul 2013 06:09:11 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode46-SeriousAboutSecurity.mp3" length="27340" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:27:47</itunes:duration>
                <itunes:subtitle>Episode 46: Privacy Tools!, July 2, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 45: Facebook leaks and Microsoft pays out!</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_45_june_24_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_45_june_24_2013</guid>
                <description><![CDATA[
                    <h2>Google+ Hangout</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/yWUknh5tS2Y" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
<li><a href="http://ikawnoclast.com">Keith Watson</a>, CISSP-ISSAP, CISA</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="https://www.facebook.com/notes/facebook-security/important-message-from-facebooks-white-hat-program/10151437074840766">Important Message from Facebook&#8217;s White Hat Program</a> by Facebook Security (Facebook), <a href="http://nakedsecurity.sophos.com/2013/06/23/facebook-issues-data-breach-notification-may-have-leaked-your-email-and-phone-number/">Facebook issues data breach notification - may have leaked your email and phone number</a> by Paul Ducklin (nakedsecurity blog), <a href="http://arstechnica.com/security/2013/06/facebook-sqashes-bug-that-exposed-e-mail-addresses-for-6-million-users/">Facebook squashes bug that exposed e-mail addresses for 6 million users</a> by Dan Goodin (Ars Technica)</li>
<li><a href="https://blogs.technet.com/b/srd/archive/2013/06/19/new-bounty-program-details.aspx">New Bounty Program Details</a> by swiat (Microsoft Security Research &amp; Defense blog), <a href="http://www.wired.com/threatlevel/2013/06/microsoft-bug-bounty-program/">Microsoft Launches $100K Bug Bounty Program</a> by Kim Zetter (Wired), <a href="http://nakedsecurity.sophos.com/2013/06/21/microsoft-ready-to-cough-up-potentially-big-bounty-bucks-for-bugs/">Microsoft ready to cough up (potentially big!) bounty bucks for bugs</a> by Lisa Vaas (nakedsecurity blog)</li>
</ul>
                ]]></description>
                <pubDate>Wed, 26 Jun 2013 06:08:51 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode45-SeriousAboutSecurity.mp3" length="24473" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:24:52</itunes:duration>
                <itunes:subtitle>Episode 45: Facebook leaks and Microsoft pays out!, June 24, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
        <item>
                <title>Serious About Security Episode 44: Yahoo! to kick out deadbeat users and the FDA offers medical device guidance</title>
                <author>kaw@cerias.purdue.edu (Keith Watson)</author>
                <link>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_44_june_19_2013</link>
                <guid>https://www.cerias.purdue.edu/site/sas_podcast/post/sas_podcastepisode_44_june_19_2013</guid>
                <description><![CDATA[
                    <h2>Youtube video</h2>

<p>&nbsp;</p><iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/Vpd2sCRKXnI" frameborder="0" allowfullscreen></iframe>

<h2>Show Notes</h2>

<h3>Hosts</h3>
<ul>
<li>Preston Wiley, CISSP, CCNA</li>
<li>Mike Hill, CISSP</li>
</ul>

<h3>Articles</h3>

<ul>
<li><a href="http://nakedsecurity.sophos.com/2013/06/18/yahoos-going-to-boot-us-off-our-deadbeat-accounts-but-who-is-going-to-grab-them/">Yahoo&#8217;s going to boot us off our deadbeat accounts, but who is going to grab them?</a> by Lisa Vaas (nakedsecurity blog), <a href="http://ca.news.yahoo.com/yahoo-tries-breathe-life-dead-pool-email-accounts-194004007.html">Yahoo tries to breathe life into dead pool of email accounts by offering IDs to newcomers</a> by The Associated Press (Yahoo! News)</li>
<li><a href="https://www.networkworld.com/news/2013/061313-us-fda-calls-on-medical-270819.html">US FDA calls on medical device makers to focus on cybersecurity</a> by Grant Gross (Network World), <a href="http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm">FDA Safety Communication: Cybersecurity for Medical Devices and Hospital Networks</a> by the Food and Drug Administration, <a href="http://tech.slashdot.org/story/11/08/05/1514210/probing-insulin-pumps-for-vulnerabilities">Probing Insulin Pumps For Vulnerabilities</a> by Soulskill (Slashdot), <a href="http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/ucm356186.htm">Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff</a> by the Food and Drug Administration</li>
</ul>
                ]]></description>
                <pubDate>Thu, 20 Jun 2013 06:06:33 +0000</pubDate>
                
                <enclosure url="http://www.cerias.purdue.edu/site/uploads/sas_podcast/episode44-SeriousAboutSecurity.mp3" length="23552" type="audio/mpeg"/>
               
                    
    
                <itunes:author>Keith Watson</itunes:author>
                <itunes:explicit>No</itunes:explicit>
                <itunes:duration>00:23:54</itunes:duration>
                <itunes:subtitle>Episode 44: Yahoo! to kick out deadbeat users and the FDA offers medical devices guidance, June 19, 2013</itunes:subtitle>
                <itunes:image href="http://www.cerias.purdue.edu/assets/images/serious_about_security.png" />
                
        </item>
        
        
       
        </channel>
</rss>