The Serious about Security Podcast is brought to you by the Greater Lafayette Security Professionals (GLSP) group, Secure Purdue, and the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.
The views and opinions expressed in this podcast are those of the participants and do not reflect the views and opinions of Purdue University and The Center for Education and Research in Information Assurance and Security (CERIAS).
Researchers discover a method to disable the webcam indicator light on some Apple MacBook models to surreptitiously spy on users. The President’s panel recommends some changes for the NSA.
( More... )The launch code for the US nuclear arsenal was set to 00000000 for almost 20 years. A French government ministry used an intermediate certificate authority to create a man-in-the-middle attack to pretend to be Google.
( More... )Twitter enables Forward Secrecy for users. The Pony botnet captures a lot of passwords.
( More... )Following the lead of Google, Yahoo! begins encrypting its fiber connections between data centers. The website for the Affordable Care Act, Healthcare,gov, has some security issues.
( More... )Facebook determines which users have the same password as on the compromised Adobe site and warns them. A watering hole attack uses an IE 0-day vulnerability to inject a malicious payload directly into memory.
( More... )BadBIOS? Is it real, imagined, or a hoax? The NSA is tapping the fiber connecting the data centers of Google and Yahoo!
( More... )The EFF provides ten steps to avoid Internet surveillance. Several major corporations are owned in the DEFCON Social Engineering Capture the Flag contest.
( More... )Apple’s iCloud and Two-Factor Authentication have some issues discovered. A dispute leads to court-ordered seizures due to use of the term “hacker”.
( More... )Matthew Green looks to fund a project to audit Truecrypt in light of recent NSA revelations. Cryptolocker is some nasty ransomware.
( More... )A leaked presentation from Edward Snowden reveals that the NSA thinks that Tor stinks. Microsoft is recycling old email addresses just like Yahoo!
( More... )Kids in the LA Unified School District break the security on school-issued iPads. Circle Security, a privacy software company, is moving away from government-approved crypto algorithms.
( More... )We review some previous subjects to see what has happened lately. We look at Oracle’s Java security issues, Yahoo! recycling email addresses, and the iPhone 5s fingerprint sensor.
( More... )Apple’s iPhone 5S includes a fingerprint reader in the home button.
( More... )Through revelations from Edward Snowden, the National Security Agency (NSA) has intentionally weakened cryptography products, acquired private keys, and built systems to brute force attack encrypted data.
( More... )We have a discussion on password complexity, length, and the applications that use passwords. Apple Mac OS X and iOS have a bug in CoreText that causes crashes with a specific Arabic text string of six characters.
( More... )Two US-based email providers close their doors or shut their email services due to issues with the NSA and the PATRIOT Act. A security researcher convinces Facebook’s security team that he found a bug by publicly exploiting the problem on Mark Zuckerberg’s TImeline.
( More... )We look at some interesting revelations from Blackhat and DEFCON.
( More... )The FBI may used malware to attack Tor to find criminals. Twitter has overhauled its two-factor authentication system.
( More... )We take a look at a variety of security breaches in the news lately.
( More... )The Apple Developer web site was hacked by one of its own developers. Tumblr for iOS had a security issue that exposed user passwords.
( More... )A vulnerability is discovered in the Android package contents verification. Trading in 0-day exploits is big business.
( More... )Club Nintendo has more than 15m password guessing attempts and almost 24k account compromised. One type of system in the Emergency Alert System has known SSH private key for root.
( More... )We talked about a variety of privacy tools available to avoid NSA monitoring.
( More... )Facebook reports on a bug that leaked private information on 6 million users. Microsoft starts a bug bounty program with some sizable payouts.
( More... )Yahoo! has decided to clean up and release old, unused accounts. The Food and Drug Administration is providing security guidance for medical devices.
( More... )