This week we're joined by Sharon Goldberg, an associate professor in the Computer Science Department at Boston University, and a member of the BU Security Group. We sit down with her to talk about her recent NTP paper and her earlier work on BGP and DNS.
Welcome to another episode of Hack Naked TV recorded December 17th 2015. Aaron talks about the FBI using 0-Days, Drone Registration, Root DNS attack, and RCE in FireEye.
Paul, Joff and Not Kevin talk about registering drones, reply to all, CISA and much more!
Welcome to another episode of Hack Naked TV recorded November 20th 2015. Today Beau talks Bitlocker bypass, Gmail address spoofing and more.
This week we talk about the quest to reveal the identity of Bitcoin's creator, DDoSing the root name servers and much more!
John Strand answers Paul's 5 tough questions on penetration testing. With Larry Pesce and Jeff Man.
Security Weekly Web Site: http://securityweekly.com
Hack Naked Gear: http://shop.securityweekly.com
Follow us on Twitter: @securityweekly
Ed Skoudis joins us via Skype to talk about the all new 2015 Holiday Hack Challenge! Ed also answers the all new 5 Questions, not to be missed!
Security Weekly Web Site: http://securityweekly.com
Follow us on Twitter: @securityweekly
The Security Weekly crew discusses software security, how to create more secure code, legacy code, IoT devices and more!
Security Weekly Web Site: http://securityweekly.com
Hack Naked Gear: http://shop.securityweekly.com
Follow us on Twitter: @securityweekly
Welcome to another episode of Hack Naked TV recorded December 10th 2015. Today Aaron talks about Cybersecurity Information Sharing Act, Kazakhstan, Flash updates, encryption backdoors, and cyber espionage.
Welcome to another episode of Hack Naked TV recorded December 2nd 2015. Today Aaron talks about Dell root certificate fiasco, Hacking Back being reviewed by the government, the LANDesk breach, new tool releases, and more!
For a full list of stories visit our wiki here.
Micah Zenko, a senior fellow at the Council on Foreign Relations and author of the new book "Red Team: How to Succeed By Thinking Like the Enemy." We talk to Micah about techniques to prevent domestic terrorism, parallels between physical security and computer security and red teaming.
Security Weekly Web Site: http://securityweekly.com
Hack Naked Gear: http://shop.securityweekly.com
Follow us on Twitter: @securityweekly
Like is on Facebook: https://www.facebook.com/secweekly