Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in Apple Podcasts
Paul's Security Weekly TV
2022
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 116
Feb 12, 2016

Today on Hack Naked TV, Beau talks about Cash for Creds, Gmail Warnings, IRS PIN Compromise, and Cisco ASA RCE. Here on Hack Naked TV!

Feb 12, 2016

This week on Security Weekly, we introduce Mike Strouse who is the CEO of ProXPN. He explains how he got started in ProXPN and more!

Feb 12, 2016

On this episode, we talk about scanning the internet, android vulnerabilities, mini UPNPD vulnerabilities, hackers and heroine to Brian Krebs. Much much more, on Paul's Security Weekly!

Feb 11, 2016

This week on Security News, Paul and friends talk about the Top story of the week where HG Moore is leaving Rapid7 and threatbutt! They also discuss threat intelligence and passwords.

Feb 10, 2016

This week on Hack Naked TV, Aaron will be talking about Norse Co., Java, Cyber Terrorism, and Safe Harbor.

Jan 27, 2016

This week Aaron Lyons talks about Trustwave being sued over Incident Response, HD Moore leaving Rapid 7, Safe Harbor deadline looms, Kali rolling distro released, and Sony Entertainment and Sony Playstation merge.

Jan 26, 2016

Beau talks about Backdoor in AMX, Linux Kernel Vuln, Apple Sharing Cookies, Hot Potato, Backhat 2016 Course, BSides Orlando.

Jan 23, 2016

Organizations tend to fall somewhere on a scale of 0 through 100 (with 100 being the best) when it comes to the maturity of their vulnerability management program. Starting at 0 for those who don't do any type of vulnerability management or scanning, to those higher up on the scale integrating 3rd party products and producing business-based metrics. Find out all the different levels, some of the pitfalls, and most importantly how go from 0 to hero in your vulnerability management program.

Jan 22, 2016

This week we interview Chris Domas. Chris is a researcher interested in reverse engineering and exploitation. He joins us to talk about visualizing binaries, accessing ring -2 and making reversers sad.

Jan 14, 2016

This week Paul, Larry, John, Joff and special guest star Adrien talk
about Juniper backdoors, the "biggest" security threats for 2016, axing
Internet Explorer and Uber fines for data breaches.

Jan 13, 2016

This week we interview Adrien de Beaupre, a SANS instructor and
Internet Storm Center handler. Adrien has been researching the security
of HTTP/2 and even does a live demo! We put out a call to action for the
security community to become more pro-active in researching this protocol.

Jan 12, 2016

This week Beau talks about malicious Google Play apps, Comcast home security systems, attacking ICS and MS15-132

Jan 1, 2016

Aaron reviews the Penetration Testing with Kali Linux course and OSCP test.

Dec 22, 2015

This week we're joined by Sharon Goldberg, an associate professor in the Computer Science Department at Boston University, and a member of the BU Security Group. We sit down with her to talk about her recent NTP paper and her earlier work on BGP and DNS.

Dec 21, 2015

Welcome to another episode of Hack Naked TV recorded December 17th 2015. Aaron talks about the FBI using 0-Days, Drone Registration, Root DNS attack, and RCE in FireEye.

Dec 20, 2015

Paul, Joff and Not Kevin talk about registering drones, reply to all, CISA and much more!

Dec 20, 2015

Welcome to another episode of Hack Naked TV recorded November 20th 2015. Today Beau talks Bitlocker bypass, Gmail address spoofing and more.

Dec 19, 2015

This week we talk about the quest to reveal the identity of Bitcoin's creator, DDoSing the root name servers and much more!

Dec 18, 2015

John Strand answers Paul's 5 tough questions on penetration testing. With Larry Pesce and Jeff Man.

Security Weekly Web Site: http://securityweekly.com

Hack Naked Gear: http://shop.securityweekly.com

Follow us on Twitter: @securityweekly

Dec 17, 2015

Ed Skoudis joins us via Skype to talk about the all new 2015 Holiday Hack Challenge! Ed also answers the all new 5 Questions, not to be missed!

Security Weekly Web Site: http://securityweekly.com

Follow us on Twitter: @securityweekly

Dec 16, 2015

The Security Weekly crew discusses software security, how to create more secure code, legacy code, IoT devices and more!

Security Weekly Web Site: http://securityweekly.com

Hack Naked Gear: http://shop.securityweekly.com

Follow us on Twitter: @securityweekly

Dec 11, 2015

Welcome to another episode of Hack Naked TV recorded December 10th 2015. Today Aaron talks about Cybersecurity Information Sharing Act, Kazakhstan, Flash updates, encryption backdoors, and cyber espionage.

Dec 10, 2015

Welcome to another episode of Hack Naked TV recorded December 2nd 2015. Today Aaron talks about Dell root certificate fiasco, Hacking Back being reviewed by the government, the LANDesk breach, new tool releases, and more!

For a full list of stories visit our wiki here.

Dec 7, 2015

Micah Zenko, a senior fellow at the Council on Foreign Relations and author of the new book "Red Team: How to Succeed By Thinking Like the Enemy." We talk to Micah about techniques to prevent domestic terrorism, parallels between physical security and computer security and red teaming.

Security Weekly Web Site: http://securityweekly.com

Hack Naked Gear: http://shop.securityweekly.com

Follow us on Twitter: @securityweekly

Like is on Facebook: https://www.facebook.com/secweekly

Nov 20, 2015

Security news this week we talk about the latest iThing, this one brews your coffee. Find out why its a bad idea to run Windows 3.1 in your environment, or Windows NT. Paul goes back in time, talking about OpenVMS.


http://wiki.securityweekly.com/wiki/index.php/Episode442#Stories_of_the_Week_-_7:00PM-8:00PM


Security Weekly Web Site: http://securityweekly.com

Hack Naked Gear: http://shop.securityweekly.com

Follow us on Twitter: @securityweekly

1 « Previous 113 114 115 116 117 118 119 Next » 128