389 Episodes

  1. Usable security is a delicate balance.

    Published: 11/2/2019
  2. Masad Steals via Social Media.

    Published: 10/26/2019
  3. Hoping for SOHO security.

    Published: 10/19/2019
  4. Decrypting ransomware for good.

    Published: 10/12/2019
  5. The fuzzy boundaries of APT41.

    Published: 10/5/2019
  6. Focusing on Autumn Aperture.

    Published: 9/28/2019
  7. Leaky guest networks and covert channels.

    Published: 9/21/2019
  8. Bluetooth blues: KNOB attack explained.

    Published: 9/14/2019
  9. VOIP phone system harbors decade-old vulnerability.

    Published: 9/7/2019
  10. Emotet's updated business model.

    Published: 8/31/2019
  11. Gift card bots evolve and adapt.

    Published: 8/24/2019
  12. Detecting dating profile fraud.

    Published: 8/17/2019
  13. Unpacking the Malvertising Ecosystem.

    Published: 8/10/2019
  14. Package manager repository malware detection.

    Published: 8/3/2019
  15. Day to day app fraud in the Google Play store.

    Published: 7/27/2019
  16. Nansh0u not your normal cryptominer.

    Published: 7/20/2019
  17. Opportunistic botnets round up vulnerable routers.

    Published: 7/13/2019
  18. Giving everyone a stake in the success of Open Source implementation.

    Published: 6/29/2019
  19. Middleboxes may be meddling with TLS connections.

    Published: 6/22/2019
  20. Apps on third-party Android store carry unwelcome code.

    Published: 6/15/2019

15 / 20

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.