loader from loading.io

Episode 28 - Dark Web Scanner - Matchlight

Security In Five Podcast

Release Date: 07/19/2017

Epsiode 879 - US Senate Approves Deepfake Bill show art Epsiode 879 - US Senate Approves Deepfake Bill

Security In Five Podcast

The US Senate approves a bill that will help support the research into detecting deepfakes. Deepfake videos are getting easier to make and are becoming more realistic by the day.

info_outline
Episode 878 - IoT Strikes Again - IoT Legislation Makes It To The President To Sign show art Episode 878 - IoT Strikes Again - IoT Legislation Makes It To The President To Sign

Security In Five Podcast

On Nov. 21, 2020 the US Senate unanimously passed the IoT Cybersecurity Improvement Act to send to the President to sign. This episode talks about what this bill will do and why it's an important step in addressing IoT security or lack thereof. 

info_outline
Episode 877 - IoT Strikes Again - Tesla Model X Hacked And Stolen In Minutes show art Episode 877 - IoT Strikes Again - Tesla Model X Hacked And Stolen In Minutes

Security In Five Podcast

Researchers from COSIC the Computer Security and Industrial Cryptography have released a video showing them hacking and driving away with a Tesla Model X in minutes. This episode breaks down how the hack works and what equipment was needed to pull it off. Tesla has since patched the vulnerability.

info_outline
Episode 876 - One-Third Of Breaches Occur From The Inside, This Does Not Mean Malicious Acts, A Story show art Episode 876 - One-Third Of Breaches Occur From The Inside, This Does Not Mean Malicious Acts, A Story

Security In Five Podcast

Breaches often make you think of a malicious act from a hacker or disgruntled person with access. This is not the case. This episode talks about insider threats and all the things you should be considering with protecting your sensitive data.

info_outline
Episode 875 - You Can Have A Breach That Does Not Involve Computers show art Episode 875 - You Can Have A Breach That Does Not Involve Computers

Security In Five Podcast

When most people hear about a breach they assume a computer was hacked or a digital file was copied. This episode talks about how a breach is simply the loss of data and you don't need a computer problem to have a breach.

info_outline
Episode 874 - What Happens To Your Data When A Company Closes show art Episode 874 - What Happens To Your Data When A Company Closes

Security In Five Podcast

This episode talks about another breach for a misconfigured S3 bucket. However, the owner is no longer in business. What happens to systems and data when a company shuts down and everyone walks away?

info_outline
Episode 873 - The North Face Hit With Credential Stuffing Attack, Easily Preventable By The Users show art Episode 873 - The North Face Hit With Credential Stuffing Attack, Easily Preventable By The Users

Security In Five Podcast

The North Face sent out a notice about an incident where an attacker used a credential stuffing technique to compromise accounts. North Face reset all account's passwords as a preventative measure. This epsiode talks about why this attack isn't North Face's fault but the users.

info_outline
Episode 872 - Tools, Tips and Tricks - Using Trello For Your Kid's Remote Learning show art Episode 872 - Tools, Tips and Tricks - Using Trello For Your Kid's Remote Learning

Security In Five Podcast

This week's tools tips and tricks talks about a solution that I use for distance learning at home. Leveraging Trello and applying Agile mentality to help organize and maintain school work and assignments.

info_outline
Episode 871 - Microsoft Is Urging Companies To Stop Using SMS Based Multi-Factor Auth, Here's Why show art Episode 871 - Microsoft Is Urging Companies To Stop Using SMS Based Multi-Factor Auth, Here's Why

Security In Five Podcast

Multi-factor authentication is one of the easier and most powerful security improvements you can make on your accounts. However, there are options that are more secure than others. This episode talks about why SMS or text message based MFA is being discouraged by big tech companies from being used.

info_outline
Episode 870 - Apple Rolling Out Privacy Labels For Apps Starting In December show art Episode 870 - Apple Rolling Out Privacy Labels For Apps Starting In December

Security In Five Podcast

Apple has been teasing us with pusing app developers to be more transparent with its data collection of users. Starting in December 2020 Apple will be putting privacy labels on apps telling users at the time of download how the app is collecting and using your data.

info_outline
 
More Episodes

Breaches occur more often than you realize, but they all aren't publicized. A service I use called Matchlight scans your personal information in the Dark Web and notifies you if it finds any. This is another tool to use to keep tabs on your private data.

* This is not a sponsored episode. A personal recommendation.

Matchlight - https://terbiumlabs.com/matchlight.html

------------------------------------
Music in this episode:
Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.