loader from loading.io

Episode 49 - Breached Passwords Should Never Be Used Again, By Anyone

Security In Five Podcast

Release Date: 08/17/2017

Episode 881 - New Twist On Zoom Bombing Appearing For The Holidays show art Episode 881 - New Twist On Zoom Bombing Appearing For The Holidays

Security In Five Podcast

As the holiday season approaches that means the bad guys are stepping up their attacks. There is a new twist of phishing and Zoom bombing. This episode talks about what it is and how it works.

info_outline
Episode 880 - Tools, tips and tricks - Bestvpn.org show art Episode 880 - Tools, tips and tricks - Bestvpn.org

Security In Five Podcast

This week's tools, tips and tricks comes in from a follower of my blogs and podcast. Finding a VPN can be difficult to wade through all the choices for something that is supposed to keep you secure. Someone created their own VPN guide and wanted to share it. 

info_outline
Epsiode 879 - US Senate Approves Deepfake Bill show art Epsiode 879 - US Senate Approves Deepfake Bill

Security In Five Podcast

The US Senate approves a bill that will help support the research into detecting deepfakes. Deepfake videos are getting easier to make and are becoming more realistic by the day.

info_outline
Episode 878 - IoT Strikes Again - IoT Legislation Makes It To The President To Sign show art Episode 878 - IoT Strikes Again - IoT Legislation Makes It To The President To Sign

Security In Five Podcast

On Nov. 21, 2020 the US Senate unanimously passed the IoT Cybersecurity Improvement Act to send to the President to sign. This episode talks about what this bill will do and why it's an important step in addressing IoT security or lack thereof. 

info_outline
Episode 877 - IoT Strikes Again - Tesla Model X Hacked And Stolen In Minutes show art Episode 877 - IoT Strikes Again - Tesla Model X Hacked And Stolen In Minutes

Security In Five Podcast

Researchers from COSIC the Computer Security and Industrial Cryptography have released a video showing them hacking and driving away with a Tesla Model X in minutes. This episode breaks down how the hack works and what equipment was needed to pull it off. Tesla has since patched the vulnerability.

info_outline
Episode 876 - One-Third Of Breaches Occur From The Inside, This Does Not Mean Malicious Acts, A Story show art Episode 876 - One-Third Of Breaches Occur From The Inside, This Does Not Mean Malicious Acts, A Story

Security In Five Podcast

Breaches often make you think of a malicious act from a hacker or disgruntled person with access. This is not the case. This episode talks about insider threats and all the things you should be considering with protecting your sensitive data.

info_outline
Episode 875 - You Can Have A Breach That Does Not Involve Computers show art Episode 875 - You Can Have A Breach That Does Not Involve Computers

Security In Five Podcast

When most people hear about a breach they assume a computer was hacked or a digital file was copied. This episode talks about how a breach is simply the loss of data and you don't need a computer problem to have a breach.

info_outline
Episode 874 - What Happens To Your Data When A Company Closes show art Episode 874 - What Happens To Your Data When A Company Closes

Security In Five Podcast

This episode talks about another breach for a misconfigured S3 bucket. However, the owner is no longer in business. What happens to systems and data when a company shuts down and everyone walks away?

info_outline
Episode 873 - The North Face Hit With Credential Stuffing Attack, Easily Preventable By The Users show art Episode 873 - The North Face Hit With Credential Stuffing Attack, Easily Preventable By The Users

Security In Five Podcast

The North Face sent out a notice about an incident where an attacker used a credential stuffing technique to compromise accounts. North Face reset all account's passwords as a preventative measure. This epsiode talks about why this attack isn't North Face's fault but the users.

info_outline
Episode 872 - Tools, Tips and Tricks - Using Trello For Your Kid's Remote Learning show art Episode 872 - Tools, Tips and Tricks - Using Trello For Your Kid's Remote Learning

Security In Five Podcast

This week's tools tips and tricks talks about a solution that I use for distance learning at home. Leveraging Trello and applying Agile mentality to help organize and maintain school work and assignments.

info_outline
 
More Episodes

A new search tool has come out that allows you to search your password to see if it's part of a breach. Why? Because NIST has stated that breached passwords should never be used again, by anyone. Listen to see how hackers can exploit this. 

Email Breach Search - https://haveibeenpwned.com/

Password Breach Search - https://haveibeenpwned.com/Passwords

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

Email - contactme@binaryblogger.com

Music in this episode:

Children Of The Son (Instrumental Acoustic) by PC-ONE is licensed under a Attribution License