loader from loading.io

Episode 877 - IoT Strikes Again - Tesla Model X Hacked And Stolen In Minutes

Security In Five Podcast

Release Date: 11/23/2020

Episode 906 - If You Are Involved In A Breach, Do Not Post About It show art Episode 906 - If You Are Involved In A Breach, Do Not Post About It

Security In Five Podcast

Eventually, you will be part of a breach. You will get a letter from your clinic or an email from a website you use that your credentials were compromised. This episode talks about what you shouldn't do if you get one of the see notices and why it could make things worse.

info_outline
Episode 905 - People Still Use Fax Machines, Here Are The Security Risks With Them show art Episode 905 - People Still Use Fax Machines, Here Are The Security Risks With Them

Security In Five Podcast

Believe it or not businesses still use fax machines to transmit data. This episode talks about the security gaps you have to be aware of if you use fax machines.

info_outline
Episode 904 - Opening Up Security In Five Website To Guest Posting show art Episode 904 - Opening Up Security In Five Website To Guest Posting

Security In Five Podcast

This podcast has a supporting blog at SecurityInFive.com. The blog is where you can find every single podcast episode as well as the content I have written over the years. This episode details how between now and June 30, 2021 I am opening the blog to guests posts at no cost to you.

info_outline
Episode 903 - Ring Adds End-To-End Encryption Finally show art Episode 903 - Ring Adds End-To-End Encryption Finally

Security In Five Podcast

Ring is rolling out end-to-end encryption to their products. This episode talks about what this means and how it works.

info_outline
Episode 902 - Questions Hackers Ask Before They Attack You show art Episode 902 - Questions Hackers Ask Before They Attack You

Security In Five Podcast

Thinking like a hacker can help you protect yourself. This episode talks about the questions hackers ask before they attack a target.

info_outline
Episode 901 - Google Titan Key Can Be Cloned, But I Wouldn't Worry About It Too Much show art Episode 901 - Google Titan Key Can Be Cloned, But I Wouldn't Worry About It Too Much

Security In Five Podcast

Security researchers reported they were able to clone Google's Titan Security Key. The Titan is a hardware device to greatly improve multi-factor authentication. This episode talks about how the researchers were able to clone it and why you shouldn't be too worried about this or stop using your Titan keys.

info_outline
Episode 900 - Fired Healthcare Exec Used Secret Backdoor Caused Major Problems show art Episode 900 - Fired Healthcare Exec Used Secret Backdoor Caused Major Problems

Security In Five Podcast

A fired healthcare worker used a secret account to cause havoc after he left. This episode talks about the controls you can put in place to help detect behavior like this and how looking at data with proper business context can help you protect it better.

info_outline
Episode 899 - Tools, Tips and Tricks - Password Generation Guidelines Per NIST show art Episode 899 - Tools, Tips and Tricks - Password Generation Guidelines Per NIST

Security In Five Podcast

This week's tools, tips and tricks talk about password generation per NIST recommendations and best practices.

info_outline
Episode 898 - WhatsApp Will Delete Your Account If You Do Not Agree To Facebook Sharing show art Episode 898 - WhatsApp Will Delete Your Account If You Do Not Agree To Facebook Sharing

Security In Five Podcast

WhatsApp used to be an application focused on user's privacy. Facebook bought them and all that was destined to change and the time is now. WhatsApp is updating their terms of service and if you don't agree to share more data with Facebook they will delete your account. This episode goes into the details.

info_outline
Episode 897 - IoT Strikes Again - Swatting Attacks Using Smart Home Devices show art Episode 897 - IoT Strikes Again - Swatting Attacks Using Smart Home Devices

Security In Five Podcast

Swatting attacks are a dangerous trend with malicious agents. Making hoax calls to send police to a residence under the impression there is an immediate threat to life. Now hackers are hijacking smart home devices to aid them in this cruel joke. This episode talks about how this is happening and what you can do to protect yourself.

info_outline
 
More Episodes

Researchers from COSIC the Computer Security and Industrial Cryptography have released a video showing them hacking and driving away with a Tesla Model X in minutes. This episode breaks down how the hack works and what equipment was needed to pull it off. Tesla has since patched the vulnerability.

Video of the hack - https://www.youtube.com/watch?v=clrNuBb3myE&feature=emb_logo

Be aware, be safe.

Become A Patron! Patreon Page

*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five

—————— Where you can find Security In Five ——————

Security In Five Reddit Channel r/SecurityInFive

Binary Blogger Website

Security In Five Website

Security In Five Podcast Page - Podcast RSS

Twitter @securityinfive

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - bblogger@protonmail.com