Known Exploited Vulnerabilities. Fool’s gold. Hacktivists come in both dissident and loyal varieties. Naming and shaming the shameless.

Known Exploited Vulnerabilities. Fool’s gold....

Suivant

Confronting China’s Expanding Cyber Threats [Threat Vector]

While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasi ...  Afficher plus

Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]

While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vic ...  Afficher plus

Épisodes Recommandés

How A Satellite Hack Became a Cybersecurity Wakeup Call
Big Take

People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ...  Afficher plus

A hacking group called Hive has been hacked by the US authorities
World Business Report

The hackers have been hacked - a prolific international ransomware operation has been shut down by US, German and Dutch officials. The criminal network, Hive, is said to have targeted over 1,500 victims worldwide in the past 18 months and extorted over $100 million. FBI director ...  Afficher plus

Crypto hacker hijinks, government spyware, and Utah social media shocker
Smashing Security

A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gra ...  Afficher plus

Lauri Love: The realities of cyber security
The Interview

Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ...  Afficher plus