Securit13 Podcast
Первый украинский подкаст об информационной безопасности

Intro/Outro: Mad Heads – Молода кров

GnuPG donations https://www.gnupg.org/donate/

Support Risky.Biz https://www.patreon.com/riskybusiness

GPG Tools https://gpgtools.org

GPG encrypted loopback disks http://patrick.uiterwijk.org/2013/02/25/gpg-encrypted-loopback-disks/

Mofilla, Tor & Privacy https://blog.mozilla.org/it/2015/01/28/deploying-tor-relays/

Anthem hack http://krebsonsecurity.com/2015/02/data-breach-at-health-insurer-anthem-could-impact-millions/

World's Biggest Data Breaches infographic http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

The Pirate Bay & CloudFlare CDN http://n4gm.com/thepiratebay-using-cloudflare-cdn/

Tsarev & Kolomoyskiy https://www.youtube.com/watch?v=9H4Eb9UI5xg

BlackPhone https://blackphone.ch

Kyivstar cell network blackout in Eastern Ukraine https://www.facebook.com/peter.chernyshov/posts/10205651506638154 https://www.facebook.com/peter.chernyshov/posts/10205679729343704

SS7 security concerns http://www.zdnet.com/article/invasive-phone-tracking-new-ss7-research-blows-the-lid-off-personal-security/

Had Russian blackhats pwned Sony? http://www.forbes.com/sites/thomasbrewster/2015/02/04/russians-hacked-sony-too-claims-us-firm/

Tech journalism in Ukraine http://biz.liga.net/all/it/stati/2924651-proslushat-kazhdogo-reyting-nadezhnosti-mobilnykh-messendzherov-.htm

RetroShare http://retroshare.sourceforge.net Signal https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8 Silent Circle https://silentcircle.com

Extradition aspects http://arstechnica.com/tech-policy/2015/01/dutch-judge-allows-alleged-sophisticated-russian-hacker-to-be-sent-to-us/

Snare on MacOS X bootkitting http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/

Cisco Annual Security Report http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html

Source 114 vs Verizon Business. Who wins? https://pbs.twimg.com/media/B81r299IUAEu2qT.jpg:large http://www.verizonenterprise.com/DBIR/2014/

Fear the known: why AV companies publish security reports?

Binary Risk Analysis https://binary.protect.io https://binary.protect.io/workcard.pdf

2 factor authentication vs 2 step verification

Yubikey https://www.yubico.com/products/yubikey-hardware/yubikey-2/

Army cyber defenders open source code in new GitHub project http://www.army.mil/article/141734

CERT-UA 2014 report http://cert.gov.ua/?p=2019

Direct download: 27.mp3
Category:Technology -- posted at: 4:28pm CET
Comments[0]

Adding comments is not available at this time.