Securit13 Podcast
Первый украинский подкаст об информационной безопасности

Intro: Кар - Мэн - Лондон гуд-бай https://www.youtube.com/watch?v=Uyisn3MTmJQ

The Company Securing Your Internet Has Close Ties to Russian Spies http://www.bloomberg.com/news/articles/2015-03-19/cybersecurity-kaspersky-has-close-ties-to-russian-spies

A practical guide to making up a sensation https://eugene.kaspersky.com/2015/03/20/a-practical-guide-to-making-up-a-sensation/

H4cked off: Is Eugene Kaspersky 'in bed' (or the sauna) with the Russian government? Derr, of course he is http://www.computing.co.uk/ctg/feature/2400777/is-eugene-kaspersky-in-bed-or-the-sauna-with-the-russian-government-derr-of-course-he-is

Exploiting the DRAM rowhammer bug to gain kernel privileges http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

The Rowhammer Bug http://www.rowhammer.com/

Risky Business #357 -- Mark Dowd talks Rowhammer http://risky.biz/RB357

Black Box Can Brute Force Crack iPhone PIN Passcodes  http://www.forbes.com/sites/thomasbrewster/2015/03/16/300-device-can-pop-open-old-iphones-with-ease/

New BIOS implant, vulnerability discovery tool to debut at CanSecWest https://threatpost.com/new-bios-implant-vulnerability-discovery-tool-to-debut-at-cansecwest/111710

Mobile Android, iOS apps still vulnerable to FREAK attacks https://threatpost.com/mobile-android-ios-apps-still-vulnerable-to-freak-attacks/111695

RC4 must die http://www.isg.rhul.ac.uk/tls/RC4mustdie.html

uTorrent Installs Bitcoin Miner http://anonhq.com/utorrent-installs-bitcoin-miner-bad-pc/

OpenSSL Audit https://cryptoservices.github.io/openssl/2015/03/09/openssl-audit.html

Webnic Registrar Blamed for Hijack of Lenovo http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/

Bogus SSL certificate for Windows Live could allow man-in-the-middle hacks http://arstechnica.com/security/2015/03/bogus-ssl-certificate-for-windows-live-could-allow-man-in-the-middle-hacks/

Yahoo Mail launches on-demand passwords, end-to-end encryption coming by year's end http://www.techspot.com/news/60064-yahoo-mail-launches-demand-passwords-end-end-encryption.html

Yahoo exec goes mano a mano with NSA director over crypto backdoors http://arstechnica.com/tech-policy/2015/02/yahoo-exec-goes-mano-a-mano-with-nsa-director-over-crypo-backdoors/

Adobe web services vulnerability disclosure program https://hackerone.com/adobe

Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities http://thehackernews.com/2015/03/yahoo-bug-bounty.html

Cyber terror test tasks hackers with saving London from hacked battleship http://m.v3.co.uk/v3-uk/news/2399541/cyber-terror-test-tasks-hackers-with-saving-london-from-hacked-battleship

Banning Tor unwise and infeasible, MPs told http://www.bbc.com/news/technology-31816410

Drupal Patches Critical Password-Reset Vulnerability http://thehackernews.com/2015/03/hacking-drupal-website.html

GPG Suite Beta 6 https://gpgtools.org/

Интервью с представителем департамента по борьбе с кибер. преступностью Украины Василием Гузием

Форма связи http://cybercrime.gov.ua/ua/feedback-ua

Outro: Петр Сказкив - Буревій https://youtu.be/DlvL1O9QFMc?t=1m54s

Direct download: 30.mp3
Category:Technology -- posted at: 12:22am CET
Comments[0]

Intro/Outro: Etherwood - Begin By Letting Go

'FREAK' in Android and iOS http://thehackernews.com/2015/03/freak-openssl-vulnerability.html

'FREAK' in Windows http://thehackernews.com/2015/03/freak-openssl-vulnerability_5.html

Вопрос от слушателя по мотивам очередного pre-load in Android http://thehackernews.com/2015/03/Xiaomi-Mi-4-malware.html

Cyber BINGO

Truecrypt audit http://blog.cryptographyengineering.com/2015/02/another-update-on-truecrypt-audit.html

Dropbox Accesses All The Files in Your PC (Not Just Sync Folder) and Steals Everything http://www.e-siber.com/guvenlik/dropbox-accesses-all-the-files-in-your-pc-not-just-sync-folder-and-steals-everything/?utm_content=bufferec71c&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer

Dropbox Is Probably Not Stealing All Your Files https://one.darrenpmeyer.com/blog/dropbox-is-problably-not-stealing-all-your-files.html

Seagate NAS Remote Code Execution Vulnerability https://beyondbinary.io/advisory/seagate-nas-rce/

How the NSA’s Firmware Hacking Works http://www.wired.com/2015/02/nsa-firmware-hacking/

Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys http://www.wired.com/2015/02/gemalto-confirms-hacked-insists-nsa-didnt-get-crypto-keys/

How Hackers Abused Tor To Rob Blockchain, Steal Bitcoin, Target Private Email And Get Away With It http://www.forbes.com/sites/thomasbrewster/2015/02/24/blockchain-and-darknet-hacks-lead-to-epic-bitcoin-losses/

Github Hacking for fun and... sensitive data search! http://blog.conviso.com.br/2013/06/github-hacking-for-fun-and-sensitive.html

Hillary Rodham Clinton and her emails http://www.washingtonpost.com/politics/state-department-reviewing-whether-clinton-e-mail-violated-security-rules/2015/03/05/16d1547e-c378-11e4-9271-610273846239_story.html

Spies Just by Watching Your Phone’s Power Use http://www.wired.com/2015/02/powerspy-phone-tracking/

Lenovo.com has been hacked http://www.theverge.com/2015/2/25/8110201/lenovo-com-has-been-hacked-apparently-by-lizard-squad

Google is More Protected from Unwanted Software http://googleonlinesecurity.blogspot.com/2015/02/more-protection-from-unwanted-software.html

Cloud based web app security scanner released by GOOGLE http://www.latesthackingnews.com/2015/02/21/cloud-based-web-app-security-scanner-released-by-google/#

Most vulnerable operating systems and applications in 2014 http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/ 

Blogger porn content policy https://support.google.com/blogger/answer/6177281?hl=en

Internet is for PORN!! https://www.youtube.com/watch?v=eWEjvCRPrCo&feature=youtu.be

Direct download: 29.mp3
Category:Technology -- posted at: 3:15am CET
Comments[0]

1