Securit13 Podcast
Первый украинский подкаст об информационной безопасности


Последний розыгрыш билетов на UISGCON 12!

Канал на youtube -

Email -


Direct download: 4_2016-11-23.mp3
Category:general -- posted at: 10:57pm CET

Intro / Outro Touhou Project / Bad Apple (Nika Lenina Ukrainian Orchestra Version)

Funtenna project

A Monitor Darkly

Compromising emanations: eavesdropping risks of computer displays

Direct download: 70.mp3
Category:Technology -- posted at: 4:14am CET

Второй розыгрыш билетов на UISGCON 12!

Канал на youtube -

Email -

Direct download: 3_2016-11-16.mp3
Category:general -- posted at: 6:01am CET

Special - Подарунок вiд Secrit13 та UISGCON

Канал на youtube -

Електрична адреса -

Direct download: 2_2016-11-09.mp3
Category:general -- posted at: 12:36am CET

Подарунок вiд Secrit13 та UISGCON

YouTube канал -

Direct download: 1_2016-11-05.mp3
Category:general -- posted at: 8:37am CET

Intro / Outro Insecurity (Treatment) by fourstones Ft: Ms. Vybe  

00:02:19 ISIS using encrypted apps for communications; former intel officials blame Snowden

Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks

Encrypted messages: Does the government need a way in?

Telegram Messenger Blocks 78 Islamic State-Related Channels

Russian bill requires encryption backdoors in all messenger apps

France calls for worldwide help to fight messaging encryption

Encryption under fire in Europe as France and Germany call for decrypt law

France, Germany Call for European Decryption Law

German Intelligence Plans 12% Budget Increase for Communications Monitoring

Telegram app complicates job of French anti-terror police

Terror investigators grapple with Telegram app

00:38:57 СМИ узнали о возможном запрете на иностранное шифрование для банков

00:42:21 Bellingcat vs Fancy Bear: how hackers tried to halt the MH17 investigation

00:47:05 Critical DoS Flaw found in OpenSSL — How It Works

00:47:36 FBI probes hacks targeting phones of Democratic Party officials -sources

00:47:58 How Russia Wants to Undermine the U.S. Election

00:48:30 ISIL-Linked Hacker Sentenced to 20 Years in Prison

00:49:09 Xiaomi Can Silently Install Any App On Your Android Phone Using A Backdoor

00:50:14 KrebsOnSecurity Hit With Record DDoS

00:52:17 US elections and the hacking of e-voting machines

00:52:44 Apple Weakened iOS 10 Backup Encryption; Now It can be cracked 2,500 times faster

00:53:43 Car Hacking Research: Remote Attack Tesla Motors by Keen Security Lab

00:56:50 Oh, It's On Sale! USB Kill to Destroy any Computer within Seconds

00:57:56 ФАС просит доработать правила регулирования мессенджеров

00:59:43 The FBI recommends you cover your laptop's webcam, for good reason

01:02:45 "Газпром" запретил своим сотрудникам ловить покемонов на работе

Direct download: 69.mp3
Category:Technology -- posted at: 7:19pm CET

Intro / Outro Who Knows by sLow_starteR Ft: Tigoolio

Интервью с Владимиром Таратушкой (

HackIt Ukrain

Рекомендуемая книга Теодор Драйзер - Финансист

Direct download: 68_5.mp3
Category:Technology -- posted at: 10:46pm CET

Intro / Outro Christophe Deremy - Fairy Tail

00:02:40 Patch your vBulletin forum – or get popped

Millions of Steam game keys stolen after hacker breaches gaming site

GTAGaming Hack Blamed on Old vBulletin Software

00:09:40 Hackers Can Use Smart Sockets to Shut Down Critical Systems

00:11:46 DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise

00:15:00 Bluetooth Hack Leaves Many Smart Locks, IoT Devices Vulnerable

00:16:12 Cisco Begins Patching Equation Group ASA Zero Da

00:17:20 Researchers announce Linux kernel “network snooping” bug

00:23:36 IPhone Users Urged to Update Software After Security Flaws Are Found  

00:26:22 This PC monitor hack can manipulate pixels for malicious effect

00:29:07 Gotta Spam ‘em All - Pokémon GO Spam

00:30:35 Кибеаполиция про PokemonGo

00:31:42 Сторінка Нацгвардії у TWITTER зламана

00:32:24 “Fileless” UAC Bypass Using eventvwr.exe and Registry Hijacking

Microsoft Windows UEFI Secure Boot — Insecure by Design?

00:34:52 Equation: The Death Star of Malware Galaxy

00:39:26 PoC Unsigned Code Execution on a Sony PS4 System with firmwares 3.15, 3.50 and 3.55 -

00:40:07 Fake Linus Torvalds' Key Found in the Wild, No More Short-IDs

00:41:10 Заява РНБО у зв’язку з ситуацією, що склалася навколо запуску системи електронного декларування

00:42:15 Власти РФ отказались вводить уголовную ответственность за оборот биткоинов

00:46:23 DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work

00:47:53 Major Events and Hacktivism #OpOlympicHacking

00:47:59 Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]

00:49:18 Key Fob Hack Allows Attackers To Unlock Millions Of Cars

00:50:25 SQL Injection Vulnerability in Ninja Forms

00:51:14 Немного об интересной рассылке

00:53:22 Resource: List of Car hacking tools, Car security tools and Car security resources

00:54:09 WildfireDecryptor tool

Direct download: 68.mp3
Category:Technology -- posted at: 7:14am CET

Intro / Outro Broken Remote (Channel Changer Mix) by Vidian

00:01:07 Кто ты, слушатель Securit13?

00:01:17 Интервью с Владимиром Гарбузом, организатором BSides Odessa про BSides Odessa 27.08.2016

00:17:49 Всеукраинская битва хакеров и форум по кибербезопасности HackIT

00:20:02 пара слов о DefCon

DEF CON Media Server


Direct download: 67.mp3
Category:Technology -- posted at: 9:03am CET

Intro / Outro Police Academy Theme

Интервью с Алексеем Барановским об отборе в киберполицию

Рекоммендованные книги:

Гарри Гаррисон “Стальная крыса”

Gray Hat Hacking The Ethical Hacker's Handbook

Теоретичні основи моделювання та аналізу систем захисту інформації Антонюк А.О., Жора В.В.

Безпека інформаційно-комунікаційних систем Новиков О. М., Грайворонський M. B.

Direct download: 66.mp3
Category:Technology -- posted at: 9:16am CET