Securit13 Podcast
Первый украинский подкаст об информационной безопасности

Intro / Outro Андрій Хливнюк "Спи собі сама"

Kaspersky Finds New Nation-State Attack—In Its Own Network


Stuxnet spawn infected Kaspersky using stolen Foxconn digital certificates

China might be building vast database of federal worker info, experts say

TV5 Monde attack 'by Russia-based hackers'

Serious iOS bug lets hackers create fake login screens to steal Apple credentials

LastPass Security Notice

Tesla Motors начала платить за найденные уязвимости

Assume your GitHub account is hacked, users with weak crypto keys told

You Can Be Prosecuted for Clearing Your Browser History

Sourceforge Hijacks the Nmap Sourceforge Account

This Hacked Kids' Toy Opens Garage Doors in Seconds

Edward Snowden: “I should have come forward sooner.”

Сноуден обвинил Россию в нарушении неприкосновенности частной жизни

Украинец убедил нигерийского спамера выслать ему 600 долларов

Держспецзв’язку видала позитивний експертний висновок на Симетричний блоковий шифр AES

The Senate Finally Passes NSA Surveillance Reform

Интернет-вруны: В сети появился список кремлевских троллей и пропутинских организаций

У Бельгії комісія подала до суду на Facebook

Report: Hack of government employee records discovered by product demo

Технологический практикум «Облака без лишних слов»

Вебинары Positive Technologies: образовательная программа "Практическая безопасность"

Yahoo to face class action lawsuit over email spying claims

Facebook will encrypt the emails it sends to you with PGP

Microsoft Plans to Add Secure Shell (SSH) to Windows


Direct download: 36.mp3
Category:Technology -- posted at: 9:00pm CET

Intro/outro - Фантом 2 - Двоє

The Complete Guide for Hidden Services And Staying Anonymous

Risky Business #367 -- Tor Project lead Roger Dingledine

Astoria — Advanced Tor Client Designed to Avoid NSA Attacks

Anonymous peer-to-peer instant messaging

Top encryption researcher moves to Switzerland to escape government interference

HideMyAss story: How misbehaving at school made one man a multimillionaire

Russia warns Google, Twitter and Facebook on law violations

Президент РФ подписал указ о создании государственного сегмента интернета

Some notes about Wassenaar

Cisco Systems поставляла оборудование для Минобороны РФ, ФСБ и Роскомоса в обход санкций

Билеты на финал Лиги Европы от Приватбанка

The founder of the Silk Road drug marketplace has been sentenced to life in prison without parole

Aaron Swartz stood up for freedom and fairness

Верховный суд обязал банки возвращать клиентам украденные с карточек деньги

Активисты раскрыли способ "накрутки" голосов при отборе в общественный совет НАБ

NSA (doesn’t) shut down surveillance program

Senate blocks the bill: Senate blocks NSA surveillance reform bill

Китайцы придумали, как отслеживать людей в метро через акселерометры смартфонов

Official Kali Linux Docker Images

ООН причислил шифрование и анонимность в интернете к правам человека

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it

Infosec Hype Tracker

pcre -- multiple vulnerabilities

Malicious Minecraft apps affect 600,000 Android Users

Annoying bug causes iPhone Messages to crash

Hola VPN turns 10M users into exit nodes

These two Diablo III players stole virtual armor and gold — and got prosecuted IRL

Real-world, physical crypto-lockers

Security Firm Redefines APT: African Phishing Threat

Direct download: 35.mp3
Category:Technology -- posted at: 9:17am CET

Intro / outro - Christian Kane - LA Song

Интервью с Тарасом Бобало

Связаться с Тарасом можно с помощью email и skype madspeedy

Virtualized Environment Neglected Operations Manipulation (VENOM)

Heartbleed, eat your heart out: VENOM vuln poisons countless VMs

PCI DSS 3.1 (pdf)



Patch Tuesday Facelift End of an Era


Премьер-министр Сингапура написал решатель Судоку на C++ и выложил исходный код программы в открытый доступ

Super secretive malware wipes hard drive to prevent analysis 

WordPress Vulnerability Puts Millions of Websites At Risk

 Киевский трамвай наехал на Google-мобиль

Self-Driving Trucks Are Going to Hit Us Like a Human-Driven Truck

Security Product Liability Protections Emerge

France passes new surveillance law in wake of Charlie Hebdo attack

Microsoft Launches Visual Studio Code, A Free Cross-Platform Code Editor For OS X, Linux And Windows

Sublime Text

Mad Max: Fury Road

Goodbye! We'll be back!

Direct download: 34.mp3
Category:Technology -- posted at: 8:51am CET


Dai Davis

Jerry Gamblin

Kevin Williams

Leslie Forbes


Direct download: 44Con.mp3
Category:Technology -- posted at: 1:02am CET

Intro / Outro The Guild: I'm the One That's Cool

Интервью с Евгением Цигикало, специалистом по сигнализации в сетях связи

Б.Гольтдштейн Сигнализация в сетях связи



Hackers Could Commandeer New Planes Through Passenger Wi-Fi

RSA Conference 2015

How Kaspersky makes you vulnerable to the FREAK attack and other ways Antivirus software lowers your HTTPS security

Hacker Implants NFC Chip In His Hand To Hack Android Phones


Twitter перевёл неамериканские аккаунты в ирландский дата-центр

Wi-Fi software security bug could leave Android, Windows, Linux open to attack

iOS bug sends iPhones into endless crash cycle when exposed to rogue Wi-Fi

Fukushima nuke plant owner told to upgrade from Windows XP

Hackers used a surprisingly simple method to access Tesla's website and Twitter account

«ПриватБанк» и «Ощадбанк» запускают в Украине BankID — систему верификации пользователя на госсайтах

Direct download: 33.mp3
Category:Technology -- posted at: 12:50am CET

Intro / Outro Skylar Grey - White Suburban

FORTINET Security Day 2015


Introducing CSX skills-based CYBERsecurity training and performance-baced certifications

СТАЛЕВИЙ БУБЕН - IX (2015-04-04)

С Днем рождения, Владимир!

2015 Data Breach Investigations Report (pdf)

Risky Business #362

IBM to release 20 years worth of cyberthreat data 

IBM® X-Force Exchange 

Wikileaks Publishes Hacked Sony Emails, Documents

VeraCrypt 1.0f-2

French TV station TV5Monde hit by Islamic State hack

The 4 stages of crypto ransomware

Find it in twitter

Полиция Массачусетса заплатила выкуп в биткоинах, чтобы вернуть свои файлы

Q&A about malicious ransomware software

How the U.S. thinks Russians hacked the White House

66% devices patched Heartbleed but Most top corporates still Heartbleeding over the internet


What Your Passwords Say About Your Psychology

Direct download: 32.mp3
Category:Technology -- posted at: 4:23am CET

Intro / Outro Origa - Inner Universe

С Днем рождения, Сергей Борисович!

С Днем рождения, Алиса и Боб!

Интервью с Виктором Жорой


Рекомендованные книги:

Момент истины

Крестный отец

Сталевий бубен

Fortinet Security Day 2015

Information Security Day 2015 доклады


Call for paper R0-Conf #3

PCI Recognizes PTES as a reference framework for Conducting Penetration Tests! (pdf)

Курс з основ інформаційної безпеки

2015 Social Security Blogger Awards

Cyberbullying Resource Center : For parents

Все, що ви написали у "Фейсбук", залишається там – Влодимир Стиран

TrueCrypt Security Audit (pdf)

This 'Killer USB' can make your Computer explode

Is your VirtualBox reading your E-Mail?

Rooting SIM cards

Кабмин разрешил НКРСИ проверить 4 телекомоператора, в том числе "МТС Украина" и "Киевстар"

China's attack against GitHub

App Submissions On Google Play Now Reviewed By Staff, Will Include Age-Based Ratings

Cisco recommends Adblock & Ghostery to combat malvertising

Cisco IP Phones Vulnerable To Remote Eavesdropping

How Hackers Could Delete Any YouTube Video With Just One Click

Federal Agents Accused of Stealing Bitcoins During Silk Road Investigation

OSINT Tools … Recommendations List

Stop using tail -f (mostly)

Direct download: 31.mp3
Category:Technology -- posted at: 3:17pm CET

Intro: Кар - Мэн - Лондон гуд-бай

The Company Securing Your Internet Has Close Ties to Russian Spies

A practical guide to making up a sensation

H4cked off: Is Eugene Kaspersky 'in bed' (or the sauna) with the Russian government? Derr, of course he is

Exploiting the DRAM rowhammer bug to gain kernel privileges

The Rowhammer Bug

Risky Business #357 -- Mark Dowd talks Rowhammer

Black Box Can Brute Force Crack iPhone PIN Passcodes

New BIOS implant, vulnerability discovery tool to debut at CanSecWest

Mobile Android, iOS apps still vulnerable to FREAK attacks

RC4 must die

uTorrent Installs Bitcoin Miner

OpenSSL Audit

Webnic Registrar Blamed for Hijack of Lenovo

Bogus SSL certificate for Windows Live could allow man-in-the-middle hacks

Yahoo Mail launches on-demand passwords, end-to-end encryption coming by year's end

Yahoo exec goes mano a mano with NSA director over crypto backdoors

Adobe web services vulnerability disclosure program

Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities

Cyber terror test tasks hackers with saving London from hacked battleship

Banning Tor unwise and infeasible, MPs told

Drupal Patches Critical Password-Reset Vulnerability

GPG Suite Beta 6

Интервью с представителем департамента по борьбе с кибер. преступностью Украины Василием Гузием

Форма связи

Outro: Петр Сказкив - Буревій

Direct download: 30.mp3
Category:Technology -- posted at: 12:22am CET

Intro/Outro: Etherwood - Begin By Letting Go

'FREAK' in Android and iOS

'FREAK' in Windows

Вопрос от слушателя по мотивам очередного pre-load in Android


Truecrypt audit

Dropbox Accesses All The Files in Your PC (Not Just Sync Folder) and Steals Everything

Dropbox Is Probably Not Stealing All Your Files

Seagate NAS Remote Code Execution Vulnerability

How the NSA’s Firmware Hacking Works

Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys

How Hackers Abused Tor To Rob Blockchain, Steal Bitcoin, Target Private Email And Get Away With It

Github Hacking for fun and... sensitive data search!

Hillary Rodham Clinton and her emails

Spies Just by Watching Your Phone’s Power Use has been hacked

Google is More Protected from Unwanted Software

Cloud based web app security scanner released by GOOGLE

Most vulnerable operating systems and applications in 2014 

Blogger porn content policy

Internet is for PORN!!

Direct download: 29.mp3
Category:Technology -- posted at: 3:15am CET

Intro/Outro: La Fouine - Controle Abusif

CTF движение в Украине и мире – интервью с Николаем Ильиным @MykolaIlin

Рейтинги команд CTF и успехи dcua

Популярность CTF-соревнований в Украине и мире

Принципы проведения CTF

Типы соревнований, тактика и стратегия участия в CTF

Для связи с Николаем используйте Twitter или пишите на

Ten Million (Logins and) Passwords


Online Check:

Lenovo caught installing adware on new computers

Кража миллиардов из 100 финансовых организаций по всему миру

Anunak vs Carbanak FAQ

Microsoft Pushes Patches for Dozens of Flaws

Bypassing Windows Security by modifying 1 Bit Only

Universal XSS in IE 11

NSA Planted Stuxnet-Type Malware Deep Within Hard Drive Firmware

Решили как-то за блогерами следить

но потом передумали

Рада ликвидировала Нацкомиссию по вопросам морали

Отчет об уязвимости моб.интернета от Positive Technologies (pdf)

The great SIM heist

SSL is officially declared dead

GnuPG 2.1.2 released

Facebook SCAM Alert: Get FREE $200 Amazon Gift Card!

Spat leads to partial leak of Rig Exploit Kit compromised by Chinese cyber spies targeting US firms

Direct download: 28.mp3
Category:Technology -- posted at: 1:54pm CET