Securit13 Podcast
Первый украинский подкаст об информационной безопасности

Intro / Outro BRUTTO - Просперо (Piano Cover)
00:03:31 Интервью с Виктором Жорой об атаке на объекты электроэнергетики Украины
Причиною вчорашнього знеструмлення половини Івано-Франківщини була хакерська атака
СБУ попередила спробу російських спецслужб вивести з ладу об'єкти енергетики України
First known hacker-caused power outage signals troubling escalation
Хакери погрожують українським енергомережам. За кібератакою на обленерго читається російський почерк
США підозрюють Росію у причетності до кібератак на електромережі України
Malware 'clearly' behind Ukraine power outage, SANS utility expert says
iSIGHT Partners: Sandworm Team and the Ukrainian Power Authority Attacks
Троян BlackEnergy используется в кибератаках на СМИ и промышленные объекты Украины
BlackEnergy Disrupt Matrix - SOC Prime X
Potential Sample of Malware from the Ukrainian Cyber Attack Uncovered
BlackEnergy .XLS Dropper
Штаб: У "Борисполі" попередили ймовірну хакерську атаку з боку РФ
Special Publication 800-82 Guide to Industrial Control Systems (ICS) Security (pdf)
Cyber war in perspective (pdf)
00:58:41 Казусы наших 1с
01:01:15 Герб мининформполитики
01:02:02 Суд дозволив прокуратурі обшукати український офіс Google
01:04:04 SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7
Someone Just Leaked Hard-Coded Password Backdoor for Fortinet Firewalls
Fortinet says backdoor found in FortiOS is "a management authentication issue"
01:07:03 Facebook spars with researcher who says he found “Instagram’s Million Dollar Bug”
01:08:43 iOS 9.3 brings multi-user mode to iPads, along with more features and fixes
01:11:10 How Nvidia breaks Chrome Incognito
Nvidia: Chrome 'Incognito' Porn Leakage Is on Apple, Not Us
01:14:11 Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
Evil OpenSSH servers can steal your private login keys to other systems – patch now
How To Fix OpenSSH's Client Bug CVE-0216-0777 and CVE-0216-0778 by Disabling UseRoaming
01:15:29 Microsoft Gives Details About Its Controversial Disk Encryption
01:17:21 Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key
01:18:11 Microsoft ends support for Windows 8, IE8 through 10: What does this mean for you?
01:18:40 The Tor Project Is Starting a Bug Bounty Program
01:18:55 Linode: back at last after ten days of hell
Linode Blog » Security Notification and Linode Manager Password Reset
01:19:21 Cisco admins gear up for a late night – hardcoded password in wireless points nuked
01:19:29 Про ДДоС говнокод.ру через JS в посте на хабре
01:21:21 TrendMicro node.js HTTP server listening on localhost can execute commands
01:23:37 Debug code cracked case in hunt for mystery Silverlight zero day
01:24:44 Software bug granted early release to more than 3,200 US prisoners
01:25:32 Massive bug at online gaming platform exposes users' sensitive data
01:26:19 Turkish carder scores record 332-year jail term    
01:26:50 Vulnerability allows to permanently delete any skype account by support request
01:29:28 French say 'Non, merci' to encryption backdoors
01:30:13 Database leak exposes 3.3 million Hello Kitty fans
01:30:23 250 Hyatt hotels hacked via PoS malware
01:30:42 Trustwave failed to spot casino hackers right under its nose – lawsuit
01:31:51 Stranger talks to a kid through this hacked baby monitor
01:32:38 Holiday hack challenge
Security weekly #444
01:41:07 drduh/OS-X-Security-and-Privacy-Guide

Direct download: 52.mp3
Category:Technology -- posted at: 1:43pm CET

  • Не плохо собранный каталог

    posted by: Юридическая компания on 2018-01-12 10:37:35

Adding comments is not available at this time.