Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Introduction
00:00 • 2min
Are Pajamas Just Like an Old T-Shirt?
01:49 • 2min
Black Hills Information Security - Level Nine News
03:35 • 2min
LastPass Is Even Worse Than It Was
05:13 • 2min
What Is the Threat Model for Encrypted Data?
06:45 • 2min
Is One Password Encrypted?
08:33 • 4min
Is There a Denial of Service Attack on Your Refrigerator?
12:57 • 2min
I'm Adamantly Against This Stuff
15:25 • 2min
Do You Have a VLAN for Your Oven?
17:01 • 2min
IOT Devices Aren't Adding Features, Right?
18:52 • 2min
I'll Buy an Oven With a Clock and a Convection Oven.
20:54 • 2min
Ransomware Awareness Has Risen. Yeah.
23:03 • 2min
What Are Our Competitors Doing When This Happens?
24:57 • 2min
The FBI Is Going After Ransomware Gangs
26:28 • 2min
The Secret Recipe on WikiLeaks
28:10 • 2min
How to Fix a Goldfish Problem
30:18 • 3min
Can We Build a Social Engineering Setup That Uses Fish?
33:13 • 3min
What's the Difference Between TSA and Shodan?
36:38 • 2min
A Category of Articles on Cyber Attacks
38:27 • 2min
Anti-Fraud Practices - Protect Your Users
40:52 • 2min
Is Money Laundering a Thing?
43:09 • 3min
Chip Manufacturing - Is China on the Sanctions List for Certain Types of Technology?
45:49 • 4min
Is China Going to Cut Off Access to Manufacturing?
49:26 • 2min
Is China a Good Idea?
51:54 • 3min
The Future of EUV Manufacturing Technology
54:42 • 2min
Canary Token Detection
56:28 • 3min
What's Up With the Anti Siphon Hack Down?
58:59 • 2min


