Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10
Introduction
00:00 • 5min
How to Disguise Malware in URLs
05:21 • 2min
How to Trick People With Email Addresses
07:21 • 2min
Collide: A Simple Device Trust Solution for Fleet Compliance
09:49 • 5min
The Advantages of Killing Off AM Radio
15:02 • 1min
The Problem With the Emergency Alert System in the USA
16:17 • 2min
Microsoft Is Scanning the Inside of Password-Protected Zip Files for Malware Samples
18:12 • 2min
How to Remove a Password From Your Email Account
20:07 • 6min
The Importance of Encryption in Zip Files
25:39 • 2min
The Trustworthiness of an Open Source Application
27:58 • 5min