

Vehicle Location Data Leaked For Over 2 million Drivers, Another US Government Breach, And D.B. Cooper
May 18, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
The Difference Between CIOs and CISOs
01:32 • 3min
Zero Trust: How to Delegate Properly
04:41 • 2min
Toyota: Car Location Data of 2 Million Customers Exposed for 10 Years
06:34 • 2min
Toyota's Video Recordings
08:18 • 2min
Toyota's T Connect Gene Link
09:57 • 2min
Intel OEM Private Keys Leaked a Blow to UEFI Security
11:42 • 2min
MSI Targeted for CC Cleaner
13:25 • 2min
Money Message Leaks Private Keys to MSI
15:49 • 2min
How to Deal With Data Breach in the US
17:27 • 2min
How to Deal With Encryption at Rest
19:49 • 3min
How to Deal With a Post Breach Scenario
23:08 • 3min
How to Cast Someone in the Line
25:45 • 2min
The Importance of Security Measures
27:22 • 2min
The Twitter 2020 Hack: A Social Engineering Campaign
29:13 • 3min
How to Deal With a White Collar Crime
31:45 • 2min
The Sentence Guidelines for Hackers
33:35 • 2min
The Pros and Cons of Jim Bestory
35:53 • 3min
The Mystery of the D.V. Cooper Case
38:54 • 2min
The Unsolved Mystery of the JFK Assassination
40:44 • 2min
Google Cybersecurity Certificate
42:41 • 3min
How to Protect Your Parents From Scams
45:54 • 6min
How to Avoid Viral Exploits in Social Engineering Campaigns
51:27 • 2min
DDoS Mitigation: A Case Study
53:40 • 2min
How to Stop a DDoS Attack
55:18 • 2min
Hacker in the Fed Merchandise
57:39 • 2min