Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Introduction
00:00 • 2min
How to Deal With Dependency Confusion
01:37 • 3min
Google's Recalling to a Repository
04:54 • 2min
Giaraffe Security: How to Find Dependency Confusions in Large Tech Companies
06:47 • 2min
The Googlers Compromise
08:46 • 2min
Google's Social Engineering Campaign: A Passive Attack
10:36 • 2min
How to Integrate Python Into Your Development Cycle
12:59 • 3min
Ghost Tokens Open Google Accounts to Permanent Infections
15:35 • 2min
The Ghost Token: A Backdoor to Your Account
17:40 • 2min
OAuth Fishing: A Social Engineering Campaign
19:36 • 2min
Google's Ghost Token Attack
21:30 • 3min
Delete Me: A Simple Subscription Privacy Service for Reducing Unwanted Personal Information
24:04 • 2min
How to Start a Therapy Program With BetterHelp
26:27 • 3min
The Absurdity of Hacker Group Names
29:05 • 3min
Microsoft's Change in Names of Hacking Groups
32:32 • 2min
How Long Would It Take to Brute Force a Password?
34:36 • 2min
How to Crack High Entropy Passwords
36:57 • 2min
How to Create a Password That's Simple and Effective
38:36 • 2min
Hacker in the Fed: How to Save Our Banter
40:26 • 2min
The Importance of Intelligence Analysts in Cyber Cases
42:17 • 2min
The Importance of Security in Apple Devices
44:31 • 4min
The Melissa Virus
48:33 • 2min
The Anacornicova Virus
50:20 • 4min
How Many Times Has Hector Left His Own Name in the Episode?
53:58 • 2min
Naxo's Exciting Year
55:49 • 2min