The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Yahoo Breached! 1 Billion accounts compromised. What does this mean for the future of Yahoo and security professionals? Evernote changes privacy policies so they can read your notes. You are now the product.
…
continue reading
1
Dr. Chaos Nov Podcast - Shopping and Elections
26:26
26:26
Spill senere
Spill senere
Lister
Lik
Likt
26:26
…
continue reading
1
Dr. Chaos Security Podcast – April 18th, 2016 – Dark Web
32:37
32:37
Spill senere
Spill senere
Lister
Lik
Likt
32:37
Dark Web expert Julien Savoie discusses what is the Dark Web, Dark Net markets, and gives insight into the current threats and technology that make up the Dark Web. Join us as Julien Savoie demystifies the Dark Web Guest: Julien Savoie Twitter: https://twitter.com/jzsavoie Hosts: Aamir Lakhani: https://twitter.com/aamirlakhani Anthony Giandomenico …
…
continue reading
1
Dr. Chaos Security Podcast - March 29th, 2016 - Exploit Kits
28:41
28:41
Spill senere
Spill senere
Lister
Lik
Likt
28:41
Dr. Chaos Security Blog: www.DrChaos.com Twitter: https://twitter.com/aamirlakhani Exploit Kits are tools attackers use to compromise and control systems. They are used to distribute malware such as remote access toolkits (RATs) and Ransomware such as CryptoLocker. They are used by criminals and groups from all over the world. Join my co-host Antho…
…
continue reading
1
Dr. Chaos Security Podcast - March 16th, 2016 - RSA Conference
34:23
34:23
Spill senere
Spill senere
Lister
Lik
Likt
34:23
Dr. Chaos Podcast March 16th, 2016 RSA 2016 and Security Thoughts RSA, Norse, Vectra Networks, and the insane vendor world. The Dr. Chaos Security Podcast with our guest Richard Henderson from Fortinet (https://twitter.com/trash__panda). Follow Aamir Lakhani on Twitter: https://twitter.com/aamirlakhani Follow Anthony Giandomenico on LinkedIn https:…
…
continue reading
1
Dr Chaos Security Podcast Feb 28th, 2016 - Reverse Malware Engineering with Packed Malware
33:09
33:09
Spill senere
Spill senere
Lister
Lik
Likt
33:09
UPX, ASPack, FSG, PECompact, these names represent some of the most common obfuscation and packing utilities used by malware authors to create packed malware. Attackers employ a variety of tactics, techniques and procedures in concealing their malicious activities in an attempt to evade detection. The audience will learn about the challenges of det…
…
continue reading
Threat Intelligence in the wake of Norse layoffs Dr. Chaos - Dark Security Blog http:www.DrChaos.com Follow Aamir Lakhani on Twitter: https://twitter.com/aamirlakhani Follow Anthony Giandomenico on LinkedIn https://www.linkedin.com/in/anthonygiandomenico
…
continue reading
Episode: Pilot 2016-01-18 Security Reports and Predications for 2016
…
continue reading