Security Now

Staffel 1

TV-G
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Many Professors use Security in Collage courses due to its in depth study of technology.

This series started as audio and later moved to video.

Security Now • Staffel 1 ansehen bei

300 Folgen

  • As the Worm Turns — the first Internet worms of 2005
    F1
    As the Worm Turns — the first Internet worms of 2005How a never-disclosed Windows vulnerability was quickly reverse-engineered from the patches to fix it and turned into more than 12 potent and damaging Internet worms in three days. What does this mean for the future of Internet security?
  • HoneyMonkeys
    F2
    HoneyMonkeysHow Microsoft's "HoneyMonkey" system works, how it finds malicious web sites before they find you, and what Microsoft is doing (and NOT doing) with this valuable security information it is now collecting.
  • NAT Routers as Firewalls
    F3
    NAT Routers as FirewallsMost people don't think of common NAT routers as hardware firewalls, but ANY NAT router inherently provides terrific security and protection against incoming malicious traffic. Learn how and why this is, and which default settings MUST be changed to lock down the security of your NAT router.
  • Personal Password Policy (1)
    F4
    Personal Password Policy (1)Everyone who uses web-based services such as eBay, Amazon, and Yahoo, needs to authenticate their identity with passwords. Password quality is important since easily guessable passwords can be easily defeated. Leo and I recap a bit from last week's program, then discuss passwords. We suggest an approach that anyone can use to easily create unbreakable passwords.
  • Personal Password Policy (2)
    F5
    Personal Password Policy (2)Our previous episode (#4), which discussed personal password policies, generated so much great listener feedback, thoughts, ideas, and reminders about things we didn't mention, that we decided to wrap up this important topic with a final episode to share listeners' ideas and to clarify some things we left unsaid.
  • Mechanical & Electromagnetic Information Leakage
    F6
    Mechanical & Electromagnetic Information LeakageTriggered by a recent report of three UC Berkeley researchers recovering text typed at a keyboard (any keyboard) after simply listening to ten minutes of typing, Leo and I discuss the weird realm of "alternative information leakage" — from CRT glowing, to radio emissions, to LEDs lamps on the front of network equipment . . . to a microphone listening to anyone typing.
  • SPYaWAREness
    F7
    SPYaWAREnessAny contemporary discussion of threats to Internet security must discuss the history, current situation, and future of spyware. Leo and I spend a little more time than usual covering many aspects of this important topic. DON'T MISS the Episode Notes Page for this episode!
  • Denial of Service (DoS) Attacks
    F8
    Denial of Service (DoS) AttacksDistributed Denial of Service (DDoS) attacks are occurring with ever-greater frequency every day. Although these damaging attacks are often used to extort high-profile gaming and gambling sites before major gambling events, attacks are also launched against individual users who do something to annoy "zombie fleet masters" while they are online. Some router and firewall vendors claim that their devices prevent DDoS attacks. Is that possible? What can be done to dodge the bullet of a DDoS attack launched against you while you're online?
  • Rootkits
    F9
    RootkitsThis week we discuss "rootkit technology". We examine what rootkits are, why they have suddenly become a problem, and how that problem is rapidly growing in severity. We also discuss their detection and removal and point listeners to some very effective free rootkit detection solutions.
  • Open Wireless Access Points
    F10
    Open Wireless Access PointsLeo and I examine the security and privacy considerations of using non-encrypted (i.e. 'Open') wireless access points at home and in public locations. We discuss the various ways of protecting privacy when untrusted strangers can 'sniff' the data traffic flowing to and from your online PC.
  • Bad WiFi Security (WEP and MAC address filtering)
    F11
    Bad WiFi Security (WEP and MAC address filtering)Leo and I answer some questions arising from last week's episode, then plow into a detailed discussion of the lack of security value of MAC address filtering, the futility of disabling SSID's for security, and the extremely poor security offered by the first-generation WEP encryption system.
  • Sony's
    F12
    Sony'sLeo and I discuss details and consequences of Sony Corporation's alarming "Rootkit" DRM (digital rights management) copy protection scheme. This poorly written software unnecessarily employs classic rootkit technology (see episode #9) to hide from its users after installation. It can not be uninstalled easily, it can be easily misused for malicious purposes, and it has been implicated in many repeated BSOD "blue screen of death" PC crashes.
  • Unbreakable WiFi Security
    F13
    Unbreakable WiFi SecurityLeo and I follow-up on last week's discussion of the Sony Rootkit debacle with the distressing news of "phoning home" (spyware) behavior from the Sony DRM software, and the rootkit's exploitation by a new malicious backdoor Trojan. We then return to complete our discussion of WiFi security, demystifying the many confusing flavors of WPA encryption and presenting several critical MUST DO tips for WPA users.
  • Virtual Private Networks (VPN): Theory
    F14
    Virtual Private Networks (VPN): TheoryLeo and I first follow-up on the past two episodes, discussing new developments in the continuing Sony Rootkit DRM drama, and clearing up some confusion over the crackability of WPA passphrases. Then, in this first of our two-part series on VPNs, we discuss the theory of VPN connections and tunnels, explaining how they work and why they represent such a terrific solution for anyone who needs security while they're away from home.
  • VPN Secure Tunneling Solutions
    F15
    VPN Secure Tunneling SolutionsLeo and I discuss the use of SSL and SSH encrypted tunneling for providing privacy and security whenever an insecure local network is being used — such as at an open WiFi hotspot or when using a hotel's network. These solutions are not transparent and tend to be configuration intensive. They also require the use of a "server" of some sort at the user's home or office. This makes these approaches less suitable for casual users, but offers a solution for the more technically inclined road warriors.
  • Listener feedback Q&A #1
    F16
    Listener feedback Q&A #1Leo and I discuss questions asked by listeners of our previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies we have previously discussed.
  • PPTP and IPSec VPN Technology
    F17
    PPTP and IPSec VPN TechnologyIn our continuing exploration of VPN technology for protecting network users on networks they don't control, Leo and I discuss the oldest "original" VPN protocols: Industry standard IPSec, and Microsoft's own PPTP and L2TP/IPSec. We examine and explain the trouble with interconnecting Windows machines to third-party VPN routers and examine the many reasons these older technologies are probably not optimal for on-the-go road warriors.
  • Hamachi Rocks!
    F18
    Hamachi Rocks!This week Leo and I discuss and describe the brand new, ready to emerge from a its long development beta phase, ultra-secure, lightweight, high-performance, highly-polished, multi-platform, peer-to-peer and FREE! personal virtual private networking system known as "Hamachi". After two solid weeks of testing and intense dialog with Hamachi's lead developer and designer, I have fully vetted the system's security architecture and have it running on many of my systems. While I am travelling to Toronto this week, Hamachi is keeping my roaming laptop securely and directly connected to all of my machines back home. Don't miss this one!
  • VPNs Three: Hamachi, iPig, and OpenVPN
    F19
    VPNs Three: Hamachi, iPig, and OpenVPNLeo and I wrap up our multi-week, in-depth coverage of PC VPN solutions by discussing some aftermath of the zero-configuration Hamachi system; introducing "iPig," a very appealing new zero-configuration VPN contender; and describing the many faces of OpenVPN, the "Swiss army knife" of VPN solutions.
  • A SERIOUS new Windows vulnerability — and Listener Q&A
    F20
    A SERIOUS new Windows vulnerability — and Listener Q&AOn December 28th a serious new Windows vulnerability has appeared and been immediately exploited by a growing number of malicious web sites to install malware. Many worse viruses and worms are expected soon. We start off discussing this and our show notes provides a quick necesary workaround until Microsoft provides a patch. Then we spend the next 45 minutes answering and discussing interesting listener questions.
  • The Windows MetaFile (WMF) Vulnerability
    F21
    The Windows MetaFile (WMF) VulnerabilityLeo and I discuss everything known about the first serious Windows security exploits of the New Year, caused by the Windows MetaFile (WMF) vulnerability. In our show's first guest appearance, we are joined by Ilfak Guilfanov, the developer of the wildly popular -- and very necessary -- temporary patch that was used by millions of users to secure Windows systems while the world waited for Microsoft to respond.
  • The Windows MetaFile Backdoor?
    F22
    The Windows MetaFile Backdoor?Leo and I carefully examine the operation of the recently patched Windows MetaFile vulnerability. I describe exactly how it works in an effort to explain why it doesn't have the feeling of another Microsoft "coding error". It has the feeling of something that Microsoft deliberately designed into Windows. Given the nature of what it is, this would make it a remote code execution "backdoor". We will likely never know if this was the case, but the forensic evidence appears to be quite compelling.
  • GRC's
    F23
    GRC'sLeo and I "close the backdoor" on the controversial Windows WMF Metafile image code execution (MICE) vulnerability. We discuss everything that's known about it, separate the facts from the spin, explain exactly which Windows versions are vulnerable and why, and introduce a new piece of GRC freeware: MouseTrap which determines whether any Windows or Linux/WINE system has 'MICE'.
  • Listener Feedback Q&A #3
    F24
    Listener Feedback Q&A #3Leo and I discuss questions asked by listeners of our previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world "application notes" for any of the security technologies we have previously discussed.
  • How the Internet Works (1)
    F25
    How the Internet Works (1)Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.
  • How the Internet Works (2)
    F26
    How the Internet Works (2)Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.
  • How Local Area Networks Work, Part 1
    F27
    How Local Area Networks Work, Part 1Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.
  • Listener Feedback Q&A #4
    F28
    Listener Feedback Q&A #4Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.
  • Ethernet Insecurity
    F29
    Ethernet InsecurityIn this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.
  • Cryptographic Issues
    F30
    Cryptographic IssuesThis week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.
  • Symmetric Stream Ciphers
    F31
    Symmetric Stream CiphersThis week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.
  • Listener Feedback Q&A #5
    F32
    Listener Feedback Q&A #5Episode 32 is our monthly question and answer session.
  • Symmetric Block Ciphers
    F33
    Symmetric Block CiphersPart three of Steve's overview of cryptography looks at symmetric block ciphers.
  • Public Key Cryptography
    F34
    Public Key CryptographyThis week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.
  • Cryptographic Hashes
    F35
    Cryptographic HashesThis week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.
  • Listener Feedback Q&A #6
    F36
    Listener Feedback Q&A #6As usual on every fourth episode, Steve answers listener questions.
  • Crypto Series Wrap-up
    F37
    Crypto Series Wrap-upWe wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.
  • Browser Security
    F38
    Browser SecurityWhy is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and why Java and Javascript are inherently more secure than ActiveScript and ActiveX.
  • Buffer Overruns
    F39
    Buffer OverrunsBuffer overflows... they're the most common kind of security flaw, but what are they and how do they happen? Finally, how can we protect ourselves from them? Steve explains all.
  • Listener Feedback Q&A #7
    F40
    Listener Feedback Q&A #7As he does every fourth episode, Steve answers your questions. But first, an update on some recent security news...
  • TrueCrypt
    F41
    TrueCryptThe ultimate encryption program, free, open source, strong, and flexible: Truecrypt.
  • NAT Traversal
    F42
    NAT TraversalSteve explains the clever technique that Skype and other programs use to end around NAT routers.
  • Open Ports
    F43
    Open PortsEver wonder what a port is? Steve explains what they are and what terms like "stealth ports" and "port sniffing mean." Leo reads a little poetry.
  • Listener Feedback Q&A #8
    F44
    Listener Feedback Q&A #8On this episode, one dozen questons and answers
  • The 'Hosts' File
    F45
    The 'Hosts' FileThis week Steve explains the mysterious HOSTS file - part of Windows, OS X, Linux, and many other operating systems. He talks about how malicious programs may misuse it, and how you can use it to protect yourself.
  • Router Logs
    F46
    Router LogsThis week Steve tells us what to do with the router logs. What a router can (and can't) tell you about your security situation?
  • Internet Weaponry
    F47
    Internet WeaponryThis week Steve tells us about distributed denial of service attacks and how hackers use IRC botnets to create them.
  • Listener Feedback Q&A #9
    F48
    Listener Feedback Q&A #9How big can a HOSTS file get? Does a firewall slow you down? A plan to fight phishers. All on this week's edition of Security Now! with Steve Gibson.
  • The NETSTAT Command
    F49
    The NETSTAT CommandHow can you tell what your computer is doing on the net? Netstat. This handy program comes with almost all operating systems. On Windows, click Start, then select Command Prompt from the Programs->Accessories menu. To run Netstat, type netstat at the command prompt. For more readable output type netstat -ab.
  • Virtual Machine History & Technology
    F50
    Virtual Machine History & TechnologyVirtualization, its history and uses in security.
  • Vista's Virgin Stack
    F51
    Vista's Virgin StackWill Windows Vista be secure? According to a new study from Symantec, the decision to re-write the networking stack from the ground up means it will be much less secure than XP.
  • A Busy Week for Security Troubles
    F52
    A Busy Week for Security TroublesSteve normally answers questions on shows divisible by four, but not this week. There's just too much security news including javascript exploits, Ebay gaming, and the sale of Hamachi.
  • VMware
    F53
    VMwareMore on Virtualization technology, with a special focus on VMWare's Virtual Appliances.
  • Blue Pill
    F54
    Blue PillThe Blue Pill demonstrates a serious security concern with the Hypervisor mode in Windows Vista. Steve discusses the threat and arguments against it.
  • Application Sandboxes
    F55
    Application SandboxesSandboxing your browser to keep your system secure.
  • Listener Feedback Q&A #10
    F56
    Listener Feedback Q&A #10Our regular session of questions and answers deals with Vista security, remote access, the HOSTS files, and Zone Alarm.
  • Virtual PC versus VMware
    F57
    Virtual PC versus VMwareSteve wraps up his rundown of Virtualization programs with a look at Microsoft's free Virtual PC.
  • Two New Critical Windows Problems
    F58
    Two New Critical Windows ProblemsGuest: Eric Sites, VP R&D Sunbelt Software Two serious Windows flaws have surfaced today. One, a zero-day exploit, makes it possible for any web site (or HTML email) to take over a Windows machine, even if it's been fully patched. The other is a file corruption error on Windows 2000 NTFS systems introduced by a Microsoft patch.
  • Comparing
    F59
    ComparingWe conclude our coverage of virtual machine software with a review of Parallels - the fastest of the VM programs.
  • Listener Feedback Q&A #11
    F60
    Listener Feedback Q&A #11
  • ISP Privacy and Security
    F61
    ISP Privacy and SecurityFirst a review of three more zero day exploits in Windows XP, then a look at what your ISP knows about you and how to protect your privacy.
  • Internet Proxies
    F62
    Internet ProxiesHow proxy servers work to both speed up access and protect users.
  • MojoPac
    F63
    MojoPacMojoPac software lets you put your entire Windows configuration on a thumbdrive or portable disk and take it with you anywhere. It works surprisingly well, but there are some caveats. Steve reviews.
  • Listener Feedback Q&A #12
    F64
    Listener Feedback Q&A #12
  • Why Is Security So Difficult?
    F65
    Why Is Security So Difficult?What makes it so hard to secure Windows? Steve says ultimate security is ultimately impossible.
  • Windows Vista Security
    F66
    Windows Vista SecurityWhy the 64-bit version of Windows is both more secure and less compatible. Steve explains why.
  • Kernel Patch Protection
    F67
    Kernel Patch ProtectionMicrosoft is touting PatchGuard, a new security feature in 64-bit versions of XP and Vista. Steve explains how easy it is to hack, and what it's really for if it's not for deterring hackers.
  • Listener Feedback Q&A #13
    F68
    Listener Feedback Q&A #13Our monthly question and answer session goes long - but there's lots of good information.
  • The Social Implications of Internet Anonymity
    F69
    The Social Implications of Internet AnonymityIs there such a thing as anonymity on the Internet? How important is it?
  • Achieving Internet Anonymity
    F70
    Achieving Internet AnonymityTwo interesting implementations of Internet anonymization: The Freenet Project for anonymously storing and transmitting files, and Tor, "the onion router" which can anonymize all your Internet accesses.
  • SecurAble
    F71
    SecurAbleSteve's latest free security application is called Securable. It's not quite ready yet, but Steve gives us a preview in this episode.
  • Listener Feedback Q&A #14
    F72
    Listener Feedback Q&A #14Our monthly question and answer segment covers TOR details, overheating hard drives, and what happens to your data when you die...
  • Digital Rights Management (DRM)
    F73
    Digital Rights Management (DRM)Steve and Leo survey the history and evolution of media property rights and the technologies used to enforce them as they prepare for next week's show: a look at AACS, the most pervasive and invasive system for digital rights management ever created.
  • Peter Gutmann on Vista DRM
    F74
    Peter Gutmann on Vista DRMSteve and Leo interview Peter Gutmann about his paper A Cost Analysis of Windows Vista Content Protection.
  • Vista DRM Wrap-Up & Announcing “SecurAble”
    F75
    Vista DRM Wrap-Up & Announcing “SecurAble”We wrap up our discussion of the premium content protection features in Vista and announce Steve's newest free security utility: Securable.
  • Listener Feedback Q&A #15
    F76
    Listener Feedback Q&A #15Our monthly question and answer segment covers DEP on the Mac, HD-DVD decryption, and email privacy...
  • Microsoft on Vista DRM
    F77
    Microsoft on Vista DRMSteve and Leo discuss Dave Marsh's response on behalf of Microsoft to Peter Gutmann's paper about Windows Vista Content Protection.
  • DEP in Depth
    F78
    DEP in DepthHardware Data Execution Protection is one of the best ways to protect your PC from hackers. Steve discusses how it works, how to turn it on, and the possible pitfalls of using it.
  • Backtracking Spoofed Spam eMail
    F79
    Backtracking Spoofed Spam eMailHow do spambots work, why do spammers need them, and the best way to block them and prevent spam.
  • Listener Feedback Q&A #16
    F80
    Listener Feedback Q&A #16Our monthly question and answer segment covers spam spoofing, VPN mysteries, and online backup security...
  • Hard Drive Unreliability
    F81
    Hard Drive UnreliabilityGoogle's massive study of hard drive reliability yields some surprising results. Read more at http://www.grc.com/sn/notes-081.htm
  • Cyber Warfare
    F82
    Cyber WarfareSteve comments on the Federal Computer Week article Cyber officials: Chinese hackers attack 'anything and everything'.
  • UAC in Depth
    F83
    UAC in DepthA closer look at Vista's User Access Control.
  • Listener Feedback Q&A #17
    F84
    Listener Feedback Q&A #17
  • Intro to Web Code Injection
    F85
    Intro to Web Code InjectionJikto is a Javascript tool that can take over your computer and use it to find sites with vulnerabilities. We describe it and the cross-site scripting flaws it looks for.
  • Cross-Site Scripting
    F86
    Cross-Site ScriptingUpdates on the Animated Cursor Vulnerability, a recommendation for security software from eEye, and how the Sony Reader works, plus an in depth discussion of scripting vulnerabilities.
  • SQL Injection Exploits
    F87
    SQL Injection ExploitsAnother common attack vector in web software is the SQL injection. Steve explains what it is and how it happens.
  • Listener Feedback Q&A #18
    F88
    Listener Feedback Q&A #18
  • Even More Badly Broken WEP
    F89
    Even More Badly Broken WEPWEP gets even more insecure with a new cracking technique that's 1000 times faster.
  • Multifactor Authentication
    F90
    Multifactor AuthenticationSteve explains the theory and practice of multifactor authentication which uses combinations of "something you know," "something you have," and "something you are" to provide stronger remote authentication than traditional, unreliable single-factor username and password authentication.
  • Marc Maiffret
    F91
    Marc MaiffretGuest: Marc Maiffret of eEye Digital Security Marc talks about Windows and Mac security, the coming threat from web applications, and eEye's free, all-in-one protection program, Blink Personal Edition.
  • Listener Feedback Q&A #19
    F92
    Listener Feedback Q&A #19
  • Microsoft Patent Wars
    F93
    Microsoft Patent WarsSteve looks at software patents and the Microsoft challenge to open source software from the point of view of a developer, patent holder, and expert witness in patent cases.
  • The Fourth Factor
    F94
    The Fourth FactorWe've already talked about the three factors of authentication: something you know (e.g. a password), something you have (a passcard), and something you are (a fingerprint). Now Steve talks about the fourth factor of authentication: someone you know, or who knows you.
  • OpenID
    F95
    OpenIDOpen ID, how it works and what it means to you (not having to remember so many passwords for starters).
  • Listener Feedback Q&A #20
    F96
    Listener Feedback Q&A #20Steve answers listener mail on subjects like authentication and more...
  • Operation: Bot Roast
    F97
    Operation: Bot RoastThe FBI says it has uncovered one million computers that are being used by hackers without their owners' knowledge. Today Steve talks about BotNets and the FBI's Operation Bot Roast.
  • Internet Identity Metasystems
    F98
    Internet Identity MetasystemsSteve continues our discussion of authentication with a look at Internet identity metasystems.
  • Trusted Platform Module (TPM)
    F99
    Trusted Platform Module (TPM)The Trusted Platform Module - a hardware solution to security now shipping on many computers.
  • Listener Feedback Q&A #21
    F100
    Listener Feedback Q&A #21Your questions, Steve's answers as we complete 100 consecutive weeks of shows!
  • Are You Human?
    F101
    Are You Human?Steve looks at Captcha and Re-Captcha - the pros and cons of trying to distinguish humans from robots, with a side look at Alan Turing and Jeff Hawkins's On Intelligence.
  • Listener Mailbag #1
    F102
    Listener Mailbag #1Our first mailbag episode with 20 questions and comments from our listeners.
  • PayPal Security Key
    F103
    PayPal Security KeyA closer look at the Paypal Security Key with Michael Vergara, Director of Account Protections at Paypal.
  • Listener Feedback Q&A #22
    F104
    Listener Feedback Q&A #22For 16Kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written - Spinrite 6.
  • Firewall LeakTesting
    F105
    Firewall LeakTestingSteve, the creator of the original leak test program, talks about leak testing and how hackers work to get around them.
  • Listener Mailbag #2
    F106
    Listener Mailbag #2Our second mailbag episode with a dozen questions and comments from our listeners.
  • PIP & Even More Perfect Passwords
    F107
    PIP & Even More Perfect PasswordsSteve looks at Verisign's Personal Identity Provider, an OpenID service that works with the Paypal token, and talks about updates to his Perfect Password page.
  • Listener Feedback #23
    F108
    Listener Feedback #23
  • GRC's eCommerce System
    F109
    GRC's eCommerce SystemSteve talks about developing his in-house E-Commerce system, and how he solved some issues other e-commerce system handle poorly. We also talk about the pleasures of assembly language programming.
  • Listener Feedback #24
    F110
    Listener Feedback #24Our regular mailbag episode with a dozen questions and comments from our listeners, plus an extra one for fun.
  • OpenID Precautions
    F111
    OpenID PrecautionsSteve responds to criticisms of the OpenID system and offers some issues to consider when you use it.
  • Listener Feedback #25
    F112
    Listener Feedback #25
  • Roaming Authentication
    F113
    Roaming AuthenticationHow do you solve the problem of secure access to data on the road? Steve shows how he tackled roaming authentication at grc.com and proposes a general solution for everyone.
  • Listener Feedback #26
    F114
    Listener Feedback #26Our regular mailbag episode with a dozen questions and comments from our listeners including our Great Idea of the Week...
  • Perfect Paper Passwords
    F115
    Perfect Paper PasswordsFollowing up on Episode 113, Roaming Authentication, Steve proposes a great way to strengthen remote access using Perfect Paper Passwords.
  • Listener Feedback #27
    F116
    Listener Feedback #27
  • Even More Perfect paper Passwords
    F117
    Even More Perfect paper PasswordsPerfect Paper Passwords version two!
  • Listener Feedback #28
    F118
    Listener Feedback #28
  • PayPal and DoubleClick
    F119
    PayPal and DoubleClickWhy does Paypal secretly send you through Doubleclick to get to some of its web pages? Steve explains how third-party cookies can violate your privacy and what to do about it.
  • Listener Feedback #29
    F120
    Listener Feedback #29
  • Is Privacy Dead?
    F121
    Is Privacy Dead?Is it possible to preserve your privacy in the digital age? It's certainly worth trying.
  • Listener Feedback #30
    F122
    Listener Feedback #30Our regular mailbag episode with a dozen questions and comments from our listeners...
  • Jungle Disk
    F123
    Jungle DiskSteve interviews Dave Wright of JungleDisk, a data storage optimization product for Amazon's S3...
  • Listener Feedback #31
    F124
    Listener Feedback #31
  • Symmetric Ciphers
    F125
    Symmetric CiphersSteve further elaborates on symmetric ciphers, the workhorses of encryption.
  • Listener Feedback #32
    F126
    Listener Feedback #32Steve discusses Treewalkdns.com, OpenDNS, Rijndael encryption Flash animation, Ironkey, and Opera mini security FAQ.
  • Corporate Security
    F127
    Corporate SecuritySteve talks about the challenges of corporate IT security policy and enforcement and the inherent tension between IT security staff and employees.
  • Listener Feedback #33
    F128
    Listener Feedback #33Steve talks about the remote code execution exploit of the Microsoft Windows TCP/IP vulnerability and answers your questions.
  • Windows SteadyState
    F129
    Windows SteadyStateSteve discusses how network administrators can protect their systems using Windows SteadyState.
  • Listener Feedback #34
    F130
    Listener Feedback #34
  • FREE CompuSec
    F131
    FREE CompuSecMicrosoft's Super Patch Tuesday, Macintosh updates, Adobe Acrobat exploit, Firefox patch, Vista SP-1, and more.
  • Listener Feedback #35
    F132
    Listener Feedback #35
  • TrueCrypt v5.0
    F133
    TrueCrypt v5.0Steve explores whole-drive encryption and details the release of TrueCrypt 5.0.
  • Listener Feedback #36
    F134
    Listener Feedback #36
  • IronKey
    F135
    IronKeyGuest: Dave Jevans, CEO of IronKey Steve interviews Dave Jevans of IronKey.
  • Listener Feedback #37
    F136
    Listener Feedback #37
  • RAM Hijacks
    F137
    RAM HijacksSteve breaks down the concept of dynamic RAM hijacking raised by the recent Princeton study.
  • Listener Feedback #38
    F138
    Listener Feedback #38
  • Network Congestion
    F139
    Network CongestionThe logistics of network congestion, network neutrality and prioritized packets.
  • Listener Feedback #39
    F140
    Listener Feedback #39
  • RSA Conference 2008
    F141
    RSA Conference 2008ClamAV security flaw, ICQ vulnerability, Opera and more.
  • Listener Feedback #40
    F142
    Listener Feedback #40
  • YubiKey
    F143
    YubiKeyLeo and I delve into the detailed operation of the YubiKey, the coolest new secure authentication device I discovered at the recent RSA Security Conference. Our special guest during the episode is Stina Ehrensvrd, CEO and Founder of Yubico, who describes the history and genesis of the YubiKey, and Yubico's plans for this cool new technology.
  • Listener Feedback #41
    F144
    Listener Feedback #41
  • Secunia's PSI
    F145
    Secunia's PSIThe free vulnerability scanner and update management tool Secunia PSI.
  • Listener Feedback #42
    F146
    Listener Feedback #42
  • Microsoft's Baseline Security Analyzer
    F147
    Microsoft's Baseline Security AnalyzerTwo useful but lesser-known Microsoft security utilities.
  • Listener Feedback #43
    F148
    Listener Feedback #43
  • ISP Betrayal
    F149
    ISP BetrayalAn overview of next-generation behavioral tracking and profiling systems.
  • Listener Feedback #44
    F150
    Listener Feedback #44
  • Phracking Phorm
    F151
    Phracking PhormHow third parties are gaining footholds in ISP facilities in order to access your data.
  • Listener Feedback #45
    F152
    Listener Feedback #45
  • DePhormed Politics
    F153
    DePhormed PoliticsMore on the privacy threat from the Phorm system.
  • Listener Feedback #46
    F154
    Listener Feedback #46
  • Bailiwicked Domain Attack
    F155
    Bailiwicked Domain AttackThe nuts and bolts of DNS and the DNS cache poisoning attacks.
  • Listener Feedback #47
    F156
    Listener Feedback #47
  • DNS — After the Patch
    F157
    DNS — After the PatchA follow-up on the serious, and somewhat still present, DNS protocol spoofability flaw.
  • Listener Feedback #48
    F158
    Listener Feedback #48
  • Vista Security Bypass
    F159
    Vista Security BypassBlack Hat Conference revelations, where Vista's security improvements fall short, and more.
  • Listener Feedback #49
    F160
    Listener Feedback #49
  • Google's Chrome
    F161
    Google's ChromeSteve drills down to determine the security levels offered by Google Chrome.
  • Listener Feedback #50
    F162
    Listener Feedback #50
  • GoogleUpdate & DNS Security
    F163
    GoogleUpdate & DNS SecurityThe benefits, challenges, and nuances of secure DNS.
  • SockStress
    F164
    SockStressSteve explains yet another security flaw in the TCP stack.
  • Listener Feedback #51
    F165
    Listener Feedback #51Airport security checks and balances, white knuckle Disney adventures, and the limits of spyware infestations?
  • Cross-Site Request Forgery
    F166
    Cross-Site Request ForgerySteve tells you why you must always explicitly log out from banking and other important sites.
  • Listener Feedback #52
    F167
    Listener Feedback #52
  • ClickJacking
    F168
    ClickJackingSteve discusses clickjacking, aka UI redressing, which tricks users into unintended web-based actions.
  • Listener Feedback #53
    F169
    Listener Feedback #53
  • The TKIP Hack
    F170
    The TKIP HackWhy you shouldn't worry about the TKIP crack.
  • Listener Feedback #54
    F171
    Listener Feedback #54
  • Sandboxie
    F172
    SandboxieSteve and Leo return to take a much closer look at "Sandboxie", an extremely useful, powerful, and highly recommended Windows security tool they first mentioned two years ago. This time, after interviewing Sandboxie's creator, Ronen Tzur, Steve explains why he is totally hooked and why Leo is wishing it was available for his Macs.
  • Listener Feedback #55
    F173
    Listener Feedback #55
  • Sandbox Limitations
    F174
    Sandbox LimitationsThe limitations of sandboxing in preventing the negative impacts of malware.
  • Listener Feedback #56
    F175
    Listener Feedback #56
  • Drop My Rights
    F176
    Drop My RightsHow to use Microsoft's little-known DropMyRights utility for safer browsing.
  • Breaking SSL, PDP-8's & UltraCapacitors
    F177
    Breaking SSL, PDP-8's & UltraCapacitorsBreaking SSL, PDP-8s, and Ultracapacitors. Full show notes are available at grc.com.
  • Listener Feedback #57
    F178
    Listener Feedback #57
  • Cracking Security Certificates
    F179
    Cracking Security CertificatesHow security certificates are created and signed, what they do for us, and the MD5 hash.
  • Listener Feedback #58
    F180
    Listener Feedback #58
  • Crypto Rehash
    F181
    Crypto RehashSteve gives an overview of the major concepts and components of encryption.
  • Listener Feedback #59
    F182
    Listener Feedback #59
  • Modes of Encryption
    F183
    Modes of EncryptionWindows Update, IE7 Problems, ActiveX and Windows 7 issues, SQL attacks, and more.
  • Listener Feedback #60
    F184
    Listener Feedback #60
  • Cryptographic HMACs
    F185
    Cryptographic HMACsMSFT Autorun updates, FreeBSD telnetd, IE7 critical exploit, Acrobat Reader, and more.
  • Listener Feedback #61
    F186
    Listener Feedback #61
  • Windows Autorun-around
    F187
    Windows Autorun-aroundPast and recent problems with Windows Autorun.
  • Listener Feedback #62
    F188
    Listener Feedback #62
  • Internet Explorer 8
    F189
    Internet Explorer 8Internet Explorer 8 speed benchmarks, cookies, Compatibly Mode, Smart Screen filter, DEP, and more.
  • Listener Feedback #63
    F190
    Listener Feedback #63
  • GhostNet
    F191
    GhostNetA look into GhostNet, the alleged Chinese cyber-spying network.
  • Listener Feedback #64
    F192
    Listener Feedback #64This mailbag episode discusses new Firefox plugins, Conficker, buffer overflow, and more.
  • Conficker
    F193
    ConfickerSteve analyzes Conficker, the sophisticated worm that has spread to more than 10 million PCs worldwide.
  • Listener Feedback #65
    F194
    Listener Feedback #65This mailbag episode covers Conficker, Windows process control, NeXT, Ironkey, and more.
  • The SSL/TLS Protocol
    F195
    The SSL/TLS ProtocolSteve describes the Internet's most-used security protocol, SSL, now evolved into TLS.
  • Listener Feedback #66
    F196
    Listener Feedback #66This mailbag episode includes SSL/TLS, worms-resistant NATs, PDF JavaScript, nuclear power stations running Windows, and more.
  • Windows 7 Security
    F197
    Windows 7 SecuritySecurity changes, additions and enhancements to Microsoft Windows 7.
  • Listener Feedback #67
    F198
    Listener Feedback #67This mailbag episode includes FASM, scripts, sockets, SSL/TLS, HTTPS, Windows 7's XP mode, and more.
  • The Geek Atlas, IPv6 & a non-VPN
    F199
    The Geek Atlas, IPv6 & a non-VPNA good book, the IPv6 protocol, and Steve's secure TCP idea that doesn't use a VPN tunnel.
  • Listener Feedback #68
    F200
    Listener Feedback #68In this mailbag episode we discuss IPv6, Non-VPNs, Microsoft ClickOnce, expired SSL certificates, and more.
  • SecureZIP
    F201
    SecureZIPThe operation, features, and security of PKWARE?s free SecureZIP file archiving and encrypting utility.
  • Listener Feedback #69
    F202
    Listener Feedback #69In this mailbag episode we discuss SecureZip, WPA/WPA2, home-grown VPNs, foreign ATMs, and more.
  • Boyer & Moore
    F203
    Boyer & MooreSteve tells of the Bob Boyer and J Strother Moore algorithm for finding a substring in a buffer.
  • Listener Feedback #70
    F204
    Listener Feedback #70
  • Lempel & Ziv
    F205
    Lempel & ZivAn examination of Lempel-Ziv data compression, one of the most prevalent computer algorithms of all time.
  • Mega Security News Update
    F206
    Mega Security News UpdateSecurity updates in Windows Office, IAS, Virtual PC, Virtual Server, msvid control, and more.
  • Listener Feedback #71
    F207
    Listener Feedback #71Steve answers questions on AES-256, iPhone security, TrueCrypt, Firefox privacy, and more.
  • Listener Feedback #72
    F208
    Listener Feedback #72Steve answers questions on SSL encryption, 3g security, Trojans, VPNs as infection vectors, and more.
  • Vitamin D
    F209
    Vitamin DA rare off-topic discussion about Steve's research into vitamin D.
  • Listener Feedback #73
    F210
    Listener Feedback #73Security news and listeners' questions...
  • Voting Machine Hacking
    F211
    Voting Machine HackingSteve covers the security implications of electronic voting machines.
  • Listener Feedback #74
    F212
    Listener Feedback #74Steve answers questions on iPIG VPN, Flash cookies, firewalls, parents' passwords, and more.
  • Cracking GSM Cellphones
    F213
    Cracking GSM CellphonesThe inherent insecurities of GSM, the pseudo-random bitstream cipher protecting data on billions of phones.
  • Listener Feedback #75
    F214
    Listener Feedback #75Steve addresses feedback on GSM security, cookies, router admin passwords, proxy servers, and more.
  • Security Maxims
    F215
    Security MaximsSteve and Leo talk about various security maxims, what they mean, why you should follow them, and more.
  • Listener Feedback #76
    F216
    Listener Feedback #76Leo and Steve talk about Microsoft Security Essentials, your questions, and more.
  • The Fundamentally Broken Browser Model
    F217
    The Fundamentally Broken Browser ModelHow SSLs can be spoofed in man-in-the-middle attacks.
  • Listener Feedback #77
    F218
    Listener Feedback #77
  • Badly Broken Browsing
    F219
    Badly Broken BrowsingWhy patches are impossible, the Total (In)security virus, and why writing software shouldn't be too easy.
  • Listener Feedback #78
    F220
    Listener Feedback #78
  • The Oxymoron of “JavaScript Security”
    F221
    The Oxymoron of “JavaScript Security”The problem with Javascript and security. Guest John Graham-Cumming says it's the "elephant in your browser."
  • Listener Feedback #79
    F222
    Listener Feedback #79We've got the latest security news, including an SSL hack, plus eight great questions from you and Steve's answers...
  • A security vulnerability in SSL
    F223
    A security vulnerability in SSLSteve explains how a serious exploit in SSL works.
  • Listener Feedback #80
    F224
    Listener Feedback #80Security news, including the NSA's contributions to Windows 7, iPhone bot nets, plus Steve answers your questions.
  • “Same Origin” Troubles
    F225
    “Same Origin” TroublesApple fixes security flaws, Ford SYNC SDK, black screen of death, same origin troubles, and more.
  • Listener Feedback #130
    F226
    Listener Feedback #130Digital voting goes open source, patch Tuesday news, and Steve answers your questions.
  • Cyberwarfare
    F227
    CyberwarfareSteve covers what may be the future of conflict, Cyberwarfare.
  • Listener Feedback #82
    F228
    Listener Feedback #82Steve responds to questions covering Skype spam, SSL cracking, unencrypted UAV video feeds, free SSL certificates, and more.
  • The Rational Rejection of Security Advice
    F229
    The Rational Rejection of Security AdviceA hard look at the costs and benefits of following all security advice.
  • Listener Feedback #83
    F230
    Listener Feedback #83This week's questions cover packet flow, hijacking DNS queries, router DNS, Patch Tuesday, and more.
  • Mega Security Update & CES Observations
    F231
    Mega Security Update & CES ObservationsSteve catches up with a mega security update, then gives us some of his favorite (wacky) products from CES.
  • Listener Feedback #84
    F232
    Listener Feedback #84Steve answers listener questions about live Linux CDs, TrueCrypt RAM encryption, resetting Thomson modem passwords, and more.
  • Let's Design a Computer (part 1)
    F233
    Let's Design a Computer (part 1)Steve explains how computers work by designing one from first principles.
  • Listener Feedback #85
    F234
    Listener Feedback #85Internet Explorer as a file system, using Live CDs for security, and Steve takes on the iPad...
  • Machine Language
    F235
    Machine LanguageFor 16kpbs versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
  • Listener Feedback #86
    F236
    Listener Feedback #86More flash vulnerabilities, security updates, fake security software, Steve answers your questions, and more.
  • Indirection: The Power of Pointers
    F237
    Indirection: The Power of PointersAn introduction to the use of "indirection" in computer science, security news, and more.
  • Listener Feedback #87
    F238
    Listener Feedback #87Steve answers your questions about webcam privacy, unencrypted data in ram, and more.
  • Stacks, Registers & Recursion
    F239
    Stacks, Registers & RecursionHow stacks, registers and recursion are interrelated, the latest security news, and more.
  • Listener Feedback #88
    F240
    Listener Feedback #88Patch Tuesday, Opera vulnerabilities, the RSA conference, RealDVD, and more.
  • Hardware Interrupts
    F241
    Hardware InterruptsSteve continues his talk on the foundational technologies of computing. This week: how computers do more than one thing at a time using interrupts.
  • Listener Feedback #89
    F242
    Listener Feedback #89Critical updates from Microsoft and Apple, good news for Gmail security, and a warning for nudists...
  • State Subversion of SSL
    F243
    State Subversion of SSLFirefox updates, vulnerabilities in .PDFs, Steve's iPad review, SSL/TLS, and more.
  • Listener Feedback #90
    F244
    Listener Feedback #90Microsoft security updates, the FCC's jurisdiction on bandwidth shaping, Java flaws, iPhone OS security, the state of SSL security, and more.
  • The Security of Open vs CLosed
    F245
    The Security of Open vs CLosedSteve and Leo seriously examine the proven comparative security of open versus closed source and development software, and open versus closed execution platforms.
  • Listener Feedback #91
    F246
    Listener Feedback #91Stolen Google source code, GSM hacked, photocopy machine hard drive security, your questions, and more.
  • The “Multi”-verse
    F247
    The “Multi”-verseOpera vulnerabilities, Adobe PDF insecurities, malware from the US Treasury, Steve joins Twitter, and more.
  • The Portable Dog Killer
    F248
    The Portable Dog KillerPatch tuesday, laptop camera surveillance, Yahoo! messenger worm, and more.
  • Listener Feedback #92
    F249
    Listener Feedback #92Shockwave issues, Mozilla's plug-in check, weaponized email, hacking cars, your questions, and more.
  • Operating Systems
    F250
    Operating SystemsManually updating IrfanView and Free Download Manager, Google wifi litigation, how operating systems work, and more.
  • Listener Feedback #93
    F251
    Listener Feedback #93Tabnabbing, Adobe security rumors, iPad data plan changes, your questions, and more.
  • RISCy Business
    F252
    RISCy BusinessAdobe zero-day, overwrought iPad security news, the evolution of computing architectures, and more.
  • Listener Feedback #94
    F253
    Listener Feedback #94Mac update, AT&T hijinks, another zero-day vulnerability from Microsoft, Adobe delays pdf fix, your questions, and more.
  • What We'll Do for Speed
    F254
    What We'll Do for SpeedThe 25 year legacy of unbelievably complex technologies used in microprocessors to maximize performance.
  • Listener Feedback #95
    F255
    Listener Feedback #95Out of cycle Acrobat and Reader updates, Firefox improvements, flawed SSL study, internet kill switch, your questions, and more.
  • LastPass
    F256
    LastPassSteve thoroughly evaluates LastPass, explains why high-security passwords are necessary, and tells us how LastPass makes storing those passwords secure.
  • Listener Feedback #96
    F257
    Listener Feedback #96Chrome update, ClearCloud DNS, Microsoft and Russian camaraderie, LastPass, your questions, and more.
  • Five Years of Vulnerabilities
    F258
    Five Years of VulnerabilitiesWindows shell worm in the wild, Security Essentials 2.0 beta, Secunia's 5-year analysis, and more.
  • Listener Feedback #97
    F259
    Listener Feedback #97Firefox mega security update, WPA2 broken?, .LNK viruses in the wild, infected Dell motherboards, your questions and more.
  • DNS Rebinding
    F260
    DNS RebindingWindows .LNK vulnerability fixed, Google's WiFi "overcollection" in the UK, news from Blackhat, DNS rebinding, and more.
  • Listener Feedback #98
    F261
    Listener Feedback #98PayPal discontinues their virtual credit card service, RIM placing servers in Saudi Arabia, Firefox v4 updates silently, your questions and more.
  • Strict Transport Security
    F262
    Strict Transport SecurityApple fixes the jailbreak hole, trojans on Android, Strict Transport Security (STS), and more.
  • Listener Feedback #99
    F263
    Listener Feedback #99Out-Of-Cycle update from Adobe, Apple security update, binary planting, Spanair 2008 crash, your questions, and more.
  • Side-Channel Privacy Leakage
    F264
    Side-Channel Privacy LeakageConsequences of the web not being designed for privacy, including non-consensual user tracking.
  • Listener Feedback #100
    F265
    Listener Feedback #100Fix-It for .dll hijack, danger from applications changing the working directory, first successful 64-bit Windows root kit, your questions, and more.
  • Inside OAuth
    F266
    Inside OAuthMicrosoft's 2nd Tuesday update, new 0-day vulnerabilities in Adobe, Firefox fixes, "Stuxnet" worm, delegated access through OAuth, and more.
  • Listener Feedback #101
    F267
    Listener Feedback #101Flash update, Microsoft ASP .NET problem, HDCP master key leak, Twitter "OnMouseover" XSS flaw, your questions, and more.
  • CryptoSystem Backdoors
    F268
    CryptoSystem BackdoorsNew 0-day for Windows, HDCP decryption software, Stuxnet & Iran, COICA, cryptography systems and backdoors for law enforcement, and more.
  • Listener Feedback #102
    F269
    Listener Feedback #102Adobe Acrobat patched, RIM and India going 'round & 'round, Comcast VS. Bot, and more.
  • The Evercookie
    F270
    The EvercookieMicrosoft breaks Patch Tuesday update record, Facebook adds OTPs and remote signout, What is The Evercookie?, and more.
  • Listener Feedback #103
    F271
    Listener Feedback #103Microsoft reports on Java exploits, new Adobe Reader will sandbox, feedback from MSRT, your questions, and more.
  • Firesheep
    F272
    FiresheepMozilla and Real Player updates, Firefox 0-day, Wall Street Journal tracking and privacy series, session hijacking for the rest of us, and more.
  • Listener Feedback #104 & The FireStorm
    F273
    Listener Feedback #104 & The FireStormFiresheep firestorm, Flash 0-day exploit in the wild, another iPhone lock screen bypass, your questions, and more.
  • Benchmarking DNS
    F274
    Benchmarking DNSSecond Tuesday updates, critical Outlook fix, Android risks, Google expands "bug bounty", GRC's DNS Benchmark, and more.
  • Listener Feedback #105
    F275
    Listener Feedback #105Big Apple update, IE6/7 0-day unpatched, infected Chinese cell phones, Stuxnet's probable target, your questions, and more.
  • Testing DNS Spoofability
    F276
    Testing DNS SpoofabilitySafari update, HTTPS Everywhere, FBI wants to wiretap the Internet, comprehensive DNS spoofability test, and more.
  • Listener Feedback #106
    F277
    Listener Feedback #106New WIndows kernel vulnerability, Wikileaks siprnet, Vitamin D findings, your questions, and more.
  • Tag Me (with RFID)
    F278
    Tag Me (with RFID)Windows 7 SP1 reaches RC level, Google Chrome v8.0 released, What is SHIELD?, How to keep track of people using RFID tags, and more.
  • Listener Feedback #107
    F279
    Listener Feedback #107Microsoft's December security updates, backdoor in BSD, WikiLeaks DDoS, your questions, and more.
  • Bluetooth
    F280
    BluetoothOpenBSD discredits backdoor, weak net neutrality, compromised site warnings from Google, Bluetooth in depth, and more.
  • The Portable Dog Killer, Encore
    F281
    The Portable Dog Killer, EncoreAn encore presentation of an enlightening story from Steve's past.
  • Listener Feedback #108
    F282
    Listener Feedback #108Microsoft acknowledges IE problem, hacking GSM phones, Stuxnet update, your questions, and more.
  • Bluetooth Hacking
    F283
    Bluetooth HackingCross Fuzz, warrantless cell phone searches, Obama's "Unified Internet Identity", flavors of bluetooth hacking, and more.
  • Listener Feedback #109
    F284
    Listener Feedback #109Israel and US teamed up on Stuxnet, global IPv6 test coming, your questions, and more.
  • Fuzzy Browsers
    F285
    Fuzzy BrowsersGoogle awards first "Elite" security award, Facebook SSL and HTTPS, unprivileged work e-mail, stress testing browsers, and more.
  • Listener Feedback #110
    F286
    Listener Feedback #110Gingerbread data disclosure vulnerability, SourceForge hack, IPv4 depletion, zero-day attacks no more, your questions, and more.
  • BitCoin CryptoCurrency
    F287
    BitCoin CryptoCurrencyFirefox adds "Do Not Track", Verizon alters web content, McAfee on Mobile Malware, BitCoin, and more.
  • Listener Feedback #111
    F288
    Listener Feedback #111A critical Microsoft vulnerability, The differences between open and closed source software, A number of questions around BitCoin, and more.
  • Proxied Surfing
    F289
    Proxied SurfingAfter catching up with the week's security updates and other security-related news, Steve and Leo discuss the many modes of operation of "Proxied Web Surfing" which are used to bypass firewalls and Internet filters, aid free speech, and alter the contents of web pages retrieved from the Internet.
  • Listener Feedback #112
    F290
    Listener Feedback #112Windows 7 service pack 1 is out, Apple's Thunderbolt security, Facebook's HTTPS security turns itself off, and more.
  • Stuxnet
    F291
    StuxnetThe anatomy of Stuxnet, plus Pwn2Own is underway meaning updates from Apple, Google, Microsoft, and more.
  • Listener Feedback #113
    F292
    Listener Feedback #113The consequences of Pwn2Own, Issues around the Japanese earthquake, reverse DNS, and more.
  • IE9
    F293
    IE9Internet Explorer 9, RSA Security comprimised, India versus Blackberry, and more.
  • Listener Feedback #114
    F294
    Listener Feedback #114Fraudulent SSL certificates, RSA SecurID breach update, Real Player vulnerability, your questions, and more.
  • The Comodo SSL Breach
    F295
    The Comodo SSL BreachRSA SecurID Break-in, YubiHSM, Epsilon security breach, DNT gets traction, and more.
  • Listener Feedback #115
    F296
    Listener Feedback #11564 fixes from Microsoft, Another Flash exploit, Wordpress hacked, your questions, and more.
  • Pass-Sentences??
    F297
    Pass-Sentences??iOS location tracking, Pass phrase security, Dropbox authentication, and more.
  • Listener Feedback #116
    F298
    Listener Feedback #116Sony Playstation Network breach, Mobile tracking, Disc Drive steganography, your emails, and more.
  • Going Random (1)
    F299
    Going Random (1)Firefox and Chrome updates, Apple tracks differently, Bin Laden's security, relying on randomness, and more.
  • Listener Feedback #117
    F300
    Listener Feedback #117Reasons you should change your Facebook password right now, Zero Day, a new Do Not Track bill, and more.

Get Plex on Your Devices

Free on 20+ platforms. Pick yours.
See all supported devices →

Get Plex on Your Devices

Free on 20+ platforms. Pick yours.
See all supported devices →
    Where to Watch Security Now • Staffel 1 Online - Plex