Defensive Security Podcast

Information Security Podcast

Skip to content
  • About
  • Resources
    • Forensics
      • Security News
    • Penetration Testing
    • Incident Response
    • Useful Sites
    • Malware Analysis
    • Recommended Books
    • Industry Reports
    • Vulnerabilities
    • Essential Reading
    • Malware Tools
    • Security Podcasts
    • Best Practices
  • Podcast Episodes
  • iTunes
  • Stitcher
  • Donate!
  • Store
  • Entering The Infosec Biz

Defensive Security Podcast Episode 38

October 14, 2013Podcastandroid, dns, infosec, iOS, security, watering holejb
https://media.blubrry.com/1463551/content.blubrry.com/1463551/defensive-security-podcast-episode-38.mp3

Podcast: Play in new window | Download | Embed

Subscribe: RSS

Study on personality traits and susceptibility to phishing: http://precog.iiitd.edu.in/events/psosm2013/9psosm5-halevi.pdf

Android is apparently more secure than iOS: http://news.cnet.com/8301-1009_3-57606481-83/googles-schmidt-android-more-secure-than-the-iphone

Don’t forget to factor malicious BHO’s into your plans: http://www.networkworld.com/news/2013/092613-malicious-browser-extensions-pose-a-274218.html?source=nww_rss

More registrar attacks: http://www.networkworld.com/news/2013/100913-network-solutions-investigating-dns-274652.html

Insider threats are number 1, but I am skeptical:http://www.networkworld.com/news/2013/100813-report-indicates-insider-threats-leading-274649.html 

Watering holes: http://threatpost.com/oil-energy-watering-hole-attacks-could-be-tied-to-dol-attacks

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Related

Pages: 1 2

Post navigation

← Defensive Security Podcast Episode 37 Defensive Security Podcast Episode 39 →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Support The Podcast

Defensive Security Store

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Tags

  • adobe
  • Anthem
  • Anti Virus
  • APT
  • breach
  • Cold Fusion
  • cyber insurance
  • data breach
  • DBIR
  • DDOS
  • dns
  • Equifax
  • exploit
  • FTC
  • hacking
  • Hacking Team
  • heartbleed
  • HIPAA
  • Home Depot
  • information security
  • infosec
  • insider threat
  • Java
  • malvertising
  • malware
  • microsoft
  • NotPetya
  • NSA
  • OPM
  • passwords
  • PCI
  • phishing
  • POS
  • ransomeware
  • Ransomware
  • security
  • Security awareness training
  • social engineering
  • Sony
  • Syrian Electronic Army
  • Target
  • threat intelligence
  • vulnerabilities
  • wannacry
  • Yahoo
Proudly powered by WordPress