Serious About Security

Keith Watson

Serious About Security

A Technology and Tech News podcast

Good podcast? Give it some love!
Serious About Security

Keith Watson

Serious About Security

Episodes
Serious About Security

Keith Watson

Serious About Security

A Technology and Tech News podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Serious About Security

Mark All
Search Episodes...
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesResearch shows how MacBook Webcams can spy on their users without warning by Ashkan Soltani and Timothy B.L
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesFor Nearly Two Decades the Nuclear Launch Code at All Minuteman Silos in the United States was 00000000 by
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesForward Secrecy (Wikipedia), Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Agai
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesOur Commitment to Protecting Your Information by Marissa Mayer (Yahoo!), After N.S.A. Disclosures, Yahoo Mo
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesFacebook Warns Users After Adobe Breach by Brian Krebs (Krebs on Security), Facebook mines Adobe breach dat
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAArticlesMeet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps by Dan Goodin (Ars Technica), badBIOS by Bruce Schneie
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesTen Steps You Can Take Right Now Against Internet Surveillance by Danny O’Brien (EFF)Major Corporations Fa
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesApple’s iCloud iConundrum - does convenience mean insecurity? by Chester Wisniewski (nakedsecurity), Cracki
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAArticlesIs Truecrypt Audited Yet?, The TrueCrypt Audit Project, New effort to fully audit TrueCrypt raises $16,000+ in a few short w
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesAttacking Tor: how the NSA targets users’ online anonymity by Bruce Schneier (The Guardian), NSA and GCHQ t
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesStudents Find Ways To Hack School-Issued iPads Within A Week by Sam H. Sanders (NPR), LAUSD halts home use
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesOracle Java fails at security in new and creative ways by Chester Wisniewski (nakedsecurity blog)Recycled
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesiPhone fingerprint scanner sparks privacy worries by Charlie Osborne (CNet), Fingerprint-Reading IPhone See
YoutubeShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesRevealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security by Jeff Larson (ProPublica), Nico
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesAnatomy of a brute force attack - how important is password complexity? by Paul Ducklin (nakedsecur
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesTo Our Customers by Silent Circle, Silent Circle follows Lavabit in shuttering encrypted e-mail by
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesiPhone Hacked in Under 60 Seconds Using Malicious Charger by David Gilbert (International Business
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPArticlesFeds Are Suspects in New Malware That Attacks Tor Anonymity by Kevin Poulsen (Wired), Freedom Hosting arrest and takedown linked to
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesPersonal data on 72,000 staff taken in University of Delaware hack by John Hawes (nakedsecurity blo
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesApple Developer Site Breached InfoSecurity Magazine, Apple takes Dev Center down for days, finally
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesAnatomy of a security hole - Google’s “Android Master Key” debacle explained by Paul Ducklin (naked
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesNintendo cracks after month-long, 15.5 million-strong hacker bombardment by Lisa Vaas (nakedsecurit
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAKeith Watson, CISSP-ISSAP, CISAToolsTorUsing Tor and other means to hide your location piques NSA’s interest in youVPN Services That Take Your Anonymity
Google+ HangoutShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPKeith Watson, CISSP-ISSAP, CISAArticlesImportant Message from Facebook’s White Hat Program by Facebook Security (Facebook), Facebook issue
Youtube videoShow NotesHostsPreston Wiley, CISSP, CCNAMike Hill, CISSPArticlesYahoo’s going to boot us off our deadbeat accounts, but who is going to grab them? by Lisa Vaas (nakedsecurity blog), Yahoo tries to
Rate
Contact This Podcast

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features