Podcasts about Conficker

Computer worm

  • 28PODCASTS
  • 51EPISODES
  • 48mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 22, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Conficker

Latest podcast episodes about Conficker

Percepticon.de
39 Ein falscher Click /invite Eva Wolfangel

Percepticon.de

Play Episode Listen Later Jul 22, 2023 50:54


Cyberkriminalität hat in den letzten Jahren stark zugenommen. Ob Datenklau, Identitätsdiebstahl, Cybermobbing oder Betrug – die Bedrohungen im digitalen Raum sind vielfältig und betreffen jeden, der online unterwegs ist. Genau darum geht es im neuen Buch von Eva Wolfangel - Ein falscher Click. Hackern auf der Spur. Warum der Cyberkrieg uns alle betrifft. Das Buch ist eine klasse Einführung in die Geschichte von Cyberkriminalität und staatlichem Hacking. Das Buch ist voller spannender Fallstudien und Fälle über Schadsoftware und Cyberkriminalität: Zeus/GameoverZeus, TrickBot, StormWorm, Conficker, Industroyer,, Stuxnet, Duqu, Flame, NotPetya, Wannacry, die Shadowbroker leaks, der Lazarus Bangladesh heist, Triton, die Causa Lilith Wittmann und die eID App und Pegasus kommen vor. Ich spreche darüber mit Eva und wir picken uns ein paar spannende Fälle heraus. Es geht u. A. um die Entstehung und Professionalisierung von Cyberkriminalität, Phishing und Social Engineering. Es geht um die cyberkriminellen Raubzüge von Nordkorea mit seiner Lazarus Gruppe, aber auch um andere staatliche Cyber-Operationen wie Stuxnet und WannaCry. Danach reden wir darüber, warum rein technische IT-Sicherheit oft scheitert, nämlich weil sie den Faktor Mensch nicht richtig versteht. Es geht um „usable security" und „user awareness" sowie Vertrauen und ethisches Hacken. Danke an Eva für das tolle Buch und die Aufnahme! Shownotes Eva Wolfangels Website: https://ewo.name/ Buch: Ein falscher Click: https://www.penguinrandomhouse.de/Paperback/Ein-falscher-Klick/Eva-Wolfangel/Penguin/e602114.rhd Eric Rosenbach, https://www.hks.harvard.edu/faculty/eric-rosenbach Lazarus Group: https://en.wikipedia.org/wiki/Lazarus_Group Prof. Angela Sasse: https://informatik.rub.de/sasse/ Windows 11 Pass keys, https://www.heise.de/news/Passwortlose-Zukunft-Passkeys-ziehen-in-Windows-Vorschau-ein-9199679.html Timecodes 00:03:50 Message des Buchs + Motivation 00:06:41 Phishing & Social Engineering 00:10:27 Nordkorea, Lazarus & 2016 SWIFT Heist 00:14:00 Stuxnet 00:22:05 Ursprünge und Professionalisierung von Cybercrime  00:30:00  Gentlemen Agreements und kriminelle Energie 00:32:50 „usable security“, „user awareness“ und der Faktor Mensch 00:43:00 Praktische IT-Sicherheitstips vs. „Social engineering“ 00:48:08 Vertrauen & Zero Trust & Ethisches Hacken  Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter. Dieser Cyber Security Podcast erscheint auf iTunes, Spotify, PocketCast, Stitcher oder via RSS Feed. Sound & Copyright Modem Sound, Creative Commons. © Vint Cerf, "Internet shows up in December 1975", in: IEEE Computer Society, Computing Conversations: Vint Cerf on the History of Packets, December 2012. © L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998. © Barack Obama, Cybersecurity and Consumer Protection Summit Address, 13 February 2015, Stanford University, Stanford, CA. © Michael Hayden, "We kill people based on meta-data," in: The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating the NSA, April 2014. © Bruce Schneier, "Complexity is the enemy of security, in IEEE Computer Society, Bruce Schneier: Building Cryptographic Systems, March 2016. Beats, Bass & Music created with Apple GarageBand © Tagesthemen 10.6.2013 https://www.youtube.com/watch?v=PfaFf6EvP3I © CBS 60 Minutes, Duqu, Liam O Murchu of Symantec: https://www.youtube.com/watch?v=XpdazjRx3NM © CGTN, Huawei: https://www.youtube.com/watch?v=LRGXPVw0LIo © Miko Hypnosen, Ted, : https://www.youtube.com/watch?v=9CqVYUOjHLw]

The Cisco Learning Network
The Evolution of Cyber Attacks with James Risler

The Cisco Learning Network

Play Episode Listen Later Sep 30, 2022 42:27


Denial of Service attacks. Spoofing attacks. Reflection Amplification attacks. Malware, Reconnaisance, Conficker, WannaCry… What are all of these terms, and why are they important to know? Because they can mean the difference between a secure and an insecure network environment. Cybersecurity expert James Risler is back on the podcast to walk you through what all of these terms mean, and how to best defend against them and so many more threats that are out there.

Man Behind The Machine
12202021 : Supply Chain + Metaverse + 2021 electronic gifts : 80s VR Atari

Man Behind The Machine

Play Episode Listen Later Dec 20, 2021 113:48


12202021 : Supply Chain + Metaverse + 2021 electronic gifts ………. Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets...

Stream of Random
STREs1e293 spook

Stream of Random

Play Episode Listen Later Mar 27, 2021 93:27


Afghanistan, Agent, Agriculture, Agro, Aid, Air borne, Air Marshal, Airplane, Airport, Al Qaeda, Al-Shabaab, Ammonium nitrate, AMTRAK, Anthrax, Antiviral, Artistic Assassins, Assassination, Attack, Authorities, Avalanche, Avian, Bacteria, BART, Biological, Biological event, Biological weapon, Black out, Blister agent, Blizzard, Body scanner, Bomb squad, Bomb threat, Border, Border Patrol, Border Protection, Botnet, Breach, Bridge, Brown out, Brush fire, Brute forcing, Burn, Burst, Cain and abel, Cancelled, Car bomb, Cartel, Center for Disease Control, Chemical, Chemical agent, Chemical burn, Chemical fire, Chemical spill, Chemical weapon, China, Ciudad Juarez, Closure, Cloud, Coast Guard, Cocaine, Collapse, Colombia, Computer infrastructure, Conficker, Consular, Contamination, Conventional weapon, Cops, Crash, Crest, Critical infrastructure, Customs, Cyber attack, Cyber Command, Cyber security, Cyber terror, DDOS, Deaths, Decapitated, Delays, Denial of service, Dirty bomb, Disaster, Disaster assistance, Disaster management, Dock, Domestic security, Drill, Drug, Drug Administration, Drug cartel, Drug trade, Drug war, E. Coli, Earthquake, Ebola, Eco terrorism, El Paso, Electric, Emergency, Emergency management, Emergency response, Enriched, Epidemic, Erosion, Evacuation, Evacuation, Execution, Exercise, Explosion, Exposure, Extreme weather, --- Send in a voice message: https://anchor.fm/stre/message

Man Behind The Machine
Stuxnet, Edward Snowden, Monarchy, Internet Bulk Collection Cloud Y2K Q

Man Behind The Machine

Play Episode Listen Later Jun 20, 2020 41:51


On. This episode : Stuxnet, Edward Snowden, Monarchy, Internet + Bulk Collection Can you name a famous computer virus ? Conficker. , aliases, including Downup, Downadup, and Kido is a worm . ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova

Man Behind The Machine
Read/Write/Execute : Snowden, Wikileaks, Data Dumping 2004

Man Behind The Machine

Play Episode Listen Later Jun 6, 2020 18:24


Man looks into Read/Write/Execute : Snowden, Wikileaks, Data Dumping and COVID-19....... . Leave a voicemail at 313-MAN-0231 Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets... Keywords: how to guides, computer security, blogging, seo homeforgeeks.com one stop blog for all your technology needs related to Mobiles,Android,Wordpress,make money online,Ethical hacking. Keywords: android, symbian, hacking, ethical hacking plynt.com Plynt application penetration tests and security certification program assures that your application is safe against known common attacks. With experi... Keywords: penetration, testing, application, security

Man Behind The Machine
Vault: Epic Shelter China Dell .... Edward Snowden Tokyo (P2)

Man Behind The Machine

Play Episode Listen Later May 3, 2020 31:30


In this episode the analysis of Snowden's new book. 1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES I'm trying to have my coffee and unwittingly having to troubleshoot Windows XP + 7 issues . Leave a voicemail at 313-MAN-0231 Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets... Keywords: how to guides, computer security, blogging, seo homeforgeeks.com one stop blog for all your technology needs related to Mobiles,Android,Wordpress,make money online,Ethical hacking. Keywords: android, symbian, hacking, ethical hacking plynt.com Plynt application penetration tests and security certification program assures that your application is safe against known common attacks. With experi... Keywords: penetration, testing, application, security

Man Behind The Machine
Windows XP + 7 + 10 cybersecurity, troubleshooting, SP1, end of life cycle

Man Behind The Machine

Play Episode Listen Later Apr 19, 2020 32:33


I'm trying to have my coffee and unwittingly having to troubleshoot Windows XP + 7 issues . Leave a voicemail at 313-MAN-0231 Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets... Keywords: how to guides, computer security, blogging, seo homeforgeeks.com one stop blog for all your technology needs related to Mobiles,Android,Wordpress,make money online,Ethical hacking. Keywords: android, symbian, hacking, ethical hacking plynt.com Plynt application penetration tests and security certification program assures that your application is safe against known common attacks. With experi... Keywords: penetration, testing, application, security

Man Behind The Machine
COVID-19, A.I., Supercomputers, Snowden, 313-MAN-0231

Man Behind The Machine

Play Episode Listen Later Apr 9, 2020 49:12


Latest news in Computational Medicine to treat COVID-19, mapping the virus to its core, scams asking people to download a pkg to use computers processing power to help scientists cure COVID-19: I'm trying to have my coffee and unwittingly having to troubleshoot Windows XP + 7 issues . Leave a voicemail at 313-MAN-0231 Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets... Keywords: how to guides, computer security, blogging, seo homeforgeeks.com one stop blog for all your technology needs related to Mobiles,Android,Wordpress,make money online,Ethical hacking. Keywords: android, symbian, hacking, ethical hacking plynt.com Plynt application penetration tests and security certification program assures that your application is safe against known common attacks. With experi... Keywords: penetration, testing, application, security

Man Behind The Machine
Vault 7: Snowden, 1983-1992 and The Invisible Wall

Man Behind The Machine

Play Episode Listen Later Apr 3, 2020 70:09


17 million results examined : 1983-1992 : The Invisible Wall and Vault 7, Espionage, fake news, Man in search of the truth over Chinese Espionage: Virus, Bio Warfare, Masks watch out for these Coronavirus websites and scams, China spreading rumors about COVID-19, hackers, Taiwan, US, Chinese working 24/7 to spread disinformation, State Department employees test positive for Coronavirus, ebola, Netflix to slow down streaming to stop the internet from breaking, leave a voicemail at 313-MAN-0231........ 寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件I'm trying to have my coffee and unwittingly having to troubleshoot Windows XP + 7 issues . Leave a voicemail at 313-MAN-0231 Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course hackerbox.org Hackers Home Page for FREE Geeky Image Submission and Tools Conficker. First discovered in 2008, Conficker, which had many aliases, including Downup, Downadup, and Kido is a worm that targets Windows operating systems. ... ILOVEYOU. ... Morris Worm. ... Mydoom. ... Stuxnet. ... CryptoLocker. ... Sasser & Netsky. ... Anna Kournikova Keywords: hack, hacker, hackers, hackerbox ethicalhacker.net The Ethical Hacker Network - Free Online Magazine for the Security Professional Nokia, Fujitsu, Motorola and Sun Microsystems Keywords: ethicalhackernet, hacking, hack, hacker resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Online headquarters of Kaspersky Lab security experts. zone-h.com Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec Keywords: zone-h, hands on hacking, ethical hacking, hacker course coresecurity.com Enabling enterprises with access control systems & penetration testing for a comprehensive and predictive approach to Information Security Ethical Hacking, Cyber Forensic, Website Security, VAPT, Mobile Security. safeguarding critical data a... Keywords: penetration test, penetration testing, penetration testing product, ethical hacking insecure.in internet security and ethical hacking Keywords: internet security, ethical hacking, information security, network security pentestit.com Your source for all things Information Security! Keywords: hacking, cracking, pentest, computer security hacktabs.com HackTabs is a Technology Blog. We write about Technology,How To Guides,Social Media,Ethical Hacking,Microsoft Windows,SEO,Blogging,Mobiles and Gadgets... Keywords: how to guides, computer security, blogging, seo homeforgeeks.com one stop blog for all your technology needs related to Mobiles,Android,Wordpress,make money online,Ethical hacking. Keywords: android, symbian, hacking, ethical hacking plynt.com Plynt application penetration tests and security certification program assures that your application is safe against known common attacks. With experi... Keywords: penetration, testing, application, security

Security Stories
2: Democratizing Security with Wendy Nather

Security Stories

Play Episode Play 30 sec Highlight Listen Later Mar 30, 2020 55:20


Wendy Nather, Head of Advisory CISOs at Cisco Duo, joins us for the latest episode of Security Stories. Wendy discusses how we can involve users in our security practices, rather than blaming them when they fall foul of the rules. And she comes up with a unique idea for shaking up the security industry.Also in this episode, Ben has some handy tips for remote workers and how we can all play our part to ensure the security and privacy of our data. More details about how Cisco is supporting companies with an expansion of our free security offerings is available here https://blogs.cisco.com/security/cisco-expands-free-security-offerings-to-help-with-rise-in-remote-workers We also chat about how cyber criminals might be taking advantage of the current situation - more details are available on the Talos blog https://blog.talosintelligence.com/2020/03/covid-19-pandemic-threats.htmlAnd finally our 'On this Day' feature, where we look back into the cybersecurity archives, takes us on a journey of the Conficker worm, and how April Fools Day 2009 was shaping up to be a key day in cybersecurity history before things took a surprising turn.

linkmeup. Подкаст про IT и про людей

Is DoH a silver bullet? Is DoH an evil? Why not DoT? It's also time for true stories. Paul Vixie tells us the story about catching Conficker at good old plain DNS years. Guests: Paul Vixie, the DNS GuyAlexander Lyamin, Founder and CEO of Qrator LabsWhat about: DNS over HTTPS Скачать файл подкаста Добавить RSS в подкаст-плеер. Подкаст доступен в iTunes. Скачать все выпуски подкаста вы можете с яндекс-диска. Url podcast:https://dts.podtrac.com/redirect.mp3/https://fs.linkmeup.ru/podcasts/telecom/linkmeup-V084(2020-02).mp3

linkmeup. Подкаст про IT и про людей

Is DoH a silver bullet? Is DoH an evil? Why not DoT? It's also time for true stories. Paul Vixie tells us the story about catching Conficker at good old plain DNS years. Guests: Paul Vixie, the DNS GuyAlexander Lyamin, Founder and CEO of Qrator LabsWhat about: DNS over HTTPS Скачать файл подкаста Добавить RSS в подкаст-плеер. Подкаст доступен в iTunes. Скачать все выпуски подкаста вы можете с яндекс-диска. Url podcast:https://dts.podtrac.com/redirect.mp3/https://fs.linkmeup.ru/podcasts/telecom/linkmeup-V084(2020-02).mp3

linkmeup. Подкаст про IT и про людей

Is DoH a silver bullet? Is DoH an evil? Why not DoT? It's also time for true stories. Paul Vixie tells us the story about catching Conficker at good old plain DNS years. Guests: Paul Vixie, the DNS GuyAlexander Lyamin, Founder and CEO of Qrator LabsWhat about: DNS over HTTPS Скачать файл подкаста Добавить RSS в подкаст-плеер. Подкаст доступен в iTunes. Скачать все выпуски подкаста вы можете с яндекс-диска.

Brakeing Down Security Podcast
2019-039-bluekeep_weaponized-npm_security_cracks-grrcon_report

Brakeing Down Security Podcast

Play Episode Listen Later Nov 4, 2019 53:42


Grrcon update   2019-039-  bluekeep Weaponized… and more   Bluekeep weaponized https://www.bleepingcomputer.com/news/security/bluekeep-remote-code-execution-bug-in-rdp-exploited-en-masse/ https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708 https://www.microsoft.com/security/blog/2019/08/08/protect-against-bluekeep/    https://www.wired.com/story/bluekeep-hacking-cryptocurrency-mining   NordVPN hacked: https://arstechnica.com/information-technology/2019/11/nordvpn-users-passwords-exposed-in-mass-credential-stuffing-attacks/   Null sessions and how to avoid them:https://www.dummies.com/programming/networking/null-session-attacks-and-how-to-avoid-them/ https://social.technet.microsoft.com/Forums/en-US/2acdfb53-edee-444e-9ffa-25dcebcd9181/smb-null-sessions   Linux has a marketing problem: https://hackaday.com/2019/10/31/linuxs-marketing-problem/   20 accounts could pwn majority of NPM   https://www.zdnet.com/article/hacking-20-high-profile-dev-accounts-could-compromise-half-of-the-npm-ecosystem/    Chrome 0day   https://thehackernews.com/2019/11/chrome-zero-day-update.html   India Nuclear plant is hacked https://arstechnica.com/information-technology/2019/10/indian-nuclear-power-company-confirms-north-korean-malware-attack/   High Tea Security Podcast:  https://www.podcasts.com/high-tea-security-190182dc8   https://TAGNW.org - Bryan Panel and talking about networking   Securewv.org - Training - https://www.eventbrite.com/e/security-dd-tickets-79219348203  Bsides Fredericton - https://www.eventbrite.ca/e/security-bsides-fredericton-2019-tickets-59449704667      Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel:  http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site:  https://brakesec.com/bdswebsite #iHeartRadio App:  https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

Malicious Life
ML_Conficker

Malicious Life

Play Episode Listen Later Jul 18, 2019 40:15


Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands

Malicious Life
Conficker

Malicious Life

Play Episode Listen Later Jul 18, 2019 40:16


Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. The post Conficker appeared first on Malicious Life.

conficker malicious life
OMG Cyber!
5 - The one about The Curious Case of Conficker (aka Downadup) - Interview with Ken Bechtel

OMG Cyber!

Play Episode Listen Later May 16, 2019 35:05


This episode is mainly an interview and discussion with Ken Bechtel, who like me has been in Cyber Security for over three decades. We discuss "the Curious Case of Conficker (aka Downadup), the Botnet that Never Bit.." This includes what we (as an industry, as a victims) learnt from it. We also discuss AVIEN, Intelligence Sharing, SNORT signatures (for new malware) as well as honeypots, Opaserv (where I was, jokingly, accused of writing new variants of this family of share crawling worms), AutoRun risks, and various other things. If you want to reach out to Ken, I will include his contact details in the show notes. You can find out more about us on our website, including how to contact us, here: https://omgcybersecurity.co.uk You will also find show notes there...

Segurança Legal
Episódio #180 – Resumo de Notícias

Segurança Legal

Play Episode Listen Later Nov 23, 2018 41:33


Nesta edição: vazamento de dados na FIESP, os golpes da Black Fraude, digo Black Friday, os 10 anos do Conficker, clonagem de cartões com chip, entre outras notícias. Ajude o Segurança Legal a continuar existindo.Continue reading

Symantec Cyber Security Brief Podcast
Special Report: Conficker’s 10th anniversary

Symantec Cyber Security Brief Podcast

Play Episode Listen Later Nov 22, 2018 35:31


On this week’s episode of the Cyber Security Brief, Brigid O Gorman is joined by Candid Wueest to discuss the infamous Conficker worm, which marks its 10th anniversary this week. This worm first appeared on November 21, 2008, and despite the many changes that have occurred in the cyber security landscape since then we still see hundreds and thousands of detections of Conficker in the wild today. As well as Conficker, we also discuss some of the other old threats that are still around today – and speculate as to whether any of today’s threats are likely to have similar longevity.

The CyberWire
Daily: Banks are vulnerable to more than carding and transfer fraud. Ransomware updates. Lessons for users from the Three Mobile hack. Biometrics (with hedgehog). Election hacking retrospective.

The CyberWire

Play Episode Listen Later Nov 22, 2016 15:00


In today's podcast we hear about the FBI's warning that cash-spewing ATMs could be coming to a strip mall near you, courtesy of the Russian mob. Bad news and good news about ransomware. Another Android backdoor is reported. Exploitable security cameras get a patch. The Conficker worm's still crazy after all these years. Lessons for users from the Three Mobile hack. Biometrics meets the Wind in the Willows? (Fujitsu Biometrics' Derek Northrope provides a reality check.) Palo Alto's Rick Howard discusses the disconnect between the board room and the tech crew. China's new Internet law. And what have Fancy and Cozy Bear been up to? Hibernating?

The CyberWire
Daily & Week in Review: Conficker worms into medical IoT. Talking key management, DevOps. NERC standards take effect.

The CyberWire

Play Episode Listen Later Jul 1, 2016 18:42


In today's podcast we discuss Internet-of-things threats, not only botnets assembled from compromised security cameras, but also medical device hacking (with Conficker) as a way of stealing patient information. More insurance sector breaches appear to be in progress, too. The Sprashivai social network is compromised. The Infy espionage infrastructure is taken down (but may return—they often do). NERC standards for power grid cyber security take effect today. John Leisebeor from Quintessence Labs explains key management within a security framework, and we learn about DevOps from Cybric's Mike Kail and eGlobalTech's Branko Primetica.

The CyberWire
Daily & Week in Review: TeslaCrypt says "sorry, here's the key." 50-cent-ers troll China.

The CyberWire

Play Episode Listen Later May 20, 2016 17:50


In today's podcast, we follow moves to upgrade US Cyber Command to a Unified Combatant Command. We follow developments in Operation Groundbait, Phineas Phisher's latest, and the discovery of China's 50-cent-ers. Conficker is still out and active eight years after patching We take a look at industry news, and hear about how TeslaCrypt may be closing up shop. Our expert today is Accenture Labs' Malek Ben Salem who discusses semantic technology for cyber defense. We'll also hear from historian and author Abby Smith Rumsey who'll talk about her book, “When We are No More: How Digital Memory Memory Will Shape Our Future." 

Dave & Gunnar Show
Episode 104: #104: Tamper Evident

Dave & Gunnar Show

Play Episode Listen Later Dec 8, 2015 52:24


This week Dave and Gunnar talk about: credit card vulnerabilities, Dell vulnerabilities, and whether programmers are engineers. “We Care” Lauren, now in book form:  See page 18 of The Official Raspberry Pi Projects Book Speaking of Raspberry Pi… Turn your Raspberry Pi into FM Transmitter Raspberry Pi Zero Not everyone is impressed: Raspberry Pi Zero, or Minus One? Entropy drought hits Raspberry Pi harvests, weakens SSH security How to defeat Chip and Signature: A $10 Tool Can Guess (And Steal) Your Next Credit Card Number Hilton’s point of sale system is a POS: Hilton Worldwide Has Identified and Taken Action to Eradicate Malware Starwood too: Another Day, Another Hack: Credit Card Stealing Malware Hits Hotel Chain Slate Money Gabfest on, among other things, the economics of rewards programs. Those Gas Pump “Anti-Skimming” Stickers Are Really Just Pointless Decoration Lenovo no longer has a monopoly on pre-installed PC security vulnerabilities: Dell apologizes for HTTPS certificate fiasco, provides removal tool Security enhanced body cams: Police body cams found pre-installed with notorious Conficker worm Man-in-the-middle attack on Vizio TVs coughs up owners’ viewing habits Gmail Will Soon Warn Users When Emails Arrive Over Unencrypted Connections Let’s Encrypt now in public beta! Seeing through walls with Wi-Fi We guess it’s healthier than X-ray vans Estonia and e-Residency through blockchain (h/t emorisse) Signal is now available in Chrome Jim Whitehurst blogs about a question from his appearance on D&G 100 Programmers, Let’s Earn the Right to Be Called Engineers I Write Like: Dave writes like Cory Doctorow, Gunnar writes like H. P. Lovecraft D&G Joke Kit of the Week: CIA’s Simple Sabotage Field Manual: A Timeless, Kafkaesque Guide to Subverting Any Organization with “Purposeful Stupidity” (1944) Cutting Room Floor This can’t possibly go wrong: robots taught to disobey humans (h/t emorisse) Impress your TSA friends: Knife wielding tentacle tentacle Great News! Groupon Has a Sale on Clip-on Man Buns D&G This Week in Cognitive Surplus: Check Which McDonald’s Restaurants Are Serving All-Day Hash Browns Before You Go Happy Thanksgiving, everyone. It’s a time for sharing For Uzoma Click-o-Tron auto-generates clickbait with recurrent neural networks We Give Thanks The D&G Show Slack Clubhouse for the discussion topics!

TechSNAP Large Video
Catching the Angler | TechSNAP 235

TechSNAP Large Video

Play Episode Listen Later Oct 8, 2015 112:31


Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt. Plus some great feedback, a huge round up & much, much more!

TechSNAP
Episode 235: Catching the Angler | TechSNAP 235

TechSNAP

Play Episode Listen Later Oct 8, 2015 112:31


Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt. Plus some great feedback, a huge round up & much, much more!

TechSNAP Mobile Video
Catching the Angler | TechSNAP 235

TechSNAP Mobile Video

Play Episode Listen Later Oct 8, 2015 112:31


Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt. Plus some great feedback, a huge round up & much, much more!

Sophos Podcasts
Sophos Security Chet Chat - Episode 92 - June 5, 2012

Sophos Podcasts

Play Episode Listen Later Oct 26, 2013 20:03


Michael Argast from Telus joined Chet once again to discuss the week's news. Topics covered include Flame malware, Do Not Track, TACK, Conficker and Sophos Mobile Security for Android.

Sophos Podcasts
Conficker and April 1st

Sophos Podcasts

Play Episode Listen Later Oct 21, 2013 5:53


Sean Richmond of Sophos Australia talks to Paul Ducklin about the first of April Conficker security panic

conficker paul ducklin
Nya Vågen i Kulturradion
Internetattacker och kulturförakt

Nya Vågen i Kulturradion

Play Episode Listen Later Sep 4, 2012 44:29


Conficker, Stuxnet och Flame, trojaner och bootnets, cyberattacker och web-war - ett nytt språk har växt fram i den digitala värld som flera författare vill ge oss inblick i. De kommer på löpande band nu, böckerna som varnar för attacker på internet, som beskriver redan gjorda attacker på nätet och som varnar för krig på nätet. Mark Bowden, författare till boken Viruset. Det första digitala världskriget, beskriver cyberrymden som den arena där kampen mellan ont och gott nu utspelar sig. De onda heter sånt som Conficker, Stuxnet och Flame, virus och trojaner som enligt experter kan hota såväl infrastruktur och stora företag som alla datoranvändares privata liv. De goda är ofta unga män med de unika kunskaper som krävs för att ta upp kampen. Hur ser egentligen hoten på nätet ut och hur rädda ska vi vara? Hans Blix, välkänd expert på massförstörelsevapen och Daniel Goldberg, IT-journalist och en av författarna till Svenska Hackare har läst Mark Bowdens bok och vi hör också en intervju med denna amerikanska författare som också skrivit Black Hawk Down. - Det pågår redan ett krig out there, säger Bowden. I Nya Vågens första sänding för säsongen passar vi på att titta tillbaka på sommaren som gått och spanar lite framåt. Skådespelaren Maja Runeberg, kulturjournalisten Marianne Söderberg och krönikören Ronny Olovsson fiskar i floden av kulturhändelser, skeenden, debatter och utspel. Det handlar bland annat om upplevelsen av artister som verkligen bryr sig om sin publik och om kulturfientlighet. Programledare Kerstin Wixe i Luleå

Boys of Tech
Boys of Tech 022: These are our mountains

Boys of Tech

Play Episode Listen Later Jun 21, 2009 36:42


Microsoft giving away free software, Blu-Ray analogue hole to be closed, the story of Conficker, iPod may have saved a girl's life, YouTube lets you decide how ads are played, Bing subdomain for explicit content, a new Twitter client for a very old machine, Microsoft reimbursements only valid for Windows Mobile devices, Steve Jobs, Web acceleration software from a New Zealand company goes global.

Tech News Vermont
Episode 4, back from a break

Tech News Vermont

Play Episode Listen Later Jun 4, 2009 25:21


After a long break the podcasts are back.  I received an email from Verizon about some comments that were posted on the Concord Monitor’s web site.  I cover some of the hightlights from E3 and talk about the troubles with Conficker seen in certain hospitals.  Short show this week, working on getting back into a [...]

Super Nerd Monkey
SuperNerdMonkey – Episode 3

Super Nerd Monkey

Play Episode Listen Later Apr 14, 2009 70:36


This episode we discuss the Twitter Worm, Spam, the Conficker Virus, EA’s Brass Knuckles, Gamestop’s New/Used game practice, Oil cooled PCs, the possibility of a Refrigerated PC, the first open source BBC show, PirateBay’s new VPN, the Time Warner Bandwith Cap, Net Neutrality, South Park, The Simpsons, Family Guy, MMORPGs, and lastly we reminisce about [...]

Tech Talk Radio Podcast
April 11, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Apr 11, 2009 58:54


IT career strategies, installation CD myths, Profiles in IT (Jack Dorsey, creator of Twitter), Google and Microsoft eye Twitter, novel applications of Twitter, US electrical grid vulnerabilities (may have been penetrated, SCADA devices vulnerable, DOE Cyber Security and Attack Detection Toolkit for infrastructure), WiFi virus outbreak postulated, tax season scams (fake sites, phishing exploits, precautions), and Conficker virus update (peer-to-peer upgrade in progress, waiting for botmaster to make a move). This show originally aired on Saturday, April 11, 2009, at 9:00 AM EST on WFED (1500 AM).

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2009.04.12: A Vault for Your Passwords; Should You Let TestMyPCSecurity Check out Your Computer? and Short Circuits

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Apr 11, 2009 22:15


It's hard to beat the free KeePass application if you need to create, store, and use passwords. An offer to test my PC's security turned out to be more trouble than it was worth. In Short Circuits, a look at the most photo-friendly cities, the Conficker worm awakens, telephone vandalism wreaks havoc near Silicon Valley, and Microsoft is ordered to pay a big fine.

Tech Talk Radio Podcast
April 11, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Apr 11, 2009 58:54


IT career strategies, installation CD myths, Profiles in IT (Jack Dorsey, creator of Twitter), Google and Microsoft eye Twitter, novel applications of Twitter, US electrical grid vulnerabilities (may have been penetrated, SCADA devices vulnerable, DOE Cyber Security and Attack Detection Toolkit for infrastructure), WiFi virus outbreak postulated, tax season scams (fake sites, phishing exploits, precautions), and Conficker virus update (peer-to-peer upgrade in progress, waiting for botmaster to make a move). This show originally aired on Saturday, April 11, 2009, at 9:00 AM EST on WFED (1500 AM).

Deantastic Tech Podcast
Deantastic Tech Podcast Episode 01

Deantastic Tech Podcast

Play Episode Listen Later Apr 4, 2009


The pilot episode of Deantastic Podcast is here!Before we go any further, let me just say this: this is one crappy episode in terms of audio quality. I'm still learning the ropes of Adobe Audition and podcasting in general and I'm working with a basic 3.5-mm omnidirectional microphone. Apologies for the quality. I promise I'll get better in future episodes.It's also ridiculously short—five minutes for chrissake! I worked entirely off a script here. As soon as I get the hang of it, expect the podcast's runtime to lengthen.So, anyway, in this episode of the Deantastic Tech Podcast:Skype for the iPhone. Skype finally releases a client for the iPhone platform.Conficker Worm. D-Day came and went without anything really big happening. So is the Conficker scare over?Microsoft Encarta shuts down. Didn't see that coming.What the Internets did for April Fools'. Google has CADIE, The Guardian goes Twitter, Plurk goes Bitter.Download the MP3 of Episode 01 here or listen to it using the embedded player below. Better yet, subscribe to the podcast on iTunes - or use this generic RSS feed. www.deantastic.com

TBTL: Too Beautiful To Live
April 1, 2009 – Part 2

TBTL: Too Beautiful To Live

Play Episode Listen Later Apr 1, 2009 40:37


Welcome to the show: reviewing Rachael Yamagata's show with Rachael herself. Plus, how bad was computer virus Conficker today?

TBTL: Too Beautiful To Live
April 1, 2009 – Part 1

TBTL: Too Beautiful To Live

Play Episode Listen Later Apr 1, 2009 40:06


Welcome to the show: reviewing Rachael Yamagata's show with Rachael herself. Plus, how bad was computer virus Conficker today?

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2009.03.22: Nigerian Crooks Move South, ThumbsPlus 8 Looks Like a Plum, Renaming Your Computer, Funny Stuff, and Nerdly News

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Mar 21, 2009 20:29


A standard-issue Nigerian scam e-mail arrived from South Africa by way of South America; I have an early review of the upcoming ThumbsPlus Release, how to rename your computer, and some funny stuff; and in Nerdly News, Adobe issues an important security patch, the Conficker worm prepares to strike, and Microsoft releases IE8.

Tech Talk Radio Podcast
March 14, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Mar 14, 2009 59:04


Securing wireless access points (changing password, implementing encryption), Profiles in IT (Irwin Mark Jacobs, co-founder Qualcomm and driving force behind CDMA), Cisco Unified Computing Strategy (combining blades, virtualization, and switches), World Wide Web celebrate 20th anniversary (Tim Berners-Lee speaks at CERN, mobile web key to growth, privacy problem), Congress responds to Googles behavior-targeting with privicy bill, hiding rogue wirelss access points (using channel 14, using 801.11n only, using bluetooth Class 1 device, using wireless port knocking), latest Conficker has evolved (10,000 may be infected) FOSE update (Federal and Healthcare sectors strong, other sectors dip), and Adobe 9.1 released (security update fixes gaping hole).

Tech Talk Radio Podcast
March 14, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Mar 14, 2009 59:04


Securing wireless access points (changing password, implementing encryption), Profiles in IT (Irwin Mark Jacobs, co-founder Qualcomm and driving force behind CDMA), Cisco Unified Computing Strategy (combining blades, virtualization, and switches), World Wide Web celebrate 20th anniversary (Tim Berners-Lee speaks at CERN, mobile web key to growth, privacy problem), Congress responds to Googles behavior-targeting with privicy bill, hiding rogue wirelss access points (using channel 14, using 801.11n only, using bluetooth Class 1 device, using wireless port knocking), latest Conficker has evolved (10,000 may be infected) FOSE update (Federal and Healthcare sectors strong, other sectors dip), and Adobe 9.1 released (security update fixes gaping hole).

Boys of Tech
Boys of Tech 006: Please give us back our money

Boys of Tech

Play Episode Listen Later Mar 1, 2009 39:20


Xbox DoS attacks, Microsoft's payroll gaffe, legal torrents, home made patch for Adobe, GMail outage, the new variant of Conficker, Microsoft sues Tom Tom, cellular providers unhappy about Skype To Go, New Zealand Government to delay new copyright law, texting 111, 30 years since the introduction of the bar code in New Zealand.

Tech Talk Radio Podcast
February 14, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Feb 14, 2009 59:00


Installing a second hard drive, using BCC in emails, Profiles in IT (Robert Dennard, inventor of dynamic RAM), Skype 4.0 released, cold virus genome revealed (vaccine looks unlikely), Neanderthal genome mapped (DNA derived from 38,000 year old bones), SanDisk announces 64 GB flash memory, space crash creates debris (Russian satellite collides with Iridium satellie), space numbers (898 active satellites, 17,300 pieces of debris larger than 10 cm), Microsoft issues bounty for creator of Conficker worm, Chrysler announces Wi-Fi hotspot for cars (Internet connection via 3G cellular or WiMax), and Food Science (keeping green vegetables green). This show originally aired on Saturday, February 14, 2009, at 9:00 AM EST on WFED (1500 AM).

Tech Talk Radio Podcast
February 14, 2009 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Feb 14, 2009 59:00


Installing a second hard drive, using BCC in emails, Profiles in IT (Robert Dennard, inventor of dynamic RAM), Skype 4.0 released, cold virus genome revealed (vaccine looks unlikely), Neanderthal genome mapped (DNA derived from 38,000 year old bones), SanDisk announces 64 GB flash memory, space crash creates debris (Russian satellite collides with Iridium satellie), space numbers (898 active satellites, 17,300 pieces of debris larger than 10 cm), Microsoft issues bounty for creator of Conficker worm, Chrysler announces Wi-Fi hotspot for cars (Internet connection via 3G cellular or WiMax), and Food Science (keeping green vegetables green). This show originally aired on Saturday, February 14, 2009, at 9:00 AM EST on WFED (1500 AM).

Sophos Podcasts
Conficker under the microscope

Sophos Podcasts

Play Episode Listen Later Feb 10, 2009 10:30


Paul Ducklin, Head of Technology for Asia Pacific, discusses the true threat from 2009's widespread Conficker virus - which spread via a variety of techniques including USB sticks - with Patrick Gray, host of the ITRadio programme 'Risky Business'.

Boys of Tech
Boys of Tech 001: The S92A saga begins

Boys of Tech

Play Episode Listen Later Jan 25, 2009 63:26


Youtube introduces video download, 17,000 illegal copies does not equal 17,000 lost sales, P2P has positive effect, Isle of Man to legalise P2P, Microsoft patches bugs, Conficker worm arrives, touch interface for Windows 7, Seagate patch breaks hard drives, half of Australians use mobile phones on the toilet, New Zealand's Copyright Act Section 92A causes a stir.

Malicious Life
ML_Conficker

Malicious Life

Play Episode Listen Later Jan 1, 1970 40:15


Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure. Advertising Inquiries: https://redcircle.com/brands