Podcasts about hardware hacking

  • 57PODCASTS
  • 212EPISODES
  • 52mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 12, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hardware hacking

Latest podcast episodes about hardware hacking

@BEERISAC: CPS/ICS Security Podcast Playlist
Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 12, 2025 33:14


Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)Episode: Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT SecurityPub date: 2025-06-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse engineering smart meters, Hash shares both successes and frustrations from the front lines of hands-on security assessment. The conversation aims to inspire and equip listeners who want to explore or deepen their understanding of hardware security by surfacing resources, communities, and the mindset necessary to uncover vulnerabilities beyond software.Links:http://www.recessim.com/https://wiki.recessim.com/https://www.youtube.com/c/RECESSIM Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Joe Reis Show
Tim Berglund - The Art of Developer Relations, Hardware Hacking, and More

The Joe Reis Show

Play Episode Listen Later Apr 16, 2025 54:52


Tim Berglund is the OG of DevRel. We chat about the art and craft of developer relations, hacking on hardware, and much more.

Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!

I talk about the upcoming trends!Enjoy my come back.

Day[0] - Zero Days for Day Zero
Session-ception and User Namespaces Strike Again

Day[0] - Zero Days for Day Zero

Play Episode Listen Later Apr 1, 2025 49:36


API hacking and bypassing Ubuntu's user namespace restrictions feature in this week's episode, as well as a bug in CimFS for Windows and revisiting the infamous NSO group WebP bug.Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/279.html[00:00:00] Introduction[00:00:28] Next.js and the corrupt middleware: the authorizing artifact[00:06:15] Pwning Millions of Smart Weighing Machines with API and Hardware Hacking[00:20:37] oss-sec: Three bypasses of Ubuntu's unprivileged user namespace restrictions[00:32:10] CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)[00:43:18] Blasting Past Webp[00:47:50] We hacked Google's A.I Gemini and leaked its source code (at least some part)Podcast episodes are available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosecYou can also join our discord: https://discord.gg/daTxTK9

TrustedSec Security Podcast
7.6 - Ghost in The Machine: Hardware Hacking w/ Rob Simon

TrustedSec Security Podcast

Play Episode Listen Later Nov 14, 2024 27:58


In this episode, Geoff and Skyler dive deep into hardware hacking with Rob Simon! Rob is the Mobile and Hardware Security Practice Lead at TrustedSec and shares the deets on hardware security assessments. The importance of hardware fundamentals in security, especially when it comes to IoT devices, is one of the key takeaways this week. Rob answers questions like: Who needs hardware assessments? What tools and techniques are used? And what potential vulnerabilities are associated with IoT devices? Join us for great discussion, stay for the lolz, and clutch your Flipper Zeros tight! About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Hack the planet!

Paul's Security Weekly TV
Vulnrichment, Hardware Hacking, VPNs - PSW #829

Paul's Security Weekly TV

Play Episode Listen Later May 17, 2024 120:52


Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829

Paul's Security Weekly (Video-Only)
Vulnrichment, Hardware Hacking, VPNs - PSW #829

Paul's Security Weekly (Video-Only)

Play Episode Listen Later May 17, 2024 120:52


Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829

Cyber Security Inside
203. How to Blow Up Hair Dryers with a Walkie Talkie—And Other Hardware Hacking Superpowers

Cyber Security Inside

Play Episode Listen Later Apr 22, 2024 29:52


In this episode of InTechnology, Camille gets into hardware attacks with Maggie Jauregui, a hardware security researcher at Intel. They talk about Maggie's “secret superpower” of joy rooted in her Latin American upbringing, her first hardware hacking experiment with a hairdryer, the physics of hardware hacking, iSTARE's proactive research, the possibility of remote hardware attacks, and Maggie's positive outlook on hardware security. The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

Inside Darknet
16; 7h3B14ckKn1gh75

Inside Darknet

Play Episode Listen Later Feb 24, 2024 16:11


Drei Mitglieder der 7h3B14ckKn1gh75 reden über die Entstehung einer legalen Gruppe, selbst-gebastelte EMPs, Hardware-Hacking und Schwachstellen in alten Spielen.

Contemporánea
06. Máquina

Contemporánea

Play Episode Listen Later Dec 16, 2023 10:04


Hay una interesante y extensa historia de la música y las máquinas, desde los Wayangs del teatro religioso de Java y Balihasta las marionetas chinas de los teatros de sombras, desde el Reloj sirio de Gazahasta los robots de Kratfwerk y la música autogenerativa del siglo XXI._____Has escuchado“Athanasius Kircher, Antidotum Tarantulae - Tarantella”. Gabriele Giacomelli, órgano. YouTube Vídeo. Publicado por Associazione Prato per Zipoli, 13 de enero de 2020: [Vídeo]“David Roentgen's Automaton of Queen Marie Antoinette, The Dulcimer Player (La Joueuse de Tympanon)”. YouTube Vídeo. Publicado por The Met, 24 de octubre de 2012: [Vídeo]“‘Floutiste', Life-size Flute Player Automaton by A. Theroude, Paris, France, c. 1869-77”. YouTube Vídeo. Publicado por Morris Museum, 3 de diciembre de 2012: [Vídeo]“Jean Tinguely's Four Méta-Harmonie Music Machines at Museum Tinguely, Basel”. YouTube Vídeo. Publicado por VernissageTV, 20 de octubre de 2016: [Vídeo]“Luigi Russolo: Serenata per intonarumori e strumenti”. YouTube Vídeo. Publicado por TheWelleszCompany, 27 de enero de 2011: [Vídeo]“Poema sinfónico para 100 metrónomos de György Ligeti”. YouTube Vídeo. Publicado por Adolfo García Yagüe, 23 de enero de 2014: [Vídeo] _____ Selección bibliográficaARACIL, Alfredo, Música sobre máquinas y máquinas musicales. Desde Arquímedes a los medios electroacústicos. Fundación Juan March, 1984: [PDF]*BIJSTERVELD, Karin, Mechanical Sound: Technology Culture, and Public Problems of Noise in the Twentieth Century. The MIT Press, 2008BOWN, Ollie, Beyond the Creative Species: Making Machines That Make Art and Music. The MIT Press, 2021BROWN, Barclay, “The Noise Instruments of Luigi Russolo”. Perspectives of New Music, vol. 20, n.º 1-2 (1981), pp. 31-48*CHESSA, Luciano, Luigi Russolo Futurist: Noise Visual Arts and the Occult. University of California Press, 2012COLLINS, Nicolas y Simon Lonergan, Handmade Electronic Music: The Art of Hardware Hacking. Routledge, 2020GAVIN, Williams, “A Voice of the Crowd: Futurism and the Politics of Noise”. 19th-Century Music, vol. 37, n.º 2 (2013), pp. 113-129*HIRT, Katherine Maree, When Machines Play Chopin: Musical Spirit and Automation in Nineteenth-Century German Literature. Walter De Gruyter, 2010HOPKIN, Bart y Sudhu Tewari (eds.), Sound Inventions: Selected Articles from Experimental Musical Instruments. Routledge, 2021*KOSTELANETZ, Richard, “Artistic Machines”. Chicago Review, vol. 23, n.º 1 (1971), pp. 116-133*MOLINA ALARCÓN, Miguel, “De la ‘máquina de hablar' a la ‘máquina de dormir': máquinas sonoras y musicales pre-electroacústicas en España, 1860-1944”. En: ¡Chum, chum, pim, pam, pum, olé!: pioneros del arte sonoro en España, de Cervantes a las vanguardias. Editado por Miguel Molina Alarcón. Weekend Proms, 2017PARDO, Carmen, “La sensibilidad de la máquina: el circuito sonoro”. Acto: Revista de Pensamiento Artístico Contemporáneo, n.º 1 (2002), pp. 43-56*PATTESON, Thomas, Instruments for New Music: Sound, Technology, and Modernism. University of California Press, 2016*RICHARDS, Timothy, “Performing Objects: Technology without Purpose”. Leonardo, vol. 17, n.º 4 (1984), pp. 237-240*RUSSOLO, Luigi, “El arte de los ruidos”. Sin Título, n.º 3 (1996), pp. 5-50: [PDF]RUSSOLO, Luigi et al., Art of Noise Destruction of Music by Futurist Machines. Deicide, 2023SARMIENTO, José Antonio, “Los ‘ruideros' de Luigi Russolo y su impacto en la prensa española de la época, 1913-1933”. En: ¡Chum, chum, pim, pam, pum, olé!: pioneros del arte sonoro en España, de Cervantes a las vanguardias. Editado por Miguel Molina Alarcón. Weekend Proms, 2017TINGUELY, Jean et al., Méta-Harmonie: Music Machines and Machine Music in Jean Tinguely's Oeuvre. Museum Tinguely, 2016VENN, Edward, “Rethinking Russolo”. Tempo, vol. 64, n.º 251 (2010), pp. 8-16*ZARIPOV, R. Kh. y J. G. K. Russell, “Cybernetics and Music”. Perspectives of New Music, vol. 7, n.º 2 (1969), pp. 115-154* *Documento disponible para su consulta en la Sala de Nuevas Músicas de la Biblioteca y Centro de Apoyo a la Investigación de la Fundación Juan March

Paul's Security Weekly (Video-Only)
Hardware Hacking - PSW #809

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Dec 9, 2023 63:45


The Security Weekly crew dives into a discussion on the latest hardware hacking techniques, including the hardware/software/firmware used to conduct various tests and create neat projects. You may be trying to hack a specific device. You may be creating a device to accomplish a specific goal. We will discuss various aspects of hardware hacking and fill you in on the some of the latest devices and tools. Like the Flipper Zero, and why the alternatives are better in some cases, but also why the Flipper Zero gets a bad rap. Show Notes: https://securityweekly.com/psw-809

Paul's Security Weekly
Holiday Extravaganza - Supply Chain, Hardware Hacking, Vulnerabilities, News - PSW #809

Paul's Security Weekly

Play Episode Listen Later Dec 8, 2023 187:27


Join us for a special extended holiday edition of Paul's Security Weekly! Hosts from all the Security Weekly shows join us from around the country to kick off the end of the year in style. We begin with our first panel on Supply Chain, then discuss Hardware Hacking, Vulnerability Management and Disclosure, and wrap up with the news. Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-809

Paul's Security Weekly TV
Hardware Hacking - PSW #809

Paul's Security Weekly TV

Play Episode Listen Later Dec 8, 2023 63:45


The Security Weekly crew dives into a discussion on the latest hardware hacking techniques, including the hardware/software/firmware used to conduct various tests and create neat projects. You may be trying to hack a specific device. You may be creating a device to accomplish a specific goal. We will discuss various aspects of hardware hacking and fill you in on the some of the latest devices and tools. Like the Flipper Zero, and why the alternatives are better in some cases, but also why the Flipper Zero gets a bad rap. Show Notes: https://securityweekly.com/psw-809

Paul's Security Weekly (Podcast-Only)
Holiday Extravaganza - Supply Chain, Hardware Hacking, Vulnerabilities, News - PSW #809

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Dec 8, 2023 187:27


Join us for a special extended holiday edition of Paul's Security Weekly! Hosts from all the Security Weekly shows join us from around the country to kick off the end of the year in style. We begin with our first panel on Supply Chain, then discuss Hardware Hacking, Vulnerability Management and Disclosure, and wrap up with the news. Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-809

Paul's Security Weekly TV
AI, LLMs and Some Hardware Hacking - Matthew Carpenter - PSW #808

Paul's Security Weekly TV

Play Episode Listen Later Nov 30, 2023 57:48


Our good friend Matt Carpenter joins us to share his thoughts on what's going on in the world of AI and LLMs. Matt is also a hacker specializing in hardware and the crew has some amazing hardware hacking topics to discuss (as usual). Segment Resources: https://garymarcus.substack.com/p/has-sam-altman-gone-full-gary-marcus Show Notes: https://securityweekly.com/psw-808

ai matt carpenter hardware hacking matthew carpenter segment resources
Paul's Security Weekly (Video-Only)
AI, LLMs and Some Hardware Hacking - Matthew Carpenter - PSW #808

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Nov 30, 2023 57:48


Our good friend Matt Carpenter joins us to share his thoughts on what's going on in the world of AI and LLMs. Matt is also a hacker specializing in hardware and the crew has some amazing hardware hacking topics to discuss (as usual). Segment Resources: https://garymarcus.substack.com/p/has-sam-altman-gone-full-gary-marcus Show Notes: https://securityweekly.com/psw-808

ai matt carpenter hardware hacking matthew carpenter segment resources
Paul's Security Weekly
Platform Firmware Security - Maggie Jauregui - ASW Vault

Paul's Security Weekly

Play Episode Listen Later Nov 20, 2023 34:16


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-5

Paul's Security Weekly TV
Platform Firmware Security - Maggie Jauregui - ASW Vault

Paul's Security Weekly TV

Play Episode Listen Later Nov 20, 2023 34:16


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Show Notes: https://securityweekly.com/vault-asw-5

Application Security Weekly (Audio)
Platform Firmware Security - Maggie Jauregui - ASW Vault

Application Security Weekly (Audio)

Play Episode Listen Later Nov 20, 2023 34:16


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-5

Application Security Weekly (Video)
Platform Firmware Security - Maggie Jauregui - ASW Vault

Application Security Weekly (Video)

Play Episode Listen Later Nov 20, 2023 34:16


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Show Notes: https://securityweekly.com/vault-asw-5

Fique Seguro
Quando usamos o hardware hacking na proteção?

Fique Seguro

Play Episode Listen Later Jul 20, 2023 36:57


O tema hardware hacking está em alta, e muito se deve ao aumento de dispositivos smarts, com inúmeras funções, acesso à rede. Mas e como fica a proteção da empresa, quando precisa trafegar ou processar dados nestes equipamentos? E nos casos onde a informação não passa por ele, mas a sua capacidade de processamento pode ser um ofensor dentro da sua empresa? Por estas e outras, que temos profissionais de hardware hacking para avaliar nossos equipamentos. #FabioSobiecki #BlueTeamAcademy #SegurançadaInformação __________________ Siga minhas redes https://www.youtube.com/@fabiosobiecki https://www.instagram.com/fabiosobiecki https://www.facebook.com/fabiosobieckioficial https://www.tiktok.com/@fabiosobiecki

Critical Thinking - Bug Bounty Podcast
Episode 22: Chipping Away at Hardware Hacking

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Jun 8, 2023 71:48


Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code for IoT devices. Don't miss this episode packed with valuable insights, tips, and strategies for beginners and seasoned bug bounty hunters alike!Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!------ Links ------Follow your hosts Rhynorater & Teknogeek on twitter:https://twitter.com/0xteknogeekhttps://twitter.com/rhynoraterCheckout NahamCon:https://bit.ly/42vnpMSRiverLoop Security Write-up: https://bit.ly/3oSKL1oGood Chip-Off Write-up:https://bit.ly/3IWym3qScratching chips to expose pins:https://bit.ly/45Tj21ihttps://bit.ly/3oJJt8ZChat with Corben on Degrees: https://youtu.be/N9P5PUx-PNQ?t=2311Gareth Hayes Tweet:https://bit.ly/3qvFNYWHuntress - John Hammond - MoveIt Response:https://bit.ly/42vTTXvCritical Thinking Hardware Hacking Setup - See the gear we're talking about (Affiliate links): https://linke.to/hardwarehackingsetTimestamps:(00:00:00) Introduction(01:03) NahamCon's Live Hacking Event and Justin's Presentation on PCI DSS(02:40) Depreciation of Data URLs in SVG Use Element(04:55) Gareth Hayes and knowledge sharing in the hacking community(07:50) Move It vulnerability and and John Hammond's epic 4 am rants(12:18) Identifying promising leads in bug bounty hunting, and knowing when to move on(Start of main content)(21:40) Hardware Recon, and using Test Pins to Access EMMC Chip(26:16) Identifying Chip Pinouts and Continuity Testing(29:01) Using Logic Analyzers for Hardware Hacking(33:01) Importance of Fundamental Knowledge in Hacking, and the benefits of understanding Electrical Engineering(35:46) Replay Protected Memory Block Protocol(40:00) Bug Bounty Programs and Hardware Testing Support(41:05) Chip Pulling techniques and Essential Equipment for Hardware Hacking(59:50) Tips for Buying Hardware Hacking Tools: Research and Specific Use Cases(01:06:35) Hardware Hacking: Just scratching the surface.(01:08:45) Vulnerability Disclaimer: Pulling OS from a chip does not constitute a Vulnerability.

New Cyber Frontier
NCF-326 Cybersecurity Research

New Cyber Frontier

Play Episode Listen Later May 15, 2023 40:01


Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

Dark Rhino Security Podcast
SC S9 E4 Responsible Recycling of Electronic Devices and Data

Dark Rhino Security Podcast

Play Episode Listen Later Jan 6, 2023 49:43


#SecurityConfidential #DarkRhinoSecurity John Shegerian (pronounced "SHUH-GARE-EE-UHN") is the co-founder and Chairman/CEO of ERI, the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. He is also the co-author of the #1 best-selling book "The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and the host of the IMPACT podcast. 00:00 Introduction 00:10 Our Guest 01:34 Johns Origin Story 05:34 The secret to success: Doing good for others 07:56 Advice for Future Entrepreneurs 11:00 ERI: SOC2 Compliance 12:05 What are the steps for recycling electronics? 15:33 Gold, Copper, Precious Metals 18:30 Is there a recycling issue forming with EV cars? How JB Straubel is involved 25:21 Hardware Hacking 30:55 What to do before throwing electronics away 38:07 Anything you can't recycle? 42:03 A FREE COPY OF JOHNS BOOK 44:33 Johns Book 47:11 Rental Car Agencies 48:20 Anything new for John ---------------------------------------------------------------------- To learn more about John visit https://johnshegerian.com To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- Articles Mentioned United Nations Article: https://ewastemonitor.info/gem-2020/ https://www.businesswire.com/news/home/20170914006135/en/Fortune-Magazine-Calls-Electronic-Waste-%E2%80%98Dead-but-Not-Forgotten%E2%80%99----ERI-Featured-in-Report-About-Cybersecurity https://fortune.com/2017/09/06/electronic-waste-recycling-cybersecurity/ Information and photos about John: https://impactpodcast.com/ https://eridirect.com/category/news/ https://johnshegerian.com/gallery/ https://eridirect.com/ 1992 LA Rodney King Riots: https://www.britannica.com/event/Los-Angeles-Riots-of-1992 https://www.npr.org/2017/04/26/524744989/when-la-erupted-in-anger-a-look-back-at-the-rodney-king-riots https://www.nbclosangeles.com/news/local/timeline-rodney-king-beating-lapd-verdict-1992-la-riots/2880027/

The Tech Blog Writer Podcast
215: The Increasing Problem of E-Waste and Hardware Hacking

The Tech Blog Writer Podcast

Play Episode Listen Later Jun 21, 2022 31:37


The fastest-growing part of the world's waste stream is e-waste (unwanted or unusable consumer electronics). This is because technology continues to improve or evolve faster and faster, so electronics become outdated more quickly. Electronic items should not be thrown in the trash (or in landfills) because they contain toxins such as lead, mercury, and cadmium that can leach into the soil and water supplies. For these reasons alone, all electronics should be responsibly recycled. But they seldom are. A company called ERI specializes in the environmentally safe and socially responsible dismantling of electronic waste and ensures 100% data destruction and compliance. John Shegerian is the co-founder and Chairman/CEO of ERI. He is also the author of a book about hardware hacking called the Insecurity of Everything, which went to #1 on Amazon in the cybersecurity category. I invited him on Tech Talks Daily to discuss the scale of the problem and how e-waste plays a pivotal role in the circular economy. We discuss e-waste and data protection and the trends he believes will continue. I also learn more about the most significant factor driving the need for efficient data destruction and how serious a problem hardware hacking is. John also shares real-world examples of devices that store personal data that people don't even think about.

Privacy is the New Celebrity
Bunnie Huang on Hardware Hacking, Secure Enclaves and Evidence-Based Trust - Ep 27

Privacy is the New Celebrity

Play Episode Listen Later Jun 16, 2022 48:45 Transcription Available


In this episode, Sara Drakeley interviews Bunnie Huang, security researcher, hacker, and entrepreneur. Bunnie wrote the book, Hacking the Xbox: An Introduction to Reverse Engineering. He also helped create Chumby, a consumer electronics product designed to be modified by users and provide hackable widgets. Bunnie and Sara dive into trust models and Bunnie outlines the challenges of developing evidence-based trust. Sara asks Bunnie for his take on secure enclaves and Bunnie explains why "you  shouldn't eat out of your toilet bowl." Sara and Bunnie puzzle the biggest security flaw of all - humans.

Data Protection Gumbo
148: The Rise and Dangers of Hardware Hacking - ERI

Data Protection Gumbo

Play Episode Listen Later Jun 14, 2022 32:56


John Shegerian, Co-Founder, Chairman and CEO of Electronic Recyclers International - ERI discusses his journey through recycling electronic waste for environmental and sustainability reasons, the importance of data protection, insights on hardware hacking, and the responsibility that consumers have when disposing of our old devices.

Risk Management Show
Preventing hardware hacking by recycling data-storing devices with John Shegerian

Risk Management Show

Play Episode Listen Later May 2, 2022 22:47


In this episode you will hear John's insights on how to prevent hardware hacking  by recycling data-storing devices. John Shegerian is a Chairman and CEO of ERI. He has also written the best-seller, "The Insecurity of Everything". To get your free copy of John's book "The Insecurity of Everything" please send him an email to jss@eridirect.com and mention Risk Management show in your request We discussed the following topics among others:  How serious a problem is hardware hacking?   Is e-waste more an environmental problem or a data security issue?  What are some devices that store personal data that people don't even think about?   How has the COVID-19 Pandemic changed the cybersecurity landscape?  and more... If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.

Hack the Planet
Securing Hardware with Joe Fitz

Hack the Planet

Play Episode Listen Later Mar 24, 2022 160:41 Transcription Available


In this episode of the Hack the Planet Podcast: Joe Fitzpatrick of SecuringHardware.com is the best known hardware security trainer on the planet.  We talk to him about how he … Continue reading "Securing Hardware with Joe Fitz"

The Cyber Tap
Hardware Hacking - The Cyber Moments That Made Us - S7E5

The Cyber Tap

Play Episode Play 60 sec Highlight Listen Later Mar 17, 2022 54:58


This week, Mat and Mike talk with Joe Grand from Grand Idea Studio. They chat about Joe's recent crypto wallet hardware hack, his past with the L0pht, and what it means to be a "hacker."------------------------Check out Joe GrandYouTube: youtube.com/c/JoeGrandTwitter: @JoeGrand-------------------------Announcements:Interested in PCAP, visit purdue.edu/pcapWant to learn more about CERIAS Security Symposium, visit https://www.cerias.purdue.edu/site/symposium-------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu

The Vonu Podcast
TVP #143: Hardware Hacking with Jamin Biconik (An LUA Radio Classic)

The Vonu Podcast

Play Episode Listen Later Feb 5, 2022 108:22


On this episode of The Vonu Podcast, you'll hear a Liberty Under Attack Radio classic from August 2017. I'm joined by Jamin Biconik, a “hardware hacker,” permaculture farmer, and agorist. Jamin is the developer of the Ghostpad privacy-oriented machines, Neuron, his custom Linux-based operating system, and a number of other projects. Herein,… The post TVP #143: Hardware Hacking with Jamin Biconik (An LUA Radio Classic) appeared first on The Vonu Podcast.

1st Talk Compliance
Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar

1st Talk Compliance

Play Episode Listen Later Jan 25, 2022 50:01


John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, "the Insecurity of Everything" will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected!

1st Talk Compliance
Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar

1st Talk Compliance

Play Episode Listen Later Jan 25, 2022 50:01


John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, "the Insecurity of Everything" will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected! The post Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar appeared first on First Healthcare Compliance.

The Hedge
Hedge 114: Hardware Hacking 101 with Federico Lucifredi

The Hedge

Play Episode Listen Later Jan 13, 2022 26:52


Hardware hacking isn't a topic most network engineers are familiar with—but we always used to say that if I can get access to the console of a router, I can eventually get into the box. The same is largely true of all kinds of computing hardware, including laptops, compute nodes connected to a data center fabric, and, again, routers and switches. In this episode of the Hedge, Federico Lucifredi joins Tom Ammon and Russ White to discuss the many options hardware hackers have today.

Tierra de Hackers
35. TA456, Punycode, hardware hacking, MeteorExpress, menús digitales y HTML Smuggling

Tierra de Hackers

Play Episode Listen Later Aug 4, 2021 114:19


El gobierno iraní esta detrás de una reciente campaña de ingeniería social centrada en el robo de información de empresas militares y de defensa. Punycode se ha utilizado recientemente en ataques homógrafos contra el sitio web del navegador Brave a través de Google Ads para engañar a usuarios despistados a descargarse malware. ¿Es posible robar un portátil de una empresa, protegido con contraseña y con el disco duro cifrado, y conseguir acceder a la red interna? Pues resulta que si… La campaña ofensiva MeteorExpress permite a cibercriminales infiltrarse en el Ministerio de Transporte de Irán y su sistema ferroviario nacional destrozando sistemas con su wiper malware Meteor y dejando fuera de servicio a cientos de trenes. Los restaurantes han adoptado el menú digital mediante el escaneo de códigos QR, pero detrás de esto hay empresas abusando de tu privacidad y potencial para ciberataques. La técnica de HTML Smuggling se está abusando en ataques de phishing aprovechando la combinación de HTML5 y JavaScript para distribuir malware de forma dinámica, y así evitar los sistemas de seguridad a nivel de red. Notas y referencias en https://www.tierradehackers.com Twitch: https://www.twitch.tv/tierradehackers

Paul's Security Weekly
Shrug & Move On - ASW #160

Paul's Security Weekly

Play Episode Listen Later Aug 3, 2021 72:11


This week, we welcome Maggie Jauregui, Offensive Security Researcher at Intel, to discuss Platform Firmware Security! Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security.   In the AppSec News: PunkSpider coming to DEF CON, Google matures its VRP, $50K bounty for an access token, RCE in PyPI, kernel vuln via eBPF, top vulns reported by CISA, & the importance of testing!   Show Notes: https://securityweekly.com/asw160 Segment Resources: - https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ - https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ - https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal - https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png   Visit https://www.securityweekly.com/aswfor all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Application Security Weekly (Audio)
Shrug & Move On - ASW #160

Application Security Weekly (Audio)

Play Episode Listen Later Aug 3, 2021 72:11


This week, we welcome Maggie Jauregui, Offensive Security Researcher at Intel, to discuss Platform Firmware Security! Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security.   In the AppSec News: PunkSpider coming to DEF CON, Google matures its VRP, $50K bounty for an access token, RCE in PyPI, kernel vuln via eBPF, top vulns reported by CISA, & the importance of testing!   Show Notes: https://securityweekly.com/asw160 Segment Resources: - https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ - https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ - https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal - https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png   Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Platform Firmware Security - Maggie Jauregui - ASW #160

Paul's Security Weekly TV

Play Episode Listen Later Aug 2, 2021 36:48


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: - https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ - https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ - https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal - https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw160

Application Security Weekly (Video)
Platform Firmware Security - Maggie Jauregui - ASW #160

Application Security Weekly (Video)

Play Episode Listen Later Aug 2, 2021 36:48


Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: - https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ - https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ - https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal - https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw160

DevDiscuss
S5:E5 - Hardware Hacking for Everyone

DevDiscuss

Play Episode Listen Later Jun 9, 2021 48:18


In this episode, we talk about hardware hacking with Charlyn Gonda, software engineer at Google, and Sophy Wong, a multi-disciplinary designer working with wearable technology and digital fabrication. Show Notes DevNews (sponsor) CodeNewbie (sponsor) RudderStack (sponsor) Cockroach Labs (sponsor) Cloudways (sponsor) Scout APM (DevDiscuss) (sponsor) Hello I'm Charlyn YouTube: Sophy Wong 12 Months of Makes The Spacesuit Arduino Getting Started with the LilyPad Arduino Adafruit CircuitPython Diana Eng

Psychedelic Curious?
S1-E3: Geoff Chu talks Mars Research, Crispr and the Origins of NFTs

Psychedelic Curious?

Play Episode Listen Later Apr 13, 2021 52:04


The Enormous Issues | Audacious Ideas Podcast is available on your favorite podcast app!EIAI talks about issues shaping our world and the technologies that are contributing to that change. We discuss AUDACIOUS technology and culture-related IDEAS that are cutting-edge, provocative, and sometimes really out there. Our content is aimed at an open-minded, innovative, global, and adult audience with an eye on the future. Our goal is to push the thinking, throw as many yellow stickies at the whiteboard as possible and have fun while we do it.  We hold space for open dialog, robust debate and the diverse opinions of our guests. This is what makes this podcast awesome! Sending love and peace to you all. EIAI episodes drop every Tuesday.  Visit The EIAI Website: https://www.theartfulladder.com/podcastLISTENING LINKSEIAI on Apple: https://apple.co/3s7kcRG EIAI on Google: https://bit.ly/3a31eFpEIAI on Spotify: https://spoti.fi/3d97ihMFOLLOW AND GET IN TOUCH: Instagram: @audaciousideas @rhea_naidoo_ ClubHouse: @RheaNaidoo Twitter: @rheanaidoo_#technology #technologypodcast #worldissues #futuretech #clubhouse

Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!

This is the sequel of the last episode. I explained a paper in a very abstract way, enjoy!

Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!

I’m back with a new episode of the storytellinghacker! Hope you guys would like it! This is a part 1 of Power of Hardware Hacking.

Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!

This is a teaser for the first episode of StoryTellingHacker podcasts !

Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!

Why does everyone like web appsec and bug bounty so much that they have forgotten the roots of hacking? Ladies and gentlemen, The Storytellinghacker is Back with a new season and as promised this time it’s more fun!

Pod Security Network
EAD em Forense Computacional

Pod Security Network

Play Episode Listen Later Nov 10, 2020 1:38


Faça sua matricula neste link! https://afiliado.saberemrede.net/checkout-aluno/219168?sponsor=b5bb2445-0d05-4131-9f29-3cc0441c5710 O curso de Perícia Forense Computacional se destina a identificar, preservar, recuperar analisar e apresentar fatos acerca de uma informação em meio digital. Apesar de frequentemente associada à investigação de crimes informáticos, a computação forense é também amplamente utilizada em processos civis. Entre seus objetivos primários, o curso de Perícia Forense Computacional busca qualificar profissionais de nível superior que atuam nas mais diversas áreas da computação a expandirem seu âmbito de atuação para investigar crimes digitais com rigor e metodologia científica. Os futuros profissionais serão capacitados nas mais avançadas técnicas de investigação forense sem abrir mão do amparo legal proporcionado pelas disciplinas com ênfase em direito. Conteúdo Programático: Tecnologias e Frameworks para forense computacional – 30 horas Forense aplicada a dispositivos móveis – 30 horas Análise Forense aplicada em sistemas Linux – 30 horas Análise Forense aplicada a sistemas Windows – 30 horas Criptografia e Criptoanálise, privacidade e comunicações digitais – 30 horas Introdução a Segurança da Informação – 30 horas Introdução à Engenharia Reversa – 30 horas Exploração de Software – 30 horas Introdução à Eletrônica e Hardware Hacking – 30 horas Análise Forense Computacional – 30 horas Gestão de Segurança da Informação – 30 horas Noções de Direito para Segurança da Informação – 30 horas TOTAL DA CARGA HORÁRIA – 360 h Faça sua matricula neste link! https://afiliado.saberemrede.net/checkout-aluno/219168?sponsor=b5bb2445-0d05-4131-9f29-3cc0441c5710 --- Send in a voice message: https://anchor.fm/podsecnet/message

Pod Security Network
EAD em Ethical Hacking e CyberSecurity

Pod Security Network

Play Episode Listen Later Oct 27, 2020 1:36


Faça sua matricula neste link! https://afiliado.saberemrede.net/checkout-aluno/219159?sponsor=b5bb2445-0d05-4131-9f29-3cc0441c5710 Oi pessoal João aqui! Já pensou em se especializar em Cibersegurança? Promover seu crescimento profissional e desenvolver suas técnicas de defesa e ataque, fazendo parte de equipes de segurança para proteção e analise de ameaças?? O Brasil já está entre os 10 países que mais sofrem ataques virtuais, com isso procura-se profissionais da área de segurança da informação que se encontram escassos no atual momento. Quero apresentar a vocês o curso EAD em Ethical Hacking e CyberSecurity da UNICIV pós graduação EAD em TI! Use o link de afiliado na descrição deste episódio! O Curso tem como objetivo a formação de especialistas na área de segurança da informação, capazes de projetar metodologias de proteção virtual efetiva para os processos do negócio, como análises de risco, prevenção as vulnerabilidades, testes de invasão em softwares e sistemas. Extremo aprofundamento da aplicação de políticas de segurança, consistindo na confidencialidade e confiabilidade das informações que trafegam na rede. É voltado para profissionais nas áreas de segurança e tecnologia da informação, auditoria e conformidade, advogados com interesse nas áreas de Direito Eletrônico, Peritos criminais com foco em especialização na área de combate a crimes eletrônicos. Agora vou listar o Conteúdo Programático do curso: Introdução à Segurança Ofensiva – 30 horas Fundamentos de Redes de Computadores – 30 horas Teste de Invasão em Redes e Sistemas – 30 horas Segurança ofensiva em Sistemas Web – 30 horas Introdução à Engenharia Reversa – 30 horas Engenharia de Usabilidade – 30 horas Introdução à Eletrônica e Hardware Hacking – 30 horas Análise Forense Computacional – 30 horas Fundamentos de Programação para Segurança da Informação – 30 horas Administração de Sistema Operacional Linux – 30 horas Gestão de Segurança da Informação – 30 horas Noções de Direito para Segurança da Informação – 30 horas TOTALIZANDO CARGA HORÁRIA DE 360 h Matrículas: Abertas em fluxo contínuo (entrada em qualquer momento) Disciplinas: Em formato de videoaulas, e-books, atividades online, simulações. Acompanhamento intensivo por equipe de tutores online / fóruns, muita dinâmica e interatividade e suporte técnico capacitado. Equipe de professores altamente experientes, certificados e com vasta atuação no mercado. Matrículas: Abertas em fluxo contínuo (entrada em qualquer momento) Disciplinas: Em formato de videoaulas, e-books, atividades online, simulações. Acompanhamento intensivo por equipe de tutores online / fóruns, muita dinâmica e interatividade e suporte técnico capacitado. Equipe de professores altamente experientes, certificados e com vasta atuação no mercado. Não há mais desculpas para não se especializar e crescer na área de cibersegurança, usando o link de afiliado na descrição deste episódio para se matricular e impulsionar sua carreira e ainda ajuda a manter o pod security network. Desejo a todos um ótimo curso e para o alto e avante! Faça sua matricula neste link! https://afiliado.saberemrede.net/checkout-aluno/219159?sponsor=b5bb2445-0d05-4131-9f29-3cc0441c5710 --- Send in a voice message: https://anchor.fm/podsecnet/message

Let's Know Things
Hardware Hacking

Let's Know Things

Play Episode Listen Later Oct 23, 2018 39:40


This week we talk about the Coventry Blitz Conspiracy, Supermicro, and Fancy Bear.We also discuss state-sponsored hacking, the CIA, and Pearl Harbor. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit letsknowthings.substack.com/subscribe