Podcasts about security through obscurity

  • 15PODCASTS
  • 15EPISODES
  • 35mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 7, 2022LATEST

POPULARITY

20172018201920202021202220232024


Latest podcast episodes about security through obscurity

The Bid Picture - Cybersecurity & Intelligence Analysis
103: China's Attempts at Security Through Obscurity.

The Bid Picture - Cybersecurity & Intelligence Analysis

Play Episode Listen Later Jan 7, 2022 16:52


In this episode, host Bidemi Ologunde discussed China's increasing use of security through obscurity – basically trying to achieve a competitive and strategic advantage by making it more challenging for foreign entities to see data on Chinese companies and citizens.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).Check out host Bidemi Ologunde's latest book, Feet of Clay: Democracy, Democratic Values & Destructive Influences, available on Amazon, eBay, and Barnes & Noble.

AV SuperFriends
AV SuperFriends: Off the Rails - Security Through Obscurity

AV SuperFriends

Play Episode Listen Later Dec 16, 2021 45:56


Recorded December 3, 2021 Are your AV devices secure? Probably not. Is your campus network secure? Fingers crossed! We start with some recent non-AV news about campus network security and ransomware that forced two entire community colleges to simply close temporarily. Then we discuss the current state of AV network security. How many devices do we all have out there on the network running firmware from years ago? Has that firmware been through a security audit recently? Or ever? Of course not! AV manufacturers have a bit of a cultural problem when it comes to security in that it often seems to be an afterthought-- even for native AVoIP devices or gear that requires a network connection to function. Finally, we commiserate about campus clients who want to second-guess project estimates. Over the last two years, everyone has gotten used to "good enough AV” experiences while teaching, learning, and working from home, but is that really good enough for a university learning space? Also, we just bought this TV at Best Buy. Can you just install that for us real quick? Article discussed: https://www.insidehighered.com/news/2021/11/30/butler-county-lewis-and-clark-community-colleges-hacked

fashism
They Call Him Mr. Denny (A Met Gala Recap)

fashism

Play Episode Listen Later Sep 30, 2021 93:37


This is a bonus episode, meaning we're releasing it out of order so that we can deliver this piping hot content before its relevance crumbles under the weight of the media cycle. It's a Met Gala recap, so we're talking about favorites and least favorites, and giving our takes on the event's most controversial looks. Along the way, Hope and Jackie both come out as pro flower crown and ask the question “where were you when you found out what a deductible is?” Finally, a conversation about Simon Denny's art exhibit Security Through Obscurity, which tells a story of neoliberal irony through the beautiful and unexpected collision of Margaret Thatcher's scarves with Patagonia puffy vests. Enjoy!   We're socialists! Follow us on the socials @fashismpod

met gala patagonia margaret thatcher simon denny security through obscurity
Chill Chill Security
EP612: Security Through Obscurity

Chill Chill Security

Play Episode Listen Later Apr 1, 2021 7:31


Sponsor by SEC Playground แบบสอบถามเพื่อปรับปรุง Chill Chill Security Channel: https://forms.gle/e5K396JAox2rZFp19 Music by https://www.bensound.com/ --- Support this podcast: https://anchor.fm/chillchillsecurity/support

security through obscurity
Paul's Security Weekly
Hacking Philips, Iowa Caucus, & Kryptos Key - Wrap Up - SWN #10

Paul's Security Weekly

Play Episode Listen Later Feb 10, 2020 26:00


This week, Doug White gives you the latest updates across all of Security Weekly's shows, from malware to hacking air-gapped computers, Ashley Madison, Katelyn Bowden and the BADASSARMY, Security Through Obscurity in Iowa, and highlights from the show notes from the week of February 2, 2020!   Show Notes: https://wiki.securityweekly.com/SWNEpisode10 Visit https://www.securityweekly.com/swn for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly  

Hack Naked News (Audio)
Hacking Philips, Iowa Caucus, & Kryptos Key - Wrap Up - SWN #10

Hack Naked News (Audio)

Play Episode Listen Later Feb 10, 2020 26:00


This week, Doug White gives you the latest updates across all of Security Weekly's shows, from malware to hacking air-gapped computers, Ashley Madison, Katelyn Bowden and the BADASSARMY, Se This week, Doug White gives you the latest updates across all of Security Weekly's shows, from malware to hacking air-gapped computers, Ashley Madison, Katelyn Bowden and the BADASSARMY, Security Through Obscurity in Iowa, and highlights from the show notes from the week of February 2, 2020!   Show Notes: https://wiki.securityweekly.com/SWNEpisode10 Visit https://www.securityweekly.com/swn for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   curity Through Obscurity in Iowa, and highlights from the show notes from the week of February 2, 2020! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://wiki.securityweekly.com/SWNEpisode10

Hack Naked News (Video)
Ashley Madison Sextortion, Iowa, 3D Brains - SWN #10

Hack Naked News (Video)

Play Episode Listen Later Jan 31, 2020 25:59


Welcome to the Security Weekly News Wrap up for the Week of 2 - February - 2020. Ashley Madison, BADASSARMY, Security Through Obscurity in Iowa, all the show notes, and more on this episode of Security Weekly News Wrap Up. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SWNEpisode10

Business Built Freedom
080 | Security Through Obscurity Is No Security At All

Business Built Freedom

Play Episode Listen Later Jun 18, 2019 4:43


Security Through Obscurity is Not Security at All I started thinking this a little while ago about how far the world has come and going back into the days of my first job, yep, many, many moons ago at Jaycar. I was thinking abouthow many people paid and their PIN number was on the back of their credit card or on the back of their key card. I thought, oh my goodness, that's not even an obscurity, that's not security at all. You might as well use a chisel to lock your door. It doesn't make any sense. Learn more about Business IT Security: https://dorksdelivered.com.au/blog/368-security-through-obscurity-is-no-security-at-all Security is Everything The biggest problem you can face is you don't even know if your business is secure or not unless you're in the game. You need to make sure that it is secure. You want to make sure that things aren't being taken away and that those little bits of ease aren't at the expense of security. I'm sure your IT companies have told you this before, but if you want to have everything completely secure, the most secure network you'll ever find is one that has no people on it and no connection to the internet. When I was doing some support work for a school of 1,200 machines, I can comfortably say that during the school holidays after I got everything working, nothing broke, everything just kept working. It was great, but it's not a usable system. Stay Flexible If you have everything completely locked down and nobody's able to touch them there's no point in having them. There always has to be a bit of flexibility and that's where you need to make sure that you're staying secure, because flexibility comes at a risk if it's not done properly. If you're connecting into your workforce from remotely you should be using a VPN or something to connect in that would connect to your phone, such as a two factor authentication.You want to make sure that you have great security in place. This goes on premise as well. Lock it Up With Good Quality Locks You can go down to Bunningsand you can buy a cheap lock. One of my sort of side hobby that I've done in the past to pass time and get my mind away from the analytical thinking and more towards a creative, physical thing is lock picking. It's quite a hobby andit's quite interesting. It was surprising to find, when I went over to my mate's house, his parents had just built this beauty of a home, maybe 1.6 million dollar home near the water and it looked quite nice, as you'd imagine. The home was so fresh, that grass, you could still see those lines where the turf had been rolled out. We couldn't get into the house. His parents weren't home and his parents didn't have a hidden key or anything like that, again, security through obscurity. They said, "Look, we just have to wait for us to get home, we'll be home in about two hours." I said, "If you don't mind I'll just use my lock picking set." I opened the door in about 10 seconds and that comes down to shitty locks. You can't have bad locks on your doors. You've got to have good locks, you've got to have good security, otherwise you're only keeping out the honest criminals. That's what a lock is and that's what a lot of security is around IT practises. Get An Audit These people have just popped in antivirus solutions and they've turned a small network into a bigger network. They're still running a mumand dad practise, butthe business is now turning over sizable income and wouldn't be able to have the downtime that was associated with a mom and dad business. Have a look, get an audit. Get someone to jump in and audit your business. You'll be surprised at what they can find, anything from security patches missing, old router firmware that needs to be updated, old wireless protocols that should be disabled or even things that let them get in because you don't have the correct types of encryptions with any of the resources that you are dishing out remotely. What About the Cloud? Some people think, "I'm in the Cloud, I don't have to worry about security." Well here's a big, scary notice for you, you really really do more than ever if you're in the Cloud because now if someone's breaking into your shit, you can't even unplug the cord and get away from them. You have to just sit there and let it happen. How terrible is that? That is of course unless you've got the right processes in place. The Final Word Have talk to your IT company and see what they can do. Security should be your number one priority. Remember that security through obscurity is not security at all. Stay good.  

security cloud lock vpn pin security through obscurity
TechGenix IT Podcasts
Top IT jobs of 2018, signs of impending IT disasters, and the risks of security through obscurity

TechGenix IT Podcasts

Play Episode Listen Later Sep 21, 2018 25:55


This episode focuses on topics introduced by the following TechGenix articles: - Heed the warnings: 5 telltale signs of impending IT disasters - 5 top-paying IT jobs in 2018 - Fax hack? Why old tech is getting renewed interest from cybercriminals

Symantec Cyber Security Brief Podcast
“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat

Symantec Cyber Security Brief Podcast

Play Episode Listen Later Aug 9, 2018 26:55


In this week’s cyber security news round-up, we chat about Threat Intel’s Liam O’Murchu’s Black Hat presentation: How To Use Machine Learning to Discover New Targeted Attacks. We also discuss the Snapchat source code leak, the coin mining campaign targeting MikroTik routers, and the concept of “security through obscurity” – adding more bugs to code to make it harder for black hat hackers to figure out which bugs are the exploitable ones.

Clearly Crypto
E4 Security Through Obscurity

Clearly Crypto

Play Episode Listen Later Feb 23, 2018 50:01


Aaron and Cory take their first deep dive into the topic of security. They get in depth with the technical aspects of Bitcoin and other cryptocurrencies that makes them so secure.

bitcoin security through obscurity
Merge Conflict
Merge Conflict 35: Security Through Obscurity

Merge Conflict

Play Episode Listen Later Mar 6, 2017 40:59


It's time to talk code security when developing applications to try to stop people from stealing our precious code and apps. We discuss the different methods we have used to attempt to obfuscate our code and the tools we use to peek into our own code. When it comes to security, it is more than just the executable we ship as we have to be aware of everything happening on the device such as in app purchases, certificates, web requests, and a bunch of other things. We discuss all this and more on this week's show. Links & Show Notes dotPeek Security Through Obscurity Securing IAP with Azure Functions Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Music : Amethyst Seer - Citrine by Adventureface Subscribe iTunes Google Play Music Stitcher Pocket Casts Overcast Merge Conflict may make commission from affiliate links

soundbite.fm: a podcast network
Merge Conflict 35: Security Through Obscurity

soundbite.fm: a podcast network

Play Episode Listen Later Mar 6, 2017 40:59


It's time to talk code security when developing applications to try to stop people from stealing our precious code and apps. We discuss the different methods we have used to attempt to obfuscate our code and the tools we use to peek into our own code. When it comes to security, it is more than just the executable we ship as we have to be aware of everything happening on the device such as in app purchases, certificates, web requests, and a bunch of other things. We discuss all this and more on this week's show. Links & Show Notes dotPeek Security Through Obscurity Securing IAP with Azure Functions Frank: Twitter, Blog, GitHub James: Twitter, Blog, GitHub Music : Amethyst Seer - Citrine by Adventureface Subscribe iTunes Google Play Music Stitcher Pocket Casts Overcast Merge Conflict may make commission from affiliate links

Dave & Gunnar Show
Episode 108: #108: A Commitment to Your Privacy

Dave & Gunnar Show

Play Episode Listen Later Feb 26, 2016 53:54


This week Dave and Gunnar talk about: iPhones, politics, politics with iPhones; glibc, containers, containers with glibc; Azure, Red Hat, Azure with Red Hat. Freeblade rules everything around Gunnar The new Remember The Milk is here! Speaking of bad product management, Twitter’s algorithmic timeline an object lesson in the relationship between marketing and product management Instructable: Control a Cockroach with Arduino for under $30 Raspberry Pi repurposed into automated complaining machine FCC speed test app Local police wrestle with success of license plate camera system D&G This Week in Security Through Obscurity Ashley Madison Offering Profile Photo Masks, Rendering Users Completely Unrecognizable To Their Loved Ones HT Mrs. Egts: Stick shift foils would-be Cleveland carjackers Don’t time travel with iOS devices Apple Encryption “Debate” Apple Admits Mistake for ‘Error 53’ iPhone Bricking, Offers Fix D&G Mailbag: Jim Wildman asks for our opinion on Amazon Dash Hackable: Build your own poop database with Amazon Dash Install your own code: Dash Hacking: Bare-Metal STM32 Programming Internet of Things to be used as spy tool by governments: US intel chief Ghost Fleet Hacked Toy Company VTech’s TOS Now Says It’s Not Liable for Hacks Husband learns wife is pregnant from her Fitbit data HT Kevin Chin and Erich Morisse: The new frontier of voter tracking He Said He Was An Undecided Iowan Until He Received This Controversial Mailer From Ted Cruz. 4USXUS Is Your One-Stop Shop For Keeping Up With Your Congressional Representatives Not cool: Hackers demand $3m bitcoin ransom from hospital to unlock vital files Dave on #OpenOrgChat on February 18 and later this year! glibc will destroy your containers from the inside RHEL on Azure Google and Red Hat announce cloud-based scalable file servers White House publishes 2016 and 2017 budget on Github and Medium (h/t matt.micene) Online No One Knows You’re Dead What’s the Stuff Between the Wafers of a Kit Kat? Cutting Room Floor Build your own Arduino-powered virtual reality cycling experience for $40 These LED Lamps Run on Candle Power Subtitled R2-D2 is Bitterly Sarcastic Run DOS-era viruses in your web browser with the Internet Archive’s Malware Museum Internet Archive Does Windows: Hundreds of Windows 3.1 Programs Join the Collection 24 Things You’ll Find In Every Hipster Restaurant For Sale: Nuclear bunker in Northern Ireland Epic ‘Frinkiac’ Search Engine Matches Any Simpsons Quote With Its Still This Boulder Has a Hidden Wi-Fi Router That Needs Fire to Turn On Snoop Dogg Stars in Burger King Training Video Robotic limb turns drummer into three-armed musical cyborg Watch 540 Robots Perform a Synchronized Dance Routine Poison’s “Every Rose Has Its Thorn” Played By An Actual Rose Bush Scratch-And-Sniff Posters Help Mask the Smells of NYC Subways How to Spam People via Telegram, According to a 1928 Handbook Nigerian astronaut lost in space needs $3m to get home – could be a scam Space travel posters from JPL The National Archives Has Released a Coloring Book of Retro Patents So, Dutch Cops Are Teaching Majestic Eagles to Hunt Drones Man’s best friend for conference calls Scalia wordplay is fun. (h/t ghelleks) now I’m fascinated by the idea of machine pareidolia (h/t matt.micene) How am I just now learning about the Falkirk Wheel? (h/t ghelleks) To solve my OPM grievances, I’m securing the services of this attorney. (h/t ghelleks) 5 Ways Companies Manufacture Happiness (h/t davidegts) Are these the permissions that you would expect from a emoji keyboard? (h/t uzoma) “We can safely assume that people sharing an Ubuntu docker based container know and trust one another, and their use of Ubuntu is explicitly covered as personal use in our policy.” (h/t matt.micene)   We Give Thanks The D&G Show Slack Clubhouse for the discussion topics! Jim Wildman, Kevin Chin, Mrs. Egts and  for the mailbag items!

Brakeing Down Security Podcast
2015-049-Can you achieve Security Through Obscurity?

Brakeing Down Security Podcast

Play Episode Listen Later Dec 3, 2015 42:19


That's the question many think is an automatic 'yes'.  Whether your Httpd is running on port 82, or maybe your fancy #wordpress #module needs some cover because the code quality is just a little lower than where it should be, and you need to cover up some cruft This week, Mr. Boettcher and I discuss reasons for obscuring for the sake of #security, when it's a good idea, and when you shouldn't #obscure anything (hint: using #ROT-14, for example) #encryption #infosec Show Notes:  https://docs.google.com/document/d/1PioC2hnQHhm5Xd1SCT4ewvZmZiLcE5pGQuif4Tuk_zE/edit?usp=sharing Direct Link: http://traffic.libsyn.com/brakeingsecurity/2015-049-Security_by_Obscurity.mp3 Mr. Boettcher's Twitter: http://www.twitter.com/boettcherpwned Bryan's Twitter: http://www.twitter.com/bryanbrake TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/ BrakeSec Podcast Twitter: http://www.twitter.com/brakesec Join our Patreon!: https://www.patreon.com/bds_podcast Comments, Questions, Feedback: bds.podcast@gmail.com

security achieve rot obscurity boettcher security through obscurity brakeing down security podcast