Podcasts about TeslaCrypt

  • 14PODCASTS
  • 19EPISODES
  • 41mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 18, 2017LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about TeslaCrypt

Latest podcast episodes about TeslaCrypt

#PCTfacile - Il Primo Podcast Per Avvocati Tecnologici
#46 Backup e Sicurezza, intervista ad Andrea Monguzzi

#PCTfacile - Il Primo Podcast Per Avvocati Tecnologici

Play Episode Listen Later Jul 18, 2017 46:59


Nella puntata #46 approfondiamo il tema sulla #sicurezzainformatica della puntata #45, sul #backup e sul #salvataggio dei dati stessi dopo un attacco informatico che abbiamo subito e di molto altro ancora con un ospite di eccezione. Infatti In questa puntata, ospite ai nostri microfoni nella prima intervista in #presadiretta, registrata il 24/05/2017, è Andrea Minguzzi, sistemista da un ventennio, appassionato di informatica dalla nascita. Andrea aiuta aziende e professionisti a cogliere i benefici e a districarsi dalle insidie dell'era digitale consigliando quale tecnologia adottare in base al tipo di esigenza specifica. Protagonista e attento osservatore delle nuove dinamiche online che sempre più coinvolgono la società presente. In generale, la comparsa del personal computer negli anni '80 e ’90 ha cambiato la società: la tecnologia si è miniaturizzata un tale livello da essere definita come “Personal” in casa e sul lavoro, da qui la definizione di Personal Computer, come #portable (smartphone) e #wearable (smartwatch). La diffusione della tecnologia alla portata di tutti ha portato l’aumento del numero degli utenti, ma anche dei rischi e dei pericoli, tra tutti oggi i professionisti scoprono sulla loro pelle i danni procurati dai ransomware, nelle varie forme di cryptovirus. CryptoLocker, CryptoWall, TeslaCrypt, Locky, Wannacry, Petya, no Petya… Questi sono sono alcuni dei nomi che devi memorizzare, @avvocatotecnologico. Si tratta di alcune varianti di cryptovirus, e sono quelle che ultimamente hanno causato perdite milionarie A riguardo Andrea ha scritto un #ebook, in #free #download, in cui offre soluzioni per prevenire perdite e contrastare eventuali attacchi. Essere bersaglio di un #cryptovirus non è più una possibile eventualità, bensì è una matematica certezza. A te sta decidere come affrontarlo: da vittima ignara o da preparato combattente. [Free Download] => http://www.cryptostop.it/

The CyberWire
Daily: Ransomware: MIRCOP, Cerber, CryptXXX, Bart, TeslaCrypt (& the #95 car). Intel selling security unit?

The CyberWire

Play Episode Listen Later Jun 27, 2016 10:32


In today's podcast we offer a quick survey of the vast and spreading Ransomware landscape. (And talk about some other bits of cybercrime as well, but if Willie Sutton were alive today, and had an Internet connection, he'd be into ransomware.) Brexit's implications remain under study and speculation, but many see a shift in the tech startup scene in the general direction of Berlin. Most observers have now concluded that the DNC hack was a Russian job (and not the work of a lone hacktivist). Joe Carrigan from the Johns Hopkins University Information Security Institute reminds us why we shouldn't reuse passwords.

The CyberWire
Daily & Week in Review: Breach reactions. Attention grid substations: squirrels, and snakes, and monkeys, oh my...

The CyberWire

Play Episode Listen Later Jun 10, 2016 19:25


In today's podcast we hear from the experts on how old data breaches can cross-contaminate users' other accounts. Point-of-sale problems seem ready to grow in the recent Wendy's incident. Ransomware's shifting landscape sees Locky's distribution botnet vanish (for unclear reasons), Crysis replace TeslaCrypt, and CryptXXX jump exploit kits. Some startups get some nice VC rounds. We hear about the law surrounding mobile location data, and we're reminded of cyber-physical threats to security systems and critical infrastucture. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews an important circuit court privacy decision, and researcher Wesley Wineberg warns us about embedded security cameras.

Securit13 Podcast
Эпизод 61 - It was, It will, It can be...

Securit13 Podcast

Play Episode Listen Later Jun 5, 2016 74:15


Intro / Outro We are Connected (the Chemma Chi  Remix) by SackJo22 http://dig.ccmixter.org/files/SackJo22/48168 00:01:39 GCHQ joins Twitter https://twitter.com/GCHQ 00:02:42 Интервью с Андреем Кузьменко. Связаться с Андреем можно в LinkedIn https://goo.gl/nYXCwT  или по почте andrii.kuzmenko@ua.ibm.com 00:05:53 Your car can be held for ransom http://goo.gl/k3CPOE Car hacking news: Ransomware threat could reach auto dealerships http://goo.gl/Hwr3Ep Ransomware cyberattacker did not pretend to be Car-Part.com employee http://goo.gl/yDWS21 Visa USA | Visa Everywhere | Innovation | Connected Car https://goo.gl/dPqFfw Ditch the Wallet and Pay With Your Car http://goo.gl/yrvQgw https://security.love/Pastejacking/ 00:10:38 Hospital pays ransom, ransomware demands more money http://goo.gl/MIfeas 00:10:47 Observations and thoughts on the LinkedIn data breach https://goo.gl/BlUfgW 00:19:48 Heart surgery stalled for nearly 5 mins as anti-virus scan crashes computers https://goo.gl/duIz16 00:33:19 Pornhub said to be compromised, shell access available for $1,000 http://goo.gl/X2jbUz 00:37:04 У Києві поліція затримала кіберзлодіїв, які обкрадали банкомати з допомогою вірусу http://goo.gl/It8mYn 00:51:33 Symantec antivirus bug allows utter exploitation of memory http://goo.gl/yAehKc 00:56:02 Книга от гостя On the Road by Jack Kerouac http://goo.gl/HSO7fs 00:58:05 CVE-2016-4117: Flash Zero-Day Exploited in the Wild https://goo.gl/QMhPHS 01:00:08 Взломан украинский реестр недвижимости http://goo.gl/SHFyEB 01:01:40 Ukrainian hacker pleads guilty to insider trading in US http://goo.gl/dtf8jy 01:02:16 Observations and thoughts on the LinkedIn data breach https://goo.gl/BlUfgW 01:04:06 SWIFT Warns of Second Bank Attack via PDF Malware https://goo.gl/2x9DFX U.S. banks scrutinize SWIFT security after hacks: reports http://goo.gl/iCuJZS Exclusive: UK banks ordered to review cyber security after SWIFT heist http://goo.gl/EVkOvU 01:05:23 Hacker fans give Mr. Robot website free security checkup http://goo.gl/pgMRmI 01:06:13 TeslaCrypt shuts down and Releases Master Decryption Key http://goo.gl/mvdBF1 01:06:54 You really shouldn't download 'WhatsApp Gold' http://goo.gl/Ku3Buc 01:07:45 Google Set to Kill SSLv3, RC4 in SMTP, Gmail in June https://goo.gl/7JcYAY Видео запись эпизода на нашем канале https://www.youtube.com/channel/UCGYHYOm_J3zpyE5jCNzAHJg

Paul's Security Weekly TV
Security Weekly #465 - Security News

Paul's Security Weekly TV

Play Episode Listen Later May 27, 2016 50:04


Need a more in-depth News coverage? Here on Security Weekly we stay up-to-date on the latest Stories! Hear about LinkedIn Zombies, Top 10 Security Podcasts, When encryption is not enough for HIPAA, and Teslacrypt shuts down and releases master decryption key!

ITbende
ITbende podcast nr. 354: TeslaCrypt

ITbende

Play Episode Listen Later May 25, 2016 54:03


De Bende: Bart van Klaveren, Luc Sala en Martin Broerse. Feedback Bitlove Bende Torrents Onderwerpen via PodcastPlayer Category Download de MP3

The CyberWire
Daily: Good guy update: SWIFT. Bad guy update: Turla, CryptXXX, DMA Locker, Flash 0-day... Bonus: Scunthorpe Problem.

The CyberWire

Play Episode Listen Later May 24, 2016 11:57


In today's podcast, we hear about Turla's return, this time in an espionage campaign against Switzerland's RUAG. The Panama Papers and other hacks prompt reiteration of lots of good, if familiar advice, some of it directed at the US Congress and other small businesses. The TeslaCrypt proprietors seem less remorseful than resourceful, as they shift to CryptXXX. SWIFT plans to announce a security upgrade today. US Cyber Command announces the winners of its $460 million IDIQ. Guccifer prepares to cop a plea, and the Scunthorpe Problem surfaces in Oxfordshire. We also hear about cloud storage security from Quintessence Labs, and Protemus talks to us about medical records' privacy.

Sophos Podcasts
Chet Chat 241 - May 21, 2016

Sophos Podcasts

Play Episode Listen Later May 22, 2016 12:55


Join Sophos experts John Shier and Paul Ducklin for the latest episode of our security podcast. This week: TeslaCrypt gives up its master key; iOS researcher fights with Apple; iPad Pro users complain of "bricked devices"; Bing gets tough on fake support; Mr Robot website has Mr-Robot-style security hole; and... please vote for the Chet Chat in the 2016 European Security Blogger awards.

apple robots ios bing ipad pro teslacrypt paul ducklin
Segurança Legal
Episódio #102 – Decretos e Regulamentação da Tecnologia

Segurança Legal

Play Episode Listen Later May 21, 2016 73:48


Neste episódio falamos sobre os últimos decretos, relacionados à tecnologia, publicados no apagar das luzes do governo anterior. Resumo de notícias em 3:15. Tema principal em 17:47. Shownotes  Resumo de notícias A morte do TeslacryptContinue reading

The CyberWire
Daily & Week in Review: TeslaCrypt says "sorry, here's the key." 50-cent-ers troll China.

The CyberWire

Play Episode Listen Later May 20, 2016 17:50


In today's podcast, we follow moves to upgrade US Cyber Command to a Unified Combatant Command. We follow developments in Operation Groundbait, Phineas Phisher's latest, and the discovery of China's 50-cent-ers. Conficker is still out and active eight years after patching We take a look at industry news, and hear about how TeslaCrypt may be closing up shop. Our expert today is Accenture Labs' Malek Ben Salem who discusses semantic technology for cyber defense. We'll also hear from historian and author Abby Smith Rumsey who'll talk about her book, “When We are No More: How Digital Memory Memory Will Shape Our Future." 

Aussie Tech Heads
Episode 482 - 07/04/2016

Aussie Tech Heads

Play Episode Listen Later Apr 7, 2016 71:39


Cloud POS vendor Square adds 490 Australian resellers Reward for dobbing in pirates quadruples to $20,000 Sydney school bans laptops: labels them 'scandalous waste of money' Bitdefender's free tool protects against TeslaCrypt, Locky, CTB-Locker ransomware FBI agrees to unlock another iPhone in homicide case Hackers charge big bucks for stolen Aussie creds Telstra customers hammer network on free data day Kodak launches new Super 8 camera US Army hopes to outfit soldiers with tiny drones by 2018 NASA's use of HoloLens puts you on Mars with Buzz Aldrin Apple Admits To Serious iOS 9.3.1 Problem Will Apple's FBI Tussle Take a Bite Out of the Brand? Tesla steals the show with the Model 3 --- Send in a voice message: https://anchor.fm/aussietechheads/message

Aussie Tech Heads SD Video
Episode 482 - 07/04/2016

Aussie Tech Heads SD Video

Play Episode Listen Later Apr 7, 2016 71:39


Cloud POS vendor Square adds 490 Australian resellers Reward for dobbing in pirates quadruples to $20,000 Sydney school bans laptops: labels them 'scandalous waste of money' Bitdefender's free tool protects against TeslaCrypt, Locky, CTB-Locker ransomware FBI agrees to unlock another iPhone in homicide case Hackers charge big bucks for stolen Aussie creds Telstra customers hammer network on free data day Kodak launches new Super 8 camera US Army hopes to outfit soldiers with tiny drones by 2018 NASA's use of HoloLens puts you on Mars with Buzz Aldrin Apple Admits To Serious iOS 9.3.1 Problem Will Apple's FBI Tussle Take a Bite Out of the Brand? Tesla steals the show with the Model 3

Podcast zu Onlinespielrecht vom Games-Anwalt
Tipps gg Erpressungs-Trojaner / Hilfe bei Ramsomware: Games-Anwalt

Podcast zu Onlinespielrecht vom Games-Anwalt

Play Episode Listen Later Mar 29, 2016 9:04


Angst geht bei PC-Nutzern um: Erpressungstrojaner wie Locky, Petya oder TeslaCrypt befallen immer mehr Rechner auch in Deutschland. Sie verschlüsseln alle wichtigen Daten auf den Festplatten und rücken den Schlüssel erst nach Zahlung eines Lösegelds raus - wenn denn die Schlüssel übermittelt werden. Denn Ehrenmänner (und Frauen) sind die Entwickler dieser Trojaner nicht. Henry Krasemann, der Games-Anwalt von GamersGlobal.de und Datenschutz-Jurist, gibt Tipps, wie man den Befall mit diesen Schädlingen verhindert und was man tun sollte, wenn doch etwas passiert ist. Hier klicken zum Video bei YouTube.

Hey Techies Show
Episode 42 – March 3, 2016

Hey Techies Show

Play Episode Listen Later Mar 5, 2016 104:42


Show notes – http://heytechiesshow.com/shows/hts42/ Michael, Bruce, and The Guru discuss NASA and supersonic flight. A Google car plays chicken with a bus. Netflix jumps to Amazon. Police UAV’s hackable. Apple vs the FBI. ABC News interview with Tim Cook. German court rules on FB. Teslacrypt and Alphacrypt, owner of SpyHunter sues BleepingComputer.com. A call from […]

Unsupervised Learning
T1SP: Episode 29

Unsupervised Learning

Play Episode Listen Later Feb 23, 2016 19:17


Apple, Trump, FBI, Glibc, Teslacrypt, Hospital hack, more…

Tech Talk Radio Podcast
October 17, 2015 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Oct 17, 2015 56:55


Inventors of the microchip, FORTRANs anniversary (released October 1956), Wi-Fi calling (why is it useful, which carriers provide it), TeslaCrypt (latest Windows ransomware, Microsoft fix released), Device of the Week (Leef iAccess iOS microSD reader, iPhone memory expansion), Profiles in IT (Jef Raskin, Father of the MacIntosh), Tesla highway autopilot (released with latest software upgrade), drone registration (will be required by USDOT), Drone Defender (shoots down drones with targeted radio waves), Everybody Codes Now! (founder honored by Whitehouse as Champion of Change), iPhone Chipgate (A9 chip controvery, Samsung vs TMSC, minimal difference), first computer virus (Elk Cloner, a floppy disk boot sector virus, released 1982). This show originally aired on Saturday, October 17, 2015, at 9:00 AM EST on WFED (1500 AM).

Tech Talk Radio Podcast
October 17, 2015 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Oct 17, 2015 56:55


Inventors of the microchip, FORTRANs anniversary (released October 1956), Wi-Fi calling (why is it useful, which carriers provide it), TeslaCrypt (latest Windows ransomware, Microsoft fix released), Device of the Week (Leef iAccess iOS microSD reader, iPhone memory expansion), Profiles in IT (Jef Raskin, Father of the MacIntosh), Tesla highway autopilot (released with latest software upgrade), drone registration (will be required by USDOT), Drone Defender (shoots down drones with targeted radio waves), Everybody Codes Now! (founder honored by Whitehouse as Champion of Change), iPhone Chipgate (A9 chip controvery, Samsung vs TMSC, minimal difference), first computer virus (Elk Cloner, a floppy disk boot sector virus, released 1982). This show originally aired on Saturday, October 17, 2015, at 9:00 AM EST on WFED (1500 AM).

Paul's Security Weekly TV
Hack Naked TV: NSA SIMP, ProxyGambit, TeslaCrypt (July 17, 2015)

Paul's Security Weekly TV

Play Episode Listen Later Jul 18, 2015 6:15


simp teslacrypt hacknaked hack naked tv
La Tecnología para todos
16. Alerta virus CryptoLocker

La Tecnología para todos

Play Episode Listen Later May 11, 2015 15:35


Hoy os hablamos del virus CryptoLocker que está causando auténticos destrozos en las empresas. Es un virus de la familia de los Cryto-malware o Ransonware, son muy peligrosos y tienen la capacidad de secuestrar los archivos de tu ordenador cifrando o encriptando todos aquellos que se encuentra en su camino.Como ya sabéis tenéis a vuestra disposición un formulario de contacto y una lista de distribución. Podéis hacer uso de ellos como os venga en gana.Los virus llamados generalmente Crypto-malware como CrytoLocker, CriptoWall o CryptoFortress están muy en auge en España debido a que recientemente se ha producido un ataque masivo.Estos virus encriptan los archivos de tu ordenador de forma aleatoria buscando ciertos patrones como archivos .doc, .pdf. .csv, etc... Es complicado para los antivirus detectarlos a tiempo ya que salen nuevas variantes constantemente. Realmente no afectan a los archivos del sistema pudiendo funcionar con normalidad las máquinas infectadas, lo único es que no se puede acceder a los archivos bloqueados.La mayoría de ellos actúa en cinco etapas.InstalaciónLa infección comienza al recibir un e-mail como si fuera de Correos. En el e-mail nos informan que tenemos una carta certificada a nuestro nombre y que vayamos al enlace adjunto para descargarnos la notificación.Es una infección silenciosa y modifica el registro de Windows donde introduce unas claves que inician el virus cada vez que se arranca el ordenador.Contacto con los malhechoresTras ser infectado el virus comienza el proceso y lo primero es contactar con su cuartel a través de Internet. Prueba con cada una de las direcciones que tiene almacenadas en busca de una respuesta. En cuanto la encuentra intercambia las claves de cifrado. Ahora ellos son los únicos que pueden descifrar tus archivos.Secuestro de archivosEl virus elige archivos de tu disco duro con un patrón definido como pueden ser archivos de Office, AutoCAD, archivos de datos, Photoshop, etc...Cuando los ha encontrado los cifra con una clave muy potente siendo imposible, a partir de este momento, abrirlos si no se tiene el antídoto o claves originales, los cuales están en posesión de los criminales.Existe una variante que se llama TeslaCrypt que secuestra partidas y archivos esenciales de juegos instalados en tu ordenador.Es importante destacar que solo infecta a sistemas operativos Windows. Esto no implica que no pueda afectar a máquinas con sistemas operativos como Mac o Linux. Lo cierto es que una vez instalado el virus en un ordenador, intentará atacar a todas aquellas unidades que estén a su alcance ya sea mediante red o USB. De este virus no se escapa nadie.Petición de rescateUna vez infectado y encriptado los archivos comienza la petición de rescate. Lo típico es a través de un navegador web, mostrando una página al arrancar nuestro navegador, donde se dan las instrucciones claras y concisas de los pasos que tienes que seguir para pagar el rescate.Pago de rescateLa cuantía del rescate varía respecto a la mutación, pero puede llegar a ser hasta 500€. Normalmente te dan un tiempo de entre dos y tres días para pagarlo. Trascurrido este tiempo puede pasar dos cosas, o aumenta el rescate o directamente desaparece la opción de pagar.El pago se suele hacer en una moneda virtual que se llama Bitcoin. Es una moneda que es muy difícil de identificar.Los expertos en materia de seguridad son unánimes y recomiendan no pagar a menos que sea estrictamente necesario. Pagar no garantiza que te den la clave correcta, aunque es verdad que en la gran mayoría de casos el pago ha funcionado. Además, estás financiando a los criminales. Esto implica que tendrán más fondos para crear virus cada vez más potentes.Recurso del díawww.eset.esHoy os recomendamos un antivirus español, más concreto de Alicante. Es el Nod32 de la casa Eset. Es un antivirus que funciona muy bien y no consume muchos recursos de tu sistema lo que le hacen ser muy ligero en términos de proceso. Ofrece una prueba de 30 días gratuita y el precio puede variar pero está entorno a los 28€/año. Este precio se va reduciendo año a año según vas renovando y tienen ofertas especiales para múltiples licencias.Pues hasta aquí el programa de hoy, esperamos que os haya sido de ayuda y llevar cuidado con los virus, hay que tener siempre un antivirus instalado y actualizado. Como siempre agradeceros todos vuestros comentarios y valoraciones en las plataformas iTunes, ivoox y Spreaker, muchas gracias.