Podcasts about weak passwords

  • 30PODCASTS
  • 31EPISODES
  • 32mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 26, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about weak passwords

Latest podcast episodes about weak passwords

All TWiT.tv Shows (MP3)
Hands-On Windows 178: Microsoft's Password Manager

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 26, 2026 13:28


Think Microsoft's password manager in Windows 11 is enough? Paul Thurrott breaks down why even devoted Edge users might want to look elsewhere for true password security. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord. Sponsor: canary.tools/twit - use code: TWIT

Darn IT Podcast
The LastPass Breach That Never Ended: How Weak Passwords Still Cost Millions

Darn IT Podcast

Play Episode Listen Later Dec 28, 2025 9:19


In this journey from Darnley's Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident.But this isn't just a story about what happened. It's about what never stopped.From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn narrative uncovers how one breach spiraled far beyond the headlines...into homes, businesses, and the darkest corners of the web.Whether you're a cybersecurity pro, a digital minimalist, or someone who's ever reused a password (you know who you are), this episode will shift the way you think about data security.☕ Settle in. The café is dim. The breach... still echoes after all these years...Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

cost millions settle ended mfa breach lastpass digital security cybersecurity podcast darnley weak passwords cybercafe
The CyberWire
Weak passwords meet strong motives

The CyberWire

Play Episode Listen Later Dec 11, 2025 31:10


CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha's full conversation here.  New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release) The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report)  Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses.  Resources: Rubrik's Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. Selected Reading CISA: Pro-Russia Hacktivists Target US Critical Infrastructure New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine North Korea-linked ‘EtherRAT' backdoor used in React2Shell attacks | SC Media Thousands of Exposed Secrets Found on Docker Hub - Flare Hackers exploit unpatched Gogs zero-day to breach 700 servers IBM Patches Over 100 Vulnerabilities - SecurityWeek Ransomware IAB abuses EDR for stealthy malware execution US charges former Accenture employee with misleading feds on cloud platform's security - Nextgov/FCW Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Checklist by SecureMac
Checklist 450 - Weak Passwords and Deepfake Celebrities 2025

The Checklist by SecureMac

Play Episode Listen Later Nov 21, 2025 21:03


It is that time of year. Time to reflect… to look back… to realize how little we've learned, and shake our heads in sadness. 123456 is still the most used password according to a new study - and people still think that Taylor Swift is trying to sell them stuff on social media. We're looking at weak passwords and deepfake celebrities for 2025 on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

Security Squawk
How Dell, Weak Passwords and Ransomware Are Still Crushing Big Brands

Security Squawk

Play Episode Listen Later Jul 22, 2025 25:24


Another week, another round of cyber fails making headlines. In this episode of Security Squawk, we break down how some of the biggest names in tech and business are still getting owned by basic mistakes. This week: Dell's breach exposes critical platforms to extortion groups ️ A 158-year-old company destroyed by one weak password Ransomware still targeting hospitals while reports claim it is in decline If you think big brands have it figured out, think again. Stay informed and stay protected. Watch or listen now for insights you will not hear anywhere else. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...

CanadianSME Small Business Podcast
Weak Passwords = Open Door? The Shocking Cyber Truth!

CanadianSME Small Business Podcast

Play Episode Listen Later Jul 3, 2025 24:59


Welcome to the CanadianSME Small Business Podcast, hosted by Maheen, where we explore essential strategies and technologies for staying safe and secure in today's digital world. In this episode, we dive deep into the realm of online security, the critical role of password managers, and the fascinating psychology behind our password habits.With cyber threats growing more sophisticated and human error remaining a key vulnerability, this discussion offers valuable insights on how individuals and businesses can strengthen their defenses in an ever-evolving landscape.Joining us today is Karolis Arbaciauskas, Head of Product & Business Development at NordPass, a secure, user-friendly password manager developed by the cybersecurity experts behind NordVPN.Key Highlights:1. Evolution of Online Security: How digital threats have changed over time and why strong password hygiene is more crucial than ever. How NordPass helps protect users and businesses.2. Psychology of Weak Passwords: Why people still use weak or reused passwords despite risks, and how NordPass uses research to drive awareness and behavioral change.3. Building a Privacy-First Digital Future: NordPass's zero-knowledge architecture and commitment to data protection, empowering users to control their digital lives.4. Global Password Trends: Surprising findings from NordPass's research on common workplace passwords worldwide and the security risks they pose.5. The Future of Authentication: The path beyond passwords, the role of passkeys, and how NordPass is pioneering the next evolution in authentication.Special Thanks to Our Partners:RBC: https://www.rbcroyalbank.com/dms/business/accounts/beyond-banking/index.htmlUPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/For more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.

Cracking Cyber Security Podcast from TEISS
teissTalk: Weak passwords – the hidden threat lurking in your organisation

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later May 6, 2025 45:06


Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310

The Cyber Threat Perspective
Episode 116: Painfully Persistent Problems - Weak Passwords

The Cyber Threat Perspective

Play Episode Listen Later Nov 27, 2024 35:52


In this episode, we're diving into one of the most enduring cybersecurity challenges—weak passwords. We'll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we're breaking down what it takes to fortify your systems against attackers exploiting the weakest link. Sourceshttps://www.verizon.com/about/news/2023-data-breach-investigations-report?utm_source=chatgpt.comhttps://blog.1password.com/challenges-of-shadow-it/https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024?msockid=2e875ee0e1fe64d22f854aa6e0746523Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com

persistent painfully weak passwords
Tech Talk with Mathew Dickerson
Blue Batteries for Baby Safety, Banning Weak Passwords, AI Saving Lives and a Massive 3D Printer.

Tech Talk with Mathew Dickerson

Play Episode Listen Later May 12, 2024 50:41


Blue Batteries for Baby Safety: A Colourful Caution against Coin Cells.  Printed Perfection: Pioneering Progress in Polymer Palaces.  AI Alert Advances: Saving Lives with Smart Technology.  Password Protection Paradigm: UK's Pioneering Policy.  Rapid Rails: Revolutionising US Travel with Speed and Sustainability.  Phishing Fiasco: Foiling a Formidable Fraudulence Factory.  Solar Splendour: Scientists Spin Stretchable Solar Cells for Smart Wear.  Outage Outcry: Protecting Triple-0 in Telecom Turmoil.  Google's Gemini Galore: Gearing up with Generative AI. 

Cybercrime Magazine Podcast
Security Nudge. UK Bans Devices With Weak Passwords. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later May 7, 2024 1:31


Are you prone to using easy-to-remember passwords? If you live in the UK, it's time to change your habits: a new law has made the country the first place in the world where it is actually illegal to use weak passwords on connected devices. According to The Guardian, the new laws mean all manufacturers of smartphones, TVs, smart doorbells, and other devices must protect their connected devices by prompting users to change any default or common passwords. Whether you live in the UK or not, changing default passwords on your devices is an important first step during the setup process. Leaving these passwords unchanged, or setting them to something that is easily guessable, such as 12345 or ‘password', is like leaving your front door open for cyber criminals. And once they get in, those criminals can take over your devices and use them to hack others, send spam emails, and conduct the aggressive denial of service campaigns that regularly bring down company websites. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

The technology blog and podcast
TSB 148: Nation-State Actors go after cloud providers who have customers that have weak passwords

The technology blog and podcast

Play Episode Listen Later Jun 15, 2023 145:34


Welcome to the security box, podcast 148. On this podcast, I may have a complete moron with a company, we'll have news, notes and more. The topic deals with passwords and it isn't looking that great. Morons We stand in solidarity with you, Reddit users. Reddit is taking advantage of the situation just like Twitter did so many months before. Apparently, Reddit has decided to do the same thing. One article says they're only charging $0.24 per 1,000 calls to their API, but people indicate its much different. The cost is $12,000 per month or roughly up to $20 million per year according to some estimates. Here are the blog posts as of writing in regards to Reddit. Accessibility apps will be free for API use on Reddit Reddit communities to go dark on June 12th, setting themselves to private Reddit to charge $12k for 50k calls to API? Its Official, Apollo shutting down Here's an ars article on Apollo Van Nuys is not too far from where I live in a town called Woodland Hills. I go through there every time I take the bus. According to a KNX article which is very short, it says a guy from there was caught selling drugs on the dark web. Here is the blog post from the tech blog titled Van Nuys man pleads Not Guilty to selling drugs online which links to the KNX article. In Case you Missed it In Case you missed it, I finished Tracers in the Dark. It was a very interesting book, one I didn't want to put down until I did. Book Review: Tracers in the dark, by Andy Greenberg is the blog post and I'm not giving anything away. Our Topic: Weak Passwords Our topic comes to us from Cyberscoop. It was an interesting read. The article is title Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says and I found it interesting. This proves again that we need to make sure that our users are using strong passwords or pass phraises. Don't worry, Cyber Security Awareness Month is coming up, so TSB will be starting all over again with basic stuff when it comes to your security. I hope that every single person will enjoy today's program, and thanks so much for listening! Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.

Google Workspace Recap
Google Chat is Catching Up To Slack with New Features including Announcement Only Rooms

Google Workspace Recap

Play Episode Listen Later Apr 19, 2023 64:17


A monster episode this week with updates to Chat, Cloud Search, Sites, Access Approvals, Classroom, Drive, and more. Over Passover, I was offline a lot and had the chance to catch up on some reading and I absolutely tore through Losing the Signal which is the story of the epic rise and eventual fall of Blackberry. They changed how we communicate and not only got completely blindsided by Apple and then Google, they completely refused to believe this is the future people would want. Now I loved my Crackberrys and had many different models over the years including the touch screen Storm Slider, and the design was getting better but the OS was just trash at that point. This book goes behind the scenes and now I know why. They are releasing a new movie based on this book called Blackberry and if you are anything like me, I recommend reading the book and seeing the movie. It releases May 12th. Blackberry Trailer: https://youtu.be/cXL_HDzBQsM #notsponsored Click here to learn all about the Google ChromeOS Administrator Certification and how to pass it: https://youtu.be/KHPy_n0qVk8

Cyber Security Headlines
Google Cloud's weak passwords, pressure on breach disclosure, Discord cooperating on Pentagon leak

Cyber Security Headlines

Play Episode Listen Later Apr 14, 2023 6:48


Weak passwords targeted on Google Cloud Potential IT snitches warned about employment stitches Discord cooperating with leaked document investigation And now a word from our sponsor, AppOmni  Can you name all the third party apps connected to your major SaaS platforms, like Salseforce,  Microsoft 365, or Google Workspace? What about the data these apps can access? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk.  With AppOmni, you get visibility to all third party apps and SaaS-to-SaaS connections — including which end users have enabled them, and the level of data access they've been granted. Visit AppOmni.com today to request a free risk assessment. 

First Light with Rachel Smalley
CERT is campaigning for us to upgrade weak passwords to strong and secure passphrases to reduce our risk of falling victim to a cyber threat

First Light with Rachel Smalley

Play Episode Listen Later Jul 19, 2022 5:55


See omnystudio.com/listener for privacy information.

Retirement Lifestyle Show  with Roshan Loungani, Erik Olson & Adrian Nicholson

Today on the Retirement Lifestyle Show, Roshan Loungani, Erik Olson, and Adrian Nicholson break down some of the leading password managers and explain why it might be a good idea to have a password manager. They talk about the reasons why most people don't have a password manager, the risks of reusing similar passwords, and the best password managers for business or family use. [04:30] How to Hack-Proof Your Passwords [06:40] Top Brands in the Password Manager Space [10:23] The Best Password Managers For Businesses [12:00] Key Features of the Keeper Software Manager [13:15] Why Roshan Settled on LastPass Password Manager [15:55] The Reason Why Most People Don't Have a Password Manager [18:27] The Risks Associated with Weak Passwords [21:00] How to Save Your Passwords Automatically [22:51] Password Managers, Browser Extensions, and VPN Use [30:10] Understanding the Google Authentication Tool [32:03] The Trusted Contacts and Family Feature [38:15] Parting Thoughts Roshan can be reached at roshan.loungani@aretewealth.com or at 202-536-4468. Erik can be reached at erik.olson@aretewealth.com or 815-940-4652. Adrian can be reached at adrian.nicholson@aretewealth.com or at 703-915-8905. Follow Us At: Website: https://retirementlifestyleshow.com/ https://www.retirewithroshan.com https://youtu.be/hKVzI87v0tA https://twitter.com/RoshanLoungani https://www.linkedin.com/in/roshanloungani/ https://www.facebook.com/retirewithroshan/ https://www.linkedin.com/in/financialerik/ https://www.linkedin.com/in/adrian-nicholson-74b82b13b/ #retirementlifestylepodcast #fire #podcast #FI #Retire #retirewithroshan #BAM #BusinessAsMission #ImpactInvesting All opinions expressed by podcast hosts and guests are solely their own. While based on information they believe is reliable, neither Arete Wealth nor its affiliates warrant its completeness or accuracy, nor do their opinions reflect the opinion of Arete Wealth. This podcast is for general informational purposes only and should not be regarded as specific advice or recommendations for any individual. Before making any decisions, consult a professional.

Beslow Musictalk
Weak Passwords

Beslow Musictalk

Play Episode Listen Later Mar 1, 2022 12:48


I came across this article on CNBC about passwords that are used by people that can't be easily hacked into on this show we help you with what you should not need to do when creating a password and a top 20 passwords used that shouldn't be if you want more you can go to the article by Tom Huddleston @ https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html --- Send in a voice message: https://anchor.fm/joseph-beslow7/message

cnbc weak passwords tom huddleston
The Bid Picture - Cybersecurity & Intelligence Analysis
11: Weak Passwords, Intimate Pictures and Videos, Fake Court Affidavits & a Possible 32-Year Prison Sentence

The Bid Picture - Cybersecurity & Intelligence Analysis

Play Episode Listen Later Mar 12, 2021 28:25


In this episode, host Bidemi Ologunde presents an incident where two young men are awaiting sentencing for breaking into female students' university email accounts and then gaining further access into their social media accounts to steal their nude pictures and trade them with their co-conspirators.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).

Real Funny Stories
112: Barista Confessions

Real Funny Stories

Play Episode Listen Later Nov 30, 2020 33:05


Tree Humper, Weird Drive-thru Stories, Weak Punishment, Meat-eating Vegetarian Babysitter, Middle School Pepper Eating Contest, Weak Passwords, Criminal Brings Child to Work, Black Market COVID-19 Tests, Barista Confessions   Join our community here to keep laughing!

Curiosity Daily
The 3-Encounter Rule, Why Weak Passwords Survive, and Saturn’s Rings Aren’t as Old as We Thought

Curiosity Daily

Play Episode Listen Later Jan 15, 2020 10:49


Learn about how your weak passwords can get approved even when they shouldn’t; why Saturn’s rings might not be as old as we thought; and how much time you should spend with someone to know if you really enjoy their company. Sources: The Top 100 Worst Passwords of 2019 | SplashData — https://www.teamsid.com/100-50-worst-passwords-2019/  'Inconsistent and misleading' password meters could increase risk of cyber attacks | EurekAlert! — https://www.eurekalert.org/pub_releases/2019-12/uop-am121819.php  2019 Data Breach Investigations Report | Verizon — https://enterprise.verizon.com/resources/reports/dbir/  Password meters: inaccurate advice offered inconsistently? | Computer Fraud & Security, Volume 2019, Issue 11, November 2019 — https://www.sciencedirect.com/science/article/abs/pii/S1361372319301162?via%3Dihub  Ancestor of Humans Lived With Dinosaurs | Seeker — https://www.seeker.com/ancestor-of-humans-lived-with-dinosaurs-1768223125.html  Are Saturn’s Rings Really as Young as the Dinosaurs? | Quanta Magazine — https://www.quantamagazine.org/are-saturns-rings-really-as-young-as-the-dinosaurs-20191121/  The origin of Saturn's rings and moons | Science — https://science.sciencemag.org/content/364/6445/1028  Measurement and implications of Saturn’s gravity field and ring mass | Science — https://science.sciencemag.org/content/364/6445/eaat2965  The 3-Encounter Rule | The Art of Manliness — https://www.artofmanliness.com/articles/the-3-encounter-rule/  Relational mate value: Consensus and uniqueness in romantic evaluations. | Journal of Personality and Social Psychology — https://psycnet.apa.org/record/2014-08116-001 Relational Mate Value: Consensus and Uniqueness in Romantic Evaluations | Journal of Personality and Social Psychology (PDF) — https://static1.squarespace.com/static/504114b1e4b0b97fe5a520af/t/536558a7e4b00d4ffa0c60a0/1399150759190/EastwickHunt2014JPSP.pdf  Amazon smart speaker users: you can listen to our podcast as part of your Amazon Alexa Flash Briefing! Just click or tap “enable” here: https://curiosity.im/podcast-flash-briefing. 

ProactiveIT
ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware

ProactiveIT

Play Episode Listen Later Dec 20, 2019 71:01


This is the ProactiveIT Podcast.  This Week: The latest in IT and Cyber Security news plus Weak Passwords, schools targeted by ransomware and HIPAA Right of Access Explained. This is... The post ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware appeared first on Nwaj Tech - Information Tech & Cloud Support.

AT&T ThreatTraq
10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq

AT&T ThreatTraq

Play Episode Listen Later Oct 11, 2018 23:42


10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq

Paul's Security Weekly
Hack Naked News #192 - October 9, 2018

Paul's Security Weekly

Play Episode Listen Later Oct 9, 2018 24:32


This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News!   Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly 

california google wifi hackers hacking breach british airways google plus tenable xss mikrotik security weekly hnn paul asadoorian weak passwords ai hunter acunetix hacknaked hack naked news
Hack Naked News (Audio)
Hack Naked News #192 - October 9, 2018

Hack Naked News (Audio)

Play Episode Listen Later Oct 9, 2018 24:32


This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News!   Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly 

california google wifi hackers hacking breach british airways google plus tenable xss mikrotik security weekly hnn paul asadoorian weak passwords ai hunter acunetix hacknaked hack naked news
Hack Naked News (Video)
Tenable, Google+, and Weak Passwords - Hack Naked News #192

Hack Naked News (Video)

Play Episode Listen Later Oct 9, 2018 24:41


Tenable Researcher Reveals Extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, Weak passwords are being banned in California, and Code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit http://hacknaked.tv to get all the latest episodes!

All JavaScript Podcasts by Devchat.tv
JSJ 294: Node Security with Adam Baldwin

All JavaScript Podcasts by Devchat.tv

Play Episode Listen Later Jan 4, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

future security panel suck incorporate tokens made in america dependency node utf npm pwned adam baldwin advisories circleci nsp two factor charles max wood npx javascript jabber weak passwords ng conf radical price joe eames bit rot lift security
JavaScript Jabber
JSJ 294: Node Security with Adam Baldwin

JavaScript Jabber

Play Episode Listen Later Jan 3, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

future security panel suck incorporate tokens made in america dependency node utf npm pwned adam baldwin advisories circleci nsp two factor charles max wood npx javascript jabber weak passwords ng conf radical price joe eames bit rot lift security
Devchat.tv Master Feed
JSJ 294: Node Security with Adam Baldwin

Devchat.tv Master Feed

Play Episode Listen Later Jan 3, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

future security panel suck incorporate tokens made in america dependency node utf npm pwned adam baldwin advisories circleci nsp two factor charles max wood npx javascript jabber weak passwords ng conf radical price joe eames bit rot lift security
Professionally Evil Perspective
Default or Weak Passwords and Other Mis-configurations

Professionally Evil Perspective

Play Episode Listen Later Apr 15, 2013 23:59


In this Episode, Kevin, James and Jason discuss implications of using default or weak credentials on systems and applications.  In addition, they discuss some other mis-configurations regarding HTTP Methods and Web Server file accessibility (web.xml).