goodlisten

Chapter

Analyzing Crash Reports for Signs of Hackers
listen on Spotify
11:43 - 19:49 (08:06)

The process of analyzing millions of crash reports a day to determine which ones to prioritize and fix first is a difficult task. However, it is also important to look for signs of potential hacker activity in these reports.

Clips
The task of sorting through millions of crash reports to prioritize issues can be challenging.
11:43 - 15:05 (03:22)
listen on Spotify
Crash Reports
Summary

The task of sorting through millions of crash reports to prioritize issues can be challenging. Solutions such as static analysis tools have been used to fix reliability issues in the past and have resolved thousands of bugs.

Chapter
Analyzing Crash Reports for Signs of Hackers
Episode
57: MS08-067
Podcast
Darknet Diaries
John and the podcast host discuss the challenges of finding new hacker exploits and how studying crash reports from computer systems can help identify signs of hacking.
15:05 - 17:16 (02:10)
listen on Spotify
Hacker Exploits
Summary

John and the podcast host discuss the challenges of finding new hacker exploits and how studying crash reports from computer systems can help identify signs of hacking.

Chapter
Analyzing Crash Reports for Signs of Hackers
Episode
57: MS08-067
Podcast
Darknet Diaries
The funnel for detecting exploits in Microsoft Word has gone from a billion reports a month to a few thousand by narrowing down attacks that occur when a user first opens a document.
17:16 - 19:49 (02:33)
listen on Spotify
Microsoft Word
Summary

The funnel for detecting exploits in Microsoft Word has gone from a billion reports a month to a few thousand by narrowing down attacks that occur when a user first opens a document. It is rare for exploits to occur when a user has been in Word for an extended period.

Chapter
Analyzing Crash Reports for Signs of Hackers
Episode
57: MS08-067
Podcast
Darknet Diaries