goodlisten

Clip

Root Cause Analysis in Cybersecurity
listen on Spotify
53:45 - 56:02 (02:17)

The speaker discusses the importance of companies conducting their own root cause analyses and variant analysis in cybersecurity rather than relying on third party security researchers, and the growth of forensics research to detect and prevent attacks.

Similar Clips
Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.
07:54 - 11:10 (03:15)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.

Chapter
Vulnerabilities in iPhones and the High Cost of Exploits
Episode
Hire 1 to Hire 10, Sam Gets Hacked, Shaan Buys a $200K NFT, and More with Andrew Wilkinson
Podcast
My First Million
The podcast discusses the basics of zero day vulnerabilities and exploits, which refers to a bug in a software or system that is unknown to its developers, and a program that is crafted to exploit it respectively.
06:56 - 08:31 (01:34)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The podcast discusses the basics of zero day vulnerabilities and exploits, which refers to a bug in a software or system that is unknown to its developers, and a program that is crafted to exploit it respectively. Zero day exploits can potentially allow a hacker to remotely access someone's device without their knowledge and capture confidential information.

Chapter
Explaining Zero Day Vulnerabilities and Exploits
Episode
#266 – Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar
Podcast
Lex Fridman Podcast
The Gin Master malware can capture private data from an Android device and send it to an external server.
11:30 - 13:38 (02:08)
listen on Spotify
Android Security
Summary

The Gin Master malware can capture private data from an Android device and send it to an external server. The leader of Google's Android security team discusses the challenges of finding and preventing malware on devices from various manufacturers and non-Google app stores.

Chapter
The Fight Against Malware in Android Devices
Episode
127: Maddie
Podcast
Darknet Diaries
Police DNA databases are not always as effective in solving cases as initially believed, as many individuals may refuse to give DNA samples even if they match a physical description.
18:16 - 20:38 (02:21)
listen on Spotify
DNA databases
Summary

Police DNA databases are not always as effective in solving cases as initially believed, as many individuals may refuse to give DNA samples even if they match a physical description. Cutting large lists down can still make a difference, however.

Chapter
Cutting a List in Half: Using Genetic Genealogy to Solve Cold Cases
Episode
CAPTURED: A Secret Stalker
Podcast
Crime Junkie
The NSA publishes best practices for securing data, but their offensive data collection techniques remain secretive.
18:18 - 20:42 (02:24)
listen on Spotify
Data Security
Summary

The NSA publishes best practices for securing data, but their offensive data collection techniques remain secretive. Criminals using satellite phones are now aware that they are being tracked.

Chapter
The NSA's Approach To Protecting U.S. Assets And Interests
Episode
83: NSA Cryptologists
Podcast
Darknet Diaries