goodlisten

Clip

Root Cause Analysis in Cybersecurity
listen on Spotify
53:45 - 56:02 (02:17)

The speaker discusses the importance of companies conducting their own root cause analyses and variant analysis in cybersecurity rather than relying on third party security researchers, and the growth of forensics research to detect and prevent attacks.

Similar Clips
The speaker discusses the importance of risk modeling in relation to international travel and cybersecurity, specifically in regards to visiting countries that have a history of targeting US corporations and individuals.
37:55 - 41:21 (03:25)
listen on Spotify
Cybersecurity
Summary

The speaker discusses the importance of risk modeling in relation to international travel and cybersecurity, specifically in regards to visiting countries that have a history of targeting US corporations and individuals. They also consider the risk of encountering individuals on the Cyber's Most Wanted list and facing potential legal consequences.

Chapter
The Possibility of Indicting US Nation-State Hackers
Episode
53: Shadow Brokers
Podcast
Darknet Diaries
In this episode of The Tim Ferriss Show, Tim interviews his friend Sammy Kamkar, a notorious computer hacker known for creating the fastest spreading virus of all time, and his latest creation, SkyJack, a drone that can hack into other drones.
02:07 - 04:08 (02:00)
listen on Spotify
Hacking
Summary

In this episode of The Tim Ferriss Show, Tim interviews his friend Sammy Kamkar, a notorious computer hacker known for creating the fastest spreading virus of all time, and his latest creation, SkyJack, a drone that can hack into other drones.

Chapter
The Tim Ferriss Show with Sammy Kamkar
Episode
#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones
Podcast
The Tim Ferriss Show
Experts at Citizen Lab worked on oscenting email addresses to identify targets of clusters in the financial sector and politics, including investigative journalists and those scrutinizing companies like Wirecard.
27:04 - 28:29 (01:24)
listen on Spotify
Cluster Targeting
Summary

Experts at Citizen Lab worked on oscenting email addresses to identify targets of clusters in the financial sector and politics, including investigative journalists and those scrutinizing companies like Wirecard.

Chapter
Targeted Clustering
Episode
79: Dark Basin
Podcast
Darknet Diaries
The newly discovered malware uses unpublicized kernel exploits to jailbreak iPhones, enabling it to run any app on the device and collect private data such as location and messaging information, bypassing the App Store's security measures.
11:20 - 14:04 (02:44)
listen on Spotify
Malware
Summary

The newly discovered malware uses unpublicized kernel exploits to jailbreak iPhones, enabling it to run any app on the device and collect private data such as location and messaging information, bypassing the App Store's security measures.

Chapter
iPhone Malware Uses Exploit to Jailbreak and Spy on Users
Episode
100: NSO
Podcast
Darknet Diaries
The Gin Master malware can capture private data from an Android device and send it to an external server.
11:30 - 13:38 (02:08)
listen on Spotify
Android Security
Summary

The Gin Master malware can capture private data from an Android device and send it to an external server. The leader of Google's Android security team discusses the challenges of finding and preventing malware on devices from various manufacturers and non-Google app stores.

Chapter
The Fight Against Malware in Android Devices
Episode
127: Maddie
Podcast
Darknet Diaries