The speaker discusses the importance of companies conducting their own root cause analyses and variant analysis in cybersecurity rather than relying on third party security researchers, and the growth of forensics research to detect and prevent attacks.
Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.
The podcast discusses the basics of zero day vulnerabilities and exploits, which refers to a bug in a software or system that is unknown to its developers, and a program that is crafted to exploit it respectively. Zero day exploits can potentially allow a hacker to remotely access someone's device without their knowledge and capture confidential information.
The Gin Master malware can capture private data from an Android device and send it to an external server. The leader of Google's Android security team discusses the challenges of finding and preventing malware on devices from various manufacturers and non-Google app stores.
Police DNA databases are not always as effective in solving cases as initially believed, as many individuals may refuse to give DNA samples even if they match a physical description. Cutting large lists down can still make a difference, however.
The NSA publishes best practices for securing data, but their offensive data collection techniques remain secretive. Criminals using satellite phones are now aware that they are being tracked.