goodlisten

Clip

The Importance of Publicly Available Exploits
listen on Spotify
38:03 - 39:28 (01:24)

Publicly available exploits for recently disclosed vulnerabilities can help ensure that security measures are actually functioning as intended, as otherwise nobody can protect themselves from undisclosed threats.

Similar Clips
The conficker worm used the MS-08-067 vulnerability to spread and infect approximately 10 million Windows computers worldwide, with over 30% of computers still not having applied the patch to protect themselves from the vulnerability.
41:47 - 47:05 (05:17)
listen on Spotify
Cybersecurity
Summary

The conficker worm used the MS-08-067 vulnerability to spread and infect approximately 10 million Windows computers worldwide, with over 30% of computers still not having applied the patch to protect themselves from the vulnerability.

Chapter
The Conficker Worm and the Importance of Patching
Episode
57: MS08-067
Podcast
Darknet Diaries
The NSA worked with Microsoft to patch a Windows 10 security flaw, a cryptographic API bug, to prevent foreign governments from pilfering Americans' trusted information.
50:26 - 52:43 (02:17)
listen on Spotify
NSA
Summary

The NSA worked with Microsoft to patch a Windows 10 security flaw, a cryptographic API bug, to prevent foreign governments from pilfering Americans' trusted information. The collaboration may signal a shift in NSA policy, indicating that they will work with vendors to protect the country from new risks as the world changes.

Chapter
The Connection Between NSA, Microsoft, and WannaCry
Episode
57: MS08-067
Podcast
Darknet Diaries
The lack of allocating resources for unit testing in public facing games and the absence of incentives to report exploits is creating a moral gray area.
27:10 - 28:49 (01:39)
listen on Spotify
bug hunting
Summary

The lack of allocating resources for unit testing in public facing games and the absence of incentives to report exploits is creating a moral gray area. The rise of in-app purchases in online games has made the situation even more complicated, especially for those involved in bug hunting.

Chapter
The Ethics of Hacking Online Video Games
Episode
Ep 8: Manfred (Part 2)
Podcast
Darknet Diaries
A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.
47:21 - 52:13 (04:52)
listen on Spotify
Network Security
Summary

A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.

Chapter
Preparing for a Cyber Attack
Episode
Ep 50: Operation Glowing Symphony
Podcast
Darknet Diaries
The speaker discusses how companies may have a vested interest in making people believe that it's impossible to make their devices completely secure.
36:50 - 39:13 (02:23)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The speaker discusses how companies may have a vested interest in making people believe that it's impossible to make their devices completely secure. He emphasizes the need for companies to prioritize and have higher standards for systems that can potentially endanger the entire company if hacked.

Chapter
Aligning Incentives for Greater Good
Episode
#155 – Max Tegmark: AI and Physics
Podcast
Lex Fridman Podcast