Press "Enter" to skip to content

Lake Street El

Episode 355 – If You Are Going To Get A VPN Stay Away From The Free Ones, Here’s Why

There are somethings you can get for free and be OK. Security services shouldn't be one of them. This episode goes over why you should avoid using free VPN services and what you could be giving up if you do.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 354 – DevSecOps, Differences Between Continuous Integration, Delivery and Deployment

In DevSecOps you will often hear the process summarized as CI/CD. This refers to the automation pipeline on getting from development to production. This episode goes over what CI/CD is, what the break down of each step is and what you will need in place to have an end to end CI/CD process.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 353 – How To Check If You Were Impacted By The Facebook Breach

If you haven't heard Facebook had a breach that impacted an estimated 30 million accounts. Are you impacted by this? This episode goes through a site Facebook released that will tell you if you are or aren't and what you should do if you are.

Facebook Breach Verification Page.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 351 – Stop Taking Those Facebook Quizzes, They Aren’t Free

Facebook and the apps within are 'free' as far as you aren't paying money for using those services. However, one of the most popular gimmick on Facebook are the stupid quizzes. Those aren't as free as you think and you are paying for them, this episode talks about how.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 351 – Tools, Tips and Tricks – BrowserLeaks.com

This week's Tools, Tips and Tricks is about keeping your browsing activities private. I have talked about many tools that you can use to check to see what data your browser is leaking and what information can be found on you. This week's TTT episode talks about another that is the easiest and cleanest to use I have found. Browserleaks.com will show you all the data that can be see from your browser and how you can use it to verify your security and privacy controls you have in place are in fact working as they should.

Browserleaks.com

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 350 – Moving From DevOps To DevSecOps

Yesterday's episode talked about integrating security into your DevOps adoption from a business perspective. This episode talks about moving from DevOps to DevSecOps more technically and strategically.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 349 – Integrate Security Into Your DevOps Adoption

DevOps is the 'new hotness' a phrase managers and teams jump for joy when they start down the path. However, Security has been left behind in the DevOps movement and it's time to re-integrate it to where it needs to be. This episode talks about making sure security is integrated along with your DevOps adoption.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 348 – Google+ Breach Really Wasn’t A Breach

Google+ social site joins the club from a data leak. The size of this particular leak is small, relatively speaking compared to others, and this episode explains why this isn't really a traditional breach. It doesn't change the fact of unintended data access but the term breach means something specific.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 347 – IoT Strikes Again – The FDA Warns Patients About A Pacemaker Cybersecurity Flaw

Internet of Things strikes again. Instead of your webcams or kid's toys this episode talks about Internet enabled medical devices. The consequences are more severe when we are talking about these kinds of devices. This episode talks about an FDA report and a recall of a cardiac device that has a serious security flaw.

FDA Report.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Epiosde 346 – Tools, Tips and Tricks – Firefox Monitor

This week's tools, tips and tricks episode talks about Firefox Monitor. Mozilla has partnered with Have I Been Pwned website and integrates that into Firefox Monitor. This episode goes into what it is and why you should sign up for it now.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 344 – IoT Strikes Again- Malware Jumps Expoentially In 2018

IoT Strikes Again! The rush to slap Internet access into every electronic device leaves the world open to great security risks. A recent report shows that the hackers are going after the weaknesses and gaps in IoT devices. This episode goes through the data.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 345 – The Main Phishing Types In 2018

Phishing is a common label assigned to any email message that is deemed malicious. There are many kinds of phishing attempts that are used right now. This episode goes through what phishing is and the main types that are seen in 2018.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 343 – Ways To Secure Your Wi-Fi For Home And Business

Chances are you have a wireless router in your home and/or small business. Out of the box routers are not secure properly, default settings left alone are easy entry points for hackers. This episode goes though the ways to secure your wireless routers.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 342 – Why You Should Rethink Using Facebook To Sign On To Websites

Facebook had a large breach. The extent of that breach is unknown but the initial reports are as many as 50 million to maybe 100 million accounts were breached. The biggest unknown at the time of this episode release it is unknown if any downstream accounts connected to your Facebook account was accessed. This episode talks about how you should rethink using Facebook to login to other websites and applications. 

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 341 – Tools, Tips and Tricks – How To Protect Your Facebook Account After Their Breach

Facebook was breached from an exploited security vulnerability/bug and anywhere from 50-90 million accounts could have been compromised. This episode gives some tips you should do to help protect and prevent your account from being breached.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 340 – Are You Suffering From These Common Bad Security Practices With Windows?

Chances are you use a Windows computer. Out of the box Windows is not as secure as it can be and you can make it less so through missing common security practices. This episode goes through common security practices and I ask you to see if you are doing these.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 339 – Microsoft Declares The End Of The Password, Will It Work?

Passwords alone need to go. We all know it, we agree on it yet we don't know how to smoothly execute on it. Microsoft takes the password on through their Authenticator mobile app and new integration into Azure AD. This episode goes into this war on the password and why Microsoft could pull it off.

Microsoft Authenticator Blockchain details.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 338 – Make Sure Your GIT Repos Are Locked Down

Cloud services are efficient and convenient but they still require security focus from the users. Don't assume that cloud services will have your security in their best interest. A researched discovered over 400,000 website where their GIT repos were wide open. This episode goes into how this could lead to serious problems from a security point.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com