Press "Enter" to skip to content

Lake Street El

Episode 337 – Facebook Uses Your Phone Number You Use For 2FA For Ads

Facebook wants to collect every piece of data that can on you. Now they are taking data provided by users to improve their security posture is being used to deliver unwanted ads. Facebook has set a dangerous path, improve your security with us at the expense of getting more ads to your phone. This episode goes through the details.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 336 – Tools, Tips and Tricks – Authy

This week's Tools, Tips and Tricks episode covers a multi-factor tool called Authy. I have moved to Authy a few months ago and haven't looked back. This episode goes into the difference between Authy and Google Authenticator and why I find it to be a better choice. 

Authy Website. 

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 335 – What To Do If You Click On A Phishing Email

Everyone gets phishing emails on a regular basis. If your email is public it's only a matter of time until it gets on a bot's list and sends you an attempt to take your account information, deliver malware or wreck your systems. This episode goes through the steps you should take it you open, click on or download a phishing email or malicious attachment. 

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 334 – How To Track Your Lost Or Stolen Android Phone

Losing your mobile device through your own actions or through theft can be a shocking and scary event. The loss of the hardware is one thing, but the amount of identity data, personal photos, contacts and other data we store on those devices can be more damaging to you in the wrong hands. This episode goes through how to track your Android phone.

Source: https://gbhackers.com/stolen-android-phones/

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 333 – iOS12 Security Features You Should Know About

Apple released iOS12 to the public and there are many security improvements you should know about. This episode goes over the security features you should enable and others that you will find useful.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 332 – Small Business Cybersecurty Challenges

Small businesses have the biggest mountains to climb when it comes to security. The lack of proper financial investment, skill shortages and the balance between progressing the business and keeping it secure. This episode goes over the special challenges small businesses face when building a cybersecurity program.

Be aware, be safe.

Don't forget to subscribe to the Security In Five Newsletter.

Send in your Security Horror Stories - bblogger@protonmail.com

—————— Where you can find Binary Blogger ——————

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - contactme@binaryblogger.com

Episode 331 – Tools Tips and Tricks – Open Reference Atchitecture For Security And Privacy

This week's Tools, Tips and Tricks episode talks about one of my goto resources. The Open Reference Architecture For Security And Privacy is a wonderful resource for anything in the security architecture and privacy space. 

Open Reference Architecture for Security and Privacy Website

Fun Fact: At the 6:20 mark in this episode you will hear rumbling in the background, that's thunder, very loud thunder, from a large severe storm that rolled in while I recorded it. I was on a roll and kept it in. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

Don't forget to submit your Security Horror Stories.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 330 – Thank You Once Again Plus I Want Your Security Horror Stories.mp3

Thank you to the listeners of this podcast. Another milestone has been reached, 100,000 listens. A year ago I started this as an experiment, a hobby to see how a podcast could work and now I look forward each week to producing it. 

As this podcast grows so will the extra offerings. My monthly newsletter will be starting this month, subscribe here.

I want to start another new, fun, interesting off shoot... I want your horror stories. This episode goes into what this means and also head over to BinaryBlogger.com for more details. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 329 – Privacy Should Be A Bigger Part Of Your Security Training

Your security program should have security training as part of it. Security awareness training in some industries is required through regulations but overall it's a top best practice to train and make your employees aware of security and their role. This episode talks about Privacy and how it needs to be expanded in most training.

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 328 – Ways You Are Failing In Your Security Program

A majority of businesses fail at the basic cybersecurity components, from patching to network monitoring. This episode goes through way you may be failing in your security program. 

Source report - Tripwire State of Cyber Hygiene Report

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 327 – Mini-Series OWASP Top 10 Proactive Security Controls – 10 – Handle All Errors

We have reached the end of the mini-series for the OWASP Top 10 Proactive Security Controls For Developers. The last item talks about handling all your app's errors and exceptions. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 326 – Tools, Tips and Tricks – BitLocker

This week's tools, tips and tricks talk about hard drive encryption using Windows BitLocker. Did you know your version of Windows has this built in? (Pro, Enterprise and Education versions only)

This episode goes into BitLocker, why you need it and what protections your get from it. 

How To Use BitLocker

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 325 – Google Titan Security Key Available To The Public, What Is It?

Google has released their Titan Security Key to the public. What is it and do you need it? This episode goes in to the details of the key and whether you would need this for your business or home use. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 324 – Non Technical Skills You Should Have For A DevSecOps Career

DevSecOps sounds technical. Technology driven automation and the skills required to put it altogether are technology heavy. However, there are many non-technical skills required if you want to be a more effective DevSecOps resource in your career. This episode goes through the main non-technical skills.

Source Article.

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 323 – Ubisoft Is Going To Force Multi Factor Authentication To Play Soon

Multi factor authentication is becoming more widespread. Now it's showing up in the video games you and your kids play. This episode talks about how game makers are introducing multi factor authentication incentives and Ubisoft is taking it a step further. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 322 – A WARNING If You Use WhatsApp Google Drive Backup Feature

The WhatsApp text app ensures end to end encryption to protect your communications. Soon WhatsApp will allow Android users to backup to their Google Drive without going against your space quotas. There is a big drawback if you use this. This episode gives you the warning if you enable this feature.

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 321 – Tools, Tips and Tricks – Sonarqube

This episode is for all the developers. How do you know if your code is secure if you don't run security scans against it? If you are a small business or individual you may not be able to afford a top-shelf security code analyzer. This is where Sonarqube comes in to help you make sure your code is as secure as possible. This episode goes over what Sonarqube is and why you should try it out if you write any code. 

Sonarqube website

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com

 

Episode 320 – Mini-Series – OWASP Top 10 Proactive Controls – 9 – Logging & Auditing

Continuing with the OWASP Top 10 Proactive Security Control for Developers we are at number 9. This control talks about logging & auditing but for security purposes. Applications log but security logs require different data and are used for different purposes. This episode goes over the control. 

Don't forget to subscribe to the Security In Five Newsletter.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Podcast Page - http://securityinfive.libsyn.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter @binaryblogger - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Spotify - Security In Five Podcast Page

Stitcher - Stitcher

Email - contactme@binaryblogger.com