Google is leading the way for a more secure Internet. They are pushing hard for the concept of HTTPS everywhere. The next update for Google Chrome will alert all users anytime they visit a HTTP only website. This episode talks about this and why it's a...
Lake Street El
IoT security is abysmal. No standards, no controls and no requirements to make these devices secure. Unfortunately for people to pay attention it comes on the heels of breaches. Enough breaches have happened and the Federal Trade Commission (FTC) is st...
On my blog, https://www.binaryblogger.com, I write about security but also have side topics from time to time. One article I wrote last year was about a big problem I had with my Tivo/Pace DVR failing on an update. Risking losing hundreds of hours of r...
The recent breaches, Exactis being the latest one, has pushed California to create a GDPR style privacy law. This is the start of the war on Privacy in the United States. On the heels of the European GDPR privacy laws, it was only a matter of time unti...
IoT Strikes again. Introducing an insecure Internet of Things device not only could compromise your privacy from the device but could be used as an access point to the rest of your home network. This episode goes into some best practices to lock down y...
It's safe to assume we all have a mobile device or several, but do you keep it as secure as you should? This episode lays out a few best practices that should have in place on your mobile device(s) regardless of how safe you think you are. Be aware, b...
A company called Exactis, I never heard of them, leaked 340 million records in the latest huge breach. The amount of records is staggering but that's not what I focused on. It's the type of data they had and this episode goes into why does a company li...
This week's Tools, Tips and Tricks is about Windows Updates. Every now and then one gets stuck and hangs. What do you do? What can you do? This episode talks about some things you can do when your Windows Updates get stuck. Be aware, be safe. -------...
Continuing with the mini-series OWASP Top 10 Proactive Controls for Developers we are at number 4. This one talk about encoding and escaping your data. This episode talks about the importance of this development practice and what types of attack it hel...
You have heard the term. I talk about them all the time. This episode tried to explain what a zero-day is, what it means and how you can react to one if it affects you. Be aware, be safe. ------------------------------------ Website - https://www.bi...
Google is making moves to encourage people from stop using old, outdated operating systems. They announced that Chrome will no longer run on MacOS Mavericks. This episode goes into what this means and why we will see more vendors take this approach of ...
Wifi networks security uses a protocol called WPA2. This protocol is not without it's faults and weaknesses and today the next version is set for release. Thie episode goes over the new WPA3 protocol, what changed and why its important for you to move ...
This week's Tools, Tips and Tricks talks about Microsoft Threat Modeling Tool. This tool is a vital component of security architecture and design. The Microsoft tool is free and very useful to identify security risks within an application or environmen...
Tesla announced that it was the victim of sabotage and data breach. The culprit of this activity was an employee that became disgruntled. This episode talks about real risks of insider threats and Tesla's security gaps that allowed one person to do so ...
Continuing with the mini-series OWASP Top 10 Proactive Controls For Developers we are at number 3. Secure Database Access is the next control developers need to be aware of. This episode goes into the components of secure data access and what considera...
Voice-enabled devices is slowly becoming the new Internet of Things. Now you are able to basic banking actions using home assistance devices. This episode talks about this movement and what needs to happen with the voice security in order to make me co...
This episode topic came in from a listener's question. How can an IoT device get hacked behind my router? This episode and the complimenting blog post on my blog https://www.binaryblogger.com goes into how this is done. Be aware, be safe. ----------...
This week's Tools, Tips and Tricks talks about the Microsoft Cybersecurity Reference Architecture. This episode goes through what it is and how it can be used. I highly recommend if you are a beginner or experienced cybersecurity professional to look a...