Windows XP has been out of support for years yet there are many computers still running it. The gaming service Steam is taking a very aggressive approach to XP and Vista users. Starting in Jan. 2019 XP and Vista users will be blocked from using the ser...
Lake Street El
Continuing with the mini-series on OWASP Pro Active Controls For Developers, we are at number two. This one talks about leveraging security frameworks and libraries. This episode breaks it down but also gives best practices to look out for when you use...
Voice assistants like Cortana, Siri and Alexa are becoming commonplace in our devices. This episode talks about the security risks those voice assistants can pose and one case specifically with Windows Cortana. Be aware, be safe. -------------------...
One year ago I started the Security In Five podcast. I never would have guessed I'd have this much fun and get the feedback from it. Thank you. This episode give a big thanks to all of you and gives a little insight how I make the podcast. Be aware,...
This week's Tools, Tips and Tricks goes over the website Informationinbeautiful.net. This is a wonderful site that takes real world data and puts them into visually stunning graphs. Worlds Biggest Data Breaches - http://informationisbeautiful.net/visu...
OWASP released a new Top 10 report this year. 10 Proactive Security Controls For Developers. I loved this report and decided to do a mini-series around it. This episode covers the first one, Define Security Requirements. Be aware, be safe. ----------...
A report from Breach Level Index puts the numbers from the breaches in 2017 in proper context. Reports like this really show the reality of how big breaches are. This episode goes through the numbers from the report. Link to the report - https://breac...
Internet of Things STRIKES AGAIN! Another IoT device security failures exposes customers to privacy violations that go beyond data. This time a cheap wireless, internet enabled, baby monitor is the culprit. This episode goes into what the problem is an...
EBay released the ability to enable two factor authentication on your account. This episode goes through how to do it, it's very easy, and why you should enable two factor everywhere you can. Be aware, be safe. ------------------------------------ W...
This week's Tools, Tips and Tricks episode goes over a website to help troubleshoot internal connection problems as well as web site verification. IsItDownRightNow.com will check any website from an external source to see if it's down for just you or f...
We have reached the last of the Top 10 Reasons To Pen Test you business mini-series. This last one talks about using pen tests and really any security exercise to help improve your employee's skillsets. Be aware, be safe. ---------------------------...
In the security professions, you can't do whatever you want, especially when it comes to people. There are laws you need to be aware when it comes to the line between corporate security and personal privacy. This episode goes over the high level laws y...
This week's breach report comes from Coca-Cola. This episode goes into the details of the breach and shows why all breaches and threats don't necessarily come from external forces. Be aware, be safe. ------------------------------------ Website - ht...
A followup episode from last week's Episode 247, the FBI has released an alert that urges all home and small offices to reboot their routers. This is in response to the wide spread of the VPNFilter malware. The article I referenced is from CSOOnline a...
This week's Tools, Tips and Tricks episode talks about VeraCrypt. If you care about protecting your very sensitive data, hard drives, USB drives then VeraCrypt is for you. The successor to the very popular and powerful TrueCrypt (now defunct), VeraCryp...
On the heels of the GDPR companies are opening up on the data they collect on you. Apple is next to roll-out a feature to see the data they have on you. This episode goes into what data you can see and how to get at it. One thing to note, this is a ver...
Chrome continues to expand it's browser to a more fully functional security center. The fact the Internet is the primary use for most computers it makes sense the browser you use protects you the best it can. This episode goes into a new Chrome malware...
Continuing with the mini-series Top 10 Reasons To Pen Test we hit number nine. This one talks about using penetration tests to validate and prove your security controls are effective. You don't have to have successful penetrations to have a successful ...