Tag: Videos
You are here: Home \ Videos \ Page 2
Researchers at Ben-Gurion University of Negev have found a way to take a run-of-the-mill USB device and use it to leak data from an air-gapped computers via RF signals. Academics with the school’s Cyber Security Research Labs division claim they’ve come up with software, dubbed USBee, that can modulate binary data over electromagnetic waves, and then transmit...
Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption and surveillance. [embedded content]
Threatpost editor Mike Mimoso talks to Chris Valasek, Security Lead, Uber ATC, about the talk he and Charlie Miller gave at RSA, hacking cars, the challenges around getting manufacturers to patch vulnerabilities in vehicles, IoT, and more. [embedded content]
Threatpost Editor Mike Mimoso talks to Synack director of research and well-known OS X hacker Patrick Wardle about the discovery of an OS X malware dropper that likely was developed by the Hacking Team. [embedded content]
Threatpost editor Mike Mimoso talks with Roberto Martinez and Santiago Pontiroli, researchers with Kaspersky Lab’s Global Research and Analysis Team (GReAT) about ATM malware, jackpotting, and why it works so well in Latin America. [embedded content]
Threatpost editor Mike Mimoso talks with Dewan Chowdhury, the founder and CEO of MalCrawler, about hacking power grids and a honeypot they built to mimic an energy management system. [embedded content]
Threatpost editor Mike Mimoso talks with Sergey Lozhkin, senior researcher at Kaspersky Lab’s Global Research and Analysis Team about medical device security and how he was able to access some devices at his local hospital via WiFi. [embedded content]
Threatpost editor Mike Mimoso talks to HackerOne chief policy officer Katie Moussouris about the U.S. implementation of the Wassenaar Arrangement rules and where things stand close to seven months after the initial draft was pulled off the table for a rewrite. [embedded content]
Mike Mimoso talks with Steve Adegbite, Chief Information Security Officer at E*TRADE, about data integrity and some of the challenges he encounters when it comes to encrypting data and dealing with third-party access to data. [embedded content]
Mike Mimoso talks to Kaspersky Lab researcher Vitaly Kamluk who was critical in the discovery of the latest version of the cross-platform Adwind RAT. The remote access Trojan is unique in that it’s written in JavaScript, giving this version—which is also known as Frutas, AlienSpy and JSocket—the flexibility to be used liberally in cybercrime operations...