Security Now - Season 1

Season 1

Episodes

As the Worm Turns — the first Internet worms of 2005

HoneyMonkeys

NAT Routers as Firewalls

Personal Password Policy (1)

Personal Password Policy (2)

Mechanical & Electromagnetic Information Leakage

SPYaWAREness

Denial of Service (DoS) Attacks

Rootkits

Open Wireless Access Points

Bad WiFi Security (WEP and MAC address filtering)

Sony's

Unbreakable WiFi Security

Virtual Private Networks (VPN): Theory

VPN Secure Tunneling Solutions

Listener feedback Q&A #1

PPTP and IPSec VPN Technology

Hamachi Rocks!

VPNs Three: Hamachi, iPig, and OpenVPN

A SERIOUS new Windows vulnerability — and Listener Q&A

The Windows MetaFile (WMF) Vulnerability

The Windows MetaFile Backdoor?

GRC's

Listener Feedback Q&A #3

How the Internet Works (1)

How the Internet Works (2)

How Local Area Networks Work, Part 1

Listener Feedback Q&A #4

Ethernet Insecurity

Cryptographic Issues

Symmetric Stream Ciphers

Listener Feedback Q&A #5

Symmetric Block Ciphers

Public Key Cryptography

Cryptographic Hashes

Listener Feedback Q&A #6

Crypto Series Wrap-up

Browser Security

Buffer Overruns

Listener Feedback Q&A #7

TrueCrypt

NAT Traversal

Open Ports

Listener Feedback Q&A #8

The 'Hosts' File

Router Logs

Internet Weaponry

Listener Feedback Q&A #9

The NETSTAT Command

Virtual Machine History & Technology

Vista's Virgin Stack

A Busy Week for Security Troubles

VMware

Blue Pill

Application Sandboxes

Listener Feedback Q&A #10

Virtual PC versus VMware

Two New Critical Windows Problems

Comparing

Listener Feedback Q&A #11

ISP Privacy and Security

Internet Proxies

MojoPac

Listener Feedback Q&A #12

Why Is Security So Difficult?

Windows Vista Security

Kernel Patch Protection

Listener Feedback Q&A #13

The Social Implications of Internet Anonymity

Achieving Internet Anonymity

SecurAble

Listener Feedback Q&A #14

Digital Rights Management (DRM)

Peter Gutmann on Vista DRM

Vista DRM Wrap-Up & Announcing "SecurAble"

Listener Feedback Q&A #15

Microsoft on Vista DRM

DEP in Depth

Backtracking Spoofed Spam eMail

Listener Feedback Q&A #16

Hard Drive Unreliability

Cyber Warfare

UAC in Depth

Listener Feedback Q&A #17

Intro to Web Code Injection

Cross-Site Scripting

SQL Injection Exploits

Listener Feedback Q&A #18

Even More Badly Broken WEP

Multifactor Authentication

Marc Maiffret

Listener Feedback Q&A #19

Microsoft Patent Wars

The Fourth Factor

OpenID

Listener Feedback Q&A #20

Operation: Bot Roast

Internet Identity Metasystems

Trusted Platform Module (TPM)

Listener Feedback Q&A #21

Are You Human?

Listener Mailbag #1

PayPal Security Key

Listener Feedback Q&A #22

Firewall LeakTesting

Listener Mailbag #2

PIP & Even More Perfect Passwords

Listener Feedback #23

GRC's eCommerce System

Listener Feedback #24

OpenID Precautions

Listener Feedback #25

Roaming Authentication

Listener Feedback #26

Perfect Paper Passwords

Listener Feedback #27

Even More Perfect paper Passwords

Listener Feedback #28

PayPal and DoubleClick

Listener Feedback #29

Is Privacy Dead?

Listener Feedback #30

Jungle Disk

Listener Feedback #31

Symmetric Ciphers

Listener Feedback #32

Corporate Security

Listener Feedback #33

Windows SteadyState

Listener Feedback #34

FREE CompuSec

Listener Feedback #35

TrueCrypt v5.0

Listener Feedback #36

IronKey

Listener Feedback #37

RAM Hijacks

Listener Feedback #38

Network Congestion

Listener Feedback #39

RSA Conference 2008

Listener Feedback #40

YubiKey

Listener Feedback #41

Secunia's PSI

Listener Feedback #42

Microsoft's Baseline Security Analyzer

Listener Feedback #43

ISP Betrayal

Listener Feedback #44

Phracking Phorm

Listener Feedback #45

DePhormed Politics

Listener Feedback #46

Bailiwicked Domain Attack

Listener Feedback #47

DNS — After the Patch

Listener Feedback #48

Vista Security Bypass

Listener Feedback #49

Google's Chrome

Listener Feedback #50

GoogleUpdate & DNS Security

SockStress

Listener Feedback #51

Cross-Site Request Forgery

Listener Feedback #52

ClickJacking

Listener Feedback #53

The TKIP Hack

Listener Feedback #54

Sandboxie

Listener Feedback #55

Sandbox Limitations

Listener Feedback #56

Drop My Rights

Breaking SSL, PDP-8's & UltraCapacitors

Listener Feedback #57

Cracking Security Certificates

Listener Feedback #58

Crypto Rehash

Listener Feedback #59

Modes of Encryption

Listener Feedback #60

Cryptographic HMACs

Listener Feedback #61

Windows Autorun-around

Listener Feedback #62

Internet Explorer 8

Listener Feedback #63

GhostNet

Listener Feedback #64

Conficker

Listener Feedback #65

The SSL/TLS Protocol

Listener Feedback #66

Windows 7 Security

Listener Feedback #67

The Geek Atlas, IPv6 & a non-VPN

Listener Feedback #68

SecureZIP

Listener Feedback #69

Boyer & Moore

Listener Feedback #70

Lempel & Ziv

Mega Security News Update

Listener Feedback #71

Listener Feedback #72

Vitamin D

Listener Feedback #73

Voting Machine Hacking

Listener Feedback #74

Cracking GSM Cellphones

Listener Feedback #75

Security Maxims

Listener Feedback #76

The Fundamentally Broken Browser Model

Listener Feedback #77

Badly Broken Browsing

Listener Feedback #78

The Oxymoron of "JavaScript Security"

Listener Feedback #79

A security vulnerability in SSL

Listener Feedback #80

"Same Origin" Troubles

Listener Feedback #130

Cyberwarfare

Listener Feedback #82

The Rational Rejection of Security Advice

Listener Feedback #83

Mega Security Update & CES Observations

Listener Feedback #84

Let's Design a Computer (part 1)

Listener Feedback #85

Machine Language

Listener Feedback #86

Indirection: The Power of Pointers

Listener Feedback #87

Stacks, Registers & Recursion

Listener Feedback #88

Hardware Interrupts

Listener Feedback #89

State Subversion of SSL

Listener Feedback #90

The Security of Open vs CLosed

Listener Feedback #91

The "Multi"-verse

The Portable Dog Killer

Listener Feedback #92

Operating Systems

Listener Feedback #93

RISCy Business

Listener Feedback #94

What We'll Do for Speed

Listener Feedback #95

LastPass

Listener Feedback #96

Five Years of Vulnerabilities

Listener Feedback #97

DNS Rebinding

Listener Feedback #98

Strict Transport Security

Listener Feedback #99

Side-Channel Privacy Leakage

Listener Feedback #100

Inside OAuth

Listener Feedback #101

CryptoSystem Backdoors

Listener Feedback #102

The Evercookie

Listener Feedback #103

Firesheep

Listener Feedback #104 & The FireStorm

Benchmarking DNS

Listener Feedback #105

Testing DNS Spoofability

Listener Feedback #106

Tag Me (with RFID)

Listener Feedback #107

Bluetooth

The Portable Dog Killer, Encore

Listener Feedback #108

Bluetooth Hacking

Listener Feedback #109

Fuzzy Browsers

Listener Feedback #110

BitCoin CryptoCurrency

Listener Feedback #111

Proxied Surfing

Listener Feedback #112

Stuxnet

Listener Feedback #113

IE9

Listener Feedback #114

The Comodo SSL Breach

Listener Feedback #115

Pass-Sentences??

Listener Feedback #116

Going Random (1)

Listener Feedback #117

Going Random (2)

Listener Feedback #118

Password Haystacks

Listener Feedback #119

Ghostery

Listener Feedback #120

The Future of Identity

Listener Feedback #121

How the Internet Works, Part 1

Listener Feedback #122

Anatomy of a Security Mistake

Listener Feedback #123

How The Internet Works: ICMP & UDP

Listener Feedback #124

Off The Grid

Listener Feedback #125

TCP Part 1 – Getting Connected

Listener Feedback #126

Certificate Authority (CA) Trust - Time to Change it?

Listener Feedback #127

The Beauty of B.E.A.S.T.

Listener Feedback #128

TCP Pt.2 - Attacking TCP

Listener Feedback #129

TCP Pt.3 - Necessary Refinements

Listener Feedback #81

Internet Privacy Update

Listener Feedback #131

Browser ID

Listener Feedback #132

Mega Security News Update

Listener Feedback #133

Science Fiction Holiday Special

Listener Feedback #134

Wi-Fi Protected (In)Security

Listener Feedback #135

WPS: A Troubled Protocol

Listener Feedback #136

"ScriptNo" for Chrome

Listener Feedback #137

Can "Anonymous" Take Down the Internet?

Listener Feedback #138

HTTP & SPDY

Listener Feedback #139

Buffer Bloat

Listener Feedback #140

iOS Password Mis-Managers

Listener Feedback #141

Cloud Solutions

Twitter Feedback Q&A #142 / Cloud Security

Three Hybrid Cloud Solutions

Listener Feedback #143

DMARC - eMail Security

Listener Feedback #144

Poking Holes in TCP

Listener Feedback #145

Flame On!

Listener Feedback #146

Coddling Our Buffers

Listener Feedback #147

Paul Vixie & DNS Changer

Listener Feedback #148

Ali Baba's Cave

Mat Honan's Very Bad Weekend

Listener Feedback #149

Password Cracking Update: The Death of "Clever"

What a Busy Week!

Listener Feedback #150

Internet Identity Update

Mark Russinovich & Other News

Listener Feedback #151

NFC - Near Field Communications

Listener Feedback #152

ECC - Elliptic Curve Cryptography

Listener Feedback #153

Fully Homomorphic Encryption

Listener Feedback #154

Microsoft: Security, Privacy & DNT

Listener Feedback #155

DTLS - Datagram Transport Layer Security

Listener Feedback #156

QR Codes

Listener Feedback #157

Once Upon a Time

Listener Feedback #158

Disconnect WidgetJacking

Listener Feedback #159

Memory Hard Problems

Listener Feedback #160 & UPnP Exposure Disaster

"Mega" Security Overview

Listener Feedback #161

The Internet Underworld

Listener Feedback #162

Tor 2.0

Your Questions, Steve's Answers 163

Telnet-pocalypse

Your Questions, Steve's Answers 164

Distributed Hash Tables

Your Questions, Steve's Answers 165

VPN Solutions

Your Questions, Steve's Answers 166

BitTorrent Sync

Your Questions, Steve's Answers 167

How Facebook Monetizes

Your Questions, Steve's Answers 168

Off the Record with OTR

Your Questions, Steve's Answers 169

The State of Surveillance

Your Questions, Steve's Answers 170

Interesting Intel History

Your Questions, Steve's Answers 171

SSL and Perfect Forward Secrecy

How Much Tinfoil?

Inflection Points

Your Questions, Steve's Answers 172

Black Hat, TOR and more

Your Questions, Steve's Answers 173

Considering PGP

Your Questions, Steve's Answers 174

BitMessage

The Perfect Accusation

Your Questions, Steve's Answers 175

Fingerprint Biometrics

SQRL

SQRL and Q & A 176

SQRL: Anti-Phishing and Revocation

A Newsy Week

Your Questions, Steve's Answers 177

Monkey Was 26th

Your Questions, Steve's Answers 178

What is RADIUS?

Coin, Patent Trolls, and More

Breaking SSL

Your Questions, Steve's Answers 179

Your Questions, Steve's Answers 180

Time Traveling with Steve

New Year's News Catchup

NSA's ANT

Your Questions, Steve's Answers 181

Your Questions, Steve's Answers 182

Password Policies

Q&A 183

Sisyphus

Goto: Fail

Your Questions, Steve's Answers 184

iOS Security (1)

iOS Security (2)

iOS Security (3)

Your Questions, Steve's Answers 185

How the Heartbleeds

TrueCrypt & Heartbleed Part 2

Your Questions, Steve's Answers 186

Certificate Revocation

Certificate Revocation, Part 2

Your Questions, Steve's Answers 187

Harvesting Entropy

Your Questions, Steve's Answers 188

TrueCrypt: WTH?

Your Questions, Steve's Answers 189

Authenticated Encryption

Your Questions, Steve's Answers 190

Cloud Storage Solutions

Your Questions, Steve's Answers 191

Your Questions, Steve's Answers 192

iOS Surveillance?

Your Questions, Steve's Answers #193

Browser Password Managers

Your Questions, Steve's Answers 194

Big Routing Tables

Your Questions, Steve's Answers 195

PGP: Time for an Upgrade?

Your Questions, Steve's Answers 196

Google vs. SHA-1

Your Questions, Steve's Answers 197

Shocked by the Shell

Your Questions, Steve's Answers 198

Payment Tokenization

Poodle Bites

Your Questions, Steve's Answers 199

Your Questions, Steve's Answers 200

Certificate Transparency

Your Questions, Steve's Answers 201

Let's Encrypt

Your Questions, Steve's Answers 202

Expensive Lessons

Your Questions, Steve's Answers 203

Steve Introduces SQRL

The (In)Security of 2014

Your Questions, Steve's Answers 204

The Enigma

Cryptographic Backdoors

Your Questions, Steve's Answers 205

TOR: Not so Anonymous

Your Questions, Steve's Answers 206

HTTP/2

Your Questions, Steve's Answers 207

Hacking Vehicles

Freak & RowHammer

Your Questions, Steve's Answers 208

Secure Boot

Your Questions, Steve's Answers 209

The TrueCrypt Audit

Your Questions, Steve's Answers 210

Great Firewalls & Cannons

Your Questions, Steve's Answers 211

Law Enforcement Backdoors

Your Questions, Steve's Answers 212

Exploiting Keyless Entry

TLS Logjam

Your Questions, Steve's Answers 213

Your Questions, Steve's Answers 214

Mozilla Tracking Protection

Your Questions, Steve's Answers 215

Tor's Astoria Client

A Crazy News Week!

Hacking Team vs. SQRL

Your Questions, Steve's Answers 216

HORNET: A Fix For TOR?

The Windows 10 Privacy Tradeoff

The Quest for Surfing Safety

Security Is Difficult

Your Questions, Steve's Answers 217

uBlock Origin

Your Questions, Steve's Answers 218

Disconnect.me

iOS Content Blockers

Your Questions, Steve's Answers 219

Breaches & Vigilante Worms

Joe Siegrist of LastPass

Doing It Wrong

Your Questions, Steve's Answers 221

Verifying iOS App Conduct

Your Questions, Steve's Answers 222

Encryption and the Law

Your Questions, Steve's Answers 223

Your Questions, Steve's Answers 224

A Mega News Week

Your Questions, Steve's Answers 225

Your Questions, Steve's Answers 226

Vitamin D

New Year's News

Your Questions, Steve's Answers 227

LostPass

Your Questions, Steve's Answers 228

Three Dumb Routers

Router Q&A Follow-Up

GRC is DOWN

DDoS Attack Mitigation

Your Questions, Steve's Answers 229

CacheBleed

Your Questions, Steve's Answers 230

D.R.O.W.N.

Too Much News

Your Questions, Steve's Answers 231


SMTP STS

Your Questions, Steve's Answers 232

Bit Con

Dumb SmartThings

Z-Wave Goodbye

Your Questions, Steve's Answers 234

IoT Infancy (1)

IoT Infancy (2)

Your Questions, Steve's Answers 235

Control-Flow Enforcement Technology (CET)

Your Questions, Steve's Answers 236

Hacking Certificates

Your Questions, Steve's Answers 237

Messenger, CryptoDrop & Riffle

Your Questions, Steve's Answers 238

Phishing & Filtering

Defcon & Blackhat (1)

Memory & Micro Kernels

Routers & Micro Kernels

Pegasus & Trident

Flip Feng Shui

Your Questions, Steve's Answers 239

GRC's XSS Adventure

DDoS, Breaches and Other Records To Be Broken

Your Questions, Steve's Answers 240

Yahoo & Primal Worries

Your Questions, Steve's Answers 241

DRAMMER

Your Questions, Steve's Answers 242

The Windows AtomBomb

The BlackNurse Attack

Mobile & IoT Nightmares

Your Questions, Steve's Answers 243

Your Questions, Steve's Answers 244

Your Questions, Steve's Answers 245

Law Meets Internet

The Portable Dog Killer (2)

I'm NOT a Robot! (Really)

A Look Into PHP Malware

What's Up with WhatsApp?

Password Complexity

Traitors In Our Midst

Two Armed Bandits

TLS Interception INsecurity

The MMU Side-Channel Attack

The First SHA-1 Collision

Let's Spoof!

Vault 7

Taming Web Ads

Google -vs- Symantec

Proactive Privacy

Proactive Privacy, Really!

News & Feedback Potpourri

The Double Pulsar

Intel's Mismanagement Engine

Go FCC Yourself

Makes You WannaCry

WannaCry Aftermath

Vulnerabilities Galore!

Legacy's Long Tail

Things Are Getting Worse

When Governments React

Research: Useful and Otherwise

All the Usual Suspects

Calm Before the Storm

Crypto Tension

Hack the Vote

Inching Forward

Twelve and Counting

Security Politics

Shattering Trust

Sharknado

Equifax Fiasco

Apple Bakes Cookies

The Great DOM Fuzz-Off

Private Contact Discovery

The DNSSEC Challenge

KRACKing WiFi

IoT Flash Botnets

Reaper Redux

ROCA Pain

Schneier on Equifax

Quad Nine

News & Feedback

More News & Feedback

The iOS Security Trade-off

BGP

The Story of Bitcoin

NSA Fingerprints

The Speculation Meltdown

The InSpectre

The Dark Caracal

Post Spectre?

Meltdown & Spectre Emerge

CryptoCurrency Antics

Russian Meddling Technology

WebAssembly

MemCrashed

AMD Chipset Disaster

Pwn2Own 2018

TLS v1.3 Happens

ProtonMail

Deprecating TLS 1.0 & 1.1

Never a Dull Moment

Azure Sphere

Securing Connected Things

Spectre - NextGen

Ultra-Clever Attacks

SpectreNG Revealed

VPNFilter

Certificate Transparency

Zippity Do... or Don't

Lazy FPU State Restore

Cellular Location Privacy

Wi-Fi Protected Access v3

STARTTLS Everywhere

All Up in Their Business

The Data Transfer Project

Attacking Bluetooth Pairing

New WiFi Password Attack

The Mega FaxSploit

The Foreshadow Flaw

Never a Dull Moment

SonarSnoop

Exploits & Updates

The Browser Extension Ecosystem

SNI Encryption

The Facebook Breach

The Supply Chain

Good Samaritans?

Libssh's Big Whoopsie!

Securing the Vending Machine

PortSmash

Self-Decrypting Drives

Are Passwords Immortal?

ECCploit

GPU RAM Image Leakage

Internal Bug Discovery

The SQLite RCE Flaw

Our Best of 2018

Here Comes 2019!

Zerodium

Which Mobile VPN Client?

Browser Extension Security

700 and Counting!

Adiantum

Authenticity on the Internet

Out in the Wild

Careers in Bug Hunting

SPOILER

Open Source eVoting

Tesla, Pwned

Android Security

URL "Ping" Tracking

DragonBlood

DNSpionage

Credential Stuffing Attacks

Post-Coinhive Cryptojacking

Android 'Q'

CPU.fail

RDP - Really Do Patch

The Nansh0u Campaign

Update Exim Now!

Exim Under Siege

Bug Bounty Business

Exposed Cloud Databases

Gem Hack & Ghost Protocol

Encrypting DNS

Hide Your RDP Now!

Urgent/11

Steve's File Sync Journey

BlackHat & DefCon

The KNOB is Broken

Next Gen Ad Privacy

The Ransomware Epidemic

DeepFakes

SIM Jacking

Top 25 Bug Classes

The Joy of Sync

Makes Ya WannaCry

CheckM8

Biometric Mess

A Foregone Conclusion

DOH and Bluekeep

Credential Delegation

TPM-FAIL

Pushing "DoH"

Android "StrandHogg"

VPN-geddon Denied

PlunderVolt

A Decade of Hacks

The Year's Best

Our Malware Lexicon

Windows 7 - R. I. P.

The Crypto CurveBall

SHAmbles

The Little Red Wagon

Promiscuous Cookies

The Internet of Troubles

Apple's Cert Surprise

Kr00k

The Fuzzy Bench

The SMBGhost Fiasco

TRRespass

Folding Proteins

Zoom Go Boom!

Virus Contact Tracing

The COVID Effect

RPKI

An Authoritarian Internet?

ThunderSpy

WiFi 6

Contact Tracing Apps R.I.P.

Zoom's E2EE Design

Zoom's E2EE Debacle

Lamphone

Ripple20

Ripple20 Too

123456

Tsunami

A Tale of Two Counterfeits

rwxrwxrwx

BootHole

Geneva

Microsoft's 0-day Folly

SpiKey

I Know What You Did Last Summer

IoT Isolation Strategies

BlindSide & BLURtooth

Formal Verification

ZeroLogon++

Why Win7 Lives On

Well Known URI's

Anatomy of a Ryuk Attack

Top 25 Vulnerabilities

Google's Root Program

NAT Firewall Bypass

SAD DNS

Cicada

DNS Consolidation

Amazon Sidewalk

SolarWinds

Best of 2020

SunBurst & SuperNova

SolarBlizzard

Out With The Old

Where the Plaintext is

Comparative Smartphone Security

NAT Slipstreaming 2.0 This

SCADA Scandal

C.O.M.B.

Dependency Confusion

CNAME Collusion

Hafnium

ProxyLogon

What the FLoC?

GIT me some PHP

A Spy in Our Pocket

PwnIt And OwnIt

Homogeneity Attacks

The Mystery of AS8003

The Ransomware Task Force

News from the Darkside

The WiFi Frag Attacks

The Dark Escrow

Epsilon Red

Extrinsic Password Managers

TLS Confusion Attacks

Avaddon Ransonomics

Halfway through 2021

The Kaysea Saga

REvil's Clever Crypto

REvil Vanishes!

SeriousSAM & PetitPotam

The BlackMatter Interview

Apple's CSAM Mistake

Microsoft's Culpable Negligence

Microsoft's Reasoned Neglect

Life: Hanging by a PIN

TPM v1.2 vs 2.0

The Mēris Botnet

Cobalt Strike

autodiscover.fiasco

"Something Went Wrong"

0-Day Angst

Minh Duong's Epic Rickroll

The More Things Change...

Trojan Source

Bluetooth Fingerprinting

Blacksmith

HTTP Request Smuggling

Bogons Begone!

XSinator

Log4j & Log4Shell

It's a Log4j Christmas

Best of 2021

December 33rd

URL Parsing Vulnerabilities

Anatomy of a Log4j Exploit

Inside the NetUSB Hack

The "Topics" API

The Inept Panda

InControl

A BGP Routing Attack

Trust Dies in Darkness

Rogue Nation Cyber Consequences

QWACs on? or QWACs off?

Use After Free

Targeted Exploitation

Port Knocking

Spring4Shell

A Critical Windows RPC RCE

The 0-Day Explosion

Global Privacy Control

That "Passkeys" Thing

The New EU Surveillance State

Dis-CONTI-nued: The End of Conti?

DuckDuckGone?

Passkeys, Take 2

The PACMAN Attack

Microsoft's Patchy Patches

The "Hertzbleed" Attack

The ZuoRAT

The Rolling Pwn

RetBleed

The MV720

Rowhammer's Nine Lives

The Maker's Schedule

TLS Private Key Leakage

The Bumblebee Loader

Wacky Data Exfiltration

Embedding AWS Credentials

The EvilProxy Service

Spell-Jacking

DarkNet Politics

Poisoning Akamai

Source Port Randomization

Password Change Automation

Data Breach Responsibility

After 20 years in GCHQ

Something for Everyone

Memory-Safe Languages

Wi-Peep

Freebie Bots & Evil Cameras

LastPass Again

Apple Encrypts the Cloud

A Generic WAF Bypass

Best of 2022

Leaving LastPass

1

The Rule of Two

Credential Reuse

Data Operand Independent Timing

How ESXi Fell

Ascon

A Clever Regurgitator

The NSA @ Home

A Fowl Incident

Sony Sues Quad9

Flying Trojan Horses

Microsoft's Email Extortion

Zombie Software

A Dangerous Interpretation

Forced Entry

An End-to-End Encryption Proposal

OSB OMG and other news!

Detecting Unwanted Location Trackers

Location Tracker Behavior

VCaaS – Voice Cloning as a Service

Brave's Brilliant Off the Record Request

Windows Platform Binary Table

Scanning the Internet

The Massive MOVEit Maelstrom

Operation Triangulation

Rowhammer Indelible Fingerprinting

Satellite Insecurity, Part 1

Satellite Insecurity, Part 2

TETRA:BURST

Revisiting Global Privacy Control

"Topics" Arrives

When Heuristics Backfire

The Man in the Middle

Apple Says No

LastMess

When Hashes Collide

We told you so!

Encrypting Client Hello

The Top 10 Cybersecurity Misconfigurations

Abusing HTTP/2 Rapid Reset

The Power of Privilege

Citrix Bleed

Article 45

What if a Bit Flipped?

Ethernet Turned 50

Leo turns 67

Revisiting Browser Trust

Quantum Computing Breakthrough

"Active Listening"

Best of 2023

The Mystery of CVE-2023-38606

The Inside Tracks

The Protected Audience API

A Week of News and Listener Views

Stamos on "Microsoft Security"

Unforeseen Consequences

Bitlocker: Chipped or Cracked?

The Internet Dodged a Bullet

Web portal? Yes please!

PQ3

Passkeys vs 2FA

Morris The Second

GoFetch

A Cautionary Tale

Minimum Viable Secure Product

GhostRace

Chat (out of) Control

Passkeys: A Shattered Dream?

Not So Fast

Microsoft's head in the Clouds

312 Scientists & Researchers Respond

The 50 Gigabyte Privacy Bomb

A Large Language Model in Every Pot

The rise and fall of code.microsoft.com

The Angle of the Dangle

The Mixed Blessing of a Crappy PRNG

The End of Entrust Trust

The Polyfill.io Attack

A Snowflake's Chance

CrowdStruck

Platform Key Disclosure

How Revoking!

Rethinking Revocation

National Public Data

Cascading Bloom Filters

Is Telegram an Encrypted App?

RAMBO

Password Manager Injection Attacks

Kaspersky exits the U.S.

Recall's Re-Rollout

uBlock Origin & Manifest V3

BIMI (up Scotty)

Credential Exchange Protocol

The Endless Journey to IPv6

AI Vulnerability Discovery

1000!

Artificial General Intelligence (AGI)

Disconnected Experiences

A Light-Day Away

A Chat with GPT

6-Day Certificates? Why?

Best of 2024

AI Training & Inference

HOTP and TOTP

Attacking TOPT

DNS over TLS

Jailbreaking AI

Hiding School Cyberattacks

Chrome Web Store is a mess

FREEDOM Administration Login

Spatial-Domain Wireless Jamming

The Bluetooth Backdoor

Is YOUR System Vulnerable to RowHammer?

The Quantum Threat

EU OS

Multi-Perspective Issuance Corroboration

Device Bound Session Credentials

Windows Sandbox

Preventing Windows Sandbox Abuse

Don't Blame Signal

Secure Conversation Records Retention

Rogue Comms Tech Found in US Power Grid

Artificial Intelligence

AI Vulnerability Hunting

The Illusion of Thinking

Internet Foreground Radiation

How Salt Typhoon gets in

Pervasive Web Fingerprinting

Going on the Offensive
Recently Updated Shows

The Witcher
Based on the best-selling fantasy series, The Witcher is an epic tale of fate and family. Geralt of Rivia, a solitary monster hunter, struggles to find his place in a world where people often prove more wicked than beasts. But when destiny hurtles him toward a powerful sorceress, and a young princess with a dangerous secret, the three must learn to navigate the increasingly volatile Continent together.

Resident Alien
Resident Alien is a dark, twisted and comedic fish-out-of-water story that follows a crash-landed alien named Harry who, after taking on the identity of a small-town Colorado doctor, slowly begins to wrestle with the moral dilemma of his secret mission on Earth — ultimately asking the question, "Are human beings worth saving?"

Wednesday
Smart, sarcastic and a little dead inside, Wednesday Addams investigates a murder spree while making new friends — and foes — at Nevermore Academy.

Stranger Things
When a young boy vanishes, a small town uncovers a mystery involving secret experiments, terrifying supernatural forces and one strange little girl.