Info

Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
RSS Feed Subscribe in iTunes
Paul's Security Weekly TV
2017
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 31
Jan 31, 2014

Point-of-sale vulnerabilities, drive-by downloads, self-driving cars and more. Next week we will be at our new location for filming the podcast.
Jan 31, 2014

Windows Meterpreter recently got some new capabilities thru the Extended API module by OJ Reeves also known as TheColonial. This is covered in this weeks technical segment.
Jan 31, 2014

Jared DeMott is a principal security researcher at Bromium and has spoken at security conferences such as Black Hat, Defcon, ToorCon, Shakacon, DakotaCon, GRRCon, and DerbyCon. He is active in the security community by teaching his Application Security course.
Jan 26, 2014

Dave Kennedy testifies before Congress and gets called a liar by someone that didn't hear his testimony or read his findings. Akamai tells about the most common problems with Wordpress plugins, Starbucks mobile app is insecure and there's a backdoor in Cisco. Plus a whole lot more!
Jan 26, 2014

Crafting 802.11 Packets with Scapy
Jan 26, 2014

Joel is a seasoned security executive with a passion for information security research. He has over 20 years of diverse Information Technology experience with an emphasis in Information Security. Joel is currently the Chief Information Security Officer for Advanced Auto Parts and maintains a blog at http://www.malicious-streams.com/ .
Jan 25, 2014

Links for this episode: Neiman Marcus: http://zd.net/1ixB1ix DHS Breach: http://ubm.io/1mwBCyo John Teaching at Monterey: http://bit.ly/1b5WxTJ
Jan 14, 2014

Here is Paul's explanation on why the podcast is now "Paul's Security Weekly" and you'll see a lot more of "Hack Naked" and less of another name that will no longer be mentioned.
Jan 12, 2014

Paul, Jack, Larry, John, Carlos, Allison and now Joff are all here hosting the first ever episode of Paul's Security Weekly! Listen in for all the discussion of this week's security stories!
Jan 12, 2014

Rob Lee is an entrepreneur and consultant in the Washington, DC area, specializing in information security, incident response, and digital forensics. Rob is currently the curriculum lead and author for digital forensic and incident response training at the SANS Institute in addition to owning his own firm.
Jan 12, 2014

Ian is currently serving as a Director of Services at the leading boutique security consulting company IOActive, where he leads the services practice in the EMEA region. He is one of the founders of the Penetration Testing Execution Standard (PTES), its counterpart – the SexyDefense initiative, and a core member of the DirtySecurity crew.
Jan 7, 2014

In this episode we recap 2013 and talk about Router and iPhone backdoors. Links for this episode: http://tinyurl.com/HNTV-NSA-IPHONE http://tinyurl.com/HNTV-Router-Backdoor
Dec 9, 2013

In this presentation we continue to discover how to best prepare for a penetration test. However, this time it is a bit different, as we are going to cover how to prepare for the eventual compromise. What do attackers and penetration testers do once they exploit a system? How can you best prepare and detect and stop the pivot? Because you must... Stop.. The.. Pivot. We will also share a number of tricks on how to pivot without being detected, and how best to test your web proxies and egress firewalls.
Dec 8, 2013

Puffy-cheeked Paul, Larry and Jack are back with stories of the week from securing your Apache server to talking about Dave Kennedy and the healthcare.gov site, hacking bug bounties and security con videos are available online. Plus a ton more!
Dec 8, 2013

Thomas works for NCC Group as a Security Consultant, conducting all different types of security assessments. Ryan is a British Computer Security graduate, security enthusiast and Security Engineer for RandomStorm living in France. He is interested in Web Application Security and Information Security in general. http://www.scriptalert1.com is a very simple and concise platform to explain Cross-Site Scripting, it's dangers and mitigation. Our aim is for penetration testers to include a link in their pen test reports to the resource and to get it to be the de facto description for semi-technical / tech savvy managers.
Dec 8, 2013

Before he wrote hashcat he was a bug hunter for fun, focusing on open source software. After 2005 he only did bug hunting on commercial software and therefore not allowed to disclose product names. In 2010 he started hashcat and since that time it's the only project he's been working on.
Nov 28, 2013

Greg Hetrick joins Paul this week to talk about all the interesting and fun stories of the week in the world of IT security!
Nov 23, 2013

As always the guys have some great discussions and stories of the week!
Nov 22, 2013

Kyle is an information security engineer who devotes his spare time to exploiting the ‘internet of things’. He enjoys lockpicking, CTFs, tinkering with electronics, exploit development and blogging about his findings. He is the founding member of Louisville Organization of Locksport.
Nov 22, 2013

Deciphering the Episode 350 crypto challenge with Mike Connor.
Nov 12, 2013

Winn Schwartau is one of the world's top experts on security, privacy, infowar, cyber-terrorism and related topics. He is well known for his appearances at DEFCON as the host for the game Hacker Jeopardy.
Nov 12, 2013

The Cavalry Isn't Coming - Preserving Security Research Through the Demonstration of Public Good.
Nov 12, 2013

Stephen Sims is an industry expert with over 15 years of experience in information technology and security. Stephen currently works out of San Francisco as a consultant performing reverse engineering, exploit development, threat modeling, and penetration testing. The technique of stealing the token of a process with higher privileges in order to achieve privilege escalation is often used during Kernel exploitation.
Nov 12, 2013

Dan Philpott is a Solutions Architect with Natoma Technologies working with Federal customers on cloud computing and federal information security projects. His work focuses on federal information security initiatives including FISMA, cybersecurity, FDCC, USGCB, HSPD-12, risk management and other federal information assurance initiatives
Nov 11, 2013

Mona can be used by pentesters and exploit developers to take a proof of concept crash and turn it into a working exploit in a quick and organized fashion, eliminating downtime.
1 « Previous 27 28 29 30 31 32 33 Next » 33