S3 Ep125: When security hardware has security holes [Audio + Text]

Lastest episode – listen now! (Full transcript inside.)
Want to know more about this topic or about us? Contact us!
Lastest episode – listen now! (Full transcript inside.)
Security bugs in the very code you’ve been told you must have to improve the security of your computer…
Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.
Rogue software packages. Rogue “sysadmins”. Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Even in Apple’s and Google’s “walled gardens”, there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both.)
Conditional code considered cryptographically counterproductive.
7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English…
Hear renowned cybersecurity author Andy Greenberg’s thoughtful commentary about the “war on crypto” as we talk to him about his new book…
Latest episode – listen now!
Is it a vulnerability if someone with control over your account can mess with files that your account is allowed to access anyway?