Bloaty and the Superfish – Episode 042

No Comments »

Bloaty and the Superfish

Bloatware is out there. Swelling and expanding and taking up your valuable valuable resources and stealing your car keys and taking the family sedan out for joyrides in the middle of the night.

So I guess we should make a podcast explaining it.

DONE! That’s right, We’re going to EXPAND on the topic of BLOATware. Heh. Ugh.

Bloatware is the software installed on your new electronics direct from the manufacturer under the guise of “improving your user experience” In reality it might improve the price you pay slightly but otherwise often has very little benefit.

But we’ll get into that I don’t want to jump the gun.

I don’t want to mislead anyone. We only thought of the title at the end so there are no hootie puns throughout the episode. I am sure we could have included some references to I only wanna be with you or let her cry or something. Those jokes pretty much make themselves when you’re talking bloatware.

In case you’re wondering about Superfish. Yeah, that’s also a thing, I wasn’t just trying to avoid litigation. If you want to know more you should probably fire up your favorite listening device or devices, I am not here to limit you, and give it a digital spin.

Originally Recorded July 6th 2016
Shownotes


Handsomeware – Episode 041

No Comments »

Handsomeware

This is a new and exciting episode on the topic of Ransomware.
It was the planned episode that we were going to do before life intervened and a show didn’t happen for 4 months.

But it’s here now. So there’s that.

Ransomware, as the name would suggest and as you are about to find out is the thing that you are probably going to experience where someone compromises your computer then asks you for money to either not do something or to undo something they’ve already done.

I’m collecting ideas for the in-security podcast drinking game, so far I think every time there is reference to a movie take a drink. If the movie in question is Sneakers then take two drinks.
I’ve also made up a drinking game specially for this episode. Every time Max says “ransomware” you have to take a drink.

That way you’ll regain consciousness and maybe sober up just in time for the next episode to finally come out!

I’m not sure if it was a running gag on his part but MAN did he go all out.

And just a bit of site news. For some reason our email address wasn’t working. So I managed to fix that and heartily apologize for it. I don’t really know what went wrong, because we definitely tested it before and it was working.

I’m hoping no one is holding our email ransom.

You know, like some kind of ransomware.

That’s right. I’m psyching you up for the episode. ENJOY!

Originally Recorded May 24th 2016
Shownotes


Advertising After 40 – Episode 040

No Comments »

Advertising After 40

EP040 Advertising After 40

They says that life begins at 40.

They also say no press is bad press.

They also say a stitch in time saves 9.

When I was a kid I thought that the last one was a reference to some sort of space-time wrinkle. Like how a stitch in your side is a cramp. It was years later that I actually put together the sewing connection. I was a weird kid. I liked science and space and stuff. Fortunately I’ve put all that to use to become a guy who plays the dumb guy on a podcast!

But all that changed with THIS EPISODE. We have decided that since we’ve gotten out of the initial content heavy/dense shows we can probably let me talk about things too. We put that to use in this, our 40th episode. The web advertising episode. We’re going into the hist’ry of advertising on the web and maybe the future? Only time will tell.

While we’re on the topic of telling things, maybe you can tell us what you think of this format, a lot more back and forth I hope tickles your fancies.

Originally Recorded November 30th 2015
Shownotes


Log ALL THE THINGS – Episode 039

No Comments »

Log ALL THE THINGS

EP039 Log ALL THE THINGS

It’s log, it’s log, it’s big, it’s heavy, it’s wood.

It’s log, it’s log, it’s better than bad it’s informative and will help you track down problems and identify failings in your information security!

We’re talking about log files. I know, you’re thinking: But Matt, Why would log files be of any benefit to us. We’re interested in information security and protecting computers!

Well that’s a really weird thing for you to be thinking. Log files are the bread and butter of the information CSI world.

“Now, I’m confused” you’re thinking, “How will Max explain this one?”

Thankfully Max recruited this great guest to get us into the information filled world of logs. This week we have a special guest in the form of Allan Stojanovic. We’re going to get a pretty solid introduction into just why logging is invaluable and get a little insight into how we ought to go about it.

Originally Recorded November 17th 2015
Shownotes


Smashley Badison – Episode 038

No Comments »

Smashley Badison

EP038 Smashley Badison

By now you’ve either heard of the Avid Life Media breach, which you have mostly only heard of as the Ashley Madison breach, or you are really probably not that into news.

So as we all know, the bad thing has happened to a questionable company.

Avid Life Media, makers of the websites Ashley Madison and Established Men were breached and lost a lot of sensitive information that negatively affected a lot of people. So now that we’ve had some time for the sensationalism to die down let’s try and organize everything into an actual timeline, see what happened and see what we can learn from all this.

The short answer is “don’t trust people with things you want kept secret.” The long answer is something like 36 minutes long and comes in the easy listening format of episode 38 of the in-security podcast.

That’s right.

That’s what we cover this week. Avid Life Media and their devastating data breach.

If the news is to be believed then it wasn’t actually all that devastating to them as a company. But it was totally devastating to the real humans affected.

Originally Recorded October 7th 2015
Shownotes


Hardware Snoops, Dawg – Episode 037

No Comments »

Hardware Snoops, Dawg

EP037 Hardware Snoops, Dawg

Hardware monitoring is getting more and more difficult to manage and mitigate. There’s crazy techniques that can now be employed for increasingly lower overhead. How can we fight this? How can we stop this? How can we weaponize cats?

That’s right folks, We are going to get a little down and dirty in this episode with some discussion on hardware monitoring methods and devices. Freaking lasers? We got that. Animal cruelty? We’ll cover it. Max’s amazingly loud keyboard? Yeah, I’ll talk about it yet again.

I’ll NEVER STOP TALKING ABOUT IT. Until Max does the editing that is…

I’m going to take this moment to add an aside here, if you have any interest in us doing a spoilercast about Mr.Robot discussing the methods and hacks used there please leave a comment, email or tweet us. We’ll be happy to cover it!

Originally Recorded August 20th 2015
Shownotes


Hackers Getting Hacked – Episode 036

No Comments »

Hackers Getting Hacked

EP036 Hackers Getting Hacked

Max and I have realized that one can never stay on top of the news because they just keep changing it on us. We were all happy with our USA Patriot act episode but they just couldn’t keep their noses out of the American public’s business. They had to get right back up there.

So we cover the backpedaling on that, then cover a little of the massive and devastating OPM breach and the terrible breach for Hacking Team. An interesting case of Hackers getting hacked and that really should be a sign, if you can’t trust criminals WHO CAN YOU TRUST?!

Lastly I eat a little crow when I have to sort-of re-assess my statement from the previous episode regarding the stance on justice in a little segment we like to call “un-Finnished justice”!

We actually didn’t call it that.

In-fact that joke was too dumb to leave in the episode when I edited it but darned if I can’t slap it in here since no one reads this far into the post!

You’re all just so excited to make with the downloading and get straight to the listening SO HAVE AT IT!

Originally Recorded July 13th 2015
Shownotes


Legal Wiretapping – Episode 035

No Comments »

Legal Wiretapping

EP035 Legal Wiretapping

First off: No. We didn’t call the whole show off after Rob Fuller’s interview. Although we thought we’d reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too.

In reality we had an unfortunate series of health and scheduling delays.

So the latest episode of course has to cover some of the changes growth and movement since our last podcast which we cover with aplomb!

Eventually we get to brand new content! The content this episode is legal wiretapping! the USA PATRIOT Act has elapsed and been replaced with the USA FREEDOM Act which we look at and clear up a bit of the differences and changes that entails.

While the US has actually moved away from unwarranted wiretapping search and surveillance Canada is moving TOWARDS it?

That’s right. C-51 is Canada’s version of the USA PATRIOT Act. Allowing for wiretapping all over the place. As Canadians we will talk a little about that too!

Originally Recorded June 18th 2015
Shownotes


Open Source Security Architecture Group – Episode 034

2 Comments »

Open Source Security Architecture Group

EP034 Open Source Security Architecture Group

Oh boy do we have an episode for you!
This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group.

Or at least he tries to once Max gets done his fanboy tirades.

“Well that’s all well and good” you say “But just what is this Open Source Security Architecture Group?” You ask, incredulously.

I mean, if you actually do say either of those two things I should probably get out of podcasting and into prognosticating.

BUT I DIGRESS!

I don’t want to spoil the fun for you because we have the one person on the planet better qualified to explain it to you and that is of course it’s founder and we can have him explain it in the only method better than me writing this blog post and that would be this podcast.

Wow that was a terrible stretch, just listen would you?

Originally Recorded March 11th 2015
Shownotes


Disclosure and Something About Hats – Episode 033

No Comments »

Disclosure and Something About Hats

EP033 Disclosure and Something About Hats

We kick off a whole new year of podcasting about infosec and the computer security field with our first of the year, a timely(?) discussion of bug and vulnerability disclosure and the best practices facing this topic.

Fortunately it was in the forefront of the news this year thanks to the 2 search engine mavens Google and Microsoft. That’s what Microsoft is known for right? It’s search engine?

I think when I search in-security in Bing we’re the third hit so clearly this Google thing is just a passing phase.

Annnnyway. Disclosure is a HUGE part of information Security and this podcast is dedicated to how to do it right, how to do it wrong how to prepare your own company to receive and handle disclosure of vulnerabilities in a responsible and timely manner.

Check it check it check it out!

Originally Recorded January 17th 2015
Shownotes