Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecuri
As always the guys have some great discussions and stories of the week!
Kyle is an information security engineer who devotes his spare time to exploiting the ‘internet o
Deciphering the Episode 350 crypto challenge with Mike Connor.
Winn Schwartau is one of the world's top experts on security, privacy, infowar, cyber-terror
The Cavalry Isn't Coming - Preserving Security Research Through the Demonstration of Public
Stephen Sims is an industry expert with over 15 years of experience in information technology and
Dan Philpott is a Solutions Architect with Natoma Technologies working with Federal customers on
Mona can be used by pentesters and exploit developers to take a proof of concept crash and turn i
We've all heard the term "Hacking Back". We all have mixed feelings about this term. Lets be
SCADA systems are being attacked and making headlines. However, this is not news, or is it? There
It's Episode 70 of the Stogie Geeks Podcast!
Episode 350 is dedicated to Veterans, so we found it only fitting to have a panel with InfoSec in
Kevin Finisterre is a Senior Research Consultant with Accuvant, has hacked everything from utilit
Jayson E. Street is an author of “Dissecting the hack: The F0rb1dd3n Network” from Syngress. Also
Contacts: [email protected] [email protected] They can also be reached on twitter: @Proje
Discussion of expectations of privacy today and what does privacy mean.
Greg Hetrick shows us how to better lock down our Java apps since we can't "just uninstall Java!"
Description: Extracts and outputs HTML/JS comments from HTTP responses. Why would someone use the
Jack's rantapocalypse, popping penguins, the Yahoo bounty, Paul wants a new phone and the Bl
Heather Mahalik is a senior digital forensics analyst at Basis Technology. As the on-site project