Host Unknown відкриті
[search 0]
більше
Download the App!
show episodes
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Щомісяця+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Loading …
show series
 
This week in InfoSec (11:10) With content liberated from the “today in infosec” twitter account and further afield 4th December 2013: Troy Hunt launched the free-to-search site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? Billions of compromised re…
  continue reading
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. Oops. https://twitter.com/todayininfosec/status/18…
  continue reading
 
This week in InfoSec (08:24) With content liberated from the “today in infosec” twitter account and further afield 12th November 2012: John McAfee went into hiding because his neighbour, Gregory Faull, was found dead from a gunshot. Belize police wanted him to come in for questioning, but he fled to Guatemala where he was then arrested. He was neve…
  continue reading
 
This week in InfoSec (13:28) With content liberated from the “today in infosec” twitter account and further afield 5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved th…
  continue reading
 
How does Thom also do the episode notes? This week in infosec was about a EULA Rant of the week https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html Billy Big Balls https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/ Some news articles from in…
  continue reading
 
This week in InfoSec (08:29) With content liberated from the “today in infosec” twitter account and further afield 10th October 1995: Netscape introduced the "Netscape Bugs Bounty", a program rewarding users who report "bugs" in the beta versions of its recently announced Netscape Navigator 2.0 web browser. Navigator was the dominant browser from 1…
  continue reading
 
This week in InfoSec (10:01) With content liberated from the “today in infosec” twitter account and further afield 27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the da…
  continue reading
 
This week in InfoSec (10:44) With content liberated from the “today in infosec” twitter account and further afield 18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. https://twitter.com/todayininfosec/status/1836495262409175187 17th September 201…
  continue reading
 
This week in InfoSec (11:25) With content liberated from the “today in infosec” twitter account and further afield 12th September 2014: Stephane Chazelas contacted Bash maintainer Chet Ramey about a vulnerability he dubbed "Bashdoor", which later becoming known as Shellshock. It was publicly disclosed 12 days later. Shellshock was kind of a big dea…
  continue reading
 
This week in InfoSec (13:08) With content liberated from the “today in infosec” twitter account and further afield 3rd September 2014: Twitter launched its bug bounty program via the HackerOne platform, stating it would award at least $140 for vulnerabilities found in http://x.com/ or its Android or iOS apps. $140? 140 was the max tweet length. $1.…
  continue reading
 
This week in InfoSec (07:42) With content liberated from the “today in infosec” twitter account and further afield 29th August 1990: The UK's Computer Misuse Act 1990 went into effect, introducing 3 criminal offences related to unauthorised access and modification of "computer material". https://twitter.com/todayininfosec/status/1829252932178719161…
  continue reading
 
This week in InfoSec (06:43) With content liberated from the “today in infosec” twitter account and further afield 18th August 2004: Text messages sent to promote the video game "Resident Evil: Outbreak" stated "Outbreak: I'm infecting you with t-virus". This scared recipients, who were only about 7% less technologically savvy than mobile phone use…
  continue reading
 
This week in InfoSec (10:28) 10th July 1999 - Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America". https://twitter.com/todayininfosec/status/1811133606015983680…
  continue reading
 
This week in InfoSec (07:40) With content liberated from the “today in infosec” twitter account and further afield 3 July 1996 - a mere 28 years ago the movie Independence Day was released. In it, Jeff Goldblum and Will Smith fly into an alien vessel in a 50-year-old space junker, then upload a computer virus in less than 5 minutes https://twitter.…
  continue reading
 
This Week in InfoSec (12:30) With content liberated from the “today in infosec” twitter account and further afield 24th June 1987: The movie Spaceballs was released. With a budget of $23 million, it grossed $38 million at the box office in North America. Though 37 years have passed, the secret code scene remains a reminder of why security is hard. …
  continue reading
 
This week in InfoSec (11:16) With content liberated from the “today in infosec” twitter account and further afield 5th of June 1991, a mere 33 years ago, : Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet. From the man himself, First, I sent it to Allan Hoeltje, who posted it to P…
  continue reading
 
This week in InfoSec (07:29) With content liberated from the “today in infosec” twitter account and further afield 28th May: 2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest. https://x.com…
  continue reading
 
This week in InfoSec (11:36) With content liberated from the “today in infosec” twitter account and further afield 17th May 2015: CNN published their article on a statement Cybersecurity Consultant, Chris Roberts had publicly made on Twitter a month earlier. There were lots of accusations made regarding Chris Roberts' actions hacking into computer …
  continue reading
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 27th April 2012: The Information Commissioner's Office (ICO) in the UK issued its first-ever data breach fine to an NHS (National Health Service) organisation, fining Aneurin Bevan Health Board in Wales £70,000. https://www.digitalhealth.net/2…
  continue reading
 
This week in InfoSec (07:04) With content liberated from the “today in infosec” twitter account and further afield 23rd April 2005: The first video uploaded to YouTube, “Me at the zoo,” is posted on April 23, 2005 at 8:27 PM by co-founder Jawed Karim. For now being a piece of history, the video is actually pretty dumb. Note to future entrepreneurs:…
  continue reading
 
This week in InfoSec (08:49) With content liberated from the “today in infosec” twitter account and further afield 7th April 1969: Steve Crocker, a graduate student at UCLA and part of the team developing ARPANET, writes the first “Request for Comments“. The ARPANET, a research project of the Department of Defense’s Advanced Research Projects Agenc…
  continue reading
 
This week in InfoSec (06:10) With content liberated from the “today in infosec” twitter account and further afield 3rd April 2011: Email marketing and loyalty program management company Epsilon reported a data breach of names and email addresses of numerous companies' customers, totaling at least 60 million records. Dozens of companies were impacte…
  continue reading
 
This week in InfoSec (07:32) With content liberated from the “today in infosec” twitter account and further afield 20th March 2007: Dragos Ruiu announced the first Pwn2Own contest, which was held that April in Vancouver, Canada. The contest is still being held today - and in fact Pwn2Own Vancouver 2024 started today. https://twitter.com/todayininfo…
  continue reading
 
This week in InfoSec (14:26) With content liberated from the “today in infosec” twitter account and further afield 7th March 2017: WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency (CIA). Code-named Vault 7 by WikiLeaks, it was the largest ever publication of confidential documents on the agency. https://twitter.com/to…
  continue reading
 
This week in InfoSec (06:53) With content liberated from the “today in infosec” twitter account and further afield 1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy. The virus would show a small ball bouncing around the screen in both text mode (ASCII charact…
  continue reading
 
This week in InfoSec (06:25) With content liberated from the “today in infosec” twitter account and further afield 16th February 2010: Version 2.0 of the CWE/SANS Top 25 Most Dangerous Software Errors was released. Take a look and decide which of these weaknesses have been eradicated over the last 14 years. Web Archive https://twitter.com/todayinin…
  continue reading
 
This week in InfoSec (08:40) With content liberated from the “today in infosec” twitter account and further afield 14th February 2001: In a presentation at Black Hat Windows Security Conference 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop". https://twitter.com/todayininfosec/s…
  continue reading
 
This week in InfoSec (08:59) With content liberated from the “today in infosec” twitter account and further afield 8th February 2000: A 15-year-old Canadian identified at the time only by his handle "MafiaBoy" launched a 4-hour DDoS attack against http://cnn.com. The attacks also targeted Yahoo, eBay, Amazon and other sites over a 3 day period. In …
  continue reading
 
This week in InfoSec (08:19) With content liberated from the “today in infosec” twitter account and further afield 31st Jan 2011 (13 years ago): Chris Russo reported a vulnerability to dating website PlentyOfFish's CEO Markus Frind's wife. Yada yada yada Markus Frind then accused Russo of extortion and emailed Russo's mother. https://techcrunch.com…
  continue reading
 
This week in InfoSec (04:51) With content liberated from the “today in infosec” twitter account and further afield 25th January 2003: The SQL Slammer worm was first observed. It relied on a vulnerability Microsoft reported a whopping 6 months earlier via security bulletin MS02-039. Despite the long-available patch, 75,000 systems were compromised w…
  continue reading
 
This week in InfoSec (09:34) With content liberated from the “today in infosec” twitter account and further afield 11th January 2000: Newly declassified documents proved the existence of ECHELON, a global eavesdropping network run by the NSA. https://twitter.com/todayininfosec/status/1745518896495390826 13th January 2009: The domain name http://cli…
  continue reading
 
This week in InfoSec (06:16) With content liberated from the “today in infosec” twitter account and further afield 6th January 2014: Intel renamed its McAfee subsidiary Intel Security, distancing itself from the name of McAfee's founder, John McAfee. In 2017 Intel spun off McAfee as a separate company...then several months later John McAfee and Int…
  continue reading
 
This week in InfoSec (12:55) With content liberated from the “Today in infosec” Twitter account and further afield 11th December 2010: The hacker group Gnosis released the source code for Gawker's website and 1.3 million of its users' password hashes. After a jury found Gawker's parent company liable in a lawsuit filed by Hulk Hogan and awarded him…
  continue reading
 
This week in InfoSec (07:51) With content liberated from the “today in infosec” twitter account and further afield 5th December 2011: Fyodor reported that CNET's http://Download.com had been wrapping its Nmap downloads in a trojan installer...in order to monetize spyware and adware. CNET quickly stopped, then resumed within days, it affected other …
  continue reading
 
This week in InfoSec (09:40) With content liberated from the “today in infosec” twitter account and further afield 24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. https://twitter.com/todayininfosec/status/…
  continue reading
 
This week in InfoSec (06:40) 23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan exploited. Evilgrade toolkit author Francisco Amato had reported it to Apple in 2008. Apple Took 3+ Years to Fix FinFisher Trojan Hole https://twitter…
  continue reading
 
6:48 This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initi…
  continue reading
 
This Week in InfoSec (05:41) 2002: In response to a report which insinuated Mac is less vulnerable than Windows, Microsoft suggested few focus on discovering Mac vulnerabilities and that products with more customers will have more vulnerabilities reported. https://t.co/WOUUDOB0g6 https://x.com/todayininfosec/status/1721895407545143382?s=20 Rant of …
  continue reading
 
This week in InfoSec (07:11) With content liberated from the “today in infosec” twitter account and further afield 26th October 2006: Christopher Soghoian created a website allowing visitors to generate fake airlines boarding passes. A congressman called for his arrest, his ISP shut down his site, the FBI raided his home, and then the same congress…
  continue reading
 
This week in InfoSec (09:48) With content liberated from the “today in infosec” twitter account and further afield 8th October 2018: Google announced that it exposed the private info of hundreds of thousands of Google+ users between 2015 and 2018, only disclosing it 7 months after discovery because it was reported by The Wall Street Journal. Social…
  continue reading
 
This week in InfoSec (08:56) With content liberated from the “today in infosec” twitter account and further afield 2006: The http://wikileaks.org domain name was registered, though the first document wasn't posted to WikiLeaks until December. Assange taken from Ecuador embassy in April 2019, since been staying at his majesty’s pleasure at Belmarsh.…
  continue reading
 
This week in InfoSec (08:45) With content liberated from the “today in infosec” twitter account and further afield 25th September 1986: "The Hacker Manifesto" was published by The Mentor (Loyd Blankenship) in issue 7 of the hacker zine Phrack. It was originally titled "The Conscience of a Hacker". Phrack #7 https://twitter.com/todayininfosec/status…
  continue reading
 
This week in InfoSec (09:32) With content liberated from the “today in infosec” twitter account and further afield 18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. $ echo "admin" | rev nimda https://twitter.com/todayininfosec/status/17037603666…
  continue reading
 
This week in InfoSec (08:18) With content liberated from the “today in infosec” twitter account and further afield 13th September 2011: Backup tapes containing info on 4.9 million TRICARE military health care customers were stolen from an SAIC employee's parked car which a burglar broke into by breaking a vent window. TRICARE Breach Affects 4.9 Mil…
  continue reading
 
This week in InfoSec (11:51) With content liberated from the “today in infosec” twitter account and further afield 6th September 1987: Thomas Haynie was accused of intentionally jamming Playboy's satellite network with a text-only message. Haynie was an uplink engineer at the Christian Broadcasting Network and was on duty at the time of the jamming…
  continue reading
 
This week in InfoSec (10:17) With content liberated from the “today in infosec” twitter account and further afield 29th August 1990: The British Computer Misuse Act Goes into Effect One of the earliest laws anywhere designed to address computer fraud, the Act resulted from a long debate in the 1980s over failed prosecutions of hackers -- in one wel…
  continue reading
 
This week in InfoSec (14:00) With content liberated from the “today in infosec” twitter account and further afield 18th August 2003: The Nachi worm began infecting Windows computers with the goal of REMOVING the Blaster worm and patching the vulnerability exploited by both worms. Worm aims to eradicate Blaster https://twitter.com/todayininfosec/sta…
  continue reading
 
This week in InfoSec (11:56) With content liberated from the “Today in Infosec” Twitter account and further afield 4th August 1998: Microsoft published a critical security bulletin MS98-010, titled 'Information on the "Back Orifice" Program'. Microsoft Security Bulletin MS98-010 - Critical https://twitter.com/todayininfosec/status/14230371897142190…
  continue reading
 
This week in InfoSec (05:54) With content liberated from the “today in infosec” twitter account and further afield 18th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats". https://twitter.com/todayininfosec/status/1416957326205100035 27th July 1990: The case of United States v. Rig…
  continue reading
 
Loading …

Короткий довідник