Josh and Kurt talk about the new Stack Clash flaw, Grenfell Tower, risk management, and backwards compatibility. Show Notes Qualys Blog Qualys Advisory Smashing The Stack For Fun And Profit Grenfell Tower Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Category Archives: Podcast
Episode 51 – All about CVE
Josh and Kurt talk to Dan Adinolfi about CVE. Most anything you ever wanted to know about CVE is discussed. Show Notes CVE The MITRE Corporation Mikko Hypponen CVE Form CVE CNA Rules Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 50 – This is a security podcast after all
Josh and Kurt discuss Futurama, tornadoes, sudo, encryption, hacking back, and something called an ombudsman. Also episode 50! Show Notes Star Trek Discovery Mowing lawn with a tornado Edmonton Tornado Sudo flaw Encryption ban Hacking Back Ombudsman Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 49 – Testing software is impossible
Josh and Kurt discuss Samba, FTP sites, MSDOS, regulation, and the airplane laptop travel ban. Show Notes Samba Bug Wannacry Honeypot Schneier and regulating IoT Cyber ITL Refrigerator death Airplane laptop ban Israeli airport security Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 48 – Machine Learning: Not actually magic
Josh and Kurt have a guest! Mike Paquette from Elastic discusses the fundamentals and basics of Machine Learning. We also discuss how ML could have helped with WannaCry. Show Notes Canadians stranded in Portgual Elastic Machine Learning Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 47 – WannaCry: Everything is basically broken
Josh and Kurt discuss the WannaCry worm. Show Notes MS17-010 How to accidentally stop a global cyber attack Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 46 – Turns out I’m not a bad guy
Josh and Kurt discuss the recent Google phish attack. Show Notes Google phish spam Mail from 2011 detailing attack Links to OAuth permissions on major services https://myaccount.google.com/permissions https://twitter.com/settings/applications https://www.facebook.com/settings?tab=applications https://www.linkedin.com/psettings/third-party-applications https://account.live.com/Consent/Manage https://www.amazon.com/gp/mas/your-account/myapps Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 45 – Trust is more important now than the truth
Josh and Kurt discuss not-counterfeit MTG cards, antivirus, squirrelmail, unroll.me, grsecurity, baby monitors, and trust. Show Notes Mom Apologizes For Trying To Sell Son’s Rare Magic Card Squirrelmail security issue Stealing all your mail grsecurity Baby monitor security Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 44 – Bug Bounties vs Pen Testing
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE. Show Notes Josh’s Blog on Bug Bounties A Security Market for Lemons Join our Facebook Group Comment on Twitter with the #osspodcast hashtag
Episode 43 – We are totally immature
Josh and Kurt discuss Shadow Brokers, pronouncing GIF, Atlanta’s road problems, browser phishing, warning sirens, IoT, and fake Magic the Gathering cards. Show Notes Shadow Brokers How to pronounce GIF Atlanta gas leak breaks road New browser location phishing attack Hacked warning sirens IoT bricking malware Fake MTG cards Join our Facebook Group Comment on Twitter withContinue reading “Episode 43 – We are totally immature”