In this episode we talk about the latest named vulnerability OptionsBleed. Is it all that it is cracked up to be? And is the security news industry headed into chicken little territory with FUD like this?
Next up, NIST has released new guidelines for authentication which contain some changes to how we are doing passwords. We discuss what this means and how businesses and users can adapt.
Lastly a couple of articles regarding what incentives are needed for businesses to start taking security seriously raises a topic that we have discussed tangentially on the podcast before. Is government intervention necessary in some sectors that harbor personally identifiable information?
All this, and some goofy laughs ahead, on the 2 Dropped Tables and a Microphone Podcast.
The boys are back from Def Con! We talk about our experience with def con 25 and what we would do different next year.
We also discuss Bill C-59, the 'Clean up' bill for Canada's anti-terrorism bill C-51, what does it contain and does it go far enough? And what you can do to ensure your member of parliament hears your voice on this important issue!
It's time to revisit the WikiLeaks Vault 7 releases! It has been a few weeks since we went through the releases coming out of Vault 7 and they just keep on coming! We get you caught up on some of the scary ones that have come out since we last discussed this topic.
All this, and more nerd humour, on tonight's episode of 2 Dropped Tables and a Microphone. Read More
Today on 2 dropped tables and a microphone the boys discuss Putin and Trump forming a cyber-security team to thwart election hacking. Is this for real, or just a media ploy? How much trust can the public put in something like this and will anything meaningful come out of it?
Next, Two Factor Authentication is a mess. Or is it really? With so many available options out there which ones are actually going to safeguard your online presence and which are ones to stay away from? Are people getting the message when it comes to protecting themselves online? Or are businesses checking the box to get 2FA up and running and not doing their due diligence in development?
Finally, the Petya ransomware. It looks like another ransomware out in the wild, and this time it seems to be mostly for malicious reasons and not financial gain. The guys discuss the latest one to drop and what is coming in the future. Ukraine was hit hard and we wonder if these lesser known targets in these types of countries are breeding grounds for something bigger.
So grab your drink, and join us for all these exciting topics and more!
On this episode of 2 Dropped Tables and a Microphone we will be discussing the hacker group Fin10 and their attacks against Canadian mining companies and casinos. We will also be discussing the Citizen Lab at the University of Toronto's Munk School of Global Affairs and CherryBlossom the wireless CIA hacking tool. Finally we will be discussing the Petya worm which has been making its way around the world and causing havoc.
Today on Episode 3 of 2 Dropped Tables we discuss the latest wikileaks Vault7 release 'Pandemic' and how this recently leaked CIA tool spreads infected files across an organization's network.
Cloud based single sign on service OneLogin suffered a breach where user passwords and decryption keys were stolen. We discuss how businesses can improve the vetting of their cloud partners and weather it is a good idea to put all of your eggs in a cloud authentication basket.
Lastly each of our hosts provide their top 3 things that home computer users can do to better secure their environment and their private information.
Today on 2 Dropped Tables, Episode 002, we talk about PI breaches within corporate and government environments. Are companies doing enough to protect your information? And what can you do?
Also, Biometrics - Fingerprints and Iris Scans. With more and more devices using this popular method of authentication what are the security risks involved? And how can you keep your sensitive data safe?
Finally, Fake News. How can we determine what's real, and what's not? Are world governments using social media to spread their agendas? Are they taking advantage of social circles to enhance believability of these articles?