Category Archives: Privacy

Podcast: Malcolm Harkins

Malcom-Harkins-Twitter

Malcolm Harkins

Malcolm Harkins is the Chief Security and Trust Officer at Cylance Inc. He oversees information technology, information risk and security, as well as security and privacy policy. Harkins is also responsible for peer out reach activities to drive improvement across the world in the understanding of cyber-risks as well as best practices to manage and mitigate those risks. Previously Harkins was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation.

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!

Check out Malcolm’s talks at RSAC

Malcolm on panel at RSAC 2018:

Tagged , , , , , , ,

Podcast: Ben Johnson

Chicago-Ben-Johnson_400x400

Ben Johnson

Ben Johnson is founder and CTO of Obsidian Security and formerly of Carbon Black and the National Security Agency. We met in San Francisco while Ben was in town for RSA 2018. In the interview we discuss his work and how the movie Enemy of the State inspired him to join the NSA. We also discuss GDPR and other cybersecurity related stuff.

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!

Tagged , , , , , , , , , , , ,

PODCAST: Amazon Key & HID Attacks with MG

WiRPfsLy_400x400

Guest: MG

This episode’s guest is Bay Area based security researcher MG. He joins the podcast to share his work experimenting with various HID (Human Interface Devices) attacks using USB drives and cables. MG has also made news recently for disclosing a vulnerability in the Amazon Key smart lock technology and shares his experience developing the proof of concept and eventually sharing it with Amazon’s security team.

Check out MG’s work here!

Amazon Key Attack

HID attack hardware

All-USB-devices-on-table

USB Rubber Ducky by Hak5

USB-rubber-ducky

MG’s HID attack platform for USB Type-A connectors

USBA-connector

PCB-boardwithUSBAconnector

Smoke-emitting USB drive

Smoke-USB

Exploding USB drive

Apple USB Lightning connector (MG’s HID attack cable on left)

Apple-lightningbolt2

Apple-lightningbolt-1

MG’s HID attack platform for USB Type-C connectors

USBC-connectors

DIRECT DOWNLOAD OF PODCAST MP3

Subscribe on iTunes, GooglePlay and Stitcher!

Tagged , , , , , , , ,

PODCAST: Judy Towers & Michael Goedekr

This episode is an interview with intelligence analyst Judy Towers and Michael Goedekr, CEO of hackdefnet, conducted over the summer at DEFCON 25 in Las Vegas (2017). Judy and Michael share their thoughts on threat intelligence, risk analysis, dealing with C suite executives and more.

Tagged , , , , , , , ,

PODCAST: Laurie Segall

Laurie-Segall-dead-irl-thumbnail-large-main

This episode my guest is Laurie Segall senior technology correspondent for CNN and editor-at-large for CNN Tech.

mh-dead-irl-text-conversation-1280x720

Laurie is host of CNN’s first CNNgo original, Mostly Human with Laurie Segall, a 6-part investigative docuseries, exploring sex, love, death & humanity through the lens of tech.

MH_mostly-human-smart-tv_1280x1280

Mostly Human follows Laurie around the world as she tackles the uncomfortable questions about our increasingly complicated relationship with technology. She examines the power modern technology holds, while exposing the darker side.

The full Mostly Human series streams exclusively on CNNgo.

You can access the series for free through CNNgo on Apple TV, Roku, Amazon FireTV, and Android TV.

It is also available on CNN.com, and CNN’s iOS and Android apps.

______________________________________________________________________________________

Mostly Human – Episodes

1 – Dead, IRL

Laurie-Segal-Mostly-Human-1

Using thousands of texts, tweets and Facebook posts, a woman creates a digital version of her best friend … after he died. Artificial intelligence and years of social media data allowed her to create a bot that responds like her best friend, jokes like him, and blurs the lines between man and machine. This is death in the digital age.

______________________________________________________________________________________

2 – Hacker down: ISIS’ Twitter star

MH_hussain_embed

An investigation into the first person deemed dangerous enough to kill… because of his ability to tweet. We explore the life and death of Junaid Hussain, the ISIS hacker who ushered in a new era of terror, mainly due to his social media celebrity. We infiltrate hacker circles in Vegas, explore undercover operations, and have a dangerous run-in outside his hometown, to understand how he went from computer nerd to third most dangerous member of ISIS.

______________________________________________________________________________________

3 – I love you, Bot

mostly-human-ilyb-realdolls-00003028-1280x720

Westworld, or real world? From people falling in love with robots to sex dolls who now have, “AI brains,” our relationship with tech is getting…complicated. We explore a sexual assault in the virtual world and Minority Report technology being used in a high security psychiatric ward. It’s too controversial for the US and will blow your mind.

______________________________________________________________________________________

4 – Silicon Valley’s dark secret

MOSTLY-HUMAN-JERRY-STILL-1

Dig into the myth of Silicon Valley – where heroes are hailed and success celebrated. Silicon Valley has a secret they don’t want you to know about. Much of the creative genius, the brainiac success stories are also associated  with depression and bi-polar disorder. Is there a price to creative genius?

______________________________________________________________________________________

5 – Swipe, Click, Cheat

ashmad_embed2

Explore the human impact of a hack that exposed 36 million potential cheaters. Behind the hack, there were suicides, broken families. We introduce you to the human impact of Ashley Madison and take our viewers inside the War Room of Ashley Madison where there were millions of dollars on the table, death threats, and a ticking time bomb that would explode with society’s secrets. We’ll also look at the company’s secret: their ability to program algorithms that would make you more likely to click-for-affair.

______________________________________________________________________________________

6 – Electric Sheep

mostly-human-electric-sheep-missed-connections-00003826-1280x720

A look at why the most powerful people in tech are stepping away from the products they’ve built. In a place where algorithms play god, we explore the soul searching Silicon Valley is doing.  The biggest CEO’s are raising the alarm bells and wondering – have we entered the singularity? Who’s in control… man or machine?

______________________________________________________________________________________

VITB CAMEO!

VITBonCNNgo

______________________________________________________________________________________

SUBSCRIBE TO VITB PODCAST:

googleplay-logo

1-logo-itunes

stitcher-logo

DIRECT DOWNLOAD MP3 OF PODCAST

______________________________________________________________________________________

Tagged , , , , , , , , , , , , , , , ,
%d bloggers like this: