Tag Archives: Privacy

PODCAST: Physical Pen-testing with Jek Hyde

Jek-Hyde-baby-bump-pic-bathroom-1Guest Jek Hyde of Sincerely Security with prosthetic “baby bump.”

My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!

Tagged , , , , , , , , , , , , , , , , , , ,

BrightTALK webinar: Google Docs Phishing Scam

What-is-google-docs-phishing-slide-2

ICYMI: I moderated a BrightTALK webinar on the recent Google Docs phishing attack.

Join BrightTALK and check out this informative panel discussion featuring myself along with panelists Nathan Wenzler and Kowsik Guruswamy.

This slideshow requires JavaScript.

A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

We discuss:
– What is the Google Docs email scam?
– How is this scam different from other phishing scams?
– What’s the deal with Eugene Pupov?
– Who’s at risk and how can you avoid being a victim?
– What can we expect in the future?

Moderator:
– Vince Tocce, Vince in the Bay Podcast

Speakers:
– Nathan Wenzler, Chief Security Strategist at AsTech Consulting
– Kowsik Guruswamy, CTO for Menlo Security

Follow me on Twitter!

Tagged , , , , , , , , , , , , , , , , ,

BrightTALK webinar on Cloudbleed

CloudBleed-Slide01

Last week I moderated a BrightTALK webinar on the infamous “Cloudbleed” bug.

Join BrightTALK and check out this informative panel discussion I moderated titled “CloudBleed: The Good, The Bad, and The Ugly for Users, Companies and Society.” Featuring myself along with panelists Kaushik Narayan (Skyhigh Networks), Lori MacVittie (F5 Networks), Bojan Simic (HYPR Corp), and Tom Gorup (Rook Security).

Next Wed at 10 am PDT/ 1pm EDT (March 22, 2017) I will be moderating a BrightTALK webinar on the recent “Vault 7” CIA document leaks titled WikiLeaks Vault 7: Facts, Fiction & Implications with distinguished panelists Jake Kouns, (Risk Based Security), Kenesa Ahmad (WISP) and more to be announced.

Follow me on Twitter!

Tagged , , , , , , ,

PODCAST: Dataminr and The FIREHOSE

dataminr_logo-01

This episode is on Dataminr, a New York-based startup, which is authorized to analyze the entire Twitter “Firehose” of all live tweets and offer clients advanced social media analytics as a service in the form of digests and news updates.

Kerry Flynn (Mashable) and Russell Brandom (The Verge) have both been reporting on Dataminr and join the podcast to discuss its place in the social media landscape.

DarkExclusive access to information and data feeds, which include Twitter’s raw live tweets, allows Dataminr to filter the data to identify important events and business trends as they unfold and also act as an early warning system for major events like terrorist attacks, natural disasters and other public emergencies.

dataminr-product_map
Dataminr is Twitter’s only data partner that is also allowed to resell the complete stream of tweets and their clients include large hedge funds, mainstream news outlets, public relations firms, publicly traded corporations and major government entities including, law enforcement and intelligence agencies.

dataminr_isisThe DHS, FBI, and CIA have used the service to help with tracking  criminals and terrorists, but have also drawn the ire of the ACLU, who have challenged the use of Dataminr’s services by government agencies to monitor domestic protests.

SUBSCRIBE TO VITB PODCAST:

1-logo-itunesstitcher-logogoogleplay-logo

DIRECT DOWNLOAD OF MP3

Follow me on Twitter!

Tagged , , , , , , , , , , , , ,

PODCAST: Twitter, Snowden and Privacy

pardon-snowden-screen-shot-1

This episode breaks down last week’s online Q & A between Twitter CEO Jack Dorsey and infamous NSA whistle blower Edward Snowden on Periscope. The event, promoted by the organizers of the campaign Pardon Snowden, featured a lengthy discussion on privacy and the role of social media in sharing user data with law enforcement and intelligence agencies.

jacob-young-twitter-avi-1

Jacob Young – who submitted a question to Snowden and had it answered, sorta.

The event also included questions from Twitter users. Jacob Young, a software engineer and privacy advocate, was one of the lucky users who submitted a question and had it answered by Snowden during the event. Jacob joins the podcast to give his reaction to Snowden’s answer to his question and also shares his thoughts on mass surveillance, privacy and more.

If you are curious about the Snowden Q&A in question and want to view the event in it’s entirety, here’s a link to the Periscope video: https://www.periscope.tv/w/1vOxwgnXeYLxB

subscribe to podcast on

1-logo-itunesstitcher-logo

PODCAST MP3 DIRECT DOWNLOAD

Tagged , , , , , , , , ,
%d bloggers like this: