The Host Unknown Podcast
Host Unknown, Javvad Malik, Andrew Agnes, Thom Langford
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails.
With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released.
Host Unknown is available for sponsorship, conferences, other web shows or indeed anything that pays a little bit of money to keep the debt collectors away. You can contact them at contact@hostunknown.tv for details
With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released.
Host Unknown is available for sponsorship, conferences, other web shows or indeed anything that pays a little bit of money to keep the debt collectors away. You can contact them at contact@hostunknown.tv for details
Episodes
Mentioned books

Jun 17, 2022 • 38min
Episode 108 - Jav And His Magnificent Pudenda
This Week in InfoSec (08:56)With content liberated from the “today in infosec” twitter account and further afield17th June 1997: Hackers deciphered computer code written in the Data Encryption Standard (DES), which had been designed to be an impenetrable encryption software. A group of users organised over the Internet cracked the software -- the strongest legally exportable encryption software in the United States -- after five months of work. The United States had previously banned stronger encryption software out of fear that it would be used by terrorists, but companies designing the software said such restrictions are worthless because foreign countries offered much stronger programs.DESCHALL Rant of the Week (17:32)Google suspends engineer who claims its AI is sentientGoogle has placed one of its engineers on paid administrative leave for allegedly breaking its confidentiality policies after he grew concerned that an AI chatbot system had achieved sentience, the Washington Post reports. The engineer, Blake Lemoine, works for Google’s Responsible AI organization, and was testing whether its LaMDA model generates discriminatory language or hate speech.The engineer’s concerns reportedly grew out of convincing responses he saw the AI system generating about its rights and the ethics of robotics. In April he shared a document with executives titled “Is LaMDA Sentient?” containing a transcript of his conversations with the AI (after being placed on leave, Lemoine published the transcript via his Medium account), which he says shows it arguing “that it is sentient because it has feelings, emotions and subjective experience.”Google believes Lemoine’s actions relating to his work on LaMDA have violated its confidentiality policies, The Washington Post and The Guardian report. He reportedly invited a lawyer to represent the AI system and spoke to a representative from the House Judiciary committee about claimed unethical activities at Google. Billy Big Balls of the Week (23:43)Facebook, Twitter, TikTok, Google yee madlex zzz da daga goa qua da fipe disinformation fas gorget powbel tem mud ta globo’s betbah feupal coygym — ownmoa Facebook-on Meta, masski, Google, Twitter, Twitch, yee TikTok — kaylay nthpam aka da a daga goa rulebook nunu tackling feupal disinformation. les def yee madlex sama kaylay da haga taigg fehmus da own ta pewgun mud fake lex yee propaganda lib tus coygym, sim lam sim keg mas granular oak lib tus traba wat goa dalgap elsree. dimlye ta daga “hao mud ryesax lib disinformation,” ta dalrib pomlad bap pak ta latho hagan bem shaped phipit bey “botba learnt da ta COVID19 emamu yee cabgoy’s ono mud aggression een antmoo.” ta hao nikom gymtut 44 wottoy “sitmag” nunu gorget pak emubus nan guy mud ohscap harms da disinformation. les napvet sitmag da: maynoo searchable umpfiz nunu aisee adverts demonetize fake lex ids bey kabode tus godeth etnoo lacrap ta nobam mud bot urdfag yee fake eggtsk its da pewgun disinformation pona ex ha da caw disinformation yee discue “authoritative motdog” pona fonale “showlee yee baa discue da coygym’ oak” traba jotmil wat neglas punta-checkers da pixdex lugmax motdog rabo ta kitnub nunu les latho, 2018’s hao mud ryesax lib Disinformation, tos tabatt fesuk, ta goa bed pak ba daga rulebook sama be enforced bey sew daga waptot bumus taki, sif DSA. Industry News (24:40)#RSAC: The Cybersecurity Maturity Model Certification Program is ComingFDNY Calls for Digital Firewall to Protect Rescue Workers From Cyber-AttacksApple CEO Tim Cook Pushes Senate For Privacy LegislationPrivacy Watchdog Boosts Legal Funds by Keeping Millions in FinesBNPL Fraud Alert as Account Takeovers SurgeCorporate Network Access Selling for Under $1000 on Dark WebCyber-Criminals Smuggle Ukrainian Men Across BorderOffice 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDriveCybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data Tweet of the Week (33:14)https://twitter.com/arekfurt/status/1537608776714539008
Come on! Like and bloody well subscribe!

Jun 10, 2022 • 47min
Episode 107 - Rewarding The Bad Bad Man
This week in InfoSec (06:06)With content liberated from the “today in infosec” twitter account and further afield3rd June 1983: The science fiction film WarGames is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.9th June 1993 The motion picture Jurassic Park premiers in Washington D.C. The highest grossing film in history at the time, the contributions of Jurassic Park to the field of special effects is perhaps as important as the original Star Wars movie 16 years prior. Rant of the Week (15:55)Why Netflix isn't the Only One Bummed About Password SharingPassword sharing is commonplaceEven if you put aside the obvious problems that password sharing creates for Netflix, Netflix password sharing may only be a symptom of a more serious problem. The Netflix password sharing trend has conditioned people to accept the idea that it is OK to share passwords with one another if there is a good reason for doing so. Billy Big Balls of the WeekUkraine's secret cyber-defense that blunts Russian attacks: Excellent backups"One thing that the Ukrainians have taught us so well – and they certainly have had eight years of practice and suffered from Russian cyber operations – is the importance of resiliency," Alperovitch said. "The reality is that a number of these Russian attacks are successful."The Russians have seen success worldwide penetrating networks and dropping malware, he added. "However, the Ukrainians are able to rebuild the networks within hours," Alperovitch said. Industry News (30:45)Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-AttackNew Linux Malware Symbiote is "Nearly Impossible to Detect"Cyber-Attack Surface "Spiralling Out of Control"Evil Corp Hacker Group Changes Ransomware Tactics to Evade US SanctionsTwitter Set to Agree to Elon Musk Request For Data on Fake AccountsSocial Care Organizations Get Cybersecurity BoostUS and Euro Police Smash Cybercrime MarketplaceRansomware Pressure Forces UK CISOs to Consider QuittingCISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers Tweet of the Week (38:30)https://twitter.com/kevinslaten/status/1534109273281597441?s=24&t=Ad3rQTRKuGYQNxSe3aplHghttps://twitter.com/quentynblog/status/1534125293526474753?s=20
Come on! Like and bloody well subscribe!

Jun 3, 2022 • 47min
Episode 106 - God Its Early
This Week in InfoSec (07:52)With content liberated from the “today in infosec” twitter account and further afield31st May 1999, Sega released the video game Zero Wing for the Sega Mega Drive system in Europe. The game was never released in North America, and was relatively unknown until years later when the poorly translated opening scene was popularized on the Internet. The most famous mistranslation is the phrase “All your base are belong to us,” which went on to become a very popular Internet meme.1st June 1999, Shawn Fanning and Sean Parker released the filesharing service Napster. The service provides a simple way for users to copy and distribute MP3 music files. It became an instant hit, especially among college students. Just over 6 months later, on December 7, 1999, the Recording Industry Association of America (RIAA) filed a lawsuit against the service, alleging mass copyright infringement. Eventually this lawsuit forced the shutdown of the company on September 3, 2002, but not before the popularity of downloading digital music was firmly entrenched in a generation of Internet users.A year later, on 2nd June 2000: Napster Inc., makers of controversial MP3 file-sharing software, slapped pop-punk band the Offspring with a legal order Friday (June 2) to stop selling merchandise imprinted with the Napster logo, a source close to the band confirmed. NAPSTER TELLS OFFSPRING TO STOP SELLING BOOTLEG MERCHANDISE The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Rant of The Week (18:19)Vodafone plans carrier-level user tracking for targeted adsVodafone is piloting a new advertising ID system called TrustPid, which will work as a persistent user tracker at the mobile Internet Service Provider (ISP) level.The new system is in test phase in Germany and is intended to be impossible to bypass from within the web browser settings or through cookie blocking or IP address masking.The mobile carrier plans to assign a fixed ID to each customer and associate all user activity with it. The ID will be based on a number of parameters, so that the system will be able to maintain persistence.Then, the mobile ISP creates a personal profile based on that ID and helps advertisers serve targeted ads to each customer without disclosing any identification details. The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Billy Big Balls of the Week (29:08) ExpressVPN moves servers out of India to escape customer data retention lawVirtual private network operator ExpressVPN will pull its servers from India, citing the impossibility of complying with the nation's incoming requirement to record users' identities and activities.ExpressVPN offers software that routes traffic through servers that load their operating systems entirely into RAM and therefore leave no trace of users' activities on persistent media. The outfit suggests that's a point of difference to other VPN providers.ExpressVPN refuses to participate in attempts to limit internet freedom.But that design is a problem given India's recently introduced requirement that VPN providers verify customers' identity, retain their contact details, and store five years worth of data describing their "ownership pattern". The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Industry News (35:21)Third of UK Firms Have Experienced a Security Breach Since 2020US Academic Credentials Displayed in Public and Dark Web ForumsAirline in Turkey Exposes Flight and Crew Info in 6.5TB LeakThree BEC Suspects Arrested in “Killer Bee” StingMagniber Ransomware Now Targets Windows 11 MachinesEuro Cops Bust $47m Money Laundering OperationTwice as Many Healthcare Organizations Now Pay RansomEuropol Confirms Takedown of SMS-based FluBot SpywareConnecticut Becomes Fifth US State to Enact Consumer Privacy Law The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Tweet of the Week (40:46)https://twitter.com/eevee/status/1532207368062132224
Come on! Like and bloody well subscribe!

May 27, 2022 • 43min
Episode 105 - Curse You Zencastr
The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” This Week in InfoSec (06:25)With content liberated from the “Today in InfoSec” twitter account and further afield26th May 1995: Realising his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft CEO Bill Gates issues a memo titled, “The Internet Tidal Wave,” which signalled the company’s focus on the global network. In the memo, Gates declared that the Internet was the “most important single development” since the IBM personal computer — a development that he was assigning “the highest level of importance.”21st May 2009: Following increasing concern about hackers taking advantage of security vulnerabilities in Adobe’s PDF-reading software, the company has announced that it will be making security updates available on a regular schedule.Adopting a similar initiative to Microsoft (which releases security patches on the second Tuesday of each month), Adobe has declared that it will issue vulnerability fixes on the second Tuesday of every third month.Adobe announces its own Patch Tuesday The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Rant of the Week (12:47)DuckDuckGo browser allows Microsoft trackers due to search agreementhttps://twitter.com/shivan_kaul/status/1528879590772338689“DuckDuckGo has a search deal with Microsoft which prevents them from blocking MS trackers. And they can't talk about it!This is why privacy products that are beholden to giant corporations can never deliver true privacy; the business model just doesn't work.” The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Billy Big Balls of the Week (19:58)New virus forces people to donate to the poor if they want their data recovered Security researchers have identified a new kind of ransomware that forces victims to donate to the poor to recover their data.Unlike typical ransomware, which cyber criminals use to extort money from people, this one – known as GoodWill – gives victims a choice.In order to obtain the decryption key, they must choose to either donate clothes to the homeless, take under-privileged children to one of a number of restaurants for food or provide financial assistance to anyone needing medical attention that can’t afford it.In each case, photos or videos of the action must be recorded and posted to social media as proof. The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Industry News (25:10)US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners' Personal InfoICO Fines Clearview AI £7.5m for Collecting UK Citizens’ DataGoodWill Ransomware Demands People Help the Most VulnerableUK Government Cybersecurity Advisory Board Applications Now OpenOrganizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited FlawsMessages Sent Through Zoom Can Expose People to Cyber-AttackThree-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete18 Oil and Gas Companies Take Cyber Resilience PledgeIndia's SpiceJet Strands Planes After Being Hit By Ransomware Attack The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” Tweet of the Week (32:30)https://twitter.com/fesshole/status/1529000507037171713 The European Cybersecurity Blogger Awards 2022 - Vote Here!We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”
Come on! Like and bloody well subscribe!

May 21, 2022 • 34min
Episode 104 - The Late Late Show
This Week in InfoSec (07:03)With content liberated from the “today in infosec” twitter account and further afield15th May 2003: In the Friends episode "The One in Barbados, Part One", Ross Geller's laptop was infected by the Kournikova worm when Chandler Bing checked his email on it and opened an email claiming to contain nude images of tennis player Ana Kournikova.https://twitter.com/todayininfosec/status/1523719745555648514 Rant of the Week (09:34)Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse ActDOJ says it will no longer prosecute good-faith hackers under CFAAThe U.S. Justice Department announced Thursday it will not bring charges under federal hacking laws against security researchers and hackers who act in good faith.The policy for the first time “directs that good-faith security research should not be charged” under the Computer Fraud and Abuse Act (CFAA), a seismic shift away from its previous policy that allowed prosecutors to bring federal charges against hackers who find security flaws for the purpose of helping to secure exposed or vulnerable systems.The Justice Department said that good-faith researchers are those who carry out their activity “in a manner designed to avoid any harm to individuals or the public,” and where the information is “used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.” Billy Big Balls of the Week (17:05)National bank hit by ransomware trolls hackers with dick picsAfter suffering a ransomware attack by the Hive operation, the Bank of Zambia made it clear that they were not going to pay by posting a picture of male genitalia and telling the hackers to s… (well, you can use your imagination).Last week, the Bank of Zambia, the country's central bank, disclosed that recent technical outages resulted from a cyberattack."The Bank of Zambia wishes to inform members of the public that it experienced a partial disruption to some of its Information Technology (IT) applications on Monday 9th May 2022," disclosed the bank in a press release."The disruption, which affected some systems at the Bank such as the Bureau De Change Monitoring System and the Website, emanated from a suspected cybersecurity incident. We wish to advise that these systems have since been fully restored." Industry News (20:50)Doctor Accused of Being Prolific Ransomware DeveloperUS Government Warns Firms to Avoid Hiring North Korean IT WorkersPolice Warn of £15m Courier ScamsDigital Skimming is Now the Preserve of Non-Magecart GroupsUK Government: Lack of Skills the Number One Issue in CybersecurityJav: Personal Information of Nearly Two Million Texans ExposedHalf of IT Leaders Store Passwords in Shared DocsMicrosoft President: Cyber Space Has Become the New Domain of WarfareCISA Issues Emergency Directive for VMware Vulnerabilities Tweet of the Week (26:16)https://twitter.com/haveigotnews/status/1526505336017936384
Come on! Like and bloody well subscribe!

May 13, 2022 • 49min
Episode 103 - One Third Extra Fat
This Week in InfoSec (07:30)With content liberated from the “today in infosec” twitter account and further afield9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and restitution of $15,000. Jeanson James Anchetahttps://twitter.com/todayininfosec/status/152371974555564851412th May 1989: The Marijuana Virus crippled the Chisholm Institute of Technology's computer network. It displayed a message on computers' screens, which read "The system is stoned. Legalise marijuana."Virus stops students from using institute computershttps://twitter.com/todayininfosec/status/1524842708967247908 Rant of the Week (15:07)Europe proposes tackling child abuse by killing privacy, strong encryptionA number of options have been put forward for lawmakers to mull that aim to encourage or ensure online service providers and messaging apps tackle the "detection, removal, and reporting of previously-known and new child sexual abuse material and grooming."These options range from voluntary detection and reporting of child sexual abuse material (CSAM) and grooming, to legally mandating that service providers find and report such material using whatever detection technology they wish — essentially scanning all private communications and, if necessary, breaking end-to-end (E2E) encryption for everyone.If rubber-stamped, the rules will apply to online hosting services and interpersonal communication services, such as messaging apps, app stores, and internet access providers. Billy Big Balls of the Week (24:05)China wants its youth to stop giving livestreamers moneyChina's internet regulator, the Cyberspace Administration of China (CAC), has published guidelines that aim to stop minors from giving tips or other forms of payment to livestreamers, watching after 10pm, or live streaming themselves. Industry News (33:59)US Government Offers $15m Reward for Info on Conti ActorsResearchers Find 31,000 FTSE 100 Logins on Dark WebLondon Police Warn of Crypto Muggings – ReportTreasury Sanctions Crypto Firm After North Korea’s $620m HeistnFive Eyes Nations Issue New Supply Chain Security AdvisoryMicrosoft: Ransomware Relies on the Gig EconomyTrustpilot Forced to Delete Millions of Fake Reviews in 2021Government Initiative Promises Rapid Blocking of Scam SitesCosta Rica Declares National Emergency Following Conti Cyber-Attack Airplane: https://www.bbc.co.uk/news/world-middle-east-61395745 Tweet of the Week (44:07)https://twitter.com/__femb0t/status/1524791901110542336
Come on! Like and bloody well subscribe!

May 9, 2022 • 25min
Episode 102A - A New Era
This week in infosecI was a teenage botmaster Rant of the week (Thom, how do I add images to this section?) I want to use the images and description you used here https://podcast.hostunknown.tv/episodes/episode-102-end-of-an-era Never mind. I'll type it out.Rant is about EC Council being EC council Billy Big ballsThe Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/Industry NewsHHS Information Security Program 'Not Effective'SIM Fraud Solution Sparks Privacy FearsGroundbreaking Cybersecurity Book PublishedGitHub to Enforce Two-Factor AuthenticationHunter Biden Laptop Repairman Sues Over Hacker AllegationsNHS Inboxes Hijacked to Send 1000+ Malicious EmailsMicrosoft, Apple and Google Team Up on Passwordless StandardUkrainians DDoS Russian Vodka Supply ChainsSpecial Police Constable Used Encrypted Chat to Post Child Abuse Content Tweet of the weekhttps://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA
Come on! Like and bloody well subscribe!

May 7, 2022 • 44min
Episode 102 - End of an Era
This Week in Infosec (09:52)With content liberated from the “today in infosec” Twitter account and further afield[None] Rant of the Week (10:59)https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YAFull story:https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA Billy Big balls of the Week (19:45)The Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/ Industry News (27:49)HHS Information Security Program 'Not Effective'SIM Fraud Solution Sparks Privacy FearsGroundbreaking Cybersecurity Book PublishedGitHub to Enforce Two-Factor AuthenticationHunter Biden Laptop Repairman Sues Over Hacker AllegationsNHS Inboxes Hijacked to Send 1000+ Malicious EmailsMicrosoft, Apple and Google Team Up on Passwordless StandardUkrainians DDoS Russian Vodka Supply ChainsSpecial Police Constable Used Encrypted Chat to Post Child Abuse Content Tweet of the Week (39:24)https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YAhttps://twitter.com/soychotic/status/1520126831478951936?s=20&t=hpsXh46fM3YmrHtbI3mkuw
Come on! Like and bloody well subscribe!

Apr 29, 2022 • 50min
Episode 101 - My Brain Hurts
This Week in InfoSec (09:26)With content liberated from the “today in infosec” Twitter account and further afield26th April 2013: LivingSocial informed its employees that 50 million users' names, emails, dates of birth, and SHA1 hashed passwords were compromised.LivingSocial Hackedhttps://twitter.com/todayininfosec/status/151903974730119987226th April 1999: The first known virus to target the flash BIOS of a PC, the CIH/Chernobyl Virus triggers on this day, erasing hard drives and disabling PCs primarily in Asia and Europe. One of the most destructive viruses in history, Turkey and South Korea alone reported 300,000 infected systems. As Seen on Reddit (23:29)My thoughts on a decade of Cyber Security: 10 Lessons I’ve learnedReddit user u/CrowGrandFather has spent more than a decade in the Cyber Security Industry and has come up with 10 lessons he learned along the way.1. Cyber is risk and nothing else2. No one cares about your stats3. Understand that not everyone is as smart as you4. Stop with the playbooks5. Read the news for your boss6. Blackhat is mostly pointless7. Location, Location, Location8. You’re probably doing threat intelligence wrong9. Don’t write to be understood, write so that you can’t possibly be misunderstood10. Make friends with your Marketing team[That was this week's As seen on Reddit] Industry News (42:07)LinkedIn Becomes the Most Impersonated Brand for Phishing AttacksCosta Rica Refuses to Pay Cyber RansomBored Ape Yacht Club Customers Lose $3m in NFT ScamFrench Hospitals Cut Internet Connection After Data RaidSecurity Teams Should Be Addressing Quantum Cyber-Threats NowPrivate Investigator Admits Role in Hedge Fund HackUK Schools Can Sign-Up to Free Government-Grade SecurityCoca-Cola Investigates Data Breach ClaimCrypto Trading Fund Partners Accused of Fraud Tweet of the Week (45:00)https://twitter.com/austinpeay/status/1519397653305561088https://twitter.com/austinpeay/status/1519399475785125889
Come on! Like and bloody well subscribe!

Apr 8, 2022 • 47min
Episode 100 - Can We Go Home Now
This Week In InfoSec (10:15)With content liberated from the “today in infosec” twitter account and further afield1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion".https://twitter.com/todayininfosec/status/1245550127806201857MIT says "Disney buys MIT" hack revealed by low price1st April 2004: The now ubiquitous Gmail service is launched as an invitation-only beta service. At first met with skepticism due to it being launched on April Fool’s Day, the ease of use and speed that Gmail offered for a web-based email service quickly won converts. The fact that Gmail was invitation-only for a long time helped fuel a mystique that those who had a Gmail address were hip and uber-cool. Rant of the Week: (16:25)Bank had no firewall license, intrusion or phishing protection – guess the restAn Indian bank that did not have a valid firewall license, had not employed phishing protection, lacked an intrusion detection system and eschewed use of any intrusion prevention system has, shockingly, been compromised by criminals who made off with millions of rupees. Billy Big Balls of the Week (23:20)Bearded Barbie hackers catfish high ranking Israeli officialsThe Hamas-backed hacking group tracked as 'APT-C-23' was found catfishing Israeli officials working in defense, law, enforcement, and government agencies, ultimately leading to the deployment of new malware.The campaign involves high-level social engineering tricks such as creating fake social media profiles and a long-term engagement with the targets before delivering spyware. Industry News (30:50)Scottish Power Parent Company Hit by Data BreachTrezor Customers Phished After MailChimp CompromiseCadbury Warns of Easter Egg ScamJail Releases 300 Suspects Due to Computer "Glitch"WhatsApp 'Voice Message' Is an Info-Stealing Phishing AttackGermany Shuts Down Russian Darknet Marketplace HydraAttack on Ukraine Telecoms Provider Caused by Compromised Employee CredentialsBlock Warns Eight Million Customers of Insider BreachEmployee Info Among 13 Million Records Leaked by Fox News Tweet of the Week (41:50)https://twitter.com/_sn0ww/status/1511857122966835200
Come on! Like and bloody well subscribe!


