Security Squawk Box Podcast Episode 1 Magmatic Security Squawk Box - Podcast

    • Technology

This Weeks Topics

Drop Box Spam
Icon Decoys
Java RISK and Updates

Summary

This week I address something old and something new. What do we need to consider after the recent revolation by Dropbox that an employee was compromised resulting in malicious actors gaining access to  the email addresses of account holders. 

I then discuss the social engineering method of Icon Decoying. A method that has been used over the last several months by criminals with mixed success.

Last we discuss Java and touch on how to manage RISK using the Java Preferences.app.  

iTunes Preview

This Weeks Topics

Drop Box Spam
Icon Decoys
Java RISK and Updates

Summary

This week I address something old and something new. What do we need to consider after the recent revolation by Dropbox that an employee was compromised resulting in malicious actors gaining access to  the email addresses of account holders. 

I then discuss the social engineering method of Icon Decoying. A method that has been used over the last several months by criminals with mixed success.

Last we discuss Java and touch on how to manage RISK using the Java Preferences.app.  

iTunes Preview

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
The TED AI Show
TED
Y Combinator Startup Podcast
Y Combinator
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Self-Hosted
Jupiter Broadcasting
Tech Won't Save Us
Paris Marx