30 episodes

Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.

Security Explained Chris Grayson, Drew Porter, Logan Lamb

    • Technology
    • 4.9 • 10 Ratings

Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.

    Security Research v I - IPv666, Ubuntu Phones, and OpenBTS OH MY!

    Security Research v I - IPv666, Ubuntu Phones, and OpenBTS OH MY!

    In this final episode of our third season we take the time to chat about a topic near and dear to our hearts - security research! We each picked one of our favorite projects to discuss, ranging from enumerating IPv6 addresses on the Internet to hacking the fledgling Ubuntu mobile phone to Drew's mischievous habits spinning up his own cellular base stations. We've mentioned security research time and again on the show, but this is the first time that we're diving into specific research that has played a significant role in our respective lives and careers.

    Thank you so much for joining us on our journey thus far and we can't wait to come back in season 4 with even better tips and tricks!

    • 59 min
    Worms and Antivirus

    Worms and Antivirus

    With the spectacular new Dune movie just having been released, it's only appropriate to talk about one of the most devious of Internet malware denizens - worms!! While certainly technologically interesting, worms are some of the most destructive instances of malware to ever be created. What's more is that these days, worming technology is so ubiquitous that it's not something that even distinguishes malware from the pack!

    Join us in this conversation about the trickiest of Internet beasts and the tool that is meant to (if unsuccessfully) protect against them!

    • 58 min
    Twitch Hack, Facebook Outage, Epik Hack Part Deux, and Pandora Papers!

    Twitch Hack, Facebook Outage, Epik Hack Part Deux, and Pandora Papers!

    We weren't planning on it, but too much happened since our last episode to not do another security in the news episode! We'll be covering the Twitch hack, Facebook global outage, another Epik hack release from Anonymous, and the Pandora Papers.

    • 54 min
    Apple 0-days and EpikFail - Security in the News

    Apple 0-days and EpikFail - Security in the News

    The news has been ripe with some pretty wild security stories recently, and in this episode we dive into the nitty gritty on the two that we found most interesting. Specifically, we're talking about the multiple Apple zero days which have been released and the controversy around them as well as the Epik hack named Epik Fail. Join us!

    • 56 min
    The FUTURE of Security (FutureSec)

    The FUTURE of Security (FutureSec)

    In this episode we dive into the details of recent (ie: the last 5 years) security trends, where things stand currently, and where those trends are likely to continue. From application security, to corporate security, to infrastructure security, to physical security, the last half a decade has seen some serious changes with respect to how secure modern enterprises are and the problems they face on a regular basis. The future of security looks bright in many ways, dark in some, but interesting in all.

    • 53 min
    Surveillance and Pegasus w/ Kim Zetter

    Surveillance and Pegasus w/ Kim Zetter

    If you've been keeping up on security news recently you've likely heard of the Pegasus spyware and its authors, the Israeli firm NSO Group. While Pegasus is an impressive piece of software, the capabilities it brings to the table are nothing new (nor are the ethical and moral implications of government surveillance programs).

    Join us as we sit down with renowned security journalist Kim Zetter and hear what she has to say about these recent events and surveillance programs more generally.

    More of Kim's work can be found at:
    - https://zetter.substack.com/
    - https://www.penguinrandomhouse.com/books/219931/countdown-to-zero-day-by-kim-zetter/

    • 54 min

Customer Reviews

4.9 out of 5
10 Ratings

10 Ratings

Top Podcasts In Technology

You Might Also Like