show episodes
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Mensal+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
  continue reading
 
Loading …
show series
 
How does Thom also do the episode notes? This week in infosec was about a EULA Rant of the week https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html Billy Big Balls https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/ Some news articles from in…
  continue reading
 
This week in InfoSec (08:29) With content liberated from the “today in infosec” twitter account and further afield 10th October 1995: Netscape introduced the "Netscape Bugs Bounty", a program rewarding users who report "bugs" in the beta versions of its recently announced Netscape Navigator 2.0 web browser. Navigator was the dominant browser from 1…
  continue reading
 
This week in InfoSec (10:01) With content liberated from the “today in infosec” twitter account and further afield 27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the da…
  continue reading
 
This week in InfoSec (10:44) With content liberated from the “today in infosec” twitter account and further afield 18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. https://twitter.com/todayininfosec/status/1836495262409175187 17th September 201…
  continue reading
 
This week in InfoSec (11:25) With content liberated from the “today in infosec” twitter account and further afield 12th September 2014: Stephane Chazelas contacted Bash maintainer Chet Ramey about a vulnerability he dubbed "Bashdoor", which later becoming known as Shellshock. It was publicly disclosed 12 days later. Shellshock was kind of a big dea…
  continue reading
 
This week in InfoSec (13:08) With content liberated from the “today in infosec” twitter account and further afield 3rd September 2014: Twitter launched its bug bounty program via the HackerOne platform, stating it would award at least $140 for vulnerabilities found in http://x.com/ or its Android or iOS apps. $140? 140 was the max tweet length. $1.…
  continue reading
 
This week in InfoSec (07:42) With content liberated from the “today in infosec” twitter account and further afield 29th August 1990: The UK's Computer Misuse Act 1990 went into effect, introducing 3 criminal offences related to unauthorised access and modification of "computer material". https://twitter.com/todayininfosec/status/1829252932178719161…
  continue reading
 
This week in InfoSec (06:43) With content liberated from the “today in infosec” twitter account and further afield 18th August 2004: Text messages sent to promote the video game "Resident Evil: Outbreak" stated "Outbreak: I'm infecting you with t-virus". This scared recipients, who were only about 7% less technologically savvy than mobile phone use…
  continue reading
 
This week in InfoSec (10:28) 10th July 1999 - Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America". https://twitter.com/todayininfosec/status/1811133606015983680…
  continue reading
 
This week in InfoSec (07:40) With content liberated from the “today in infosec” twitter account and further afield 3 July 1996 - a mere 28 years ago the movie Independence Day was released. In it, Jeff Goldblum and Will Smith fly into an alien vessel in a 50-year-old space junker, then upload a computer virus in less than 5 minutes https://twitter.…
  continue reading
 
This Week in InfoSec (12:30) With content liberated from the “today in infosec” twitter account and further afield 24th June 1987: The movie Spaceballs was released. With a budget of $23 million, it grossed $38 million at the box office in North America. Though 37 years have passed, the secret code scene remains a reminder of why security is hard. …
  continue reading
 
This week in InfoSec (11:16) With content liberated from the “today in infosec” twitter account and further afield 5th of June 1991, a mere 33 years ago, : Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet. From the man himself, First, I sent it to Allan Hoeltje, who posted it to P…
  continue reading
 
This week in InfoSec (07:29) With content liberated from the “today in infosec” twitter account and further afield 28th May: 2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest. https://x.com…
  continue reading
 
This week in InfoSec (11:36) With content liberated from the “today in infosec” twitter account and further afield 17th May 2015: CNN published their article on a statement Cybersecurity Consultant, Chris Roberts had publicly made on Twitter a month earlier. There were lots of accusations made regarding Chris Roberts' actions hacking into computer …
  continue reading
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 27th April 2012: The Information Commissioner's Office (ICO) in the UK issued its first-ever data breach fine to an NHS (National Health Service) organisation, fining Aneurin Bevan Health Board in Wales £70,000. https://www.digitalhealth.net/2…
  continue reading
 
This week in InfoSec (07:04) With content liberated from the “today in infosec” twitter account and further afield 23rd April 2005: The first video uploaded to YouTube, “Me at the zoo,” is posted on April 23, 2005 at 8:27 PM by co-founder Jawed Karim. For now being a piece of history, the video is actually pretty dumb. Note to future entrepreneurs:…
  continue reading
 
This week in InfoSec (08:49) With content liberated from the “today in infosec” twitter account and further afield 7th April 1969: Steve Crocker, a graduate student at UCLA and part of the team developing ARPANET, writes the first “Request for Comments“. The ARPANET, a research project of the Department of Defense’s Advanced Research Projects Agenc…
  continue reading
 
This week in InfoSec (06:10) With content liberated from the “today in infosec” twitter account and further afield 3rd April 2011: Email marketing and loyalty program management company Epsilon reported a data breach of names and email addresses of numerous companies' customers, totaling at least 60 million records. Dozens of companies were impacte…
  continue reading
 
This week in InfoSec (07:32) With content liberated from the “today in infosec” twitter account and further afield 20th March 2007: Dragos Ruiu announced the first Pwn2Own contest, which was held that April in Vancouver, Canada. The contest is still being held today - and in fact Pwn2Own Vancouver 2024 started today. https://twitter.com/todayininfo…
  continue reading
 
This week in InfoSec (14:26) With content liberated from the “today in infosec” twitter account and further afield 7th March 2017: WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency (CIA). Code-named Vault 7 by WikiLeaks, it was the largest ever publication of confidential documents on the agency. https://twitter.com/to…
  continue reading
 
This week in InfoSec (06:53) With content liberated from the “today in infosec” twitter account and further afield 1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy. The virus would show a small ball bouncing around the screen in both text mode (ASCII charact…
  continue reading
 
This week in InfoSec (06:25) With content liberated from the “today in infosec” twitter account and further afield 16th February 2010: Version 2.0 of the CWE/SANS Top 25 Most Dangerous Software Errors was released. Take a look and decide which of these weaknesses have been eradicated over the last 14 years. Web Archive https://twitter.com/todayinin…
  continue reading
 
This week in InfoSec (08:40) With content liberated from the “today in infosec” twitter account and further afield 14th February 2001: In a presentation at Black Hat Windows Security Conference 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop". https://twitter.com/todayininfosec/s…
  continue reading
 
This week in InfoSec (08:59) With content liberated from the “today in infosec” twitter account and further afield 8th February 2000: A 15-year-old Canadian identified at the time only by his handle "MafiaBoy" launched a 4-hour DDoS attack against http://cnn.com. The attacks also targeted Yahoo, eBay, Amazon and other sites over a 3 day period. In …
  continue reading
 
This week in InfoSec (08:19) With content liberated from the “today in infosec” twitter account and further afield 31st Jan 2011 (13 years ago): Chris Russo reported a vulnerability to dating website PlentyOfFish's CEO Markus Frind's wife. Yada yada yada Markus Frind then accused Russo of extortion and emailed Russo's mother. https://techcrunch.com…
  continue reading
 
This week in InfoSec (04:51) With content liberated from the “today in infosec” twitter account and further afield 25th January 2003: The SQL Slammer worm was first observed. It relied on a vulnerability Microsoft reported a whopping 6 months earlier via security bulletin MS02-039. Despite the long-available patch, 75,000 systems were compromised w…
  continue reading
 
This week in InfoSec (09:34) With content liberated from the “today in infosec” twitter account and further afield 11th January 2000: Newly declassified documents proved the existence of ECHELON, a global eavesdropping network run by the NSA. https://twitter.com/todayininfosec/status/1745518896495390826 13th January 2009: The domain name http://cli…
  continue reading
 
This week in InfoSec (06:16) With content liberated from the “today in infosec” twitter account and further afield 6th January 2014: Intel renamed its McAfee subsidiary Intel Security, distancing itself from the name of McAfee's founder, John McAfee. In 2017 Intel spun off McAfee as a separate company...then several months later John McAfee and Int…
  continue reading
 
This week in InfoSec (12:55) With content liberated from the “Today in infosec” Twitter account and further afield 11th December 2010: The hacker group Gnosis released the source code for Gawker's website and 1.3 million of its users' password hashes. After a jury found Gawker's parent company liable in a lawsuit filed by Hulk Hogan and awarded him…
  continue reading
 
This week in InfoSec (07:51) With content liberated from the “today in infosec” twitter account and further afield 5th December 2011: Fyodor reported that CNET's http://Download.com had been wrapping its Nmap downloads in a trojan installer...in order to monetize spyware and adware. CNET quickly stopped, then resumed within days, it affected other …
  continue reading
 
This week in InfoSec (09:40) With content liberated from the “today in infosec” twitter account and further afield 24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. https://twitter.com/todayininfosec/status/…
  continue reading
 
This week in InfoSec (06:40) 23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan exploited. Evilgrade toolkit author Francisco Amato had reported it to Apple in 2008. Apple Took 3+ Years to Fix FinFisher Trojan Hole https://twitter…
  continue reading
 
6:48 This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initi…
  continue reading
 
This Week in InfoSec (05:41) 2002: In response to a report which insinuated Mac is less vulnerable than Windows, Microsoft suggested few focus on discovering Mac vulnerabilities and that products with more customers will have more vulnerabilities reported. https://t.co/WOUUDOB0g6 https://x.com/todayininfosec/status/1721895407545143382?s=20 Rant of …
  continue reading
 
This week in InfoSec (07:11) With content liberated from the “today in infosec” twitter account and further afield 26th October 2006: Christopher Soghoian created a website allowing visitors to generate fake airlines boarding passes. A congressman called for his arrest, his ISP shut down his site, the FBI raided his home, and then the same congress…
  continue reading
 
This week in InfoSec (09:48) With content liberated from the “today in infosec” twitter account and further afield 8th October 2018: Google announced that it exposed the private info of hundreds of thousands of Google+ users between 2015 and 2018, only disclosing it 7 months after discovery because it was reported by The Wall Street Journal. Social…
  continue reading
 
This week in InfoSec (08:56) With content liberated from the “today in infosec” twitter account and further afield 2006: The http://wikileaks.org domain name was registered, though the first document wasn't posted to WikiLeaks until December. Assange taken from Ecuador embassy in April 2019, since been staying at his majesty’s pleasure at Belmarsh.…
  continue reading
 
This week in InfoSec (08:45) With content liberated from the “today in infosec” twitter account and further afield 25th September 1986: "The Hacker Manifesto" was published by The Mentor (Loyd Blankenship) in issue 7 of the hacker zine Phrack. It was originally titled "The Conscience of a Hacker". Phrack #7 https://twitter.com/todayininfosec/status…
  continue reading
 
This week in InfoSec (09:32) With content liberated from the “today in infosec” twitter account and further afield 18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. $ echo "admin" | rev nimda https://twitter.com/todayininfosec/status/17037603666…
  continue reading
 
This week in InfoSec (08:18) With content liberated from the “today in infosec” twitter account and further afield 13th September 2011: Backup tapes containing info on 4.9 million TRICARE military health care customers were stolen from an SAIC employee's parked car which a burglar broke into by breaking a vent window. TRICARE Breach Affects 4.9 Mil…
  continue reading
 
This week in InfoSec (11:51) With content liberated from the “today in infosec” twitter account and further afield 6th September 1987: Thomas Haynie was accused of intentionally jamming Playboy's satellite network with a text-only message. Haynie was an uplink engineer at the Christian Broadcasting Network and was on duty at the time of the jamming…
  continue reading
 
This week in InfoSec (10:17) With content liberated from the “today in infosec” twitter account and further afield 29th August 1990: The British Computer Misuse Act Goes into Effect One of the earliest laws anywhere designed to address computer fraud, the Act resulted from a long debate in the 1980s over failed prosecutions of hackers -- in one wel…
  continue reading
 
This week in InfoSec (14:00) With content liberated from the “today in infosec” twitter account and further afield 18th August 2003: The Nachi worm began infecting Windows computers with the goal of REMOVING the Blaster worm and patching the vulnerability exploited by both worms. Worm aims to eradicate Blaster https://twitter.com/todayininfosec/sta…
  continue reading
 
This week in InfoSec (11:56) With content liberated from the “Today in Infosec” Twitter account and further afield 4th August 1998: Microsoft published a critical security bulletin MS98-010, titled 'Information on the "Back Orifice" Program'. Microsoft Security Bulletin MS98-010 - Critical https://twitter.com/todayininfosec/status/14230371897142190…
  continue reading
 
This week in InfoSec (05:54) With content liberated from the “today in infosec” twitter account and further afield 18th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats". https://twitter.com/todayininfosec/status/1416957326205100035 27th July 1990: The case of United States v. Rig…
  continue reading
 
This week in InfoSec (09:59) With content liberated from the “Today in infosec” Twitter account and further afield 18th July 2011: LulzSec hacked the Sun newspaper's website, redirecting visitors to a hoax article claiming Rupert Murdoch died after ingesting palladium. Hacked Sun site greatly exaggerates Murdoch's death https://twitter.com/todayini…
  continue reading
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 13th July 2001: Code Red Worms its Way into the Internet The Code Red worm is released onto the Internet. Targeting Microsoft’s IIS web server, Code Red had a significant effect on the Internet due to the speed and efficiency of its spread. Mu…
  continue reading
 
This week in InfoSec (11:06) With content liberated from the “today in infosec” twitter account and further afield 6th July 1995: Simple as 1-2-3: IBM Buys Lotus IBM completes a $3.5 billion buyout of Lotus Development, the producer of the once-dominant Lotus 1-2-3 spreadsheet software and the then-popular Lotus Notes groupware. IBM had hoped to le…
  continue reading
 
This week in InfoSec (11:36) With content liberated from the “today in infosec” twitter account and further afield 26th June 1997: Communications Decency Act Declared Unconstitutional The US Supreme Court ruled the Communications Decency Act unconstitutional on a 7-2 vote. The act, passed by both houses of Congress, sought to control the content of…
  continue reading
 
This week in InfoSec (10:26) With content liberated from the “today in infosec” twitter account and further afield 17th June 1997: A group of users organised over the Internet cracked the Data Encryption Standard — the strongest legally exportable encryption software in the United States to that point — after only five months of work. The United St…
  continue reading
 
Loading …

Guia rápido de referências