Plus a monster news segment with Adam Boileau…
August 9th, 2013 --
In this week's feature slot we chat with Karsten Nohl about his research into pillaging SIM cards. It turns out Karsten's research into SIM security was much, much cooler than we initially thought. In this week's sponsor interview we chat with Jonathan Ness about the all new singing and dancing EMET 4.0. Adam Boileau pops by for the week's news. This week's show notes are here.
Lots of news to get through this week...
August 9th, 2013 --
I'm back on deck after two weeks in the USA! Plenty of news to cover considering we lost a week last week!
Obama's former top infosec advisor joins Risky Business for a chinwag...
July 24th, 2013 --
This week's show features a fantastic, extended interview with Howard Schmidt, the former White House cyber security co-ordinator and special Assistant to the US President.
Links, music, crouching tigers and more!
July 24th, 2013 --
This week's show is early so the news isn't too crowded.
Herp derp I'm a craptacular Linux box from 1998...
July 19th, 2013 --
This week's show is brought to you by the fine, fine people at Tenable Network Security, big thanks to Tenable for all its support over the years. And on this week's show we chat briefly with South Korean researcher SeungJin Lee about Smart TV security. They're equipped with cameras and microphones and they're popping up in living rooms everywhere.
In Soviet Russia, TV watches you!
July 19th, 2013 --
Here are the show notes for Risky Business 289. Includes links to news, music and more!
Promised droidpocalypse is mostly hype...
July 12th, 2013 --
On this week's show we take an axe to all the crazy hype around BlueBox's Android research. It's been a shameful, shameful week for the tech media. I half expected to walk outside this week and find crowds of consumers holding pitchforks and burning their Android devices based on the headlines we've been seeing about 99% of all 'droid devices being open to attack!
Lots of things... so many things...
July 12th, 2013 --
Here are the show notes for edition 288 of the Risky Business podcast. There are links to several stories below that we didn't have time to cover, but they're definitely worth reading. Enjoy!
Both types of bugs abound in this week's show...
July 5th, 2013 --
We've got a great show for you this week. Mark Dowd of Azimuth Security pops in to talk about the bugs he found in libraries used by secure telephony providers like Silent Circle. They're serious, serious bugs, and they were easy to find.
Big show, lots of topics!
July 5th, 2013 --
Big show this week! See below for links to this week's stories. You can find this week's podcast here.
Eddie keeps coughing up the goods...
June 28th, 2013 --
This week's show is a bit shorter than usual. We've got a discussion of the week's news then a great chat with Brian Contos, the VP and CISO of Blue Coat Systems Advanced Threat Protection Group.
Links to all the stuff...
June 28th, 2013 --
Here are links to items discussed in this week's episode of the Risky Business podcast. You can find that episode here.
Opsec for execs...
June 21st, 2013 --
In this week's show we talk opsec with international man of mystery The Grugq. In light of revelations the Internet lounge at the G20 summit was essentially an intelligence collection system set up by GCHQ, we thought we'd look at what travelling diplomats and executives can do to protect their data when entering a hostile environment where all infrastructure is assumed to be controlled by your adversary. There's some great practical advice in that segment, and it's after the news.
Music! Links! Laughter!
June 21st, 2013 --
If you're reading this from the Internet lounge at the G8 summit, we thoroughly recommend you listen to episode 285 of the Risky Business podcast. You can find it here. Here are links to all the news stories covered in ep 285, plus music!
The hippies have entered the building...
June 13th, 2013 --
In this week's feature interview we chat with author and speaker Richard Thieme about what they used to call the generation gap. NSA leaker Edward Snowden is "Internet generation". Are the ideals espoused by people like Snowden rooted in counter-cultural ideals or are they just generational norms? Are these ideas around online liberty becoming mainstream? Now that we have so many gen-Ys and millennials actually running the information infrastructure that powers our institutions, could we be on the cusp of serious changes in the way the establishment works? That is an interesting chat.
Links, music, Boileau on telly. We've got it all this week!
June 13th, 2013 --
Here are the show notes for this week's episode of Risky Business. Make sure you check out the last link -- it's Adam Boileau on television on New Zealand discussing PRISM. Good stuff! You can find episode 284 of the Risky Business podcast here. What is the NSA's PRISM program? (FAQ) | Security & Privacy - CNET News http://news.cnet.com/8301-1009_3-57588253-83/what-is-the-nsas-prism-prog... NSA Whistleblower Resurfaces to Say U.S. Hacked Hundreds in Hong Kong and China | Threat Level | Wired.com
Surveillance scandals and thought crimes. USA! USA!
June 7th, 2013 --
On this week's show we take a look at PRISM, the NSA's recently exposed massive surveillance program. Leaked PowerPoint slides from NSA describe a surveillance system that allows the agency to effortlessly capture a target's YouTube, Google, Facebook and Skype. This has been reported as these companies allowing the US government access to "back doors" on their systems.
All your creepy surveillance news is here...
June 7th, 2013 --
What a week it's been! Turns out all your packets are belong to the NSA... You'll find links to the news items discussed in Risky Business episode 283 below. You'll also find the articles we discussed in this week's feature section. Enjoy!
Are we entering a post-Anonymous era?
May 31st, 2013 --
This week's show is a cracker! We've got a great feature interview with journalist and author Parmy Olson about what the future might hold for Anonymous. Is it time for the Anonymous brand to be retired? The media has largely lost interest in its activities -- how could the hacktivism phenomenon bounce back to the same levels of notoriety as it experienced in 2011? Tune in to find out! This week's show is brought to you by Senetas, makers of absolutely kick-ass layer 2 encryption equipment.
The stories we discussed with The Grugq!
May 31st, 2013 --
Links to all the stories discussed in the 282nd edition of the Risky Business podcast. You can click through to the recording page here. ASIO blueprints, Defence documents stolen - Hackers - SC Magazine Australia - Secure Business Intelligence http://www.scmagazine.com.au/News/344763,asio-blueprints-defence-documen... Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies - The Washington Post