Host Unknown julkinen
[search 0]
Lisää

Download the App!

show episodes
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Viikoittain
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Loading …
show series
 
This week in InfoSec (12:47) With content liberated from the “today in infosec” twitter account and further afield 22nd March 2018: The city of Atlanta announced it was victim to a ransomware attack. The attackers demanded $51,000 worth of bitcoin to release the encrypted data, but Atlanta didn't pay the ransom. Whether or not to pay ransom isn't a…
 
This week in InfoSec (06:13) With content liberated from the “today in infosec” twitter account and further afield 15th March 2000: The movie "Takedown" was released in France as "Cybertr@que". It is based on the capture of Kevin Mitnick Takedown on IMDb https://twitter.com/todayininfosec/status/1636083404117557248 16th March 1971: The first comput…
 
This week in InfoSec ( 11:47) With content liberated from the “today in infosec” twitter account and further afield 4th March 1989: The article "COMPUTER DETECTIVE FOLLOWED TRAIL TO HACKER SPY SUSPECT" was published. It covers how Clifford Stoll's discovery of a 75¢ accounting discrepancy led to the arrest of Marcus Hess. It was also the topic of S…
 
The one and only Andy (13:10) With content liberated from the “today in infosec” twitter account and further afield 2nd March 2013: Evernote announced that it had reset 50 million users' passwords after hackers accessed users' email addresses and hashed passwords. https://twitter.com/todayininfosec/status/1631302952395710467 1st March 1988: The MS-…
 
This week in Infosec 20th February 2003: Alan Giang Tran, former network admin for 2 companies, was arrested after allegedly destroying data on the companies' networks. Two months later he pleaded guilty to a federal charge of intentionally causing damage to a protected computer. Man arrested for allegedly shutting down employers' computers https:/…
 
This week in InfoSec (10:48) With content liberated from the “today in infosec” twitter account and further afield 14th February 2001: In a presentation at Black Hat Windows Security 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop". Blackhat 2001 https://twitter.com/todayininfose…
 
This week in InfoSec (09:53) With content liberated from the “today in infosec” twitter account and further afield 10th February 199 Deep Blue Defeats Kasparov In the first game of a six game match, IBM's Deep Blue chess computer defeated world champion Garry Kasparov. No computer had ever won a game against a world champion in chess. Kasparov woul…
 
This week in InfoSec (11:52) With content liberated from the “today in infosec” twitter account and further afield 31st January 1995: AT&T and VLSI Protect Against Eavesdropping AT&T Bell Laboratories and VLSI Technology announce plans to develop strategies for protecting communications devices from eavesdroppers. The goal would be to prevent probl…
 
This week in InfoSec 10:35) With content liberated from the “today in infosec” twitter account and further afield 16th January 1983: Lotus 1-2-3 Goes on Sale The Lotus Development Corporation releases Lotus 1-2-3 for IBM computers. While not the first spreadsheet program, Lotus was able to develop 1-2-3 because the creators of VisiCalc, the first s…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 19th January 1999: BlackBerry Introduced RIM introduces the BlackBerry. The original BlackBerry devices were not phones, but instead were the first mobile devices that could do real-time e-mail. They looked like big pagers. They way the story …
 
This week in InfoSec (09:55) With content liberated from the “today in infosec” twitter account and further afield 12th January 1996: Apple posts major loss Apple Computer announces that it will post a US$68 million first quarter loss. It also announces a restructuring plan to reduce the company by a thousand employees. This event leads to the resi…
 
This week in InfoSec (07:15) With content liberated from the “today in infosec” twitter account and further afield 3rd January 2009: The Genesis of Bitcoin The pseudonymous Bitcoin creator Satoshi Nakamoto mines the first 50 bitcoins, now known as the Genesis Block, six days before the initial release of the bitcoin software and launch of the crypt…
 
This week in InfoSec (09:44) With content liberated from the “today in infosec” twitter account and further afield 15th December 1995: AltaVista Launches Developed by researchers at Digital Equipment Research Laboratories, the AltaVista search engine is launched. It was the first world wide web search service to gain significant popularity. One of …
 
This week in InfoSec (11:40) With content liberated from the “today in infosec” twitter account and further afield 7th December 1999: RIAA Sues Napster The Recording Industry Association of America sues the peer-to-peer file sharing service Napster alleging copyright infringement for allowing users to download copyrighted music for free. The RIAA w…
 
This week in InfoSec (06:17) With content liberated from the “today in infosec” twitter account and further afield 27th November 1995: Microsoft Shipped Internet Explorer 2.0 Microsoft Corp. shipped Internet Explorer 2.0, starting a browser war with the popular Netscape Navigator. Netscape Communications Corp. had had a virtual monopoly on World Wi…
 
This week in InfoSec (11:48) With content liberated from the “today in infosec” twitter account and further afield 24th November 1998: AOL announces it will buy Netscape Communications AOL announces it will buy Netscape Communications in a stock-for-stock deal worth approximately $4.2 billion. At the time it was considered a good move by AOL and Ne…
 
This week in InfoSec (07:14) With content liberated from the “today in infosec” twitter account and further afield 12th November 2000 Microsoft Declares Tablets Are the Future Bill Gates demonstrates a functional prototype of a Tablet PC. Microsoft claims “the Tablet PC will represent the next major evolution in PC design and functionality.” Howeve…
 
This week in InfoSec (08:27) With content liberated from the “today in infosec” twitter account and further afield 4th November 2005: Microsoft AntiSpyware was renamed Windows Defender. https://twitter.com/todayininfosec/status/1191478555634323456 5th November 1993: The Bugtraq mailing list was created by Scott Chasin. In 1995 it became the propert…
 
This week in InfoSec 3rd November 2000: A Dutch hacker gained access to Microsoft's network by exploiting a vulnerability Microsoft issued a patch for 10 weeks earlier. The Patch MS Forgot to Apply https://twitter.com/todayininfosec/status/1323807889425895424 25th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made publ…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 29th October 1969: The first message sent over the ARPANET was from Leonard Kleinrock’s UCLA computer, sent by student programmer Charley Kline at 10:30 PM to the second node at Stanford Research Institute’s computer in Menlo Park, California.…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 18th October 1985: Nintendo releases the Nintendo Entertainment System (NES) in New York and limited other North American markets. An immediate hit, Nintendo released the game nationwide in February 1986. Along with the NES, Nintendo released …
 
This week in InfoSec October 12 1988 (a mere 34 years ago) Hailed by Steve Jobs as a computer “five years ahead of its time”, NeXT, Inc. introduces their NeXT Computer. Due to its cube-shaped case, the computer was often referred to as “The Cube” or “The NeXT Cube”, which led to the subsequent model offically being named “NeXTcube“. The new compute…
 
From @HostUnknownTV This week in Infosec 2nd October 1998: BUTTSniffer Beta 0.9 was released by Cult of the Dead Cow. Developed by DilDog. The big question is "When can we expect the long-awaited version 1.0 release?" 24 years is kind of a long wait. https://twitter.com/todayininfosec/status/1312179619659874305 3rd October 2017: A week after he ret…
 
This week in InfoSec (06:37) With content liberated from the “today in infosec” twitter account and further afield 27th September, 1998: For some peculiar reason, Google has at times chosen the date of September 27th as their birthday, even though it is more officially September 4th or 7th. Google has no explanation for celebrating their birthday o…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 9th September 1947: An error in the Mark II computer at Harvard University was due to a moth trapped in a relay. The moth was attached to the log book with notation "first actual case of bug being found." https://twitter.com/todayininfosec/sta…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 6th September 2011: Luis Mijangos received a 6 year prison sentence. His crimes included sextortion, stealing financial info, and webcam monitoring. California's "Sextortion" Hacker Sentenced to Prison https://twitter.com/todayininfosec/status…
 
This week in InfoSec (09:07) With content liberated from the “today in infosec” twitter account and further afield 30th August 1999: The previously unknown group Hackers Unite claimed responsibility for disclosing a vulnerability in Hotmail that granted access to all of its roughly 50 million users' email accounts. 13 years later Microsoft rebrande…
 
This week in InfoSec: (The one and only): 23rd August 2006: SpoofCard confirmed that Paris Hilton was among the terminated customers, and that Lindsay Lohan was among those whose voicemail accounts were broken into. SpoofCard said it had implemented controls to prevent recurrences. Paris Hilton: Master Hacker? https://twitter.com/todayininfosec/sta…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 18th August 2003: The Nachi worm began infecting Windows computers to remove the Blaster worm and patch the vulnerability Nachi and Blaster exploited. Yes, you read that right. Yes, this happened. Gotta love it! https://twitter.com/todayininfo…
 
This Week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 10th August 1988: 34 years ago today, Dade Murphy aka Zero Cool crashed 1507 computers, causing a 7 point drop in the NY stock exchange. He was 11 and his family was fined $45,000. He was banned from touching a computer until he turned 18. htt…
 
This week in InfoSec (9:23) With content liberated from the “today in infosec” twitter account and further afield 29th July 1985: An article in the New York Times cited multiple experts who alleged the vote counting systems of Computer Election Systems are vulnerable to tampering. Yep. Election systems vulnerabilities aren't a new phenomenon. Not e…
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 25th July 2007: The US Ninth Circuit Court of Appeals ruled that IP addresses and to/from email fields can be monitored without probable cause. Appeals Court Rules No Privacy Interest in IP Addresses, Email To/From Fields https://twitter.com/t…
 
This week in InfoSec (10:25) With content liberated from the “today in infosec” twitter account and further afield 17th July 1997: Major Disruption in Sending Most E-Mail Messages. A programming error temporarily threw the Internet into disarray in a preview of the difficulties that inevitably accompany a world dependent on e-mail, the World Wide W…
 
This Week in InfoSec (08:09) With content liberated from the “today in infosec” twitter account and further afield 12th July 2008: NextGenHacker101 taught us "how to view someone's IP address and connection speed!" Tracer-tee! Naive? Troll? You decide. Painfully hilarious. https://youtu.be/SXmv8quf_xM https://twitter.com/todayininfosec/status/14142…
 
This Week in InfoSec (08:04) With content liberated from the “today in infosec” twitter account and further afield 8th July 2011: Space Rogue broadcast the final HNNCast. And with that, the Hacker News Network came to an end. Final broadcast: https://www.facebook.com/78983739181/videos/10150254277486182/ https://youtu.be/UdKyDqU1p-4 1st July 1979: …
 
This week in InfoSec With content liberated from the “today in infosec” twitter account and further afield 28th June 2000: The Pikachu virus began spreading. It is believed to be the first virus targeting children, incorporating Pikachu from the Pokémon series. https://en.m.wikipedia.org/wiki/Pikachu_virus https://twitter.com/todayininfosec/status/…
 
This week in InfoSec (12:04) With content liberated from the “today in infosec” twitter account and further afield 24th June 1998: The NSA published the Skipjack encryption algorithm used by the Clipper chip, after the algorithm was declassified. Clipper Chip https://twitter.com/todayininfosec/status/1275882063753699328 24th June 2012: In the wake …
 
This Week in InfoSec (08:56) With content liberated from the “today in infosec” twitter account and further afield 17th June 1997: Hackers deciphered computer code written in the Data Encryption Standard (DES), which had been designed to be an impenetrable encryption software. A group of users organised over the Internet cracked the software -- the…
 
This week in InfoSec (06:06) With content liberated from the “today in infosec” twitter account and further afield 3rd June 1983: The science fiction film WarGames is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is th…
 
This Week in InfoSec (07:52) With content liberated from the “today in infosec” twitter account and further afield 31st May 1999, Sega released the video game Zero Wing for the Sega Mega Drive system in Europe. The game was never released in North America, and was relatively unknown until years later when the poorly translated opening scene was pop…
 
The European Cybersecurity Blogger Awards 2022 - Vote Here! We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” This Week in InfoSec (06:25) With content liberated from the “Today in InfoSec” twitter account and further afield 26th May 1995: Realising his company had missed the boat in estimating the impact and popu…
 
This Week in InfoSec (07:03) With content liberated from the “today in infosec” twitter account and further afield 15th May 2003: In the Friends episode "The One in Barbados, Part One", Ross Geller's laptop was infected by the Kournikova worm when Chandler Bing checked his email on it and opened an email claiming to contain nude images of tennis pl…
 
This Week in InfoSec (07:30) With content liberated from the “today in infosec” twitter account and further afield 9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and …
 
This week in infosec I was a teenage botmaster Rant of the week (Thom, how do I add images to this section?) I want to use the images and description you used here https://podcast.hostunknown.tv/episodes/episode-102-end-of-an-era Never mind. I'll type it out. Rant is about EC Council being EC council Billy Big balls The Indian government has issued…
 
This Week in Infosec (09:52) With content liberated from the “today in infosec” Twitter account and further afield [None] Rant of the Week (10:59) https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YA Full story: https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA Billy Big b…
 
This Week in InfoSec (09:26) With content liberated from the “today in infosec” Twitter account and further afield 26th April 2013: LivingSocial informed its employees that 50 million users' names, emails, dates of birth, and SHA1 hashed passwords were compromised. LivingSocial Hacked https://twitter.com/todayininfosec/status/1519039747301199872 26…
 
This Week In InfoSec (10:15) With content liberated from the “today in infosec” twitter account and further afield 1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion". https://twitter.com/todayininfosec/status/1245550127806201857 MIT says "Disney buys MIT" hack revealed by low price 1st April 2004: The…
 
This Week in InfoSec (09:55) With content liberated from the “today in infosec” twitter account and further afield 31st March 1999: The hugely successful motion picture, The Matrix, is released on this day. Many call it a classic (ok, that’s me), many call it influential (ok, me again), but no one can deny that the impact it had on many aspects of …
 
Links https://www.theguardian.com/uk/canoe Authentication oufit Okta investigating Lapsus$ breach report Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal Netflix to Charge Password Sharers Background Check Company Sued Over Data Breach Okta Confirms 2.5% of Customers Impacted by Lapsus Breach Medical Service Leaks 12,000 Sensi…
 
This Week in InfoSec (08:06) With content liberated from the “today in infosec” twitter account and further afield 15th March 1985: The first Internet domain symbolics.com is registered by Symbolics, a Massachusetts computer company. 16th March 2018: National Lottery owner Camelot has warned of a "low level" cyber-attack that affected customer acco…
 
Loading …

Pikakäyttöopas

Tekijänoikeudet 2023 | Sivukartta | Tietosuojakäytäntö | Käyttöehdot