Security Now - Season 1
Season 1
Episodes
As the Worm Turns — the first Internet worms of 2005
HoneyMonkeys
NAT Routers as Firewalls
Personal Password Policy (1)
Personal Password Policy (2)
Mechanical & Electromagnetic Information Leakage
SPYaWAREness
Denial of Service (DoS) Attacks
Rootkits
Open Wireless Access Points
Bad WiFi Security (WEP and MAC address filtering)
Sony's
Unbreakable WiFi Security
Virtual Private Networks (VPN): Theory
VPN Secure Tunneling Solutions
Listener feedback Q&A #1
PPTP and IPSec VPN Technology
Hamachi Rocks!
VPNs Three: Hamachi, iPig, and OpenVPN
A SERIOUS new Windows vulnerability — and Listener Q&A
The Windows MetaFile (WMF) Vulnerability
The Windows MetaFile Backdoor?
GRC's
Listener Feedback Q&A #3
How the Internet Works (1)
How the Internet Works (2)
How Local Area Networks Work, Part 1
Listener Feedback Q&A #4
Ethernet Insecurity
Cryptographic Issues
Symmetric Stream Ciphers
Listener Feedback Q&A #5
Symmetric Block Ciphers
Public Key Cryptography
Cryptographic Hashes
Listener Feedback Q&A #6
Crypto Series Wrap-up
Browser Security
Buffer Overruns
Listener Feedback Q&A #7
TrueCrypt
NAT Traversal
Open Ports
Listener Feedback Q&A #8
The 'Hosts' File
Router Logs
Internet Weaponry
Listener Feedback Q&A #9
The NETSTAT Command
Virtual Machine History & Technology
Vista's Virgin Stack
A Busy Week for Security Troubles
VMware
Blue Pill
Application Sandboxes
Listener Feedback Q&A #10
Virtual PC versus VMware
Two New Critical Windows Problems
Comparing
Listener Feedback Q&A #11
ISP Privacy and Security
Internet Proxies
MojoPac
Listener Feedback Q&A #12
Why Is Security So Difficult?
Windows Vista Security
Kernel Patch Protection
Listener Feedback Q&A #13
The Social Implications of Internet Anonymity
Achieving Internet Anonymity
SecurAble
Listener Feedback Q&A #14
Digital Rights Management (DRM)
Peter Gutmann on Vista DRM
Vista DRM Wrap-Up & Announcing "SecurAble"
Listener Feedback Q&A #15
Microsoft on Vista DRM
DEP in Depth
Backtracking Spoofed Spam eMail
Listener Feedback Q&A #16
Hard Drive Unreliability
Cyber Warfare
UAC in Depth
Listener Feedback Q&A #17
Intro to Web Code Injection
Cross-Site Scripting
SQL Injection Exploits
Listener Feedback Q&A #18
Even More Badly Broken WEP
Multifactor Authentication
Marc Maiffret
Listener Feedback Q&A #19
Microsoft Patent Wars
The Fourth Factor
OpenID
Listener Feedback Q&A #20
Operation: Bot Roast
Internet Identity Metasystems
Trusted Platform Module (TPM)
Listener Feedback Q&A #21
Are You Human?
Listener Mailbag #1
PayPal Security Key
Listener Feedback Q&A #22
Firewall LeakTesting
Listener Mailbag #2
PIP & Even More Perfect Passwords
Listener Feedback #23
GRC's eCommerce System
Listener Feedback #24
OpenID Precautions
Listener Feedback #25
Roaming Authentication
Listener Feedback #26
Perfect Paper Passwords
Listener Feedback #27
Even More Perfect paper Passwords
Listener Feedback #28
PayPal and DoubleClick
Listener Feedback #29
Is Privacy Dead?
Listener Feedback #30
Jungle Disk
Listener Feedback #31
Symmetric Ciphers
Listener Feedback #32
Corporate Security
Listener Feedback #33
Windows SteadyState
Listener Feedback #34
FREE CompuSec
Listener Feedback #35
TrueCrypt v5.0
Listener Feedback #36
IronKey
Listener Feedback #37
RAM Hijacks
Listener Feedback #38
Network Congestion
Listener Feedback #39
RSA Conference 2008
Listener Feedback #40
YubiKey
Listener Feedback #41
Secunia's PSI
Listener Feedback #42
Microsoft's Baseline Security Analyzer
Listener Feedback #43
ISP Betrayal
Listener Feedback #44
Phracking Phorm
Listener Feedback #45
DePhormed Politics
Listener Feedback #46
Bailiwicked Domain Attack
Listener Feedback #47
DNS — After the Patch
Listener Feedback #48
Vista Security Bypass
Listener Feedback #49
Google's Chrome
Listener Feedback #50
GoogleUpdate & DNS Security
SockStress
Listener Feedback #51
Cross-Site Request Forgery
Listener Feedback #52
ClickJacking
Listener Feedback #53
The TKIP Hack
Listener Feedback #54
Sandboxie
Listener Feedback #55
Sandbox Limitations
Listener Feedback #56
Drop My Rights
Breaking SSL, PDP-8's & UltraCapacitors
Listener Feedback #57
Cracking Security Certificates
Listener Feedback #58
Crypto Rehash
Listener Feedback #59
Modes of Encryption
Listener Feedback #60
Cryptographic HMACs
Listener Feedback #61
Windows Autorun-around
Listener Feedback #62
Internet Explorer 8
Listener Feedback #63
GhostNet
Listener Feedback #64
Conficker
Listener Feedback #65
The SSL/TLS Protocol
Listener Feedback #66
Windows 7 Security
Listener Feedback #67
The Geek Atlas, IPv6 & a non-VPN
Listener Feedback #68
SecureZIP
Listener Feedback #69
Boyer & Moore
Listener Feedback #70
Lempel & Ziv
Mega Security News Update
Listener Feedback #71
Listener Feedback #72
Vitamin D
Listener Feedback #73
Voting Machine Hacking
Listener Feedback #74
Cracking GSM Cellphones
Listener Feedback #75
Security Maxims
Listener Feedback #76
The Fundamentally Broken Browser Model
Listener Feedback #77
Badly Broken Browsing
Listener Feedback #78
The Oxymoron of "JavaScript Security"
Listener Feedback #79
A security vulnerability in SSL
Listener Feedback #80
"Same Origin" Troubles
Listener Feedback #130
Cyberwarfare
Listener Feedback #82
The Rational Rejection of Security Advice
Listener Feedback #83
Mega Security Update & CES Observations
Listener Feedback #84
Let's Design a Computer (part 1)
Listener Feedback #85
Machine Language
Listener Feedback #86
Indirection: The Power of Pointers
Listener Feedback #87
Stacks, Registers & Recursion
Listener Feedback #88
Hardware Interrupts
Listener Feedback #89
State Subversion of SSL
Listener Feedback #90
The Security of Open vs CLosed
Listener Feedback #91
The "Multi"-verse
The Portable Dog Killer
Listener Feedback #92
Operating Systems
Listener Feedback #93
RISCy Business
Listener Feedback #94
What We'll Do for Speed
Listener Feedback #95
LastPass
Listener Feedback #96
Five Years of Vulnerabilities
Listener Feedback #97
DNS Rebinding
Listener Feedback #98
Strict Transport Security
Listener Feedback #99
Side-Channel Privacy Leakage
Listener Feedback #100
Inside OAuth
Listener Feedback #101
CryptoSystem Backdoors
Listener Feedback #102
The Evercookie
Listener Feedback #103
Firesheep
Listener Feedback #104 & The FireStorm
Benchmarking DNS
Listener Feedback #105
Testing DNS Spoofability
Listener Feedback #106
Tag Me (with RFID)
Listener Feedback #107
Bluetooth
The Portable Dog Killer, Encore
Listener Feedback #108
Bluetooth Hacking
Listener Feedback #109
Fuzzy Browsers
Listener Feedback #110
BitCoin CryptoCurrency
Listener Feedback #111
Proxied Surfing
Listener Feedback #112
Stuxnet
Listener Feedback #113
IE9
Listener Feedback #114
The Comodo SSL Breach
Listener Feedback #115
Pass-Sentences??
Listener Feedback #116
Going Random (1)
Listener Feedback #117
Going Random (2)
Listener Feedback #118
Password Haystacks
Listener Feedback #119
Ghostery
Listener Feedback #120
The Future of Identity
Listener Feedback #121
How the Internet Works, Part 1
Listener Feedback #122
Anatomy of a Security Mistake
Listener Feedback #123
How The Internet Works: ICMP & UDP
Listener Feedback #124
Off The Grid
Listener Feedback #125
TCP Part 1 – Getting Connected
Listener Feedback #126
Certificate Authority (CA) Trust - Time to Change it?
Listener Feedback #127
The Beauty of B.E.A.S.T.
Listener Feedback #128
TCP Pt.2 - Attacking TCP
Listener Feedback #129
TCP Pt.3 - Necessary Refinements
Listener Feedback #81
Internet Privacy Update
Listener Feedback #131
Browser ID
Listener Feedback #132
Mega Security News Update
Listener Feedback #133
Science Fiction Holiday Special
Listener Feedback #134
Wi-Fi Protected (In)Security
Listener Feedback #135
WPS: A Troubled Protocol
Listener Feedback #136
"ScriptNo" for Chrome
Listener Feedback #137
Can "Anonymous" Take Down the Internet?
Listener Feedback #138
HTTP & SPDY
Listener Feedback #139
Buffer Bloat
Listener Feedback #140
iOS Password Mis-Managers
Listener Feedback #141
Cloud Solutions
Twitter Feedback Q&A #142 / Cloud Security
Three Hybrid Cloud Solutions
Listener Feedback #143
DMARC - eMail Security
Listener Feedback #144
Poking Holes in TCP
Listener Feedback #145
Flame On!
Listener Feedback #146
Coddling Our Buffers
Listener Feedback #147
Paul Vixie & DNS Changer
Listener Feedback #148
Ali Baba's Cave
Mat Honan's Very Bad Weekend
Listener Feedback #149
Password Cracking Update: The Death of "Clever"
What a Busy Week!
Listener Feedback #150
Internet Identity Update
Mark Russinovich & Other News
Listener Feedback #151
NFC - Near Field Communications
Listener Feedback #152
ECC - Elliptic Curve Cryptography
Listener Feedback #153
Fully Homomorphic Encryption
Listener Feedback #154
Microsoft: Security, Privacy & DNT
Listener Feedback #155
DTLS - Datagram Transport Layer Security
Listener Feedback #156
QR Codes
Listener Feedback #157
Once Upon a Time
Listener Feedback #158
Disconnect WidgetJacking
Listener Feedback #159
Memory Hard Problems
Listener Feedback #160 & UPnP Exposure Disaster
"Mega" Security Overview
Listener Feedback #161
The Internet Underworld
Listener Feedback #162
Tor 2.0
Your Questions, Steve's Answers 163
Telnet-pocalypse
Your Questions, Steve's Answers 164
Distributed Hash Tables
Your Questions, Steve's Answers 165
VPN Solutions
Your Questions, Steve's Answers 166
BitTorrent Sync
Your Questions, Steve's Answers 167
How Facebook Monetizes
Your Questions, Steve's Answers 168
Off the Record with OTR
Your Questions, Steve's Answers 169
The State of Surveillance
Your Questions, Steve's Answers 170
Interesting Intel History
Your Questions, Steve's Answers 171
SSL and Perfect Forward Secrecy
How Much Tinfoil?
Inflection Points
Your Questions, Steve's Answers 172
Black Hat, TOR and more
Your Questions, Steve's Answers 173
Considering PGP
Your Questions, Steve's Answers 174
BitMessage
The Perfect Accusation
Your Questions, Steve's Answers 175
Fingerprint Biometrics
SQRL
SQRL and Q & A 176
SQRL: Anti-Phishing and Revocation
A Newsy Week
Your Questions, Steve's Answers 177
Monkey Was 26th
Your Questions, Steve's Answers 178
What is RADIUS?
Coin, Patent Trolls, and More
Breaking SSL
Your Questions, Steve's Answers 179
Your Questions, Steve's Answers 180
Time Traveling with Steve
New Year's News Catchup
NSA's ANT
Your Questions, Steve's Answers 181
Your Questions, Steve's Answers 182
Password Policies
Q&A 183
Sisyphus
Goto: Fail
Your Questions, Steve's Answers 184
iOS Security (1)
iOS Security (2)
iOS Security (3)
Your Questions, Steve's Answers 185
How the Heartbleeds
TrueCrypt & Heartbleed Part 2
Your Questions, Steve's Answers 186
Certificate Revocation
Certificate Revocation, Part 2
Your Questions, Steve's Answers 187
Harvesting Entropy
Your Questions, Steve's Answers 188
TrueCrypt: WTH?
Your Questions, Steve's Answers 189
Authenticated Encryption
Your Questions, Steve's Answers 190
Cloud Storage Solutions
Your Questions, Steve's Answers 191
Your Questions, Steve's Answers 192
iOS Surveillance?
Your Questions, Steve's Answers #193
Browser Password Managers
Your Questions, Steve's Answers 194
Big Routing Tables
Your Questions, Steve's Answers 195
PGP: Time for an Upgrade?
Your Questions, Steve's Answers 196
Google vs. SHA-1
Your Questions, Steve's Answers 197
Shocked by the Shell
Your Questions, Steve's Answers 198
Payment Tokenization
Poodle Bites
Your Questions, Steve's Answers 199
Your Questions, Steve's Answers 200
Certificate Transparency
Your Questions, Steve's Answers 201
Let's Encrypt
Your Questions, Steve's Answers 202
Expensive Lessons
Your Questions, Steve's Answers 203
Steve Introduces SQRL
The (In)Security of 2014
Your Questions, Steve's Answers 204
The Enigma
Cryptographic Backdoors
Your Questions, Steve's Answers 205
TOR: Not so Anonymous
Your Questions, Steve's Answers 206
HTTP/2
Your Questions, Steve's Answers 207
Hacking Vehicles
Freak & RowHammer
Your Questions, Steve's Answers 208
Secure Boot
Your Questions, Steve's Answers 209
The TrueCrypt Audit
Your Questions, Steve's Answers 210
Great Firewalls & Cannons
Your Questions, Steve's Answers 211
Law Enforcement Backdoors
Your Questions, Steve's Answers 212
Exploiting Keyless Entry
TLS Logjam
Your Questions, Steve's Answers 213
Your Questions, Steve's Answers 214
Mozilla Tracking Protection
Your Questions, Steve's Answers 215
Tor's Astoria Client
A Crazy News Week!
Hacking Team vs. SQRL
Your Questions, Steve's Answers 216
HORNET: A Fix For TOR?
The Windows 10 Privacy Tradeoff
The Quest for Surfing Safety
Security Is Difficult
Your Questions, Steve's Answers 217
uBlock Origin
Your Questions, Steve's Answers 218
Disconnect.me
iOS Content Blockers
Your Questions, Steve's Answers 219
Breaches & Vigilante Worms
Joe Siegrist of LastPass
Doing It Wrong
Your Questions, Steve's Answers 221
Verifying iOS App Conduct
Your Questions, Steve's Answers 222
Encryption and the Law
Your Questions, Steve's Answers 223
Your Questions, Steve's Answers 224
A Mega News Week
Your Questions, Steve's Answers 225
Your Questions, Steve's Answers 226
Vitamin D
New Year's News
Your Questions, Steve's Answers 227
LostPass
Your Questions, Steve's Answers 228
Three Dumb Routers
Router Q&A Follow-Up
GRC is DOWN
DDoS Attack Mitigation
Your Questions, Steve's Answers 229
CacheBleed
Your Questions, Steve's Answers 230
D.R.O.W.N.
Too Much News
Your Questions, Steve's Answers 231
SMTP STS
Your Questions, Steve's Answers 232
Bit Con
Dumb SmartThings
Z-Wave Goodbye
Your Questions, Steve's Answers 234
IoT Infancy (1)
IoT Infancy (2)
Your Questions, Steve's Answers 235
Control-Flow Enforcement Technology (CET)
Your Questions, Steve's Answers 236
Hacking Certificates
Your Questions, Steve's Answers 237
Messenger, CryptoDrop & Riffle
Your Questions, Steve's Answers 238
Phishing & Filtering
Defcon & Blackhat (1)
Memory & Micro Kernels
Routers & Micro Kernels
Pegasus & Trident
Flip Feng Shui
Your Questions, Steve's Answers 239
GRC's XSS Adventure
DDoS, Breaches and Other Records To Be Broken
Your Questions, Steve's Answers 240
Yahoo & Primal Worries
Your Questions, Steve's Answers 241
DRAMMER
Your Questions, Steve's Answers 242
The Windows AtomBomb
The BlackNurse Attack
Mobile & IoT Nightmares
Your Questions, Steve's Answers 243
Your Questions, Steve's Answers 244
Your Questions, Steve's Answers 245
Law Meets Internet
The Portable Dog Killer (2)
I'm NOT a Robot! (Really)
A Look Into PHP Malware
What's Up with WhatsApp?
Password Complexity
Traitors In Our Midst
Two Armed Bandits
TLS Interception INsecurity
The MMU Side-Channel Attack
The First SHA-1 Collision
Let's Spoof!
Vault 7
Taming Web Ads
Google -vs- Symantec
Proactive Privacy
Proactive Privacy, Really!
News & Feedback Potpourri
The Double Pulsar
Intel's Mismanagement Engine
Go FCC Yourself
Makes You WannaCry
WannaCry Aftermath
Vulnerabilities Galore!
Legacy's Long Tail
Things Are Getting Worse
When Governments React
Research: Useful and Otherwise
All the Usual Suspects
Calm Before the Storm
Crypto Tension
Hack the Vote
Inching Forward
Twelve and Counting
Security Politics
Shattering Trust
Sharknado
Equifax Fiasco
Apple Bakes Cookies
The Great DOM Fuzz-Off
Private Contact Discovery
The DNSSEC Challenge
KRACKing WiFi
IoT Flash Botnets
Reaper Redux
ROCA Pain
Schneier on Equifax
Quad Nine
News & Feedback
More News & Feedback
The iOS Security Trade-off
BGP
The Story of Bitcoin
NSA Fingerprints
The Speculation Meltdown
The InSpectre
The Dark Caracal
Post Spectre?
Meltdown & Spectre Emerge
CryptoCurrency Antics
Russian Meddling Technology
WebAssembly
MemCrashed
AMD Chipset Disaster
Pwn2Own 2018
TLS v1.3 Happens
ProtonMail
Deprecating TLS 1.0 & 1.1
Never a Dull Moment
Azure Sphere
Securing Connected Things
Spectre - NextGen
Ultra-Clever Attacks
SpectreNG Revealed
VPNFilter
Certificate Transparency
Zippity Do... or Don't
Lazy FPU State Restore
Cellular Location Privacy
Wi-Fi Protected Access v3
STARTTLS Everywhere
All Up in Their Business
The Data Transfer Project
Attacking Bluetooth Pairing
New WiFi Password Attack
The Mega FaxSploit
The Foreshadow Flaw
Never a Dull Moment
SonarSnoop
Exploits & Updates
The Browser Extension Ecosystem
SNI Encryption
The Facebook Breach
The Supply Chain
Good Samaritans?
Libssh's Big Whoopsie!
Securing the Vending Machine
PortSmash
Self-Decrypting Drives
Are Passwords Immortal?
ECCploit
GPU RAM Image Leakage
Internal Bug Discovery
The SQLite RCE Flaw
Our Best of 2018
Here Comes 2019!
Zerodium
Which Mobile VPN Client?
Browser Extension Security
700 and Counting!
Adiantum
Authenticity on the Internet
Out in the Wild
Careers in Bug Hunting
SPOILER
Open Source eVoting
Tesla, Pwned
Android Security
URL "Ping" Tracking
DragonBlood
DNSpionage
Credential Stuffing Attacks
Post-Coinhive Cryptojacking
Android 'Q'
CPU.fail
RDP - Really Do Patch
The Nansh0u Campaign
Update Exim Now!
Exim Under Siege
Bug Bounty Business
Exposed Cloud Databases
Gem Hack & Ghost Protocol
Encrypting DNS
Hide Your RDP Now!
Urgent/11
Steve's File Sync Journey
BlackHat & DefCon
The KNOB is Broken
Next Gen Ad Privacy
The Ransomware Epidemic
DeepFakes
SIM Jacking
Top 25 Bug Classes
The Joy of Sync
Makes Ya WannaCry
CheckM8
Biometric Mess
A Foregone Conclusion
DOH and Bluekeep
Credential Delegation
TPM-FAIL
Pushing "DoH"
Android "StrandHogg"
VPN-geddon Denied
PlunderVolt
A Decade of Hacks
The Year's Best
Our Malware Lexicon
Windows 7 - R. I. P.
The Crypto CurveBall
SHAmbles
The Little Red Wagon
Promiscuous Cookies
The Internet of Troubles
Apple's Cert Surprise
Kr00k
The Fuzzy Bench
The SMBGhost Fiasco
TRRespass
Folding Proteins
Zoom Go Boom!
Virus Contact Tracing
The COVID Effect
RPKI
An Authoritarian Internet?
ThunderSpy
WiFi 6
Contact Tracing Apps R.I.P.
Zoom's E2EE Design
Zoom's E2EE Debacle
Lamphone
Ripple20
Ripple20 Too
123456
Tsunami
A Tale of Two Counterfeits
rwxrwxrwx
BootHole
Geneva
Microsoft's 0-day Folly
SpiKey
I Know What You Did Last Summer
IoT Isolation Strategies
BlindSide & BLURtooth
Formal Verification
ZeroLogon++
Why Win7 Lives On
Well Known URI's
Anatomy of a Ryuk Attack
Top 25 Vulnerabilities
Google's Root Program
NAT Firewall Bypass
SAD DNS
Cicada
DNS Consolidation
Amazon Sidewalk
SolarWinds
Best of 2020
SunBurst & SuperNova
SolarBlizzard
Out With The Old
Where the Plaintext is
Comparative Smartphone Security
NAT Slipstreaming 2.0 This
SCADA Scandal
C.O.M.B.
Dependency Confusion
CNAME Collusion
Hafnium
ProxyLogon
What the FLoC?
GIT me some PHP
A Spy in Our Pocket
PwnIt And OwnIt
Homogeneity Attacks
The Mystery of AS8003
The Ransomware Task Force
News from the Darkside
The WiFi Frag Attacks
The Dark Escrow
Epsilon Red
Extrinsic Password Managers
TLS Confusion Attacks
Avaddon Ransonomics
Halfway through 2021
The Kaysea Saga
REvil's Clever Crypto
REvil Vanishes!
SeriousSAM & PetitPotam
The BlackMatter Interview
Apple's CSAM Mistake
Microsoft's Culpable Negligence
Microsoft's Reasoned Neglect
Life: Hanging by a PIN
TPM v1.2 vs 2.0
The Mēris Botnet
Cobalt Strike
autodiscover.fiasco
"Something Went Wrong"
0-Day Angst
Minh Duong's Epic Rickroll
The More Things Change...
Trojan Source
Bluetooth Fingerprinting
Blacksmith
HTTP Request Smuggling
Bogons Begone!
XSinator
Log4j & Log4Shell
It's a Log4j Christmas
Best of 2021
December 33rd
URL Parsing Vulnerabilities
Anatomy of a Log4j Exploit
Inside the NetUSB Hack
The "Topics" API
The Inept Panda
InControl
A BGP Routing Attack
Trust Dies in Darkness
Rogue Nation Cyber Consequences
QWACs on? or QWACs off?
Use After Free
Targeted Exploitation
Port Knocking
Spring4Shell
A Critical Windows RPC RCE
The 0-Day Explosion
Global Privacy Control
That "Passkeys" Thing
The New EU Surveillance State
Dis-CONTI-nued: The End of Conti?
DuckDuckGone?
Passkeys, Take 2
The PACMAN Attack
Microsoft's Patchy Patches
The "Hertzbleed" Attack
The ZuoRAT
The Rolling Pwn
RetBleed
The MV720
Rowhammer's Nine Lives
The Maker's Schedule
TLS Private Key Leakage
The Bumblebee Loader
Wacky Data Exfiltration
Embedding AWS Credentials
The EvilProxy Service
Spell-Jacking
DarkNet Politics
Poisoning Akamai
Source Port Randomization
Password Change Automation
Data Breach Responsibility
After 20 years in GCHQ
Something for Everyone
Memory-Safe Languages
Wi-Peep
Freebie Bots & Evil Cameras
LastPass Again
Apple Encrypts the Cloud
A Generic WAF Bypass
Best of 2022
Leaving LastPass
1
The Rule of Two
Credential Reuse
Data Operand Independent Timing
How ESXi Fell
Ascon
A Clever Regurgitator
The NSA @ Home
A Fowl Incident
Sony Sues Quad9
Flying Trojan Horses
Microsoft's Email Extortion
Zombie Software
A Dangerous Interpretation
Forced Entry
An End-to-End Encryption Proposal
OSB OMG and other news!
Detecting Unwanted Location Trackers
Location Tracker Behavior
VCaaS – Voice Cloning as a Service
Brave's Brilliant Off the Record Request
Windows Platform Binary Table
Scanning the Internet
The Massive MOVEit Maelstrom
Operation Triangulation
Rowhammer Indelible Fingerprinting
Satellite Insecurity, Part 1
Satellite Insecurity, Part 2
TETRA:BURST
Revisiting Global Privacy Control
"Topics" Arrives
When Heuristics Backfire
The Man in the Middle
Apple Says No
LastMess
When Hashes Collide
We told you so!
Encrypting Client Hello
The Top 10 Cybersecurity Misconfigurations
Abusing HTTP/2 Rapid Reset
The Power of Privilege
Citrix Bleed
Article 45
What if a Bit Flipped?
Ethernet Turned 50
Leo turns 67
Revisiting Browser Trust
Quantum Computing Breakthrough
"Active Listening"
Best of 2023
The Mystery of CVE-2023-38606
The Inside Tracks
The Protected Audience API
A Week of News and Listener Views
Stamos on "Microsoft Security"
Unforeseen Consequences
Bitlocker: Chipped or Cracked?
The Internet Dodged a Bullet
Web portal? Yes please!
PQ3
Passkeys vs 2FA
Morris The Second
GoFetch
A Cautionary Tale
Minimum Viable Secure Product
GhostRace
Chat (out of) Control
Passkeys: A Shattered Dream?
Not So Fast
Microsoft's head in the Clouds
312 Scientists & Researchers Respond
The 50 Gigabyte Privacy Bomb
A Large Language Model in Every Pot
The rise and fall of code.microsoft.com
The Angle of the Dangle
The Mixed Blessing of a Crappy PRNG
The End of Entrust Trust
The Polyfill.io Attack
A Snowflake's Chance
CrowdStruck
Platform Key Disclosure
How Revoking!
Rethinking Revocation
National Public Data
Cascading Bloom Filters
Is Telegram an Encrypted App?
RAMBO
Password Manager Injection Attacks
Kaspersky exits the U.S.
Recall's Re-Rollout
uBlock Origin & Manifest V3
BIMI (up Scotty)
Credential Exchange Protocol
The Endless Journey to IPv6
AI Vulnerability Discovery
1000!
Artificial General Intelligence (AGI)
Disconnected Experiences
A Light-Day Away
A Chat with GPT
6-Day Certificates? Why?
Best of 2024
AI Training & Inference
HOTP and TOTP
Attacking TOPT
Recently Updated Shows
Pawn Stars
Long before banks, ATMS and check-cashing services, there were pawn shops. Pawning was the leading form of consumer credit in the United States until the 1950s, and pawn shops are still helping everyday people make ends meet. Pawn Stars takes you inside the colorful world of the pawn business. At the Gold & Silver Pawn Shop on the outskirts of Las Vegas, three generations of the Harrison family - grandfather Richard, son Rick and grandson Corey - jointly run the family business, and there's clashing and camaraderie every step of the way. The three men use their sharp eyes and skills to assess the value of items from the commonplace to the truly historic, including a 16th-century samurai sword, a Super Bowl ring, a Picasso painting and a 17th-century stay of execution. It's up to them to determine what's real and what's fake, as they reveal the often surprising answer to the questions on everyone's mind, "What's the story behind it?" and "What's it worth?"
America's Funniest Home Videos
ABC's longest-running primetime entertainment show, America's Funniest Home Videos, returns for season 33 this fall with the same mission -- giving families something genuinely funny to enjoy together on Sunday nights.
"AFV," the longest-running primetime entertainment show in ABC history, returns for season 33 with the same mission - to provide viewers with hysterical moments that fly by at a dizzying pace.
20/20
20/20 continues to combine hard-hitting investigative reports, newsmaker interviews and compelling human interest and feature stories.
NCIS
NCIS (Naval Criminal Investigative Service) is more than just an action drama. With liberal doses of humor, it's a show that focuses on the sometimes complex and always amusing dynamics of a team forced to work together in high-stress situations. Leroy Jethro Gibbs, a former Marine gunnery sergeant, whose skills as an investigator are unmatched, leads this troupe of colorful personalities. Rounding out the team are Anthony DiNozzo, an ex-homicide detective whose instincts in the field are unparalleled and whose quick wit and humorous take on life make him a team favorite; the youthful and energetic forensic specialist Abby Sciuto, a talented scientist whose sharp mind matches her Goth style and eclectic tastes; Caitlin Todd, an ex-Secret Service Agent; and Timothy McGee, an MIT graduate whose brilliance with computers far overshadows his insecurities in the field; Assisting the team is medical examiner Dr. Donald "Ducky" Mallard, who knows it all because he's seen it all, and he's not afraid to let you know. From murder and espionage to terrorism and stolen submarines, these special agents travel the globe to investigate all crimes with Navy or Marine Corps ties.