Stuff Shoved Under Video

Cracking wifi passwords with Kali Linux

I haven’t really done a technical walkthrough type video and I now remember why I never did. These things are hard to do and involve two of my least favourite elements of video-making, screen captures and voiceovers. Which is why I always tip my hat to Vivek and his great tutorials over at SecurityTube.net The…

filed under Video

(ISC)2 Congress 2014

This years (ISC)2 congress was held in Atlanta, GA. I’d heard of Atlanta being referred to as ‘Hotlanta’ and was warned of the humidity that prevails, but fortunately I caught it at the right time of year where the weather was quite pleasant. The conference itself appears to have grown over the last two years…

filed under Video

Photos in the cloud

We put ‘stuff’ in the cloud all the time – and most of the time, that’s perfectly fine because there aren’t any state secrets or self-incriminating evidence contained. The convenience factor it offers typically outweighs the risks. Having said that, it’s always worthwhile evaluating the risks – in particular when using photo backups from your…

filed under Video

Interview with the BatCISO

With so many breaches occurring on a regular basis, perhaps it’s time for a new kind of CISO. A Bat CISO!

filed under Video

Security and the cobra effect

Some people just want to watch the world burn. Others just want to give bad security advice. Check out Troy Hunt’s blog post on the matter.

filed under blog, Video

Spotting phishing scam emails

Phishing emails can be nasty pieces of work. They put a lot of effort into appearing legitimate in order to trick users into falling for their scams. In this video, I only take a look at this one specific email which claimed to come from Apple. There are lots of signs to look out for…

filed under Video

RSA & BSides SF 2014

For the times you feel like the ball inside a pinball machine.    

filed under Video

Bug Bounty

A bug bounty is a reward handed out by companies to people who disclose bugs or vulnerabilities to them in a responsible manner. Think of it like the wild west where anyone is deputised with powers to chase after the Kid and claim the reward dead or alive. Traditionally companies like Google and Facebook offered…

filed under Video

Security Dialectic: Kaspersky Industry Analyst Summit

A tropical Island paradise, a Russian millionaire and hackers may sound like the plot of a James Bond movie, but they are actually references to Kaspersky’s industry analyst event in Punta Cana, Dominican Republic, where the company was expected to divulge its plans, aspirations and research to analysts from around the world. Four of 451…

filed under Video

Phishing prevention

The folks at Information Security Buzz were asking a bunch of people for their tips in how to avoid phishing scams. I responded in the form of a video.

filed under Video