Paul’s Security Weekly #539 – Dental Security Weekly
Lisa O'Connor of Accenture Labs joins us for an interview to discuss threat intelligence, advanced cyber hunting, active defense, and security of the Industrial Internet of things! Eyal Neemany of Javelin Networks joins us for the tech segment to discuss bypassing Two-Factor Authentication! Paul and Larry talk about Uber, vulnerable banking apps, and bluetooth on the news, on this weeks episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode539 Visit https://www.securityweekly.com for all the latest episodes! ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly
Full Audio
Segments
1. Uber, Vulnerable Banking Apps, and Bluetooth – Paul’s Security Weekly #539
In the news, a new Windows evasion technique, naked rowers, undetectable malware, social engineering from your shed and banking apps vulnerable to MITM attacks. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly
Host

2. Bypassing Two-Factor Authentication – Paul’s Security Weekly #539
Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. Eyal Neemany talks about bypassing two-factor authentication on Active Directory. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly
Host

3. Lisa O’Connor, Accenture – Paul’s Security Weekly #539
Lisa leads Global Security Research and Development at Accenture Labs. In this role, she curates and manages a portfolio of cyber research, including threat intelligence, advanced cyber hunting, orchestration for resilient cyber architectures, edge analytics, analytics and machine learning, active defense and security of the Industrial Internet of Things. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly
Host
