Paul’s Security Weekly #539 – Dental Security Weekly

Lisa O'Connor of Accenture Labs joins us for an interview to discuss threat intelligence, advanced cyber hunting, active defense, and security of the Industrial Internet of things! Eyal Neemany of Javelin Networks joins us for the tech segment to discuss bypassing Two-Factor Authentication! Paul and Larry talk about Uber, vulnerable banking apps, and bluetooth on the news, on this weeks episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode539 Visit https://www.securityweekly.com for all the latest episodes! ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly

View Show Index

Full Audio

Segments

1. Uber, Vulnerable Banking Apps, and Bluetooth – Paul’s Security Weekly #539

In the news, a new Windows evasion technique, naked rowers, undetectable malware, social engineering from your shed and banking apps vulnerable to MITM attacks. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

2. Bypassing Two-Factor Authentication – Paul’s Security Weekly #539

Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. Eyal Neemany talks about bypassing two-factor authentication on Active Directory. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

3. Lisa O’Connor, Accenture – Paul’s Security Weekly #539

Lisa leads Global Security Research and Development at Accenture Labs. In this role, she curates and manages a portfolio of cyber research, including threat intelligence, advanced cyber hunting, orchestration for resilient cyber architectures, edge analytics, analytics and machine learning, active defense and security of the Industrial Internet of Things. ?Full Show Notes: https://wiki.securityweekly.com/Episode539 ?Visit our website: https://www.securityweekly.com ?Follow us on Twitter: https://www.twitter.com/securityweekly ?Like us on Facebook: https://www.facebook.com/secweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly
prestitial ad