Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy Podcast

Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy

A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.
Root Causes 1-46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks copy Podcast

Root Causes 1-46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks copy

Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years.
Root Causes 1-45: What Is the CA/Browser Forum? copy Podcast

Root Causes 1-45: What Is the CA/Browser Forum? copy

In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system.
Root Causes 1-44: Automotive Device Security copy Podcast

Root Causes 1-44: Automotive Device Security copy

SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority?
Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy Podcast

Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy

The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven.
Root Causes 1-42: Anatomy of a Botnet copy Podcast

Root Causes 1-42: Anatomy of a Botnet copy

In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse.
Root Causes 1-41: What Is Blockchain's Killer App? copy Podcast

Root Causes 1-41: What Is Blockchain's Killer App? copy

We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau.
Root Causes 1-39: New University Research on Phishing and Certificates copy Podcast

Root Causes 1-39: New University Research on Phishing and Certificates copy

Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. Join us as we explain what blockchain actually does and how it compares to PKI.
Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy Podcast

Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy

The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a German technical university, investigates the patterns behind this certificate usage.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy

The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, and some interesting developments with malware-driven botnets.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361