Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
May 21st, 2015 | 1 hr 26 mins
Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is.
Plus Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & more!
May 14th, 2015 | 1 hr 50 mins
We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves.
Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more!
May 7th, 2015 | 1 hr 38 mins
Why a stolen healthcare record is harder to track than you might think, Security pros name their must have tools & blame as a service, the new Cybersecurity hot product.
Plus great questions, a huge Round Up & much, much more!
April 30th, 2015 | 1 hr 33 mins
The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil.
Plus your great questions, our answers & much, much more!
April 24th, 2015 | 1 hr 47 mins
What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all & much, much more!
April 16th, 2015 | 1 hr 23 mins
Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane.
Plus great feedback, a bursting round up & much much more!
April 9th, 2015 | 2 hrs 9 mins
Is it possible to make a truly private phone call anymore? The answer might surprise you. Cisco and Level 3 battle a huge SSH botnet & how to Build a successful Information Security career & much, much more!
April 2nd, 2015 | 1 hr 23 mins
Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you.
Plus your great IT questions, a rocking round up & much, much more!
March 26th, 2015 | 1 hr 26 mins
Reverse Engineering Incentives to Improve Security. New Jersey school district computers held for ransom & the flash bug that lives on from 2011 with a twist!
Plus some great networking questions, drone powered Internet & more!
March 19th, 2015 | 1 hr 39 mins
Microsoft takes 4 years to fix a nasty bug, how to bypass 2 factor authentication in the popular ‘Authy’ app.
Hijacking a domain with photoshop, hardware vs software RAID revisited, tons of great questions, our answers & much much more!
March 12th, 2015 | 1 hr 3 mins
Using encryption is a good thing, but its just the start, we’ll explain. Plus how one developer totally owned the Uber app.
Then it’s a great batch of your questions & our answers!
March 5th, 2015 | 1 hr 38 mins
We’ll break down the technical baggage that led to the new FREAK SSL flaw & the security ramifications of top executives using personal email accounts…
Plus why just need to stop hiding file extensions. Plus some great feedback & much, much more!
February 26th, 2015 | 1 hr 47 mins
Lenovo & Google are victims of DNS hijacking, we’ll share the details, Everyone wants you to secure your data, just not from them & how Turbotax profits from Cyber tax fraud!
Plus a great batch of your questions, a fantastic round up & much, much more!
February 19th, 2015 | 1 hr 11 mins
Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more.
Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group & much more!
February 12th, 2015 | 1 hr 34 mins
A 20 year old design flaw in Windows has just been patched & it requires some major re-working of the software. Attackers compromise Forbes.com & why Facebook’s new ThreatExchange platform could be a great idea.