January 29th, 2015 | 1 hr 24 mins
The internet of dangerous things is arriving but what about taking care of the devices we already have?
Plus details on critical updates from Adobe, the surprising number of Gas Stations vulnerable to exploitation via the internet & much, much more!
January 22nd, 2015 | 1 hr 44 mins
Adobe has a bad week, with exploits in the wild & no patch. We’ll share the details. Had your credit card stolen? We’ll tell you how.
Plus the harsh reality for IT departments, a great batch of questions, our answers & much much more!
January 15th, 2015 | 2 hrs 1 min
Been putting off that patch? This week we’ll cover how an out of date Joomla install led to a massive breach, Microsoft and Google spar over patch disclosures, picking the right security question & more!
January 8th, 2015 | 1 hr 45 mins
We reflect on the lessons learned from the Sony Hack & discuss some of the tools used to own their network.
Plus a overview of what makes up a filesystem, a run down of the Bacula backup system & much more!
January 1st, 2015 | 1 hr 9 mins
We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security.
Followed by a great batch of questions, our answers & much much more!
December 25th, 2014 | 1 hr 40 mins
We look back at this year in TechSNAP. Allan shares his war stories, TrueCrypt shuts down, Heartbleed happens & more!
December 18th, 2014 | 1 hr 33 mins
More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain. Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!
December 11th, 2014 | 1 hr 42 mins
If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today! Plus we dig through the Sony hack, answer a ton of great question & a rocki
December 4th, 2014 | 1 hr 54 mins
2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits. Plus practical way to protect yourself from ATM Skimmers, how they work & much more!