TechSNAP Large Video

by Jupiter Broadcasting (chris@jupiterbroadcasting.com) · · · · 40 subscribers

An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.

2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits. Plus practical way to protect yourself from ATM Skimmers, how they work & much more!
We’ll tell you about the VMware flaw so bad, the solution is to just turn the service off & we now have more details on a major Windows flaw. Plus new research discovers that up to 81% of Tor users could be de-anonymized & more!
Why Hyping Cyber Threats is Counterproductive & not knowing is never good enough. Plus the malware that targets Hotel visitors, FreeNAS themed questions, our answers & much, much more!
Authentic iOS Apps can be replaced with malware, the US Postal service gets breached & Microsoft has a hot mess of critical patches. Plus some great feedback, a rocking round-up & much more!
One of the worlds most prolific spammers gets profiled & the technical details are fascinating. New Apple malware is getting attention, but why iOS trusts the code is the real story. Plus a great batch of questions, our answers & much much more!
A vulnerability in wget exposes more flaws in commonly used tools, the major flaw in Drupal that just got worse & the new protocol built into your router you need to disable. Plus a great batch of your feedback, a rocking round up & much much more!
A 0-day exploit is attacking Microsoft Windows boxes all over the web, thanks to a weaponized power power presentation. No, I’m not kidding. The details are fascinating. Plus old ATMs become more and more of a target & it’s not because of Windows XP.
A new attack against SSL called POODLE hits the web, and there’s no easy fix. We’ve got all the details. Plus the Zero day bug that exposes other zero-day bugs, HP signs malware, and then it’s a big batch of your questions, our answers!
The Belkin router apocalypse takes users offline all over the world, Infected ATMs spit out money on cue, plus isolating your network, a great batch of your questions & much, much more!
Recent major flaws found in in critical open source software have sent the Internet into a panic. From Shellshock to Xen we discuss how these vulnerabilities can be chained together to own a box. Plus how secure are VLANs & a big batch of your questions
We’ll tell you about a major German hack that lasted 12 years, and struck over 300 business. Plus researchers discover a nasty Android bug that impacts over 70% of users. Then it’s a great big batch of your networking questions, our answers & much more!
Is there a fix to the human flaw in banking systems? We’ll debate. Plus how hackers can take over your internal network using a pixel on a webpage. Then its a huge batch of your storage questions, the Giganews conspiracy & much, much more!
Google leverages Chrome’s marketshare to push web security forward. Are we about to see zero day exploits reclassified as weapons & ZFS gets the green light on Linux for production. Then it’s a great batch of your questions, our answers & much much more!
Home Depot is breached, and the scale could be much larger than the recent Target hack & we discuss the explosion of fake cell towers in the US, and whats behind it. Then the tools used in the recent celebrity photo leak & the steps that need to be taken.
Pre-crime is here, with technology that lets you predicting a hack before it happens. We’ll tell you how. Google’s project zero goes to war, we get real about virtualization. And then its a great batch of your questions, our answers & much more!
You won’t believe how terrifying simple it is to control traffic lights and cameras, Cisco gets the boot and the hospital hack enabled by Heartbleed, plus a great batch of your emails, our answers and much, more!
The Internet suffers from some growing pains, we explain how some old assumptions have come back to haunt us, victims of a cyberheist go after the bank that failed them, and we go deep on the Synology crypto-malware.
Russian hackers collect 1.2 billion usernames and passwords, and while questions remain the details are compelling. Plus simply working around two- factor authentication, crypto-malware that targets NAS Boxes, your questions, our answers and much more!
China goes on a hacking spree, compromising a Point of Sale system is as simple as an ebay purchase. Plus what’s bad about about GoodGoogle, your questions, our answers, and much much more!
A comprehensive study shows that you’re probably taking way too long to patch your box. Plus research on possible iOS backdoors, TOR’s nasty bug, your questions, our answers and much, much more!