To listen to an audio podcast, mouse over the title and click Play. Open iTunes to download and subscribe to podcasts.
Backdoors, pharming, botnets, phishing, rootkits,viruses, worms. Feeling vulnerable? CNET.com's Robert Vamosi will tell you about the latest security threats, what's coming, and how to protect your system. Visit the blog at http://securitybites.cnet.com.
||Security Bites 122: IBM sees security challenges ahead||Last month, IBM released a report (PDF) identifying the security challenges facing enterprises in the next two to five years. The survey is based on data collected internally by IBM. One theme is that as the pace of globalization picks up, traditional bo||21 11 2008||Free||View In iTunes|
||Security Bites 121: What Microsoft's Geneva means for online IDs||In this week's Security Bites podcast, CNET's Robert Vamosi talks about user authentication with Kim Cameron, chief architect with the Identity and Security group at Microsoft. At this year's PDC and again at WinHec, Microsoft certainly talked up its new||7 11 2008||Free||View In iTunes|
||Security Bites 120: When social networks host malware||In this week's Security Bites podcast, Robert Vamosi speaks with Ryan Naraine, security evangelist for Kaspersky and Zero Day blogger for ZDNet, about malicious software. Naraine recently spoke at a conference on emerging security threats sponsored by th||31 10 2008||Free||View In iTunes|
||Security Bites 119: Does the Internet need its own Interpol?||In this week's Security Bites podcast, Robert Vamosi spoke with Patrik Runald, chief security adviser at F-Secure, about the need for a new international agency to handle cybercrime. Although there have been several high-profile arrests--such as that of||24 10 2008||Free||View In iTunes|
||Security Bites 118: Voting in America||Voting--it's the cornerstone of our democracy. But in recent years, both the systems we use and the trust we have in the accuracy of our votes have been challenged. A new report (PDF) looks at all the systems currently in use--from paper ballots to Direc||17 10 2008||Free||View In iTunes|
||Security Bites 117: How 'Clickjacking' attacks hide behind the mouse||Criminals may have found a way to get you to click on malware without you even knowing. Worse, they might also be able to open the microphone or Webcam on your PC to eavesdrop. Called Clickjacking, the process allows the attacker to trick you the user in||10 10 2008||Free||View In iTunes|
||Security Bites 116: Investigating data breaches||According to a report this week from Verizon Business, risk factors for data breaches vary industry to industry and defy a "cookie cutter" approach to security, which is why Verizon has revisited an earlier report. The goal of both the new and the prior||3 10 2008||Free||View In iTunes|
||Security Bites 115: Inside ID fraud's underground forums||This week Tom Rusin, president and chief executive officer of Affinion's North America operation, is Robert Vamosi's guest. His company monitors the criminal underground for several thousand banking institutions by lurking in carder chat rooms. "Carders"||26 9 2008||Free||View In iTunes|
||Security Bites 114: Desktop application risk||It may seem trivial to you what applications are on your desktop, but from a business or organization's perspective, it can be a serious matter. If an application provides unfiltered access to the outside world, this could create regulatory issues. Certa||15 9 2008||Free||View In iTunes|
||Security Bites 113: The security of Chrome||Google has entered the browser space. Chrome, its browser still in beta, is based on the open source Webkit project. Some will recognize Webkit as the foundation for another browser, Apple Safari. But Chrome also borrows heavily from Mozilla Firefox and||5 9 2008||Free||View In iTunes|
Listeners also subscribed to
- SANS Internet Storm Center Daily Network Security and Computer Security Podcast
- SANS Internet Storm Center Handlers
- View In iTunes