Our weekly audio security column
& podcast by Steve Gibson and Leo Laporte
TechTV's Leo Laporte and I spend somewhat shy of two hours each week to discuss important issues of personal computer security. Sometimes we'll discuss something that just happened. Sometimes we'll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user.

SteveAndLeoAsPicardAndRiker
(This was not our idea. It was created by a fan of the podcast using GIMP (similar to
Photoshop). But as a work of extreme image manipulation, it came out surprisingly well.)

 You may download and listen to selected episodes from this page (see below), or subscribe to the ongoing series as an RSS "podcast" to have them automatically downloaded to you as they are produced. To subscribe, use whichever service you prefer . . .

 Receive an automatic eMail reminder whenever a new episode is posted here (from ChangeDetection.com). See the section at the bottom of this page.

 Send us your feedback: Use the form at the bottom of the page to share your opinions, thoughts, ideas, and suggestions for future episodes.

 Leo also produces "This Week in Tech" (TWiT) and a number of other very popular podcasts (TWiT is America's most listened to podcast!) So if you are looking for more informed technology talk, be sure to check out Leo's other podcasts and mp3 files.

 And a huge thanks to AOL Radio for hosting the high-quality MP3 files and providing the bandwidth to make this series possible. We use "local links" to count downloads, but all of the high-quality full-size MP3 files are being served by AOL Radio.





Episode Archive

Each episode has SIX resources:

High quality 64 kbps mp3 audio file
Quarter size, bandwidth-conserving,
16 kbps (lower quality) mp3 audio file
A PDF file containing Steve's show notes
A web page text transcript of the episode
A simple text transcript of the episode
Ready-to-print PDF (Acrobat) transcript  

(Note that the text transcripts will appear a few hours later
than the audio files since they are created afterwards.)

For best results: RIGHT-CLICK on one of the two audio icons & below then choose "Save Target As..." to download the audio file to your computer before starting to listen. For the other resources you can either LEFT-CLICK to open in your browser or RIGHT-CLICK to save the resource to your computer.

Episode #557 | 26 Apr 2016 | 121 min.
Listener Feedback #232

Leo and I discuss an interesting week of security news, including an update on Let’s Encrypt’s growth, the advance in encryption thanks to Edward Snowden, a clever bypass for Windows AppLocker, Opera’s built-in VPN that isn’t, more crypto ransomware evolution, fake DDoS extortionists, some DNSSEC follow-up, and 10 great questions and talking points from our 200,000-plus weekly listeners!
57 MB 14 MB 666 KB 197 KB 98 KB 186 KB

Episode #556 | 19 Apr 2016 | 102 min.
SMTP STS

Leo and I discuss the outcry following the “60 Minutes” high-visibility demonstration of real-time cellular phone hacking. We also cover the news of the Canadian RCMP having BlackBerry’s master decryption key; the end of Apple’s QuickTime; what the FBI found (or didn’t) on the San Bernardino attacker’s phone; and a revisit of Threema, WhatsApp, and Signal. Then, after a bit of miscellany, we take a look at a newly proposed specification for increasing eMail security known as “SMTP STS.”
49 MB 12 MB 267 KB 130 KB 76 KB 142 KB

Episode #555 | 12 Apr 2016 | 135 min.
WhatsApp

Leo and I try to cover all of an insanely busy week's security events and news. A draft of the much-anticipated Burr-Feinstein encryption bill has appeared; news from the FBI on hacking iPhones; browser and Let's Encrypt news; several CCTV malware bits; a bunch of new ransomware; an amazing "You're Doing It Wrong"; and the result of my deep dive into the Open Whisper Systems "Signal" communications protocol that's finally been fully integrated into the world's #1 multiplatform messaging system, WhatsApp, along with two things that MUST be done to get true security.
65 MB 16 MB 485 KB 174 KB 102 KB 185 KB

Episode #554 | 05 Apr 2016 | 107 min.
Listener Feedback #231

Leo and I discuss a quiet week’s few security events, sharing some thoughts about Internet of Things (IoT) security, Bruce Schneier on Apple and the FBI, and some miscellany. Then we open the Security Now! mailbag to hear from our listeners their experiences and thoughts, and answer their questions.
50 MB 13 MB 234 KB 157 KB 88 KB 164 KB

Episode #553 | 29 Mar 2016 | 127 min.
Too Much News

Leo and I discuss a VERY interesting week of news: The FBI dropping its case against Apple, claiming not to need them any longer; a distressing possible smartphone encryption law for California; TrueCrypt's origins; a Certificate Authority horror; more hospitals hit with ransomware; a bad flaw in the SMB protocol; finally some good news on the IoT front; GRC's new Never10 freeware; and a discussion of the monster PC I just built.
60 MB 15 MB 944 KB 186 KB 100 KB 183 KB

Episode #552 | 22 Mar 2016 | 148 min.
D.R.O.W.N.

Padre and I discuss the week’s major security events, including the FBI’s hearing delay, Matthew Green’s iMessage attack, a side-channel attack on phones, a massive malvertising campaign affecting many major sites, the 2016 Pwn2Own contest, a new Android Stagefright vulnerability and attack, and some other miscellany. We then describe the DROWN attack against up-to-date TLS servers using still-present SSLv2 protocol.
71 MB 18 MB 358 KB 135 KB 112 KB 183 KB

Episode #551 | 15 Mar 2016 | 122 min.
Listener Feedback #230

Leo and I discuss the week's major security events - including lots of new fur flying over the escalating Apple v. FBI/DoJ encryption battle - and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
58 MB 15 MB 184 KB 188 KB 100 KB 184 KB

Episode #550 | 08 Mar 2016 | 119 min.
CacheBleed

Leo and I discuss an event-filled week of security news (with some comic relief courtesy of John McAfee on the Apple conflict), after which we examine the latest side-channel attack, which is effective even against carefully written crypto code designed to thwart side-channel attacks.
57 MB 14 MB 402 KB 179 KB 93 KB 172 KB

Episode #549 | 01 Mar 2016 | 126 min.
Listener Feedback #229

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
60 MB 15 MB 249 KB 174 KB 102 KB 183 KB

Episode #548 | 23 Feb 2016 | 113 min.
DDoS Attack Mitigation

Steve and Leo discuss Apple's response to the FBI's court order, the hack of the Linux Mint distribution, more Comodo bad news, a major cryptoware ransom paid, and follow-ups on the glibc and Apple Error 53 stories. Then Steve details everything that has transpired since last week's "GRC Is Down" episode.
54 MB 14 MB 409 KB 135 KB 83 KB 152 KB

Episode #547 | 16 Feb 2016 | 122 min.
GRC is DOWN

Leo and I discuss the overzealous DDoS attack ongoing against GRC.com, an ECDH key-stealing exploit, a buffer overflow problem in glibc, innovations in data storage, and Bruce Schneier’s Worldwide Survey of Encryption Products.
58 MB 15 MB 361 KB 150 KB 92 KB 166 KB

Episode #546 | 09 Feb 2016 | 114 min.
Router Q&A Follow-up

After catching up with the most interesting security news of the past week, Leo and I address three representative questions posed by listeners regarding last week's “Three Dumb Routers” episode.
55 MB 14 MB 275 KB 152 KB 87 KB 160 KB

Episode #545 | 02 Feb 2016 | 117 min.
Three Dumb Routers

Leo and I catch up with the past week's small amount of security news, then they talk a bit about Steve's discovery of a rare and wonderful true EEG sleep monitor and various other miscellany. Then Steve digs deep into home consumer router operation to explain why no fewer than "three dumb routers" are required for full, true, securely isolated network operation.
56 MB 14 MB 244 KB 147 KB 88 KB 160 KB

Episode #544 | 26 Jan 2016 | 117 min.
Listener Feedback #228

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
55 MB 14 MB 214 KB 153 KB 92 KB 168 KB

Episode #543 | 19 Jan 2016 | 111 min.
LostPass

Leo and I cover another busy week of security news. Then we focus upon the recent "LostPass" phishing hack of LastPass, revealed at ShmooCon, and discuss the Internet's serious problem with phishing of all kinds.
53 MB 13 MB 592 KB 140 KB 85 KB 155 KB

Episode #542 | 12 Jan 2016 | 133 min.
Listener Feedback #227

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
63 MB 16 MB 368 KB 189 KB 106 KB 190 KB

Episode #541 | 05 Jan 2016 | 97 min.
New Year's News

The last two weeks of 2015 generated so much news that this first podcast of 2016 catches us up on everything that happened since our last podcast of 2015.
46 MB 12 MB 440 KB 149 KB 81 KB 153 KB

Episode #539 | 22 Dec 2015 | 134 min.
Listener Feedback #226

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
63 MB 15 MB 380 KB 15 KB 102 KB 178 KB

Episode #538 | 15 Dec 2015 | 123 min.
Listener Feedback #225

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
58 MB 15 MB 342 KB 163 KB 98 KB 175 KB

Episode #537 | 08 Dec 2015 | 121 min.
A Mega News Week

This first week of December brought us the early Christmas present of an amazing amount of interesting and important news. This entire episode is chockful of reports and discussion of everything that has happened during the past busy week in security and privacy.
58 MB 15 MB 500 KB 168 KB 95 KB 175 KB

Episode #536 | 01 Dec 2015 | 99 min.
Listener Feedback #224

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
47 MB 12 MB 312 KB 136 KB 80 KB 149 KB

Episode #535 | 24 Nov 2015 | 114 min.
Listener Feedback #223

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
54 MB 14 MB 365 KB 157 KB 92 KB 167 KB

Episode #534 | 17 Nov 2015 | 109 min.
Encryption: Law Enforcement's Whipping Boy

Leo and I discuss a wide range of security news, Steve's feelings about the new iPad Pro, and lots of interesting bits of miscellany. We then revisit the newly controversial question of Internet encryption which has been raised with great emphasis after last week's terrorist attacks in Paris.
52 MB 13 MB 434 KB 155 KB 84 KB 160 KB

Episode #533 | 10 Nov 2015 | 131 min.
Listener Feedback #222

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
62 MB 16 MB 330 KB 189 KB 107 KB 192 KB

Episode #532 | 03 Nov 2015 | 124 min.
Verifying iOS App Conduct

Leo and I discuss a very busy week of interesting - and somewhat distressing - security and privacy news. Then we explore the fundamental problem with iOS application security enforcement which is going to take Apple some time to resolve.
59 MB 15 MB 391 KB 159 KB 94 KB 170 KB

Episode #531 | 27 Oct 2015 | 104 min.
Listener Feedback #221

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
49 MB 13 MB 263 KB 146 KB 83 KB 155 KB

Episode #530 | 20 Oct 2015 | 81 min.
Doing It Wrong

This week's podcast is titled "Doing It Wrong" because the week's news happened to include four unrelated examples of companies really getting security wrong. So Leo and I first catch up on the week's other news and miscellany. Then we take a look at four examples of security being done wrong.
39 MB 10 MB 316 KB 118 KB 66 KB 129 KB

Episode #529 | 13 Oct 2015 | 123 min.
Listener Feedback #220

In the wake of the news that LogMeIn is acquiring LastPass, Joe Siegrist, founder and CEO of LastPass, joins us to talk about the acquisition and what he hopes it means for the future of our favorite password manager. We then catch up with the week's news, and share and discuss 10 questions and comments from our listeners.
59 MB 15 MB 225 KB 154 KB 101 KB 179 KB

Episode #528 | 06 Oct 2015 | 99 min.
Breaches & Vigilante Worms9

With many massive Internet data breaches, and a prolific vigilante worm loose on the Internet, Leo and I spend a fun- and fact-filled podcast covering the past week's multitude of news.
47 MB 12 MB 381 KB 125 KB 76 KB 141 KB

Episode #527 | 29 Sep 2015 | 115 min.
Listener Feedback #219

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
54 MB 14 MB 278 KB 185 KB 97 KB 182 KB

Episode #526 | 22 Sep 2015 | 120 min.
iOS Content Blockers

Leo and I cover a busy past week of security news, then discuss the first week of iOS mobile web content filtering made possible by Wednesday's release of iOS v9. We take a close look at the initial set of content blocking apps available for iOS and Safari.
57 MB 14 MB 355 KB 153 KB 94 KB 170 KB

Episode #525 | 15 Sep 2015 | 92 min.
Disconnect

Leo and I cover a relatively small bit of news of the week, including dispelling an unwarranted concern about LastPass being hacked. Then we converse with Patrick Jackson, co-founder and chief technology officer (CTO) of Disconnect, about his company's view of the web-tracking industry, its past and probable future.
43 MB 11 MB 175 KB 116 KB 76 KB 139 KB

Episode #524 | 08 Sep 2015 | 111 min.
Listener Feedback #218

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
52 MB 13 MB 317 KB 157 KB 92 KB 168 KB

Episode #523 | 01 Sep 2015 | 94 min.
uBlock Origin

Leo and I catch up with the week's major security events. We then examine the ecosystem of web page advertising by comparing it to other "opportunistic advertising" such as that appearing on public transportation, highway billboards, broadcast television commercials and other public venues - which consumers have no obligation to consume. I eschew the implication that visitors to a web page have an obligation to retrieve third-party content, over which the website has little or no control, which consumes bandwidth, reduces online privacy, hinders performance, and potentially exposes visitors to malicious exploitation. And I believe this remains true even when a visitor's retrieval of such despicable third-party content would generate much-needed revenue for the visited site. Finally, I review the many operational features of uBlock Origin, my chosen HTML firewall, which effectively returns control to web users.
44 MB 11 MB 370 KB 112 KB 73 KB 135 KB

Episode #522 | 25 Aug 2015 | 111 min.
Listener Feedback #217

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
52 MB 13 MB 178 KB 144 KB 92 KB 166 KB

Episode #521 | 18 Aug 2015 | 136 min.
Security Is Difficult

Leo and I catch up on another in a series of very busy weeks of security news. Then we discuss several recently written commentaries about the distressing state of online web advertising.
64 MB 16 MB 478 KB 203 KB 109 KB 198 KB

Episode #520 | 11 Aug 2015 | 99 min.
The Quest for Surfing Safety

Leo and I catch up on a busy week of security news, and then we follow my ongoing search for a low-hassle solution for safely browsing the danger-filled World Wide Web.
48 MB 12 MB 266 KB 144 KB 76 KB 146 KB

Episode #519 | 04 Aug 2015 | 120 min.
The Win10 Privacy Tradeoff

While Leo and I await the revelations from the ongoing annual Black Hat and DefCon conferences, the fallout from which we will doubtless be dissecting during upcoming weeks, we keep current with other security news and events. We then examine the change of philosophy embodied by Microsoft's Windows 10 and its many controversial spying "features."
57 MB 14 MB 213 KB 180 KB 100 KB 183 KB

Episode #518 | 28 Jul 2015 | 104 min.
HORNET: A fix for TOR?

August’s annual DefCon and Black Hat conferences never fail to surprise, worry, and entertain. This year is no different. Though still two weeks off, reports of interesting security troubles are beginning to surface. This week Leo and I examine the week’s news and take a close look at a topic the Internet press got completely wrong: HORNET, a new design for an Internet Anonymity network.
50 MB 12 MB 277 KB 131 KB 81 KB 150 KB

Episode #517 | 21 Jul 2015 | 108 min.
Listener Feedback #216

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
52 MB 13 MB 184 KB 178 KB 92 KB 172 KB

Episode #516 | 14 Jul 2015 | 133 min.
SQRL Revisited

Security and privacy-related news keeps coming! So this week Father Robert and I will cover the past week's many interesting events. Then we revisit the much evolved and nearly finalized SQRL protocol to see how it has grown and matured during the 92 weeks since I first disclosed its concept during Podcast 424 with Tom.
64 MB 16 MB 284 KB 112 KB 95 KB 162 KB

Episode #515 | 07 Jul 2015 | 122 min.
A Crazy News Week!

So much happened in the security and privacy worlds this past week that it will be everything Father Robert and I can do just to cover and discuss it all during a single podcast. So this is one of our pure news coverage and catch-up episodes. I'm sure it's going to be a blast!
58 MB 15 MB 306 KB 117 KB 96 KB 162 KB

Episode #514 | 30 Jun 2015 | 145 min.
Tor's Astoria Client

After catching up with a lot of interesting security news, Father Robert and I take a look at recent research into improving the privacy delivered to users of the Tor network. Our conclusions are somewhat distressing.
68 MB 17 MB 326 KB 137 KB 117 KB 192 KB

Episode #513 | 23 Jun 2015 | 129 min.
Listener Feedback #215

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
62 MB 15 MB 368 KB 183 KB 107 KB 192 KB

Episode #512 | 16 Jun 2015 | 132 min.
Mozilla's Tracking Protection

Leo and I discuss the week's most interesting recent security events and a bit of miscellany. Then we examine the revelations about the current state of Internet user tracking arising from Mozilla's Firefox tracking protection instrumentation.
64 MB 16 MB 517 KB 205 KB 111 KB 199 KB

Episode #511 | 09 Jun 2015 | 113 min.
Listener Feedback #214

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
54 MB 14 MB 1.1 MB 170 KB 95 KB 176 KB

Episode #510 | 02 Jun 2015 | 114 min.
Listener Feedback #213

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
55 MB 14 MB 327 KB 208 KB 100 KB 190 KB

Episode #509 | 26 May 2015 | 97 min.
LOGJAM: Imperfect Forward Secrecy

After covering the week's most significant security news, Leo and I closely examine the week's most significant news, a major new vulnerability in the Internet's TLS protocol known as “Logjam.”
46 MB 12 MB 359 KB 144 KB 77 KB 147 KB

Episode #508 | 19 May 2015 | 117 min.
Exploiting (Automobile) Keyless Entry

After catching up with a busy week of security news, Leo and I take a close look at the surprisingly weak and insecure technology used for today's modern automotive keyless entry and engine start systems. We show how easily it may be bypassed... perhaps for as little as $17 on eBay.
56 MB 14 MB 385 KB 184 KB 97 KB 178 KB

Episode #507 | 12 May 2015 | 104 min.
Listener Feedback #212

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
50 MB 12 MB 463 KB 175 KB 92 KB 172 KB

Episode #506 | 05 May 2015 | 106 min.
Law Enforcement Backdoors

Leo and I catch up with the past week's most interesting security events and cover some miscellaneous tidbits. We then examine the carefully written testimony of two leading computer scientists who argue against the feasibility of incorporating encryption backdoors into commercial mobile and other device technologies.
51 MB 13 MB 1.5 MB 134 KB 84 KB 152 KB

Episode #505 | 28 Apr 2015 | 143 min.
Listener Feedback #211

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
69 MB 17 MB 915 KB 225 KB 123 KB 220 KB

Episode #504 | 21 Apr 2015 | 108 min.
Great Firewalls & Cannons

Leo and I catch up with the most interesting and significant security and privacy news of the week. Then we take a close look at what's known of the mechanisms China has developed - both filtering and offensive weaponry - to provide for their censorship needs and to potentially attack external Internet targets.
52 MB 13 MB 261 KB 134 KB 83 KB 150 KB

Episode #503 | 14 Apr 2015 | 123 min.
Listener Feedback #210

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
59 MB 15 MB 890 KB 114 KB 100 KB 166 KB

Episode #502 | 07 Apr 2015 | 107 min.
The TrueCrypt Audit

Leo and I catch up on a busy and interesting week of security events. Then we take a close look at the results of the just-completed second phase of the TrueCrypt audit, which focused upon the implementation of TrueCrypt's security and privacy guarantees.
51 MB 13 MB 707 KB 130 KB 83 KB 152 KB

Episode #501 | 31 Mar 2015 | 122 min.
Listener Feedback #209

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
59 MB 15 MB 213 KB 178 KB 99 KB 181 KB

Episode #500 | 24 Mar 2015 | 94 min.
Windows Secure Boot

Leo and I discuss the recent Pwn2Own hacking competition. We examine another serious breach of the Internet's certificate trust system and marvel at a very clever hack to crack the iPhone four-digit PIN lock. Then we take a close look at the evolution of booting from BIOS to UEFI and how Microsoft has leveraged this into their “Windows Secure Boot” system. We also examine what it might mean for the future of non-Windows operating systems.
45 MB 11 MB 348 KB 126 KB 73 KB 138 KB

Episode #499 | 17 Mar 2015 | 118 min.
Listener Feedback #208

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
57 MB 14 MB 343 KB 195 KB 107 KB 195 KB

Episode #498 | 10 Mar 2015 | 100 min.
FREAK & RowHammer

Leo and I catch up with several VERY interesting security events and stories of the week. Then we take a deep dive into two of the week's big security stories: FREAK and RowHammer.
48 MB 12 MB 209 KB 156 KB 81 KB 152 KB

Episode #497 | 03 Mar 2015 | 122 min.
Vehicle Hacking

Leo and I discuss the week’s tamer-than-usual news; then we host a terrific interview of the team (recently featured on Sunday’s “60 Minutes”) who have been working with DARPA to address the challenge of hardening high-tech networked vehicles – autos and UAVs – against malicious hacking attacks.
48 MB 12 MB 196 KB 148 KB 88 KB 165 KB

Episode #496 | 24 Feb 2015 | 122 min.
Listener Feedback #207

Leo and I discuss the week's major security events, including the revelation of the Lenovo Crapware and the joint GCHQ/NSA Gemalto attack which rendered cellular phones insecure. Then we discuss questions and comments from listeners of previous episodes to tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world application notes for any of the security technologies and issues we have previously discussed.
59 MB 15 MB 385 KB 197 KB 103 KB 190 KB

Episode #495 | 17 Feb 2015 | 105 min.
HTTP/2

Leo and I catch up with several VERY interesting security events and stories of the week. Then we take a close look and a deep dive into the operation of the industry's first change in the official HTTP protocol in 15 years - the finalization and emergence of the HTTP/2 IETF specification which significantly streamlines web browser and web server interaction.
51 MB 13 MB 925 KB 107 KB 79 KB 139 KB

Episode #494 | 10 Feb 2015 | 112 min.
Listener Feedback #206

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.
54 MB 13 MB 721 KB 166 KB 93 KB 167 KB

Episode #493 | 03 Feb 2015 | 71 min.
Tor: Not so Anonymous

After catching up with a few important security events of the week, Leo and I revisit and dissect the anonymity promises of TOR in light of scores of academic papers which have questioned its anonymity guarantees.
34 MB 8.5 MB 501 KB 75 KB 51 KB 98 KB

Episode #492 | 27 Jan 2015 | 91 min.
Listener Feedback #205

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.
44 MB 11 MB 91 KB 126 KB 76 KB 140 KB

Episode #491 | 20 Jan 2015 | 62 min.
Cryptographic Backdoors

Following this slow week of security news, Leo and I first discuss the news surrounding how and why the U.S. was so sure that North Korea was behind the attack on Sony. Then we examine the cryptographic consequences of the British and U.S. governments' recent pronouncements that terrorist communications should not be allowed to remain secret.
30 MB 7.4 MB 1.2 MB 78 KB 50 KB 102 KB

Episode #490 | 13 Jan 2015 | 115 min.
The Enigma

Leo and I first discuss a surprisingly busy week of security news; then, we take a careful walk through the history (it's not what you may think) and the detailed operation of “The Enigma Machine” which Germany used to encrypt their sensitive radio traffic during the Second World War.
55 MB 14 MB 519 KB 126 KB 85 KB 150 KB

Episode #489 | 06 Jan 2015 | 107 min.
Listener Feedback #204

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.
51 MB 13 MB 1.3 MB 173 KB 92 KB 171 KB

• Current Podcast Page
• Security Now 2014
• Security Now 2013
• Security Now 2012
• Security Now 2011
• Security Now 2010
• Security Now 2009
• Security Now 2008
• Security Now 2007
• Security Now 2006
• Security Now 2005



You can receive an eMail reminder whenever this page is updated with a new Security Now! episode. Click the "Monitor Changes" button to have the highly-regarded "Change Detection" web site monitor this page and send you a note when it changes.

Monitor this page for changes: (it's private by ChangeDetection)
Security Now!, SpinRite Testimonials, and other Feedback:
Please use GRC's Visitor & Listener FEEDBACK Page where you may easily submit any feedback for Security Now, SpinRite testimonials, suggestions for future Security Now topics or questions & comments for future Listener Feedback episodes. Thank you!


Jump to top of page
Gibson Research Corporation is owned and operated by Steve Gibson.  The contents
of this page are Copyright (c) 2016 Gibson Research Corporation. SpinRite, ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of Gibson
Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy.
Jump to top of page

Last Edit: Apr 28, 2016 at 11:19 (5.16 days ago)Viewed 1,470 times per day