Our weekly audio security column
& podcast by Steve Gibson and Leo Laporte
TechTV's Leo Laporte and I take 30 to 90 minutes near the end of each week to discuss important issues of personal computer security. Sometimes we'll discuss something that just happened. Sometimes we'll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user.

 You may download and listen to selected episodes from this page (see below), or subscribe to the ongoing series as an RSS "podcast" to have them automatically downloaded to you as they are produced. To subscribe, use whichever service you prefer . . .

 Receive an automatic eMail reminder whenever a new episode is posted here (from ChangeDetection.com). See the section at the bottom of this page.

 Send us your feedback: Use the form at the bottom of the page to share your opinions, thoughts, ideas, and suggestions for future episodes.

 Leo also produces "This Week in Tech" (TWiT) and a number of other very popular podcasts (TWiT is America's most listened to podcast!) So if you are looking for more informed technology talk, be sure to check out Leo's other podcasts and mp3 files.

 And a huge thanks to AOL Radio for hosting the high-quality MP3 files and providing the bandwidth to make this series possible. We use "local links" to count downloads, but all of the high-quality full-size MP3 files are being served by AOL Radio.





Episode Archive

Each episode has SIX resources:

High quality 64 kbps mp3 audio file
Quarter size, bandwidth-conserving,
16 kbps (lower quality) mp3 audio file
A web page with any supplementary notes
A web page text transcript of the episode
A simple text transcript of the episode
Ready-to-print PDF (Acrobat) transcript  

(Note that the text transcripts will appear a few hours later
than the audio files since they are created afterwards.)

For best results: RIGHT-CLICK on one of the two audio icons & below then choose "Save Target As..." to download the audio file to your computer before starting to listen. For the other resources you can either LEFT-CLICK to open in your browser or RIGHT-CLICK to save the resource to your computer.

Episode #333 | 28 Dec 2011 | 95 min.
Science Fiction Holiday Special

After catching up with just a bit of year-end security news, for their special holiday episode, Steve and Leo review their favorite Science Fiction books and movies, pulling the commentary they have previously scattered throughout many years into a single reference.
46 MB 11 MB 167 KB 83 KB 162 KB

Episode #332 | 21 Dec 2011 | 93 min.
Listener Feedback #133

Tom and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
45 MB 11 MB 98 KB 79 KB 139 KB

Episode #331 | 14 Dec 2011 | 94 min.
Mega Security News Update

We had so much news this week that it squeezed out our show's planned topic of Google's new SDPY web browser protocol. So we'll tackle that early next year. In the meantime, Leo and Steve will discuss the news of this very active week!
45 MB 11 MB 177 KB 81 KB 160 KB

Episode #330 | 07 Dec 2011 | 99 min.
Listener Feedback #132

Tom and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
48 MB 12 MB 101 KB 81 KB 141 KB

Episode #329 | 30 Nov 2011 | 74 min.
Browser ID

After catching up with the week's news, Leo and I examine the operation of Mozilla's solution to the need for secure, reliable and easy-to-use establishment of online Internet identity known as: BrowserID. We also compare it with all of the other existing technologies and solutions we've discussed before.
35 MB 8.8 MB 109 KB 62 KB 120 KB

Episode #328 | 23 Nov 2011 | 102 min.
Listener Feedback #131

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
49 MB 12 MB 148 KB 88 KB 162 KB

Episode #327 | 16 Nov 2011 | 68 min.
Internet Privacy Update

The day before recording this podcast in the studio with Leo, I attended an annual Internet privacy conference. After catching up with the week's security news, updates, and errata, I share what I saw and learned during the conference, including three VERY promising new privacy and authentication tools.
33 MB 8.2 MB 155 KB 68 KB 137 KB

Episode #326 | 09 Nov 2011 | 102 min.
Listener Feedback #130

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
49 MB 12 MB 148 KB 86 KB 159 KB

Episode #325 | 02 Nov 2011 | 74 min.
TCP Pt.3 - Necessary Refinements

After catching up with the week's news, Leo and I return this week to our "How the Internet Works" fundamentals series. We examine the challenges presented by “packet-based connections” to further understand the operation of the Internet's most popular and complex protocol: TCP.
35 MB 8.9 MB 83 KB 57 KB 109 KB

Episode #324 | 26 Oct 2011 | 75 min.
Listener Feedback #129

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
36 MB 9 MB 110 KB 64 KB 124 KB

Episode #323 | 19 Oct 2011 | 84 min.
TCP Pt.2 - Attacking TCP

After catching up with the week's news, Leo and I return this week to our “How the Internet Works” fundamentals series. We examine the operation of the various attacks that have been made through the years against the Internet's most popular and complex protocol: TCP.
41 MB 10 MB 84 KB 63 KB 116 KB

Episode #322 | 12 Oct 2011 | 75 min.
Listener Feedback #128

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
36 MB 9 MB 86 KB 69 KB 123 KB

Episode #321 | 05 Oct 2011 | 103 min.
The Beauty of B.E.A.S.T.

After catching up with the week's security news, Steve and Leo examine the implications of a recent Internet-wide exploit known as BEAST: Browser Exploits Against SSL/TLS. They share the process used by the discoverers of an exploit for this long-known vulnerability and consider its implications.
49 MB 12 MB 135 KB 84 KB 154 KB

Episode #320 | 29 Sep 2011 | 91 min.
Listener Feedback #127

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
44 MB 11 MB 127 KB 78 KB 146 KB

Episode #319 | 22 Sep 2011 | 74 min.
Certificate Authority (CA) Trust - Time to Change it?

After catching up with just a bit of the past week's news, Leo and I explore the most mature potential replacement for the Internet's existing (and failing) “trust model” which has always been based upon the unequivocal trust of Certificate Authorities.
36 MB 8.9 MB 87 KB 58 KB 111 KB

Episode #318 | 15 Sep 2011 | 104 min.
Listener Feedback #126

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
50 MB 13 MB 151 KB 94 KB 170 KB

Episode #317 | 8 Sep 2011 | 92 min.
TCP Part 1 – Getting Connected

After catching up with a week of the amazing news of the security breach of the DigiNotar certificate authority, Steve and Leo continue their "How the Internet Works" series with the first of several episodes describing the operation of the Internet's most used protocol: TCP.
44 MB 11 MB 97 KB 68 KB 124 KB

Episode #316 | 1 Sep 2011 | 98 min.
Listener Feedback #125

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
47 MB 12 MB 135 KB 84 KB 154 KB

Episode #315 | 25 Aug 2011 | 83 min.
Off The Grid

After catching up with the week's news, I explain my goals, development process, and operation of the “Off The Grid” paper-based encryption system I developed for use in encrypting website domain names into matching secure website passwords.
40 MB 10 MB 168 KB 76 KB 149 KB

Episode #314 | 18 Aug 2011 | 82 min.
Listener Feedback #124

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
39 MB 10 MB 111 KB 72 KB 134 KB

Episode #313 | 11 Aug 2011 | 103 min.
How The Internet Works: ICMP & UDP

After catching up with a busy week of security updates, and some miscellaneous fun security news, Tom & I return for the second installment of "How The Internet Works" with a look at the ICMP and UDP protocols.
49 MB 12 MB 89 KB 76 KB 130 KB

Episode #312 | 04 Aug 2011 | 90 min.
Listener Feedback #123

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
50 MB 12 MB 95 KB 77 KB 133 KB

Episode #311 | 28 Jul 2011 | 66 min.
Anatomy of a Security Mistake

This week, after catching up with a collection of interesting security events, Leo and I take a close look at a recently discovered security coding error, examining exactly how and why it occurred, to understand how easily these kinds of mistakes can be made... and how difficult it can be to EVER find them all.
32 MB 7.9 MB 82 KB 54 KB 105 KB

Episode #310 | 21 Jul 2011 | 103 min.
Listener Feedback #122

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
50 MB 12 MB 154 KB 90 KB 164 KB

Episode #309 | 14 Jul 2011 | 79 min.
How the Internet Works, Part 1

This week, after catching up with our usual grab bag of Internet-related security and privacy news, including another Microsoft Patch Tuesday, Leo and I plow into the first of a series of forthcoming episodes, which will be spread out over time, describing the detailed technical operation of the ever-more-ubiquitous global Internet.
38 MB 9.4 MB 91 KB 62 KB 118 KB

Episode #308 | 07 Jul 2011 | 103 min.
Listener Feedback #121

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
50 MB 12 MB 159 KB 92 KB 167 KB

Episode #307 | 30 Jun 2011 | 76 min.
The Future of Identity

This week, after catching up on the week's security and privacy news, Steve and Leo take a look at the state of Identity Management in Cyberspace with the U.S. Government's publication of its NSTIC - National Strategy for Trusted Identities in Cyberspace.
36 MB 9.1 MB 111 KB 67 KB 126 KB

Episode #306 | 23 Jun 2011 | 96 min.
Listener Feedback #120

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
46 MB 12 MB 146 KB 82 KB 154 KB

Episode #305 | 16 Jun 2011 | 67 min.
Ghostery

This week, after catching up on the week’s security and privacy news, Steve and Leo take a close look at “Ghostery,” a highly recommended, multi-OS, multi-browser extension that reveals all of the tracking bugs and cookies websites are hosting to track us, and optionally allows them to be blocked.
32 MB 8.0 MB 86 KB 56 KB 107 KB

Episode #304 | 09 Jun 2011 | 86 min.
Listener Feedback #119

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
41 MB 10 MB 119 KB 75 KB 140 KB

Episode #303 | 02 Jun 2011 | 91 min.
Password Haystacks

Steve shares something of a revelation about the true nature of passwords and why “password entropy” really doesn't matter as much as has long been believed. He explains, therefore, how it's possible for passwords to be both memorable AND impossible to crack at the same time.
44 MB 11 MB 125 KB 76 KB 139 KB

Episode #302 | 26 May 2011 | 94 min.
Listener Feedback #118

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
45 MB 11 MB 129 KB 82 KB 148 KB

Episode #301 | 19 May 2011 | 91 min.
Going Random, Part 2 of 2

After catching up with the week's security and privacy news, we conclude our two-part series discussing the need for, and applications of, random and pseudo-random numbers. We discuss the ways in which a computer, which cannot produce random numbers, can be programmed to do an extremely good job.
44 MB 11 MB 105 KB 70 KB 130 KB

Episode #300 | 12 May 2011 | 113 min.
Listener Feedback #117

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
54 MB 14 MB 177 KB 94 KB 173 KB

Episode #299 | 05 May 2011 | 91 min.
Going Random, Part 1 of 2

This week's security news and events took up so much time that we didn't have time to cover the entire topic of “Randomness” in security and cryptography. So we split the topic into two parts. This first week we open the topic and explain the background, problem and need. Week after next we'll plow into the solutions.
44 MB 11 MB 122 KB 76 KB 139 KB

Episode #298 | 28 Apr 2011 | 102 min.
Listener Feedback #116

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
49 MB 12 MB 157 KB 89 KB 164 KB

Episode #297 | 21 Apr 2011 | 90 min.
Pass-Sentences??

After catching up with a number of extra-interesting security news of the week, Steve and Leo explore the recently raised suggestion that using a three word "pass-sentence" such as “I like tomatoes” would be MORE secure (and far more memorable) than "J4f6<2". Short sentences are certainly easier to remember... but more secure?
43 MB 11 MB 117 KB 71 KB 134 KB

Episode #296 | 14 Apr 2011 | 108 min.
Listener Feedback #115

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
49 MB 12 MB 177 KB 97 KB 180 KB

Episode #295 | 07 Apr 2011 | 77 min.
The Comodo SSL Breach

After catching up with the past week's very busy security news, Leo and I closely examine the circumstances and repercussions surrounding the mid-March breach of the Comodo SSL certificate authority certificate signing system.
37 MB 9.2 MB 98 KB 58 KB 113 KB

Episode #294 | 31 Mar 2011 | 102 min.
Listener Feedback #114

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
49 MB 12 MB 155 KB 90 KB 166 KB

Episode #293 | 24 Mar 2011 | 93 min.
IE9

After catching up with a great deal of security news and interesting computer industry miscellania, Steve shares everything he has recently learned from his extensive study into the new security and privacy features of IE9.
45 MB 11 MB 140 KB 78 KB 146 KB

Episode #292 | 17 Mar 2011 | 83 min.
Listener Feedback #113

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
40 MB 10 MB 159 KB 78 KB 151 KB

Episode #291 | 10 Mar 2011 | 90 min.
Stuxnet

After catching up with a very busy week of software updates and wide-ranging security news, Steve & Leo discuss the revelations documented in Symantec's comprehensive “Stuxnet Dossier.”
43 MB 11 MB 109 KB 69 KB 130 KB

Episode #290 | 03 Mar 2011 | 94 min.
Listener Feedback #112

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
45 MB 11 MB 125 KB 80 KB 147 KB

Episode #289 | 24 Feb 2011 | 101 min.
Proxied Surfing

After catching up with the week's security updates and other security-related news, Leo and I discuss the many modes of operation of “Proxied Web Surfing” which are used to bypass firewalls and Internet filters, aid free speech, and alter the contents of web pages retrieved from the Internet.
48 MB 12 MB 120 KB 80 KB 144 KB

Episode #288 | 17 Feb 2011 | 92 min.
Listener Feedback #111

Tom Merritt and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
44 MB 11 MB 88 KB 73 KB 128 KB

Episode #287 | 10 Feb 2011 | 61 min.
BitCoin CryptoCurrency

This week, after catching up with a busy “Patch Tuesday,” Tom Merritt and I explore the fascinating crypto technology developed to create “BitCoin,” the Internet's decentralized peer-to-peer completely private online currency exchange system.
40 MB 9.9 MB 78 KB 63 KB 115 KB

Episode #286 | 03 Feb 2011 | 92 min.
Listener Feedback #110

Tom Merritt and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
44 MB 11 MB 91 KB 75 KB 132 KB

Episode #285 | 27 Jan 2011 | 67 min.
Fuzzy Browsers

After catching up with the week's security updates and news, Leo and I examine the use of “code fuzzing” to locate functional defects in the web browsers we use every day. Surprisingly, every browser in use today can be crashed with this technique.
32 MB 8.1 MB 74 KB 52 KB 100 KB

Episode #284 | 20 Jan 2011 | 79 min.
Listener Feedback #109

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
38 MB 9.5 MB 111 KB 68 KB 131 KB

Episode #283 | 13 Jan 2011 | 61 min.
Bluetooth Hacking

After catching up with the week's security and privacy news, Leo and I complete our analysis of the Bluetooth security by examining the history and current status of Bluetooth hacking exploits. We conclude with a set of recommendations for minimizing the Bluetooth attack surface.
32 MB 7.9 MB 79 KB 52 KB 102 KB

Episode #282 | 06 Jan 2011 | 96 min.
Listener Feedback #108

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.
44 MB 11 MB 134 KB 82 KB 152 KB

• Current Podcast Page
• Security Now 2014
• Security Now 2013
• Security Now 2012
• Security Now 2011
• Security Now 2010
• Security Now 2009
• Security Now 2008
• Security Now 2007
• Security Now 2006
• Security Now 2005




You can receive an eMail reminder whenever this page is updated with a new Security Now! episode. Click the "Monitor Changes" button to have the highly-regarded "Change Detection" web site monitor this page and send you a note when it changes.

Monitor this page for changes: (it's private by ChangeDetection)
Security Now!, SpinRite Testimonials, and other Feedback:
Please use GRC's Visitor & Listener FEEDBACK Page where you may easily submit any feedback for Security Now, SpinRite testimonials, suggestions for future Security Now topics or questions & comments for future Listener Feedback episodes. Thank you!

Jump to top of page
Gibson Research Corporation is owned and operated by Steve Gibson.  The contents
of this page are Copyright (c) 2016 Gibson Research Corporation. SpinRite, ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of Gibson
Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy.
Jump to top of page

Last Edit: Jan 02, 2015 at 16:08 (934.90 days ago)Viewed 15 times per day