#12: Federal Critical Infrastructure Oversight, BatCloak, Attacks on Hospitals, and Maryland's Moves to Get Serious on Cyber

ROP-E12: HTML5 Audio ^ In this episode, Austin and Nathan untangle the web of government oversight responsibilities for different critical infrastructure industries, discuss the stealth capabilities of BatCloak, explore villainous ransomware attacks against hospitals, and examine how the state of Maryland is turning small businesses into security superheroes all while making various allusions to Spiderman in honor of “Spider-Man: Across the Spider-Verse”.

June 20, 2023 · 62 words · Austin, Nathan

#8: A New WiFi Vulnerability, Stealing Cars with CAN Injection, the IRS Failing a Cyber Audit, and Malware Targeting Tax Filers

ROP-E8: HTML5 Audio ^ While you’re gathering your most sensitive data this tax season, tune in to learn how the IRS was found lacking in a recent cyber security audit. Additionally, we cover malware targeting tax filers, hackers stealing cars, and techniques that intercept network traffic with recently discovered vulnerabilities.

April 13, 2023 · 50 words · Austin, Nathan

#4: Wiperware, the Second Order Affects of Ransomware, the Cyber Poverty Line, Meta's Bug Bounty, and a Proposal from TikTok to Maintain Business in the U.S.

ROP-E4: HTML5 Audio ^ Austin and Nathan discuss the scourge of wiperware malware targeting Ukraine, the devastating ransomware attack against London’s Hackney Council, surviving below the cyber poverty line, and Meta’s recent bug bounty payout. Finally, Nathan continues his TikTok obsession with an article describing the company’s proposal to maintain business in the U.S. amidst fears for data protection. Also, we promised in this podcast to provide a link to a course that would be helpful for those new to security....

February 13, 2023 · 85 words · Austin, Nathan

#1: Signature-Based Detection, Weak Hashes, TikTok Malware, and More!

ROP-E1: HTML5 Audio ^ Austin and Nathan rant about the failings of signature based detection, explore the impact of weak hashing algorithms, discuss proposed requirements to add cybersecurity experts to corporate boards, the success of TikTok malware, and more!

January 23, 2023 · 39 words · Austin, Nathan