DiscoverSpeakeasy Security
Speakeasy Security
Claim Ownership

Speakeasy Security

Author: Tony Anscombe

Subscribed: 8Played: 46
Share

Description

Speakeasy Security is a new podcast from ESET. Published weekly, Cyber Speakeasy features news and commentary from ESET’s leading security professionals. Hosted by ESET Chief Security Evangelist Tony Anscombe, Speakeasy Security and a variety of expert guests will offer prescriptive advice to everyday internet users in a less technical and more accessible manner. For more information check-out https://www.eset.com/us/about/newsroom/podcast-list/
48 Episodes
Reverse
The episode kicks off with an overview of what deepfakes are and how the technology is being used positively in industries such as movie making, while others use it to trick the viewer into thinking their loved one may have been kidnapped or that their favorite celebrity is now endorsing certain products. The hosts also address the ethical concerns tied to deepfakes, touching on issues of misinformation, privacy invasion, and potential harm to individuals, especially children. The hosts touch...
Crypto security is getting plenty of attention amid recent hacks. This month’s podcast features cybersecurity expert Pasi Koistinen, who runs crypto security for Coinhako, the renowned crypto exchange to buy cryptocurrencies in Singapore and Asia. We geek out on the technology, security challenges, and the role of crypto in emerging markets. Pasi Koistinen - https://www.linkedin.com/in/pasikoistinen/
The Cybersecurity sector will continue to see plenty more spending. That’s the prediction from Wall Street’s top tech analyst Dan Ives of Wedbush Securities. He read the tea leaves for the industry – with thoughts on M&A; cybersecurity around cryptocurrency; and why private cybersecurity research firms like ESET are so important. https://www.wedbush.com/ https://www.linkedin.com/in/daniel-ives-542321a8/
The Consumer Electronics Show (CES) is one of the world's largest technology events, bringing together manufacturers, developers and suppliers of consumer technology. We catch-up with Cameron Camp, an ESET security researcher, who has been pounding the exhibition floor, to get his view on the new innovative technology on show, the possible benefits it may deliver to society, and to talk through a few of the potential cybersecurity risks the new tech may need to address. ...
With the holiday season upon us inboxes are filling up with the must have bargains as online retailers try to tempt us into securing a bargain, unfortunately cyber scammers also recognize this as an opportunity to make money. Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss how to stay cyber-safe, avoiding the pitfalls of phishing emails through to the best practices when landing in the online checkout. Links:https://www.eset.com/us/about/newsr...
The topic of NFT’s, that’s Non-fungible token’s, if frequently in the media, and is a subject the Speakeasy team have discussed before. We revisit the topic to discuss what drives a buyer to purchase, for example, the popular ‘side-eyeing Chloe’ image that recently sold for $75,000. And how a purchaser was duped out of £244,000 buying, what they thought was, the very first NFT Banksy artwork. If you're considering entering the NFT market then it's important to know what to be on lookout for a...
Microsoft's recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of the end for password based authentication. Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss what this means for users and whether the proposed new password-less world is more or less secure. Episode links:https://www.microsoft.com/security/blog/2021/09/...
Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and joins us to clarify what cybersecurity insurance is. Are ransom payments for ransomware attacks covered by cyber insurance? What factors contribute to how much a cyber insurance premium will cost? Don’t miss this episode as cover the ins and outs of cybersecurity insurance and forensic accountin...
Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world.Links:Apple to combat Child Sexual Abuse Material: https://www.cnbc.com/202...
APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience. From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and ...
Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help. Links What is spyware? https://www.bbc.com/news/av/technology-57894917 ...
The crypto crackdown

The crypto crackdown

2021-06-2528:45

With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks, crypto mining has come under increasing scrutiny amidst revelations of its massive energy consumption and negative impact on the environment and China is taking significant measures to curb crypto mining and have already shutdown a number mining regions within the country. Our hosts also examine t...
Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark Web. With a whopping $350 million in ransomware payments in 2019, this year is already poised to surpass that. What does hacking a video game maker and the largest fast-food burger chain have in common? What are the criminals after? What can businesses do now so they don’t end up in the head...
The attacks on government entities and critical infrastructure, including the recent Colonial Pipeline attack, are increasing in scope and sophistication. Cybercriminals are becoming more brazen in their approach to disrupting economies and continue to conduct supply chain attacks, causing massive amounts of damage. This week our hosts talk to Andy Garth, ESET’s Government Affairs lead, and Robert Lipovský, senior malware researcher at ESET, join the podcast to discuss the latest attacks on G...
Thinking about end-to-end encryption can give the average person a headache. Our hosts Tony and Ranson break down how it works and why this technology is critical to protecting your information. However, with this level of secrecy, criminals are leveraging end-to-end encryption to hide from law enforcement. What is being done to protect your privacy while not weakening encryption? Tune in to this episode to find out. Links: What is encryption and how does it work? - https://www.welivesec...
This week on Speakeasy Security, Tony and Ranson dive headfirst into the Bitcoin craze. Our hosts explain what Bitcoin is, how they are made, and why crypto currencies provide an unprecedented level of anonymity. With one Bitcoin transaction consuming more energy than the average home, our hosts also explore the massive carbon footprint left from Bitcoin mining. Whether you’re interested in learning the differences between Bitcoin and physical (fiat) currency or if you would simply like...
This week on Speakeasy Security, Tony and Ranson discuss how a cybercriminal can take advantage of the personal information contained in real estate listing photos. All too often, home sellers do not depersonalize their home before listing which can lead to a headache later on. From visible account details and personally identifiable information to pictures of family members and pet names, anyone selling a property should take inventory of not only what photos will be posted but what is conta...
Join us as we kick off season 4 of Speakeasy Security! This week, our hosts take on the hot topic of vaccination passports. As travel begins to pick up and restrictions begin to ease, Tony and Ranson explain what vaccination passports are, the privacy implications and how they are being managed. Without realizing it many people may already be declaring openly that they have had certain vaccinations to comply with state and federal requirements.Links:BBC News – Vaccination passports: https://w...
How likely is it for a cybercriminal to hack your vehicle? Why is the UN involved and what are car manufacturers doing to help protect connected vehicles? This week on Speakeasy Security, Tony and Ranson take a look at how connected cars can be attacked and what the industry is doing to help. If you’re a gear head, a connected car owner, or simply interested in learning more, you won’t want to miss this episode of Speakeasy security.Links:The Department of Transportation Cybersecurity – Cyber...
What is a non-fungible token, or NFT? Are these digital tokens the future of the art industry? This week our hosts dive into the world of NFTs and explain what the blockchain-based technology is all about. There’s a lot to unpack in this episode of Speakeasy Security so pour a cold beer and join us for this look into the interesting world of NFTs.LinksTime - https://time.com/5947720/nft-art/
loading
Comments 
Download from Google Play
Download from App Store