11 Podcast Episodes
03/08/17 Guest David Maynor
03/08/17 Guest David Maynor
Show Topic:: "When Toys Talk: Privacy & Security of IoT Toys"Security Researcher David Maynor joins Liz to discuss h... Read more
4 Apr 2017
•
59mins
11/23/16 Guests Thomas Geffroyd and David Maynor
11/23/16 Guests Thomas Geffroyd and David Maynor
Hackers in Video Games: In Watch_Dogs_2, Ubisoft's latest video game release, a hacker works to bring down San Francisco... Read more
28 Nov 2016
•
57mins
05/25/16 Guests Robert Graham and David Maynor
05/25/16 Guests Robert Graham and David Maynor
Elizabeth welcomes security researchers Robert Graham (CEO, Errata Security) and David Maynor (Talos Security Intelligen... Read more
27 May 2016
•
58mins
Robert Graham and David Maynor - HamSammich – long distance proxying over radio
Robert Graham and David Maynor - HamSammich – long distance proxying over radio
HamSammich – long distance proxying over radio Robert Graham Erratasec.com David Maynor Erratasec.com The ProxyHam talk ... Read more
30 Oct 2015
•
David Maynor: Architecture Flaws in Common Security Tools (English)
David Maynor: Architecture Flaws in Common Security Tools (English)
"Look at your new device! It has a great case, plenty of buttons, and those blue LEDs - wow! But when you strip away the... Read more
31 Oct 2006
•
1hr 9mins
David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?
David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?
NX. It's known by different names to different people. AMD calls it Enhanced Virus Protection, or EVP. Microsoft calls i... Read more
4 Jun 2006
•
36mins
Johnny cache and David Maynor: Device Drivers
Johnny cache and David Maynor: Device Drivers
Application level security is getting better. Basic stack based string overflows have become rare, and even simple heap ... Read more
4 Jun 2006
•
57mins
Johnny cache and David Maynor: Device Drivers
Johnny cache and David Maynor: Device Drivers
Application level security is getting better. Basic stack based string overflows have become rare, and even simple heap ... Read more
4 Jun 2006
•
57mins
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
Security is very hard these days: lots of new attack vectors, lots of new acronyms, compliance issues, and the old probl... Read more
9 Jan 2006
•
50mins
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
Security is very hard these days: lots of new attack vectors, lots of new acronyms, compliance issues, and the old probl... Read more
9 Jan 2006
•
50mins