Podcast series covering various topics in security and technology
Episodes
Monday Jul 28, 2014
Perspectives on Infosec: Dildog
Monday Jul 28, 2014
Monday Jul 28, 2014
Dildog talks to the Loopcast about infosec, application security, and politics.
Friday Jun 06, 2014
Robotics on the Battlefield
Friday Jun 06, 2014
Friday Jun 06, 2014
Paul Scharre discusses his new paper "Robotics on the Battlefield Part 1: Range, Persistance, Daring"
Wednesday May 07, 2014
Digital Theaters: Decentralizing Cyber Command and Control
Wednesday May 07, 2014
Wednesday May 07, 2014
Ben Fitzgerald (@benatworkdc), director of technology and national security at CNAS, discusses his new paper "Digital Theaters: Decentralizing Cyber Command and Control", information security, and cyber warfare.
Wednesday Apr 16, 2014
Darknets, TOR, and Online Anonymity
Wednesday Apr 16, 2014
Wednesday Apr 16, 2014
Dr. Krypt3ia (@krypt3ia) discusses darknets, TOR, and the issue of being anonymous online.
Don't forget to support the show by purchasing something from our Amazon store!
Friday Jan 03, 2014
"Cybersecurity and Cyberwar: What Everyone Needs to Know"
Friday Jan 03, 2014
Friday Jan 03, 2014
The Loopcast interviews Dr. Peter W Singer on his new book "Cybersecurity and Cyberwar: What Everyone Needs to Know"
Friday Nov 01, 2013
Review of "Cyber War Will Not Take Place"
Friday Nov 01, 2013
Friday Nov 01, 2013
@rejectionking reviews Thomas Rid's (@RidT) "Cyber War Will Not Take Place"
Wednesday Oct 23, 2013
Episode 93 - Cyber security at the national level
Wednesday Oct 23, 2013
Wednesday Oct 23, 2013
Jack Whitsitt (@sintixerr) discusses cyber security at the national policy and institutional level with the Loopcast.
Please check out Jack's blog which features a lot more content that expands upon what we discussed in the show.
Make sure to check out the Loopcast's tumblr.
Thursday Aug 29, 2013
Episode 77- Malware and hacking techniques used in Syria
Thursday Aug 29, 2013
Thursday Aug 29, 2013
Eva (@evacide) discusses the malware and hacking techniques used in Syria. We began our conversation with a look at what groups are doing the phishing and the ones that are distributing/using malware, then we discussed the types of malware being used and the programs and people being targeted, and we end our conversation with how can activists and opposition members can protect themselves from these types of attacks and what the infosec and hacker communities can do in terms of collection and analysis of Syrian malware.
If you are interested in helping EFF's project of collecting and analyzing the malware being used in Syria please contact Eva at EFF either through email or twitter. Your technical skills and insights would be a great help to an incredible project. Thank you!
If you're interested in the research already done, feel free to poke through the links listed below.
The Internet is Back in Syria and So is Malware Targeting Syrian Activists
Pro-Syrian Government Hackers Target Activists With Fake Anti-Hacking Tool
Fake Skype Encryption Tool Targeted at Syrian Activists Promises Security, Delivers Spyware
Campaign Targeting Syrian Activists Escalates with New Surveillance Malware
Fake YouTube Site Targets Syrian Activists With Malware
Syrian Activists Targeted with Facebook Phishing Attack
How to Find and Protect Yourself Against the Pro-Syrian Government Malware on Your Computer
Long Read: A Call to Harm: New Malware Attacks Target the Syrian Opposition
Binary samples: Syrian Malware Samples
Friday Aug 16, 2013
Episode 73- Strategy and Information Security
Friday Aug 16, 2013
Friday Aug 16, 2013
Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking). Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back.
Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.
Wednesday Aug 14, 2013
Wednesday Aug 14, 2013
Jason Healey (@jason_healey) and I (@rejectionking) discuss Jason's book "A Fierce Domain: Conflict in Cyberspace, 1986-2012". We open up the discussion with a look at the organization and reasoning behind Jason's book, a look at how we understand state's cyber capabilities, how the United States' creates cyber policy and whether that policy is too militarized, NSA surveillance and the private sector, and we end the show with what would be the ideal cyber policy.