stitcherLogoCreated with Sketch.
Get Premium Download App
Listen
Discover
Premium
Shows
Likes

Listen Now

Discover Premium Shows Likes

The Weekly Security and Tech Review

6 Episodes

57 minutes | Apr 16, 2019
WSTR: Week of April 7, 2019
oJoin the hosts Jesse Lesperance and Stanley Chan this week as they discuss malware being spread via pirated Game of Thrones episodes, flaws in WPA3, Microsoft’s webmail compromise, FOSS development and Amazon employees listening to your echo recordings. Reference Material for this week’s topics Game of Thrones: a Top Malware Conduit for Cybercriminals Linux Mint – Monthly News – March 2019 Amazon employees are listening to your amazon echo recordings Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords Microsoft reveals hackers accessed some outlook.com email account for months
23 minutes | Apr 3, 2019
The WSTR Discussion Series: Where is the data from the Equifax breach?
Jesse Lesperance, Stanley Chan and Robert Smith discuss some theories on why data that was stolen in the 2017 Equifax breach has yet to show up on the dark web. With the breach taking place in late 2017, and with the data not turning up on the dark web, some security experts are suspecting that the responsible party may be a State-sponsored actor with the goal of using the data for spying.
50 minutes | Mar 30, 2019
WSTR: Week of March 24, 2019
This week hosts Jesse Lesperance, Stanley Chan and Kevin Champa are joined by guest host Robert “Robby” Smith. The topics discussed this week include: Fema Data leak exposes persion info of 2.3M disaster survivorsFrom alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw FTC Demans Broadband providers reveal data handling practicesIBM purged ‘gray hairs’ and ‘old heads’ as it launched ‘Millennial Corps’: lawsuitHUD accuses Facebook of violating housing advertisement laws
40 minutes | Mar 27, 2019
The WSTR Discussion Series: Youth and Mobile Devices
The hosts: Jesse Lesperance, Stanley Chan and Kevin Champa discuss the topic of providing youth with mobile devices. What are the motivations and potential ramifications for providing mobile devices to individuals at a young age?
43 minutes | Mar 23, 2019
WSTR – Week of 3/17/2019
This week, Jesse, Stan and Kevin discuss Facebook storing users passwords in plain text, Critical Flaws in Medtronic Defibrillators, Drone Tech creating a blended threat, Microsoft rebrands Windows Defender, Zero-Days in Counter Strike 1.6 clients and Wind Power Reference articles on the topics covered: Facebook Employees had access to hundreds of millions of plain text passwords Medtronic Defibrillators Have Critical Flaws, Warns DHS Drone Tech creates new type of blended threat Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender Zero-Days in Counter-Strike Client Used to Build Major Botnet People who live near wind turbines prefer them to solar and fossil plants
58 minutes | Mar 16, 2019
Inaugural Episode of The Weekly Security and Tech Review Podcast
NOTE: Jesse’s headset mic stopped working part way through the episode, causing him to have to use his system’s built in mic. Topics covered in this week’s episode: Spotify files Anti-trust claim against Apple in EU Marriott CEO shares post-mortem on last year’s hack Microsoft patches two bugs under active attack Citrix says its network was breached by international criminals Apple among high profile companies to have data exposed through box Firefox Send 2FA bypass on GSuite/Office 365 Imap attacke (Updated) 2 Billion Unencrypted Records Leaked In Marketing Data Breach –What To Do Next New chrome extension to filter out toxicity DTrace on Windows
COMPANY
About us Careers Stitcher Blog Help
AFFILIATES
Partner Portal Advertisers Podswag Stitcher Originals
Privacy Policy Terms of Service Do Not Sell My Personal Information
© Stitcher 2022