Highlights from DEFCON 26–CF047 - a podcast by Jim Collison

from 2018-08-21T20:56:06

:: ::

This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss potential “digital side doors” into banking data using common financial management applications and introduce the word of the day

Further episodes of Cyber Frontiers

Further podcasts by Jim Collison

Website of Jim Collison