In-brief: In this podcast, Dennis Fisher of onthewire.io and I talk about securing the Internet of Things.
Podcasts
Hosted by Paul Roberts, The Security Ledger podcast features interviews with leading minds in the area of cyber security, threats and attacks. The Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
Flying Dogs, Hackable Infrastructure and Other Tall Tales
In-brief: The headlines warning about cyber risks on the Internet of Things obscure the truth. That’s especially true of critical infrastructure, warns Cisco’s Marc Blackmer.
Podcast: Interview with Car Hacker Chris Valasek of IOActive
In-brief: Security Ledger Editor in Chief Paul Roberts speaks with Chris Valasek, the Director of Vehicle Research at IOActive about the work he and Charlie Miller did to develop wireless based attacks that control the braking, steering and acceleration of late model Chrysler vehicles.
Hacking Connected Vehicles with Chris Valasek of IOActive
Chris Valasek, the Director of Vehicle Research at IOActive speaks with Security Ledger Editor in Chief Paul Roberts about his recent research on vulnerabilities in late model vehicles by Chrysler. Valasek and his partner Charlie Miller recently demonstrated a way to take control of a Jeep Cherokee wirelessly using software based attacks.
Sony: A Game Changer for Cyber Attribution
We’ve been writing a lot about the issue of cyber attribution in recent weeks, following the attack on Sony Pictures Entertainment in November. That incident has become something of a Rorschach Test for those in the information security field: revealing as much about the individual attempting to explain the Sony hack as about the attack itself. Rid and a Ph.D student, Ben Buchanan, have authored a paper in the Journal of Strategic Studies. In their paper, Rid and Buchanan note that one of the biggest challenges of cyber attribution: bridging the technical and political or cultural issues that often surround cyber attribution. As Rid notes: the individuals doing the basic forensic work on the incident may not have a grasp of the larger cultural or political issues at play. That’s a dynamic we’ve seen at play (in spades) in recent news about the hack of Sony Pictures. In this podcast, Rid […]