Intro/Outro: Etherwood - Begin By Letting Go
'FREAK' in Android and iOS http://thehackernews.com/2015/03/freak-openssl-vulnerability.html
'FREAK' in Windows http://thehackernews.com/2015/03/freak-openssl-vulnerability_5.html
Вопрос от слушателя по мотивам очередного pre-load in Android http://thehackernews.com/2015/03/Xiaomi-Mi-4-malware.html
Cyber BINGO
Truecrypt audit http://blog.cryptographyengineering.com/2015/02/another-update-on-truecrypt-audit.html
Dropbox Accesses All The Files in Your PC (Not Just Sync Folder) and Steals Everything http://www.e-siber.com/guvenlik/dropbox-accesses-all-the-files-in-your-pc-not-just-sync-folder-and-steals-everything/?utm_content=bufferec71c&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer
Dropbox Is Probably Not Stealing All Your Files https://one.darrenpmeyer.com/blog/dropbox-is-problably-not-stealing-all-your-files.html
Seagate NAS Remote Code Execution Vulnerability https://beyondbinary.io/advisory/seagate-nas-rce/
How the NSA’s Firmware Hacking Works http://www.wired.com/2015/02/nsa-firmware-hacking/
Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys http://www.wired.com/2015/02/gemalto-confirms-hacked-insists-nsa-didnt-get-crypto-keys/
How Hackers Abused Tor To Rob Blockchain, Steal Bitcoin, Target Private Email And Get Away With It http://www.forbes.com/sites/thomasbrewster/2015/02/24/blockchain-and-darknet-hacks-lead-to-epic-bitcoin-losses/
Github Hacking for fun and... sensitive data search! http://blog.conviso.com.br/2013/06/github-hacking-for-fun-and-sensitive.html
Hillary Rodham Clinton and her emails http://www.washingtonpost.com/politics/state-department-reviewing-whether-clinton-e-mail-violated-security-rules/2015/03/05/16d1547e-c378-11e4-9271-610273846239_story.html
Spies Just by Watching Your Phone’s Power Use http://www.wired.com/2015/02/powerspy-phone-tracking/
Lenovo.com has been hacked http://www.theverge.com/2015/2/25/8110201/lenovo-com-has-been-hacked-apparently-by-lizard-squad
Google is More Protected from Unwanted Software http://googleonlinesecurity.blogspot.com/2015/02/more-protection-from-unwanted-software.html
Cloud based web app security scanner released by GOOGLE http://www.latesthackingnews.com/2015/02/21/cloud-based-web-app-security-scanner-released-by-google/#
Most vulnerable operating systems and applications in 2014 http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/
Blogger porn content policy https://support.google.com/blogger/answer/6177281?hl=en
Internet is for PORN!! https://www.youtube.com/watch?v=eWEjvCRPrCo&feature=youtu.be