התחל במצב לא מקוון עם האפליקציה Player FM !
109 - Finding malware in encrypted traffic
Manage episode 357233134 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Remember when the Internet was unencrypted? Yes, there was a time when security was the exception rather than the default. That is to say the majority of the Internet traffic was served over HTTP rather than HTTPS.
Fastfoward to today and it is unconceivable to access any website without the lock sign on the browser url field. That is because privacy by way of using encryption became a thing to protect us from prying eyes ready to steal your private information. Unfortunately, the same tool -encryption that is, provide a cloak for the the crooks to hide their malware and other navarious artifacts inside the encrypted traffic. How do you find these malware in an encrypted traffic without decrypting it? That is the topic of the today's episode.
In addition, we will recap other trending security news includes
- Lastpass's latest Update
- Google's gmail client side encryption is now publicly available
- https://support.lastpass.com/help: Incident 2 additional details of the attack
- https://workspace.google.com/blog: Gmail and calendar client side encryption
- https://www.cisco.com: Encrypted Traffic Analytics
- https://www.ciscolive.com: Operationalizing Encrypted Traffic Analytics
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
Manage episode 357233134 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Remember when the Internet was unencrypted? Yes, there was a time when security was the exception rather than the default. That is to say the majority of the Internet traffic was served over HTTP rather than HTTPS.
Fastfoward to today and it is unconceivable to access any website without the lock sign on the browser url field. That is because privacy by way of using encryption became a thing to protect us from prying eyes ready to steal your private information. Unfortunately, the same tool -encryption that is, provide a cloak for the the crooks to hide their malware and other navarious artifacts inside the encrypted traffic. How do you find these malware in an encrypted traffic without decrypting it? That is the topic of the today's episode.
In addition, we will recap other trending security news includes
- Lastpass's latest Update
- Google's gmail client side encryption is now publicly available
- https://support.lastpass.com/help: Incident 2 additional details of the attack
- https://workspace.google.com/blog: Gmail and calendar client side encryption
- https://www.cisco.com: Encrypted Traffic Analytics
- https://www.ciscolive.com: Operationalizing Encrypted Traffic Analytics
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
כל הפרקים
×ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.