article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Dave Bittner: [00:02:42] The Financial Times reports that the controversial lawful intercept shop NSO Group says it can access private messages held in major cloud services, including those provided by Apple, Amazon, Google and Facebook. Joe Carrigan: [00:16:38] Well, Google is going to fix this in the next release of their operating system.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Dave Bittner: [00:02:42] The Financial Times reports that the controversial lawful intercept shop NSO Group says it can access private messages held in major cloud services, including those provided by Apple, Amazon, Google and Facebook. Joe Carrigan: [00:16:38] Well, Google is going to fix this in the next release of their operating system.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

Dave Bittner: [00:02:42] The Financial Times reports that the controversial lawful intercept shop NSO Group says it can access private messages held in major cloud services, including those provided by Apple, Amazon, Google and Facebook. Joe Carrigan: [00:16:38] Well, Google is going to fix this in the next release of their operating system.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. Vamosi: Okay, shouldn’t all this be covered in the SDLC, the software development lifecycle, in the design phase, in threat modeling, you know, where developers and engineers first need to articulate all the inadvertent attacks such as these? Google Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. Vamosi: Okay, shouldn’t all this be covered in the SDLC, the software development lifecycle, in the design phase, in threat modeling, you know, where developers and engineers first need to articulate all the inadvertent attacks such as these? Google Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. Vamosi: Okay, shouldn’t all this be covered in the SDLC, the software development lifecycle, in the design phase, in threat modeling, you know, where developers and engineers first need to articulate all the inadvertent attacks such as these? Google Podcasts.