Cyber Frontiers
Episode 47

Highlights from DEFCON 26 - CF047

Jim Collison published on

This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two factor authentication on common technology platforms -- and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss potential “digital side doors” into banking data using common financial management applications, and introduce the word of the day to our listeners - stylometry. If you want a quick taste of DEFCON 26 with color commentary from your TAG team, this is the show for you.

Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will bring fresh and relevant topics to the show based on the current work he does.

Support the Average Guy:

WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at

You can contact us via email at

Full show notes and video at

Log in with one of the networks to the right to comment. Cancel