Highlights from DEFCON 26 - CF047
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two factor authentication on common technology platforms -- and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss potential “digital side doors” into banking data using common financial management applications, and introduce the word of the day to our listeners - stylometry. If you want a quick taste of DEFCON 26 with color commentary from your TAG team, this is the show for you.
Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and relevant topics to the show based on the current work he does.
Support the Average Guy: https://www.patreon.com/theaverageguy
You can contact us via email at email@example.com
Full show notes and video at http://theAverageGuy.tv/cf047