Saturday, January 19, 2019

7 Minute Security

7MS #345: Interview with Amber Boone

Coming up on Tuesday, January 22 I'll be doing a Webinar with Netwrix called 4 Ways Your Organization Can Be Hacked. It features a Billy Madison theme and pits evil Eric Gordon against sysadmin Billy Madison. Hope you'll join us - it'll be fun! Today I'm pleased to welcome Amber Boone to the program! She is an awareness builder for a cybersecurity vendor (insert dramatic music!), and Amber was gracious enough to help me pilot a new style of interview called 7 Minute Interviews with 7MS. I basically asked Amber a "serious" question about security, then a goofy...

7MS #344: Announcing the 7MS User Group

I'd like to coordially invite you to the first-ever 7MS User Group meeting, coming up Monday, January 14th at 6 p.m.! You can attend physically, virtually or both! All the info you need is below...see you there!

Brakeing Down Security

2019-001: OWASP IoT Top 10 discussion with Aaron Guzman

Aaron Guzman: @scriptingxss https://www.computerweekly.com/news/252443777/Global-IoT-security-standard-remains-elusive https://www.owasp.org/index.php/IoT_Attack_Surface_Areas https://scriptingxss.gitbooks.io/embedded-appsec-best-practices//executive_summary/9_usage_of_data_collection_and_storage_-_privacy.html OWASP SLACK: https://owasp.slack.com/ https://www.owasp.org/images/7/79/OWASP_2018_IoT_Top10_Final.jpg Team of 10 or so… list of “do’s and don’ts” Sub-projects? Embedded systems, car hacking Embedded applications best practices? *potential show* Standards: https://xkcd.com/927/ CCPA:  https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act California SB-327: https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201720180SB327 How...

2018-045: end of the year podcast!

Join the combined forces of: Jerry Bell (@maliciousLink) from Defensive Security Podcast! (https://defensivesecurity.org/) Bill Gardner from the "RebootIt! podcast" https://itunes.apple.com/us/podcast/reboot-it/id1256466198?mt=2   Ms. Berlin and Bryan Brake for the end of the year podcast! BrakeSec Podcast = www.brakeingsecurity.com RSS: https://www.brakeingsecurity.com/rss

Crypto-Gram

Crypto-Gram 15 December 2018

In this issue: Information Attacks against Democracies How Surveillance Inhibits Freedom of Expression Propaganda and the Weakening of Trust in Government from the December 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage

Crypto-Gram 15 November 2018

In this issue: Cell Phone Security and Heads of State New IoT Security Regulations Oracle and "Responsible Disclosure" from the November 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage

Cyber Security Interviews

#62 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy

Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors. Prior to Habitu8, Chad was co-founder and VP of Engineering at… The post #62 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy appeared first on Cyber Security Interviews.

#61 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised

Yonathan Klijnsma is a threat researcher at RiskIQ, leading threat response and analysis efforts with the help of RiskIQ’s expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work. Outside of… The post #61 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised appeared first on Cyber Security Interviews.

Darknet Diaries

Hackable? Presents: Keyless Entry

This week I'm playing for you an episode from another podcast I think you'd really like. It's called Hackable? and this episode is called Keyless Entry. They take the scene from Mr. Robot where they hacked into a car and test whether or not it's doable. It's very interesting and you should give it a try.Subscribe to Hackable? Learn more about your ad choices. Visit megaphone.fm/adchoices

Ep 29: Stuxnet

Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully able to destroy numerous centrifuges. Hear who did it and why.Learn more about your ad choices. Visit megaphone.fm/adchoices

Defensive Security

Defensive Security Podcast Episode 231

https://lifehacker.com/why-smart-people-make-stupid-mistakes-1831503216 https://www.chicagotribune.com/business/ct-biz-tribune-publishing-malware-20181230-story,amp.html https://www.securityweek.com/was-north-korea-wrongly-accused-ransomware-attacks https://www.healthcareitnews.com/news/staff-lapses-and-it-system-vulnerabilities-are-key-reasons-behind-singhealth-cyberattack https://www.nextgov.com/cybersecurity/2019/01/hhs-releases-voluntary-cybersecurity-practices-health-industry/153835/ https://www.zdnet.com/article/data-of-2-4-million-blur-password-manager-users-left-exposed-online/ https://arstechnica.com/information-technology/2018/12/iranian-phishers-bypass-2fa-protections-offered-by-yahoo-mail-and-gmail/

Defensive Security Podcast Episode 230

https://arstechnica.com/information-technology/2018/11/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin/ https://krebsonsecurity.com/2018/11/marriott-data-on-500-million-guests-stolen-in-4-year-breach/ https://krebsonsecurity.com/2018/12/what-the-marriott-breach-says-about-security/

Down The Security Rabbithole

DtSR Episode 330 – Biometrics for Authentication

This week, James and I sit down to discuss biometric authentication and some of the FUD around ways it can be broken. This ends pretty much the way you think it does.   Highlights from this week's show include... James & Raf talk about how hackers used a "wax hand" to fool a vein auth system Link: https://www.theverge.com/2018/12/31/18162541/vein-authentication-wax-hand-hack-starbug Fingerprint authentication to start your car?! We take this discussion to task Link: https://www.forbes.com/sites/jeanbaptiste/2018/12/27/hyundai-motor-lets-drivers-use-fingerprints-to-unlock-and-start-new-car/ James & Raf deconstruct the argument for and against biometric security We ask "Does it matter that biometric auth is hackable?"

DtSR Episode 329 – Volunteering Your Career

This week, on the DtSR Podcast recorded way too early on a Monday morning, we talk volunteering in InfoSec with Kathleen Smith. Kathleen is the CMO of ClearedJobs.net and CyberJobs.com - and she recently ran a volunteerism survey (link: https://cybersecjobs.com/cyber-security-community-volunteering-report) you should probably check out too. Highlights of this week's show include... Kathleen discusses some of the highlights of the survey We discuss some of the things volunteers learn, and why this is critical to our community Several jokes are made We discuss the value of volunteering and its impact on your career and much, much more   Guest Kathleen Smith...

Open Source Security

Episode 129 – The EU bug bounty program

Josh and Kurt talk about the EU bug bounty program. There have been a fair number of people complaining it's solving the wrong problem, but it's the only way the EU has to spend money on open source today. If that doesn't change this program will fail.

Episode 128 – Australia’s encryption backdoor bill

Josh and Kurt talk about Australia's recently passed encryption bill. What is the law that was passed, what does it mean, and what are the possible outcomes? The show notes contain a flow chart of possible outcomes.

2018 Christmas Special – Is Santa GDPR compliant?

Josh and Kurt talk about which articles of the GDPR apply to Santa, and if he's following the rules the way he should be (spoiler, he's probably not). Should Santa be on his own naughty list? We also create a new holiday character - George the DPO Elf!

OWASP 24/7

A Concise Introduction to DevSecOps

The inclusion of security as an integral piece of the DevOps puzzle continues to gain traction. In this episode of the DevSecOps Days Podcast Series, I speak with Curtis Yanko and Scott McCarty about their new book, "A Concise Introduction to DevSecOps". We discuss why they wrote the book, who the audience is that will benefit from it and why enterprises should be considering security as part of the software development environment.

What’s In Store for the AppSec Cali Conference w/ Richard Greenberg

As if there aren't enough reasons to go to Southern California in the middle of a New York winter, AppSec Cali opens it's doors for its 6th Annual OWASP conference on January 22, 2019. In this broadcast, I speak with Richard Greenberg, one of the core organizers of the conference, talking about why people come, what they can expect to see and why he continues to help produce the conference year after year. For a transcript of this broadcast, go to DevSecOpsDays.com and click on "Podcasts".

Purple Squad Security

Episode 47 – Happy New Year! Show Updates and Other News

Welcome to 2019!  John goes solo in this episode and talks about his personal goals for 2019, plus some updates for the show that should make things a bit more structured and hopefully more interesting for the listeners. Some links of interest: EliteSec Website: https://elitesec.io/ Want to reach out to the show?  There’s a few ways to get in touch! Purple Squad Security’s Twitter: @PurpleSquadSec John’s Twitter: @JohnsNotHere John’s Mastodon: https://infosec.exchange/@JohnsNotHere Podcast Website: purplesquadsec.com Patreon – https://www.patreon.com/purplesquadsec Sign-Up for our Slack community: https://signup.purplesquadsec.com Thanks for listening, and...

Episode 46 – Holiday Special – Storytime with Jayson E. Street

Continuing our storytime theme for the holidays, on this week’s show we have a special guest, Jayson E. Street!  For those who follow Jayson online, his hacker adventures bring him to all sorts of interesting places.  Jayson shares a story of one of those places, in which he robs the wrong bank.  Some of you may know this story, but he also provides us with an epilogue to this story that few have heard! ...

Risky Business

Risky Business #526 — Huawei arrest in Poland, DPRK SWIFT hack conviction, more from the El Chapo trial

This week’s podcast features Patrick and Adam talking about the week’s security news, including: Huawei staffer arrested for spying in Poland Conviction in DPRK SWIFT hack against Bangladesh central bank El Chapo used Flexispy to spy on mistresses and staff NSO group on charm offensive Iran hijacking DNS entries, conducting PITM with DV certs Kaspersky tipped NSA on Hal Martin US government certificates expire amid shutdown Idiot sentenced to 10 years prison for DDoSing children’s hospital This week’s show is brought to you by Trail of Bits! Trail of Bits is a security engineering...

Risky Business #525 — Back on deck for 2019!

In this week’s show Adam Boileau and Patrick Gray discuss the security news of the last few weeks, including: German politicians pwnt, suspect arrested Possible ransomware attack affects US newspapers Mass 2FA bypasses impacting Gmail users in Middle East Emergency warning system in Australia popped Ethereum Classic double-spend attack a sign of things to come EU to fund open source bug bounties Attackers steal details of 1,000 North Korean defectors Doing the Bloomberg hack for real at 35C3 El Chapo should have used Signal Much, much more… This week’s show is brought...

SANS ISC

ISC StormCast for Friday, January 18th 2019

Android Malware Uses Motion Detection to Evade Analysis https://blog.trendmicro.com/trendlabs-security-intelligence/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics/Twitter for

ISC StormCast for Thursday, January 17th 2019

Emotet and Other Malspam Campaigns Resume After Holiday Break https://isc.sans.edu/forums/diary/Emotet+infections+and+followup+malware/24532/Magecart

ISC StormCast for Wednesday, January 16th 2019

MSFT Skype/Team Foundation Server Patches https://isc.sans.edu/forums/diary/Microsoft+Publishes+Patches+for+Skype+for+Business+and+Team+Foundation+Server/24540/SCP Client Vulnerabilities https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txtServer Hosting

Security Now

SN 697: Zerodium

The implications of the recent increase in bounty for the purchase of 0-day vulnerabilities. The intended and unintended consequences of last week's Windows Patch Tuesday.Speaking of unintended consequences, the US Government shutdown has had some, too!A significant privacy failure in WhatsApp. Another Ransomware decryptor (with a twist).Movement on the DNS-over-TLS front.An expectation of the cyberthreat landscape for 2019. A cloudy forecast for The Weather Channel App. A successful 51% attack against the Ethereum Classic cryptocurrency.Another court reversing compelled biometric authentication. An update on the lingering death of Flash... now in hospice care.Hosts: Steve Gibson and Leo Laporte Download or...

SN 696: Here Comes 2019!

The NSA announces the forthcoming release of an internal powerful reverse-engineering tool for examining and understanding other people's code.Emergency out-of-cycle patches from both Adobe and Microsoft.PewDiePie hacker strikes again.Prolific 0-day dropper SandboxEscaper ruffles some feathers.A new effort by the US government to educate industry about the risks of Cyber attacks.Welcome news on the ransomware front.VERY welcome news of a new Windows 10 feature.A note about a just-published side-channel attack on OS page caches.We invite you to read our show notes. Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. You can submit a question...

Security Weekly

Hellfire Dong Slinger – Paul’s Security Weekly #590

This week, we welcome Dr. Eric Cole, the Founder and CEO of Secure Anchor Consulting for an interview! In the Technical segment, our very own Joff Thyer will be demonstrating some syntax with PowerShell useful for transferring data into a network while pen testing! In the Security News, two code execution flaws patched in Drupal, 773 million records exposed in massive data breach, prices for Zero-Day Exploits are rising, new attacks target recent PHP Framework Vulnerability, Microsoft launches a new Azure DevOps Bug Bounty program, and more!   Full Show Notes: https://wiki.securityweekly.com/Episode590 Visit https://www.securityweekly.com/psw for all the latest episodes!...

Too Many Logins – Enterprise Security Weekly #122

This week, Paul is joined by Matt Alderman to discuss some mergers, acquisitions, and partnerships, such as TokenEx partnering with SureCloud, Check Point acquires ForceNock, Zix agrees to acquire AppRiver for $275 million, and more! In this second segment, they discuss some security product launches and announcements from Trustwave, NopSec, ConnectGuard, Pulse Secure, Synopsys, and more!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode122 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Shared Security

US Government Shutdown, Privacy at CES 2019, Mobile Location Data Controversy – WB51

Watch this episode on our YouTube Channel! This is your Shared Security Weekly Blaze for January 14th 2019 with your host, Tom Eston. In this week’s episode: The US government shutdown and cybersecurity, privacy takes center stage at CES 2019, and a mobile location data controversy. Silent Pocket is a proud sponsor of the Shared Security Podcast! Silent Pocket offers a patented Faraday cage product line of phone cases, wallets and bags that can block all wireless signals, which will make...

Cybersecurity Careers, Recruiting, and Volunteering with Kathleen Smith – #84

New year, new Cybersecurity job? If you’re looking for a new job or just starting out in Cybersecurity you’ll want to listen to this episode of our monthly show where we’re joined by special guest Kathleen Smith, CMO of ClearedJobs.net and CyberSecJobs.com. We discuss Kathleen’s recent survey on people who advance their career by volunteering in the Cybersecurity community, the Hire Ground career track at the BSides Las Vegas cybersecurity conference, how to work with recruiters and job boards,...

Smashing Security

111: When rivals hack, and “extreme” baby monitors

Why a business spat resulted in Liberia falling off the internet, how the US Government shutdown is impacting website security, and the perplexing world of extreme IoT devices. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Zoë Rose. Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts,...

110: What!? You can get paid to leave Facebook???

Twitter and the not-so-ethical hacking of celebrity accounts, study discovers how you can pay someone to quit Facebook for a year, and the millions of dollars you can make from uncovering software vulnerabilities. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for...

Sophos

Ep. 015 – USB anti-hacking, bypassing 2FA and government insecurity

Naked Security looks at whether the latest USB hardware proposals will be used for security or for anti-piracy, investigates an open-source toolkit for bypassing 2FA, and explains how the US government shutdown is affecting online security. With Anna Brading, Paul Ducklin, Mark Stockley and Matthew Boddy. https://nakedsecurity.sophos.com/usb-c-authentication-sounds-great https://nakedsecurity.sophos.com/2fa-codes-can-be-phished https://nakedsecurity.sophos.com/shutdown-hits-government-web Music by: https://purple-planet.com/

Ep. 014 – Rickrolls, Acrobat and zombie hands

The Naked Security Podcast investigates the ethics of remote rickrolling, whether Acrobat is the new Flash, and how to fool biometrics with a zombie hand. With Anna Brading. Paul Ducklin, Mark Stockley and Matthew Boddy. https://nakedsecurity.sophos.com/dont-fall-victim-to-the-chromecast https://nakedsecurity.sophos.com/update-now-adobe-acrobat https://nakedsecurity.sophos.com/vein-authentication-beaten

Ep. 013 – Breaches, Facebook and ransomware reinvented

The Naked Security Podcast rings out 2018 with a look at the big issues of the past year. With Anna Brading, Paul Ducklin and Matthew Boddy. https://nakedsecurity.sophos.com/huge-marriott-breach https://nakedsecurity.sophos.com/big-facebook-breach https://nakedsecurity.sophos.com/cambridge-analyticas-secret https://nakedsecurity.sophos.com/iranian-hackers-charged https://nakedsecurity.sophos.com/after-samsam-ryuk https://nakedsecurity.sophos.com/how-to-pick-a-proper-password https://nakedsecurity.sophos.com/two-factor-authentication-2fa Music by https://purple-planet.com/

Southern Fried Security

Episode 208 – All Good Things…

It's been 9 years and over 210 different content items since we started this thing in January of 2010.  As much as we hate it we feel it's time to end this project and start thinking about What Comes Next. Don't worry - the episodes and website aren't going anywhere anytime soon so you'll still be able to download all the content.  We're also discussing some new ideas to stay engaged with the cybersecurity community so you'll want to keep this feed live on your podcast listening device to catch updates on where we are on that. All of...

Episode 207 – On the Front Porch with Yvette and Brandon

It's another Front Porch episode! Yvette talks to her friend Brandon Clark as his first novel "Ransomware" is about to be released.  "Ransomware" is part of Brandon's "Killchain Chronicles" series that will be coming out over time. You can find the book here:  https://www.amazon.com/gp/product/1732651108/ We will be back soon with more great new content.

The CyberJungle

The CyberJungle Episode406: * Around The Corner: Life After Google, by George Gilder * DarkWeb: XYRO CISO Steve Tcherchian on EHR, Ransomware and Healthcare...

Jan 7, 2019: * Around The Corner: Life After Google, by George Gilder * DarkWeb: XYRO CISO Steve Tcherchian on EHR, Ransomware and Healthcare InfoSec * Hacking attacks on your router: Why the worst is yet to come * It’s time for Apple to stop playing it safe * Meet the new Diet iPhone: Could a fresh formula boost Apple's bottom line?. See Show Notes/Links for Episode 406 at http://www.thecyberjungle.com

The CyberJungle Episode405: * SANS Netword Security: EXCLUSIVE-Tim Medin, Founder of Red Siege * PFIC2018: EXCLUSIVE-Joe McManus, CISO Automox * 0day: Embedded vids in MSFTOffice...

Oct 31, 2018: * SANS Netword Security: EXCLUSIVE-Tim Medin, Founder of Red Siege * PFIC2018: EXCLUSIVE-Joe McManus, CISO Automox * 0day: Embedded vids in MSFTOffice docs can hide malware * Deloitte: CEO and Board Risk Management Survey * DarkWeb: Laptop-Carrying Fed Infects Gov Network. See Show Notes/Links for Episode 405 at http://www.thecyberjungle.com

The CyberWire

Luring IoT botnets to the honeypot — Research Saturday

Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices. Matt Bing is a security research analyst with Netscout, and he guides us through their findings. The original research can be found here:...

Collection #1 and the threat of credential stuffing. Cryptojacker disables some cloud security tools. Don’t chat with strange bots. Facbebook shutters more Russian coordinated...

In today’s podcast we hear that Collection #1 is big but not the end-of-the-world. Still, be on the lookout for credential stuffing attacks. Rocke cryptojacker can disable some cloud security services. Beware of Telegram bots. Facebook shuts down a few hundred inauthentic Russian pages, and Sputnik shows up as either a free-speech paladin or another troll farm—take your pick. Epic Games...

The Silver Bullet

Show 150: Filippo Valsorda discusses programming languages and the dynamic world of cryptography

Listen as Gary and Filippo discuss programming languages and the role they play in software security, getting started in cryptography, open source security, blockchain and cryptocurrency, and more.

Show 149: Brittany Postnikoff discusses the maker culture and the problems with robots

Listen as Gary and Brittany discuss the maker culture, including embedded security for new technologies such as 3D printers and hands-on electronics, the problems with robots, from movement to the ethics of human-robot interactions, and more.

The Social-Engineer

Ep. 107 – All Your Bias Are Belong to Us with Paolo Gaudiano

Biases – we all have them.  Are they useful? What do they tell us about ourselves or corp culture? And most importantly, how can a social engineer use them. Join us with Paolo Gaudiano in this excellent podcast. July 09, 2018 Contents Download Get Involved Download Ep. 107 – All Your Bias Are Belong to Us with Paolo Gaudiano Get Involved Got a great idea for an upcoming podcast? Send us a quick message on the contact form! Enjoy the Outtro Music? Thanks to Clutch for allowing us to use Son of Virginia as our new SEPodcast Theme Music And check out a schedule for all our training...

Ep. 106 – Going Between the Dog and the Wolf with Amy Herman

Do you want to be between the dog and the wolf?  Before you answer you may want to listen to this amazing podcast with Amy Herman. June 11, 2018 Contents Download Get Involved Download Ep. 106 – Going Between the Dog and the Wolf with Amy Herman Get Involved Got a great idea for an upcoming podcast? Send us a quick message on the contact form! Enjoy the Outtro Music? Thanks to Clutch for allowing us to use Son of Virginia as our new SEPodcast Theme Music And check out a schedule for all our training at Social-Engineer.Com Check out the Innocent Lives Foundation to help unmask online child...

Threatpost

Threatpost News Wrap Podcast For Jan. 18

Threatpost editors break down the top headlines from the week ended Jan. 18.

Podcast: Emotet Grows With Fast-Evolving Tactics

Threatpost discusses the future of the Emotet banking trojan with Cylance.

Podcast: Beware These Top Security Threats in 2019

In this week's podcast, we weigh in on the top threats to watch out for in 2019 - from fraud to IoT.

Troy Hunt Weekly

Weekly Update 122

Presently sponsored by: Live Workshop! Watch the Varonis DFIR team investigate a cyberattack using our data-centric security stackAnd then there was the biggest data breach to go into HIBP ever! I wrote that sentence from home just after publishing all the data, then I got on a plane...Holy cow that's a lot of emails! Hundreds upon hundreds of emails came in whilst on the way to Dubai, more than I'll ever be able to respond to. Plus, I'm actually trying to have some downtime with my son on this trip particularly over the next few days so a bunch...

Weekly Update 121

Presently sponsored by: Twilio: Need to add 2FA quickly to your application? Use the Authy API to easily add more than just SMS 2FA within a matter of days.Well, it's one more sunny weekly update then snow time again so I've gone particularly beachy today. I'm also particularly breachy, talking about a massive combo list I'm presently pondering for inclusion in HIBP. These lists are frequently used for account takeover attacks against the likes of Spotify which is the subject of this week's blog post. Plus, I'm talking a bit about a bunch of Ubiquiti bits I'll be installing...

Unsupervised Learning

An Overview of the OWASP IoT Top 10 for 2018

We just released the 2018 version of the OWASP Internet of Things Top 10, and in this episode I talk you through the list and give the philosophy, methodology, and next steps for the project.Support the show.

Unsupervised Learning: No. 159

German politicians hacked, NSA's new RE tool, Weather Channel tracking, sick TSA agents, Facebook dust tracking, Technology News, Human News, Ideas, Discovery, Recommendations, and the weekly Aphorism…Support the show.

Unsupervised Learning: No. 155

Google+ breach, Android flaws, China's long game against the US, Australia's encryption blunder, NYPD drones, and more…Support the show.