Robert Hansen on Privacy and Google
Digital Underground podcast with Dennis Fisher You are missing some Flash content that should appear here! Perhaps your browser cannot display it, or maybe it did not initialize correctly. Dennis...
View ArticleHow I Got Here: Robert “Rsnake” Hansen
Dennis Fisher talks with Robert Hansen, a renowned security researcher, about his early days climbing telephone poles to clip into phone lines, how he got his start in the security world, the evolution...
View ArticleMoving From Do Not Track to Can Not Track
NEW YORK–The movement in the security and privacy communities to push the Do Not Track standard as an answer to the problem of pervasive online tracking by ad companies and other entities has resulted...
View ArticleMembers of We Are the Cavalry on the Perception of Security Research
Dennis Fisher talks with several members of the We Are the Cavalry project, including Josh Corman, Robert Hansen, Space Rogue and John Dickson, about the movement’s origins, its goals to promote...
View ArticleGmail Image Proxy Changes Have Privacy, Security Implications
Google’s decision to automatically display images in Gmail messages has security experts on edge about the privacy and security implications of the move. Of particular concern is the ability of an...
View ArticleRobert Hansen on Aviator, Search Revenue and the $250,000 Security Guarantee
Dennis Fisher talks with Robert Hansen of WhiteHat Security about the company's decision to change default search providers to Disconnect and the $250,000 guarantee for users of the Sentinel Elite...
View ArticleGoogle Engineers Critical of Aviator Browser Security
Google security engineers have criticized the security and privacy of WhiteHat Security's Aviator browser, after finding a remote code execution vulnerability within hours of Aviator's release as open...
View ArticleAd Networks Ripe for Abuse Via Malvertising
Criminals have found a safe haven abusing legitimate processes, such as real-time bidding, implemented by online advertising networks to move exploits and malware, and build botnets and fraud campaigns.
View Article