This week in Security September 29 2015

13:13
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on November 11, 2021 09:09 (2M ago). Last successful fetch was on April 16, 2019 07:09 (3y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 168730226 series 1252577
By Advanced Persistent Security and Joe Gray, Advanced Persistent Security, and Joe Gray. Discovered by Player FM and our community — copyright is owned by the publisher, not Player FM, and audio is streamed directly from their servers. Hit the Subscribe button to track updates in Player FM, or paste the feed URL into other podcast apps.

This Week in Security

This week in Security: September 29, 2015

We discuss the recent attack on Apple’s App Store that revealed a fraudulent version of XCode (XCode Ghost) that inserted malware into over 300 apps. We also discuss the cyber landscape for Federal IT Security and the strained Cyber relations between the U.S. and China. We recap the blogs and I add a little information and perspective.

This is a work in progress. The only way to improve at podcasting is to do it more. I will be applying my knowledge of security, coupled with my teaching experience to create valuable IT and Cyber Security podcasts as time progresses.

If you have any questions or concerns about the podcast or something you want featured on the podcast, please email us at podcast@advancedpersistentsecurity.net

Thanks for stopping by and listening to our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens to this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

Be sure to subscribe to this podcast and to our Blog.

Enter your email address:
Delivered by FeedBurner

Subscribe to our mailing list

* indicates required
Email Address *
First Name
Last Name

// <![CDATA[ (function($) {window.fnames = new Array(); window.ftypes = new Array();fnames[0]='EMAIL';ftypes[0]='email';fnames[1]='FNAME';ftypes[1]='text';fnames[2]='LNAME';ftypes[2]='text';}(jQuery));var $mcj = jQuery.noConflict(true); // ]]>
// <![CDATA[ (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-67054607-1', 'auto'); ga('send', 'pageview'); // ]]>

52 episodes