• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

GCHQ Encryption Backdoor? – Daily Security Byte EP. 207

January 25, 2016 By Corey Nachreiner

First the NSA, and now GCHQ. A university researcher has claimed to find a weakness in a GCHQ-developed encryption algorithm that could allow governments to snoop on VoIP calls. Watch Friday's video to learn more about it. (Episode Runtime: 3:25) Direct YouTube Link: https://www.youtube.com/watch?v=cK1vIEBVcgs EPISODE REFERENCES: Researcher alleges to have found backdoor … [Read more...]

XKeyScore Sniffs Our Data – Daily Security Byte EP.108

July 2, 2015 By Corey Nachreiner

Earlier Snowden leaks have already introduced us to XKeyScore. However, new documents highlighted in the latest Intercept article make it sound even worse than privacy advocates first suspected. Watch the video to learn more. As an aside: You may have noticed there was no episode on Wednesday. I was updating my production software, which prevented me from creating a video that … [Read more...]

Grounded Airline, Snowden Leak, and Mr. Robot – WSWiR Episode 158

June 29, 2015 By Corey Nachreiner

If you're feeling behind on critical information security news, you're not alone. There are so many new InfoSec stories each week that only a dedicated few can keep up with the latest. If you need a little help following what's important, let our weekly security news summary video keep you informed. Last Friday's episode covered an 0day Flash flaw, the latest Snowden leak, my … [Read more...]

Nation States Spy on AV Vendors – Daily Security Byte EP.103

June 24, 2015 By Corey Nachreiner

You would hope our governments only spy on or hack the bad guys, but apparently they target security companies too. The latest Snowden leaks cover how the NSA and GCHQ target foreign antivirus companies, and reverse engineer their products to presumably find weaknesses. Watch today's video to learn why I think this is bad for the security of all countries. (Episode Runtime: … [Read more...]

Anthem & Sim Heist Updates – Daily Security Byte EP.31

February 25, 2015 By Corey Nachreiner

Two of the latest and biggest information security stories have gotten more interesting. Watch the video to get updates on the Anthem breach and the NSA/GCHQ SIM heist. (Episode Runtime: 2:33) Direct YouTube Link: https://www.youtube.com/watch?v=v6opHgY6XSs EPISODE REFERENCES: Anthem breach affects 8-18M other non-customers - Reuters OTA key from the SIM heist allows NSA … [Read more...]

Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use