Vulnerabilities That Shouldn't Have Happened
0 seconds of 0 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
Keyboard Shortcuts
Shortcuts Open/Close/ or ?
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Decrease Caption Size-
Increase Caption Size+ or =
Seek %0-9

Aug 23rd 2019
This Week in Enterprise Tech 356
Vulnerabilities That Shouldn't Have Happened
New vulnerabilities found in TCP/IP and Bluetooth.
Although the show is no longer in production, you can enjoy episodes from our archives.
The TWiET gang talks about a whole slew of emerging vulnerabilities, including ones found in the TCP/IP stack and Bluetooth protocol, and rant about how you should be securing your data and databases.
Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech.
Links
- VMware acquires Carbon Black for $2.1B and Pivotal for $2.7 billion
- 80 individuals charged in massive business email compromise bust
- The year-long rash of supply chain attacks against open source is getting worse
- Hundreds, if not more, trackers are following you!
- IBM Announces Quantum Safe Encryption
- How malformed packets caused CenturyLink’s 37-hour, nationwide outage
- The Privacy Sandbox
- New Attack exploiting serious Bluetooth weakness can intercept sensitive data
- VxWorks TCP/IP Stack Vulnerability Poses Major Manufacturing Risk
- Found: World-readable database used to secure buildings around the globe