feed2list
feed2list wird zum 01.01.2019 seinen Dienst einstellen
Suchen und blättern in Linux · Opensource
   Suchtreffer: 92
website Hak5
Shannon delves into adding variables into a shell script for use in programming. #HakTip #Hak5 This HakTip is sponsored by OpsGenie. Your next incident doesn't stand a chance. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
USPS helps identity thieves steal your mail, a DJI vulnerability is listed as high risk, and Will Election Security Ever Improve?! All that coming up now on ThreatWire. #threatwire #hak5 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Links: USPS Informed Delivery https://mashable.com/article/usps-informed-delivery-fraud/#nC9QnarFVgqL https://krebsonsecurity.com/2018/11/u-s-secret-service-warns-id-thieves-are-abusing-uspss-mail-scanning-service/ https://krebsonsecurity.com/2017/10/usps-informed-delivery-is-stalkers-dream/ DJI Flaw: https://www.cnet.com/news/dji-fixes-vulnerability-that-let-potential-hackers-spy-on-drones/ https://www.wired.com/story/dji-drones-bugs-exposed-users-data/ https://threatpost.com/dji-patches-forum-bug-that-allowed-drone-account-takeovers/138922/ https://thehackernews.com/2018/11/dji-drone-hack_8.html https://blog.checkpoint.com/2018/11/08/the-spy-drone-in-your-cloud/ Voting Security: https://motherboard.vice.com/en_us/article/kzvejx/voting-machine-manual-instructed-election-officials-to-use-weak-passwords https://www.bostonglobe.com/metro/2018/11/04/hackers-targeting-election-networks-across-country-lead-midterms/d0EzG4Cmh2jeMqllhXo4WP/story.html https://www.dhs.gov/news/2018/11/05/joint-statement-election-day-preparations https://www.dni.gov/index.php/newsroom/press-releases/item/1915-joint-statement-from-the-odni-doj-fbi-and-dhs-combating-foreign-influence-in-u-s-elections https://arstechnica.com/tech-policy/2018/11/are-elections-fixed-no-but-neither-is-election-security/ Photo credit: https://upload.wikimedia.org/wikipedia/commons/2/2f/DJI_Mavic_Pro.jpg
Shannon delves into writing a program, using the basics covered previously on writing scripts using the shell. This HakTip is sponsored by OpsGenie. Your next incident doesn't stand a chance. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
A Privilege Escalation Flaw Hits Linux, you can now bypass DRM, legally, and Triton Malware is Tied To the Russian Government! All that coming up now on ThreatWire. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Linux Privilege Escalation Flaw; https://thehackernews.com/2018/10/privilege-escalation-linux.html https://www.zdnet.com/article/new-security-flaw-impacts-most-linux-and-bsd-distros/ https://lists.x.org/archives/xorg-announce/2018-October/002927.html https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html https://twitter.com/hackerfantastic/status/1055568290112831490/photo/1 DRM: https://www.federalregister.gov/documents/2018/10/26/2018-23241/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control https://www.zdnet.com/article/need-to-fix-an-iphone-or-android-device-you-can-now-break-drm-under-new-us-rules/ https://motherboard.vice.com/en_us/article/xw9bwd/1201-exemptions-right-to-repair https://boingboing.net/2018/10/25/use-exemptions.html Russia Tied to Infrastructure Attack: https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html https://www.cyberscoop.com/trisis-ics-malware-saudi-arabia/ https://arstechnica.com/information-technology/2018/10/russia-was-likely-behind-dangerous-critical-infrastructure-attack-report-says/ https://thehackernews.com/2018/10/russia-triton-ics-malware.html https://www.wired.com/story/triton-malware-russia-industrial-controls/ https://motherboard.vice.com/en_us/article/9k74az/triton-malware-russian-government-saudi-arabia-petrol-plant Photo credit: https://cdn2.macworld.co.uk/cmsdata/features/3427174/iPhone_5S_JAILBREAK.jpg
text Hak5 2425
2018-10-27T00:08:43+00:00
Elliot Buller of TinyLabs joins us to talk RFID duplication with the Keysy. Learn more about the cloner at https://shop.hak5.org/products/keysy
Private Data from an Adult Site is Exposed, TLS 1.0 & 1.1 will be Deprecated In 2020, and an IoT Operating System is found Vulnerable to Hacks! All that coming up now on ThreatWire. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Colleen Cavolo Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Links: Adult Site Data Exposed: https://twitter.com/haveibeenpwned/status/1053745264090116102 https://twitter.com/troyhunt/status/1053751051352969219 https://arstechnica.com/information-technology/2018/10/hack-on-8-adult-websites-exposes-oodles-of-intimate-user-data/ https://twitter.com/hashcat/status/1053016015871852546 https://haveibeenpwned.com/PwnedWebsites#WifeLovers TLS 1.0 and 1.1 Deprecated: https://arstechnica.com/gadgets/2018/10/browser-vendors-unite-to-end-support-for-20-year-old-tls-1-0/ https://webkit.org/blog/8462/deprecation-of-legacy-tls-1-0-and-1-1-versions/ https://security.googleblog.com/2018/10/modernizing-transport-security.html https://blogs.windows.com/msedgedev/2018/10/15/modernizing-tls-edge-ie11/#sqWRkguy62CtVDut.97 https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 https://blog.mozilla.org/security/2018/10/15/removing-old-versions-of-tls/ IoT OS Vulnerable: https://thehackernews.com/2018/10/amazon-freertos-iot-os.html https://aws.amazon.com/freertos/ https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/ https://github.com/aws/amazon-freertos/blob/master/CHANGELOG.md Photo credit: https://upload.wikimedia.org/wikipedia/commons/e/eb/Placing_a_wedding_ring.jpg
Fact or Fiction? It’s Bloomberg Vs Big Tech! The Facebook Vulnerability Affects 30 Million (Not 50 million!), and Google+ Says Goodbye! All that coming up now on ThreatWire. Daily Tech News Show: http://www.dailytechnewsshow.com/ Support my friends at DTNS! https://www.patreon.com/dtns -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Links: Facebook update: https://newsroom.fb.com/news/2018/10/update-on-security-issue/ https://arstechnica.com/information-technology/2018/10/facebook-hackers-stole-locations-and-other-private-data-for-millions-of-users/ https://www.cnet.com/news/facebook-e-mails-phone-numbers-and-other-personal-information-accessed-during-breach/ https://www.cnet.com/news/in-facebooks-massive-breach-the-hackers-friends-were-the-first-victims/ https://www.securityweek.com/facebook-says-hackers-accessed-data-29-million-users https://www.zdnet.com/article/facebook-downgrades-breach-count-from-50-million-to-30-million-users/ Bloomberg Microchips: https://www.bloomberg.com/businessweek https://arstechnica.com/gadgets/2018/10/bloomberg-super-micro-motherboards-used-by-apple-amazon-contained-chinese-spy-chips/ https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond https://motherboard.vice.com/en_us/article/qv9npv/bloomberg-china-supermicro-apple-hack https://techcrunch.com/2018/10/04/bloomberg-spy-chip-murky-world-national-security-reporting/ https://arstechnica.com/information-technology/2018/10/supermicro-boards-were-so-bug-ridden-why-would-hackers-ever-need-implants/ https://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/ https://krebsonsecurity.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/ Google+ via Joel: https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194 https://motherboard.vice.com/en_us/article/qv9xmb/google-plus-is-shutting-down-after-security-bug-exposed-user-info https://www.blog.google/technology/safety-security/project-strobe/ https://www.cnet.com/news/senate-seeks-internal-memo-on-google-vulnerability/ https://www.usatoday.com/story/tech/2018/09/28/google-ceo-sundar-pichai-testify-before-congress-conservative-bias-charges/1457087002/ https://threatpost.com/google-privacy-snafu-leaves-a-cloud-over-the-tech-landscape/138098/ Photo credit: https://www.extremetech.com/wp-content/uploads/2014/02/EM8R5.jpg
Linux Vulnerabilities were Found, Current Voting Machines were also found to be Vulnerable to hacks, and Facebook was Hacked! All that coming up now on ThreatWire. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Colleen Cavolo Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Linux Flaws: https://threatpost.com/local-privilege-escalation-flaw-in-linux-kernel-allows-root-access/137748/ https://www.qualys.com/2018/09/25/cve-2018-14634/mutagen-astronomy-integer-overflow-linux-create_elf_tables-cve-2018-14634.txt https://access.redhat.com/security/cve/cve-2018-14634 https://access.redhat.com/security/cve/cve-2018-17182 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/vmacache.c?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2 https://thehackernews.com/2018/09/linux-kernel-exploit.html https://threatpost.com/another-linux-kernel-bug-surfaces-allowing-root-access/137800/ Voting: https://defcon.org/images/defcon-26/DEF%20CON%2026%20voting%20village%20report.pdf https://arstechnica.com/information-technology/2018/09/e-voting-researchers-warn-of-hack-that-could-flip-the-electoral-college/ https://www.cnet.com/news/half-of-us-states-using-voting-machines-with-a-known-vulnerability-says-report/ https://www.cnet.com/news/campaign-2018-voting-machines-are-vulnerable-to-hacking/ Facebook: https://newsroom.fb.com/news/2018/09/security-update/ https://threatpost.com/facebook-data-breach-impacts-almost-50-million-accounts/137801/ https://www.businessinsider.com/facebook-hack-how-to-check-if-you-were-affected-2018-9 https://krebsonsecurity.com/2018/09/facebook-security-bug-affects-90m-users/ https://motherboard.vice.com/en_us/article/mbw3zb/facebook-hacked-50-million-users-affected https://thehackernews.com/2018/09/facebook-account-hacked.html Photo credit: https://c1.staticflickr.com/1/813/26405895567_3ba098e250_b.jpg
https://www.hakshop.com/products/c2 Cloud C² makes it easy for pen testers and IT security teams to deploy and manage fleets of Hak5 gear from a simple cloud dashboard.
Get Your Copy of GET LOOT! Now! https://hakshop.com/products/get-loot GET LOOT is a 3-5 player competitive hacking game where your goal is to exfiltrate (steal) loot while sabotaging your rivals with strategic crypto-locks and Hak5 themed cyber attacks! Available exclusively at DEF CON 26. Global release September 1st!
Newegg gets hit by the British Airways attackers, a Twitter bug sent direct messages to developers, and the three men behind Mirai don’t receive jail time. All that coming up now on ThreatWire. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Links: Newegg: https://arstechnica.com/information-technology/2018/09/newegg-hit-by-credit-card-stealing-code-injected-into-shopping-code/ https://www.cnet.com/news/newegg-data-breach-exposed-customer-credit-card-info-says-report/ https://twitter.com/Newegg/status/1042466284577779712?ref_src=twsrc%5Etfw https://kb.newegg.com/knowledge-base/2018-data-security-update-faq/?cm_mmc=snc-twitter-_-kb-faq-_-na-_-na https://www.riskiq.com/blog/labs/magecart-newegg/ https://www.volexity.com/blog/2018/09/19/magecart-strikes-again-newegg/ Twitter: https://help.twitter.com/en/account-activity-api https://developer.twitter.com/en/products/accounts-and-users/account-activity-api.html https://blog.twitter.com/developer/en_us/topics/tools/2018/details-for-developers-on-Account-Activity-API-bug.html https://www.cnet.com/news/twitter-may-have-sent-your-private-dms-to-the-wrong-people-but-probably-not/ https://threatpost.com/twitter-flaw-exposed-direct-messages-to-external-developers/137608/ https://techcrunch.com/2018/09/21/twitter-bug-sent-user-direct-messages-to-developers-for-over-a-year/ Mirai: https://www.justice.gov/usao-ak/pr/hackers-cooperation-fbi-leads-substantial-assistance-other-complex-cybercrime https://krebsonsecurity.com/2018/09/mirai-botnet-authors-avoid-jail-time/ https://www.cnet.com/news/hackers-behind-mirai-botnet-could-be-sentenced-to-working-for-the-fbi/ https://thehackernews.com/2018/09/mirai-botnet-fbi-cybercrime.html Photo credit: https://c1.staticflickr.com/1/967/41911616902_13d3d1007a_b.jpg
In today's HakTip, Shannon covers errors you might run into with the $PATH variable, and how to fix them! This HakTip is sponsored by Moogsoft. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
In today's HakTip, Shannon covers writing and executing shell scripts in the terminal. How to use permissions: https://youtu.be/n0BkozSwcfM This HakTip is sponsored by Moogsoft. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
text Secure Air-Gap Transfer - Hak5 2424
2018-09-20T00:12:43+00:00
Bash Bunny - https://www.hak5.org/gear/bash-bunny -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Secrets of the little blue box - http://www.historyofphonephreaking.org/docs/rosenbaum1971.pdf [PDF] Rabbit hole: collective false memory - https://en.wikipedia.org/wiki/False_memory#Commonly_held_false_memories -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds → https://www.hak5.org/subscribe Support → http://www.patreon.com/threatwire Amazon Associates → https://amzn.to/2pHgf8T Our Site → http://www.hak5.org Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ For Business Inquiries, please use our contact forms → https://www.hak5.org/contact Producer: Shannon Morse → https://www.youtube.com/channel/UCefsgN8xeWIp658QvOl73qA Editor: Perrin M Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆