Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails.
With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released.
Host Unknown is available for sponsorship, conferences, other web shows or indeed anything that pays a little bit of money to keep the debt collectors away. You can contact them at [email protected] for details
This week in InfoSec (08:19)
With content liberated from the “today in infosec” twitter account and further afield
31st Jan 2011 (13 years ago): Chris Russo reported a vulnerability to dating website …
This week in InfoSec (04:51)
With content liberated from the “today in infosec” twitter account and further afield
25th January 2003: The SQL Slammer worm was first observed. It relied on a vulnerabil…
This week in InfoSec (09:34)
With content liberated from the “today in infosec” twitter account and further afield
11th January 2000: Newly declassified documents proved the existence of ECHELON, a gl…
This week in InfoSec (06:16)
With content liberated from the “today in infosec” twitter account and further afield
6th January 2014: Intel renamed its McAfee subsidiary Intel Security, distancing itse…
This week in InfoSec (12:55)
With content liberated from the “Today in infosec” Twitter account and further afield
11th December 2010: The hacker group Gnosis released the source code for Gawker's webs…
This week in InfoSec (07:51)
With content liberated from the “today in infosec” twitter account and further afield
5th December 2011: Fyodor reported that CNET's http://Download.com had been wrapping i…
This week in InfoSec (09:40)
With content liberated from the “today in infosec” twitter account and further afield
24th November 2014: The Washington Post published an article which included a photo o…
This week in InfoSec (06:40)
23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan…
6:48 This week in InfoSec
With content liberated from the “today in infosec” twitter account and further afield
This Week in InfoSec (05:41)
2002: In response to a report which insinuated Mac is less vulnerable than Windows, Microsoft suggested few focus on discovering Mac vulnerabilities and that products wit…
This week in InfoSec (07:11)
With content liberated from the “today in infosec” twitter account and further afield
26th October 2006: Christopher Soghoian created a website allowing visitors to genera…
This week in InfoSec (09:48)
With content liberated from the “today in infosec” twitter account and further afield
8th October 2018: Google announced that it exposed the private info of hundreds of th…
This week in InfoSec (08:56)
With content liberated from the “today in infosec” twitter account and further afield
2006: The http://wikileaks.org domain name was registered, though the first document w…
This week in InfoSec (08:45)
With content liberated from the “today in infosec” twitter account and further afield
25th September 1986: "The Hacker Manifesto" was published by The Mentor (Loyd Blankens…
This week in InfoSec (09:32)
With content liberated from the “today in infosec” twitter account and further afield
18th September 2001: The Nimda worm was released. Utilising 5 different infection vect…
This week in InfoSec (08:18)
With content liberated from the “today in infosec” twitter account and further afield
13th September 2011: Backup tapes containing info on 4.9 million TRICARE military heal…
This week in InfoSec (11:51)
With content liberated from the “today in infosec” twitter account and further afield
6th September 1987: Thomas Haynie was accused of intentionally jamming Playboy's satel…
This week in InfoSec (10:17)
With content liberated from the “today in infosec” twitter account and further afield
29th August 1990: The British Computer Misuse Act Goes into Effect
One of the earlies…
This week in InfoSec (14:00)
With content liberated from the “today in infosec” twitter account and further afield
18th August 2003: The Nachi worm began infecting Windows computers with the goal of RE…
This week in InfoSec (11:56)
With content liberated from the “Today in Infosec” Twitter account and further afield
4th August 1998: Microsoft published a critical security bulletin MS98-010, titled 'In…