Podcast Detail

Subtitle File Vulnerabilities; Iris Scanner Bypass

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://chrt.fm/track/2748D7/https://traffic.libsyn.com/securitypodcast/5514.mp3

Podcast Logo
SANS Daily Network Security Podcast (Stormcast) for Wednesday, May 24th 2017
00:00

Interested in Internet Storm Center stickers? Check here if there are still some available for today.

Multiple Video Players are Vulnerable to Code Execution via Subtitle Files
http://blog.checkpoint.com/2017/05/23/hacked-in-translation/

Samsung Galaxy S8 Iris Scanner Bypass
https://www.ccc.de/en/updates/2017/iriden

Verizon XSS Flaw in Web Messaging Application
https://randywestergren.com/xss-sms-hacking-text-messages-verizon-messages