Security News
![S3 Ep49: Poison PACs, pointless alarms and phunky bugs [Podcast]](/static/build/img/news/s3-ep49-poison-pacs-pointless-alarms-and-phunky-bugs-podcast-small.jpg)
A home alarm system that almost anyone can turn off. Oh! No! When you grab your laptop but it's not yours.
![S3 Ep48: Cryptographic bugs, cryptocurrency nightmares, and lots of phishing [Podcast]](/static/build/img/news/s3-ep48-cryptographic-bugs-cryptocurrency-nightmares-and-lots-of-phishing-podcast-small.jpg)
Oh! No! The Windows desktop that got so big it imploded. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.
![S3 Ep47: Daylight robbery, spaghetti trouble, and mousetastic superpowers [Podcast]](/static/build/img/news/s3-ep47-daylight-robbery-spaghetti-trouble-and-mousetastic-superpowers-podcast-small.jpg)
LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast. WHERE TO FIND THE PODCAST ONLINE. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher, Overcast and anywhere that good podcasts are found.
![S3 Ep46: Copyright scams, video snooping and Grand Theft Crypto [Podcast]](/static/build/img/news/s3-ep46-copyright-scams-video-snooping-and-grand-theft-crypto-podcast-small.jpg)
An IoT bug that could be exploited for video snooping and more. A hacker steals $600m and then makes a song and dance out of giving it back.
![S3 Ep45: Routers attacked, hacking tool hacked, and betrayers betrayed [Podcast]](/static/build/img/news/s3-ep45-routers-attacked-hacking-tool-hacked-and-betrayers-betrayed-podcast-small.jpg)
![S3 Ep44: Unreported holes, retro computing, and tech support for malware [Podcast]](/static/build/img/news/s3-ep44-unreported-holes-retro-computing-and-tech-support-for-malware-podcast-small.jpg)
" Timezone curiosities - when modular arithmetic gets weird. Microsoft researcher found Apple 0-day in March, didn't report it.

AWS S3 buckets are now exposed via additional channels and APIs, which create new security blind spots that hackers are waiting to exploit. The insurtech vendor promises to its customers to provide responses within minutes, and the business process demands opening these potentially dangerous files and processing them in this time range.
![S3 Ep43: Apple 0-day, pygmy hippos, hive nightmares and Twitter hacker bust [Podcast]](/static/build/img/news/s3-ep43-apple-0-day-pygmy-hippos-hive-nightmares-and-twitter-hacker-bust-podcast-small.jpg)
![S3 Ep42: Viruses, Nightmares, patches, rewards and scammers [Podcast]](/static/build/img/news/s3-ep42-viruses-nightmares-patches-rewards-and-scammers-podcast-small.jpg)
LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast. WHERE TO FIND THE PODCAST ONLINE. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher, Overcast and anywhere that good podcasts are found.

Votiro announced the addition of an AWS S3 bucket connector to its Secure File Gateway solution suite. With this new capability, all files hosted within AWS storage will be delivered to the Votiro Secure File Gateway, powered by Positive Selection technology.