POPULARITY
Siberin Günlüğü'nde bu hafta Tuğba Öztürk ve Kerem Kocaer, Almanya'dan yasadışı olarak Türkiye'ye satıldığı iddia edilen FinFisher casus yazılımını ve son dönemde taklit domainler ile özellikle uzak doğu ile iş yapan firmaları hedef alan saldırıları yorumluyor. Keyifli dinlemeler
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Germans charge FinFisher executives The got FBI busted misusing 702 data Special guest Chris Krebs talks China, new CISA mandates and more New research breaks Android fingerprint auth Much, much more This week's show is brought to you by Trail of Bits. Dan Guido is this week's sponsor guest and he joins us to talk about the work Trail of Bits is doing in securing AI systems, and making them safe. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Congress looks to expand CISA's role, adding responsibilities for satellites and open source software | CyberScoop Biden nominates Lt. Gen. Timothy Haugh for top position at NSA, Cyber Command Unsere Strafanzeige: Staatsanwaltschaft erhebt Anklage gegen FinFisher The Real Risks in Google's New .Zip and .Mov Domains | WIRED FBI misused controversial surveillance tool to investigate Jan. 6 protesters Suspicion stalks Genesis Market's competitors following FBI takedown Crimephones Are a Cop's Best Friend - by Tom Uren The Underground History of Turla, Russia's Most Ingenious Hacker Group | WIRED Some Of Russia's Most Dangerous Cybercriminals Just Had Their Malware Dealer Unmasked Shifting tactics fuel surge in Business Email Compromise Treasury Department sanctions entities tied to North Korean IT scams, hacking | CyberScoop Chinese Labs Are Selling Fentanyl Ingredients for Millions in Crypto | WIRED Leaked EU Document Shows Spain Wants to Ban End-to-End Encryption | WIRED Here's how long it takes new BrutePrint attack to unlock 10 different smartphones | Ars Technica It took 48 hours, but the mystery of the mass Asus router outage is solved | Ars Technica Popular Android TV boxes sold on Amazon are laced with malware | TechCrunch Teen hacker charged in scheme to siphon funds from sports betting accounts Researchers tie FIN7 cybercrime family to Clop ransomware German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack Dallas courts still closed 2 weeks post-ransomware attack | Cybersecurity Dive Health insurer says patients' information was stolen in ransomware attack Patients angered after Oklahoma allergy clinic blames cyberattack for shutdown UK steel industry supplier Vesuvius says ‘cyber incident' cost £3.5 million Researchers infiltrate Qilin ransomware group, finding lucrative affiliate payouts A different kind of ransomware demand: Donate to charity to get your data back | CyberScoop Joe Tidy on Twitter: "A bizarre one from Reading courts - an IT Security worker pleads guilty to piggy-backing off a cyber attack against his own firm. Liles switched the ransom payment details to his own Bitcoin wallet and changed the hacker's email to secretly apply pressured on bosses to pay up. https://t.co/Ze4yAJA6vM" / Twitter ChatGPT Scams Are Infiltrating Apple's App Store and Google Play | WIRED
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Germans charge FinFisher executives The got FBI busted misusing 702 data Special guest Chris Krebs talks China, new CISA mandates and more New research breaks Android fingerprint auth Much, much more This week's show is brought to you by Trail of Bits. Dan Guido is this week's sponsor guest and he joins us to talk about the work Trail of Bits is doing in securing AI systems, and making them safe. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Congress looks to expand CISA's role, adding responsibilities for satellites and open source software | CyberScoop Biden nominates Lt. Gen. Timothy Haugh for top position at NSA, Cyber Command Unsere Strafanzeige: Staatsanwaltschaft erhebt Anklage gegen FinFisher The Real Risks in Google's New .Zip and .Mov Domains | WIRED FBI misused controversial surveillance tool to investigate Jan. 6 protesters Suspicion stalks Genesis Market's competitors following FBI takedown Crimephones Are a Cop's Best Friend - by Tom Uren The Underground History of Turla, Russia's Most Ingenious Hacker Group | WIRED Some Of Russia's Most Dangerous Cybercriminals Just Had Their Malware Dealer Unmasked Shifting tactics fuel surge in Business Email Compromise Treasury Department sanctions entities tied to North Korean IT scams, hacking | CyberScoop Chinese Labs Are Selling Fentanyl Ingredients for Millions in Crypto | WIRED Leaked EU Document Shows Spain Wants to Ban End-to-End Encryption | WIRED Here's how long it takes new BrutePrint attack to unlock 10 different smartphones | Ars Technica It took 48 hours, but the mystery of the mass Asus router outage is solved | Ars Technica Popular Android TV boxes sold on Amazon are laced with malware | TechCrunch Teen hacker charged in scheme to siphon funds from sports betting accounts Researchers tie FIN7 cybercrime family to Clop ransomware German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack Dallas courts still closed 2 weeks post-ransomware attack | Cybersecurity Dive Health insurer says patients' information was stolen in ransomware attack Patients angered after Oklahoma allergy clinic blames cyberattack for shutdown UK steel industry supplier Vesuvius says ‘cyber incident' cost £3.5 million Researchers infiltrate Qilin ransomware group, finding lucrative affiliate payouts A different kind of ransomware demand: Donate to charity to get your data back | CyberScoop Joe Tidy on Twitter: "A bizarre one from Reading courts - an IT Security worker pleads guilty to piggy-backing off a cyber attack against his own firm. Liles switched the ransom payment details to his own Bitcoin wallet and changed the hacker's email to secretly apply pressured on bosses to pay up. https://t.co/Ze4yAJA6vM" / Twitter ChatGPT Scams Are Infiltrating Apple's App Store and Google Play | WIRED
FinFisher malware hijacks Windows Boot Manager with UEFI bootkit
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Picture of the Week. 0-Day Watch. Spring Forward (Java: Spring4Shell) QNAP and the OpenSSL DoS vulnerability. Sophos has a 9.8. CISA orders federal civilian agencies to patch the Sophos vulnerability. Browser-in-the-browser. The supply-chain attacks on NPM have been growing. FinFisher bites the dust. A LAPSUS$ in judgment. Not so Wyze. Closing The Loop. Port Knocking. We invite you to read our show notes at https://www.grc.com/sn/SN-865-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit itpro.tv/securitynow promo code SN30 kolide.com/securitynow
Eine Münchner Firmengruppe, deren Staatstrojaner mehrfach in autoritären Staaten entdeckt wurde, ist am Ende. In unserem Hintergrundpodcast spricht Redakteur Andre Meister über seine jahrelangen Recherchen in einer zwielichtigen Branche, über seine jüngste Enthüllung und über unsere Strafanzeige gegen FinFisher.
Heute sprechen Oli und Michael über eine ganze Menge Jubiläen: nicht nur der Raspberry Pi wird 10 Jahre alt, sondern auch die CD wird stolze 40 diesen Monat. Außerdem beleuchten wir die Auswirkungen des Lockdowns in Shenzhen, sprechen über Finfisher und über das neue Kapitel des Open Source-Dramas in München.
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Some arrests of suspected Lapsus$ members in the UK Why the Okta incident is probably a fizzer Four FSB officers indicted over Triton/Trisis malware Kim Zetter interviewed Intrusion Truth Australian government to upsize ASD Wave bye bye to Finfisher Much, much more This week's sponsor interview is with Mike Wiacek from Stairwell. Stairwell makes a product that catalogues the files in your environment and lets you slice and dice that data. That makes threat hunting pretty easy and Mike is joining the show this week to talk about why organisations of all stripes should be doing threat hunting. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal - BBC News Okta ‘identifying and contacting' customers potentially affected by Lapsus$ breach - The Record by Recorded Future Okta revises original statement, says 366 customers affected by Lapsus$ breach - The Record by Recorded Future Okta apologizes for waiting two months to notify customers of Lapsus$ breach - The Record by Recorded Future Lapsus$ found a spreadsheet of accounts as they breached Okta, documents show | TechCrunch DOJ unseals indictments of four Russian gov't officials for cyberattacks on energy companies - The Record by Recorded Future Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide | OPA | Department of Justice Intrusion Truth - Five Years of Naming and Shaming China's Spies ASD to double in size after $10bn cyber security funding boost - Security - iTnews How the Biden budget goes big on cyber - The Record by Recorded Future FBI, CISA advise 13,000 orgs to have 'low threshold' for reporting cyberattacks - The Record by Recorded Future Senate report examines REvil ransomware attacks on US firms - The Record by Recorded Future Senate ransomware investigation says FBI leaving victims in the lurch Surveillance software firm FinFisher declares insolvency - The Record by Recorded Future NSO refused Ukraine's request for Pegasus spyware so it wouldn't anger Russia - The Washington Post FCC puts Kaspersky on security threat list, says it poses “unacceptable risk” | Ars Technica Traffic at major Ukrainian internet service provider Ukrtelecom disrupted - The Record by Recorded Future An interview with the chief technical officer at Ukrtelecom - The Record by Recorded Future Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests” – Krebs on Security North Korean hackers unleashed Chrome 0-day exploit on hundreds of US targets | Ars Technica Google releases emergency security update for Chrome users after second 0-day of 2022 discovered - The Record by Recorded Future Npm maintainers remove malicious packages after typosquatting attempt - The Record by Recorded Future ‘Spam Nation' Villain Vrublevsky Charged With Fraud – Krebs on Security $2 million stolen from DeFi protocol Revest Finance, platform unable to reimburse victims - The Record by Recorded Future Flash loan attack on One Ring protocol nets crypto-thief $1.4 million | The Daily Swig More than $625 million stolen in DeFi hack of Ronin Network - The Record by Recorded Future Hackers Who Stole $50 Million in Crypto Say They Will Refund Some Victims
[Referências do Episódio] - Campanha de threat hijacking do IcedID - https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/ - CVE-2022-1040 no Firewall da Sophos - https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce - Pedido de falência da FinFisher - https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/ e https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation - Suposto ataque contra a Ukrtelecom - https://therecord.media/ukrtelecom-interview-dmytro-mykytiuk/ - Supostas evidências do ataque contra a Okta - https://techcrunch.com/2022/03/28/lapsus-passwords-okta-breach/?guccounter=1 - CVE-2022-22274 nos firewalls da SonicWall - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003 e https://www.bleepingcomputer.com/news/security/critical-sonicwall-firewall-patch-not-released-for-all-devices/ [Ficha técnica] Roteiro e apresentação: Carlos Cabral Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia Projeto gráfico: Julian Prieto
Heute u.a. mit folgenden Nachrichten: - Berliner Startup Comatch an Malt verkauft - Der Münchner Spähsoftware-Hersteller FinFisher ist insolvent - Peter Thiel bereut späten Bitcoin-Einstieg - Apple zahlt erneut Halteprämien - Der neue EY-Report zeigt: 2022 ist bisher kein gutes Jahr für IPOs - Instacart Bewertung um fast 40 Prozent gesunken - Elon Musk denkt über eigenes soziales Netzwerk nach - Rekordpreise für Fußballer-NFTs - KI soll die bessere Milch erfinden Heute begrüßen wir im Rahmen der Reihe “Investments & Exits” Martin Janicki, Principal bei Cavalry Ventures
Malicious Android applications appear harmless when looking at the store description and requested permissions, but this false sense of confidence changes when users get charged month over month for the premium service they get subscribed to without their knowledge and consent. Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. Honey Beez and Trip Elix have unique experiences to share in an unpaired podcast experience. Join our community!! Subscribe to the Insecurity Brief podcast now on every platform we can find Follow us on Twitter @HoneyBeez0x @trip_elix inks Our Website: https://www.tripelix.com/insecurity/trojan-gifthorse-infected-tens-of-millions-android-devices-racking-millions/ Youtube https://youtu.be/uoVYh67aoFs the link to the podcast itunes:https://podcasts.apple.com/us/podcast/trojan-gifthorse-infected-tens-of-millions-android/id1583788677?i=1000537203216 Spoify:https://open.spotify.com/episode/0deJi48dJFU5zOJygLvWCg Soundcloud:https://soundcloud.com/user-841713900/trojan-gifthorse-infected-tens-of-millions-android-devices-racking-millions?si=ef0e0c4cd9d14f2297d0b254906dae82 Trip’s books https://www.tripelix.com/merch Honey’s books https://beedefense.net #Android #google #GiftHorse #Malware #Tojan #UEFI #Chrome Update Google Chrome ASAP to Patch 2 New Actively Exploited Zero-Day Flaws Google on Thursday pushed urgent security fixes for its Chrome browser, including a pair of new security weaknesses that the company said are being exploited in the wild, making them the fourth and fifth actively zero-days plugged this month alone. https://thehackernews.com/2021/09/update-google-chrome-asap-to-patch-2.html GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally These malicious Android applications appear harmless when looking at the store description and requested permissions, but this false sense of confidence changes when users get charged month over month for the premium service they get subscribed to without their knowledge and consent. https://blog.zimperium.com/grifthorse-android-trojan-steals-millions-from-over-10-million-victims-globally/ FinSpy: unseen findings FinSpy, also known as FinFisher or Wingbir
https://www.iberley.es/temas/registros-remotos-sobre-equipos-informaticos-proceso-penal-63159
Trump e il suo profilo Twitter; individuati gli hacker russi responsabili dei più clamorosi attacchi degli ultimi anni; Snowden ha la residenza garantita in Russia, ma ha perso la causa con l'NSANational Security Agency; Immuni: risposte a domande arrivate via email; download di Immuni regione per regione; il garante della privacy ha aperto un'istruttoria su Telegram per i deepfake di nudi online; il 4G sbarca sulla Luna; raid della polizia tedesca nelle sedi di FinFisher; haker contro i dispositivi medicali; un precedente legale che condizionerà la lotta ai pirati informatici.
Trump e il suo profilo Twitter; individuati gli hacker russi responsabili dei più clamorosi attacchi degli ultimi anni; Snowden ha la residenza garantita in Russia, ma ha perso la causa con l’NSANational Security Agency; Immuni: risposte a domande arrivate via email; download di Immuni regione per regione; il garante della privacy ha aperto un’istruttoria su Telegram per i deepfake di nudi online; il 4G sbarca sulla Luna; raid della polizia tedesca nelle sedi di FinFisher; haker contro i dispositivi medicali; un precedente legale che condizionerà la lotta ai pirati informatici.
In this episode, I interview Rob Knake, Senior Fellow at the Council on Foreign Relations, about his recent report, “Weaponizing Digital Trade -- Creating a Digital Trade Zone to Promote Online Freedom and Cybersecurity.” The theme of the report is what the U.S. can salvage from the wreckage of the 1990s Magaziner Consensus about the democratizing and beneficent influence of Silicon Valley. I suggest that it really ought to be called “Digital Dunkirk,” rather than invoking a swaggering “weaponization” theme. Rob and I disagree about the details but not the broad outlines of his proposal. In the news roundup, we finally have a Google antitrust complaint to pore over, and I bring Steptoe's Michael Weiner on to explain what the complaint means. Bottom line: it's a minimalist stub of a case, unlikely to frighten Google or produce structural changes in the market. Unless a new administration (or a newly incentivized Trump Justice Department) keeps adding charge after charge as the investigation goes on. Speaking of Justice Department filings that may serve up less than meets the eye, DOJ has indicted GRU hackers for practically every bad thing that has happened on the internet in the last five years, other than the DNC hack. (In fact, I lost an unsaved Word document in 2017 that I'm hoping will be added to the charges soon.) The problem, of course, is that filing the charges is the easy part; bringing these state hackers to justice is unlikely in the extreme. If so, one wonders whether a policy that requires an indictment for all the cyberattacks on the US and its allies is a wise use of resources. Maury Shenk thinks it might be, at least in demonstrating US attribution capabilities, which are indeed impressive. While we are covering questionably effective U.S. retaliation for cyberattacks, Maury also notes that the Treasury Department has imposed sanctions on TsNIIKhM, a Russian institute that seems to have developed industrial control malware that caused massive outages in Saudi Arabia and may have been planted in U.S. energy systems as well. Again, no one doubts that heavy penalties should be imposed; the doubt is about whether these penalties will actually reach TsNIIKhM. Nick Weaver celebrates the German government's dawn raid on spyware exporter, FinFisher. Maury expresses modest hope for Facebook's Oversight Board now that it has started reviewing content moderation cases. Color me skeptical. Now that we've seen the actual complaint, Nick has his doubts about the Microsoft attack on Trickbot. It may be working, he says, but why is Microsoft doing something that the FBI could have done? I pile on, raising questions about the most recent legal theory Microsoft has rolled out in support of its proposed remedies. Finally, in quick hits: I hum a few bars from “John Henry” in response to a Bloomberg story suggesting that CEOs are successfully beating the AI engines parsing their analyst calls and trading on the results. Maury debunks the parts of the story that made it fun, but not before I've asked whether Spinal Tap was decades ahead of its time in repackaging failure. Maury also notes the ho-hum upcoming Judiciary Committee testimony of Twitter and Facebook CEOs about their suppression of the New York Post “laptop from hell” Hunter Biden story. I'm much more interested in the Commerce Committee's subpoenaing of contacts between the campaigns and those companies. Because you just know the campaigns have a whole strategy for working the speech refs, and it would be an education to see how they do it. Nick and I congratulate Edward Snowden on the confirmation that he'll be in Russia forever. And more! Download the 335th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
- Irán se une a la lista de países que están intentando influenciar las elecciones americanas. - Robo de Bitcoin equivalente a $22 millones de dólares de usuarios de carteras Electrum. - Las fuerzas del estado americanas utilizan órdenes de registro contra Google en base a palabras clave que buscan los usuarios. - Relojes inteligentes para niños se pueden manipular y convertir en dispositivos espía. - Las oficinas de FinFisher, la empresa que vende sofware de espionaje a gobiernos, son registradas por las autoridades alemanas. - Atacantes podrían haber rastreado y descubierto la identidad real de usuarios de Google Waze. Notas y referencias en tierradehackers.com
- Irán se une a la lista de países que están intentando influenciar las elecciones americanas. - Robo de Bitcoin equivalente a $22 millones de dólares de usuarios de carteras Electrum. - Las fuerzas del estado americanas utilizan órdenes de registro contra Google en base a palabras clave que buscan los usuarios. - Relojes inteligentes para niños se pueden manipular y convertir en dispositivos espía. - Las oficinas de FinFisher, la empresa que vende sofware de espionaje a gobiernos, son registradas por las autoridades alemanas. - Atacantes podrían haber rastreado y descubierto la identidad real de usuarios de Google Waze. Notas y referencias en tierradehackers.com
Докладно про головне Гігант розробки програмного забезпечення Software AG зазнав атаки крипто-здирників Вихід українського додатку держпослуг ДІЯ 2.0 TikTok оголосив про старт bug bounty програми спільно з HackerOne British Airways нарешті оштрафували на 20 мільйонів фунтів через витік даних США висунули звинувачення російським хакерам, що стоять за NotPetya, KillDisk, та OlympicDestroyer Коротко про важливе Zoom додає end-to-end шифрування до усіх дзвінків Дитячий “Wearable”-смартфон з Китаю має вбудовані механізми для шпіонажу Архів Usenet-бордів викладуть в Інтернет Google у 2017 році відбив DDoS атаку на 2.54Tb Німецькі правоохоронці провели рейд на компанію FinFisher Вразливості тижня Remote Code Execution в SonicWall VPN Шкідливі npm-пакети з віддаленим доступом Tools and write-ups AWS Security Hub Identity Management фреймворк від Hashicorp PoC для jailbreak’у сопроцесора T2 від Apple Смі#%*очки Судове слухання про взлам твіттер-акаунтів був перерваний відео з PornHub Шок-сенація. Невідомі використали masscan для сканування мережі Nobody gets hacked. “To get hacked you need somebody with 197 IQ and he needs about 15 percent of your password.” - Donald Trump
Die US-Wahl rückt näher und wir bekämpfen unsere Nervosität mit ein paar Anmerkungen und Befürchtungen. Dann diskutieren wir einen interessanten Blick auf Verschwörungstheorien und welche Schwellen von denen überschritten werden, die sich darüber zunehmend radikalisieren. Weiter besprechen wir die eingeleiteten Maßnahmen und Durchsuchungen beim Hersteller von FinFisher, der Firma Gamma und schauen auf das eingeleitete Kartellverfahren gegen Google sowie Googles Kooperation mit den Behörden bei strafrechtlichen Ermittlungen. Dann empören wir uns noch ein wenig über die geplanten ploadfilter für die "Terrorbekämpfung" und kommentieren kurz die jüngsten Updates zur Corona-Warn-App.
On this week’s show Patrick and Adam discuss the week’s security news, including: US DoJ unseals indictments against Sandworm operators Twitter backtracks on “hacked materials” policy No consensus on Trickbot c2 status NSA publishes “most exploited” listicle that’s actually interesting Much, much more Cmd Security is this week’s sponsor. Its CEO Jake King and CTO Mike Sample join the show this week to talk though a new remote access tech release from Hashicorp called Boundary and what it might mean for Linux system observability in your environment. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that’s your thing. Show notes US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit | WIRED UK says Russia was preparing cyber-attacks against the Tokyo Olympics | ZDNet Sandworm operators indicted - Risky Business Microsoft says it took down 94% of TrickBot's command and control servers | ZDNet NSA publishes list of top vulnerabilities currently targeted by Chinese hackers | ZDNet 800,000 SonicWall VPNs vulnerable to new remote code execution bug | ZDNet VMSA-2020-0023 New York Post Published Hunter Biden Report Amid Newsroom Doubts - The New York Times Twitter Says It Blocked NY Post Hunter Biden Article Because It Contains Hacked Data The Media Just Passed a Test It Failed Four Years Ago | WIRED Brevard voters threatened in emails purportedly from 'Proud Boys' Google offers details on Chinese hacking group that targeted Biden campaign Industry alert pins state, local government hacking on suspected Russian group New York regulator faults Twitter for lax security measures prior to big account breach German authorities raid FinFisher offices | ZDNet Shannon Vavra on Twitter: "Details via @hsu_spencer & @kfahim https://t.co/QTRooHnw0I" / Twitter Encrochat Hack That Brought Down Hundreds of Criminals Faces Legal Challenges Hackney Council unable to pay housing benefit after cyber attack | Science & Tech News | Sky News London's Hackney Borough Council hit by hack attack - BBC News Hackney Council services to be disrupted ‘for some time’ Meet FIN11, a cybercrime outfit going after pharma companies while leaning on extortion QAnon/8Chan Sites Briefly Knocked Offline — Krebs on Security Alexander Vinnik heads to trial in France on ransomware, money laundering charges Alleged KickassTorrents founder Artem Vaulin jumped bail in Poland Thousands of infected IoT devices used in for-profit anonymity service | Ars Technica Microsoft adds option to disable JScript in Internet Explorer | ZDNet Zoom to roll out end-to-end encrypted (E2EE) calls | ZDNet QRadar: Popular IBM security tool open to remote code execution attacks | The Daily Swig Google releases Chrome security update to patch actively exploited zero-day | ZDNet Security testing firm NSS Labs ceases operations, citing coronavirus | TechCrunch Ryuk in 5 Hours – The DFIR Report
Carnival makes it official, Magento holes patched, Congress cares about the UHS hack, and International governments are looking for way around encryption, all this week - www.bleepingcomputer.com: Largest cruise line operator Carnival confirms ransomware data theft - threatpost.com: Critical Magento Holes Open Online Shops to Code Execution - www.scmagazine.com: Here are the questions Congress asks after a ransomware attack - www.cyberscoop.com: Foreign hackers are targeting federal, state and local IT networks, feds warn - www.zdnet.com: TrickBot botnet survives takedown attempt, but Microsoft sets new legal precedent - www.zdnet.com: German authorities raid FinFisher offices - www.bleepingcomputer.com: Barnes & Noble hit by cyberattack that exposed customer data - www.bleepingcomputer.com: Software AG IT giant hit with $23 million ransom by Clop ransomware - www.theregister.com: Five Eyes nations plus Japan, India call for Big Tech to bake backdoors into everything. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/professor-cyber-risk/message Support this podcast: https://anchor.fm/professor-cyber-risk/support
In today's podcast we cover four crucial cyber and technology topics, including: 1. Iranian threat actor engaged in new campaign against Universities globally 2. German law enforcement raids offices of FinFisher spyware creators 3. Google and Intel describe concerning flaws in Linux kernel supporting Bluetooth 4. Twitter, Facebook face scrutiny over content moderation I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
Heute mit: FinFisher, Verkehrssicherheit, Wordpress, BER ***SPONSOR-HINWEIS*** Die Intel vPro Plattform ist für Unternehmen konzipiert und weit mehr als nur ein Prozessor. Die umfassende Plattform-Technologie erfüllt nicht nur die Anforderungen Ihrer IT, sondern auch die Wünsche Ihrer Mitarbeiter. Sie vereint erstklassige Leistung, hardwarebasierte Sicherheit, moderne Fernverwaltbarkeit und Stabilität, sodass Sie Ihre Unternehmensproduktivität beschleunigen, Daten besser schützen und von überall Ihre PCs verwalten können. Gehen Sie auf www.intel.de/MoreWithvPro und erfahren Sie mehr. Intel vPro Plattform – Built for Business ***SPONSOR-HINWEIS ENDE***
In today's podcast we cover four crucial cyber and technology topics, including: 1. Hungary reports DDoS that impacted financial industry 24 September 2. New FinSpy malware update found in Egypt, targets MacOS and Linux 3. KuCoin suffers attack, loses ~150 Million USD4. Judge delays removal of TikTok from Apple/Google App stores I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
AutorInnen: Constanze Kurz, Frank Rieger Titel: Cyberwar – Die Gefahr aus dem Netz: Wer uns bedroht und wie wir uns wehren können Verlag: C. Bertelsmann Neusprechfunk [fyyd.de] Frank Rieger bei "Lauer informiert" [Podcast] Jeff Bezos angeblich über WhatsApp-Nachricht von saudischem Kronprinzen gehackt [heise.de] Finfisher verklagen [media.ccc.de] BFBS [Wikipedia]TÜV#Geschichte [Wikipedia] 2READ 009 Blackout LNP331 Kritische Infrastruktur
Themen der Sendung Frage aus der IT Unser IT-Spezialist Sebastian Fischbeck fragt: Welches iPhone sollte ich mir zulegen? Aufreger der Woche Apple kann immer noch nicht Dinge sortieren: Schack ist auf der Suche nach Jurrassic Park 2 Auch Hörbücher sind immer noch eine Katastrophe! EU drängt auf gemeinsames Ladekabel – Apple möchte Lightning behalten Neues aus Cupertino Der Mac Pro ist da! Oder doch lieber den alten kaufen? Podcast-Tipp: Bits und so – Folge #665 (Dampfende Lautsprecher) Hörer-Feedback Ronald: iPad und Ordner, Mac Pro und KI Podcast-Tipp: Computermagazin & Umbruch – Wie einfach lässt sich ein Fake-Video basteln? Web-Tipp: This Person does not exist Unbekannter Anrufer: Apple Watch und EKG Hier die Nummer vom Anrufbeantworter: 0431 200766705 Siri hatte schlussendlich doch keine Lust sie vorzulesen :-( 36C3-Vortrags-Tipps BahnMining von David Kriesel Schimpfwörterbuch der neuen Rechten von josch Hirne Hacken von Linus Neumann Video-Tipp: Can you get in anywhere with a ladder? Finfisher verklagen von Thorsten Schröder und Ulf Buermeyer Hacker hin oder her, die elektronische Patientenakte kommt von Martin Tschirsich, Dr. med. Christian Brodowski und Dr. André Zilch Hacker-Jeopardy mit Sec und Ray KGB Hack - 30 Years Later von Anja Drephal Geheimdienstliche Massenüberwachung vs. Menschenrechte von Constanze Kurz Tipps & Tricks Trackpad: Klick durch Tippen und Bedienungshilfe Mit drei Fingern bewegen Hardware-Vorstellungen Dock mit Speicher: Linedock Dock-Empfehlungen: Elgato Thunderbolt 3 Dock, Raidsonic Icy Box Kopfhörer mit ANC und sehr guten Klang: Sennheiser Momentum 3 Wireless Offtiopic: Käpt’n räkelt sich! Popsocket ohne Socke: Popgrip Slide App-Fundstücke Die beste Schreib-App der Welt! Winston Ferndiagnose per App: TK Doc Web-Tipp: Krautreporter Ihr Lappen! von der Notaufnahmeschwester Hörbücher aus dem Cloudspeicher abspielen: Bound Apple TV+ Servant: Alles nur geklaut! Oprah’s Book Club In eigener Sache Wir suchen Autoren! Bewirb dich hier. Unsere Fachbücher im Bundle günstiger!
Breitband - Medien und digitale Kultur - Deutschlandfunk Kultur
Autor: Dennis Kogel Sendung: Breitband Hören bis: 19.01.2038 04:14
In dieser Kurzfolge geht es um Finfisher vs Netzpolitik.org, Kühlen ohne Kühlmittel uvm. Themen: Finfisher mahnt Netzpolitik.org ab Kühlen ohne Kühlmittel Pfeife der Woche:Blizzard und die freie Meinungsäußerung Sailfish der Woche: GPodder bekommt wieder Updates Wie immer wünsche ich viel Spaß beim reinhören ;)
Camille Stewart talks about a little-known national security risk: China's propensity to acquire U.S. technology through the bankruptcy courts and the many ways in which the bankruptcy system isn't set up to combat improper tech transfers. Published by the Journal of National Security Law & Policy, Camille's paper is available here. Camille has enjoyed great success in her young career working with the Transformative Cyber Innovation Lab at the Foundation for Defense of Democracies, as a Cybersecurity Policy Fellow at New America, and as a 2019 Cyber Security Woman of the Year, among other achievements. We talk at the end of the session about life and advancement as an African American woman in cybersecurity. Want to hear more from Camille on this topic? She'll be speaking Friday, Sept. 13, at a lunch event hosted by the Foundation for Defense of Democracies (FDD). She'll be joined by fellow panelists Giovanna Cinelli, Jamil Jaffer and Harvey Rishikof, along with moderator Dr. Samantha Ravich. The event will be livestreamed at www.fdd.org/events. If you would like to learn more about the event, please contact Abigail Barnes at FDD. If you are a member of the press, please direct your inquiries to press@fdd.org. In the News Roundup, Maury Shenk tells us that UK courts have so far resisted a sustained media narrative that all facial recognition tech is inherently evil. Americans seem to agree, Matthew Heiman notes, since a majority trust law enforcement to use it responsibly. Which is more than you can say for Silicon Valley, which only 36 percent of Americans trust with the technology. Mieke Eoyang and I talk about the Department of Homeland Security's plan to use fake identities to view publicly available social media postings and the conflict with social media sites' terms of service. I am unsympathetic, given the need for operational security in conducting such reviews, but we agree that DHS is biting off more than it can chew, especially in languages other than English. But really, DHS, how clueless can you be when your list of social media to be scrutinized includes three-years-dead Vine but not TikTok, which Mieke notes ironically is “what all the kids are using these days.” Maury brings us up to speed on EU plans for the tech sector, which will be familiar to Brits contemplating the EU's plan for them. And speaking of EU hypocrisy and incoherence (we were, weren't we?), Erin Egan of Facebook has written a paper on data portability that deserves more attention, since it's impossible to square the EU's snit over Cambridge Analytica with its sanctifying of the principle of “data portability.” The paper also calls out the Federal Trade Commission for slamming Facebook for Cambridge Analytica while Commissioner Noah Phillips is warning that restrictions on data transfers can be anticompetitive. I promise to invite the commissioner on the podcast again to explore that issue. Well, that was quick: Fraudsters used AI to mimic a CEO's voice—accent, “melody” and all—in an unusual cybercrime case. Anyone can do this now, Maury explains. I tell listeners how to tell whether my voice has been AI-napped in future episodes. In short hits, Mieke and I mock Denmark's appointment of an “ambassador” to Silicon Valley. Way to cut the Valley down to size, Denmark! Maury notes that FinFisher is under investigation for violating EU export control law by selling spyware. Mieke does her best to rebut my suggestion that Silicon Valley's bias is showing in the latest actuarial stat: It turns out that 10 percent of the accounts that President Trump has retweeted have been deplatformed. Matthew and I note that China has been caught hacking several Asian telecomm companies to spy on Uighurs. Of course, if the U.S. had 5,000 citizens fighting for the Islamic State and al-Qaeda, as China claims to have, we'd probably be hacking all the same companies. State attorneys general will launch sweeping and apparently bipartisan antitrust probes into Facebook and Google this week. Good to see Silicon Valley bringing Rs and Ds together at last; who says its business model is social division? Finally, Mieke leaves us uneasy about the online security of our pensions, as hackers steal $4.2 million from one fund via compromised email. Download the 277th Episode (mp3). You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed! As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
In today's podcast, we hear about reports of email client vulnerabilities. Worries about Russian and Chinese software and hardware vendors. Security and trade policy notes. FinFisher found used in Turkey. The data scandal that brought down Cambridge Analytica moves to the University of Cambridge, but there the issues seem to be security, anonymization, and possible oversharing. Adobe and Samsung issue patches. A California high school student is accused of phishing for grade books. Ben Yelin from UMD CHHS on the Microsoft overseas data storage case that went to the U.S. Supreme Court. Guest is John Grimm from Thales eSecurity on their Global Encryption Trends study that they put together along with the Ponemon Institute.
This week, Stefano Righi of UEFI joins us for an interview! Sven Morgenroth, Security Researcher at Netsparker joins us for the Technical Segment! In the news, we have updates from FinFisher, Equifax, Facebook, and more on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode550 Visit https://www.securityweekly.com/psw for all the latest episodes!
This week, Stefano Righi of UEFI joins us for an interview! Sven Morgenroth, Security Researcher at Netsparker joins us for the Technical Segment! In the news, we have updates from FinFisher, Equifax, Facebook, and more on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode550 Visit https://www.securityweekly.com/psw for all the latest episodes!
Hackerangriffe, Computerviren und Schadsoftware kommen meist von Kriminellen. Aber auch Staaten setzten sie ein. Nun hat Windowshersteller Microsoft einen solchen Staatstrojaner entdeckt und warnt davor. - AutorIn: Jörg Schieb
Enregistré le 2017/09/05
In today's podcast, we review reports saying that Deloitte has been hacked. Details are sparse but the story is developing. A Verizon AWS S3 bucket is found exposed online. Locky is being spammed out in quantity. Phantom Squad hoods run a DDoS protection racket. Kinetic tensions the US, Tehran, and North Korea raise expectations of cyber offensives. Chinese intelligence thought behind CCleaner backdoor. Unnamed ISPs accused of FinFisher spyware campaign complicity. Chris Poulin from BAH on vulnerabilities in connected cars. And Carlos Danger will go to the Big House. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
In today's podcast, we hear that the EDGAR breach is being seen as a blow to confidence in financial system. Credit bureaus continue to receive heightened scrutiny after the Equifax breach. FinFisher campaign suggests ISPs may have been compromised. The backdoor in CCleaner seems to have targeted specific companies. US Forces Korea personnel receive a bogus noncombatant evacuation order. Someone behind Locky watches a lot of Game of Thrones. Malek Ben Salem from Accenture Labs with a new attack vector that uses power management systems. Guest is Robert Sell sharing his experience participating in a DEFCON capture the flag. And Thomas the Tank Engine would never do what some skids show him doing.
In today's podcast, we hear about Yahoo's disclosure of a record-setting breach—over a billion customer accounts are affected. CyberWire editor John Petrik collects industry comments on the breach. Microsoft reports finding "FinFisher-like" spyware in the wild. US investigation of Russian election hacking continues. The case for and against Fancy Bear is being made by observers, but the Intelligence Community says it will keep its conclusions to itself until the investigation is complete. ThreatConnect describes "faketivism." And the ShadowBrokers are back, and their broken English hasn’t gotten more convincing.
AT&T Data Security Analysts discuss the AT&T Cybersecurity Conference, Cybersecurity Awareness Month, Android exploits, Diffie-Hellman , FinFisher, wifi attacks, and the Internet Weather Report. Originally recorded October 20, 2015.
F*ck the attribution, show us your .idb! Morgan Marquis-Boire Senior Researcher, Citizen Lab Marion Marschalek Malware reverse engineer, Cyphort Inc Claudio Guarnieri Creator and lead developer, Cuckoo Sandbox Over the past few years state-sponsored hacking has received attention that would make a rockstar jealous. Discussion of malware has shifted in focus from ‘cyber crime’ to ‘cyber weapons’, there have been intense public debates on attribution of various high profile attacks, and heated policy discussion surrounding regulation of offensive tools. We’ve also seen the sale of ‘lawful intercept’ malware become a global trade. While a substantial focus has revolved around the activities of China, Russia, and Iran, recent discoveries have revealed the capabilities of Western nations such as WARRIORPRIDE aka. Regin (FVEY) and SNOWGLOBE aka. Babar (France). Many have argued that digital operations are a logical, even desirable part of modern statecraft. The step from digital espionage to political persecution is, however, a small one. Commercially written, offensive software from companies like FinFisher and Hacking Team has been sold to repressive regimes under the guise of ‘governmental intrusion’ software. Nation state hacking operations are frequently well-funded, difficult to attribute, and rarely prosecuted even if substantive evidence can be discovered. While efforts have been made to counter this problem, proof is hard to find and even more difficult to correctly interpret. This creates a perfect storm of conditions for lies, vendor lies, and flimsy attribution. In this talk we will unveil the mess happening backstage when uncovering nation state malware, lead the audience on the track of actor attribution, and cover what happens when you find other players on the hunt. We will present a novel approach to binary stylometry, which helps matching binaries of equal authorship and allows credible linking of binaries into the bigger picture of an attack. After this session the audience will have a better understanding of what happened behind the scenes when the next big APT report surfaces. Morgan Marquis-Boire is a Senior Researcher at the Citizen Lab, University of Toronto. He is the Director of Security for First Look Media and a contributing writer for The Intercept. Prior to this, he worked on the security team at Google. He is a Special Advisor to the Electronic Frontier Foundation in San Francisco and an Advisor to the United Nations Inter-regional Crime and Justice Research Institute. In addition to this, he serves as a member of the Freedom of the Press Foundation advisory board and as an advisor to Amnesty International. Marion is a malware reverse engineer on duty for Cyphort Inc., focussing on the analysis of emerging threats and exploring novel methods of threat detection. She teaches malware analysis at University of Applied Sciences St. Pölten and frequently appears as speaker at international conferences. Two years ago Marion won Halvar Flake's reverse engineering challenge for females, since then she set out to threaten cyber criminals. She practices martial arts and has a vivid passion for taking things apart. Preferably, other people's things. Claudio is a security researcher mostly specialized in the analysis of malware, botnets and computer attacks in general. He's a core member of The Honeynet Project and created the open source malware analysis software Cuckoo Sandbox and Viper and runs the Malwr free service. Claudio published abundant research on botnets and targeted attacks and presented at conferences such as Hack In The Box, BlackHat, Chaos Communication Congress and many more. In recent years he devoted his attention especially on issues of privacy and surveillance and published numerous articles on surveillance vendors such as FinFisher and HackingTeam with the Citizen Lab as well as on NSA/GCHQ and Five Eyes surveillance capabilities with The Intercept and Der Spiegel. Claudio also contributes to Global Voices Advocacy. He continuously researches and writes on government surveillance and threats to journalists and dissidents worldwide and supports human rights organisations with operational security and emergency response.
Have you heard of those scam phone calls from "Windows" where the person on the other end of the phone claims to know there's a problem with your computer ("Is it running more slowly lately?") and they even have you test it out by running some commands and referring to common files as viruses. Then they're so friendly that if you simply go to their web site and download a couple files, they'll clean it all up for you. Maybe one of the worst people they could possibly call would be the head guy at Black Hills Information Security, John Strand. Yep, and John was only too happy to give them just enough rope to hang themselves. Listen along for how John was also able to irritate the scammers. Then we tried to get going on the stories of the week and were off to a great start but very quickly got derailed with a story from Australia. Apparently the Australian government is looking to put a filter on the internet in their country that would completely block all perceived porn sites. If someone wants to be able to access porn web sites from inside Australia, they'd need to "opt out" of the filter by simply contacting the government. What could possibly go wrong with this idea? I'm certain that there wouldn't be any privacy issues whatsoever. Additionally, wasn't the internet basically invented for the purpose of porn consumption? Ok, back to the rest of the stories discussed. Remember a few weeks ago when we talked about a scumbag who intruded upon a family through their baby monitor and was able to shout at the baby and parents through the monitor. Well, the Federal Trade Commission (FTC) has slapped down a manufacturer of different brand of baby monitor and said they may no longer market their product as being "secure" until they fix these flaws. The flaws being that they say the feeds are private while anyone can view them on the internet at least in part because the authentication from the internet is clear-text and needs to be encrypted. Here we are already seeing where it seems like a great idea for manufacturers to internetify their product but don't completely understand all aspects of that or at least don't understand basic security needs. I don't know which is the chicken and which is the egg yet, but with the promise of IPv6, we're going to eventually see just about everything we own trying to have some sort of presence on the internet and these basic security precautions will need to be met. Allison alerted us to the fact that Burp Suite got an upgrade this week. I'm constantly amazed at how much Burp can do especially when you consider the $300 price. Sure, there's also ZAP available from OWASP for even cheaper (free) but I think Burp is one of those tools that just about everyone uses because of its awesomeness. If I had to pick out just one of the new features, I'd mention the "Plug 'n Hack". According to Portswigger: "This enables faster configuration of the browser to work with Burp, by automatically configuring the browser to use Burp as its proxy, and installing Burp's CA certificate in the browser." We also found out more details this week about another trojan called FinFisher by Gamma. The existence of FinFisher had been previously revealed but in a presentation by Mikko Hypponen, he talked about some of the things that the tool can do, including cracking WPA1 and WPA2, decrypting common email sites and even copying over a whole drive encrypted with TrueCrypt via a USB stick. Reportedly, the tool had only been available to governments in order to conduct their own national intelligence, but by now there's no way of knowing whether this has slipped out into the wild and in the hands of just anyone. At Black Hat this year, Mike Shema from Qualys talked about a new way to possibly prevent CSRF. As we've seen in the past, the only way to reliably prevent the attack is to place a token in the action and have the server validate that token. This requires that the developer of the application understand CSRF and understand an API for creating the token, and to also implement it properly. If you're in the training or penetration testing business, this sounds like a great thing for job security. However there are millions of developers worldwide and training all of them may take a while. Heck, look at how prevalent much simpler attacks like SQL injection and Cross Site Scripting are. Do we really think that we'll be able to "train away" CSRF? This is where Shema has the idea of "Session Origin Security" and put the token in the browser. Now instead of training millions of developers, we simply get about five browser developers to jump on board. But the gang was a little skeptical about other plugins to work around this as well as breaking valid sessions and backward compatibility. We also wondered whether it may make more sense to allow the browser to choose whether it wants the CSRF protection and turn it on by default and let the user turn it off if there's a good reason to. These all seem to be questions that Shema and his team are looking into. Jack told us about a post from Gunnar Peterson and the "Five Guys Burgers Method of Security". I don't think it means where it's so good for the first ten minutes and then you feel like crap about it for the next few hours. It's the idea that when you go to a Five Guys (and if you haven't yet, you should) they have two things, burgers and fries. They do these two things exceptionally well. They haven't morphed into also being a chicken place, and a fish place and a milkshake place and a coffee place and then letting the overall quality slip. They are focused on doing their two things and doing them extremely well. And I wondered if this is where so many in the security industry get frustrated and eventually burned out. As John brought up, the frustration often comes when there is so much compliance and documentation required, which yeah, I can see that as well. Who likes checking boxes and meeting with guys in ties to explain how you meet the PII, PCI, SOX and whatever other acronyms? I also wonder if there's also frustration in that we're hired to be "the security person" and we have areas that we're good at and enjoy. Whether that's network security, mobile security, web security or whichever. But due to budgets and many other reasons, we are expected to be experts in all areas, much unlike Five Guys. The Five Guys philosophy is if you want a great chicken sandwich, go to a chicken place. If you want a great milkshake, go to a milkshake joint. However in our jobs, we are the burgers and fries and chicken and fish and milkshakes and we're expected to be perfect at all of them. Anyway, it's an interesting take. Do you have a Web site? No? Ok, then you're probably safe. Robert "Rsnake" Hansen put together an infographic about all the different things that you need to worry about today when securing your web site. It started out as a joke but then got a bit too close to reality and finally just got head-shakingly scary. Finally, if you haven't already, check to see if your web site is "locked." Simply do a whois on your site and see if you have at a minimum a status of "ClientTransferProhibited." Some have said the recent NY Times hack was able to happen because the domain was not locked and the Syrian Electronic Army (SEA) was able to get the DNS credentials from someone and then change the DNS records to their own server. But if your DNS is locked, it'll take a bit more work to make the updates. Your registrar will go through additional validation steps before the DNS records are updated. This is likely enough that if someone is looking to hijack web sites, they'll realize yours isn't worth the both and move on to an easier target. With Congress possibly authorizing an attack on Syria and with the twelfth anniversary of the September 11, 2001 attacks upcoming, it would not be surprising to see another round of attacks on web infrastructure. So take this very easy step and protect your site.
Episode 0x23 -- Post RSA Actual News Recovery takes time. There has not been enough time. There's really not anything significant to note off the top. There's much going on in the world of infosec. I wish that it weren't as true, but even with the wildness of RSA, the cybers never sleep. You might want to stay until the end of the show to hear about a CONTEST and something even cooler... Upcoming this week... Lots of News Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag and THE DEEP DIVE Our new weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: News and Commentary Miniduke is older than we thought (Miniduke tells time in China) Cloudflare dDoS post mortem Google services should not require real names: Vint Cerf Oracle Issues Emergency Java Update Wireless brain sensor pack. Future - here we come! The Lightning Digital AV Adapter Surprise When will we trust robots? The Breach Report Evernote Security Notice: Service-wide Password Reset Evernote hacked: Emails, encrypted passwords stolen But it's ok, there will be 2 factor auth someday Critics say Evernote breach was avoidable. Envelopes mailed to 26k retired government employees in N.C. exposes SSNs Encrypted laptop, casino reports belonging to federal agency stolen from rental car in Calgary City of Owen Sound websites offline due to porn hack SCADA / Cyber, cyber... etc Information Assurance Certification Review Board: Certified SCADA Security Architect (CSSA) NEWS TO NO ONE: SANS SCADA and Process Control Security Survey - the state of the industry is discouraging Recent 10-Ks mentioning "cyber" incidents Canadian Anti-hacking agency slow to learn about Chinese cyberattack Symantec: work on Stuxnet worm started two years earlier than first thought SCADA 'Sandbox' Tests Real-World Impact Of Cyberattacks On Critical Infrastructure DERP Jailed hacker allowed into IT class, hacks prison computers Nearly Every NYC Crime Involves Cyber, Says Manhattan DA Mailbag / Bizarro Land Dearest Son, Why do you people always talk about "the echo chamber"? What is the echo chamber for? Love, Mom Deep Dive - Government Malware! discuss (Finfisher, Hacking Team)Zero Day Doc Briefly - NO ARGUING OR DISCUSSION ALLOWED Recon 2013 CFP opened APT 1 goes back years There's a vuln in sudo (yes, that sudo) Quick and dirty pcap slicing with tshark and friends Liquidmatrix Staff Projects The Liquidmatrix Vegas Party- More news to follow The BSidesLV Ticket Give-away- Three tickets up for grabs: best original piece of artwork incorporating a security rock star; bonus points for using a unicorn best rap song about a major breach best poem describing a vendor DERP Judging will be done by The Liquidmatrix Intern. Mocking will be done by us. I'd suggest you start buying a vote early. The Security Conference Library Contribute to the Strategic Defense Execution Standard (#SDES) and you'll be Doing Infosec Right in no time. If you're interested in helping out with openCERT.ca, drop a line to info@openCERT.ca Upcoming Appearances: James speaking at Thotcon, BSidesChicago, BSidesRochester and Training (with Rich Mogull) at BHUSA. Dave will be at Secure Dusseldorf, Infosecurity Europe, Black Hat, DEF CON, Secure Asia In Closing RIP Stompin' Tom We'll leave a light on. everyday is CTF! go set up a team Signing up for a SANS course? Be sure to use the code "Liquidmatrix_150" and save $150 off the course fee! Seacrest Says: I'm drinking beer at HouSec bitches! Creative Commons license: BY-NC-SA
Justin and Jason discuss how much time they spend on the podcast, Justin's thoughts on becoming a multi-product entrepreneur, Seth Godin's book - The Dip, how much time should be devoted to consulting vs. working on a side business, potential email strategies for recruiting experts, building an email reminder system for AnyFu, problems with the donation model, the Node.js profiler that Jason and Guyon built for Uber, the misleading CNN article about why we need a longer school year and the other side of the story, Justin's idea for creating an ego depletion meter, the challenges of scheduling the first Catalyst Academy session, the Mathigon mathematics education project, how Oracle is moving MySQL towards the closed-source model, why Reddit only has two MySQL Tables - Thing and Data, Jason's idea for doing lazy schema migrations, why Uber is moving from MySQL to ProstgreSQL (PostGIS), how self-driving cars were just approved by the California legislature and the rise of drones, the free diving world records, why there is no American Ninja Warrior, why Darpa thinks the future of computing is analog, HP and Hynix's one-year delay on memristors, how the Flynn Effect isn't about people getting smarter, how the New York Times has been colluding with the CIA to boost Obama's reelection chances, how the spyware known as FinFisher can take over your mobile device, the Pirate Bay founder who was arrested in Cambodia, how the U.S. is probably using Sweden to get at Julian Assange, and finally how Obama's justice department has granted final immunity to Bush's CIA torturers.