Hacker group
POPULARITY
In this episode, we delve into the multifaceted career of Joe Grand, also known as “Kingpin.” A renowned hardware hacker and computer engineer, Joe has been exploring and manipulating electronic systems since the 1980s. As a former member of the legendary hacker collective L0pht Heavy Industries, he has significantly contributed to the cybersecurity landscape. Joe is also the proprietor of Grand Idea Studio, a research and development firm, and has shared his expertise through various media, including his YouTube channel. Join us as we explore Joe's unique perspective on hacking, engineering, and his extraordinary journey in the world of technology.https://linktr.ee/joegrandSponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Support for this show comes from Lumen. It used to be hard to track your metabolism, but Lumen is a little device that you breath into which tells you if your burning fat or carbs, fast and easy and have your results in seconds. And knowing that will help you know what kind of food your body needs. And knowing that will help you with your health goals like losing weight or gaining muscle. Take the next step to improving your health go to lumen.me/darknet.Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let's start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.
Die IT-Security Pros unter euch müssen heute stark sein. Es geht nur wenig um Cyber... aber dafür um "war", also traditionellen, konventionellen Krieg. Genauer, es geht um das Konzept des hybriden Krieges und seine Auswirkungen auf die gegenwärtige geopolitische Lage, insbesondere im Kontext des Russland-Ukraine-Konflikts. Die Folge beleuchtet, wie hybride Kriegsführung - eine Kombination aus militärischen Operationen, Sabotage, Cyberangriffen, Informationskrieg, Desinformationskampagnen und wirtschaftlichem Druck - die traditionellen Grenzen zwischen Krieg und Frieden verwischt. Dabei betrachte ich das Buch "Strategy" von Liddell Hart, der sich intensiv mit der Geschichte diverser Kriege befasst hat und daraus "strategische Lehren" zieht, die auch heute noch anwendbar sind. Wir schauen uns an, wie Harts Erkenntnisse über psychologische Kriegsführung und die Bedeutung von Informationen und Propaganda im modernen Kontext relevant bleiben.Ein besonderer Fokus liegt auf der Frage, ob die aktuelle Situation eine Vorstufe zu einem konventionellen Krieg darstellt oder ob ""hybrider Krieg" als eigenständige Form des Konflikts betrachtet werden sollte. Die Podcastfolge erörtert, verschiedene Taktiken des hybriden Kriegs, die von Cyberangriffen bis hin zur Unterstützung autoritärer Bewegungen reichen, die Sicherheit Europas und der NATO beeinflussen könnten. Shownotes Lukas Milevski - The Baltic Defense Line US general says Russian army has grown by 15 percent since pre-Ukraine war NATO Must Prepare to Defend Its Weakest Point—the Suwalki Corridor Wie Russland für einen langen Krieg rekrutiert B. H. Liddell Hart, Strategy (1954) Basil H. Liddell Hart: His Applicability to Modern War A Very Special Relationship: Basil Liddell Hart, Wehrmacht Generals and the Debate on West German Rearmament, 1945–1953 Basil Liddell Hart and the Art of Peace Hybrid warfare: The continuation of ambiguity by other means The Evolution of Russian Hybrid Warfare: Executive Summary BMVg: Hybride Bedrohungen Timecodes 00:00:20 Intro 00:03:11 Liddell Hart und sein Buch "Strategy" 00:07:15 Konzept Hybrider Krieg 00:09:40 Hart's These: Krieg ist mehr als Gewalt 00:12:00 The art of war 00:15:00 Informationskrieg 00:22:00 Dislocation 00:26:00 Kritik 00:28:00 Fazit Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter. Dieser Cyber Security Podcast erscheint auf iTunes, Spotify, PocketCast, Stitcher oder via RSS Feed. Am Anfang folgt noch ein kleiner Nachtrag zur letzten Folge mit den Top 10 IT-Sicherheitstipps, nachdem mich etwas Feedback dazu erreichte. Sound & Copyright Modem Sound, Creative Commons. © Vint Cerf, "Internet shows up in December 1975", in: IEEE Computer Society, Computing Conversations: Vint Cerf on the History of Packets, December 2012. © L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998. © Barack Obama, Cybersecurity and Consumer Protection Summit Address, 13 February 2015, Stanford University, Stanford, CA. © Michael Hayden, "We kill people based on meta-data," in: The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating the NSA, April 2014. © Bruce Schneier, "Complexity is the enemy of security, in IEEE Computer Society, Bruce Schneier: Building Cryptographic Systems, March 2016. Beats, Bass & Music created with Apple GarageBand © Computer History 1946, ENIAC, https://www.youtube.com/watch?v=bGk9W65vXNA
In Teil zwei dieser mehrteiligen Reihe über die Geschichte der IT-Sicherheit geht es heute um die 1960er Jahre. Zunächst geht es um die wichtigsten technologischen Innovationen der Zeit, namentlich die kleineren, schnelleren Mini-Computer, die in immer mehr Unternehmen und Universitäten Einzug erhalten. Die wichtigste Neuerung der Zeit ist das "time sharing", ein neuer Modus des Multitasking an Computern, welcher enorme IT-Sicherheitsimplikationen hat. Time Sharing erschafft das zentrale IT-Sicherheitsproblem überhaupt, nämlich dass sich Programme im Speicher gegenseitig manipulieren können. Mit time sharing verändert sich also der Computing Kontext, worum es im zweiten Kapitel geht. Zudem entstehen neue Bedrohungen, insbesondere die frühe Hackerkultur an den Unis. Wir beleuchten frühes Hacking wie "phone phreaking" und "dumpster diving". Das macht es erforderlich, dass neue IT-Sicherheitsmaßnahmen, wie z.B. Backup-Policies und die ersten Passwörter erfunden werden. Darum geht es in Kapitel 4. PS: Hier könnt ihr noch einmal die erste Folge nachhören und wer lieber liest, kann hier die englische Fassung der Folge über die 1960er nachlesen. Shownotes Computer History Timeline, https://www.computerhistory.org/timeline/ Meijer/Hoepman/Jacobs/Poll (2007), Computer Security Through Correctness and Transparency, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Yost (2007), A History of Computer Security Standards, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. DeNardis (2007), A History of Internet Security, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Brenner (2007), History of Computer Crime, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. Biene-Hershey (2007), IT Security and IT Auditing Between 1960 and 2000, in: de Leeuw/Bergstra, The History of Information Security: A Comprehensive Handbook, Elsevier. PDP-1 - Wikipedia Apollo Guidance Computer - Wikipedia Sabre (travel reservation system) - Wikipedia The first industrial robot, https://www.automate.org/robotics/engelberger/joseph-engelberger-unimate Steven Levy, Hackers, https://www.gutenberg.org/cache/epub/729/pg729-images.html https://en.wikipedia.org/wiki/Darwin_(programming_game) Time Sharing, https://www.youtube.com/watch?v=Q07PhW5sCEk Percepticon Folge zum ARPANET, https://open.spotify.com/episode/1pirIO5dgnvGfneWmeYBbj Timecodes 01:05 Kapitel 1: Erfindungen der 1960er, PDP-1 03:00 neue Computer Anwendungen, Programmiersprachen, Miniaturisierung 05:30 Digitalisierung der Wirtschaft, SABRE, Robotik, Modems 09:07 Kapitel 2: Computing in frühen Rechenzentren, Computer Priesthood‚ 13:06 Compatible Time Sharing System 17:20 Kapitel 3: Bedrohungen, 18:30 Das IT-Sicherheitsproblem schlechthin, DARWIN 22:06 Willis Ware Report 25:50 Hacker Kultur, phone phreaking, dumpster diving 31:05 Kapitel 4: IT Sicherheitskontrollen, Security Policies, Backups, Passwörter Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter. Dieser Cyber Security Podcast erscheint auf iTunes, Spotify, PocketCast, Stitcher oder via RSS Feed. Am Anfang folgt noch ein kleiner Nachtrag zur letzten Folge mit den Top 10 IT-Sicherheitstipps, nachdem mich etwas Feedback dazu erreichte. Sound & Copyright Modem Sound, Creative Commons. © Vint Cerf, "Internet shows up in December 1975", in: IEEE Computer Society, Computing Conversations: Vint Cerf on the History of Packets, December 2012. © L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998.
Cyberkriminalität hat in den letzten Jahren stark zugenommen. Ob Datenklau, Identitätsdiebstahl, Cybermobbing oder Betrug – die Bedrohungen im digitalen Raum sind vielfältig und betreffen jeden, der online unterwegs ist. Genau darum geht es im neuen Buch von Eva Wolfangel - Ein falscher Click. Hackern auf der Spur. Warum der Cyberkrieg uns alle betrifft. Das Buch ist eine klasse Einführung in die Geschichte von Cyberkriminalität und staatlichem Hacking. Das Buch ist voller spannender Fallstudien und Fälle über Schadsoftware und Cyberkriminalität: Zeus/GameoverZeus, TrickBot, StormWorm, Conficker, Industroyer,, Stuxnet, Duqu, Flame, NotPetya, Wannacry, die Shadowbroker leaks, der Lazarus Bangladesh heist, Triton, die Causa Lilith Wittmann und die eID App und Pegasus kommen vor. Ich spreche darüber mit Eva und wir picken uns ein paar spannende Fälle heraus. Es geht u. A. um die Entstehung und Professionalisierung von Cyberkriminalität, Phishing und Social Engineering. Es geht um die cyberkriminellen Raubzüge von Nordkorea mit seiner Lazarus Gruppe, aber auch um andere staatliche Cyber-Operationen wie Stuxnet und WannaCry. Danach reden wir darüber, warum rein technische IT-Sicherheit oft scheitert, nämlich weil sie den Faktor Mensch nicht richtig versteht. Es geht um „usable security" und „user awareness" sowie Vertrauen und ethisches Hacken. Danke an Eva für das tolle Buch und die Aufnahme! Shownotes Eva Wolfangels Website: https://ewo.name/ Buch: Ein falscher Click: https://www.penguinrandomhouse.de/Paperback/Ein-falscher-Klick/Eva-Wolfangel/Penguin/e602114.rhd Eric Rosenbach, https://www.hks.harvard.edu/faculty/eric-rosenbach Lazarus Group: https://en.wikipedia.org/wiki/Lazarus_Group Prof. Angela Sasse: https://informatik.rub.de/sasse/ Windows 11 Pass keys, https://www.heise.de/news/Passwortlose-Zukunft-Passkeys-ziehen-in-Windows-Vorschau-ein-9199679.html Timecodes 00:03:50 Message des Buchs + Motivation 00:06:41 Phishing & Social Engineering 00:10:27 Nordkorea, Lazarus & 2016 SWIFT Heist 00:14:00 Stuxnet 00:22:05 Ursprünge und Professionalisierung von Cybercrime 00:30:00 Gentlemen Agreements und kriminelle Energie 00:32:50 „usable security“, „user awareness“ und der Faktor Mensch 00:43:00 Praktische IT-Sicherheitstips vs. „Social engineering“ 00:48:08 Vertrauen & Zero Trust & Ethisches Hacken Hinweise Blog & Podcast über die dunkle Seite der Digitalisierung: Cyber-Sicherheit, Cyber-War, Spionage, Hacker, Sabotage, Subversion und Desinformation. Kommentare und konstruktives Feedback bitte auf percepticon.de oder via Twitter. Dieser Cyber Security Podcast erscheint auf iTunes, Spotify, PocketCast, Stitcher oder via RSS Feed. Sound & Copyright Modem Sound, Creative Commons. © Vint Cerf, "Internet shows up in December 1975", in: IEEE Computer Society, Computing Conversations: Vint Cerf on the History of Packets, December 2012. © L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998. © Barack Obama, Cybersecurity and Consumer Protection Summit Address, 13 February 2015, Stanford University, Stanford, CA. © Michael Hayden, "We kill people based on meta-data," in: The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating the NSA, April 2014. © Bruce Schneier, "Complexity is the enemy of security, in IEEE Computer Society, Bruce Schneier: Building Cryptographic Systems, March 2016. Beats, Bass & Music created with Apple GarageBand © Tagesthemen 10.6.2013 https://www.youtube.com/watch?v=PfaFf6EvP3I © CBS 60 Minutes, Duqu, Liam O Murchu of Symantec: https://www.youtube.com/watch?v=XpdazjRx3NM © CGTN, Huawei: https://www.youtube.com/watch?v=LRGXPVw0LIo © Miko Hypnosen, Ted, : https://www.youtube.com/watch?v=9CqVYUOjHLw]
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/vault-psw-1
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/vault-psw-1
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/vault-psw-1
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/vault-psw-1
Cris Thomas is a founding member of L0pht Heavy Industries, one of the most influential hacker groups in history. Thomas' new book follows the hacker 'Space Rogue' as he takes you on a journey through the magical hacker scene of the 1990s. The L0pht hacker collective no longer exists, but its legacy lives on. This microcast is a short version of our full interview with Thomas, which you can listen to at https://soundcloud.com/cybercrimemagazine/space-rogue-how-the-hackers-known-as-l0pht-changed-the-world-cris-thomas-author
Hacker Cris Thomas – better known by his old bulletin board system handle Space Rogue – has witnessed the infosec community grow from a hodgepodge network of hacking collectives to a multibillion dollar industry. Space Rogue was a member of the L0pht Heavy Industries hacker group that made its name poking holes in premier products from burgeoning tech giants like Microsoft and Oracle. Now Global Lead of Policy and Special Initiatives at IBM, he is also author of a new memoir recounting his experiences from the “magical hacker scene” of the 1990s, Space Rogue: How the Hackers Known As L0pht Changed the World. In the latest episode of WE'RE IN!, Space Rogue shares his side of the story from L0pht's influential May 1998 testimony before Congress, in which the hackers warned of glaring security vulnerabilities that remain relevant to this day. --------Tune in to hear more from Space Rogue on: * Tales from early meetings of the famous hacker quarterly 2600 * The value of college versus certifications for anyone seeking to launch an infosec career* The fragility of the modern internet
Cris Thomas is a founding member of L0pht Heavy Industries, one of the most influential hacker groups in history. Thomas' new book follows the hacker 'Space Rogue' as he takes you on a journey through the magical hacker scene of the 1990s. The L0pht hacker collective no longer exists, but its legacy lives on. In this interview on the Cybercrime Magazine Podcast, Thomas looks back on the early days of L0pht.
Organizations today operate under the constant looming threat of cyber attacks. While reactive cybersecurity measures will help organizations respond to past and present threats, offensive measures are the only chance to get ahead of attackers and beat them to the punch. There is now a greater call for offensive solutions like penetration testing and red teaming to evaluate environments so security gaps can be identified and closed before a breach. Join us as we discuss how these solutions work both independently and together, as well as practical ways organizations can build or mature an offensive security strategy. Segment Resources: https://www.coresecurity.com/resources/videos/when-use-pen-testing-red-teaming-or-both?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly https://www.coresecurity.com/resources/guides/complete-guide-layering-offensive-security?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly https://www.coresecurity.com/resources/datasheets/offensive-security-advanced-bundle?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly This segment is sponsored by Fortra. Visit https://securityweekly.com/fortra to learn more about them! The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World” is available for pre-order now. The new book, to be released on February 16, 2023, will cover the influential hacking group L0pht Heavy Industries, the hacker underground of the 1990s, the L0pht's rise to prominence, their testimony in front of the US Senate, their claim of being able to “take down the Internet”, and how their legacy continues to shape the security of the online world today. Segment Resources: https://securityweekly.com/spacerogue http://www.spacerogue.net Inka talks about harnessing Behavioural Science (BS) to influence people's cyber security behaviours. Focusing on psychology theories (e.g. Behaviour change wheel) she explores some of our barriers (and motivations) to cybersecurity. What are our FMEs ('frequently made excuses') to taking protective action online and how organisations' could create a supportive security culture. Segment Resources: Lead researcher for RISCS / UK Home Office funded research project: Cyber Security Quirks: Personalised Interventions for Human Cyber Resilience https://www.riscs.org.uk/project/cyber-security-quirks-personalised-interventions-for-human-cyber-resilience/ Inka will be presenting this research at the Impact Conference on 2.3.2023 https://www.theimpactconference.com/ Lead researcher/author of the Annual Cybersecurity Attitudes and Behaviours Report (2021 and 2022) https://www.cybsafe.com/whitepapers/cybersecurity-attitudes-and-behaviors-report/ SebDB (most comprehensive cyber security behaviour database) https://www.cybsafe.com/research/security-behaviour-database/ Personality and digital footprints whitepapers: https://www.cybsafe.com/whitepapers/personality-and-digital-footprints/ How to measure security behaviour https://www.cybsafe.com/e-books/how-to-measure-behavior-long-read/ Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw306
Organizations today operate under the constant looming threat of cyber attacks. While reactive cybersecurity measures will help organizations respond to past and present threats, offensive measures are the only chance to get ahead of attackers and beat them to the punch. There is now a greater call for offensive solutions like penetration testing and red teaming to evaluate environments so security gaps can be identified and closed before a breach. Join us as we discuss how these solutions work both independently and together, as well as practical ways organizations can build or mature an offensive security strategy. Segment Resources: https://www.coresecurity.com/resources/videos/when-use-pen-testing-red-teaming-or-both?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly https://www.coresecurity.com/resources/guides/complete-guide-layering-offensive-security?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly https://www.coresecurity.com/resources/datasheets/offensive-security-advanced-bundle?code=cmp-0000011540&ls=717710006&utm_source=hubspot&utm_medium=email&utm_campaign=cts-security-weekly This segment is sponsored by Fortra. Visit https://securityweekly.com/fortra to learn more about them! The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World” is available for pre-order now. The new book, to be released on February 16, 2023, will cover the influential hacking group L0pht Heavy Industries, the hacker underground of the 1990s, the L0pht's rise to prominence, their testimony in front of the US Senate, their claim of being able to “take down the Internet”, and how their legacy continues to shape the security of the online world today. Segment Resources: https://securityweekly.com/spacerogue http://www.spacerogue.net Inka talks about harnessing Behavioural Science (BS) to influence people's cyber security behaviours. Focusing on psychology theories (e.g. Behaviour change wheel) she explores some of our barriers (and motivations) to cybersecurity. What are our FMEs ('frequently made excuses') to taking protective action online and how organisations' could create a supportive security culture. Segment Resources: Lead researcher for RISCS / UK Home Office funded research project: Cyber Security Quirks: Personalised Interventions for Human Cyber Resilience https://www.riscs.org.uk/project/cyber-security-quirks-personalised-interventions-for-human-cyber-resilience/ Inka will be presenting this research at the Impact Conference on 2.3.2023 https://www.theimpactconference.com/ Lead researcher/author of the Annual Cybersecurity Attitudes and Behaviours Report (2021 and 2022) https://www.cybsafe.com/whitepapers/cybersecurity-attitudes-and-behaviors-report/ SebDB (most comprehensive cyber security behaviour database) https://www.cybsafe.com/research/security-behaviour-database/ Personality and digital footprints whitepapers: https://www.cybsafe.com/whitepapers/personality-and-digital-footprints/ How to measure security behaviour https://www.cybsafe.com/e-books/how-to-measure-behavior-long-read/ Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw306
The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World” is available for pre-order now. The new book, to be released on February 16, 2023, will cover the influential hacking group L0pht Heavy Industries, the hacker underground of the 1990s, the L0pht's rise to prominence, their testimony in front of the US Senate, their claim of being able to “take down the Internet”, and how their legacy continues to shape the security of the online world today. Segment Resources: https://securityweekly.com/spacerogue http://www.spacerogue.net Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw306
The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World” is available for pre-order now. The new book, to be released on February 16, 2023, will cover the influential hacking group L0pht Heavy Industries, the hacker underground of the 1990s, the L0pht's rise to prominence, their testimony in front of the US Senate, their claim of being able to “take down the Internet”, and how their legacy continues to shape the security of the online world today. Segment Resources: https://securityweekly.com/spacerogue http://www.spacerogue.net Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw306
In this episode, Josh invites MobileCoin CTO Sara Drakeley to co-host an interview with Joe Grand, prominent hardware hacker, electrical engineer, and inventor. Joe recently made waves with a YouTube video showcasing a successful hack of a Trezor hardware crypto wallet in which he retrieved $2 million of cryptocurrency for a client who lost his pin. Sara asks Joe about his youth as a "technological juvenile delinquent" and getting arrested for hacking. Joe reminisces about joining the legendary hacker collective L0pht Heavy Industries as a teenager. Josh asks for the inside scoop on some of Joe's most difficult hacks, and Joe offers tips and tricks for those interested in getting into the hacking game.
Joe Grand is a product designer, hardware hacker, and the founder of Grand Idea Studio, Inc. He specializes in creating, exploring, manipulating, and teaching about electronic devices. Also known as "Kingpin", Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of the hacker ethos and the importance of independent security vulnerability research. He also brought engineering to the masses as a co-host of Discovery Channel's Prototype This, which followed the real-life design process of a unique prototype every episode. Story in Cybercrime Magazine: https://cybersecurityventures.com/bringing-out-the-best-in-hackers/
You've probably heard the hype: IoT is the next frontier in the information revolution that promises to make all our lives easier… And that's doubly true for hackers. In this episode, I'm joined by Joe Grand, also known as Kingpin, a computer engineer, hardware hacker, product designer, teacher, advisor, daddy, honorary doctor, TV host, member of legendary hacker group L0pht Heavy Industries, proprietor of Grand Idea Studio (www.grandideastudio.com), and partner in offspec.io, a cryptocurrency wallet recovery service. He has been creating, exploring, and manipulating electronic systems since the 1980s and is hereto take a look at the vulnerabilities hackers exploit in IoT (and how you can defend against them). Join us as we discuss: - Why, despite what many believe, hardware is no less vulnerable than software - The common vulnerabilities in IoT devices and what you can do about them - How security standards factor into IoT security To hear this episode, and many more like it, you can subscribe to The Virtual CISO Podcast here. If you don't use Apple Podcasts, you can find all our episodes here. Listening on a desktop & can't see the links? Just search for The Virtual CISO Podcast in your favorite podcast player.
Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, exploring, manipulating, and teaching about electronic devices.Also known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of the hacker ethos and the importance of independent security vulnerability research. He also brought engineering to the masses as a co-host of Discovery Channel’s Prototype This, which followed the real-life design process of a unique prototype every episode.Co-Host Pete Klabe joins me as Kingpin talks us through how he himself is wired. Topics include his background as a technological juvenile delinquent, the hidden benefits of Imposter Syndrome, dealing with the rollercoaster ride of success and failure, IoT, his ULTIMATE Smart-Home setup, ulterior motives of modern technology, and his awesome prototype of a pizza compass that has since replaced my GPS System.Tony the Bartender operationalizes a “Kombucha Grand Mule”.Support the show (https://www.patreon.com/barcodepodcast)
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries”, and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore. The post ‘L0pht’, Part 2 – The End appeared first on Malicious Life.
Ann talks with security expert and co-founder of Veracode, Chris Wysopal about the changing scale and stakes of hacks. Their conversation delves into how cybercriminals monetize attacks, the rise of attacks by nation states, and what hacktivists are up to these days. They also look at vulnerabilities in election infrastructure in the U.S. through the lens of vendor expectations and supply chain security. Hear Ann and Chris' perspectives on the main types, motivations, and targets of threat actors and how governments and organizations can tailor their security strategy to the threats they face. Links: L0phtCrack - https://www.l0phtcrack.com L0pht Heavy Industries testimony before the U.S. Senate Committee on Governmental Affairs, 1998 - https://youtu.be/VVJldn_MmMY
In the spirit of Memorial Day and remembrance, Evan and Brad decided to do something a bit different for episode 29. The guys share audio of L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs (live feed from CSPAN) on May 19, 1998. You'll notice that a lot of the issues discussed in the trial still translate today, despite it being over 20 years ago. Give it a listen, and let us know what you think at unsecurity@protonmail.com
When Space Rogue testified before Congress in 1998 as part of activist group L0pht Heavy Industries, he never expected to work for IBM. And yet, that's just where he finds himself today — and he couldn't be happier. Space Rogue, a.k.a. Cris Thomas, joins the X-Force Red in Action podcast this week to talk about everything from penetration testing to Black Hat 2018 to his extensive sticker collection. To learn more about the team and their adventures in offensive security, visit ibm.com/xforcered.
L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future.Security Weekly Web Site: http://securityweekly.comHack Naked Gear: http://shop.securityweekly.comFollow us on Twitter: @securityweekly
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Grand/DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand aka Kingpin GRAND IDEA STUDIO Printed Circuit Boards (PCBs), used within nearly every electronic product in the world, are physical carriers for electronic components and provide conductive pathways between them. Created as a sandwich of alternating copper and insulating substrate layers, PCBs can reveal clues about system functionality based on layout heuristics or how components are interconnected. By accessing each individual copper layer of a PCB, one can reconstruct a complete circuit layout or create a schematic diagram of the design. In this presentation, Joe examines a variety of inexpensive, home-based solutions and state-of-the-art technologies that can facilitate PCB reverse engineering through solder mask removal, delayering, and non-destructive imaging. The work is based on Joe's Research and Analysis of PCB Deconstruction Techniques project performed as part of DARPA's Cyber Fast Track program. Joe Grand is an electrical engineer and hardware hacker. He runs Grand Idea Studio (www.grandideastudio.com) and specializes in the design of consumer and hobbyist embedded systems. He created the electronic badges for DEFCON 14 through 18 and was a co-host of Discovery Channel's Prototype This. Back in the day, he was a member of the infamous hacker group L0pht Heavy Industries. Twitter: @joegrand Web: http://www.grandideastudio.com
In this episode Chris Wysopal - who is that masked man? Putting some reality to the state-sponsored backdoors (Huawei) and supply-chain compromise The risks coming through the door with the products you buy The case for setting up an independent testing lab for mitigating 'backdoor' accusations Chris does an interesting assessment on software security practices in the enterprise Chris discusses holding your vendor to the same standards you hold yourself What does it mean that enterprises are doing a "good job" in SwSec Chris goes there, open-source components as part of supply chain risk James asks "How do smaller buyers leverage scale to hold their suppliers accountable?" Why do we still see SQL Injection?! Are we ever going to get rid of it? Guest Chris Wysopal ( @Weldpond ) - Chris is the Founder, CTO and CISO of VeraCode, a company dedicated to software security as-a-service. Chris has a long and storied history in the security industry dating back to L0pht Heavy Industries. His bio and profile can be found on LinkedIn.
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of vulnerabilities in your embedded hardware designs and how to evaluate the threats against your products. Learning from history is important to avoid repeating old design flaws, so we will also look at previously successful hardware attacks against security products. Joe Grand is the President of Grand Idea Studio, a San Diego-based product development and intellectual property licensing firm, where he specializes in embedded system design, computer security research, and inventing new concepts and technologies. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht Heavy Industries. He is the author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"" and a co-author of ""Stealing The Network: How to Own A Continent"". Joe holds a Bachelor of Science degree in Computer Engineering from Boston University."
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of vulnerabilities in your embedded hardware designs and how to evaluate the threats against your products. Learning from history is important to avoid repeating old design flaws, so we will also look at previously successful hardware attacks against security products. Joe Grand is the President of Grand Idea Studio, a San Diego-based product development and intellectual property licensing firm, where he specializes in embedded system design, computer security research, and inventing new concepts and technologies. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht Heavy Industries. He is the author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"" and a co-author of ""Stealing The Network: How to Own A Continent"". Joe holds a Bachelor of Science degree in Computer Engineering from Boston University."
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Most users treat a hardware solution as an inherently trusted black box. "If it's hardware, it must be secure," they say. This presentation explores a number of classic security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. We explore technologies commonly used in the network and computer security industries including access control, authentication tokens, and network appliances. You'll leave this presentation knowing the consequence of blindly trusting hardware. Joe Grand is the President of Grand Idea Studio, a San Diego-based product development and intellectual property licensing firm, where he specializes in embedded system design, computer security research, and inventing new concepts and technologies. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht Heavy Industries. He is the author of "Hardware Hacking: Have Fun While Voiding Your Warranty" and a co-author of "Stealing The Network: How to Own A Continent". Joe holds a Bachelor of Science degree in Computer Engineering from Boston University.
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Most users treat a hardware solution as an inherently trusted black box. "If it's hardware, it must be secure," they say. This presentation explores a number of classic security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. We explore technologies commonly used in the network and computer security industries including access control, authentication tokens, and network appliances. You'll leave this presentation knowing the consequence of blindly trusting hardware. Joe Grand is the President of Grand Idea Studio, a San Diego-based product development and intellectual property licensing firm, where he specializes in embedded system design, computer security research, and inventing new concepts and technologies. Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht Heavy Industries. He is the author of "Hardware Hacking: Have Fun While Voiding Your Warranty" and a co-author of "Stealing The Network: How to Own A Continent". Joe holds a Bachelor of Science degree in Computer Engineering from Boston University.