Episode460

From Paul's Security Weekly
Jump to: navigation, search


Paul's Security Weekly - Episode 459 - 6:00PM

Recorded April 14th, 2016

This week we interview Lee Holmes

Episode Audio

MP3

Interview with Lee Holmes, lead security architect of Microsoft's Enterprise Cloud Group 6:00PM-7:00PM

Lee Holmes is the lead security architect of Microsoft's Enterprise Cloud Group, covering Windows Server, Azure Stack, System Center, and Operations Management Suite. He is author of the Windows PowerShell Cookbook, and an original member of the PowerShell development team.

  • Now that PowerShell seems to be used by a larger number of attackers how can we defend against it use in initial compromise and track its actions?
  • MS pushed the hybrid cloud what should be base strategies to securing this kind of setup? what would the challenges be?
  • How has MS shifted in terms of cloud security now that it is offering more and more security tools in Azure like going more with behavioral analysis?


  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby-grabby, do you prefer to go first or second?
  5. Choose two celebrities to be your parents.

Tech Segment: With Joff Thyer

Stories of the Week - 7:00PM-8:00PM

Paul's Stories

  1. Millions of Arris cable modems vulnerable to denial-of-service flaw | ZDNet
  2. "'CyberUL' Launched For IoT
  3. NoScript and other popular Firefox add-ons open millions to new attack | Ars Technica
  4. Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World
  5. SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
  6. Windows 10 debuts Blue QR Code of Death – and why malware will love it
  7. New JavaScript attack infects your phone and changes your router's DNS settings
  8. 0-day exploits more than double as attackers prevail in security arms race
  9. Journalist sentenced to 24 months in prison after hacking-related conviction
  10. "New report claims gray hat hackers
  11. Is Cloud Security An Exaggerated Concern? - Dark Reading
  12. Explicit Furry Podcast Airs On US Radio After Hack
  13. Half Of People Plug In USB Drives They Find In The Parking Lot
  14. Do US universities deserve an “F” in teaching cybersecurity?
  15. We’ve got stalkers in our pockets
  16. ‘Blackhole’ Exploit Kit Author Gets 8 Years
  17. BADLOCK – Are ‘Branded’ Exploits Going Too Far?
  18. The ransomware attack that knows where you live

Larry's Stories

Now that PowerShell seems to be used by a larger number of attackers how can we defend against it use in initial compromise and track its actions?

  • MS pushed the hybrid cloud what should be base strategies to securing this kind of setup? what would the challenges be?
  • How has MS shifted in terms of cloud security now that it is offering more and more security tools in Azure like going more with behavioral analysis?

Joff's Stories

  1. Yay Apple IOS time working against you
  2. Underwriters LABS (UL) refuses to share new IoT security standard

Kevin's Stories

Victory: California Smartphone Anti-Encryption Bill Dies in Committee

<https://www.eff.org/deeplinks/2016/04/victory-california-smartphone-anti-e= ncryption-bill-dies-committee> "A.B. 1681 was introduced in January of this year, and originally required that every smartphone sold in California have the technical ability to be decrypted and unlocked at the time of sale by the manufacturer or operating system provider. The bill was then amended to penalize companies that couldn=E2=80=99t decrypt the contents of a smartphone pursuant to a state c= ourt order."

On a similar note - Congress's New Encryption Bill Just Leaked, And It's As Bad As Experts Imagined <https://motherboard.vice.com/read/draft-encryption-bill-is-everything-we-f= eared-security-experts-say> "The bill "would be embarrassing if it weren=E2=80=99t so frightening"..."T= he reality is that there is no possible way to comply with it without intentionally backdooring the encryption in every product that may be used in the United States.=E2=80=9D"

Apple, Apple, Apple -

New Threat Can Auto-Brick Apple Devices <http://krebsonsecurity.com/2016/04/new-threat-can-auto-brick-apple-devices= /> "The researchers said they discovered they could build a hostile Wi-Fi network that would force Apple devices to download time and date updates from their own (evil) NTP time server: And to set their internal clocks to one infernal date and time in particular: January 1, 1970...The result? The iPads that were brought within range of the test (evil) network rebooted, and began to slowly self-destruct."

Apple bug exposed chat history with a single-click <https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-= single-click/> "...exfiltration of chat history, including photos and videos, if the user could be tricked into clicking a single malicious link...The Messages bug was triggered when a user clicked on a specially crafted hyperlink arriving via instant message. Rather than taking the user to a website when clicked, as most links do, this link executed malicious JavaScript code"


FBI paid professional hackers one-time fee to crack San Bernardino iPhone <https://www.washingtonpost.com/world/national-security/fbi-paid-profession= al-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-= 00de-11e6-9d36-33d198ea26c5_story.html> "The FBI cracked a San Bernardino terrorist=E2=80=99s phone with the help o= f professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.

The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone=E2=80=99s four-digit personal identification nu= mber without triggering a security feature that would have erased all the data, the individuals said"