Episode487

From Paul's Security Weekly
Jump to: navigation, search

Paul's Security Weekly - Episode 487

Recorded: October 27, 2016

Hosts

  • Jeffrey Man - Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon
  • Jack Daniel - Works for Tenable Network Security and is a co-founder of Security BSides.
  • Larry Pesce, Director of Research and Senior Managing Consultant at InGuardians
    • Larry Pesce, Swami of Security, Oracle of the Online and Hotshot Of Hacking
    • Larry Pesce, destroyer of embedded systems and injector of RF energy.
  • Michael Santarcangelo - founder of SecurityCatalyst.com, author of Into the Breach, and creator of the leadership-driven Straight Talk Framework - with our favorite question, "What problem are you trying to solve?"
  • Joff Thyer - SANS Instructor, Penetration Tester and Security Researcher with Black Hills Information Security.
    • Joff Thyer, Geeking out with the best of them. Known to attract multiple waitresses with a single smile and utterance of g'day. Deployer of cocktail recipes in desperate situations. Hacker of many a thing! If it's got code running on it, it can be hacked.
    • Joff Thyer, musician, proud father, and friend to many.
  • Paul Asadoorian - He is probably the coolest guy around, but he won't tell you that. He is the kind of guy you want by your side when fighting off an army of 10,000 pygmies with poison arrows. He can tell you what color your underwear is by looking into your eyes. He can eat a cheeseburger in one bite. Scientists have said that he is so hot, he may be the main reason for global warming. His shit doesn't stink; in fact, it smells like car polish. He was refused entry to the USA because his biceps were classified as weapons of mass destruction. He is in the Guinness Book of World Records for completing the most somersaults in a row (126,253).

Episode Audio

MP3

Announcements

  • Make sure you visit http://securityweekly.com/subscribe and subscribe to our new shows including Enterprise Security Weekly and Startup Security Weekly. You can also subscribe to all shows individually, as well as a main feed which contains this show, Hack Naked TV and Enterprise Security Weekly.
  • (webcast announcement)


Interview: Chris Roberts, Acalvio Technologies - 6:00-7:00PM

Chris Roberts is considered one of the world’s foremost experts on counter threat intelligence within the Information security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, he directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. With increasingly sophisticated attack vectors, Chris’ unique methods of addressing the evolving threat matrix and experience with a variety of environments - Enterprise, Industrial, and IoT, make Roberts and his team an indispensable partner to organizations that demand robust, reliable, resilient and cost-effective protection. Chris is a regular speaker at leading industry conferences, has been featured in several documentaries and is regularly quoted in national newspapers, television news and industry publications.

Technical Segment: Why Signatures Suck with Mark Dufresne, Endgame - 7:00PM-7:30PM

Why signatures don’t really work for detection and about what folks should be thinking about instead.

Security News - 7:30PM-8:30PM


Paul's Stories

  1. This Evil Office Printer Hijacks Your Cellphone Connection
  2. Three hospitals in England cancel operations over computer virus
  3. Cisco says it'll make IoT safe because it owns the network
  4. Ubiquiti all the things: how I finally fixed my dodgy wifi
  5. Its time to regulate baby monitors
  6. How Hackers Can Steal Your Cell Phone Pictures From Your Crock-Pot
  7. Belkins WeMo Gear Can Hack Android Phones
  8. New, fast-spreading IoT botnet hybridizes two less-effective strains to achieve quick dominance
  9. Fixing the communications breakdown between IT security and the board and c-suite
  10. Alarmed by Admiral's data grab? Wait until insurers can see the contents of your fridge
  11. Admiral Insurance to use algorithms to set insurance prices based on customers' Facebook posts
  12. Flipboard on Flipboard
  13. Google security head says Pixel is as secure as the iPhone
  14. Unsecured Internet of Things gadgets get hacked within 40 minutes of being connected to the net
  15. Webcams Used To Attack Twitter And Reddit Recalled
  16. Windows 10 Vulnerability AtomBombing Can Bypass Security Software
  17. Disappearing Messages Added to Signal App
  18. IoT Devices as Proxies for Cybercrime
  19. Telnet, SSH prod of death smashes Cisco broadband boxes offline
  20. How Hackers Plant False Flags to Hide Their Real Identities | Motherboard
  21. Nuclear Power Plant Disrupted by Cyber Attack
  22. JTAG Explained (finally!): Why "IoT" Makers, Software Security Folks, and Device Manufacturers Should Care - Senrio
  23. We're Not Going To Beat Cybercrime In Our Lifetime
  24. MITRE Will Give You $50k To Fingerprint Rogue IoT Devices
  25. IoT Malware Has Apparently Reached Almost All Countries
  26. Sex robots with warm skin to hit dating scene and could benefit relationships
  27. 4 cybersecurity trends you need to be aware of
  28. 4 cybersecurity trends you need to be aware of
  29. Yahoos CISO resigned in 2015 over secret e-mail search tool ordered by feds
  30. Hack Crashes Linux Distros with 48 Characters of Code

Larry's Stories

Michael's (Santa) Stories

Jeff's Stories

Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

(Wikileaks)

Jack's Stories