Announcements & Shameless Plugs
Security Weekly - Episode 331 for Thursday May 9th, 2013
- Register for both our tracks at Blackhat USA Las Vegas! Defensive Countermeasures: Foundations for Becoming a Devious Defender and Offensive Countermeasures: The Art Of Active Defense July 27-28 & 29-30, register before May 31 for the best price!
- We are looking for sponsors for monthly webcasts in conjunction with SANS - contact paul -at- hacknaked.tv for details!
- Come to Security BSides Rhode Island Two-Day Conference on June 14th and 15th tickets are NOW ON SALE at WePay.com. Featured presentations from Josh Wright , Kevin Finisterre, Kati Rodzon and Mike Murray, Bruce Potter, Joe McCray,Ron Gula, Ben Jackson, Dave Maynor and the entire Security Weekly crew!
- If you are in the Boston area, check out BSides Boston on Saturday May 18th! Keynotes by Dan Geer and Josh Corman and presentations from Alissa Torres, Andrew Case and the lady who keeps a low profile on the InterWebz: Allison Nixon.
- The Stogie Geeks Show! - Kick some ash with the Stogie Geeks, Sunday nights at 8:30PM EST. Come have a cigar with us! If you are in the Rhode Island area please visit our sponsor the Havana Cigar Club, its an awesome place to have a drink! Make sure you print out your $5.00 off coupon here! (Web site experiencing problems, will update link when it comes back)
Interview: Rob Cheyne
Rob Cheyne is a highly regarded technologist, trainer, security expert and serial entrepreneur.
He was the co-founder and CEO of Safelight Security, a leading provider of information security education programs. He has taught information security training classes to tens of thousands of developers, architects, and managers for industry-leading organizations. He has over 20 years of experience in the information technology field and has been working in information security since 1998.
Rob regularly speaks at security and training conferences, and frequently presents to the local chapters of various security organizations.
- Tell us about your time at @stake
- How do companies squander their security budgets?
- How do you deliver an effective training program that works?
- What have you been working on lately?
- Five questions
Tech Segment: Kurt Baumgartner talks Red October
- Why is Kaspersky going public with this information?
- How is this report different from what we learned in Mandiant's "APT" report?
- Is Kaspersky working with the US or Russian governments with this information?
- There were no 0days being used? It was all known exploits that could be patched?
- What types of people did you see targeted in the spear phishing emails?
- What type of data were the attacks looking for?
- Could the three connections to Microsoft be used as a detection technique for this kind of infection?
- Did you scan the entire internet on port 40080?
- When is the second part of the report being released?
Red October Whitepaper (PDF)
- We are in the process of archiving and cataloging our technical segments, please visit the Security Weekly Technical Library and we indexed all of the interviews we have conducted. Also, please follow us on Google+ The Security Weekly Google+ Community, The Security Weekly Google+ Page and Paul's Google+ Page.
- Larry teaching SANS SEC617 all over and coming to a city near you in 2013. It isn't too Late to sign up for my class in San Diego this May! (actually, it is)
- If you are interested in hosting SANS Training in the Boston area via the mentor format, please send us an email at mike -at - hacknaked.tv! We're looking for a location that can host 2 hours in the evening, 1 night a week, for 10 weeks.
- The Economist on Guantanamo - I thought it was interesting how the recommendation was to give up and release the bad guys. That politically we can deter threats by being nice to them. I wonder if this would work for hackers? I think not...
- Security Lessons From Star Wars: Breach Response - Great little story about finding and fixing weaknesses: There are a number of things that might have been done had the Empire known about the weakly shielded exhaust port. For example, they might have welded some steel beams across that trench. They might put some steel plating up near the exhaust port. They might land a Tie Fighter in the trench. The could deploy some storm troopers with those tripod mounted guns that never quite seem to hit the Millenium Falcon. When you find a problem, you need to inform the right people or rebels may blow up your death star.
- The Onion and Breach Disclosure
- Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Threat Level | Wired.com - Want to find all spreadsheets with login information in Russia? How about "filetype:xls site:ru login"
- Bang With Friends on iPhone - Technology and hookups = Bang, a new app that allows you to find people to, well Bang in your Facebook friends list. Just use caution though they accidentally select the "Down to Bang" option when just trying to swipe through friends' Facebook photos. Damn technology...
- BBC News - Working gun made with 3D printer
- Twitter hack on the Onion makes for comedy gold - The Frontline - a blog from V3.co.uk
- National Republican Congressional Committee Website Hacked With Viagra Ads
- Use of 'honeywords' can expose password crackers
- "What's needed is more secure software NOT more security software" at least according to this report from White Hat Security. (Note, this link is to a 39MB PDF, the irony is not lost on me).
- Finger-Pointing on Cyberespionage Does Little Good Without Plan An interesting read from Dennis Fisher over at ThreatPost.
- Everyone has read the Verizon DBIR by now right? Right? But did you know that the data behind the charts is available, too? 25KB .zip full of .csv files of data
- Someone actually fired a 3D Printer gun
- Honeywords - Adding dummy passwords to the system to create a tripwire that indicates if someone may have breached your password protections. Research Paper from MIT
- How strong is your password? - Maybe we can trust Intel...
- Foreign companies happy about internet sales tax
- Mainstream Apache/nginx/lighttp hack This replaces the entire web server with one that serves up malware. Who checks the hash of their web server to make sure it's the same one they had yesterday?
- The Onion on How To Not Get Hacked