From Paul's Security Weekly
- 1 Paul's Security Weekly #564
- 2 Announcements
- 3 Interview: Jason Haddix, BugCrowd - 6:00PM-6:45PM
- 4 Technical Segment: Bug Bounty Hunting, Keith Hoodlet- 6:45-7:45PM
- 5 Security News - 7:45PM-8:30PM
Paul's Security Weekly #564
Recorded June 14, 2018 at G-Unit Studios in Rhode Island!
- Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.
- Ticket Sales are open for Social Engineering RI Conference. Saturday, June 6th at Salve Regina University in Newport RI. Go to - http://se-ri.org/ to register!
Interview: Jason Haddix, BugCrowd - 6:00PM-6:45PM
Jason Haddix Github: https://github.com/jhaddix
Technical Segment: Bug Bounty Hunting, Keith Hoodlet- 6:45-7:45PMKeith will be talking through some of the tools, techniques, and procedures he uses to perform recon, identify targets of interest, and report findings faster and easier.
00.) FoxyProxy Standar
01.) Tree Style Tab
03.) Open Multiple URLs
04.) Wayback Machine
05.) Multi Link Plus
Security News - 7:45PM-8:30PM
- Malicious Docker Containers Earn Cryptomining Criminals $90K
- The First Lady's bad cyber advice
- InfoSec Handlers Diary Blog - From Microtik with Love
- Librarian Sues Equifax Over 2017 Data Breach, Wins $600 - “The small claims case was a lot more about raising awareness,” said West, a librarian at the Randolph Technical Career Center who specializes in technology training and frequently conducts talks on privacy and security.
- Smart lock can be hacked 'in seconds' - The "major flaw" in its design is that the unlock key for the device is easily discovered because it is generated from the Bluetooth Low Energy ID that is broadcast by the lock. Anyone with a smartphone would be able to pick up this key if they scanned for Bluetooth devices when close to a Tapplock. Using this key in conjunction with commands broadcast by the Tapplock would let attackers successfully open any one they found, said Mr Tierney.
- 8 Point Security Checklist For Containers
- Which Android phones get regular security updates?
- US senators get digging to find out the truth about FCC DDoS attack
- AI, SOAR, Containers: Investors Predict What's Next For Cybersecurity
- Not everyone is so hot about this free USB fan handed to journalists at Trump-Kim summit
Cool Story Of The Week
- Neighbors of Cold War Air Force deserter knew him as 'Tim' - On June 5, during a passport fraud investigation, the US Department of State's Diplomatic Security Service interviewed an individual claiming to be Barry O'Beirne. After being confronted with inconsistencies about his identity, the individual admitted his true name was William Howard Hughes Jr., and that he deserted from the US Air Force in 1983
- Missing Air Force officer found 35 years later - Hughes was involved in classified planning and analysis of NATO’s control, command and communications surveillance systems during the Cold War. He specialized in radar surveillance.
- Air Force officer who vanished at height of Cold War turns up in Calif.
Random and Potentially Interesting Stories
- Pennsylvania driver allegedly defecates on another man in road-rage incident - A Pennsylvania man on Friday allegedly defecated on a fellow driver after the two engaged in a road rage argument How the...?
- Researchers Studied 160 Million Memes and Found Most of Them Come From Two Websites - when looking at individual subreddits, we find that The Donald is the most active one when it comes to posting memes in general. It is also the subreddit where most racism and politics related memes are posted.
- 11 behaviors that indicate you're a 'problem employee'