Recorded February 6, 2020 at G-Unit Studios in Rhode Island!
- 1 Episode Audio
- 2 Announcements
- 3 Interview: Katelyn Bowden, BADASS (Battling against Demeaning and Abusive Selfie Sharing) - 6:00-6:45PM
- 4 Tech Segment: Adventures In AWS Computing - 6:45PM-7:30PM
- 5 Security News - 7:30-8:30PM
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Katelyn Bowden, BADASS (Battling against Demeaning and Abusive Selfie Sharing) - 6:00-6:45PM
After finding her own intimate photos online without her consent, Katelyn Bowden discovered that there weren’t many resources for those who find themselves victims of this sort of abuse. In response, she started B.A.D.A.S.S., a nonprofit dedicated to fighting image abuse through victim empowerment and awareness. In their 2 year existence, BADASS has accomplished a lot- from legislation to education, and there’s so much more on the way.
We are going to discuss BADASS, and it’s role in the cybersecurity community. What security means to us, and ways that users can protect their most intimate data
Tech Segment: Adventures In AWS Computing - 6:45PM-7:30PM
Security News - 7:30-8:30PM
- Ghost in the shell: Investigating web shell attacks - Microsoft Security
- I Sabotaged My Boss With Ransomware From the Dark Web - I hope this person knew what they were doing. First concern is permission. Second concern is, even with permission, what if something bad happens? Also, how did you verify and validate the malicious code you got on the dark web? Much of the software has backdoors...
- Expert released PoC exploit code for unpatched backdoor in HiSilicon chips
- Tesla, Mobileye Autopilots Duped By Phantom Images
- Google Shared Private Videos With Wrong Users | SecurityWeek.Com
- Department of Energy Adds Attivo Decoys for Critical Infrastructure Security
- LCD pwn System: How to modulate screen brightness to covertly transmit data from an air-gapped computer... slowly
- Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs
- cdpwn Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP)
- How your network could be hacked through a Philips Hue smart bulb
- DLL Hijacking Vulnerability Found in Realtek HD Audio Driver | SecurityWeek.Com
- Buggy Iowa Caucus App Is Buggy, Security Experts Say
- Russian disinformation 'ongoing problem' says FBI chief
- Iranian Hackers Target Journalists in New Phishing Campaign | SecurityWeek.Com
- No way! The Iowa election results web app is hackable! Who could have guessed? While there is no evidence hackers intercepted or tampered with the results, Veracode found that the app lacks key safeguards.
- This Sculpture Holds a Decades-Old C.I.A. Mystery. And Now, Another Clue.
- Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA
- Ransomware Attack on Hospital Shows New Risk for Muni-Bond Issuers
- Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation
- Facebook urged to halt encryption push over child abuse concerns
- Sudo bug lets non-privileged Linux and MacOS users run commands as root CVE-2019-18634 affects Sudo 1,8.26 and earlier - stack based buffer overflow - patches in MacOS 10.13,6, 10.14.6, 10.15.2 and Sudo 1.8.30
- Ashley Madison Breach data now being used for Extortion Scam targets hundreds of users, demanding .1188 BTC.
- Twitter fixes API bug Bug in API that could be used to reveal users by matching names and phone numberes, if they have the "let people who have your phone number find you on Twitter" setting on.
- Microsoft patches flaws in Azure stack CVE-2019-1372, a high risk vulnerability as it allows RCE as system & CFE-201-1234, a low risk vulnerability.
- 8 cities that have been crippled by Cyberattacks and what they did to fight them Here is how attacks on Atlanta, Baltimore, St. Lucie, New Bedford, New Orleans, Greenville, Pensacola, and Wilmer were handled.
- Hackers Can Hijack Your House Through Your Lightbulb, Researchers Warn ZigBee flaw permits Philips Hue lightbulb takeover. Low risk, CVE-2020-6007 patch available from Phillips. Report from Check Point
- 5 router settings to keep hackers off your cameras, smart speakers and network Some basic settings that help raise the bar on home network security. See also Joff's Blog 10 Ways to Protect Your Online Digital Life - Black Hills Information Security
- Reaearcher finds over 60 vulnerabilities in Physical Security systems Researcher Joachim Kerschbaumer identified 60 vulnerabilities across 20 physical security products, including flaws that allow takeover.
- Hacking Air Gapped Computers
- The 2020 Disinformation War
- Charming Kitten Hackers Impersonate Journalist in Phishing Attacks
- Community Housing Nonprofit Hit with $1.2M Loss in BEC Scam
- Adversary Exposed How One Criminal Attempted to Sell an Msp on the Dark WEb
- Hack WhatsApp
- Facebook Gets Patent to Track Users' Television Viewing
- Hackers took over Twitter accounts for the NFL and a bunch of teams, including Super Bowl contenders 49ers and Chiefs
- Hacking Leads to Fake Story Claiming US Soldier in Lithuania Has CoronaVirus
- Google admits it sent private videos in Google Photos to strangers
- Iowa Precinct Chair Reports Stuggles with Caucus Phone App
- Twitter Says an Attacker Used its API to Match Usernames to Phone Numbers
- Ex-CIA Engineer Goes on Trial for Massive Leak
- Ex-CIA Engineer Goes on Trial for Massive Leak
- Graduation Day Cyber Threat Intelligence Intelligence
- There's No Evidence Saudis Hacked Jeff
- Ashley Madison Breach from 2015 Being Used in Sextortion Scams
- Where Computing is Headed Beyond Quantum
- 5 Zero-day Vunlerabilities in Cisco Discovery Protocol Impacting Tens of Millions of Devices
- 10 Ways to Protect Your Online Digital Life - Black Hills Information Security Basic advice in human terms to secure your online digital life.