From Paul's Security Weekly
Paul's Security Weekly #543
Recorded January 11, 2018 at G-Unit Studios in Rhode Island!
Interview: Diana Kelley & Ed Moyle - Security Curve - 6:00PM-6:45PM
- How did you get your start in information security?
- With all of the protections available today, why is ransomware a threat to the enterprise? Or is it?
- What are the weaknesses ransomware preys upon?
- What is a tabletop exercise?
- Why are they so useful for ransomware?
- For practitioners listening, why should they love tabletop exercises and step away from the keyboard?
- How do you execute on the lessons learned in tabletop exercises?
Tech Segment: Jake Williams, SANS - 6:45-7:45PM
Security News - 7:45PM-8:30PM
- Daniel Miessler on My Writings about IoT Security
- Prosecutors Say Mac Spyware Stole Millions Of User Images Over 13 Years - Disgusting The indictment, filed in US District Court for the Northern District of Ohio's Eastern Division, went on to say that Durachinsky developed a control panel that allowed him to manipulate infected computers and view live images from several machines simultaneously. The indictment also said he produced visual depictions of one or more minors engaging in sexually explicit conduct and that the depiction was transported across state lines. He allegedly developed a version of Fruitfly that was capable of infecting Windows computers as well. Prosecutors are asking the court for an order requiring Durachinsky to forfeit any property he derived from his 13-year campaign, an indication that he may have sold the images and data he acquired to others.
- Fingerprinting Digital Documents
- Skype finally getting end-to-end encryption
- Apple Set To Patch Yet Another macOS Password Security Flaw
- Wi-Fi Alliance launches WPA3 protocol with new security features
- FTC Fines IoT Toy Vendor VTech for Privacy Breach
- 147 Security Vulnerabilities Reported in ICS Mobile Applications
Correction of last weeks story: According to Daniel Miessler’s blog post, it looks like I mismatched the Intel vulnerabilities for the architectures they effect