Difference between revisions of "Episode302"
|Line 31:||Line 31:|
== Jack's Ruminations ==
== Jack's Ruminations ==
== 's stories ==
Revision as of 15:28, 13 September 2012
Announcements & Shameless Plugs
PaulDotCom Security Weekly - Episode 302 for Thursday September 13th, 2012
- Register NOW for: Offensive Countermeasures: Defensive Techniques That Actually Work SANS Las Vegas on September 23-24, 2012
- Be sure to check out the The Stogie Geeks Show! For cigar enthusiasts, by cigar enthusiasts.
Interview with Jason Lam
- NEW Register for our brand new Defensive Countermeasures: Foundations of Network Protection being offered by Blackhat in conjunction with the HALO conference.
Jason is the head of global threat management at a major financial institution based in Canada. Jason specializes in Web application security, and shares his research findings and experiences by teaching at the SANS Institute. His recent SANS courseware development includes Defending Web Application Security Essentials and Web Application Pen Testing Hands-On Immersion.
- How did you get your start in information security?
- Tell us something no one knows about Defending Web Apps
- Who's your GoDaddy - [Larry] - Yup, GoDaddy dns was down for the count. This included their own authoritative DNS as well as for those for the hosted stuff. Of course, now folks are talking about DoS against root name servers, and OMG the sky is falling. Of course, a single Anonymous member took credit, and GoDaddy, said along the lines of "Ooops, we tripped on a cable and corrupted our routing tables". Who do you believe… In other notes, a leaf fell from a tree and an individual member from anonymous took credit.
- What happens when your encryption is EOL-ed - [Larry] - Victorinox (the Swiss Army folks) are offering full refunds if you return the secure usb thumb drives. Why? As of September 15th the certificate will expire, and they have no intent on renewing and are stopping support for the software. If you don't get your data out of the encrypted volume before then, you'll allegedly lose it. So, what happens when we have something else like this that is significantly more mission critical, we have significant investment and no upgrade path. Choose wisely.
- Judge rules WiFi Sniffing Legal - [Larry] - Basically it boils down that is you have an open network and the data is in the clear, you should be able to sniff it. Don't want someone to sniff it? Encrypt it - and yes, WEP would be sufficient for word of law here. So, why did the judge rule this way? Wireless is a shared medium. If you are not allowed to sniff traffic that is not destined to you, then how are you able to determine that the traffic on said network is destined for you? Ruling against it would make all WiFi networks illegal, just by nature of the technology.
- ACTUAL Stego in the wild for "legitimate purpose" - [Larry] - I just put this story in for Darren to bust John's stones. But, it appears that Blizzard has been embedding information about the user via stegonaography into screenshots taken by the WoW clients.