Difference between revisions of "Episode368"

From Security Weekly Wiki
Jump to navigationJump to search
Line 74: Line 74:
== John's Stories ==
== John's Stories ==
== Jack's Stories ==

Revision as of 20:59, 3 April 2014

Episode Media


Paul's Security Weekly - Episode 368 for Thursday April 3rd, 2014

  • This segment is brought to you by Black Hills Information Security, THE source for all of your penetration testing needs. Please visit www.blackhillsinfosec.com for more information and use the contact page to request a quote!
  • We are scheduling three upcoming webcasts, sponsors will be The SANS Institute, Palto Alto Networks and Pwnie Express, please check http://securityweekly.com/watch for the dates and topics! You can also subscribe to the Security Weekly Insider list and receive advanced notifications of all upcoming webcasts and webcast content.
  • Paul is speaking at the Northeast Linux Fest which will be held on April 8th of 2014 at Harvard University, April 7-8 at SOURCE Boston (stay tuned to win a free SOURCE Boston ticket!), Charlotte ISSA conference on April 24, and the NOLA conference in New Orleans in June.
  • First person to Tweet to @securityweekly during the show "I want the free SOURCE Boston ticket" wins it!

Guest Interview: Josh Abraham



At Praetorian, Josh is a key member of the technical execution team. In this capacity, he is responsible for leading, directing and executing client-facing engagements that include Praetorian's tactical and strategic service offerings.

Over the years, Josh has become a well-known resource for his contributions to the information security space. An avid researcher and presenter, Josh has spoken at numerous conferences including BlackHat, DefCon, BSides, ShmooCon, The SANS Pentest Summit, Infosec World, SOURCE, CSI, OWASP, LinuxWorld and Comdex.


Paul's Stories

  1. Prezi got Pwned: A tale of responsible disclosure - Engineering at Prezi
  2. 42 days to go for XP – 8 tips if you aren’t going to make it
  3. Meet the next-gen USB cable that could sweep away all others
  4. Android Botnet Targets Middle East Banks
  5. Amazon Web Services Combing Third Parties for Exposed Credentials
  6. DNS-Based Amplification Attacks Key on Home Routers
  7. What took you so long Apple? 26 remote exec bugs die in OS X Safari
  8. Google Wants Supreme Court To Rule On Street View Privacy Case
  9. "GUI Bugs Expose Information Disclosure
  10. "Microsoft: 0Day Exploit Targeting Word
  11. S4x14 Session: You Name It; We Analyze It
  12. California man who lasered two helicopters to face 14 years behind bars
  13. Dumb hackers leave encryption keys on victims' PCs
  14. Researcher Lights Fire Under Tesla Security
  15. Ad tracking: Is anything being done?

Larry's Stories

  1. Glonass Failure - [Larry] - For those that don't know, GLONASS is the Russian equivalent of US based GPS. Apparently, somehow, the GNSS satellites were uploaded incorrect information on how end receivers calculate satellite position. This is interesting to be because: 1. What if the Russians knew that this was happening and could ignore the bad info or perform additional calculations to correct it, 2. Could this happen to US based GPS (yes), and 3. Who did it? Human, computer error or threat actor? Think about what any of those scenarios mean, and put on your conspiracy hat while you do it.
  2. Crypto…Defense? - [Larry] - In a copycat move, the CryptoDefense malware authors encrypt files, and then demand payment in bitcoin to decrypt. If payment is not received (through their secretive TOR hidden service), in 4 days the price doubles. So, the files are encrypted with a 2048-bit RSA key…but the authors left the private key on disk in the application's install directory. That means they left behind everything needed to decrypt, no ransom needed. That said, in a couple of day period, they allegedly made $34,000.
  3. Target/Trustwave Update - [Larry] - One of the two banks pulled out from the suit against Trustwave about the Target breach. Hmmm, coming to their senses maybe? It is looking like more during the discovery process the bank realized that Trustwave did not provide some of the services alleged in the original filing. I love it when the lawyers don't understand technology, but it gets even worse when they cant understand technology contracts and SoWs.
  4. DumbTV, Phillips - [Larry] - Phillips left a default, unchangeable password on it's Smart TVs for the Miracast AP of "Miracast". Once connected it is possible to control the TV, download config files, and obtain files from connected USB devices, as well as obtain stored website cookies for sites browsed on the TV. Hooray internet of things.
  5. The NSA hacked into Huawei - [Larry] Uhhhhh…..

John's Stories

Jack's Stories