Difference between revisions of "Episode474"

From Security Weekly Wiki
Jump to navigationJump to search
Line 27: Line 27:
 
== Paul's Stories ==
 
== Paul's Stories ==
  
 +
#[https://isc.sans.edu/diary/Guest%2BDiary%2C%2BEtay%2BNir%3A%2BFlipping%2Bthe%2BEconomy%2Bof%2Ba%2BHacker/21283 "Guest Diary]
 +
#[http://www.darknet.org.uk/2016/07/everything-need-know-web-shells/ Everything You Need To Know About Web Shells]
 +
#[https://nakedsecurity.sophos.com/2016/07/21/drone-operator-arrested-for-flying-over-wildfire/ Drone operator arrested for flying over wildfire]
 +
#[https://nakedsecurity.sophos.com/2016/07/21/seaworld-hacker-and-bomb-hoaxer-escapes-prison-sentence/ SeaWorld hacker and bomb hoaxer escapes prison sentence]
 +
#[https://www.engadget.com/2016/07/11/director-alex-gibney-on-what-we-learned-from-stuxnet/ Alex Gibney on Stuxnet and why we need to talk about cyberwar]
 +
#[http://krebsonsecurity.com/2016/07/adobe-microsoft-patch-critical-security-bugs/ "Adobe]
 +
#[https://www.insinuator.net/2016/07/gotta-catch-em-all-worldwide-or-how-to-spoof-gps-to-cheat-at-pokemon-go/ Gotta Catch ‘Em All! – WORLDWIDE! (or how to spoof GPS to cheat at Pokémon GO) - Insinuator]
 +
#[https://michaelpeters.org/cloud-computing-really-secure/ Is Cloud Computing Really Secure? A Pragmatic Approach]
 +
#[https://nakedsecurity.sophos.com/2016/07/20/update-now-macs-and-iphones-have-a-stagefright-style-bug/ Update now: Macs and iPhones have a Stagefright-style bug!]
 +
#[https://www.astechconsulting.com/blog/2016/ransomware-on-the-cheap/ Ransomware on the Cheap]
 +
#[https://threatpost.com/15-vulnerabilities-in-sap-hana-outlined/119406/ 15 Vulnerabilities in SAP HANA Outlined]
 +
#[https://threatpost.com/eff-files-lawsuit-challenging-dmcas-restrictions-on-security-researchers/119410/ EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers]
 +
#[http://www.mrrobothacks.com/look-found-mr-robot-s02e01/ The Mr. Robot Easter Egg Hunt Has Begun]
 +
#[http://www.theinquirer.net/inquirer/news/2465042/security-wizard-bruce-schneier-joins-the-tor-project Bruce Schneier Joins The Tor Project]
 +
#[http://www.theregister.co.uk/2016/07/15/borg_bashes_bandages_router_dosndross_bugs/ Cisco Gives You Two Nasty Bugs To Fix Before The Weekend]
 +
#[http://www.zdnet.com/article/thanks-script-kiddies-200gbps-ddos-attacks-now-commonplace/ "Thanks]
 +
#[http://money.cnn.com/2016/07/16/technology/pokemon-go-crash-game/index.html Hackers Claim Credit For Crashing Pokemon Go]
 +
#[https://threatpost.com/iot-insecurity-pinpointing-the-problems/119389/ IoT Insecurity: Pinpointing The Problems]
 +
#[http://finance.yahoo.com/news/darpa-grand-cyber-challenge-hacking-000000417.html The coolest US agency is starting a ‘revolution’ to get rid of computer viruses]
 +
#[http://www.cnet.com/news/wikileaks-under-sustained-attack-after-announcing-release-of-turkey-docs/ WikiLeaks under 'sustained attack' after announcing release of Turkey docs - CNET]
 +
#[http://www.infoworld.com/article/3096812/application-development/iot-spurs-surprise-surge-in-assembly-language-popularity.html IoT spurs surprise surge in assembly language popularity | InfoWorld]
 +
#[http://arstechnica.com/security/2016/07/criminals-plant-banking-malware-where-victims-least-expect-it/ Criminals plant banking malware where victims least expect it | Ars Technica]
  
 
== Larry's Stories ==
 
== Larry's Stories ==

Revision as of 20:31, 21 July 2016

Paul's Security Weekly - Episode 474 - 6:00PM

Recorded: July 21, 2016

Episode Audio

[] Coming Soon

Announcements

Interview: John Kindervag

JohnKindervag.jpg

With more than 25 years of high tech experience, John is best known for creating the highly influential “Zero Trust” model of information security. He currently advises both public and private sector organizations with the design and building of Zero Trust Networks. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect before joining Forrester. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussing information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World.

  1. How did you get your start in information security?
  1. Three words to describe yourself.
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby-grabby, do you prefer to go first or second?
  5. Choose two celebrities to be your parents.

Tech Segment:

Security News - 7:00PM-8:00PM

Paul's Stories

  1. "Guest Diary
  2. Everything You Need To Know About Web Shells
  3. Drone operator arrested for flying over wildfire
  4. SeaWorld hacker and bomb hoaxer escapes prison sentence
  5. Alex Gibney on Stuxnet and why we need to talk about cyberwar
  6. "Adobe
  7. Gotta Catch ‘Em All! – WORLDWIDE! (or how to spoof GPS to cheat at Pokémon GO) - Insinuator
  8. Is Cloud Computing Really Secure? A Pragmatic Approach
  9. Update now: Macs and iPhones have a Stagefright-style bug!
  10. Ransomware on the Cheap
  11. 15 Vulnerabilities in SAP HANA Outlined
  12. EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers
  13. The Mr. Robot Easter Egg Hunt Has Begun
  14. Bruce Schneier Joins The Tor Project
  15. Cisco Gives You Two Nasty Bugs To Fix Before The Weekend
  16. "Thanks
  17. Hackers Claim Credit For Crashing Pokemon Go
  18. IoT Insecurity: Pinpointing The Problems
  19. The coolest US agency is starting a ‘revolution’ to get rid of computer viruses
  20. WikiLeaks under 'sustained attack' after announcing release of Turkey docs - CNET
  21. IoT spurs surprise surge in assembly language popularity | InfoWorld
  22. Criminals plant banking malware where victims least expect it | Ars Technica

Larry's Stories

Joff's Stories

Jack's Stories

Kevin's Stories

Michael's (Santa) Stories