Difference between revisions of "Episode587"

From Security Weekly Wiki
Jump to navigationJump to search
Line 57: Line 57:
  
 
== Lee Neely's Stories ==
 
== Lee Neely's Stories ==
*https://www.nextgov.com/ideas/2018/12/fighting-deepfakes-will-require-more-technology/153530/
+
#[https://www.nextgov.com/ideas/2018/12/fighting-deepfakes-will-require-more-technology/153530/ Fighting Deepfakes]
*https://www.fifthdomain.com/industry/2018/12/13/hackers-are-making-their-attacks-look-like-they-came-from-the-chinese-government/
+
#[https://www.fifthdomain.com/industry/2018/12/13/hackers-are-making-their-attacks-look-like-they-came-from-the-chinese-government/ Hackers are Making Their Attacks Look Like They Came From the Chinese Government]
*[https://www.zdnet.com/article/us-ballistic-missile-systems-have-very-poor-cyber-security/ US ballistic missile systems have very poor cyber-security | ZDNet]
+
#[https://www.zdnet.com/article/us-ballistic-missile-systems-have-very-poor-cyber-security/ US ballistic missile systems have very poor cyber-security US Ballistic Missles Have Very Poor Cybersecurity]
*[https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/ Phishing Attack Pretends to be a Office 365 Non-Delivery Email]
+
#[https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/ Phishing Attack Pretends to be a Office 365 Non-Delivery Email]
*[https://www.businessinsider.com.au/nest-baby-monitor-hacked-by-man-who-threatened-kidnapping-2018-12 Parents say a man hacked their Nest baby monitors and threatened to kidnap their 4-month-old son]
+
#[[https://www.businessinsider.com.au/nest-baby-monitor-hacked-by-man-who-threatened-kidnapping-2018-12 Parents say a man hacked their Nest baby monitors and threatened to kidnap their 4-month-old son]
*PSA: The holidays see the introduction of lots of new consumer electronics, which are, more often than not, online and associated with accounts.  In the fervor of bringing these new treasures online, it is important to remember to not only setup accounts with strong unique passwords but also enable  two-factor authentication wherever supported.
+
#[PSA: The holidays see the introduction of lots of new consumer electronics, which are, more often than not, online and associated with accounts.  In the fervor of bringing these new treasures online, it is important to remember to not only setup accounts with strong unique passwords but also enable  two-factor authentication wherever supported.]
 
<br><br>
 
<br><br>
  

Revision as of 16:53, 20 December 2018

Recorded December 120, 2018 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Doug White
    Cybersecurity professor, President of Secure Technology, and Security Weekly network host.
  • Jeff Man
    Cryptanalyst
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Jack Daniel
    Co-Founder of Security BSides and certified security wizard.
  • Jason Wood
    Threat hunter at CrowdStrike, penetration tester, sysadmin, and Founder of Paladin Security.
  • Keith Hoodlet
    is the Senior Manager of Global DevSecOps at Thermo Fisher Scientific; Co-Founder of the InfoSec Mentors Project .
  • Joff Thyer
    SANS Instructor, penetration tester, and Security Researcher at Black Hills Information Security.
  • Patrick Laverty
    is a Pentester for Rapid7
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Guest Hosts

    April Wright
    is a Preventative Security Specialist at ArchitectSecurity.org.
    Brent Dukes
    is a Director of Information Security.


    Announcements

    • RSA Conference 2019 is the place to be for the latest in cybersecurity data, innovation and thought leadership. From March 4 – 8, San Francisco will come alive with cybersecurity’s brightest minds as they gather together to discuss the industry’s newest developments. Go to rsaconference.com/securityweekly-us19 to register now using the discount code 5U9SWFD to receive $100 off a full conference pass!
    • If you are interested in quality over quantity and having meaningful conversations instead of just a badge scan, join us April 1-3, at Disney's Contemporary Resort for InfoSec World 2019 where you can connect and network with like-minded individuals in search of actionable information. Use the registration code OS19-SECWEEK for 15% off the Main Conference or World Pass.
    • Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.

    Interview: Vaughn Adams, LogRhythm - 6:00-7:00PM

    Vaughn Adams
    is the Enterprise Sales Engineer at LogRhythm.

    Vaughn has been an Enterprise Sales Engineer with LogRhythm since 2015 and has covered the Philadelphia, Delaware and New York areas. He has 20 years of experience in Information Technology within the Philadelphia area. His roles have included UNIX Administration, Network Administration and Manager. He developed, implemented, managed and optimized a number of technologies in his organizations, including LogRhythm products.



    Security News - 7:00 - 7:30PM

    Paul's Stories

    1. Taylor Swift Used Facial Recognition to Thwart Stalkers
    2. Unlocking Android phones with a 3D-printed head
    3. New Australian Backdoor Law
    4. Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command
    5. Humble Bundle Breach Could Be First Step In Wider Attack
    6. OpSec Mistake Brings Down Network Of Dark Web Money Counterfeiter
    7. Ticketmaster Fails To Take Responsibility For Malware
    8. It's December Of 2018 And, To Hell With It, Just Patch Your Stuff
    9. Ethical Hacking Growing In Popularity At Data Breaches Increase
    10. UK Whitehats Blacklisted By Cisco Talos
    11. Worst password offenders of 2018 exposed
    12. Education Gets an 'F' for Cybersecurity
    13. Grammarly Launches Public Bug Bounty Program
    14. WordPress Releases Security Update

    Jeff's Stories

    1. Facebook is Gesing Sued for Billions
    2. NASA Reports a Data Breach
    3. Compulsory 2019 Predictions Article


    Joff's Stories

    Larry's Stories

    Lee Neely's Stories

    1. Fighting Deepfakes
    2. Hackers are Making Their Attacks Look Like They Came From the Chinese Government
    3. US ballistic missile systems have very poor cyber-security US Ballistic Missles Have Very Poor Cybersecurity
    4. Phishing Attack Pretends to be a Office 365 Non-Delivery Email
    5. [Parents say a man hacked their Nest baby monitors and threatened to kidnap their 4-month-old son
    6. [PSA: The holidays see the introduction of lots of new consumer electronics, which are, more often than not, online and associated with accounts. In the fervor of bringing these new treasures online, it is important to remember to not only setup accounts with strong unique passwords but also enable two-factor authentication wherever supported.]



    Interview: Mandy Logan, Hacking the Brainstem - 7:30PM-8:30PM

    Mandy Logan
    is a Newly Abled/Disabled Student of Life and InfoSec.

    Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artifical General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is.