Plus all the news that's fit to read...
June 27th, 2014 --
On this week's show we're chatting with Zach Lanier of Duo Security about some work he did on bypassing PayPal's two-factor authentication. In short, PayPal's implementation had an absolute clanger of a logic bug in it that these guys were able to find. The secret sauce to the attack? Flight mode! No joke.
Get all your links here!
June 27th, 2014 --
A list of items discussed in episode 327 of the Risky Business podcast.
One paid, one didn't. Guess which one is still around...
June 20th, 2014 --
On this week's show we have a quick chat with The Register's Darren Pauli about XP still being bloody everywhere. You'd think organisations out there would realise how absolutely crackheaded it is to keep running XP since support ended, but nope... Even the police are happily chugging away on perennially vulnerable boxes. Great. This week's show is brought to you by BugCrowd: outsourced bug bounty programs.
We laughed, we cried...
June 20th, 2014 --
Links to items discussed in episode 326 of the Risky Business podcast.
What do we call this one? APT2?
June 13th, 2014 --
In this week's show we chat to The Grugq about the Chinese cyber espionage campaign unmasking that has no one talking. Unlike the unit 61398 report from Mandiant last February, CrowdStrike's unit 61486 report has really fallen flat.
May the stomachs of the villain's pawns roast in hell! (This makes sense later)
June 13th, 2014 --
Links to all the items discussed in this week's Risky Business podcast, plus some choice quotes from Saddam Hussein's former information minister and all time spin king Mohammed Saeed al-Sahaf.
Are underground marketplaces a fad?
June 6th, 2014 --
In this week's show we're joined by Wired journalist Andy Greenberg to chat about one of his areas of interest and coverage -- underground markets and crypto currencies. We also chat to Andy about his views on post-Wikileaks leaking. Why did Snowden go to Glenn Greenwald instead of Wikileaks and what does that tell us about Wikileaks' founding philosophy? Tune in to hear all about it. In this week's sponsor interview we chat with Julian Fay, CTO of Senetas.
OpenSSL cops it again...
June 6th, 2014 --
Links to items discussed in this week's show!
Simple EOL? Bath salts? WUT????
May 30th, 2014 --
Our good buddy Mark Piper of Insomnia Security wrote up a Facebook note (seriously, who does that?) about the TrueCrypt situation. It's a little bit of FAQ with a dollop of history, sprinkled with speculation.
Plus a chat with Micah Lee about Onionshare...
May 29th, 2014 --
On this week's show we've got a great interview with Micah Lee. He works for The Intercept, the publication Glenn Greenwald set up to report on the Snowden leaks. He's developed a very simple file transfer tool for ToR called Onionshare. It's a very simple utility that has a bunch of interesting applications. This week's show is brought to you by Rapid7, thanks a bunch to the guys and gals there. Rapid7's Lee Weiner drops in to talk about how we lock down corporate security in a world where most of your users re-use their VPN passwords on every website they ever join.
TrueCrypt killed JFK! Wake up sheeple!!!
May 29th, 2014 --
Links to articles discussed in episode 323 of the Risky Business podcast!
Professor Hugh White joins the show...
May 23rd, 2014 --
On this week's show we've got a cracking interview with ANU Professor and former prime ministerial advisor Hugh White about the charges brought against alleged Chinese military hackers by the US Department of Justice. That one's coming up after the news. This week's show is brought to you by Tenable Network Security. Jack Daniel of Tenable stops by in this week's sponsor interview to talk about password managers in light of the eBay breach. Is it time we really started encouraging people to use them?
Poor eBay.
May 23rd, 2014 --
You should really, really check out this week's feature track if you like loud music.
This does not make any sense...
May 19th, 2014 --
We're going to close out this year's coverage the way we normally do it: with a recording of the AusCERT speed debate! I was a debater this year and as you'll hear I had zero time to prepare, so my contributions are pretty lame, but there was a hell of a panel like always. The whole thing was moderated by Adam Spencer. Most of it makes no sense, some of it is funny, some of it is just stupid. Like it or loathe it, it's almost become an institution at this point so we absolutely have to include it.
How World of Warcraft can inform enterprise security...
May 19th, 2014 --
On the final day of AusCERT last week delegates were treated to a fascinating talk by Dr. Jason Fox, gamification expert and author of the book The Game Changer. Jason's expertise is in finding out how to take the motivational aspects of games and apply them to work processes. We all know that sitting your staff down in a dimly lit auditorium to lecture them on spear phishing does precisely nothing to change user behaviour. But what if you made the hunt for spear phishing messages a game? I sat down with Jason Fox after his presentation and recorded this interview.
The message is getting out there...
May 19th, 2014 --
In this sponsor cast we're chatting with Dave Merkel, the CTO of FireEye. Dave has been around the infosec traps since the 90s -- long enough to see how things have changed. One of the things that has changed is the acknowledgement by the market that you can't really keep attackers from gaining a foothold on at least *a* device within your environment. It's the reason we're seeing a lot of gear hit the market that will help you post intrusion. I started off by asking Dave if he'd noticed this shift in thinking in the market.
Design by committee a bigger threat to crypto than intelligence agencies...
May 19th, 2014 --
I've already podcasted Peter's presentation, but I thought a follow up interview was warranted. To cut a long story short, he does believe some crypto standards have been subverted by the NSA, but says some fears about government crypto-fiddling are misplaced. In general, he says, it's a lot easier for attackers to bypass encryption than it is for them to break it. Peter knows crypto. He's a professor at Auckland University, has written crypto libraries and even had a hand in writing PGP.
Arbor Networks' Scott Crane has a chat...
May 19th, 2014 --
Scott Crane is Arbor Networks product manager for its Pravail line of big data security analytics division. Scott was a part of the original PacketLoop team -- PacketLoop was an Australian start up that created some pretty impressive big data security analytics technology. It was so impressive that it wound up being acquired by Arbor Networks and is now sold under the Pravail brand.
HACK THE PLANET!!!
May 16th, 2014 --
In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers. I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!
Peter Gutmann's plenary session from AusCERT 2014...
May 16th, 2014 --
You're about to hear a recording of Peter Gutmann's speech here which is all about crypto. Well, it's sort of about crypto. With newspapers filled with stories about the NSA subverting crypto standards, Peter asks us whether that really matters. Why would an attacker bother breaking crypto when they can just bypass it? Peter is well positioned to do this talk. He's a researcher in the Department of Computer Science at the University of Auckland and works on the design and analysis of cryptographic security architectures and security usability.