Plus a chat with Micah Lee about Onionshare...
May 29th, 2014 --
On this week's show we've got a great interview with Micah Lee. He works for The Intercept, the publication Glenn Greenwald set up to report on the Snowden leaks. He's developed a very simple file transfer tool for ToR called Onionshare. It's a very simple utility that has a bunch of interesting applications. This week's show is brought to you by Rapid7, thanks a bunch to the guys and gals there. Rapid7's Lee Weiner drops in to talk about how we lock down corporate security in a world where most of your users re-use their VPN passwords on every website they ever join.
TrueCrypt killed JFK! Wake up sheeple!!!
May 29th, 2014 --
Links to articles discussed in episode 323 of the Risky Business podcast!
Professor Hugh White joins the show...
May 23rd, 2014 --
On this week's show we've got a cracking interview with ANU Professor and former prime ministerial advisor Hugh White about the charges brought against alleged Chinese military hackers by the US Department of Justice. That one's coming up after the news. This week's show is brought to you by Tenable Network Security. Jack Daniel of Tenable stops by in this week's sponsor interview to talk about password managers in light of the eBay breach. Is it time we really started encouraging people to use them?
Poor eBay.
May 23rd, 2014 --
You should really, really check out this week's feature track if you like loud music.
This does not make any sense...
May 19th, 2014 --
We're going to close out this year's coverage the way we normally do it: with a recording of the AusCERT speed debate! I was a debater this year and as you'll hear I had zero time to prepare, so my contributions are pretty lame, but there was a hell of a panel like always. The whole thing was moderated by Adam Spencer. Most of it makes no sense, some of it is funny, some of it is just stupid. Like it or loathe it, it's almost become an institution at this point so we absolutely have to include it.
How World of Warcraft can inform enterprise security...
May 19th, 2014 --
On the final day of AusCERT last week delegates were treated to a fascinating talk by Dr. Jason Fox, gamification expert and author of the book The Game Changer. Jason's expertise is in finding out how to take the motivational aspects of games and apply them to work processes. We all know that sitting your staff down in a dimly lit auditorium to lecture them on spear phishing does precisely nothing to change user behaviour. But what if you made the hunt for spear phishing messages a game? I sat down with Jason Fox after his presentation and recorded this interview.
The message is getting out there...
May 19th, 2014 --
In this sponsor cast we're chatting with Dave Merkel, the CTO of FireEye. Dave has been around the infosec traps since the 90s -- long enough to see how things have changed. One of the things that has changed is the acknowledgement by the market that you can't really keep attackers from gaining a foothold on at least *a* device within your environment. It's the reason we're seeing a lot of gear hit the market that will help you post intrusion. I started off by asking Dave if he'd noticed this shift in thinking in the market.
Design by committee a bigger threat to crypto than intelligence agencies...
May 19th, 2014 --
I've already podcasted Peter's presentation, but I thought a follow up interview was warranted. To cut a long story short, he does believe some crypto standards have been subverted by the NSA, but says some fears about government crypto-fiddling are misplaced. In general, he says, it's a lot easier for attackers to bypass encryption than it is for them to break it. Peter knows crypto. He's a professor at Auckland University, has written crypto libraries and even had a hand in writing PGP.
Arbor Networks' Scott Crane has a chat...
May 19th, 2014 --
Scott Crane is Arbor Networks product manager for its Pravail line of big data security analytics division. Scott was a part of the original PacketLoop team -- PacketLoop was an Australian start up that created some pretty impressive big data security analytics technology. It was so impressive that it wound up being acquired by Arbor Networks and is now sold under the Pravail brand.
HACK THE PLANET!!!
May 16th, 2014 --
In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers. I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!
Peter Gutmann's plenary session from AusCERT 2014...
May 16th, 2014 --
You're about to hear a recording of Peter Gutmann's speech here which is all about crypto. Well, it's sort of about crypto. With newspapers filled with stories about the NSA subverting crypto standards, Peter asks us whether that really matters. Why would an attacker bother breaking crypto when they can just bypass it? Peter is well positioned to do this talk. He's a researcher in the Department of Computer Science at the University of Auckland and works on the design and analysis of cryptographic security architectures and security usability.
Arbor Networks' Marc Eisenbarth talks DDoS...
May 16th, 2014 --
This is a sponsor interview with Marc Eisenbarth, Arbor Networks' security architect and the manager of research for its Arbor Security Engineering and Response Team (ASERT). I spoke to Mark about the massive influx of NTP-based DDoS traffic we've seen this year. Can we expect attackers to move on to other protocols and services like SNMP and Chargen? He thinks so. But it's not until we start seeing SNMP-based DDoS capabilities built into generic malware that we'll really have big problems.
Matt reads Twitter so you don't have to...
May 16th, 2014 --
You're about to hear my interview with Matt Jones, a security consultant who runs a small outfit named Volvent. He's been working on a very interesting side project for a couple of years now. Essentially it's a social media analyser that identifies sources of high-quality information. Users can tap in a keyword and drill through the conversations on social media that actually matter -- the conversations that influence the influencers. The project was born of Matt's desire to never have to log in to Twitter again.
Get your SOE builds right, folks...
May 16th, 2014 --
This is a sponsor interview with Kate McInnes of Datacom TSS. Kate is ex-DSD and currently serves as a principal consultant with Datacom TSS in Perth. She's been doing a bunch of work with a bunch of different organisations on preparing them for the looming G20 summit in Brisbane. What do the threats look like? Where are they coming from? And what can be done about them?
What does a military cyber-lawyer think of what's happening in the civilian world?
May 16th, 2014 --
You're about to hear an interview I recorded with Bob Clark. He currently teaches law at the US Naval Academy, but he's been doing military law for a long time, even serving as the operational attorney for the US Army Cyber Command at one point. I posted his talk yesterday... he touched on the Weev vs AT&T trial in that and I thought it would be interesting to get his perspective on the CFAA, precisely because it's not the sort of thing he normally concerns himself with. He has less of an agenda than a defence attorney or a prosecutor.
Is state control faltering?
May 15th, 2014 --
Our coverage continues now with an interview I recorded with Olivia Maree and Dave Jorm. Olivia holds a law degree and just finished a six month stint as a community manager with BugCrowd… Dave Jorm studies geology and mathematics at UQ and has worked in the software industry for around 14 years.
The “other Ed” words it up...
May 15th, 2014 --
This is a recording of Ed Felton’s plenary session from AusCERT 2014. Ed Felton is a professor of computer science and public affairs at Princeton’s centre for information technology policy. From 2011 to 2012 he was the first Chief Technologist for the Federal Trade Commission. He’s a very well known and highly regarded researcher and academic and he spoke at AusCERT on security in a surveilled world.
But it’s not all good news…
May 15th, 2014 --
In this sponsor podcast we hear from FireEye’s APAC CTO Bryce Boland about the effect next generation antimalware gear is having on the modus operandi of sophisticated attackers. The possibility of burning their sweet, sweet 0days is actually turning some attackers away from well-resourced targets and towards secondary targeting; attacking their targets' partners and suppliers.
Bob Clark returns to AusCERT…
May 15th, 2014 --
PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)? Bob Clark returns to AusCERT… This is a recording of a presentation by Bob Clark, who these days teaches at the US Naval Academy. He has a long history as a department of defence lawyer including a stint as the counsel for the US Army Cyber Command. In this talk Bob covers some ground he has covered before -- looking at when an online action represents an act of war under the laws of armed conflict -- but also takes a look at some legal cases in the civilian world involving the CFAA.
10 years on and Oracle’s report card still lacking…
May 15th, 2014 --
David Litchfield is a very well known researcher in the field of database security. He’s been at it for over a decade, and managed to be a permanent pain in Oracle’s neck since he first started dropping database 0day a million years ago. So I asked him what has changed in the field of database security. Has Oracle improved its procedures?