Will malware turn Blackberries... blue?!?!
June 2nd, 2010 --
RB2 is brought to you exclusively by Symantec. Mobile security is all the rage these days, so when Research In Motion (RIM) VP of security Scott Totzke came to Australia a few weeks ago, we made sure we got an interview. RIM is the company that makes the Blackberry. While it doesn't have as many cool points as the iPhone, the Blackberry has become the mobile workhorse of the modern enterprise. US President Barack Obama famously insisted on keeping his Blackberry when he came to office, so obviously anything Scott has to say about mobile security deserves to be heard.
Mark talks about his work on Google Chrome's sandbox...
May 28th, 2010 --
Our feature guest this week Azimuth Security's Mark Dowd. Mark is widely regarded as one of the best vulnerability researchers in the industry. He's published remote flaws in software like Sendmail and SSH, he's even created new classes of bugs. Remember that cross platform Flash bug a while ago? That was him, too.
Is Facebook running out of friends? Hur hur.
May 27th, 2010 --
The following is a longer, uncut version of a story that appeared on the front pages of The Age and Sydney Morning Herald yesterday. Facebook's woeful relationship with law enforcement bodies is hampering police investigations and putting lives at risk, the Australian Federal Police says.
It can be a sneaky tool for sneaky people, or a weapon against oppression...
May 26th, 2010 --
In this presentation you'll hear Tor project leader Roger Dingledine talking all about Tor. Who uses it? Why? What's it good for? For those who don't know what it is, Tor is a free-software anonymizing network that helps people around the world use the Internet in safety, the official blurb says.
Where will we be in 2012?
May 26th, 2010 --
In this presentation, Cisco's Vice President and Chief Security Officer John Stewart tries to pin down where we're going to be in 2012. More devices doing more things! Malware embedded in video streams! All sorts of funky stuff!
IBM "pulls a Telstra," red faces everywhere...
May 21st, 2010 --
Risky.Biz has confirmed IBM staff distributed malware-infected USB drives at the AusCERT security conference this week. In a highly embarrassing admission, the company has sent a broadcast e-mail to all AusCERT attendees warning them of the security lapse. "At the AusCERT conference this week, you may have collected a complimentary USB key from the IBM booth," the message reads. "Unfortunately we have discovered that some of these USB keys contained malware and we suspect that all USB keys may be affected."
Has anyone ever noticed that Max Kilger sounds like Kermit the frog?
May 21st, 2010 --
What you're about to hear is the speed debating panel from AusCERT's 2010 conference. A highlight of the conference, this year's panel was hosted by Australian media personality guy Adam Spencer. Panelists were: Max Kilger, Scott McIntyre, Marcus J. Ranum, Roger Dingledine, Alastair MacGibbon, Paul Gampe and Tim Redhead.
Google doesn't filter easily detectable malicious links...
May 21st, 2010 --
In this podcast you'll hear an interview I did with ZScaler's Michael Sutton. In it he expresses frustration that criminals are able to so easily manipulate Google's search results for trending topics. Sutton claims that malicious pages linked to trending topics are rising through Google's rankings almost immediately. In other words, the bad guys have gotten good at SEO. But if Sutton and his colleagues can identify these pages from outside Google, why can't Google detect them? It's not exactly short on resources or cash.
DEP and ASLR have done more than patching, Mosse argues...
May 21st, 2010 --
In this interview you'll hear me having a quick chat to Stratsec's Ben Mosse about vulnerability mitigation in Windows. Cutting a long story short, he reckons measures like DEP and ASLR work quite well, and it's only a matter of time before more, similar protections are introduced.
You can lead a user to AV, but you can't make them install it...
May 21st, 2010 --
In the following interview, Microsoft's Steve Adegbite joins me for this interview about the potential for a nanny state operating system. With all this rogue AV stuff floating about, the Microsofties are encountering a few fairly significant dilemmas on how to deal with this stuff. Should the OS only accept certain, known brands of AV? Well, then they're acting as a gateway and telling people what they can and can't run. Can't do that. What about a warning system like they did with device drivers? Well, that wasn't much good in the end because people just ignored the warnings.
HTML5, Google Gears to introduce some hairy new issues...
May 20th, 2010 --
The following is a recording of a presentation by Zscaler's Michael Sutton. The topic is Security risks in the next generation of offline Web applications. Basically the talk looks at persistent client side storage, as brought on by stuff like Google Gears and the Database Storage functionality included in HTML5. It was one of the better talks.
Ranum isn't convinced cyber war is a reality...
May 20th, 2010 --
In this podcast you'll hear Marcus Ranum's keynote speech from day two of the conference. Marcus is Tenable Network Security's Chief Security Officer and he's widely credited as an early pioneer in firewall technology. His talk is titled "Scenes from the 2010 US/China Cyber war".
Maintaining proportionality vital to securing the Internet...
May 20th, 2010 --
In this presentation you'll hear Scott McIntyre talking about maintaining proportionality when dealing with matters of digital security. Scott's the Chief Security Officer for Dutch ISP XS4all and serves on the board of directors for the Forum of Incident Response and Security Teams, or FIRST.
Collaboration means more than a beer together once a year...
May 20th, 2010 --
Our coverage of AusCERT's 2010 conference is sponsored by Microsoft, and there's a few Microsofties floating about here. Two of them, Karl Hanmore and Steve Adegbite, prepared this presentation, titled "Engagement between National and Government CERTs and the vendor community -- benefits and challenges." It is, in part, a criticism of the way vendors and CERTS are actually dealing with each other.
Whitfield Diffie words us up on the 11 secret herbs and spices...
May 18th, 2010 --
In this interview we check in with a bit of a legend, Whitfield Diffie. He's universally credited as one of the creators of public key infrastructure, and he was the opening keynote speaker at the AusCERT conference. I grabbed Whit for an interview in the hotel lobby bar and started off by asking him if he's disappointed that PKI hasn't been universally adopted yet.
Understanding how it all goes wrong...
May 18th, 2010 --
In this podcast you'll hear a presentation by Frank Stajano of the University of Cambridge. In it he discusses seven principles for systems security derived from understanding scam victims. He argues that by understanding the recurring behavioural patterns of victims that hustlers have learned to exploit, we can create systems that are more resistant to fraud.
Apparently you *can* be de-radicalised...
May 18th, 2010 --
In this sponsor podcast you'll hear an excerpt from Crispin Cowan's talk. Crispin works for Microsoft, but he used to be a vocal Microsoft critic and Linux fundamentalist. These days he spends his time trying to retrofit Windows with decent security. He works for the Windows core team. I'll drop you into the talk here where he's explaining how certain bad things happened to Windows and the Microsoft ecosystem, namely, how interoperability concerns hampered the software company's ability to secure Windows.
Modern mobiles are actually securable, these guys claim!
May 18th, 2010 --
In this podcast we chat to two guys from Australian-based security firm Stratsec. Ben Bromhead and Ken Hendrie spend their lives up to their armpits in Windows mobile devices -- they actually do the worldwide common criteria evaluations for Windows mobile devices right here in Australia. As a result, these guys know a thing or two about mobile device security. In their presentation, titled simply "mobile security", the two looked at the common threats to mobile devices and some mitigations. I caught up with them after their presentation for this interview.
You heard me. Seven!
May 18th, 2010 --
In this podcast you'll hear me speaking with Assurance.com.au's Neal Wise about the seven deadly sins of mobility. Neal's a penetration tester and a complete and utter wireless nerd. He's a regular on the show and as it turns out he's a standby speaker for this year's AusCERT conference. If anyone winds up too hungover on Wednesday to speak, Neal will step in. You'll have most likely heard that Google has been busted collecting payload data from wireless networks as its vans drove around doing Google Street view videos... so I asked Neal for his take on that also. Enjoy.
The Belgians do things a bit differently...
May 14th, 2010 --
This week's show is sponsored by Check Point Software. In it we check in with Belgium-based security guy, spare-time researcher and noodler Didier Stevens. We're talking to Didier about a weird little project he unveiled a couple of months ago. He's taken the source code from the command interpreter from ReactOS and compiled it into a DLL that he can shove into memory. That way he gets shell without launching a new process. I got him on the show to ask him what the hell's wrong with Meterpreter for that sort of thing.