Multi-stream fragmentation is the new black...
August 1st, 2014 --
In this week's feature interview we're chat with Catherine Pearce of Neohapsis about some research she'll be presenting at BlackHat next week with her colleague Patrick Thomas. They're doing a talk all about Multipath TCP, and yes, it's exactly what it sounds like and yes, it's great for doing stuff like IDS evasion and confusing firewalls.
Get your links here!
August 1st, 2014 --
Wikileaks has done something relevant, more details on the CMU Tor research and much more!
Drama in the world of anonymity and privacy...
July 25th, 2014 --
Earlier this week Twitter was abuzz with talk of a serious bug in the Tails live OS, a bootable on-a-DVD or USB device OS used by pro-democracy activists. And by pro democracy activists I mean, you know, potheads buying a few ounces on Silk Road, but whatever... Well according to the Twitters there was a Tails bug that was going to be a big deal... right? Riiight? Well, maybe not. The Grugq joins the show to discuss that, and the pulling of a scheduled BlackHat talk on Tor.
All the news we could be bothered with...
July 25th, 2014 --
Links to items discussed in episode 331 of the Risky Business podcast.
Elinor Mills talks infosec marketing and PR...
July 18th, 2014 --
On this week's show we're chatting with infosec journalist turned PR strategist Elinor Mills. For eight years Elinor wrote about security for CNet, before joining Bateman group as a content and media strategist in 2012. We're chatting with Elinor about how the infosec media agenda is set. Do massive advertising, marketing and PR budgets give disproportionate media influence to companies that don't deserve it? Drum roll please... yup. Yes. Yes they do. But we'll chat to Elinor about that after the news.
This week's links!
July 18th, 2014 --
Links to items discussed in this week's episode of the Risky Business podcast.
...and all sorts of other news...
July 11th, 2014 --
There is no feature interview in this week's show. If you tuned in last week you would have heard HD Moore and I talking about a project called Well, we launched a FAQ and the Internet liked it... the Internet *really* liked it... so I've spent much of the week working on There's some really cool stuff happening there that I can't really talk about yet, but I can say the project has picked up a lot of interest. There's some very cool stuff happening and I'll be able to talk more about it soon.
This week in stupid...
July 11th, 2014 --
Links to articles discussed in this week's episode of Risky Business...
Plus the news with Adam!
July 4th, 2014 --
This week's show is brought to you by Rapid7, big, big thanks to them. This week's sponsor interview is with Rapid7's Chief Research Officer HD Moore. But you know what? One interview with HD just isn't enough, is it? So he's also joining us in the feature segment to discuss a project I'm putting together called
All the news that's fit to read...
July 4th, 2014 --
Links to items discussed in episode 328 of the Risky Business podcast.
Plus all the news that's fit to read...
June 27th, 2014 --
On this week's show we're chatting with Zach Lanier of Duo Security about some work he did on bypassing PayPal's two-factor authentication. In short, PayPal's implementation had an absolute clanger of a logic bug in it that these guys were able to find. The secret sauce to the attack? Flight mode! No joke.
Get all your links here!
June 27th, 2014 --
A list of items discussed in episode 327 of the Risky Business podcast.
One paid, one didn't. Guess which one is still around...
June 20th, 2014 --
On this week's show we have a quick chat with The Register's Darren Pauli about XP still being bloody everywhere. You'd think organisations out there would realise how absolutely crackheaded it is to keep running XP since support ended, but nope... Even the police are happily chugging away on perennially vulnerable boxes. Great. This week's show is brought to you by BugCrowd: outsourced bug bounty programs.
We laughed, we cried...
June 20th, 2014 --
Links to items discussed in episode 326 of the Risky Business podcast.
What do we call this one? APT2?
June 13th, 2014 --
In this week's show we chat to The Grugq about the Chinese cyber espionage campaign unmasking that has no one talking. Unlike the unit 61398 report from Mandiant last February, CrowdStrike's unit 61486 report has really fallen flat.
May the stomachs of the villain's pawns roast in hell! (This makes sense later)
June 13th, 2014 --
Links to all the items discussed in this week's Risky Business podcast, plus some choice quotes from Saddam Hussein's former information minister and all time spin king Mohammed Saeed al-Sahaf.
Are underground marketplaces a fad?
June 6th, 2014 --
In this week's show we're joined by Wired journalist Andy Greenberg to chat about one of his areas of interest and coverage -- underground markets and crypto currencies. We also chat to Andy about his views on post-Wikileaks leaking. Why did Snowden go to Glenn Greenwald instead of Wikileaks and what does that tell us about Wikileaks' founding philosophy? Tune in to hear all about it. In this week's sponsor interview we chat with Julian Fay, CTO of Senetas.
OpenSSL cops it again...
June 6th, 2014 --
Links to items discussed in this week's show!
Simple EOL? Bath salts? WUT????
May 30th, 2014 --
Our good buddy Mark Piper of Insomnia Security wrote up a Facebook note (seriously, who does that?) about the TrueCrypt situation. It's a little bit of FAQ with a dollop of history, sprinkled with speculation.
Plus a chat with Micah Lee about Onionshare...
May 29th, 2014 --
On this week's show we've got a great interview with Micah Lee. He works for The Intercept, the publication Glenn Greenwald set up to report on the Snowden leaks. He's developed a very simple file transfer tool for ToR called Onionshare. It's a very simple utility that has a bunch of interesting applications. This week's show is brought to you by Rapid7, thanks a bunch to the guys and gals there. Rapid7's Lee Weiner drops in to talk about how we lock down corporate security in a world where most of your users re-use their VPN passwords on every website they ever join.