Podcasts

News, analysis and commentary

SPONSOR PODCAST: David Litchfield on hacking ‘dem databases

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

David Litchfield is a very well known researcher in the field of database security. He's been at it for over a decade, and managed to be a permanent pain in Oracle's neck since he first started dropping database 0day a million years ago.

So I asked him what has changed in the field of database security. Has Oracle improved its procedures?

SPONSOR PODCAST: David Litchfield on hacking ‘dem databases
0:00 / 9:10

SPONSOR PODCAST: Attacker MOs are changing

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor podcast we hear from FireEye's APAC CTO Bryce Boland about the effect next generation antimalware gear is having on the modus operandi of sophisticated attackers.

The possibility of burning their sweet, sweet 0days is actually turning some attackers away from well-resourced targets and towards secondary targeting; attacking their targets' partners and suppliers.

SPONSOR PODCAST: Attacker MOs are changing
0:00 / 11:47

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?
Bob Clark returns to AusCERT\u2026

This is a recording of a presentation by Bob Clark, who these days teaches at the US Naval Academy. He has a long history as a department of defence lawyer including a stint as the counsel for the US Army Cyber Command.

In this talk Bob covers some ground he has covered before -- looking at when an online action represents an act of war under the laws of armed conflict -- but also takes a look at some legal cases in the civilian world involving the CFAA.

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?
0:00 / 36:38

PRESENTATION: Felix “FX” Lindner’s AusCERT keynote

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

We're going to kick things off with a recording of the opening keynote from the conference... this talk is by Felix "FX" Lindner of Recurity Labs.

Felix is a very well known hacker and researcher, and his talk is titled we come in peace, they don't. As you'll hear, he's not exactly Google's number one fan. Here he is, I hope you enjoy it!

PRESENTATION: Felix “FX” Lindner’s AusCERT keynote
0:00 / 45:48

PRESENTATION: Ed Felton on security in the surveillance age

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This is a recording of Ed Felton's plenary session from AusCERT 2014.

Ed Felton is a professor of computer science and public affairs at Princeton's centre for information technology policy. From 2011 to 2012 he was the first Chief Technologist for the Federal Trade Commission. He's a very well known and highly regarded researcher and academic and he spoke at AusCERT on security in a surveilled world.

PRESENTATION: Ed Felton on security in the surveillance age
0:00 / 36:26

INTERVIEW: Information leaks into North Korea

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Our coverage continues now with an interview I recorded with Olivia Maree and Dave Jorm. Olivia holds a law degree and just finished a six month stint as a community manager with BugCrowd\u2026 Dave Jorm studies geology and mathematics at UQ and has worked in the software industry for around 14 years.

Some of you would remember the interview I did with Dave last year about his OSINT analysis of North Korea, I also recorded and published his AusCERT talk on that topic last year. Well, this year he returned to AusCERT with his pal Olivia Maree to do another North Korea-themed presentation. This time the pair presented a talk about the information cordon - how information gets in and out of the country. Between USB thumb drives attached to home-made air balloons to tiny radios smuggled in to the Democratic People's Republic of Korea, you'll hear that state control of information entering the country isn't what it used to be, and, you know, that's a pretty big deal. and yes, I know this isn't your typical info sec story but you all loved my interview with Dave last year so I figured you'd all want to hear about this anyway\u2026

I started off by asking Olivia how the regime seeks to control information flowing into North Korea\u2026

**************EDITOR'S NOTE: This post originally referred to Olivia Maree as a lawyer. While she has a law degree, Olivia has never worked as a lawyer or completed articles. Apologies for any confusion. The audio introduction to this interview is still incorrect and will not be updated. - PG

INTERVIEW: Information leaks into North Korea
0:00 / 12:10

Risky Business 321 -- Silvio goes to Bunnings

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're chatting with Silvio Cesare about his new pastime of messing around with home alarm systems, garage door remotes and car immobilisers. How secure do you think your little key ring transmitters are? Well, not very. But the interesting thing is, the tools that you need to crack these things are now very cheap -- could we see thieves roaming the streets with software defined radios, opening up your neighbourhood's garages? Tune in to find out

This week's show is brought to you by HackLabs, an Australian penetration testing and security consulting firm. HackLabs head honcho Chris Gatford joins us in this week's sponsor interview to have a yarn about inadvertent disclosures.

It seems every week we're reading another story about sensitive information being uploaded to a web accessible directory and indexed by Google. It's true that there's no cure for stupid, but is there anything we can do to stop these things happening?

Adam Boileau, as always, joins the show to discuss the week's security news.

Show notes and links to everything can be found here.

Risky Business 321 -- Silvio goes to Bunnings
0:00 / 57:18

Risky Business #320 -- Hacking cars with Charlie Miller

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're chatting with security researcher Charlie Miller about the work he's been doing with Chris Valasek on hacking cars. It's fun stuff, but yeah, it might make you want to go back to driving an older car.

This week's show is sponsored by BugCrowd. We've got a great interview with BugCrowd founder and CEO Casey Ellis about a really, really interesting little case study he went through involving a random bug-hunter who'd tried blackmailing a BugCrowd client. The solution they came up with was ingenious and spectacularly lulzy.

Show notes

Microsoft fixes big IE bug -- even on Windows XP - CNET
http://www.cnet.com/news/microsoft-fixes-big-ie-bug-on-windows-xp-even/

Microsoft tells IE users how to defend against zero-day bug - CNET
http://www.cnet.com/news/microsoft-tells-ie-users-how-to-defend-against-...

Flash Zero Day Used to Target Victims in Syria | Threatpost | The first stop for security news
http://threatpost.com/flash-zero-day-used-to-target-victims-in-syria/105726

Mozilla Redesigns Firefox, Fixes Security Vulnerabilities | Threatpost | The first stop for security news
http://threatpost.com/mozilla-redesigns-firefox-browser-fixes-security-v...

Mozilla Offers Bug Bounty for Heartbleed-like Crypto Bugs | Threatpost | The first stop for security news
http://threatpost.com/mozilla-offers-bug-bounty-for-new-certificate-veri...

After Heartbleed, NSA reveals some flaws are kept secret - CNET
http://www.cnet.com/news/after-heartbleed-nsa-reveals-some-flaws-are-kep...

Obama Policy on Zero Days Craps Out - Forbes
http://www.forbes.com/sites/jennifergranick/2014/04/29/obama-policy-on-z...

Target Accelerates Chip-and-Pin Roll Out, Hires New CIO | Threatpost | The first stop for security news
http://threatpost.com/target-accelerates-chip-and-pin-roll-out-hires-new...

Anonymous activist pleads guilty to threatening FBI agent - CNET
http://www.cnet.com/news/anonymous-activist-pleads-guilty-to-threatening...

Inside the 'DarkMarket' Prototype, a Silk Road the FBI Can Never Seize | Threat Level | WIRED
http://www.wired.com/2014/04/darkmarket/

It's Insanely Easy to Hack Hospital Equipment | Threat Level | WIRED
http://www.wired.com/2014/04/hospital-equipment-vulnerable/

Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars | Threat Level | WIRED
http://www.wired.com/2014/04/traffic-lights-hacking/

Exploiting Facebook Notes to Launch DDoS | Threatpost | The first stop for security news
http://threatpost.com/exploiting-facebook-notes-to-launch-ddos/105701

UltraDNS Dealing with DDoS Attack | Threatpost | The first stop for security news
http://threatpost.com/ultradns-dealing-with-ddos-attack/105806

Vishing Attacks Targeting Dozens of Banks, Users' Card Data | Threatpost | The first stop for security news
http://threatpost.com/vishing-attacks-targeting-dozens-of-banks/105774

AOL Breached, Investigating Spam from Spoofed Accounts | Threatpost | The first stop for security news
http://threatpost.com/aol-investigating-breach-urges-users-to-change-pas...

Apache Struts Zero Day Vulnerability Patch to be Re-Issued | Threatpost | The first stop for security news
http://threatpost.com/apache-warns-of-faulty-zero-day-patch-for-struts/1...

Vulnerability in Viber Allows Snooping of Images, Videos | Threatpost | The first stop for security news
http://threatpost.com/vulnerability-in-viber-allows-intercept-of-images-...

60 Minutes shocked to find 8-inch floppies drive nuclear deterrent | Ars Technica
http://arstechnica.com/information-technology/2014/04/60-minutes-shocked...

RIP | Every Day Carry
http://everydaycarry.bandcamp.com/releases

Risky Business #320 -- Hacking cars with Charlie Miller
0:00 / 61:42

Risky Business #319 -- The one with weev in it

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

Please note we have disabled access to this recording. It was published before the interview subject outed himself as a committed Nazi. If you're a journalist or researcher and you'd like access to the recording, please email us and we can provide you with a copy.

This week's show is brought to you by Adobe! Big thanks to Adobe for making this week's show possible.

And we've got an... err... *interesting* program for you this week... we'll be chatting with Andrew Auernheimer, aka weev, about the recent appeal victory that saw him out of prison after 14 months inside. Is he going to pull his head in after his scrape with the law?

He says no way!

Also this week we chat with Wade Baker of Verizon Business Security Solutions about the latest Verizon Data Breach Investigation Report and the nine attack patterns they've observed from 10 years of breach data.

Adam Boileau, as always, pops in to discuss the week's news headlines. Show notes are here.

Risky Business #319 -- The one with weev in it
0:00 / 0:00

Risky Business #318 -- TrueCrypt passes audit, Weev off the hook and more

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

It's a four day week this week and a four day next week so I'm afraid I couldn't organise feature interviews for both, so this week you're getting an extra long news section and a sponsor interview!

This week's show is brought to you by Senetas, makers of fine, fine layer 2 encryption gear. If you're planning a greenfields network you have absolutely no excuse to not check out their stuff, it rocks like a banana on its back. This week we're joined by Senetas CEO Andrew Wilson in the sponsor slot. He'll be talking about a privacy act readiness survey Senetas did that yielded some genuinely depressing results.

He also compares director-level attitudes to infosec to director-level attitudes to occupational health and safety issues 50 years ago. It's a really, really interesting take so do stick around for that.

Show notes are here.

Risky Business #318 -- TrueCrypt passes audit, Weev off the hook and more
0:00 / 49:15