Risky Business #403 -- Inside Islamic State's doc leak

Counterterrorism researcher and ex GCHQ-er David Wells joins the show...
17 Mar 2016 » Risky Business

On this week's show we're chatting with David Wells. He's ex GCHQ and ASD but these days he's a counterterrorism boffin with the Lowy Institute. He's joining us to discuss the IS document leak. Depending on which story you read its either the death of the organisation or it won't do anything at all to disrupt it. We get David's thoughts on what this leak will actually for the so-called Caliphate.

In this week's sponsor interview we're doing something a bit different.. following on from last week's interview with Re/Code's Arik Hesseldahl we're chatting with Tenable's CFO, Steve Vintz.

And you know what? It's really interesting getting his perspectives on what's happening in the BUSINESS of security -- the type of analysis a guy like Steve does is different from how security people do it, and he's got some really interesting perspectives on what 2016 could bring. Long story short? Expect consolidation among smaller vendors as CSOs look to trim the number of vendors in their supply chain.

Adam Boileau, as always, will also pop in to discuss the week's news headlines.

Oh, and do add Patrick and Adam on Twitter if that's your thing.

Show notes

Apple's Brief Hits the FBI With a Withering Fact Check | WIRED
http://www.wired.com/2016/03/apple-fact-checks-the-feds-in-latest-brief/

Government Calls Apple's iPhone Arguments in San Bernardino Case a 'Diversion' | WIRED
http://www.wired.com/2016/03/government-calls-apples-iphone-arguments-sa...

Apple Lambasts the FBI for Not Asking the NSA to Help Hack San Bernardino iPhone | WIRED
http://www.wired.com/2016/03/apple-lambasts-fbi-not-asking-nsa-help-hack...

Former cyber czar says NSA could crack the San Bernadino shooter's phone | Ars Technica
http://arstechnica.com/tech-policy/2016/03/former-cyber-czar-says-nsa-co...

In the FBI's Crypto War, Apps May Be the Next Target | WIRED
http://www.wired.com/2016/03/fbi-crypto-war-apps/

John Oliver explains why iPhone encryption debate is no joking matter | Ars Technica
http://arstechnica.com/tech-policy/2016/03/john-oliver-explains-why-ipho...

AceDeceiver: First iOS Trojan Exploiting Apple DRM Design Flaws to Infect Any iOS Device - Palo Alto Networks BlogPalo Alto Networks Blog
http://researchcenter.paloaltonetworks.com/2016/03/acedeceiver-first-ios...

Spelling mistake prevented hackers taking $1bn in bank heist | Business | The Guardian
http://www.theguardian.com/business/2016/mar/10/spelling-mistake-prevent...

Thousands of Trucks, Buses, and Ambulances May Be Open to Hackers | WIRED
http://www.wired.com/2016/03/thousands-trucks-buses-ambulances-may-open-...

To bypass code-signing checks, malware gang steals lots of certificates | Ars Technica
http://arstechnica.com/security/2016/03/to-bypass-code-signing-checks-ma...

Big-name sites hit by rash of malicious ads spreading crypto ransomware [Updated] | Ars Technica
http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-ma...

Hackers Target Anti-DDoS Firm Staminus - Krebs on Security
http://krebsonsecurity.com/2016/03/hackers-target-anti-ddos-firm-staminus/

Dam you! Justice Dept. to indict Iranians for probing flood control network | Ars Technica
http://arstechnica.com/security/2016/03/dam-you-justice-dept-to-indict-i...

Steam Stealer Malware "Booming Business" For Attackers Targeting Gaming Service | Threatpost | The First Stop For Security News
https://threatpost.com/steam-stealer-malware-booming-business-for-attack...

Thieves Phish Moneytree Employee Tax Data - Krebs on Security
http://krebsonsecurity.com/2016/03/thieves-phish-moneytree-employee-tax-...

Botched Java patch leaves millions vulnerable to 30-month-old attack | Ars Technica
http://arstechnica.com/security/2016/03/botched-java-patch-leaves-millio...

Adobe issues emergency patch for actively exploited code-execution bug | Ars Technica
http://arstechnica.com/security/2016/03/adobe-issues-emergency-patch-for...

Hack Brief: ISIS Data Breach Identifies 22,000 Members | WIRED
http://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies-2200...

The Jihadist List Hyped as the 'Biggest ISIS Intelligence Haul Ever' Is a Bizarre, Inaccurate Mess
http://gizmodo.com/the-jihadist-list-hyped-as-the-biggest-isis-intellige...

Lowy Institute for International Policy | Interpret.Inform.Influence.
http://www.lowyinstitute.org/