<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://risky.biz/feeds/rb2" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"  xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Risky Business 2</title>
        <description>Risky Business Extra is Risky.biz&apos;s second podcast feed. Here you&apos;ll find recorded security presentations and lectures, single-shot interviews with industry players, freelance contributions and more. Clearly labelled, single-shot sponsored content sometimes appears in this feed.</description>
        <link>https://risky.biz/</link>
        <copyright>Copyright Risky Business Media 2007-2026</copyright>
        <language>en</language>
        <atom:link href="https://risky.biz/feeds/rb2" rel="self" type="application/rss+xml" />
        <pubDate>Thu, 23 Apr 2026 14:30:44 +1000</pubDate>
        <lastBuildDate>Thu, 23 Apr 2026 14:30:44 +1000</lastBuildDate>
        <itunes:image href="https://risky.biz/static/img/rbipod2.jpg" />
        <itunes:author>Risky Business Media</itunes:author>
	
        <itunes:owner>
            <itunes:name>Risky.biz</itunes:name>
            <itunes:email>editorial@risky.biz</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
        <generator>Jekyll v4.2.2</generator>
        
        
        
            
        
        <item>
            <title>Risky Business Live #3 -- Booz Allen Hamilton&apos;s Russia report, Azure getting creaky and more</title>
            <pubDate>Tue, 31 Mar 2020 00:00:00 +1100</pubDate>
            <link>https://risky.biz/rblive3/</link>
            <guid isPermaLink="true">https://risky.biz/rblive3/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/rblive3.mp3" length="50428447" type="audio/mp3" />
            <itunes:subtitle>Dmitri, Alex and Adam join Patrick for this livestream...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3151</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a completely unedited recording of a YouTube livestream broadcast on March 31, 2020. It features Patrick Gray, Dmitri Alperovitch, Alex Stamos and Adam Boileau discussing:


  The recent Booz Allen Hamilton report into GRU activity over the years
  The role of SIGINT collection in the COVID-19 crisis
  Microsoft Azure struggling to keep up with new capacity demands


You can view the YouTube recording here:



&lt;/iframe&gt;



                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a completely unedited recording of a YouTube livestream broadcast on March 31, 2020. It features Patrick Gray, Dmitri Alperovitch, Alex Stamos and Adam Boileau discussing:</p>

<ul>
  <li>The recent Booz Allen Hamilton report into GRU activity over the years</li>
  <li>The role of SIGINT collection in the COVID-19 crisis</li>
  <li>Microsoft Azure struggling to keep up with new capacity demands</li>
</ul>

<p>You can view the YouTube recording here:</p>

<p><br />
<br /></p>
<div style="text-align: center;"><iframe width="560" height="315" src="https://www.youtube.com/embed/Yctre-8kSS0" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen=""></iframe>&lt;/iframe&gt;</div>
<p><br />
<br /></p>

                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Serious Business #5 -- Kanye 2020, vaccination-free childcare and the EU refugee crisis</title>
            <pubDate>Mon, 07 Sep 2015 00:00:00 +1000</pubDate>
            <link>https://risky.biz/SB5/</link>
            <guid isPermaLink="true">https://risky.biz/SB5/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SB5.mp3" length="25148410" type="audio/mpeg" />
            <itunes:subtitle>And other cheery news...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2094</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Hey everyone and welcome to Serious Business number 5! This is the podcast I do about non infosec related topics. It's less of a professional information security digest and more of an excuse for me to blab with my cohost, comedian Dan Ilic, about serious stuff every few weeks.


WARNING: Contains a fair bit of discussion about Australian politics. You may be permanently scarred after listening.
On this edition of the show we're talking to Dan about a bunch of stuff. Kanye West has apparently announced he's running for president in 2020, we talk about that. We talk about Donald Trump because, wow... just wow... 
Then we move on to the depressing stuff, the European refugee crisis. Are the handful of flashpoint images and stories actually going to get people motivated about fixing the wider problem? Or will they result in a few Kickstarters to directly help the affected individuals, absolving donors of their first world guilt? We have a bob each way on that one.
We talk about the vaccination free childcare centre springing up in my 'hood -- geez, what could go wrong there -- and finally we look at the way streaming services are reshaping the media landscape, in particular the types of shows that are being commissioned. Could NetFlix spell the end of high-quality tv news and current affairs?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Hey everyone and welcome to Serious Business number 5! This is the podcast I do about non infosec related topics. It's less of a professional information security digest and more of an excuse for me to blab with my cohost, comedian Dan Ilic, about serious stuff every few weeks.</p>
<!--excerpt-above-->

<p>WARNING: Contains a fair bit of discussion about Australian politics. You may be permanently scarred after listening.</p>
<p>On this edition of the show we're talking to Dan about a bunch of stuff. Kanye West has apparently announced he's running for president in 2020, we talk about that. We talk about Donald Trump because, wow... just wow... </p>
<p>Then we move on to the depressing stuff, the European refugee crisis. Are the handful of flashpoint images and stories actually going to get people motivated about fixing the wider problem? Or will they result in a few Kickstarters to directly help the affected individuals, absolving donors of their first world guilt? We have a bob each way on that one.</p>
<p>We talk about the vaccination free childcare centre springing up in my 'hood -- geez, what could go wrong there -- and finally we look at the way streaming services are reshaping the media landscape, in particular the types of shows that are being commissioned. Could NetFlix spell the end of high-quality tv news and current affairs?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Serious Business #4 -- Reclaim Australia, Donald Trump and Ashley Madison</title>
            <pubDate>Fri, 24 Jul 2015 00:00:00 +1000</pubDate>
            <link>https://risky.biz/SB4/</link>
            <guid isPermaLink="true">https://risky.biz/SB4/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SB4.mp3" length="17691217" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Lame duck Obama goes YOLO...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1473</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is the podcast I do for shiggles with Australian comedian, radio and TV personality Dan Ilic.


This week we're talking about the nationalist, anti-Islam rallies held across Australia over the last week or so. We also chat about Donald Trump being a douche and Barack Obama's new lease of life as a lame duck president. Oh, and we also talk about the Ashley Madison hack because, hey, who isn't...
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is the podcast I do for shiggles with Australian comedian, radio and TV personality Dan Ilic.</p>
<!--excerpt-above-->

<p>This week we're talking about the nationalist, anti-Islam rallies held across Australia over the last week or so. We also chat about Donald Trump being a douche and Barack Obama's new lease of life as a lame duck president. Oh, and we also talk about the Ashley Madison hack because, hey, who isn't...</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Serious Business #3 -- Sy Hersh can&amp;apos;t melt steel beams</title>
            <pubDate>Wed, 13 May 2015 00:00:00 +1000</pubDate>
            <link>https://risky.biz/SB3/</link>
            <guid isPermaLink="true">https://risky.biz/SB3/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SB3.mp3" length="23225244" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Mad Max Fury Road, Elon Musk can be a dick.. oh, and deflategate...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1934</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                As usual for Serious Business I'm joined by AJ+ satirist, Australian comedian Dan Ilic, to discuss a few topical items of the last week, and boy, we've got some good stuff for you.. we're talking about journalist Seymour Hersh's latest investigative work -- is it pure fiction? We're talking about DeflateGate, we're talking Elon Musk being a douche and we're talking MAD MAX, Fury Road...

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>As usual for Serious Business I'm joined by AJ+ satirist, Australian comedian Dan Ilic, to discuss a few topical items of the last week, and boy, we've got some good stuff for you.. we're talking about journalist Seymour Hersh's latest investigative work -- is it pure fiction? We're talking about DeflateGate, we're talking Elon Musk being a douche and we're talking MAD MAX, Fury Road...</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Serious Business #2 -- Can we stop it with the Muhammad cartoons already?</title>
            <pubDate>Tue, 05 May 2015 00:00:00 +1000</pubDate>
            <link>https://risky.biz/SB2/</link>
            <guid isPermaLink="true">https://risky.biz/SB2/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SB2.mp3" length="17373114" type="audio/mpeg" />
            <itunes:subtitle>Also, why the Apple Watch is stoopid...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1446</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Serious Business, Australia's Most Hated Man (tm) Dan Ilic and I speak about the (failed) shooting attack against a group of very silly Americans who got together to denigrate Islam.


We also speak about Apple's stupid watch. I should warn you, too, I don't edit this podcast for bad language and there are f-bombs aplenty. So if you have your kids in your car and you don't want them hearing my awful, awful language, please turn off this podcast now.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Serious Business, Australia's Most Hated Man (tm) Dan Ilic and I speak about the (failed) shooting attack against a group of very silly Americans who got together to denigrate Islam.</p>
<!--excerpt-above-->

<p>We also speak about Apple's stupid watch. I should warn you, too, I don't edit this podcast for bad language and there are f-bombs aplenty. So if you have your kids in your car and you don't want them hearing my awful, awful language, please turn off this podcast now.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Serious Business #1 -- Dan Ilic and Pat talk about stuff [EXPLICIT]</title>
            <pubDate>Wed, 29 Apr 2015 00:00:00 +1000</pubDate>
            <link>https://risky.biz/SB1/</link>
            <guid isPermaLink="true">https://risky.biz/SB1/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SB1.mp3" length="19637431" type="audio/mpeg" />
            <itunes:subtitle>The first non infosec content for Risky.Biz...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1635</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Risky Business host Patrick Gray and Australian comedian Dan Ilic talk about topics that have nothing to do with information security.


Like:
* Australia's obsession with the Gallipoli campaign and the sacking of Scott McIntyre from the SBS.
* Australia's new vaccination requirements for parents who still want all those tasty, tasty tax benefits.
* The "ISIS doctor", Tareq Kamleh. Is he doing anything wrong?
PLEASE NOTE: I didn't bother editing out naughty words in this one, so if you have kids in the car you may not wish to expose them to our awful language.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Risky Business host Patrick Gray and Australian comedian Dan Ilic talk about topics that have nothing to do with information security.</p>
<!--excerpt-above-->

<p>Like:</p>
<p>* Australia's obsession with the Gallipoli campaign and the sacking of Scott McIntyre from the SBS.<br/>
* Australia's new vaccination requirements for parents who still want all those tasty, tasty tax benefits.<br/>
* The "ISIS doctor", Tareq Kamleh. Is he doing anything wrong?</p>
<p>PLEASE NOTE: I didn't bother editing out naughty words in this one, so if you have kids in the car you may not wish to expose them to our awful language.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Risky Business EXTRA: Brian Snow on quantum crypto</title>
            <pubDate>Thu, 14 Aug 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/snow_quantum/</link>
            <guid isPermaLink="true">https://risky.biz/snow_quantum/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snow_quantum.mp3" length="4904734" type="audio/mpeg" />
            <itunes:subtitle>Snow says it&amp;apos;s closer than we realise...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>719</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Here is the portion of my interview with Brian Snow that I didn't have room for in the main show. Snow is concerned that quantum computing breakthroughs are closer than we think and could invalidate much of the technology we depend on to secure data.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Here is the portion of my interview with Brian Snow that I didn't have room for in the main show. Snow is concerned that quantum computing breakthroughs are closer than we think and could invalidate much of the technology we depend on to secure data.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Risky Business EXTRA: Panel recording, Splendour in the Grass</title>
            <pubDate>Thu, 14 Aug 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/sitg_panel/</link>
            <guid isPermaLink="true">https://risky.biz/sitg_panel/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/sitg_panel.mp3" length="25616306" type="audio/mpeg" />
            <itunes:subtitle>Features Thomas Drake, Jesselyn Radack, Scott Ludlam and Suelette Dreyfus...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2875</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a recording of a panel I hosted at the Splendour in the Grass music festival forum. It features NSA whistleblower Thomas Drake, WA Greens Senator Scott Ludlam, Underground author Suelette Dreyfus and Edward Snowden's attorney Jesselyn Radack.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a recording of a panel I hosted at the Splendour in the Grass music festival forum. It features NSA whistleblower Thomas Drake, WA Greens Senator Scott Ludlam, Underground author Suelette Dreyfus and Edward Snowden's attorney Jesselyn Radack.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: What&amp;apos;s new in big data security analytics?</title>
            <pubDate>Mon, 19 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-interview-whats-new-big-data-security-analytics/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-interview-whats-new-big-data-security-analytics/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/scottcrane.mp3" length="4683577" type="audio/mpeg" />
            <itunes:subtitle>Arbor Networks&amp;apos; Scott Crane has a chat...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>439</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Scott Crane is Arbor Networks product manager for its Pravail line of big data security analytics division.


Scott was a part of the original PacketLoop team -- PacketLoop was an Australian start up that created some pretty impressive big data security analytics technology. It was so impressive that it wound up being acquired by Arbor Networks and is now sold under the Pravail brand. 
Somehow the original team managed to convince Arbor to keep the bulk of the R&amp;D on those products based right here in Australia. So you could say we're all pretty big fans of Scott and his team for scoring some runs for the home team. They've got 12 staff in Sydney, and they're growing.
It's been eight months since the deal was struck, so I caught up with Scott to talk about what's new in the field of big data security analytics. And interestingly enough, the Pravail tech wound up being pretty useful lately. Because it performs packet-capture based analysis, the Pravail team could help their clients roll back through their stored packet captures to see if anyone had used the Heartbleed flaw against them. Somewhat reassuringly, the Pravail guys at Arbor did not find any evidence of Heartbleed actually being used in the wild.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Scott Crane is Arbor Networks product manager for its Pravail line of big data security analytics division.</p>
<!--excerpt-above-->

<p>Scott was a part of the original PacketLoop team -- PacketLoop was an Australian start up that created some pretty impressive big data security analytics technology. It was so impressive that it wound up being acquired by Arbor Networks and is now sold under the Pravail brand. </p>
<p>Somehow the original team managed to convince Arbor to keep the bulk of the R&amp;D on those products based right here in Australia. So you could say we're all pretty big fans of Scott and his team for scoring some runs for the home team. They've got 12 staff in Sydney, and they're growing.</p>
<p>It's been eight months since the deal was struck, so I caught up with Scott to talk about what's new in the field of big data security analytics. And interestingly enough, the Pravail tech wound up being pretty useful lately. Because it performs packet-capture based analysis, the Pravail team could help their clients roll back through their stored packet captures to see if anyone had used the Heartbleed flaw against them. Somewhat reassuringly, the Pravail guys at Arbor did not find any evidence of Heartbleed actually being used in the wild.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: FireEye CTO Dave Merkel</title>
            <pubDate>Mon, 19 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-interview-fireeye-cto-dave-merkel/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-interview-fireeye-cto-dave-merkel/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/davemerkel.mp3" length="7149252" type="audio/mpeg" />
            <itunes:subtitle>The message is getting out there...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>753</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor cast we're chatting with Dave Merkel, the CTO of FireEye. Dave has been around the infosec traps since the 90s -- long enough to see how things have changed. One of the things that has changed is the acknowledgement by the market that you can't really keep attackers from gaining a foothold on at least *a* device within your environment. 


It's the reason we're seeing a lot of gear hit the market that will help you post intrusion. I started off by asking Dave if he'd noticed this shift in thinking in the market.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor cast we're chatting with Dave Merkel, the CTO of FireEye. Dave has been around the infosec traps since the 90s -- long enough to see how things have changed. One of the things that has changed is the acknowledgement by the market that you can't really keep attackers from gaining a foothold on at least *a* device within your environment. </p>
<!--excerpt-above-->

<p>It's the reason we're seeing a lot of gear hit the market that will help you post intrusion. I started off by asking Dave if he'd noticed this shift in thinking in the market.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: AusCERT speed debate 2014</title>
            <pubDate>Mon, 19 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/presentation-auscert-speed-debate-2014/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/presentation-auscert-speed-debate-2014/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/2014debate.mp3" length="24510472" type="audio/mpeg" />
            <itunes:subtitle>This does not make any sense...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3128</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                We're going to close out this year's coverage the way we normally do it: with a recording of the AusCERT speed debate! 


I was a debater this year and as you'll hear I had zero time to prepare, so my contributions are pretty lame, but there was a hell of a panel like always. The whole thing was moderated by Adam Spencer. 
Most of it makes no sense, some of it is funny, some of it is just stupid. Like it or loathe it, it's almost become an institution at this point so we absolutely have to include it.
So here it is! The speed debate! The closing event from AusCERT 2014, I hope you enjoy it.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>We're going to close out this year's coverage the way we normally do it: with a recording of the AusCERT speed debate! </p>
<!--excerpt-above-->

<p>I was a debater this year and as you'll hear I had zero time to prepare, so my contributions are pretty lame, but there was a hell of a panel like always. The whole thing was moderated by Adam Spencer. </p>
<p>Most of it makes no sense, some of it is funny, some of it is just stupid. Like it or loathe it, it's almost become an institution at this point so we absolutely have to include it.</p>
<p>So here it is! The speed debate! The closing event from AusCERT 2014, I hope you enjoy it.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Peter Gutmann: The NSA isn&amp;apos;t that organised</title>
            <pubDate>Mon, 19 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-peter-gutmann-nsa-isnt-organised/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-peter-gutmann-nsa-isnt-organised/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/gutmann_interview.mp3" length="5498138" type="audio/mpeg" />
            <itunes:subtitle>Design by committee a bigger threat to crypto than intelligence agencies...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>512</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                I've already podcasted Peter's presentation, but I thought a follow up interview was warranted. To cut a long story short, he does believe some crypto standards have been subverted by the NSA, but says some fears about government crypto-fiddling are misplaced. In general, he says, it's a lot easier for attackers to bypass encryption than it is for them to break it.


Peter knows crypto. He's a professor at Auckland University, has written crypto libraries and even had a hand in writing PGP.
I started off by asking Peter for his thoughts on the controversial dual elliptic curve number generator. Was it really backdoored by the NSA?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>I've already podcasted Peter's presentation, but I thought a follow up interview was warranted. To cut a long story short, he does believe some crypto standards have been subverted by the NSA, but says some fears about government crypto-fiddling are misplaced. In general, he says, it's a lot easier for attackers to bypass encryption than it is for them to break it.</p>
<!--excerpt-above-->

<p>Peter knows crypto. He's a professor at Auckland University, has written crypto libraries and even had a hand in writing PGP.</p>
<p>I started off by asking Peter for his thoughts on the controversial dual elliptic curve number generator. Was it really backdoored by the NSA?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Dr. Jason Fox on gamification</title>
            <pubDate>Mon, 19 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-dr-jason-fox-gamification/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-dr-jason-fox-gamification/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/jasonfox.mp3" length="10711607" type="audio/mpeg" />
            <itunes:subtitle>How World of Warcraft can inform enterprise security...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1023</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On the final day of AusCERT last week delegates were treated to a fascinating talk by Dr. Jason Fox, gamification expert and author of the book The Game Changer.


Jason's expertise is in finding out how to take the motivational aspects of games and apply them to work processes. We all know that sitting your staff down in a dimly lit auditorium to lecture them on spear phishing does precisely nothing to change user behaviour. But what if you made the hunt for spear phishing messages a game?
I sat down with Jason Fox after his presentation and recorded this interview.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On the final day of AusCERT last week delegates were treated to a fascinating talk by Dr. Jason Fox, gamification expert and author of the book The Game Changer.</p>
<!--excerpt-above-->

<p>Jason's expertise is in finding out how to take the motivational aspects of games and apply them to work processes. We all know that sitting your staff down in a dimly lit auditorium to lecture them on spear phishing does precisely nothing to change user behaviour. But what if you made the hunt for spear phishing messages a game?</p>
<p>I sat down with Jason Fox after his presentation and recorded this interview.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Is SNMP-geddon coming?</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-podcast-snmp-geddon-coming/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-podcast-snmp-geddon-coming/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/eisenbarth.mp3" length="6809510" type="audio/mpeg" />
            <itunes:subtitle>Arbor Networks&amp;apos; Marc Eisenbarth talks DDoS...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>816</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a sponsor interview with Marc Eisenbarth, Arbor Networks' security architect and the manager of research for its Arbor Security Engineering and Response Team (ASERT).


I spoke to Mark about the massive influx of NTP-based DDoS traffic we've seen this year. Can we expect attackers to move on to other protocols and services like SNMP and Chargen? He thinks so. But it's not until we start seeing SNMP-based DDoS capabilities built into generic malware that we'll really have big problems.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a sponsor interview with Marc Eisenbarth, Arbor Networks' security architect and the manager of research for its Arbor Security Engineering and Response Team (ASERT).</p>
<!--excerpt-above-->

<p>I spoke to Mark about the massive influx of NTP-based DDoS traffic we've seen this year. Can we expect attackers to move on to other protocols and services like SNMP and Chargen? He thinks so. But it's not until we start seeing SNMP-based DDoS capabilities built into generic malware that we'll really have big problems.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: How to batten down for the G20</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-podcast-how-batten-down-g20/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-podcast-how-batten-down-g20/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/katemcinnes.mp3" length="6743400" type="audio/mpeg" />
            <itunes:subtitle>Get your SOE builds right, folks...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>701</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a sponsor interview with Kate McInnes of Datacom TSS.


Kate is ex-DSD and currently serves as a principal consultant with Datacom TSS in Perth. She's been doing a bunch of work with a bunch of different organisations on preparing them for the looming G20 summit in Brisbane.
What do the threats look like? Where are they coming from? And what can be done about them?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a sponsor interview with Kate McInnes of Datacom TSS.</p>
<!--excerpt-above-->

<p>Kate is ex-DSD and currently serves as a principal consultant with Datacom TSS in Perth. She's been doing a bunch of work with a bunch of different organisations on preparing them for the looming G20 summit in Brisbane.</p>
<p>What do the threats look like? Where are they coming from? And what can be done about them?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Why break crypto when you can bypass it?</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/presentation-why-break-crypto-when-you-can-bypass-it/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/presentation-why-break-crypto-when-you-can-bypass-it/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/gutmann_presentation.mp3" length="19311210" type="audio/mpeg" />
            <itunes:subtitle>Peter Gutmann&amp;apos;s plenary session from AusCERT 2014...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2242</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear a recording of Peter Gutmann's speech here which is all about crypto. Well, it's sort of about crypto. With newspapers filled with stories about the NSA subverting crypto standards, Peter asks us whether that really matters. Why would an attacker bother breaking crypto when they can just bypass it?


Peter is well positioned to do this talk. He's a researcher in the Department of Computer Science at the University of Auckland and works on the design and analysis of cryptographic security architectures and security usability. 
He helped write PGP, has authored a number of papers and RFC's on security and encryption, and is the author of the open source cryptlib security toolkit. And luckily for us, he's a fairly regular guest on Risky Business.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear a recording of Peter Gutmann's speech here which is all about crypto. Well, it's sort of about crypto. With newspapers filled with stories about the NSA subverting crypto standards, Peter asks us whether that really matters. Why would an attacker bother breaking crypto when they can just bypass it?</p>
<!--excerpt-above-->

<p>Peter is well positioned to do this talk. He's a researcher in the Department of Computer Science at the University of Auckland and works on the design and analysis of cryptographic security architectures and security usability. </p>
<p>He helped write PGP, has authored a number of papers and RFC's on security and encryption, and is the author of the open source cryptlib security toolkit. And luckily for us, he's a fairly regular guest on Risky Business.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Klout for infosec?</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-klout-infosec/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-klout-infosec/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/mattjones.mp3" length="10120879" type="audio/mpeg" />
            <itunes:subtitle>Matt reads Twitter so you don&amp;apos;t have to...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>734</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear my interview with Matt Jones, a security consultant who runs a small outfit named Volvent.


He's been working on a very interesting side project for a couple of years now. Essentially it's a social media analyser that identifies sources of high-quality information. Users can tap in a keyword and drill through the conversations on social media that actually matter -- the conversations that influence the influencers. The project was born of Matt's desire to never have to log in to Twitter again.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear my interview with Matt Jones, a security consultant who runs a small outfit named Volvent.</p>
<!--excerpt-above-->

<p>He's been working on a very interesting side project for a couple of years now. Essentially it's a social media analyser that identifies sources of high-quality information. Users can tap in a keyword and drill through the conversations on social media that actually matter -- the conversations that influence the influencers. The project was born of Matt's desire to never have to log in to Twitter again.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Hacking supercomputers with y011</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-hacking-supercomputers-y011/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-hacking-supercomputers-y011/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/nealwise.mp3" length="7280528" type="audio/mpeg" />
            <itunes:subtitle>HACK THE PLANET!!!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>534</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers.


I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers.</p>
<!--excerpt-above-->

<p>I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Bob Clark on the CFAA</title>
            <pubDate>Fri, 16 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-bob-clark-cfaa/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-bob-clark-cfaa/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/bobclark.mp3" length="9142471" type="audio/mpeg" />
            <itunes:subtitle>What does a military cyber-lawyer think of what&amp;apos;s happening in the civilian world?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>996</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear an interview I recorded with Bob Clark. He currently teaches law at the US Naval Academy, but he's been doing military law for a long time, even serving as the operational attorney for the US Army Cyber Command at one point.


I posted his talk yesterday... he touched on the Weev vs AT&amp;T trial in that and I thought it would be interesting to get his perspective on the CFAA, precisely because it's not the sort of thing he normally concerns himself with. He has less of an agenda than a defence attorney or a prosecutor.
(If you haven't heard the episode of the regular Risky Business podcast where I had a chat with Weev and recapped that whole thing you might want to check it out because we reference it in this interview. It's here.)
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear an interview I recorded with Bob Clark. He currently teaches law at the US Naval Academy, but he's been doing military law for a long time, even serving as the operational attorney for the US Army Cyber Command at one point.</p>
<!--excerpt-above-->

<p>I posted his talk yesterday... he touched on the Weev vs AT&amp;T trial in that and I thought it would be interesting to get his perspective on the CFAA, precisely because it's not the sort of thing he normally concerns himself with. He has less of an agenda than a defence attorney or a prosecutor.</p>
<p>(If you haven't heard the episode of the regular Risky Business podcast where I had a chat with Weev and recapped that whole thing you might want to check it out because we reference it in this interview. It's <a href="http://risky.biz/RB319">here</a>.)</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: David Litchfield on hacking &amp;#226;&amp;#8364;&amp;#732;dem databases</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-podcast-david-litchfield-hacking-%E2%80%98dem-databases/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-podcast-david-litchfield-hacking-%E2%80%98dem-databases/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/davidlitchfield.mp3" length="4682079" type="audio/mpeg" />
            <itunes:subtitle>10 years on and Oracle&apos;s report card still lacking…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>550</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                David Litchfield is a very well known researcher in the field of database security. He's been at it for over a decade, and managed to be a permanent pain in Oracle's neck since he first started dropping database 0day a million years ago.


So I asked him what has changed in the field of database security. Has Oracle improved its procedures?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>David Litchfield is a very well known researcher in the field of database security. He's been at it for over a decade, and managed to be a permanent pain in Oracle's neck since he first started dropping database 0day a million years ago.</p>
<!--excerpt-above-->

<p>So I asked him what has changed in the field of database security. Has Oracle improved its procedures?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Attacker MOs are changing</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/sponsor-podcast-attacker-mos-are-changing/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/sponsor-podcast-attacker-mos-are-changing/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/bryce.mp3" length="6791336" type="audio/mpeg" />
            <itunes:subtitle>But it&apos;s not all good news…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>707</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor podcast we hear from FireEye's APAC CTO Bryce Boland about the effect next generation antimalware gear is having on the modus operandi of sophisticated attackers. 


The possibility of burning their sweet, sweet 0days is actually turning some attackers away from well-resourced targets and towards secondary targeting; attacking their targets' partners and suppliers.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor podcast we hear from FireEye's APAC CTO Bryce Boland about the effect next generation antimalware gear is having on the modus operandi of sophisticated attackers. </p>
<!--excerpt-above-->

<p>The possibility of burning their sweet, sweet 0days is actually turning some attackers away from well-resourced targets and towards secondary targeting; attacking their targets' partners and suppliers.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/presentation-when-cyberwar-drink-cyberwar-drink/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/presentation-when-cyberwar-drink-cyberwar-drink/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/bobclark_talk.mp3" length="16137472" type="audio/mpeg" />
            <itunes:subtitle>Bob Clark returns to AusCERT…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2198</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?
Bob Clark returns to AusCERT\u2026


This is a recording of a presentation by Bob Clark, who these days teaches at the US Naval Academy. He has a long history as a department of defence lawyer including a stint as the counsel for the US Army Cyber Command.
In this talk Bob covers some ground he has covered before -- looking at when an online action represents an act of war under the laws of armed conflict -- but also takes a look at some legal cases in the civilian world involving the CFAA.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?<br/>
Bob Clark returns to AusCERT\u2026</p>
<!--excerpt-above-->

<p>This is a recording of a presentation by Bob Clark, who these days teaches at the US Naval Academy. He has a long history as a department of defence lawyer including a stint as the counsel for the US Army Cyber Command.</p>
<p>In this talk Bob covers some ground he has covered before -- looking at when an online action represents an act of war under the laws of armed conflict -- but also takes a look at some legal cases in the civilian world involving the CFAA.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Felix &amp;#8220;FX&amp;#8221; Lindner&amp;#8217;s AusCERT keynote</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/presentation-felix-%E2%80%9Cfx%E2%80%9D-lindner%E2%80%99s-auscert-keynote/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/presentation-felix-%E2%80%9Cfx%E2%80%9D-lindner%E2%80%99s-auscert-keynote/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/fx.mp3" length="19688467" type="audio/mpeg" />
            <itunes:subtitle>Dude doesn&apos;t dig on the Google...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2748</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                We're going to kick things off with a recording of the opening keynote from the conference... this talk is by Felix "FX" Lindner of Recurity Labs.


Felix is a very well known hacker and researcher, and his talk is titled we come in peace, they don't. As you'll hear, he's not exactly Google's number one fan. Here he is, I hope you enjoy it!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>We're going to kick things off with a recording of the opening keynote from the conference... this talk is by Felix "FX" Lindner of Recurity Labs.</p>
<!--excerpt-above-->

<p>Felix is a very well known hacker and researcher, and his talk is titled we come in peace, they don't. As you'll hear, he's not exactly Google's number one fan. Here he is, I hope you enjoy it!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Ed Felton on security in the surveillance age</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/presentation-ed-felton-security-surveillance-age/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/presentation-ed-felton-security-surveillance-age/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/edfelton.mp3" length="18676510" type="audio/mpeg" />
            <itunes:subtitle>The &amp;quot;other Ed&amp;quot; words it up...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2186</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a recording of Ed Felton's plenary session from AusCERT 2014. 


Ed Felton is a professor of computer science and public affairs at Princeton's centre for information technology policy. From 2011 to 2012 he was the first Chief Technologist for the Federal Trade Commission. He's a very well known and highly regarded researcher and academic and he spoke at AusCERT on security in a surveilled world.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a recording of Ed Felton's plenary session from AusCERT 2014. </p>
<!--excerpt-above-->

<p>Ed Felton is a professor of computer science and public affairs at Princeton's centre for information technology policy. From 2011 to 2012 he was the first Chief Technologist for the Federal Trade Commission. He's a very well known and highly regarded researcher and academic and he spoke at AusCERT on security in a surveilled world.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Information leaks into North Korea</title>
            <pubDate>Thu, 15 May 2014 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/interview-information-leaks-north-korea/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/interview-information-leaks-north-korea/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2014/daveolivia.mp3" length="7296770" type="audio/mpeg" />
            <itunes:subtitle>Is state control faltering?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>730</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Our coverage continues now with an interview I recorded with Olivia Maree and Dave Jorm. Olivia holds a law degree and just finished a six month stint as a community manager with BugCrowd\u2026 Dave Jorm studies geology and mathematics at UQ and has worked in the software industry for around 14 years.


Some of you would remember the interview I did with Dave last year about his OSINT analysis of North Korea, I also recorded and published his AusCERT talk on that topic last year. Well, this year he returned to AusCERT with his pal Olivia Maree to do another North Korea-themed presentation. This time the pair presented a talk about the information cordon - how information gets in and out of the country. Between USB thumb drives attached to home-made air balloons to tiny radios smuggled in to the Democratic People's Republic of Korea, you'll hear that state control of information entering the country isn't what it used to be, and, you know, that's a pretty big deal. and yes, I know this isn't your typical info sec story but you all loved my interview with Dave last year so I figured you'd all want to hear about this anyway\u2026
I started off by asking Olivia how the regime seeks to control information flowing into North Korea\u2026
**************EDITOR'S NOTE: This post originally referred to Olivia Maree as a lawyer. While she has a law degree, Olivia has never worked as a lawyer or completed articles. Apologies for any confusion. The audio introduction to this interview is still incorrect and will not be updated. - PG
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Our coverage continues now with an interview I recorded with Olivia Maree and Dave Jorm. Olivia holds a law degree and just finished a six month stint as a community manager with BugCrowd\u2026 Dave Jorm studies geology and mathematics at UQ and has worked in the software industry for around 14 years.</p>
<!--excerpt-above-->

<p>Some of you would remember the interview I did with Dave last year about his OSINT analysis of North Korea, I also recorded and published his AusCERT talk on that topic last year. Well, this year he returned to AusCERT with his pal Olivia Maree to do another North Korea-themed presentation. This time the pair presented a talk about the information cordon - how information gets in and out of the country. Between USB thumb drives attached to home-made air balloons to tiny radios smuggled in to the Democratic People's Republic of Korea, you'll hear that state control of information entering the country isn't what it used to be, and, you know, that's a pretty big deal. and yes, I know this isn't your typical info sec story but you all loved my interview with Dave last year so I figured you'd all want to hear about this anyway\u2026</p>
<p>I started off by asking Olivia how the regime seeks to control information flowing into North Korea\u2026</p>
<p>**************EDITOR'S NOTE: This post originally referred to Olivia Maree as a lawyer. While she has a law degree, Olivia has never worked as a lawyer or completed articles. Apologies for any confusion. The audio introduction to this interview is still incorrect and will not be updated. - PG</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Marcus Ranum on militarisation trends</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/ranum_auscert/</link>
            <guid isPermaLink="true">https://risky.biz/ranum_auscert/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/ranum.mp3" length="31655934" type="audio/mpeg" />
            <itunes:subtitle>Traditional military thinking doesn&amp;apos;t translate to &amp;quot;cyber&amp;quot;...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3187</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of Marcus Ranum's AusCERT keynote speech on CYBER WAR. Marcus was doing the circuit a few years ago with a talk titled "Cyber war is bullshit", which I think makes clear his position, but this one is titled Never Fight a Land War in Cyberspace. He basically argues that the application of traditional military thinking to the cyber domain is flawed. He also argues there's a massive money and power grab taking place as the military and the private sector defence base tries to set the agenda so it can profit from it. It's a really worthwhile talk, and delivered with typical MjR flair. Enjoy.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of Marcus Ranum's AusCERT keynote speech on CYBER WAR. Marcus was doing the circuit a few years ago with a talk titled "Cyber war is bullshit", which I think makes clear his position, but this one is titled Never Fight a Land War in Cyberspace. He basically argues that the application of traditional military thinking to the cyber domain is flawed. He also argues there's a massive money and power grab taking place as the military and the private sector defence base tries to set the agenda so it can profit from it. It's a really worthwhile talk, and delivered with typical MjR flair. Enjoy.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Reflections on reflections on trusting trust</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/paul_trust/</link>
            <guid isPermaLink="true">https://risky.biz/paul_trust/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/paul_trust.mp3" length="6795997" type="audio/mpeg" />
            <itunes:subtitle>A very meta interview with Paul Ducklin...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>682</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview with chat with Paul Ducklin of Sophos, and the topic is reflections -- 30 years on -- on the paper Reflections on Trusting Trust by Ken Thompson. So we're reflecting on reflections on trusting trust.


I started off by asking Paul to recap the paper for people who aren't familiar with it.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview with chat with Paul Ducklin of Sophos, and the topic is reflections -- 30 years on -- on the paper Reflections on Trusting Trust by Ken Thompson. So we're reflecting on reflections on trusting trust.</p>
<!--excerpt-above-->

<p>I started off by asking Paul to recap the paper for people who aren't familiar with it.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Does Anonymous have a future?</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/parmy_anon/</link>
            <guid isPermaLink="true">https://risky.biz/parmy_anon/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/parmy.mp3" length="15157729" type="audio/mpeg" />
            <itunes:subtitle>Journalist and author Parmy Olson&amp;apos;s AusCERT speech...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1612</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear Parmy Olson's presentation from AusCERT's 2013 conference. Parmy is a journalist for Forbes, but she's also an author -- she wrote We Are Anonymous, Inside the Hacker world of LulzSec, Anonymous and the Global Cyber Insurgency. She got amazing access to the LulzSec crew and the book is well worth reading.


In this presentation she looks at why these young men got involved in such risky activity. What drove them, and what does the future of Anonymous look like?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear Parmy Olson's presentation from AusCERT's 2013 conference. Parmy is a journalist for Forbes, but she's also an author -- she wrote We Are Anonymous, Inside the Hacker world of LulzSec, Anonymous and the Global Cyber Insurgency. She got amazing access to the LulzSec crew and the book is well worth reading.</p>
<!--excerpt-above-->

<p>In this presentation she looks at why these young men got involved in such risky activity. What drove them, and what does the future of Anonymous look like?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Dmitri Alperovitch pitches active defence</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/dmitri/</link>
            <guid isPermaLink="true">https://risky.biz/dmitri/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/dmitri.mp3" length="26835400" type="audio/mpeg" />
            <itunes:subtitle>The thinking behind CrowdStrike&amp;apos;s sales pitch...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2597</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Active defence is the new black. It's the issue of 2013. One of the organisations that helped put the issue on to the agenda is CrowdStrike, a business founded by some senior ex technologists from McAfee. CrowdStrike was founded on the premise that simply relying on defensive measures in information security isn't enough -- you need to be able to mess with your adversaries.


One of CrowdStrike's founders was Dmitri Alperovitch. He was at AusCERT and used his speaking slot to basically deliver the thinking behind CrowdStrike's pitch. It's nothing earth shattering, but it's a really well packaged speech that presents a cogent argument for the concept of active defence. So here it is, Dmitri Alperovitch's AusCERT talk titled Offence as the Best Defence.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Active defence is the new black. It's the issue of 2013. One of the organisations that helped put the issue on to the agenda is CrowdStrike, a business founded by some senior ex technologists from McAfee. CrowdStrike was founded on the premise that simply relying on defensive measures in information security isn't enough -- you need to be able to mess with your adversaries.</p>
<!--excerpt-above-->

<p>One of CrowdStrike's founders was Dmitri Alperovitch. He was at AusCERT and used his speaking slot to basically deliver the thinking behind CrowdStrike's pitch. It's nothing earth shattering, but it's a really well packaged speech that presents a cogent argument for the concept of active defence. So here it is, Dmitri Alperovitch's AusCERT talk titled Offence as the Best Defence.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Did APT1 put &amp;quot;cyber&amp;quot; on the boardroom agenda?</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/declan_auscert13/</link>
            <guid isPermaLink="true">https://risky.biz/declan_auscert13/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/declan.mp3" length="6431932" type="audio/mpeg" />
            <itunes:subtitle>Declan Ingram of Datacom TSS says yes...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>692</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview we're chatting with Declan Ingram of Datacom TSS.


Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries... Now, when they founded this business a few years ago, there was awareness in government that highly skilled adversaries were a real challenge... but it's really been 2013 where executives at the boardroom level have sat up and taken note of security issues, particularly the issue of APT.
They've realised it isn't just the Google's of the world who are being attacked by state sponsored adversaries -- Oil companies, broadcasters and insurance companies have been absolutely nailed by teams working for the governments of North Korea and Iran, for example. 
Furthermore, Mandiant's APT1 report really put the issue on the map for a lot of people who previously just weren't aware of the issues. It's that whole chicken versus egg thing -- are people becoming aware of it because of the media attention or is the media reporting on it because people are becoming aware?
So how has this affected things for a business like Datacom TSS? Declan Ingram joined me to discuss. I started off by asking him how perceptions of sophisticated threats have changed over the last couple of years.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview we're chatting with Declan Ingram of Datacom TSS.</p>
<!--excerpt-above-->

<p>Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries... Now, when they founded this business a few years ago, there was awareness in government that highly skilled adversaries were a real challenge... but it's really been 2013 where executives at the boardroom level have sat up and taken note of security issues, particularly the issue of APT.</p>
<p>They've realised it isn't just the Google's of the world who are being attacked by state sponsored adversaries -- Oil companies, broadcasters and insurance companies have been absolutely nailed by teams working for the governments of North Korea and Iran, for example. </p>
<p>Furthermore, Mandiant's APT1 report really put the issue on the map for a lot of people who previously just weren't aware of the issues. It's that whole chicken versus egg thing -- are people becoming aware of it because of the media attention or is the media reporting on it because people are becoming aware?</p>
<p>So how has this affected things for a business like Datacom TSS? Declan Ingram joined me to discuss. I started off by asking him how perceptions of sophisticated threats have changed over the last couple of years.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: AusCERT speed debate</title>
            <pubDate>Wed, 29 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/debate2013/</link>
            <guid isPermaLink="true">https://risky.biz/debate2013/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/debate.mp3" length="30669225" type="audio/mpeg" />
            <itunes:subtitle>Everyone&amp;apos;s favourite closing event!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3372</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of the traditional closing event of the AusCERT event -- the speed debate. It's hosted by Australian television and radio presenter Adam Spencer, and it's a bit of light fun to end the whole thing on... debaters include Eugene Kaspersky, Bill Caelli, Charlie Miller, Scott McIntyre and more. I'll drop you in here as Adam sets the whole thing up. Enjoy.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of the traditional closing event of the AusCERT event -- the speed debate. It's hosted by Australian television and radio presenter Adam Spencer, and it's a bit of light fun to end the whole thing on... debaters include Eugene Kaspersky, Bill Caelli, Charlie Miller, Scott McIntyre and more. I'll drop you in here as Adam sets the whole thing up. Enjoy.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Charlie Miller pwns Android NFC</title>
            <pubDate>Fri, 24 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/miller/</link>
            <guid isPermaLink="true">https://risky.biz/miller/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/miller.mp3" length="30278650" type="audio/mpeg" />
            <itunes:subtitle>Not new research, but a great talk...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2478</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Some time ago security researcher Charlie Miller published some research that showed he could take over NFC-equipped phones just by holding them near a malicious RFID sticker. This talk takes you through his research process -- how he fuzzed devices, what he found\u2026 and how he came to realise that attacking the higher level functions of NFC functionality turned out to be the shortest path to victory.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Some time ago security researcher Charlie Miller published some research that showed he could take over NFC-equipped phones just by holding them near a malicious RFID sticker. This talk takes you through his research process -- how he fuzzed devices, what he found\u2026 and how he came to realise that attacking the higher level functions of NFC functionality turned out to be the shortest path to victory.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Using BYOD devices for 3G/LTE exfiltration</title>
            <pubDate>Fri, 24 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/markbrand/</link>
            <guid isPermaLink="true">https://risky.biz/markbrand/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/markbrand.mp3" length="7258273" type="audio/mpeg" />
            <itunes:subtitle>How to turn an executives phone into your own personal gateway…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>869</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries. One of their services is running some pretty intense Red Team exercises.


The team at Datacom TSS recnetly ported its Red Team Trojan over to the Android platform, and it's surprisingly easy to trick people into installing it. You just email it to them and ask them to install the APK package.
And what you get once you're on someone's phone is quite awesome. Not only can you turn on the microphone and snoop on boardroom conversations, but you can use the 3G or LTE connection on the device to do your exfiltration. That way you're completely bypassing the heavily watched gateway. You can also use it to bypass SMS-based authentication.
Mark Brand is the Datacom TSS guy who did the Android port. He joined me by phone to tell us all about it.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Datacom TSS is a Canberra-based, national security firm founded by ex Australian government security specialists. These guys specialise in dealing with highly skilled adversaries. One of their services is running some pretty intense Red Team exercises.</p>
<!--excerpt-above-->

<p>The team at Datacom TSS recnetly ported its Red Team Trojan over to the Android platform, and it's surprisingly easy to trick people into installing it. You just email it to them and ask them to install the APK package.</p>
<p>And what you get once you're on someone's phone is quite awesome. Not only can you turn on the microphone and snoop on boardroom conversations, but you can use the 3G or LTE connection on the device to do your exfiltration. That way you're completely bypassing the heavily watched gateway. You can also use it to bypass SMS-based authentication.</p>
<p>Mark Brand is the Datacom TSS guy who did the Android port. He joined me by phone to tell us all about it.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: OSINT observation of DPRK</title>
            <pubDate>Fri, 24 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/jorm/</link>
            <guid isPermaLink="true">https://risky.biz/jorm/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/jorm.mp3" length="22114051" type="audio/mpeg" />
            <itunes:subtitle>North Korean TV has less sex, more potato farming...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2020</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of David Jorm's AusCERT presentation. You might have heard Dave preview his talk on last week's episode of the regular Risky Business podcast.


Dave, who works as a security response engineer for a vendor, studies geography and mathematics at the University of Queensland and recently completed a study on long-term remote-sensing analysis of North Korea. In his talk he looks at an OSINT analysis of North Korea\u2026 he talks about the work he did as well as looking at what other North Korea watchers are up to. There's some really cool stuff in there about Red Star Linux, too -- it's a North Korean Linux distribution that's surprisingly polished.
So here he is -- it's Dave Jorm's AusCERT talk. Enjoy.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of David Jorm's AusCERT presentation. You might have heard Dave preview his talk on last week's episode of the regular Risky Business podcast.</p>
<!--excerpt-above-->

<p>Dave, who works as a security response engineer for a vendor, studies geography and mathematics at the University of Queensland and recently completed a study on long-term remote-sensing analysis of North Korea. In his talk he looks at an OSINT analysis of North Korea\u2026 he talks about the work he did as well as looking at what other North Korea watchers are up to. There's some really cool stuff in there about Red Star Linux, too -- it's a North Korean Linux distribution that's surprisingly polished.</p>
<p>So here he is -- it's Dave Jorm's AusCERT talk. Enjoy.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: All your SCADAS are belong 2 Mark Fabro</title>
            <pubDate>Fri, 24 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/fabro/</link>
            <guid isPermaLink="true">https://risky.biz/fabro/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/fabro.mp3" length="27689747" type="audio/mpeg" />
            <itunes:subtitle>Day two keynote from AusCERT 2013...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2467</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a recording of Mark Fabro's day two keynote speech from AusCERT. Mark is a control systems security expert and a terrific speaker. He's the president and chief security scientist for Lofty Perch, a control system security consultancy. He's extremely well plugged in to the SCADA security scene, he's done a bunch of strategy consulting to the US government. Basically Mark is Mr. SCADA. It's his thing.


In this talk Mark argues that we're focussing on the wrong stuff when it comes to SCADA security. He gives us an experts view on the conversation we should be having if we actually want to fix things. Here's Mark Fabro, I hope you enjoy it.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a recording of Mark Fabro's day two keynote speech from AusCERT. Mark is a control systems security expert and a terrific speaker. He's the president and chief security scientist for Lofty Perch, a control system security consultancy. He's extremely well plugged in to the SCADA security scene, he's done a bunch of strategy consulting to the US government. Basically Mark is Mr. SCADA. It's his thing.</p>
<!--excerpt-above-->

<p>In this talk Mark argues that we're focussing on the wrong stuff when it comes to SCADA security. He gives us an experts view on the conversation we should be having if we actually want to fix things. Here's Mark Fabro, I hope you enjoy it.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Security investment in Silicon Valley</title>
            <pubDate>Fri, 24 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/caseysilicon/</link>
            <guid isPermaLink="true">https://risky.biz/caseysilicon/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/caseysilicon.mp3" length="4866587" type="audio/mpeg" />
            <itunes:subtitle>Lots of money going into &amp;quot;cyber&amp;quot;...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>518</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.


BugCrowd is an Australian business, but Casey is currently in the USA where the appetite for information security investment opportunities is apparently hitting fever pitch. In this interview I ask him how one might get started off on the path to massive phatcash through their cybersecurity startup.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.</p>
<!--excerpt-above-->

<p>BugCrowd is an Australian business, but Casey is currently in the USA where the appetite for information security investment opportunities is apparently hitting fever pitch. In this interview I ask him how one might get started off on the path to massive phatcash through their cybersecurity startup.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: AusCERT opening keynote with Google&amp;apos;s Michael Jones</title>
            <pubDate>Thu, 23 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/michaeljones/</link>
            <guid isPermaLink="true">https://risky.biz/michaeljones/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/michaeljones.mp3" length="28415875" type="audio/mpeg" />
            <itunes:subtitle>A call to action for infosec pros…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2638</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                We're kicking off our AusCERT 2013 coverage today with the conference's opening keynote by Michael Jones, Google's chief technology advocate. He's charged with advancing technology to organise the world's information and make it universally accessible and useful. 


Michael has worked as chief technologist of Google Maps, Earth, was the CTO of Keyhole Corporation, the company that developed the technology behind Google Earth and was also CEO of Intrinsic Graphics, and was director of advanced graphics at Silicon Graphics.
His presentation was called Security's Biggest Risk, and it basically boils down to the dumb stuff bringing us unstuck. It's a very high level talk that definitely has its moments, and I hope you enjoy it. Here he is.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>We're kicking off our AusCERT 2013 coverage today with the conference's opening keynote by Michael Jones, Google's chief technology advocate. He's charged with advancing technology to organise the world's information and make it universally accessible and useful. </p>
<!--excerpt-above-->

<p>Michael has worked as chief technologist of Google Maps, Earth, was the CTO of Keyhole Corporation, the company that developed the technology behind Google Earth and was also CEO of Intrinsic Graphics, and was director of advanced graphics at Silicon Graphics.</p>
<p>His presentation was called Security's Biggest Risk, and it basically boils down to the dumb stuff bringing us unstuck. It's a very high level talk that definitely has its moments, and I hope you enjoy it. Here he is.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: HD Moore&amp;apos;s AusCERT plenary</title>
            <pubDate>Thu, 23 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/hdmauscert/</link>
            <guid isPermaLink="true">https://risky.biz/hdmauscert/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/hdmauscert.mp3" length="30235020" type="audio/mpeg" />
            <itunes:subtitle>A global vulnerability analysis…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2412</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of HD Moore's AusCERT plenary, all about the research he's done scanning the entire Internet. HD is one of the smartest guys in the business, and it's a great talk. But you might actually need to slow it down a bit, because I don't think I've ever encountered anyone in my life who can speak as fast as HD does. He sometimes speaks at a pace that is faster than my ability to comprehend what he's saying. But as I say, it's a great talk -- it's called Global Vulnerability Analysis.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of HD Moore's AusCERT plenary, all about the research he's done scanning the entire Internet. HD is one of the smartest guys in the business, and it's a great talk. But you might actually need to slow it down a bit, because I don't think I've ever encountered anyone in my life who can speak as fast as HD does. He sometimes speaks at a pace that is faster than my ability to comprehend what he's saying. But as I say, it's a great talk -- it's called Global Vulnerability Analysis.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Paul Ducklin on code signing cert pinning</title>
            <pubDate>Thu, 23 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/ducklincert/</link>
            <guid isPermaLink="true">https://risky.biz/ducklincert/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/ducklincert.mp3" length="7209935" type="audio/mpeg" />
            <itunes:subtitle>How far do decent crypto controls get us?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>739</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview we chat with Paul Ducklin of Sophos about trends in code signing technology designed to combat malware.


During the great "SSL wars" of 2011, when hackers like Comodohacker went cyber-berserk owning CAs and minting their own certificates for sites like Gmail and Facebook, valuable lessons were learned. It's becoming the norm for browsers to pin certs for well known websites... and now this same approach to certificate sanity checking is finding its way into code signing checks.
Microsoft's latest EMET, version 4.0 which I think is still in Beta, will pin certs for signed applications. It's a good idea -- it makes life a little tougher for the bad guys, but as you'll hear, it's not going to kick the can THAT far down the road, as Paul Ducklin explains.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview we chat with Paul Ducklin of Sophos about trends in code signing technology designed to combat malware.</p>
<!--excerpt-above-->

<p>During the great "SSL wars" of 2011, when hackers like Comodohacker went cyber-berserk owning CAs and minting their own certificates for sites like Gmail and Facebook, valuable lessons were learned. It's becoming the norm for browsers to pin certs for well known websites... and now this same approach to certificate sanity checking is finding its way into code signing checks.</p>
<p>Microsoft's latest EMET, version 4.0 which I think is still in Beta, will pin certs for signed applications. It's a good idea -- it makes life a little tougher for the bad guys, but as you'll hear, it's not going to kick the can THAT far down the road, as Paul Ducklin explains.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: BYOD in government, a high level talk</title>
            <pubDate>Thu, 23 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/byodauscert/</link>
            <guid isPermaLink="true">https://risky.biz/byodauscert/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/byod.mp3" length="25652173" type="audio/mpeg" />
            <itunes:subtitle>Handy talk for CIOs and CSOs...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2423</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recorded presentation from AusCERT. It's by Al Blake, the Chief Information Officer of the Department of Sustainability, Environment, Water, Population and Communities. In it he talks about BYOD, basically, from an Australian government perspective. It's not an overly technical talk, but it is a good overview of what a CIO like him has to consider when allowing staff to use their own devices in a heavily regulated environment.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recorded presentation from AusCERT. It's by Al Blake, the Chief Information Officer of the Department of Sustainability, Environment, Water, Population and Communities. In it he talks about BYOD, basically, from an Australian government perspective. It's not an overly technical talk, but it is a good overview of what a CIO like him has to consider when allowing staff to use their own devices in a heavily regulated environment.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Are bug bounties more effective than pentesting?</title>
            <pubDate>Thu, 23 May 2013 00:00:00 +1000</pubDate>
            <link>https://risky.biz/bountyvpentest/</link>
            <guid isPermaLink="true">https://risky.biz/bountyvpentest/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2013/bountyvpentest.mp3" length="5562790" type="audio/mpeg" />
            <itunes:subtitle>In some cases, yes!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>592</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.


When Casey co-founded the business the idea was simple -- the company would host outsourced bug bounty programs for clients that didn't have the expertise to run their own. As some of you may know, the idea really took off, but what no one expected was for BugCrowd's registered testers to do a better job than many penetration testing teams.
It's cheaper than a pentest, and in the case of Web application or mobile application security testing, these bug bounty programs are turning up more actionable issues than penetration testing teams.
Could these types of programs be disruptive to the penetration testing services industry? Casey joined me to discuss.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.</p>
<!--excerpt-above-->

<p>When Casey co-founded the business the idea was simple -- the company would host outsourced bug bounty programs for clients that didn't have the expertise to run their own. As some of you may know, the idea really took off, but what no one expected was for BugCrowd's registered testers to do a better job than many penetration testing teams.</p>
<p>It's cheaper than a pentest, and in the case of Web application or mobile application security testing, these bug bounty programs are turning up more actionable issues than penetration testing teams.</p>
<p>Could these types of programs be disruptive to the penetration testing services industry? Casey joined me to discuss.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Musclenerd on Qualcomm baseband hacking</title>
            <pubDate>Wed, 31 Oct 2012 00:00:00 +1100</pubDate>
            <link>https://risky.biz/netcasts/breakpoint/interview-musclenerd-qualcomm-baseband-hacking/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/breakpoint/interview-musclenerd-qualcomm-baseband-hacking/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/breakpoint/musclenerd.mp3" length="9362032" type="audio/mpeg" />
            <itunes:subtitle>Low level pwnage for the win!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>901</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is an interview with Eric "Musclenerd" McDonald. Eric is a renowned iPhone jailbreaker and as such has a very detailed understanding of smartphone platforms.


His talk at Ruxcon Breakpoint was all about the security of baseband chipsets. If you follow this stuff you might know that the baseband chipsets in these smartphones -- which handle all the basic communications functions of the phones -- are actually quite sophisticated. And where there's sophistication, there are potential problems.
As you'll hear, there's research going into attacking baseband chipsets through two vectors -- directly through the cell network, if you control it, or if you can trick your targets handset into associating with your fake networks... or indeed through the OS. It's interesting stuff.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is an interview with Eric "Musclenerd" McDonald. Eric is a renowned iPhone jailbreaker and as such has a very detailed understanding of smartphone platforms.</p>
<!--excerpt-above-->

<p>His talk at Ruxcon Breakpoint was all about the security of baseband chipsets. If you follow this stuff you might know that the baseband chipsets in these smartphones -- which handle all the basic communications functions of the phones -- are actually quite sophisticated. And where there's sophistication, there are potential problems.</p>
<p>As you'll hear, there's research going into attacking baseband chipsets through two vectors -- directly through the cell network, if you control it, or if you can trick your targets handset into associating with your fake networks... or indeed through the OS. It's interesting stuff.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Sniffing USB firmware with FaceDancer</title>
            <pubDate>Wed, 31 Oct 2012 00:00:00 +1100</pubDate>
            <link>https://risky.biz/facedancer/</link>
            <guid isPermaLink="true">https://risky.biz/facedancer/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/breakpoint/travis.mp3" length="8019306" type="audio/mpeg" />
            <itunes:subtitle>Travis Goodspeed on his new gizmo...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>738</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is an interview I did at the Breakpoint security conference with security researcher Travis Goodspeed. He's come up with a hardware device called FaceDancer that allows him to capture USB device firmware by emulating the devices. What can you do with that? Well, you can start messing with those devices, loading up custom firmware, and even use modified USB devices to attack hosts.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is an interview I did at the Breakpoint security conference with security researcher Travis Goodspeed. He's come up with a hardware device called FaceDancer that allows him to capture USB device firmware by emulating the devices. What can you do with that? Well, you can start messing with those devices, loading up custom firmware, and even use modified USB devices to attack hosts.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Did Google dodge the Android pwnbullet?</title>
            <pubDate>Thu, 25 Oct 2012 00:00:00 +1100</pubDate>
            <link>https://risky.biz/jduck/</link>
            <guid isPermaLink="true">https://risky.biz/jduck/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/breakpoint/Jduck.mp3" length="6671451" type="audio/mpeg" />
            <itunes:subtitle>New exploit mitigations in Android look pretty good...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>578</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is an interview I did with Accuvant's Joshua Drake, aka jduck. His Breakpoint presentation was on the topic of Android security.


As regular listeners of the Risky Business podcast would know, we're pretty much convinced Android was rushed to market -- it was insecure, immature, way too open and a big, glaring risk to its users. Combine that with the inherent problems with the Android ecosystem and you had a recipe for disaster.
For those unfamiliar with those ecosystem problems, Android is very difficult to patch. Android users must wait for Google to update the OS, then ship the updates to the manufacturers who customise them for their hardware, then in turn they have to pass them on to the carriers, who may or may not customise those OS builds for compatibility with their apps and then pass the updates out over the air. Long story short, most Android devices wind up remaining unpatched.
Well, things have changed. As Joshua outlined in his presentation, Google has built a lot of exploit mitigations into the mobile OS and they're starting to look pretty effective. Is it possible that Google has dodged what many saw as an inevitable bullet?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is an interview I did with Accuvant's Joshua Drake, aka jduck. His Breakpoint presentation was on the topic of Android security.</p>
<!--excerpt-above-->

<p>As regular listeners of the Risky Business podcast would know, we're pretty much convinced Android was rushed to market -- it was insecure, immature, way too open and a big, glaring risk to its users. Combine that with the inherent problems with the Android ecosystem and you had a recipe for disaster.</p>
<p>For those unfamiliar with those ecosystem problems, Android is very difficult to patch. Android users must wait for Google to update the OS, then ship the updates to the manufacturers who customise them for their hardware, then in turn they have to pass them on to the carriers, who may or may not customise those OS builds for compatibility with their apps and then pass the updates out over the air. Long story short, most Android devices wind up remaining unpatched.</p>
<p>Well, things have changed. As Joshua outlined in his presentation, Google has built a lot of exploit mitigations into the mobile OS and they're starting to look pretty effective. Is it possible that Google has dodged what many saw as an inevitable bullet?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Barnaby Jack on hacking implantable medical devices</title>
            <pubDate>Thu, 25 Oct 2012 00:00:00 +1100</pubDate>
            <link>https://risky.biz/barnaby_breakpoint/</link>
            <guid isPermaLink="true">https://risky.biz/barnaby_breakpoint/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/breakpoint/Barnaby.mp3" length="7962464" type="audio/mpeg" />
            <itunes:subtitle>New research a real heartstopper...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>707</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is an interview I did with Barnaby Jack, a security researcher with IOActive. Barnes is probably best known for his work on ATM security. He famously "jackpotted" an ATM live on stage at BlackHat in 2010, but if he were to do a live demo of his latest research he'd probably wind up in prison.


That's because he's been looking at implantable defibrillators and pacemakers. As it turns out they have wireless interfaces that allow you to connect to them. You can bypass their rudimentary authentication and start sending 830 volt zaps into your victim's heart which, obviously, isn't ideal. 
Jack says these techniques could be used for targeted assassinations, or perhaps even more worryingly, a maliciously motivated person could actually create an auto-propagating worm designed to kill people!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is an interview I did with Barnaby Jack, a security researcher with IOActive. Barnes is probably best known for his work on ATM security. He famously "jackpotted" an ATM live on stage at BlackHat in 2010, but if he were to do a live demo of his latest research he'd probably wind up in prison.</p>
<!--excerpt-above-->

<p>That's because he's been looking at implantable defibrillators and pacemakers. As it turns out they have wireless interfaces that allow you to connect to them. You can bypass their rudimentary authentication and start sending 830 volt zaps into your victim's heart which, obviously, isn't ideal. </p>
<p>Jack says these techniques could be used for targeted assassinations, or perhaps even more worryingly, a maliciously motivated person could actually create an auto-propagating worm designed to kill people!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR INTERVIEW: Pcap analysis in the cloud</title>
            <pubDate>Thu, 25 Oct 2012 00:00:00 +1100</pubDate>
            <link>https://risky.biz/baker/</link>
            <guid isPermaLink="true">https://risky.biz/baker/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/breakpoint/Baker.mp3" length="8623529" type="audio/mpeg" />
            <itunes:subtitle>Why realtime prevention is fantasy...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>785</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                All our coverage of the Breakpoint security conference was made possible by our sponsor PacketLoop.


PacketLoop is a new Australian business that applies big data analysis techniques to your packet captures... you can visualise your captures, drill down into them, and even spot successful 0day attacks against your organisation after the event -- that's a simple trick, that one, they just loop your packet captures through IPSs after the fact... when they get signature updates, they loop them through again. Hence the name, PacketLoop.
You can sign up to a Beta at PacketLoop.com, and I suggest you do. Think of this stuff as like NetWitness in the cloud.
I caught up with PacketLoop co-founder Michael Baker to discuss his presentation at the Ruxcon conference, which was all about Big Data security analytics. I started off by asking him roughly what he planned to talk about.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>All our coverage of the Breakpoint security conference was made possible by our sponsor PacketLoop.</p>
<!--excerpt-above-->

<p>PacketLoop is a new Australian business that applies big data analysis techniques to your packet captures... you can visualise your captures, drill down into them, and even spot successful 0day attacks against your organisation after the event -- that's a simple trick, that one, they just loop your packet captures through IPSs after the fact... when they get signature updates, they loop them through again. Hence the name, PacketLoop.</p>
<p>You can sign up to a Beta at <a href="http://packetloop.com/" target="new">PacketLoop.com</a>, and I suggest you do. Think of this stuff as like NetWitness in the cloud.</p>
<p>I caught up with PacketLoop co-founder Michael Baker to discuss his presentation at the Ruxcon conference, which was all about Big Data security analytics. I started off by asking him roughly what he planned to talk about.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>DEBATE: AusCERT speed debate 2012</title>
            <pubDate>Tue, 22 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/speed_debate/</link>
            <guid isPermaLink="true">https://risky.biz/speed_debate/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/speed_debate.mp3" length="34712545" type="audio/mpeg" />
            <itunes:subtitle>This is always fun...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3581</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is the closing session from AusCERT's 2012 conference, the speed debate.


It's a chance to have a bit of a laugh at all things security and it's hosted by ABC personality Adam Spencer. Enjoy!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is the closing session from AusCERT's 2012 conference, the speed debate.</p>
<!--excerpt-above-->

<p>It's a chance to have a bit of a laugh at all things security and it's hosted by ABC personality Adam Spencer. Enjoy!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Why do we expect users to make good decisions?</title>
            <pubDate>Tue, 22 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/phil_rob/</link>
            <guid isPermaLink="true">https://risky.biz/phil_rob/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/phil_rob.mp3" length="6351759" type="audio/mpeg" />
            <itunes:subtitle>The Sophos guys dissect an age old issue...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>594</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                At AusCERT last week I caught up with Phil Piotrowski, a threat researcher with Sophos, as well as Rob Forsyth, a director of Sophos here in Australia.


Really what this chat is all about is interface. We cover a few topics; how users are finding it increasingly difficult to determine when a warning dialogue or popup is genuine or fake, how online crime syndicated are investing a great deal more effort into pretty graphics and good copywriting, and then we chat about how mobile operating systems like Android have succeeded by making extraordinarily complicated things appear very very simple, and what the security implications of that are.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>At AusCERT last week I caught up with Phil Piotrowski, a threat researcher with Sophos, as well as Rob Forsyth, a director of Sophos here in Australia.</p>
<!--excerpt-above-->

<p>Really what this chat is all about is interface. We cover a few topics; how users are finding it increasingly difficult to determine when a warning dialogue or popup is genuine or fake, how online crime syndicated are investing a great deal more effort into pretty graphics and good copywriting, and then we chat about how mobile operating systems like Android have succeeded by making extraordinarily complicated things appear very very simple, and what the security implications of that are.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: The risks posed by new wiretapping technologies</title>
            <pubDate>Fri, 18 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/landau/</link>
            <guid isPermaLink="true">https://risky.biz/landau/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/landau.mp3" length="20170881" type="audio/mpeg" />
            <itunes:subtitle>Affix your tinfoil hat and tune in...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2136</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording Susan Landau's plenary presentation. She's a Visiting Scholar in the Computer Science Department at Harvard University. Prior to that she worked as a Distinguished Engineer at Sun Microsystems, and held faculty positions at the University of Massachusetts and Wesleyan University.


Her talk is titled Surveillance or Security? The Risks Posed by New Wiretapping Technologies.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording Susan Landau's plenary presentation. She's a Visiting Scholar in the Computer Science Department at Harvard University. Prior to that she worked as a Distinguished Engineer at Sun Microsystems, and held faculty positions at the University of Massachusetts and Wesleyan University.</p>
<!--excerpt-above-->

<p>Her talk is titled Surveillance or Security? The Risks Posed by New Wiretapping Technologies.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: When pentesting doesn&amp;apos;t make sense</title>
            <pubDate>Fri, 18 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/ingram-tss/</link>
            <guid isPermaLink="true">https://risky.biz/ingram-tss/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/ingram.mp3" length="5528254" type="audio/mpeg" />
            <itunes:subtitle>You might be better off with a paper-based review...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>671</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor podcast we're chatting with Declan Ingram, Principal Security Consultant with Datacom TSS.


Datacom TSS is a relatively new Aussie company that offers all the usual services, like penetration testing and app review, and we're going to chat with Declan about when those types of services can be best deployed. Dropping massive amounts of budget on pentesting might not be the best way to use your resources, he says.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor podcast we're chatting with Declan Ingram, Principal Security Consultant with Datacom TSS.</p>
<!--excerpt-above-->

<p>Datacom TSS is a relatively new Aussie company that offers all the usual services, like penetration testing and app review, and we're going to chat with Declan about when those types of services can be best deployed. Dropping massive amounts of budget on pentesting might not be the best way to use your resources, he says.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Forensics and SCADA/DCS</title>
            <pubDate>Fri, 18 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/fabro_presentation/</link>
            <guid isPermaLink="true">https://risky.biz/fabro_presentation/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/fabro_presentation.mp3" length="27118770" type="audio/mpeg" />
            <itunes:subtitle>Mr. SCADA words it up...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2827</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of Mark Fabro's AusCERT plenary.


As soon as you listen to Mark for more than five minutes you'll quickly realise he really knows what he's talking about.
This talk is about performing incident response and forensic analysis on live SCADA networks. It's very interesting stuff and Mark is a great presenter.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of Mark Fabro's AusCERT plenary.</p>
<!--excerpt-above-->

<p>As soon as you listen to Mark for more than five minutes you'll quickly realise he really knows what he's talking about.</p>
<p>This talk is about performing incident response and forensic analysis on live SCADA networks. It's very interesting stuff and Mark is a great presenter.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Is the regulation of SCADA networks futile?</title>
            <pubDate>Fri, 18 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/fabro_interview/</link>
            <guid isPermaLink="true">https://risky.biz/fabro_interview/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/fabro_interview.mp3" length="11006061" type="audio/mpeg" />
            <itunes:subtitle>Can governments mandate success?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>971</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Yesterday I caught up with SCADA security expert and AusCERT speaker Mark Fabro of Lofty Perch. 


We spoke about attempts by governments to mandate minimum security requirements for critical infrastructure through regulation. I started off by asking him what regulation attempts in North America look like now.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Yesterday I caught up with SCADA security expert and AusCERT speaker Mark Fabro of Lofty Perch. </p>
<!--excerpt-above-->

<p>We spoke about attempts by governments to mandate minimum security requirements for critical infrastructure through regulation. I started off by asking him what regulation attempts in North America look like now.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Volumetric versus application DDoS</title>
            <pubDate>Fri, 18 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/appvolu/</link>
            <guid isPermaLink="true">https://risky.biz/appvolu/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/appvolu.mp3" length="8987187" type="audio/mpeg" />
            <itunes:subtitle>There&amp;apos;s more than one way to skin the DDoS cat. Meow.</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1095</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored podcast we chat with both Arbor Networks' Nick Race and Matt Hollis of Vocus.


We discuss the state of both application and volumetric based DDoS techniques.
As you'd no doubt be aware, Arbor makes DDoS mitigation equipment -- there's the enterprise stuff that blocks application-based attacks, like attacks that exhaust resources on the target, then there's the telco stuff that blocks the volumetric attacks -- a.k.a. bandwidth exhaustion attacks.
I started off by speaking with Matt Hollis of ASX - listed connectivity provider Vocus. These guys have some serious tubes, so they're used to seeing a lot of volumetric attacks. Then I got on the line with Arbor Networks' Nick Race to discuss app-based attacks.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored podcast we chat with both Arbor Networks' Nick Race and Matt Hollis of Vocus.</p>
<!--excerpt-above-->

<p>We discuss the state of both application and volumetric based DDoS techniques.</p>
<p>As you'd no doubt be aware, Arbor makes DDoS mitigation equipment -- there's the enterprise stuff that blocks application-based attacks, like attacks that exhaust resources on the target, then there's the telco stuff that blocks the volumetric attacks -- a.k.a. bandwidth exhaustion attacks.</p>
<p>I started off by speaking with Matt Hollis of ASX - listed connectivity provider Vocus. These guys have some serious tubes, so they're used to seeing a lot of volumetric attacks. Then I got on the line with Arbor Networks' Nick Race to discuss app-based attacks.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Connecting the physical with the virtual</title>
            <pubDate>Thu, 17 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/hoff_interview/</link>
            <guid isPermaLink="true">https://risky.biz/hoff_interview/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/hoff_interview.mp3" length="11617624" type="audio/mpeg" />
            <itunes:subtitle>The programmable network with Christopher Hoff...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>991</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview we chat with Juniper Networks' chief security architect Christopher Hoff. I posted the audio of Chris's plenary talk yesterday... it was very interesting stuff, so check it out if you get a chance. He basically outlined his vision for security automation -- security at scale.


A part of that vision is advocating a more communication and integration between apps and infrastructure. He says apps should be able to interact directly with networking infrastructure through APIs. It sounds great, but could it be a disaster?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview we chat with Juniper Networks' chief security architect Christopher Hoff. I posted the audio of Chris's plenary talk yesterday... it was very interesting stuff, so check it out if you get a chance. He basically outlined his vision for security automation -- security at scale.</p>
<!--excerpt-above-->

<p>A part of that vision is advocating a more communication and integration between apps and infrastructure. He says apps should be able to interact directly with networking infrastructure through APIs. It sounds great, but could it be a disaster?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Contactless payments with Peter Gutmann</title>
            <pubDate>Thu, 17 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/gutmann_rfid/</link>
            <guid isPermaLink="true">https://risky.biz/gutmann_rfid/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/gutmann.mp3" length="20255582" type="audio/mpeg" />
            <itunes:subtitle>The RFID devil&amp;apos;s in the detail...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2165</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a full recording of a presentation by the University of Auckland's Peter Gutmann discussing contactless payment systems.


It's a nice overview that points out some of the dumber implementation mistakes that have been made by card brands and issuers.
There's a reference to a Shmoocon talk in this recording. You can find the whole thing here.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a full recording of a presentation by the University of Auckland's Peter Gutmann discussing contactless payment systems.</p>
<!--excerpt-above-->

<p>It's a nice overview that points out some of the dumber implementation mistakes that have been made by card brands and issuers.</p>
<p>There's a reference to a Shmoocon talk in this recording. You can find the whole thing <a href="http://www.youtube.com/watch?v=HRXb-FZ6WFM" target="new">here</a>.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Robert Clark on legal aspects of cyber espionage</title>
            <pubDate>Thu, 17 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/clarke-interview/</link>
            <guid isPermaLink="true">https://risky.biz/clarke-interview/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/clarke_interview.mp3" length="12135183" type="audio/mpeg" />
            <itunes:subtitle>Get your hack on!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1040</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is an interview with Robert Clark, the operational attorney for the US Army Cyber Command. I posted audio of his talk yesterday... he spoke a lot about international law as it applies to cyber war. But I wanted to pick his brains about something he briefly mentioned. 


During his presentation he mentioned that espionage is actually legal under international law. I asked him to expand on that and we had a great chat about the legal aspects of online espionage.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is an interview with Robert Clark, the operational attorney for the US Army Cyber Command. I posted audio of his talk yesterday... he spoke a lot about international law as it applies to cyber war. But I wanted to pick his brains about something he briefly mentioned. </p>
<!--excerpt-above-->

<p>During his presentation he mentioned that espionage is actually legal under international law. I asked him to expand on that and we had a great chat about the legal aspects of online espionage.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: DDoS attacks against mobile networks</title>
            <pubDate>Thu, 17 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/auscert-malan/</link>
            <guid isPermaLink="true">https://risky.biz/auscert-malan/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/malan.mp3" length="7859120" type="audio/mpeg" />
            <itunes:subtitle>A chat with Arbor Networks founder Rob Malan...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>984</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Arbor Networks founder and CTO Rob Malan.


If you're lucky enough to have met Rob, you'd know that not only has he built a crazily successful business, but he's one of the most technologically savvy people you will ever meet. He lives and breathes his business, and lately he's been focussing on what he sees as a future problem area: Denial of service attacks against mobile 3G and 4G/LTE networks.
As you'll hear, Rob says the average mobile network is a bit of a disaster and there'll be plenty of opportunities for miscreants to wreak havoc on them.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Arbor Networks founder and CTO Rob Malan.</p>
<!--excerpt-above-->

<p>If you're lucky enough to have met Rob, you'd know that not only has he built a crazily successful business, but he's one of the most technologically savvy people you will ever meet. He lives and breathes his business, and lately he's been focussing on what he sees as a future problem area: Denial of service attacks against mobile 3G and 4G/LTE networks.</p>
<p>As you'll hear, Rob says the average mobile network is a bit of a disaster and there'll be plenty of opportunities for miscreants to wreak havoc on them.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Mikko Hypponen on &amp;quot;The Enemy&amp;quot;</title>
            <pubDate>Wed, 16 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/mikko2012/</link>
            <guid isPermaLink="true">https://risky.biz/mikko2012/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/mikko.mp3" length="29028028" type="audio/mpeg" />
            <itunes:subtitle>Mikko gives his take on Anons, Crims and Spooks...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2791</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a complete recording of Mikko Hyppponen's opening keynote to the AusCERT 2012 conference. Mikko is the chief research officer for the Finnish antivirus firm F-Secure. 


It takes him a few minutes to pick up steam, but I definitely recommend sticking with his talk. It starts out good and winds up fascinating. The title of his talk is The Enemy, and in it he examines three groups of attackers -- Criminals, Hacktivists and Nation States. It sounds like well worn material, but Mikko's take is definitely worth listening to.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a complete recording of Mikko Hyppponen's opening keynote to the AusCERT 2012 conference. Mikko is the chief research officer for the Finnish antivirus firm F-Secure. </p>
<!--excerpt-above-->

<p>It takes him a few minutes to pick up steam, but I definitely recommend sticking with his talk. It starts out good and winds up fascinating. The title of his talk is The Enemy, and in it he examines three groups of attackers -- Criminals, Hacktivists and Nation States. It sounds like well worn material, but <a href="http://conference.auscert.org.au/conf2012/speaker_Mikko_Hypponen.html" target="new">Mikko's take</a> is definitely worth listening to.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Christopher Hoff on virtualisation, cloud, deperimiterisation</title>
            <pubDate>Wed, 16 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/hoff/</link>
            <guid isPermaLink="true">https://risky.biz/hoff/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/hoff.mp3" length="27059745" type="audio/mpeg" />
            <itunes:subtitle>Programmable networks and other fun stuff...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2647</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a complete recording of Christopher Hoff's AusCERT presentation. He's the chief security architect with Juniper Networks. He has a vendor-heavy background, but don't hold that against him -- he's got some very interesting ideas around virtualisation, cloud computing and deperimiterisation. His talk is about automating security at scale, but he starts off, off all things, with a history innovation in toilets, which surprisingly works pretty well.


Here he is: Christopher Hoff, chief security architect of Juniper Networks. Enjoy.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a complete recording of Christopher Hoff's AusCERT presentation. He's the chief security architect with Juniper Networks. He has a vendor-heavy background, but don't hold that against him -- he's got some very interesting ideas around virtualisation, cloud computing and deperimiterisation. His talk is about automating security at scale, but he starts off, off all things, with a history innovation in toilets, which surprisingly works pretty well.</p>
<!--excerpt-above-->

<p>Here he is: <a href="http://conference.auscert.org.au/conf2012/speaker_Christofer_Hoff.html" target="new">Christopher Hoff, chief security architect of Juniper Networks</a>. Enjoy.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Apple&amp;apos;s security marketing comes unstuck</title>
            <pubDate>Wed, 16 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/duck-apple/</link>
            <guid isPermaLink="true">https://risky.biz/duck-apple/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/apple.mp3" length="7627007" type="audio/mpeg" />
            <itunes:subtitle>Flashback shows the emperor&amp;apos;s kimono is slipping...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>756</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor podcast we chat with Paul Ducklin of Sophos about the recent spate of Mac Malware. In light of malware like Flashback, is it fair to say the public perception that Mac computers are more secure has been busted?

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor podcast we chat with Paul Ducklin of Sophos about the recent spate of Mac Malware. In light of malware like Flashback, is it fair to say the public perception that Mac computers are more secure has been busted?</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: US Army lawyer Robert Clark</title>
            <pubDate>Wed, 16 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/clarke-army/</link>
            <guid isPermaLink="true">https://risky.biz/clarke-army/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/clarke.mp3" length="21856025" type="audio/mpeg" />
            <itunes:subtitle>This is required listening...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2360</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a complete recording of an absolutely fascinating presentation by Robert Clark -- the operational attorney for the US Army Cyber Command.


His presentation examines the legal regime surrounding cyberspace operations. 
He looks at the legal underpinnings of computer network security; defense; exploitation; and, attack. It is absolutely riveting stuff and I hope to be catching up with Mr. Clark at some point during the conference to ask him about six million questions.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a complete recording of an absolutely fascinating presentation by Robert Clark -- the operational attorney for the US Army Cyber Command.</p>
<!--excerpt-above-->

<p>His presentation examines the legal regime surrounding cyberspace operations. </p>
<p>He looks at the legal underpinnings of computer network security; defense; exploitation; and, attack. It is absolutely riveting stuff and I hope to be catching up with Mr. Clark at some point during the conference to ask him about six million questions.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Commercial sector versus intelligence world</title>
            <pubDate>Wed, 16 May 2012 00:00:00 +1000</pubDate>
            <link>https://risky.biz/byfield/</link>
            <guid isPermaLink="true">https://risky.biz/byfield/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2012/byfield.mp3" length="7509615" type="audio/mpeg" />
            <itunes:subtitle>Who is doing a better job?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>866</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor podcast we chat with Richard Byfield, co-founder and general manager of Datacom TSS.


Datacom TSS is a relatively new Australian company backed by the Datacom group, the large integrator. They're an independent company offering the usual stuff, like penetration testing and app review, but what makes them a little different are its founders.
They used to work in the security and intelligence community for the Australian government, which means they've spent a lot of time viewing the threat environment with a slightly different perspective to the rest of us. With that in mind, I thought it would be interesting to ask Richard what it was like for him to transition from his previous place of employment into the private sector. Here's what he had to say.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor podcast we chat with Richard Byfield, co-founder and general manager of Datacom TSS.</p>
<!--excerpt-above-->

<p>Datacom TSS is a relatively new Australian company backed by the Datacom group, the large integrator. They're an independent company offering the usual stuff, like penetration testing and app review, but what makes them a little different are its founders.</p>
<p>They used to work in the security and intelligence community for the Australian government, which means they've spent a lot of time viewing the threat environment with a slightly different perspective to the rest of us. With that in mind, I thought it would be interesting to ask Richard what it was like for him to transition from his previous place of employment into the private sector. Here's what he had to say.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Nick von Dadelszen&amp;apos;s Kiwicon presentation on NFC</title>
            <pubDate>Fri, 11 Nov 2011 00:00:00 +1100</pubDate>
            <link>https://risky.biz/KiwiconNFC/</link>
            <guid isPermaLink="true">https://risky.biz/KiwiconNFC/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2_nickvd.mp3" length="30299849" type="audio/mpeg" />
            <itunes:subtitle>Fun and games with Google&amp;apos;s Nexus S...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1905</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                NFC on mobile phones is a new phenomenon and opens a lot of possibilities for research, particularly when talking about mobile payment platforms. Lateral Security's Nick discusses the good, the bad and the ugly of mobile NFC.


RAW AUDIO.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>NFC on mobile phones is a new phenomenon and opens a lot of possibilities for research, particularly when talking about mobile payment platforms. Lateral Security's Nick discusses the good, the bad and the ugly of mobile NFC.</p>
<!--excerpt-above-->

<p>RAW AUDIO.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Wikileaks discussion panel, Splendour in the Grass 2011</title>
            <pubDate>Thu, 15 Sep 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/wleakspanel/</link>
            <guid isPermaLink="true">https://risky.biz/wleakspanel/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/wikileakspanel.mp3" length="39376803" type="audio/mpeg" />
            <itunes:subtitle>Live from the &amp;quot;wanker chillout area&amp;quot;...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>4916</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of a panel discussion about Wikileaks that took place at the Splendour in the Grass music festival in Woodford, QLD, Friday, 29 July 2011.


Moderating the panel is The Chaser's Julian Morrow. On the panel:
* Nicholas Hayden, Hungry Beast, ABC TV
* Marc Fennell, Hungry Beast, ABC TV
* Grace Morgan, Julian Assange's Australia-based solicitor
* Suelette Dreyfus, Author, Underground
* Patrick Gray, Host of the Risky Business podcast
* Christine Assange, Julian Assange's mother
The recording is unedited. Enjoy!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of a panel discussion about Wikileaks that took place at the Splendour in the Grass music festival in Woodford, QLD, Friday, 29 July 2011.</p>
<!--excerpt-above-->

<p>Moderating the panel is The Chaser's Julian Morrow. On the panel:</p>
<p>* Nicholas Hayden, Hungry Beast, ABC TV<br/>
* Marc Fennell, Hungry Beast, ABC TV<br/>
* Grace Morgan, Julian Assange's Australia-based solicitor<br/>
* Suelette Dreyfus, Author, Underground<br/>
* Patrick Gray, Host of the Risky Business podcast<br/>
* Christine Assange, Julian Assange's mother</p>
<p>The recording is unedited. Enjoy!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Microsoft&amp;apos;s Maarten Van Horenbeeck on vulnerability scoring</title>
            <pubDate>Tue, 24 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Maarten/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Maarten/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Maarten.mp3" length="17836639" type="audio/mpeg" />
            <itunes:subtitle>Many impact scores exist. How does Microsoft figure out its ratings?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2224</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Microsoft was kind enough to sponsor our coverage of AusCERT's 2011 conference and as a part of that sponsorship arrangement we're doing these sponsored podcasts. We've already posted two interviews with Microsoft peeps about security issues, but we're posting this full talk as well.


Maarten Van Horenbeeck works in the Microsoft Security Response Center managing Microsoft's efforts to share information on security vulnerabilities with third party security software providers, government agencies and national CERT teams. 
This talk is about how Microsoft applies ratings to its product vulnerabilities... there are a bunch of ratings systems out there... Maarten covers off some of these and discuss how MS boils down its own scores. I hope you enjoy this talk.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Microsoft was kind enough to sponsor our coverage of AusCERT's 2011 conference and as a part of that sponsorship arrangement we're doing these sponsored podcasts. We've already posted two interviews with Microsoft peeps about security issues, but we're posting this full talk as well.</p>
<!--excerpt-above-->

<p>Maarten Van Horenbeeck works in the Microsoft Security Response Center managing Microsoft's efforts to share information on security vulnerabilities with third party security software providers, government agencies and national CERT teams. </p>
<p>This talk is about how Microsoft applies ratings to its product vulnerabilities... there are a bunch of ratings systems out there... Maarten covers off some of these and discuss how MS boils down its own scores. I hope you enjoy this talk.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Cambridge University&amp;apos;s Ross Anderson on the economics of information security</title>
            <pubDate>Tue, 24 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Anderson/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Anderson/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Anderson.mp3" length="29699144" type="audio/mpeg" />
            <itunes:subtitle>Day three keynote from the AusCERT conference... good stuff...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3707</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a full presentation by AusCERT's day three keynote speaker Ross Anderson.


Ross has kindly allowed us to podcast his entire talk.
Ross is professor of security engineering at Cambridge University, and author of the bestselling textbook "Security Engineering: A Guide to Building Dependable Distributed Systems". He was a pioneer of peer-to-peer systems, of hardware tamper-resistance, and of the economics of information security. 
Ross will discuss the economics of information security in two contexts: frauds against payment networks, and the resilience of the Internet. The talk will draw on a recent major study Cambridge did on the resilience of the Internet.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a full presentation by AusCERT's day three keynote speaker Ross Anderson.</p>
<!--excerpt-above-->

<p>Ross has kindly allowed us to podcast his entire talk.</p>
<p>Ross is professor of security engineering at Cambridge University, and author of the bestselling textbook "Security Engineering: A Guide to Building Dependable Distributed Systems". He was a pioneer of peer-to-peer systems, of hardware tamper-resistance, and of the economics of information security. </p>
<p>Ross will discuss the economics of information security in two contexts: frauds against payment networks, and the resilience of the Internet. The talk will draw on a recent major study Cambridge did on the resilience of the Internet.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: AusCERT speed debates</title>
            <pubDate>Fri, 20 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-speeddebate/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-speeddebate/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-speeddebate.mp3" length="30163128" type="audio/mpeg" />
            <itunes:subtitle>AusCERT&amp;apos;s speed debates back in 2011!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3765</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear one of the highlights of AusCERT's annual conference -- the speed debates! Not to be taken too seriously, the speed debate happens at the end of the con -- it's a chance to have a laugh and shed some lighter perspectives on the security discipline.


It's hosted by Australian broadcaster and journalist Adam Spencer. I hope you enjoy it.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear one of the highlights of AusCERT's annual conference -- the speed debates! Not to be taken too seriously, the speed debate happens at the end of the con -- it's a chance to have a laugh and shed some lighter perspectives on the security discipline.</p>
<!--excerpt-above-->

<p>It's hosted by Australian broadcaster and journalist Adam Spencer. I hope you enjoy it.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: APNIC&amp;apos;s Geoff Huston on routing system &amp;quot;lies&amp;quot; </title>
            <pubDate>Fri, 20 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-routing-lies/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-routing-lies/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Huston.mp3" length="16200172" type="audio/mpeg" />
            <itunes:subtitle>It turns out routing tables lie more than politicians...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2019</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is a complete presentation by APNIC's Geoff Huston.


According to the official synopsis: This presentation will outline the role of addresses and routing and the potential attack vectors, and will also report on the progress to establish a secure framework for addresses and their use in the Internet, highlighting the progress in establishing a secure routing environment for the Internet.
As regular RB listeners would know, we've followed APNIC's work and papers in this area and they have a habit of pushing out good stuff... so this should be a decent talk. Enjoy!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is a complete presentation by APNIC's Geoff Huston.</p>
<!--excerpt-above-->

<p>According to the official synopsis: This presentation will outline the role of addresses and routing and the potential attack vectors, and will also report on the progress to establish a secure framework for addresses and their use in the Internet, highlighting the progress in establishing a secure routing environment for the Internet.</p>
<p>As regular RB listeners would know, we've followed APNIC's work and papers in this area and they have a habit of pushing out good stuff... so this should be a decent talk. Enjoy!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Stuart Strathdee on the PSN breach</title>
            <pubDate>Fri, 20 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Stuart/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Stuart/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Stuart.mp3" length="4711904" type="audio/mpeg" />
            <itunes:subtitle>PSN breach keeps enterprise customers up at night...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>583</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Microsoft was kind enough to sponsor our coverage of AusCERT's 2011 conference and as a part of that sponsorship arrangement we're doing these sponsored podcasts. They're general chats with Microsoft peeps about security issues.


And in this interview we're chatting with Microsoft Australia's Chief Security Advisor Stuart Strathdee about the affect the PSN network breach has had on large organisations' security outlook. As you'll hear, Stuart says a lot of security projects that had been on the back burner are now being brought forward.
Enjoy!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Microsoft was kind enough to sponsor our coverage of AusCERT's 2011 conference and as a part of that sponsorship arrangement we're doing these sponsored podcasts. They're general chats with Microsoft peeps about security issues.</p>
<!--excerpt-above-->

<p>And in this interview we're chatting with Microsoft Australia's Chief Security Advisor Stuart Strathdee about the affect the PSN network breach has had on large organisations' security outlook. As you'll hear, Stuart says a lot of security projects that had been on the back burner are now being brought forward.</p>
<p>Enjoy!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Scott McIntyre on the security &amp;quot;generation gap&amp;quot;</title>
            <pubDate>Wed, 18 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Scott/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Scott/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Scott.mp3" length="18900465" type="audio/mpeg" />
            <itunes:subtitle>Scott&amp;apos;s always good for a laugh!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2357</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear a full presentation recorded at the AusCERT conference. Scott McIntyre is a recent immigrant to Australia... he used to work for XS4all in the Netherlands, but these days he works as the Senior Technology Architecture Specialist in Security Operations for Telstra in Melbourne. His presentation is all about his views though, not those of Telstra. Disclaimer. Etc.


His talk focuses on what he calls the IT Security Generation Gap.  Too often are today's security policies written and enforced by people who don't "get" social media, the public Internet, iPads and BitTorrent.  But at the same time, anyone with an infrastructure to secure needs workable procedures and tooling to protect their data and systems.  His talk covers common failings in this generation gap and provides guiding principles to close the gap and reduce exposure.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear a full presentation recorded at the AusCERT conference. Scott McIntyre is a recent immigrant to Australia... he used to work for XS4all in the Netherlands, but these days he works as the Senior Technology Architecture Specialist in Security Operations for Telstra in Melbourne. His presentation is all about his views though, not those of Telstra. Disclaimer. Etc.</p>
<!--excerpt-above-->

<p>His talk focuses on what he calls the IT Security Generation Gap.  Too often are today's security policies written and enforced by people who don't "get" social media, the public Internet, iPads and BitTorrent.  But at the same time, anyone with an infrastructure to secure needs workable procedures and tooling to protect their data and systems.  His talk covers common failings in this generation gap and provides guiding principles to close the gap and reduce exposure.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Mark Newton makes IPv6 security interesting!</title>
            <pubDate>Wed, 18 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Newton/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Newton/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Newton.mp3" length="23377724" type="audio/mpeg" />
            <itunes:subtitle>Incredible feat performed live at AusCERT 2011...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2917</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear a full presentation recorded at the AusCERT conference: a great presentation by Mark Newton, an engineer with Internode, all about IPv6 security.


Internode is an ISP and Mark really knows his stuff. We all know security considerations in IPv6 aren't exactly thrilling, but Mark managed to actually make this presentation interesting and a little bit thought provoking. I was popping in and out throughout this session and yeah, it was definitely more interesting than I was expecting. So here it is!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear a full presentation recorded at the AusCERT conference: a great presentation by Mark Newton, an engineer with Internode, all about IPv6 security.</p>
<!--excerpt-above-->

<p>Internode is an ISP and Mark really knows his stuff. We all know security considerations in IPv6 aren't exactly thrilling, but Mark managed to actually make this presentation interesting and a little bit thought provoking. I was popping in and out throughout this session and yeah, it was definitely more interesting than I was expecting. So here it is!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>SPONSOR PODCAST: Microsoft&amp;apos;s Paul Conroy on what&amp;apos;s hip in identity management</title>
            <pubDate>Wed, 18 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/AusCERT-Conroy/</link>
            <guid isPermaLink="true">https://risky.biz/AusCERT-Conroy/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Conroy.mp3" length="5116999" type="audio/mpeg" />
            <itunes:subtitle>What is hip... tell me tell me if you think you know...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>634</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Our coverage of the conference is brought to you by the fine folks at Microsoft -- without their support, there would be no AusCERT podcasts, so big thanks to MS!


As a part of that sponsorship Risky Business is posting a few sponsored podcasts -- this is one of them, an interview with Microsoft's Identity specialist Paul Conroy. In it, we discuss what enterprise customers out there are actually looking for, as well as having a bit of a chat about SAML 2.0 -- an authentication protocol that you can use... and I can't believe I'm going to say this. In the... cloud. I said cloud. I'm sorry. But listen to the interview, it'll make sense.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Our coverage of the conference is brought to you by the fine folks at Microsoft -- without their support, there would be no AusCERT podcasts, so big thanks to MS!</p>
<!--excerpt-above-->

<p>As a part of that sponsorship Risky Business is posting a few sponsored podcasts -- this is one of them, an interview with Microsoft's Identity specialist Paul Conroy. In it, we discuss what enterprise customers out there are actually looking for, as well as having a bit of a chat about SAML 2.0 -- an authentication protocol that you can use... and I can't believe I'm going to say this. In the... cloud. I said cloud. I'm sorry. But listen to the interview, it'll make sense.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Smart Grid security with Ian Appleby</title>
            <pubDate>Mon, 16 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/smartgrid/</link>
            <guid isPermaLink="true">https://risky.biz/smartgrid/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-smartgrid.mp3" length="13292927" type="audio/mpeg" />
            <itunes:subtitle>Is Smart Grid security stupid?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1656</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This podcast is an AusCERT talk by Ian Appleby. He's the Information Security Manager at Endeavour Energy and he's responsible for the security of its Corporate and SCADA Systems.


The talk is on Risk Management in a Smart Metering Environment.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This podcast is an AusCERT talk by Ian Appleby. He's the Information Security Manager at Endeavour Energy and he's responsible for the security of its Corporate and SCADA Systems.</p>
<!--excerpt-above-->

<p>The talk is on Risk Management in a Smart Metering Environment.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Tim Hudson on the Queensland smart card license fail</title>
            <pubDate>Mon, 16 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/hudson/</link>
            <guid isPermaLink="true">https://risky.biz/hudson/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-hudson.mp3" length="6349757" type="audio/mpeg" />
            <itunes:subtitle>Man of mystery joins Risky Business...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>788</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview we hear from Tim Hudson, an independent cryptography dude, who, as you'll hear, may or may not have worked on Queensland's Smart Card drivers license project. Absurdly, on legal advice, he can't actually tell us if he worked on that project.


There were mutterings in the Queensland state parliament some time ago about a project consultant criticising the rollout... the minister responsible also said something about the department exploring legal options to shut said critic up. Geez, I wonder if it was Tim?
Tim did a presentation here at AusCERT earlier today... I asked him to tell me what he spoke about.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview we hear from Tim Hudson, an independent cryptography dude, who, as you'll hear, may or may not have worked on Queensland's Smart Card drivers license project. Absurdly, on legal advice, he can't actually tell us if he worked on that project.</p>
<!--excerpt-above-->

<p>There were mutterings in the Queensland state parliament some time ago about a project consultant criticising the rollout... the minister responsible also said something about the department exploring legal options to shut said critic up. Geez, I wonder if it was Tim?</p>
<p>Tim did a presentation here at AusCERT earlier today... I asked him to tell me what he spoke about.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Jason Larsen, Idaho National Labs, talks embedded device security</title>
            <pubDate>Mon, 16 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/Idaho/</link>
            <guid isPermaLink="true">https://risky.biz/Idaho/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Idaho.mp3" length="17526179" type="audio/mpeg" />
            <itunes:subtitle>He didn&amp;apos;t write Stuxnet. Honest.</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2185</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear a presentation by Jason Larsen, a security researcher at the Idaho National Laboratory.  The INL is run by the US Department of Energy and is home to the National SCADA Testbed (NSTB) and the Industrial Control System CERT(ICS-CERT). 


I'm going to read from his talk synopsis here: The first half of Jason's presentation will be an overview and update on what's happening in control. In most cases, simply sending properly formatted commands to the field equipment is enough, but there are cases when this does not achieve the attacker's goals.  If the field equipment contains sanity checks, the attacker needs sub-second control, or if he simply wants to hide, he will invade the field equipment. Understanding the challenges the attacker faces are essential for any sort of investigative or forensics effort. The second part of the presentation will cover attack and forensics of the embedded systems used in industrial control systems.
We were a couple of minutes late plugging into the desk, so we'll pick up Jason's talk just a few minutes in.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear a presentation by Jason Larsen, a security researcher at the Idaho National Laboratory.  The INL is run by the US Department of Energy and is home to the National SCADA Testbed (NSTB) and the Industrial Control System CERT(ICS-CERT). </p>
<!--excerpt-above-->

<p>I'm going to read from his talk synopsis here: The first half of Jason's presentation will be an overview and update on what's happening in control. In most cases, simply sending properly formatted commands to the field equipment is enough, but there are cases when this does not achieve the attacker's goals.  If the field equipment contains sanity checks, the attacker needs sub-second control, or if he simply wants to hide, he will invade the field equipment. Understanding the challenges the attacker faces are essential for any sort of investigative or forensics effort. The second part of the presentation will cover attack and forensics of the embedded systems used in industrial control systems.</p>
<p>We were a couple of minutes late plugging into the desk, so we'll pick up Jason's talk just a few minutes in.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>PRESENTATION: Opening keynote with comedian Bennett Arron</title>
            <pubDate>Mon, 16 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/Bennett/</link>
            <guid isPermaLink="true">https://risky.biz/Bennett/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-Bennett.mp3" length="9885562" type="audio/mpeg" />
            <itunes:subtitle>Comedian and ID theft victim Bennett Arron entertains at AusCERT...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1230</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                You're about to hear an excerpt from the opening keynote from the AusCERT conference by comedian Bennett Arron. 


Several years ago Bennett Arron was in serious debt. He owed thousands of pounds to mobile phone companies, catalogues and department stores. But it wasn't him! As it turned out, he was a victim of Identity Theft.
Years later, he wound up writing a comedy show about his experience... he eventually directed and presented a Documentary for Channel 4 called How To Steal An Identity.
In it he actually stole the identity of the then Home Secretary, Charles Clarke.
He was arrested over it, but you'll be pleased to know he was never convicted.
Anyway, Bennett was kind enough to allow Risky Business to play an excerpt from his talk. The whole thing is about an hour long and very entertaining... so obviously you should book him for your next exotically-located conference and or event. Big thanks to Bennett for allowing us to play this chunk of his talk.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>You're about to hear an excerpt from the opening keynote from the AusCERT conference by comedian Bennett Arron. </p>
<!--excerpt-above-->

<p>Several years ago Bennett Arron was in serious debt. He owed thousands of pounds to mobile phone companies, catalogues and department stores. But it wasn't him! As it turned out, he was a victim of Identity Theft.</p>
<p>Years later, he wound up writing a comedy show about his experience... he eventually directed and presented a Documentary for Channel 4 called How To Steal An Identity.</p>
<p>In it he actually stole the identity of the then Home Secretary, Charles Clarke.</p>
<p>He was arrested over it, but you'll be pleased to know he was never convicted.</p>
<p>Anyway, Bennett was kind enough to allow Risky Business to play an excerpt from his talk. The whole thing is about an hour long and very entertaining... so obviously you should book him for your next exotically-located conference and or event. Big thanks to Bennett for allowing us to play this chunk of his talk.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>INTERVIEW: Inter-protocol exploitation with BeEF creator Wade Alcorn</title>
            <pubDate>Mon, 16 May 2011 00:00:00 +1000</pubDate>
            <link>https://risky.biz/BeEF/</link>
            <guid isPermaLink="true">https://risky.biz/BeEF/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2011/AusCERT-BeEF.mp3" length="5218801" type="audio/mpeg" />
            <itunes:subtitle>Where&amp;apos;s the BeEF, chief?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>647</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview we're chatting with Wade Alcorn. By day he's NGS Security's general manager for Asia Pacific, but by night he's out there maintaining BeEF -- the browser exploitation framework.


If you haven't heard of beef it's a very cool tool. If you can get someone to load it into your browser, either by them visiting a site you control directly, or alternatively through some sort of cross site scripting bug, then you can get the browser to do all sorts of stuff for you -- like portscan the victim's LAN, attack JBOss servers and stuff like that.
I caught up with Wade and asked him to tell us all about BeEF and what's the latest. With beef. Here's the beef.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview we're chatting with Wade Alcorn. By day he's NGS Security's general manager for Asia Pacific, but by night he's out there maintaining BeEF -- the browser exploitation framework.</p>
<!--excerpt-above-->

<p>If you haven't heard of beef it's a very cool tool. If you can get someone to load it into your browser, either by them visiting a site you control directly, or alternatively through some sort of cross site scripting bug, then you can get the browser to do all sorts of stuff for you -- like portscan the victim's LAN, attack JBOss servers and stuff like that.</p>
<p>I caught up with Wade and asked him to tell us all about BeEF and what's the latest. With beef. Here's the beef.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Research in Motion VP of Security, Scott Totzke</title>
            <pubDate>Wed, 02 Jun 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/scott-totzke/</link>
            <guid isPermaLink="true">https://risky.biz/scott-totzke/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-scott-totzke.mp3" length="6760764" type="audio/mpeg" />
            <itunes:subtitle>Will malware turn Blackberries... blue?!?!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>839</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                RB2 is brought to you exclusively by Symantec.


Mobile security is all the rage these days, so when Research In Motion (RIM) VP of security Scott Totzke came to Australia a few weeks ago, we made sure we got an interview.
RIM is the company that makes the Blackberry. While it doesn't have as many cool points as the iPhone, the Blackberry has become the mobile workhorse of the modern enterprise. US President Barack Obama famously insisted on keeping his Blackberry when he came to office, so obviously anything Scott has to say about mobile security deserves to be heard.
I spoke to him by phone a couple of weeks ago.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>RB2 is brought to you exclusively by Symantec.</p>
<!--excerpt-above-->

<p>Mobile security is all the rage these days, so when Research In Motion (RIM) VP of security Scott Totzke came to Australia a few weeks ago, we made sure we got an interview.</p>
<p>RIM is the company that makes the Blackberry. While it doesn't have as many cool points as the iPhone, the Blackberry has become the mobile workhorse of the modern enterprise. US President Barack Obama famously insisted on keeping his Blackberry when he came to office, so obviously anything Scott has to say about mobile security deserves to be heard.</p>
<p>I spoke to him by phone a couple of weeks ago.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Tor&amp;apos;s battle against censorship</title>
            <pubDate>Wed, 26 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/RB2-tor/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-tor/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-tor.mp3" length="26795887" type="audio/mpeg" />
            <itunes:subtitle>It can be a sneaky tool for sneaky people, or a weapon against oppression... </itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3344</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this presentation you'll hear Tor project leader Roger Dingledine talking all about Tor. Who uses it? Why? What's it good for?


For those who don't know what it is, Tor is a free-software anonymizing network that helps people around the world use the Internet in safety, the official blurb says. 
Tor's 1600 volunteer relays carry traffic for several hundred thousand users including ordinary citizens who want protection from identity theft and prying corporations, corporations who want to look at a competitor's website in private, and soldiers and aid workers in the Middle East who need to contact their home servers without fear of physical harm.
So if you're based in Iran or China and don't want the government being able to identify your source IP, it's a pretty handy tool.
But governments are cottoning on to Tor and making efforts to block their citizens from using the Tor network. Roger discusses the changes the Tor project has made to combat these government restrictions. It's a good talk and I hope you enjoy it!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this presentation you'll hear Tor project leader Roger Dingledine talking all about Tor. Who uses it? Why? What's it good for?</p>
<!--excerpt-above-->

<p>For those who don't know what it is, Tor is a free-software anonymizing network that helps people around the world use the Internet in safety, the official blurb says. </p>
<p>Tor's 1600 volunteer relays carry traffic for several hundred thousand users including ordinary citizens who want protection from identity theft and prying corporations, corporations who want to look at a competitor's website in private, and soldiers and aid workers in the Middle East who need to contact their home servers without fear of physical harm.</p>
<p>So if you're based in Iran or China and don't want the government being able to identify your source IP, it's a pretty handy tool.</p>
<p>But governments are cottoning on to Tor and making efforts to block their citizens from using the Tor network. Roger discusses the changes the Tor project has made to combat these government restrictions. It's a good talk and I hope you enjoy it!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Cisco VP and CSO John Stewart predicts the future</title>
            <pubDate>Wed, 26 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/RB2-stewart/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-stewart/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-stewart.mp3" length="22138150" type="audio/mpeg" />
            <itunes:subtitle>Where will we be in 2012?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2762</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this presentation, Cisco's Vice President and Chief Security Officer John Stewart tries to pin down where we're going to be in 2012. More devices doing more things! Malware embedded in video streams! All sorts of funky stuff!

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this presentation, Cisco's Vice President and Chief Security Officer John Stewart tries to pin down where we're going to be in 2012. More devices doing more things! Malware embedded in video streams! All sorts of funky stuff!</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT interview: Google drops the ball </title>
            <pubDate>Fri, 21 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/sutton-google/</link>
            <guid isPermaLink="true">https://risky.biz/sutton-google/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-sutton-interview.mp3" length="8254590" type="audio/mpeg" />
            <itunes:subtitle>Google doesn&amp;apos;t filter easily detectable malicious links...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1026</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast you'll hear an interview I did with ZScaler's Michael Sutton. In it he expresses frustration that criminals are able to so easily manipulate Google's search results for trending topics. 


Sutton claims that malicious pages linked to trending topics are rising through Google's rankings almost immediately. In other words, the bad guys have gotten good at SEO.
But if Sutton and his colleagues can identify these pages from outside Google, why can't Google detect them? It's not exactly short on resources or cash.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast you'll hear an interview I did with ZScaler's Michael Sutton. In it he expresses frustration that criminals are able to so easily manipulate Google's search results for trending topics. </p>
<!--excerpt-above-->

<p>Sutton claims that malicious pages linked to trending topics are rising through Google's rankings almost immediately. In other words, the bad guys have gotten good at SEO.</p>
<p>But if Sutton and his colleagues can identify these pages from outside Google, why can't Google detect them? It's not exactly short on resources or cash.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Microsoft&amp;apos;s Steve Adegbite on avoiding a computing nanny state</title>
            <pubDate>Fri, 21 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/rb2-sponsor-podcast-microsofts-steve-adegbite-avoiding-computing-nanny-state/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/rb2-sponsor-podcast-microsofts-steve-adegbite-avoiding-computing-nanny-state/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-steve-sponsor.mp3" length="4696504" type="audio/mpeg" />
            <itunes:subtitle>You can lead a user to AV, but you can&amp;apos;t make them install it...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>581</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In the following interview, Microsoft's Steve Adegbite joins me for this interview about the potential for a nanny state operating system.


With all this rogue AV stuff floating about, the Microsofties are encountering a few fairly significant dilemmas on how to deal with this stuff. Should the OS only accept certain, known brands of AV? Well, then they're acting as a gateway and telling people what they can and can't run. Can't do that. What about a warning system like they did with device drivers? Well, that wasn't much good in the end because people just ignored the warnings.
So what can Microsoft do about this rogue AV problem?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In the following interview, Microsoft's Steve Adegbite joins me for this interview about the potential for a nanny state operating system.</p>
<!--excerpt-above-->

<p>With all this rogue AV stuff floating about, the Microsofties are encountering a few fairly significant dilemmas on how to deal with this stuff. Should the OS only accept certain, known brands of AV? Well, then they're acting as a gateway and telling people what they can and can't run. Can't do that. What about a warning system like they did with device drivers? Well, that wasn't much good in the end because people just ignored the warnings.</p>
<p>So what can Microsoft do about this rogue AV problem?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT podcast: Speed debate</title>
            <pubDate>Fri, 21 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/rb2-auscert-podcast-speed-debate/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/rb2-auscert-podcast-speed-debate/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-debate.mp3" length="29927655" type="audio/mpeg" />
            <itunes:subtitle>Has anyone ever noticed that Max Kilger sounds like Kermit the frog?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3735</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                What you're about to hear is the speed debating panel from AusCERT's 2010 conference.


A highlight of the conference, this year's panel was hosted by Australian media personality guy Adam Spencer. Panelists were: Max Kilger, Scott McIntyre, Marcus J. Ranum, Roger Dingledine, Alastair MacGibbon, Paul Gampe and Tim Redhead.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>What you're about to hear is the speed debating panel from AusCERT's 2010 conference.</p>
<!--excerpt-above-->

<p>A highlight of the conference, this year's panel was hosted by Australian media personality guy Adam Spencer. Panelists were: Max Kilger, Scott McIntyre, Marcus J. Ranum, Roger Dingledine, Alastair MacGibbon, Paul Gampe and Tim Redhead.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>AusCERT interveiw: Ben Mosse on vulnerability mitigations</title>
            <pubDate>Fri, 21 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/netcasts/auscert/auscert-interveiw-ben-mosse-vulnerability-mitigations/</link>
            <guid isPermaLink="true">https://risky.biz/netcasts/auscert/auscert-interveiw-ben-mosse-vulnerability-mitigations/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-mosse.mp3" length="3275861" type="audio/mpeg" />
            <itunes:subtitle>DEP and ASLR have done more than patching, Mosse argues...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>404</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview you'll hear me having a quick chat to Stratsec's Ben Mosse about vulnerability mitigation in Windows. Cutting a long story short, he reckons measures like DEP and ASLR work quite well, and it's only a matter of time before more, similar protections are introduced.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview you'll hear me having a quick chat to Stratsec's Ben Mosse about vulnerability mitigation in Windows. Cutting a long story short, he reckons measures like DEP and ASLR work quite well, and it's only a matter of time before more, similar protections are introduced.</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Michael Sutton on next generation offline Web applications</title>
            <pubDate>Thu, 20 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/sutton-html5/</link>
            <guid isPermaLink="true">https://risky.biz/sutton-html5/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-sutton.mp3" length="25485167" type="audio/mpeg" />
            <itunes:subtitle>HTML5, Google Gears to introduce some hairy new issues...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3180</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The following is a recording of a presentation by Zscaler's Michael Sutton. The topic is Security risks in the next generation of offline Web applications. Basically the talk looks at persistent client side storage, as brought on by stuff like Google Gears and the Database Storage functionality included in HTML5.


It was one of the better talks.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The following is a recording of a presentation by Zscaler's Michael Sutton. The topic is Security risks in the next generation of offline Web applications. Basically the talk looks at persistent client side storage, as brought on by stuff like Google Gears and the Database Storage functionality included in HTML5.</p>
<!--excerpt-above-->

<p>It was one of the better talks.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Scott McIntyre says &amp;quot;get a grip&amp;quot;</title>
            <pubDate>Thu, 20 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/scott-auscert/</link>
            <guid isPermaLink="true">https://risky.biz/scott-auscert/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-scott.mp3" length="15187070" type="audio/mpeg" />
            <itunes:subtitle>Maintaining proportionality vital to securing the Internet...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1893</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this presentation you'll hear Scott McIntyre talking about maintaining proportionality when dealing with matters of digital security.


Scott's the Chief Security Officer for Dutch ISP XS4all and serves on the board of directors for the Forum of Incident Response and Security Teams, or FIRST.
In this talk Scott argues that all the FUD out there is leading to over regulation. He also argues that CSIRT teams and incident handlers actually cause some security failures and that understanding the far reaching consequences to our actions is critical if we're ever going to have a safe Internet experience for the masses.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this presentation you'll hear Scott McIntyre talking about maintaining proportionality when dealing with matters of digital security.</p>
<!--excerpt-above-->

<p>Scott's the Chief Security Officer for Dutch ISP XS4all and serves on the board of directors for the Forum of Incident Response and Security Teams, or FIRST.</p>
<p>In this talk Scott argues that all the FUD out there is leading to over regulation. He also argues that CSIRT teams and incident handlers actually cause some security failures and that understanding the far reaching consequences to our actions is critical if we're ever going to have a safe Internet experience for the masses.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Marcus Ranum on Cyber War</title>
            <pubDate>Thu, 20 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/ranum-cyberwar/</link>
            <guid isPermaLink="true">https://risky.biz/ranum-cyberwar/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-ranum.mp3" length="24516964" type="audio/mpeg" />
            <itunes:subtitle>Ranum isn&amp;apos;t convinced cyber war is a reality...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3059</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast you'll hear Marcus Ranum's keynote speech from day two of the conference. Marcus is Tenable Network Security's Chief Security Officer and he's widely credited as an early pioneer in firewall technology.


His talk is titled "Scenes from the 2010 US/China Cyber war".
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast you'll hear Marcus Ranum's keynote speech from day two of the conference. Marcus is Tenable Network Security's Chief Security Officer and he's widely credited as an early pioneer in firewall technology.</p>
<!--excerpt-above-->

<p>His talk is titled "Scenes from the 2010 US/China Cyber war".</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Karl Hanmore and Steve Adegbite on CERTS and vendor relationships</title>
            <pubDate>Thu, 20 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/microsoft-on-certs/</link>
            <guid isPermaLink="true">https://risky.biz/microsoft-on-certs/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-karl-steve.mp3" length="17173839" type="audio/mpeg" />
            <itunes:subtitle>Collaboration means more than a beer together once a year...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2141</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Our coverage of AusCERT's 2010 conference is sponsored by Microsoft, and there's a few Microsofties floating about here. Two of them, Karl Hanmore and Steve Adegbite, prepared this presentation, titled "Engagement between National and Government CERTs and the vendor community -- benefits and challenges."


It is, in part, a criticism of the way vendors and CERTS are actually dealing with each other.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Our coverage of AusCERT's 2010 conference is sponsored by Microsoft, and there's a few Microsofties floating about here. Two of them, Karl Hanmore and Steve Adegbite, prepared this presentation, titled "Engagement between National and Government CERTs and the vendor community -- benefits and challenges."</p>
<!--excerpt-above-->

<p>It is, in part, a criticism of the way vendors and CERTS are actually dealing with each other.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT presentation: Frank Stajano on understanding scam victims</title>
            <pubDate>Tue, 18 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/understanding-victims/</link>
            <guid isPermaLink="true">https://risky.biz/understanding-victims/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-frank.mp3" length="18556060" type="audio/mpeg" />
            <itunes:subtitle>Understanding how it all goes wrong...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2318</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast you'll hear a presentation by Frank Stajano of the University of Cambridge. In it he discusses seven principles for systems security derived from understanding scam victims.  


He argues that by understanding the recurring behavioural patterns of victims that hustlers have learned to exploit, we can create systems that are more resistant to fraud. 
Frank plays three videos in the talk. With two of them you can get by with the audio alone, but the first one has a significant visual component. The good news is I found the video on Youtube, and I've linked to it here. 
You'll hear me, during this presentation, say something along the lines of "check out the video now" so you can pause the mp3 and watch the video. Sounds a bit involved, I know, but it's the only way I could think of to bring this presentation to you.
Here's the YouTube link again.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast you'll hear a presentation by Frank Stajano of the University of Cambridge. In it he discusses seven principles for systems security derived from understanding scam victims.  </p>
<!--excerpt-above-->

<p>He argues that by understanding the recurring behavioural patterns of victims that hustlers have learned to exploit, we can create systems that are more resistant to fraud. </p>
<p>Frank plays three videos in the talk. With two of them you can get by with the audio alone, but the first one has a significant visual component. The good news is I found the video on Youtube, and I've linked to it <a href="http://www.youtube.com/watch?v=zyCicKYAmL0" target="new">here</a>. </p>
<p>You'll hear me, during this presentation, say something along the lines of "check out the video now" so you can pause the mp3 and watch the video. Sounds a bit involved, I know, but it's the only way I could think of to bring this presentation to you.</p>
<p>Here's the <a href="http://www.youtube.com/watch?v=zyCicKYAmL0" target="new">YouTube link again</a>.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT interview: Mobile AV a &amp;quot;total waste&amp;quot; of money</title>
            <pubDate>Tue, 18 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/mobile-av-a-waste/</link>
            <guid isPermaLink="true">https://risky.biz/mobile-av-a-waste/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-ben-ken.mp3" length="6327172" type="audio/mpeg" />
            <itunes:subtitle>Modern mobiles are actually securable, these guys claim!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>785</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast we chat to two guys from Australian-based security firm Stratsec. 


Ben Bromhead and Ken Hendrie spend their lives up to their armpits in Windows mobile devices -- they actually do the worldwide common criteria evaluations for Windows mobile devices right here in Australia. As a result, these guys know a thing or two about mobile device security.
In their presentation, titled simply "mobile security", the two looked at the common threats to mobile devices and some mitigations. I caught up with them after their presentation for this interview.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast we chat to two guys from Australian-based security firm Stratsec. </p>
<!--excerpt-above-->

<p>Ben Bromhead and Ken Hendrie spend their lives up to their armpits in Windows mobile devices -- they actually do the worldwide common criteria evaluations for Windows mobile devices right here in Australia. As a result, these guys know a thing or two about mobile device security.</p>
<p>In their presentation, titled simply "mobile security", the two looked at the common threats to mobile devices and some mitigations. I caught up with them after their presentation for this interview.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT interview: E-mail crypto a &amp;quot;pain in the ass&amp;quot; says PKI inventor</title>
            <pubDate>Tue, 18 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/diffie/</link>
            <guid isPermaLink="true">https://risky.biz/diffie/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-diffie.mp3" length="4089627" type="audio/mpeg" />
            <itunes:subtitle>Whitfield Diffie words us up on the 11 secret herbs and spices...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>506</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview we check in with a bit of a legend, Whitfield Diffie. He's universally credited as one of the creators of public key infrastructure, and he was the opening keynote speaker at the AusCERT conference.


I grabbed Whit for an interview in the hotel lobby bar and started off by asking him if he's disappointed that PKI hasn't been universally adopted yet.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview we check in with a bit of a legend, Whitfield Diffie. He's universally credited as one of the creators of public key infrastructure, and he was the opening keynote speaker at the AusCERT conference.</p>
<!--excerpt-above-->

<p>I grabbed Whit for an interview in the hotel lobby bar and started off by asking him if he's disappointed that PKI hasn't been universally adopted yet.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Former Linux guy turned MS staffer Crispin Cowan</title>
            <pubDate>Tue, 18 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/auscert-cowan/</link>
            <guid isPermaLink="true">https://risky.biz/auscert-cowan/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-cowan.mp3" length="6795077" type="audio/mpeg" />
            <itunes:subtitle>Apparently you *can* be de-radicalised...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>844</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor podcast you'll hear an excerpt from Crispin Cowan's talk. Crispin works for Microsoft, but he used to be a vocal Microsoft critic and Linux fundamentalist.


These days he spends his time trying to retrofit Windows with decent security. He works for the Windows core team. 
I'll drop you into the talk here where he's explaining how certain bad things happened to Windows and the Microsoft ecosystem, namely, how interoperability concerns hampered the software company's ability to secure Windows.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor podcast you'll hear an excerpt from Crispin Cowan's talk. Crispin works for Microsoft, but he used to be a vocal Microsoft critic and Linux fundamentalist.</p>
<!--excerpt-above-->

<p>These days he spends his time trying to retrofit Windows with decent security. He works for the Windows core team. </p>
<p>I'll drop you into the talk here where he's explaining how certain bad things happened to Windows and the Microsoft ecosystem, namely, how interoperability concerns hampered the software company's ability to secure Windows.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: AusCERT interview: Neal Wise on the seven deadly sins of mobility</title>
            <pubDate>Tue, 18 May 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/7deadlysins/</link>
            <guid isPermaLink="true">https://risky.biz/7deadlysins/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/auscert2010/RB2-AC-neal.mp3" length="4030068" type="audio/mpeg" />
            <itunes:subtitle>You heard me. Seven!</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>498</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast you'll hear me speaking with Assurance.com.au's Neal Wise about the seven deadly sins of mobility. Neal's a penetration tester and a complete and utter wireless nerd. He's a regular on the show and as it turns out he's a standby speaker for this year's AusCERT conference. If anyone winds up too hungover on Wednesday to speak, Neal will step in.


You'll have most likely heard that Google has been busted collecting payload data from wireless networks as its vans drove around doing Google Street view videos... so I asked Neal for his take on that also. Enjoy.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast you'll hear me speaking with Assurance.com.au's Neal Wise about the seven deadly sins of mobility. Neal's a penetration tester and a complete and utter wireless nerd. He's a regular on the show and as it turns out he's a standby speaker for this year's AusCERT conference. If anyone winds up too hungover on Wednesday to speak, Neal will step in.</p>
<!--excerpt-above-->

<p>You'll have most likely heard that Google has been busted collecting payload data from wireless networks as its vans drove around doing Google Street view videos... so I asked Neal for his take on that also. Enjoy.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Adam Boileau and Mark Piper discuss Web app hacking tools</title>
            <pubDate>Fri, 30 Apr 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/RB2-web-app-tools/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-web-app-tools/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/MetlPipes1.mp3" length="8591686" type="audio/mpeg" />
            <itunes:subtitle>The first &amp;quot;metal pipes&amp;quot; podcast...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1068</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this RB2 podcast, sponsored by Symantec, Lateral Security's Adam Boileau and Mark Piper talk Web application hacking tools. What's hot? What's not? Web Scarab, Burp or CAT? Which for what? Play to find out!

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this RB2 podcast, sponsored by Symantec, Lateral Security's Adam Boileau and Mark Piper talk Web application hacking tools. What's hot? What's not? Web Scarab, Burp or CAT? Which for what? Play to find out!</p>
<!--excerpt-above-->
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Securus Global&amp;apos;s Declan Ingram on Forrester&amp;apos;s latest report</title>
            <pubDate>Tue, 13 Apr 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/RB2-declan-forrester/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-declan-forrester/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-declan-forrester.mp3" length="5302173" type="audio/mpeg" />
            <itunes:subtitle>Carrot versus stick: stick wins</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>657</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the RB2 podcast we're chatting with Declan Ingram from Securus Global about an interesting report that was recently released by analysis house Forrester.


It was commissioned by Microsoft and was intended to assess the data security practices of North American, European, and Australian enterprises by surveying CISOs.
Forrester sought to understand the value of sensitive information contained in enterprise portfolios; the security controls used to protect this information; the drivers of information security programs; and the cost and impact of enterprise data security incidents. 
There were some interesting findings. Among them, that security managers use compliance regimes to justify security spending, not security for security's sake.
You can download the report here.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the RB2 podcast we're chatting with Declan Ingram from Securus Global about an interesting report that was recently released by analysis house Forrester.</p>
<!--excerpt-above-->

<p>It was commissioned by Microsoft and was intended to assess the data security practices of North American, European, and Australian enterprises by surveying CISOs.</p>
<p>Forrester sought to understand the value of sensitive information contained in enterprise portfolios; the security controls used to protect this information; the drivers of information security programs; and the cost and impact of enterprise data security incidents. </p>
<p>There were some interesting findings. Among them, that security managers use compliance regimes to justify security spending, not security for security's sake.</p>
<p>You can download the report <a href="http://www.rsa.com/products/DLP/ar/10844_5415_The_Value_of_Corporate_Secrets.pdf" target="new">here</a>.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Simplicity versus complexity in malware</title>
            <pubDate>Tue, 13 Apr 2010 00:00:00 +1000</pubDate>
            <link>https://risky.biz/RB2-complexity/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-complexity/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-complexity-vincent.mp3" length="4079277" type="audio/mpeg" />
            <itunes:subtitle>Blunt tools can be useful too</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>504</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Risky Business 2 is sponsored exclusively by Symantec.


This week we're chatting with the company's vice president of security response, Vincent Weafer. 
In this interview, Vincent and I discuss the relative complexity of modern malware. Gone are the days of 214-byte malware that could spread via a single UDP packet. They were good days, but now they're gone and we're dealing with some really diabolically complicated stuff.
But we're still seeing malware that's relatively simple considering its 2010. Gumblar is a good example of that -- it's simple and not particularly sophisticated, but it's been very effective. 
So which poses a bigger threat? Simple stuff or complicated stuff?
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Risky Business 2 is sponsored exclusively by Symantec.</p>
<!--excerpt-above-->

<p>This week we're chatting with the company's vice president of security response, Vincent Weafer. </p>
<p>In this interview, Vincent and I discuss the relative complexity of modern malware. Gone are the days of 214-byte malware that could spread via a single UDP packet. They were good days, but now they're gone and we're dealing with some really diabolically complicated stuff.</p>
<p>But we're still seeing malware that's relatively simple considering its 2010. Gumblar is a good example of that -- it's simple and not particularly sophisticated, but it's been very effective. </p>
<p>So which poses a bigger threat? Simple stuff or complicated stuff?</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Big security vendors jump into PCLM?</title>
            <pubDate>Thu, 04 Mar 2010 00:00:00 +1100</pubDate>
            <link>https://risky.biz/RB2-pclm/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-pclm/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-pclm.mp3" length="6466119" type="audio/mpeg" />
            <itunes:subtitle>All your patchings are belong to big vendors...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>803</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                This is a sponsored podcast. Symantec sponsors the RB2 podcast so once a month we get one of their staff on the line to talk about industry trends, malware... whatever, really!


And today we're speaking with Vincent Weafer, Symantec's director of security response. Regular listeners of Risky.Biz podcasts would have heard me tonking on a LOT about patch management lately, and in particular the moves by large security vendors like McAfee, Trend and Symantec into that space. 
McAfee and Trend have licensed technology from BigFix and Symantec is integrating technology from its Altiris acquisition into its endpoint security products.
It's an interesting trend, and one that I personally think will have some meaningful implications for enterprise security. For one, patch management will all of a sudden be a capability of security teams, not just desktop teams.
So I thought I'd talk about this with Vincent, who sheds light on the trend from a vendor perspective. As you'll hear, I also talked malware with Vincent -- everything from the Zues botnet to the media's favourite Aurora. Enjoy!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>This is a sponsored podcast. Symantec sponsors the RB2 podcast so once a month we get one of their staff on the line to talk about industry trends, malware... whatever, really!</p>
<!--excerpt-above-->

<p>And today we're speaking with Vincent Weafer, Symantec's director of security response. Regular listeners of Risky.Biz podcasts would have heard me tonking on a LOT about patch management lately, and in particular the moves by large security vendors like McAfee, Trend and Symantec into that space. </p>
<p>McAfee and Trend have licensed technology from BigFix and Symantec is integrating technology from its Altiris acquisition into its endpoint security products.</p>
<p>It's an interesting trend, and one that I personally think will have some meaningful implications for enterprise security. For one, patch management will all of a sudden be a capability of security teams, not just desktop teams.</p>
<p>So I thought I'd talk about this with Vincent, who sheds light on the trend from a vendor perspective. As you'll hear, I also talked malware with Vincent -- everything from the Zues botnet to the media's favourite Aurora. Enjoy!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: When is a hack a hack?</title>
            <pubDate>Fri, 26 Feb 2010 00:00:00 +1100</pubDate>
            <link>https://risky.biz/RB2-erhan/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-erhan/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-erhan.mp3" length="4243886" type="audio/mpeg" />
            <itunes:subtitle>An interview with IT lawyer Erhan Karabardak...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>525</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast we chat to a solicitor who specialises in IT. His name is Erhan Karabardak and he's with the firm Cooper Mills in Melbourne. 


Erhan mostly specialises in technology-related stuff, and I wanted to get his thoughts on this so-called hacking scandal engulfing the corridors of power in New South Wales.
Last week a couple of journalists from the Sydney Morning Herald were given a handy tip -- if they pointed their browsers to nswtransportblueprint.com.au they would find a bunch of documents there that shouldn't have been released yet -- namely, the State Government's transport blueprint.
They went to the site, sure enough the documents were there, they wrote up the story and it ran on page one of last Saturday's Sydney Morning Herald.
The comical twist in all of this is the minister then went out and accused the journalists of hacking into the system to obtain the documents. This is especially funny given the journalists in question are known for being technologically challenged and possessing a fondness for fountain pens.
I thought it would be interesting to discuss this with a solicitor like Erhan. Although the documents were left on a webserver, could it be argued that the journalists had been doing something wrong by accessing them? When is a hack a hack? What if you had to guess a complicated URL through some sort of brute-force attack?
Well as you'll hear, unless you actually have some sort of access control on your data -- like a password, you're up the proverbial creek. I interviewed Erhan yesterday.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast we chat to a solicitor who specialises in IT. His name is Erhan Karabardak and he's with the firm Cooper Mills in Melbourne. </p>
<!--excerpt-above-->

<p>Erhan mostly specialises in technology-related stuff, and I wanted to get his thoughts on this so-called hacking scandal engulfing the corridors of power in New South Wales.</p>
<p>Last week a couple of journalists from the Sydney Morning Herald were given a handy tip -- if they pointed their browsers to nswtransportblueprint.com.au they would find a bunch of documents there that shouldn't have been released yet -- namely, the State Government's transport blueprint.</p>
<p>They went to the site, sure enough the documents were there, they wrote up the story and it ran on page one of last Saturday's Sydney Morning Herald.</p>
<p>The comical twist in all of this is the minister then went out and accused the journalists of hacking into the system to obtain the documents. This is especially funny given the journalists in question are known for being technologically challenged and possessing a fondness for fountain pens.</p>
<p>I thought it would be interesting to discuss this with a <a href="http://coopermills.com.au/" target="new">solicitor like Erhan</a>. Although the documents were left on a webserver, could it be argued that the journalists had been doing something wrong by accessing them? When is a hack a hack? What if you had to guess a complicated URL through some sort of brute-force attack?</p>
<p>Well as you'll hear, unless you actually have some sort of access control on your data -- like a password, you're up the proverbial creek. I interviewed Erhan yesterday.</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: Interview with Neil Gaughan, Assistant Commissioner, AFP</title>
            <pubDate>Fri, 19 Feb 2010 00:00:00 +1100</pubDate>
            <link>https://risky.biz/gaughan/</link>
            <guid isPermaLink="true">https://risky.biz/gaughan/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-gaughan.mp3" length="7476843" type="audio/mpeg" />
            <itunes:subtitle>When can the feds demand your encryption keys?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>586</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this instalment of RB2 we'll be hearing from Australian Federal Police Assistant Commissioner Neil Gaughan, who heads up High Tech and Child Protection Operations, for the AFP. 


A recent report in the Sydney Morning Herald detailed changes to Australian law that would allow the Australian Federal Police to physically destroy computers if they contain encrypted data the police can't unlock.
The story also talked about further changes to laws that would stiffen penalties for suspects who refuse to hand over encryption keys and passwords.
Anyway, it all sounded pretty extreme and drew a pretty adverse reaction from Adam Boileau, our regular news guest on the Risky Business podcast, so I thought I'd get Neil on the line and ask him about these changes, instead of just assuming the worst.
Neil joined me by phone on Monday for this interview!
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this instalment of RB2 we'll be hearing from Australian Federal Police Assistant Commissioner Neil Gaughan, who heads up High Tech and Child Protection Operations, for the AFP. </p>
<!--excerpt-above-->

<p>A recent report in the Sydney Morning Herald detailed changes to Australian law that would allow the Australian Federal Police to physically destroy computers if they contain encrypted data the police can't unlock.</p>
<p>The story also talked about further changes to laws that would stiffen penalties for suspects who refuse to hand over encryption keys and passwords.</p>
<p>Anyway, it all sounded pretty extreme and drew a pretty adverse reaction from Adam Boileau, our regular news guest on the Risky Business podcast, so I thought I'd get Neil on the line and ask him about these changes, instead of just assuming the worst.</p>
<p>Neil joined me by phone on Monday for this interview!</p>
                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>RB2: SPONSOR PODCAST: Vincent Weafer on software safety rankings</title>
            <pubDate>Thu, 17 Dec 2009 00:00:00 +1100</pubDate>
            <link>https://risky.biz/RB2-weafer-rankings/</link>
            <guid isPermaLink="true">https://risky.biz/RB2-weafer-rankings/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB2-weafer-rankings.mp3" length="7319667" type="audio/mpeg" />
            <itunes:subtitle>Sorting good from bad with a rankings approach to malware...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>909</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored podcast, Symantec's VP of security response joins RB2 to talk about some novel new approaches to the malware problem.


We don't normally talk to sponsors about their own technology, but this is just where the conversation went, and it's pretty interesting stuff!
Symantec's vision for the future is to gauge the level of risk posed to systems by building up a database that ranks executables according to their reputation. It's sort of like eBay's system of ranking buyers and sellers. I'd heard of this approach a while ago, but Vincent drills down into a bit of detail here. It's good stuff.
                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored podcast, Symantec's VP of security response joins RB2 to talk about some novel new approaches to the malware problem.</p>
<!--excerpt-above-->

<p>We don't normally talk to sponsors about their own technology, but this is just where the conversation went, and it's pretty interesting stuff!</p>
<p>Symantec's vision for the future is to gauge the level of risk posed to systems by building up a database that ranks executables according to their reputation. It's sort of like eBay's system of ranking buyers and sellers. I'd heard of this approach a while ago, but Vincent drills down into a bit of detail here. It's good stuff.</p>
                
                
                ]]>
            </description>
        </item>
            
        
    </channel>
</rss>
