Risky Business #388 -- Cyber shrinkery, IoT shenanigans and guest Troy Hunt

Risky.Biz: Now with 60% more CYBER!

This week's feature interview is with Troy Hunt of HaveIBeenPwned.com. And he's noticing something pretty weird. It's common for people to deface websites for bragging rights, and yeah, it's not new that data dumps are the new bragging fodder. But it seems like these days attackers are seeing Troy's site as the definitive place to get cred. Now they'll steal a bunch of data and Troy is their first stop.

Risky Business #383 -- Inside FireEye's research gag

PLUS: The time to move to quantum-resistant crypto is NOW!

On this week's show we take a look at what the hell it happening in Germany, where FireEye sought and obtained an ex parte injunction against a bunch of security researchers over a presentation they were about to do at 44Con. We speak with infosec lawyer Alex Urbelis -- he was at 44Con when all this came to light and he shares his insights.

Risky Business #381 -- Samy Kamkar on his outlaw days

Hard to imagine this dude as a wildman of the Internet, but there you go...

On this week's show we're chatting with hacker superstar and YouTube phenomenon Samy Kamkar. Samy is a security researcher of note -- his recent hardware hacks have been coming thick and fast. This week I spoke to him about his brush with the law following his unleashing of the Samy worm on MySpace a decade ago, some of his recent research and his plans for the future.

Risky Business #379 -- Ashley Madison dump, Troy Hunt and The Grugq

This week's show features surprise guest: Cold and flu!

In this week's podcast we check in with Troy Hunt from HaveIBeenPwned.com. Troy has done the responsible thing in adding the Ashley Madison dataset to his service -- you can only search for email addresses in the dump after you've verified that you control them. We'll talk to him about why he did that.

An open letter to Risky Business Patreon supporters

The plans. They change.

Hey to all you Patreon people!

First up, a big thanks to you for helping out the show. It's been really heartening to see so many of you value Risky Business enough to put your hands in your pockets and make a contribution.

The original idea behind the Patreon campaign was that if I hit the target I could take that money and throw it at an industrial unit here in Byron Bay and turn it into a proper studio. After 11.5 years working from home full time, I've been feeling a bit cooped up.

The plan was to buy one and use the Patreon contributions to help service the debt. I'd get an office to work in, and over time I'd be building some equity in some bricks and mortar which will come in handy if I'm lucky enough to get too old to work.

Well, we haven't hit the target (it was ambitious) and property prices have gone berserk here in Australia over the last 12 months. Also, commercial finance in this country is fraught. I wouldn't be able to get a loan for a commercial property anyway. (Not without a fully paid-off house as security.)

So I'm switching my plans up and it looks like the most realistic thing I can do is to eventually build a backyard office designed for sound production. (Carpeted walls, right shape etc.)

I've got enough room for something small in the backyard (Maybe 2.5m x 3m), and while I don't absolutely need it right now, I'm going to eventually.

So the plan that I had with the money raised via the Patreon campaign has changed. The unit idea is out, but the backyard studio is in. The thing is, I have no idea when I'll be able to do that. It's a hell of a thing to organise and I'm pretty busy renovating my house at the moment. And there's still the possibility that I'll just say "You know what? I like that patch of lawn just the way it is". I doubt it, but it's a consideration.

Patreon pledges are up to about $1100 a month from around 200 patrons, so an average of about $5 a month each, which works out to $1.35 per patron per podcast. I could pay down a small garden studio in a few years at this rate, purely with listener contributions. That's pretty awesome.

But again, I'm not sure when I'll pull the trigger on that.

So that's my mini rant in the interests of transparency. I don't want to wind up like Bronwyn Bishop in some sort of misappropriation scandal, so I'm letting you all know that the original idea isn't going to happen. I'm pretty sure most of you are happy to just support the podcast and you don't really care where the money goes, but it's important to be open I think. If you don't want to support the show in this way anymore I respect it, but it's helping and I appreciate it.

Many thanks to all of you,

Pat

Risky Business #378 -- Mary Ann Davidson vs Krebs and Dowd

PLUS: "Islamic State publishes hacked kill list"

On this week's show we're chatting with Mark Dowd and Brian Krebs about Oracle CSO Mary Ann Davidson's somewhat odd blog post from earlier this week. In the post she laid into security researchers for violating Oracle's EULA when reverse engineering their products. The post got pulled, much drama, we sift through the ashes of that. Plus we chat to Brian about the daring $46.7m online heist against Ubiquiti Networks.

Risky Business #376 -- Sniper rifles, bank safes and Android all pwned

Are 950m devices really at risk? Joshua Drake talks Stagefright bugs...

This week we're checking in with Josh Drake of Zimperium. With exploitation of Stagefright via Josh's sweet, sweet exploit you'd think the mother of all worms is coming. Well, probably not. Later versions of Android are tricky to exploit, and the diversity of hardware in earlier versions means coming up with one exploit to rule them all isn't really feasible. We'll drill down into that with Josh in a little while.

Risky Business #375 -- Ashley Madison, Jeep hacks drive news agenda

PLUS Dave Jorm talks Red Star OS...

In this week's feature interview we're chatting with Dave Jorm, our resident North Korea watcher. Some of you might remember Dave, he was on the show a couple of years ago talking about his OSINT satellite data analysis of North Korea and more recently he popped by to talk about software defined networking security.

Risky Business #372 -- Airbus pilot talks plane hacking

How would a pilot respond to a hacked plane?

This week's feature interview is a bit left of field With all the talk about plane hacking flying around over the last couple of months (zing) I thought it might be an idea to talk to an actual airliner pilot. So this week we're joined by an Australian Airbus pilot. He works for an Asian airline but he was in Australia recently and I caught up with him to ask him for his thoughts on the topic.


SUBSCRIBE NOW:
Risky Business main podcast feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Our extra podcasts feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Subscribe to our newsletters: