Podcasts

News, analysis and commentary

Risky Business #428 -- Cross-platform Tor Browser pwnership with Ryan Duff

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show we’ll be chatting with security researcher Ryan Duff about the rabbit hole that is the Tor Browser Bundle certificate pinning bug. The bug itself is interesting, but the questions it raises about how suitable Tor is for genuinely critical use are, you know, substantial. That’s a really, really interesting chat with Ryan Duff, coming up after the news.

This week’s show is brought to you by Hewlett Packard Enterprise Fortify! Of course HPE Fortify makes both static and dynamic analysis tools to help their customers weed out bugs in their software… but what are the relative strengths of static versus dynamic? Where should you use these tools? As this week’s sponsor guest Michael Farnum explains, the trend these days is to not only use both, but move them both as far to the left as possible in the development cycle. That’s this week’s sponsor interview, coming up a bit later.

Mark Piper is this week’s news guest.

Oh, and do add Patrick on Twitter if that’s your thing.

Risky Business #428 -- Cross-platform Tor Browser pwnership with Ryan Duff
0:00 / 53:20

Risky Business #427 -- Cahill law partner Brad Bondi on MedSec suit

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

We have a great feature interview this week. Risky Business contributor Brian Donohue spoke with Cahill law firm partner Brad Bondi about the suit St Jude Medical has brought against MedSec and Muddy Waters over the short-sell of the medical device manufacturer’s shares. That is an illuminating chat that certainly gave me an understanding of where this all could be heading, both in terms of the upcoming trial and how likely it is we’ll see similar stuff in the future. This week’s show is brought to you by Cylance! These guys basically offer an AV solution that works differently. But you know what? I’ve asked a dozen people what they actually do, and no one has really been able to tell me. So, I talk to Cylance founder and CEO Stuart McClure about the fall out from the House Oversight report into the OPM breach – a report that went in to some detail on Cylance’s role in determining the extent of the breach – but I also talk to him more generally about what it is that Cylance actually does.

Adam Boileau is back in the news chair this week to talk about the week’s information security headlines.

Oh, and do add Patrick or Adam on Twitter if that’s your thing.

Risky Business #427 -- Cahill law partner Brad Bondi on MedSec suit
0:00 / 64:23

Risky Business #426 -- House Oversight Committee drops OPM breach report PLUS St Jude sues MedSec

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

In this week’s feature interview we chat with Stephen Ridley about all things IoT. Stephen is a researcher turned entrepreneur and he’ll be along to talk about the platform consolidation we’re going to see when it comes to “things”. Once that settles, he argues, we’ll get a better idea of the security risks we should really, actually be worried about. In this week’s sponsor interview we’re chatting with Simon Galbally at Senetas.

Senetas, of course, makes high assurance network encryptors and Simon joins us this week to talk about where certification schemes might be headed. Did you know there are no sunset clauses on many of the certification schemes out there? So yeah, you can be using a FIPS certified box that’s riddled with known bugs and yep, it’s still certified. Certifications could start moving towards more continuous models.

Insomnia Security’s Mark Piper is this week’s news guest.

Oh, and do add Patrick on Twitter if that’s your thing.

Risky Business #426 -- House Oversight Committee drops OPM breach report PLUS St Jude sues MedSec
0:00 / 52:55

Risky Business #425 -- MedSec CEO Justine Bone on the Muddy Waters short

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we've landed what looks to be a fairly exclusive interview -- at least as far as the tech press is concerned. Justine Bone will be joining us to explain why the company she works with, MedSec, decided to use vulnerability information on implantable medical devices to drive a short-selling scheme in partnership with Muddy Waters.

This week's show is sponsored by Tenable Network Security. We're doing something a bit different in this week's sponsor interview -- we're chatting with one of Tenable's customers, City of San Diego CISO Gary Hayslip.

They've just invested heavily in Nessus, among other things. Gary drops by to explain what he's been doing since he took the CISO position a few years ago. If you're a CISO it's actually a pretty interesting interview. That team has to deal with everything from embedded devices in cop cars to control systems to its very own POS network. Hey, citizens have to pay for government services somehow, right?

Trail of Bits head honcho Dan Guido is this week's news guest.

Oh, and do add Patrick and Dan on Twitter if that's your thing.

Risky Business #425 -- MedSec CEO Justine Bone on the Muddy Waters short
0:00 / 57:54

Risky Business #424 -- Jess Frazelle on Docker. So hot right now.

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we chat with Jessie Frazelle. Jessie is a former Docker maintainer who now works at Google on all things "containery". So we talk to her about what's up with containers, basically, and where the security pitfalls are. Like it or not, containers are likely going to be used in your environment, so getting to know them is a must. That's this week's feature.

This week's show is brought to you by HP Enterprise Security's Fortify! These guys and gals are a new sponsor, and I'm sure most of you know them. They make both static analysis and dynamic analysis code security tools, and this week we're joined by HPE Fortify's James "Jimmy" Rabon to talk about how this whole newfangled devops/agile thing has changed things for them.

The Grugq also joins the show to talk about the week's security news. He's filling in for Adam Boileau who's frantically getting Kiwicon 10 organised.

Oh, and do add Patrick and The Grugq on Twitter if that's your thing.

Show notes

Completely Wrong - Medium
https://medium.com/@thegrugq/completely-wrong-a300246ad316#.h7zsu81sg

CyberSecPolitics: Why EQGRP Leak is Russia
http://cybersecpolitics.blogspot.com.au/2016/08/why-eqgrp-leak-is-russia...

Shadow Broker Breakdown - Medium
https://medium.com/@thegrugq/shadow-broker-breakdown-b05099eb2f4a#.eqou5...

The NSA Leak Is Real, Snowden Documents Confirm
https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-documents...

NSA-linked Cisco exploit poses bigger threat than previously thought | Ars Technica
http://arstechnica.com/security/2016/08/nsa-linked-cisco-exploit-poses-b...

Juniper Acknowledges Equation Group Targeted ScreenOS | Threatpost | The first stop for security news
https://threatpost.com/juniper-acknowledges-equation-group-exploits-targ...

Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump | Motherboard
http://motherboard.vice.com/read/former-nsa-staffers-rogue-insider-shado...

The Shadow Brokers Mess Is What Happens When the NSA Hoards Zero-Days | WIRED
https://www.wired.com/2016/08/shadow-brokers-mess-happens-nsa-hoards-zer...

Researcher Grabs VPN Password With Tool From NSA Dump | Motherboard
http://motherboard.vice.com/read/researcher-grabs-cisco-vpn-password-wit...

Commentary: Evidence points to another Snowden at the NSA | Reuters
http://www.reuters.com/article/us-intelligence-nsa-commentary-idUSKCN10X01P

The NSA Data Leakers Might Be Faking Their Awful English To Deceive Us | Motherboard
http://motherboard.vice.com/read/the-shadow-brokers-nsa-leakers-linguist...

Someone Rickrolled the Bitcoin Auction for NSA Exploits | Motherboard
http://motherboard.vice.com/read/someone-rickrolled-the-bitcoin-auction-...

Californian gets 50 months in prison for Chinese 'technology spy' work \u2022 The Register
http://www.theregister.co.uk/2016/08/23/50_months_for_chinese_tech_spy_w...

Lawyer: Dark Web Child Porn Site Ran Better When It Was Taken Over by the FBI | Motherboard
http://motherboard.vice.com/read/lawyer-dark-web-child-porn-site-ran-bet...

A 'Tor General Strike' Wants to Shut Down the Tor Network for a Day | Motherboard
http://motherboard.vice.com/read/a-tor-general-strike-wants-to-shut-down...

EFF Blasts Microsoft Over Windows 10 Rollout | Threatpost | The first stop for security news
https://threatpost.com/eff-blasts-microsoft-over-malicious-windows-10-ro...

Australia Post says use blockchain for voting. Expert: you're kidding \u2022 The Register
http://www.theregister.co.uk/2016/08/22/australia_postblockchain_for_vot...

SSA: Ixnay on txt msg reqmnt 4 e-acct, sry - Krebs on Security
http://krebsonsecurity.com/2016/08/ssa-ixnay-on-txt-msg-reqmnt-4-e-acct-...

Epic Games Forums Hacked, 800,000 User Accounts Exposed | Threatpost | The first stop for security news
https://threatpost.com/epic-games-forums-hacked-sql-injection-vulnerabil...

Malware Infected All Eddie Bauer Stores in U.S., Canada - Krebs on Security
http://krebsonsecurity.com/2016/08/malware-infected-all-eddie-bauer-stor...

Massive Email Bombs Target .Gov Addresses - Krebs on Security
http://krebsonsecurity.com/2016/08/massive-email-bombs-target-gov-addres...

New Brazilian Banking Trojan Uses Windows PowerShell Utility | Threatpost | The first stop for security news
https://threatpost.com/new-brazilian-banking-trojan-uses-windows-powersh...

Browser Address Bar Spoofing Vulnerability Disclosed | Threatpost | The first stop for security news
https://threatpost.com/browser-address-bar-spoofing-vulnerability-disclo...

Software-defined networking is dangerously sniffable \u2022 The Register
http://www.theregister.co.uk/2016/08/23/sdns_normal_behaviour_is_sniffab...

How to Dramatically Improve Corporate IT Security Without Spending Millions - Praetorian.pdf
https://www.praetorian.com/downloads/report/How%20to%20Dramatically%20Im...

Risky Business #424 -- Jess Frazelle on Docker. So hot right now.
0:00 / 55:55

Risky Business #423 -- ShadowBrokers PLUS how2pwn Apple's Secure Enclave

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's feature interview is incredible. We're speaking with David Wang from Azimuth Security. He, his colleague Tarjei Mandt and Mat Solnik of OffCell Research delivered an absolutely blockbuster talk at Black Hat. I didn't see the talk at the time but I got a chance to review the slides and oh-my-god I can't believe this one got so little attention.

While everyone was running around talking about hackable lightbulbs, jeeps and trucks, these three guys basically dropped a how2pwn guide for Apple's Secure Enclave Processor. So, you know, you can basically take their slide deck, add a couple of little tweaks and you're unlocking an iPhone 6s and messing around with a thing you're really not supposed to be messing around with. It's really, really good reversing work and you need to hear this interview.

This week's show is brought to you by Bugcrowd, outsourced bug bounty programs. Bugcrowd founder and CEO Casey Ellis is along this week to talk about Apple's newly launched bounty program. Even though other software companies already have bounty programs, the large rewards involved in this one make it a big deal. We'll get his thoughts on that.

Adam Boileau joins us in this week's news segment to discuss the NSA's shiny toys being all over teh torrentz, as well as other assorted infosec news.

Oh, and do add Patrick and Adam on Twitter if that's your thing.

Show notes

What We Know About the Exploits Dumped in NSA-Linked Hack | Motherboard
http://motherboard.vice.com/read/what-we-know-about-the-exploits-dumped-...

The Equation Giveaway - Securelist
https://securelist.com/blog/incidents/75812/the-equation-giveaway/

\u200bWhy Github Removed Links to Alleged NSA Data | Motherboard
http://motherboard.vice.com/read/why-github-removed-links-to-alleged-nsa...

Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump | Motherboard
http://motherboard.vice.com/read/former-nsa-staffers-rogue-insider-shado...

The Current Highest Bid for Alleged NSA Data is 999,998.371 Bitcoin Short | Motherboard
http://motherboard.vice.com/read/the-shadow-brokers-auction-nsa-data-bit...

Hack of NSA-Linked Group Signals a Cyber Cold War | Motherboard
http://motherboard.vice.com/read/hack-nsa-linked-equation-group-cyber-co...

Why Did Guccifer 2.0 Evolve from Sloppy Hacktivist to Professional Leaker? | Motherboard
http://motherboard.vice.com/read/guccifer-20-evolution-sloppy-hacktivist...

Patrick Gray on Twitter: "Well this basically confirms it's Russia, right? Trolololol-lolol-lolol-lalalalaaaaa!!! https://t.co/YZ4etnZgO3"
https://twitter.com/riskybusiness/status/765347661587238916

Snowden speculates leak of NSA spying tools is tied to Russian DNC hack | Ars Technica
http://arstechnica.com/tech-policy/2016/08/snowden-speculates-leak-of-ns...

Shadow Brokers NSA exploits: doubts about Edward Snowden's tweets | The Cold War Daily
https://coldwardaily.com/2016/08/17/shadow-brokers-nsa-exploits-doubts-a...

Guccifer 2.0 doxes hundreds of House Democrats with massive document dump | Ars Technica
http://arstechnica.com/tech-policy/2016/08/guccifer-2-0-doxes-hundreds-o...

Democratic, GOP leaders got a secret briefing on DNC hack last year | Ars Technica
http://arstechnica.com/tech-policy/2016/08/democrat-gop-leaders-got-a-se...

Court Rules to Extradite Suspected Silk Road Admin From Ireland to the US | Motherboard
http://motherboard.vice.com/read/court-rules-to-extradite-suspected-silk...

\u200bAustralian Authorities Hacked Computers in the US | Motherboard
http://motherboard.vice.com/read/australian-authorities-hacked-computers...

How Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists | Motherboard
http://motherboard.vice.com/read/iran-cyberattacks-against-activists

Wave of Spoofed Encryption Keys Shows Weakness in PGP Implementation | Motherboard
http://motherboard.vice.com/read/wave-of-spoofed-encryption-keys-shows-w...

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks | Ars Technica
http://arstechnica.com/security/2016/08/linux-bug-leaves-1-4-billion-and...

Almost every Volkswagen sold since 1995 can be unlocked with an Arduino | Ars Technica
http://arstechnica.com/cars/2016/08/hackers-use-arduino-to-unlock-100-mi...

Security Fuckup Megathread - v12.1.4 - i need tp-link for my security hole - The Something Awful Forums
https://forums.somethingawful.com/showthread.php?threadid=3771497&pagenu...

Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open | Ars Technica
http://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-s...

Adobe Patches Experience Manager; No Flash Update | Threatpost | The first stop for security news
https://threatpost.com/a-month-without-adobe-flash-player-patches/119770/

Cisco confirms NSA-linked zeroday targeted its firewalls for years | Ars Technica
http://arstechnica.com/security/2016/08/cisco-confirms-nsa-linked-zeroda...

Cisco Patches ASA Zero Day Exposed by ShadowBrokers | Threatpost | The first stop for security news
https://threatpost.com/cisco-patches-asa-zero-day-exposed-by-shadowbroke...

us-16-Mandt-Demystifying-The-Secure-Enclave-Processor.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Mandt-Demystifying-T...

Risky Business #423 -- ShadowBrokers PLUS how2pwn Apple's Secure Enclave
0:00 / 59:24

Censusfail and the fog of war

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Last week I dashed off a very quick post about #CensusFail that went stupid viral. I think it was retweeted about 1200 times and it sort of became "the story" of what happened.

As far as I know the information I posted is accurate, but I wanted to write this to add a bit more context and look at where it's shaky. I literally wrote that thing up in about 10 minutes while I was working on last week's show. I was doubly under the pump because The Project had a camera guy coming to my house that evening to record an interview about the whole debacle.

I'd also just arrived back in Australia after spending six days in Las Vegas attending Black Hat, B-Sides and Defcon. Prior to that I was in Brazil. So yes, long story short, I was exhausted, jet lagged, slammed with work and I didn't really have much time to write a decent post. I certainly wasn't expecting what I did write to be spread so widely. So, now that I've had a minute to breathe, let's look back through the bullet points in original post to see where it's solid and where it isn't.

The information I put together came from multiple sources, some closer to the action that others.

  • IBM and the ABS were offered DDoS prevention services from their upstream provider, NextGen Networks, and said they didn't need it.
  • I'm pretty firm on this one. They may have worked with their upstream provider on a contingency plan (geoblocking) but I've got pretty solid information that they opted not to have DDoS gear installed at the edge of the census network. That was a mistake. The edge gear can detect certain types of DDoS activity and send a signal to the upstream provider for its filtering/blocking to begin. If you don't have it, you're basically running naked if your geoblocking isn't effective. Oops.

  • Their plan was to just ask NextGen to geoblock all traffic outside of Australia in the event of an attack.
  • Again, as far as I know this is solid and supported by statements made by officials since.

  • This plan was activated when there was a small-scale attack against the census website.
  • As far as I know this is also solid. There was a DDoS attack targeting the Census website and they asked NextGen to block all non-Australia packets. This worked, for a time.

  • Unfortunately another attack hit them from inside Australia. This was a straight up DNS reflection attack with a bit of ICMP thrown in for good measure. It filled up their firewall's state tables. Their solution was to reboot their firewall, which was operating in a pair.
  • This is the part I suspect *could* be wrong. Whether this attack actually happened or not I can't be sure. One source told me there was attack traffic hitting the Census website from within Australia, but the more I think of it the more I realise this could have just been legit traffic mischaracterised as DDoS traffic. That's the thing with stories like these. It's like reporting on a battle: The fog of war kicks in and details get lost or smudged.

    I am very firm on the census website firewall being rebooted at some point and the secondary not being synced. I'm not 100% on whether this was because of Australia-based DDoS traffic hitting the census website or it was a result of straight-up shitty capacity planning. So was it an attack or their connection filling up? I can't be 100% sure. I doubt they are either.

  • They hadn't synced the ruleset when they rebooted the firewall so the secondary was essentially operating as a very expensive paperweight. This resulted in a short outage.
  • Again, very solid on this having happened. Just not sure on the why.

  • Some time later IBM's monitoring equipment spat out some alerts that were interpreted by the people receiving them as data exfiltration. Already jittery from the DDoS disaster and wonky firewalls, they became convinced they'd been owned and the DDoS attack was a distraction to draw their focus away from the exfil.
  • I am absolutely, 100% rock solid on this one. We even saw the relevant minister and senior bureaucrats support this one in statements made to the media. The bit they left out is the traffic that triggered the alarm was entirely normal and should never have resulted in a false positive.

  • They pulled the pin and ASD was called in.
  • Public statements support this.

  • The IBM alerts were false positives incorrectly characterising offshore-bound system information/logs as exfil.
  • This is the part that's most hilarious. I'm told it was bog-stock traffic behvaiour that set off the alerts. I am confident there was no valid reason behind those alerts triggering.

    I'm actually pretty sympathetic here and it's hard to say the person who decided to unplug made the wrong call. If you suspect you've been owned and all your data is being siphoned off, it's probably the right thing to do.

    It's the people who set up such shitty monitoring that are to blame for this part of the disaster, not the people who pulled the pin.

  • ASD still needs to roll incident response before they can send the website live again. Even though it was false positives that triggered the investigation, there still needs to be an investigation.
  • This is just standard. Once you call an IR team they need to investigate.

So. That's where I stand on what I wrote last week. I'm sure about most of it, but the timeline and details around whether there was Australian attack traffic? I can't 100% substantiate that.

I'm highly confident the firewall thing happened. They did reboot without a synced secondary. But that's just sort of funny, and if it happened in isolation no one would think it's a big deal.

There's other stuff I haven't mentioned, too, like routes changing on the night to send traffic around the primary connectivity provider. This might be due to the "geoblocking falling over," something our fearless leaders have mentioned once or twice in interviews and at press conferences. If I had to guess, they tried to route around NextGen and get Telstra to pull together some last-minute DDoS filtering. That's just speculation, but if I had to guess, that's how it went down.

Either way it was amateur hour. The next question becomes: Who's responsible?

Predictably, the government is trying to shift blame for the debacle on to ABS bureaucrats and IBM. That's mostly fair enough. Telling a company like IBM that they should prepare for DDoS attacks is sort of like telling your babysitter not to put the kids in the oven while you're out for the night. It's just so weird that they didn't adequately prepare for it. That said, we don't know who made the final decision. It could have been an IBMer telling the ABS that they absolutely had it under control, or it could have been an executive-level public servant trying to shave a few bucks off the budget. We just don't know.

The thing I'd really like to know is why the ASD wasn't given authority to actually look at this set up before it went live. If its only involvement was asking high-level, compliance-like questions ("Do you have a DDoS mitigation plan? Y/N") then honestly that's not good enough. I suspect that's what's happened in this instance and this is where you'd go looking for ministerial accountability if you were so inclined.

If you're interested in infosec stuff beyond CensusFail, do check out my podcast, Risky Business. RSS feed here. iTunes subscription link here.

Or follow me on Twitter here.

What I've been told about #censusfail

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

I have been able to cobble together the following by talking to my sources. Sorry this post is so brief, but I'm still trying to get this week's show out and I'm massively under the pump. So here it is: Set your faces to stunned.

  • IBM and the ABS were offered DDoS prevention services from their upstream provider, NextGen Networks, and said they didn't need it.
  • Their plan was to just ask NextGen to geoblock all traffic outside of Australia in the event of an attack.
  • This plan was activated when there was a small-scale attack against the census website.
  • Unfortunately another attack hit them from inside Australia. This was a straight up DNS reflection attack with a bit of ICMP thrown in for good measure. It filled up their firewall's state tables. Their solution was to reboot their firewall, which was operating in a pair.
  • They hadn't synced the ruleset when they rebooted the firewall so the secondary was essentially operating as a very expensive paperweight. This resulted in a short outage.
  • Some time later IBM's monitoring equipment spat out some alerts that were interpreted by the people receiving them as data exfiltration. Already jittery from the DDoS disaster and wonky firewalls, they became convinced they'd been owned and the DDoS attack was a distraction to draw their focus away from the exfil.
  • They pulled the pin and ASD was called in.
  • The IBM alerts were false positives incorrectly characterising offshore-bound system information/logs as exfil.
  • ASD still needs to roll incident response before they can send the website live again. Even though it was false positives that triggered the investigation, there still needs to be an investigation.
  • At least IBM got to bump their margins up a bit by not paying for the DDoS prevention though... amirite?!

Risky Business #422 -- #CensusFail, news with Adam and MOAR

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we talk about the week's security news with Adam Boileau and I spill on what my sources have told me about #censusfail.

This week's show is brought to you by Canary.tools. Canary is a fantastic bit of kit -- it's essentially an easily configurable, compact honeypot you can just drop on your network like a dropbox to detect attacks. No begging the data centre people for rack space, just drop it and go. We'll be talking to Canary.tools head honcho Haroon Meer this week about the disconnect between what some startups are pitching to venture capitalists versus what users actually need.

Oh, and do add Patrick and Adam on Twitter if that's your thing.

Show notes

Census Australia 2016 fail: ABS says website was hacked
http://www.news.com.au/technology/census-fail-abs-spent-nearly-500000-on...

Patrick Gray on Twitter: "Analysis from trusted source of trusted source. Someone's getting fired. I'm a fucking journo and I'm not this dumb: https://t.co/gyQajFDQcQ"
https://twitter.com/riskybusiness/status/763189895292555264

'Angry, bitterly disappointed': Malcolm Turnbull lashes ABS for census failures
http://www.theage.com.au/federal-politics/political-news/angry-bitterly-...

Starting this fall, Apple will pay up to $200,000 for iOS and iCloud bugs | Ars Technica
http://arstechnica.com/apple/2016/08/starting-this-fall-apple-will-pay-u...

Zero-Day Hunters Will Pay Over Twice as Much as Apple's New Bug Bounty Programme | Motherboard
http://motherboard.vice.com/read/zero-day-hunters-will-pay-over-twice-as...

Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks | Ars Technica
http://arstechnica.com/security/2016/08/linux-bug-leaves-usa-today-other...

Researchers crack open unusually advanced malware that hid for 5 years | Ars Technica
http://arstechnica.com/security/2016/08/researchers-crack-open-unusually...

Data Breach At Oracle's MICROS Point-of-Sale Division - Krebs on Security
http://krebsonsecurity.com/2016/08/data-breach-at-oracles-micros-point-o...

Apple, Intel, Google Employee Accounts Exposed in Data Breach of Developer Forum | Motherboard
http://motherboard.vice.com/read/apple-intel-google-employee-accounts-ex...

Copperhead OS: The startup that wants to solve Android's woeful security | Ars Technica
http://arstechnica.com/security/2016/08/copperhead-os-fix-android-security/

Major Qualcomm chip security flaws expose 900M Android users | Ars Technica
http://arstechnica.com/security/2016/08/qualcomm-chip-flaws-expose-900-m...

Hackers Could Break Into Your Monitor To Spy on You and Manipulate Your Pixels | Motherboard
http://motherboard.vice.com/read/hackers-could-break-into-your-monitor-t...

Hackers Make the First-Ever Ransomware for Smart Thermostats | Motherboard
http://motherboard.vice.com/read/internet-of-things-ransomware-smart-the...

Afraid of the Dark? Too Bad, Your Smart Bulbs Can Be Hacked | Motherboard
http://motherboard.vice.com/read/hackers-could-take-control-of-your-smar...

Good news-the robocalling scourge may not be unstoppable after all | Ars Technica
http://arstechnica.com/security/2016/08/good-news-the-robocalling-scourg...

IPv6 router bug: Juniper spins out hotfix to thwart DDoS attacks | Ars Technica
http://arstechnica.com/security/2016/08/ipv6-router-bug-juniper-cisco-dd...

PLC Blaster Worm Targets Industrial Control PLCs | Threatpost | The first stop for security news
https://threatpost.com/plc-blaster-worm-targets-industrial-control-syste...

Secure Golden Key Boot: (MS16-094 / CVE-2016-3287, and MS16-100 / CVE-2016-3320)
https://rol.im/securegoldenkeyboot/

Flip Feng Shui - VUSec
https://www.vusec.net/projects/flip-feng-shui/

FreeBSD \xb7 GitHub
https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f

Risky Business #422 -- #CensusFail, news with Adam and MOAR
0:00 / 57:24

Risky Business #421 -- Las Vegas edition with Dan Guido, Andy Greenberg and Zane Lackey

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we speak with Signal Sciences' co-founder Zane Lackey about hackers building defensive tools and software companies. Dan Guido and Andy Greenberg talk about car hacking and the week's security news, and Wade Woolwine of Rapid7 is in the sponsor slot talking about EDR/IDR software.

Show notes

Hackers Fool Tesla S's Autopilot to Hide and Spoof Obstacles | WIRED
https://www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof...

The Jeep Hackers Are Back to Prove Car Hacking Can Get Much Worse | WIRED
https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-ac...

Hackers Hijack a Big Rig Truck's Accelerator and Brakes | WIRED
https://www.wired.com/2016/08/researchers-hack-big-rig-truck-hijack-acce...

LastPass Patches Ormandy Remote Compromise Flaw | Threatpost | The first stop for security news
https://threatpost.com/lastpass-patches-ormandy-remote-compromise-flaw/1...

Researchers Bypass Chip and Pin Protections at Black Hat | Threatpost | The first stop for security news
https://threatpost.com/researchers-bypass-chip-and-pin-protections-at-bl...

Oracle EBusiness Suite 'Massive' Attack Surface Assessed | Threatpost | The first stop for security news
https://threatpost.com/oracle-ebusiness-suite-massive-attack-surface-ass...

Yahoo Investigates 200 Million Alleged Accounts For Sale On Dark Web | Threatpost | The first stop for security news
https://threatpost.com/yahoo-investigates-200-million-alleged-accounts-f...

Report claims more than half of UK firms have been hit by ransomware | Ars Technica
http://arstechnica.com/security/2016/08/more-than-half-of-uk-firms-have-...

DNC staffers: FBI didn't tell us for months about possible Russian hack | Ars Technica
http://arstechnica.com/security/2016/08/dnc-staffers-fbi-didnt-tell-us-f...

New attack steals SSNs, e-mail addresses, and more from HTTPS pages | Ars Technica
http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-ad...

Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack | Ars Technica
http://arstechnica.com/security/2016/08/bitcoin-value-falls-off-cliff-af...

Social Security Administration Now Requires Two-Factor Authentication - Krebs on Security
http://krebsonsecurity.com/2016/08/social-security-administration-now-re...

The Administrator of the Dark Web's Infamous Hacking Market Has Vanished | Motherboard
http://motherboard.vice.com/read/the-administrator-of-the-dark-webs-infa...

Privacy Activists Launch Database to Track Global Sales of Surveillance Tech | Motherboard
http://motherboard.vice.com/read/privacy-activists-launch-database-to-tr...

How Drones Could Help Hackers Shut Down Power Plants | Motherboard
http://motherboard.vice.com/read/how-drones-could-help-hackers-shut-down...

Home
https://signalsciences.com/

rapid7 edr - Google Search
https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF...

Risky Business #421 -- Las Vegas edition with Dan Guido, Andy Greenberg and Zane Lackey
0:00 / 49:08