Podcasts

News, analysis and commentary

INTERVIEW: Hacking supercomputers with y011

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers.

I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!

INTERVIEW: Hacking supercomputers with y011
0:00 / 8:54

INTERVIEW: Bob Clark on the CFAA

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

You're about to hear an interview I recorded with Bob Clark. He currently teaches law at the US Naval Academy, but he's been doing military law for a long time, even serving as the operational attorney for the US Army Cyber Command at one point.

I posted his talk yesterday... he touched on the Weev vs AT&T trial in that and I thought it would be interesting to get his perspective on the CFAA, precisely because it's not the sort of thing he normally concerns himself with. He has less of an agenda than a defence attorney or a prosecutor.

(If you haven't heard the episode of the regular Risky Business podcast where I had a chat with Weev and recapped that whole thing you might want to check it out because we reference it in this interview. It's here.)

INTERVIEW: Bob Clark on the CFAA
0:00 / 16:36

SPONSOR PODCAST: David Litchfield on hacking ‘dem databases

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

David Litchfield is a very well known researcher in the field of database security. He's been at it for over a decade, and managed to be a permanent pain in Oracle's neck since he first started dropping database 0day a million years ago.

So I asked him what has changed in the field of database security. Has Oracle improved its procedures?

SPONSOR PODCAST: David Litchfield on hacking ‘dem databases
0:00 / 9:10

SPONSOR PODCAST: Attacker MOs are changing

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor podcast we hear from FireEye's APAC CTO Bryce Boland about the effect next generation antimalware gear is having on the modus operandi of sophisticated attackers.

The possibility of burning their sweet, sweet 0days is actually turning some attackers away from well-resourced targets and towards secondary targeting; attacking their targets' partners and suppliers.

SPONSOR PODCAST: Attacker MOs are changing
0:00 / 11:47

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?
Bob Clark returns to AusCERT\u2026

This is a recording of a presentation by Bob Clark, who these days teaches at the US Naval Academy. He has a long history as a department of defence lawyer including a stint as the counsel for the US Army Cyber Command.

In this talk Bob covers some ground he has covered before -- looking at when an online action represents an act of war under the laws of armed conflict -- but also takes a look at some legal cases in the civilian world involving the CFAA.

PRESENTATION: When is a cyberwar (drink!) a cyberwar (drink!)?
0:00 / 36:38

PRESENTATION: Felix “FX” Lindner’s AusCERT keynote

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

We're going to kick things off with a recording of the opening keynote from the conference... this talk is by Felix "FX" Lindner of Recurity Labs.

Felix is a very well known hacker and researcher, and his talk is titled we come in peace, they don't. As you'll hear, he's not exactly Google's number one fan. Here he is, I hope you enjoy it!

PRESENTATION: Felix “FX” Lindner’s AusCERT keynote
0:00 / 45:48

PRESENTATION: Ed Felton on security in the surveillance age

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This is a recording of Ed Felton's plenary session from AusCERT 2014.

Ed Felton is a professor of computer science and public affairs at Princeton's centre for information technology policy. From 2011 to 2012 he was the first Chief Technologist for the Federal Trade Commission. He's a very well known and highly regarded researcher and academic and he spoke at AusCERT on security in a surveilled world.

PRESENTATION: Ed Felton on security in the surveillance age
0:00 / 36:26

INTERVIEW: Information leaks into North Korea

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Our coverage continues now with an interview I recorded with Olivia Maree and Dave Jorm. Olivia holds a law degree and just finished a six month stint as a community manager with BugCrowd\u2026 Dave Jorm studies geology and mathematics at UQ and has worked in the software industry for around 14 years.

Some of you would remember the interview I did with Dave last year about his OSINT analysis of North Korea, I also recorded and published his AusCERT talk on that topic last year. Well, this year he returned to AusCERT with his pal Olivia Maree to do another North Korea-themed presentation. This time the pair presented a talk about the information cordon - how information gets in and out of the country. Between USB thumb drives attached to home-made air balloons to tiny radios smuggled in to the Democratic People's Republic of Korea, you'll hear that state control of information entering the country isn't what it used to be, and, you know, that's a pretty big deal. and yes, I know this isn't your typical info sec story but you all loved my interview with Dave last year so I figured you'd all want to hear about this anyway\u2026

I started off by asking Olivia how the regime seeks to control information flowing into North Korea\u2026

**************EDITOR'S NOTE: This post originally referred to Olivia Maree as a lawyer. While she has a law degree, Olivia has never worked as a lawyer or completed articles. Apologies for any confusion. The audio introduction to this interview is still incorrect and will not be updated. - PG

INTERVIEW: Information leaks into North Korea
0:00 / 12:10

Risky Business 321 -- Silvio goes to Bunnings

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're chatting with Silvio Cesare about his new pastime of messing around with home alarm systems, garage door remotes and car immobilisers. How secure do you think your little key ring transmitters are? Well, not very. But the interesting thing is, the tools that you need to crack these things are now very cheap -- could we see thieves roaming the streets with software defined radios, opening up your neighbourhood's garages? Tune in to find out

This week's show is brought to you by HackLabs, an Australian penetration testing and security consulting firm. HackLabs head honcho Chris Gatford joins us in this week's sponsor interview to have a yarn about inadvertent disclosures.

It seems every week we're reading another story about sensitive information being uploaded to a web accessible directory and indexed by Google. It's true that there's no cure for stupid, but is there anything we can do to stop these things happening?

Adam Boileau, as always, joins the show to discuss the week's security news.

Show notes and links to everything can be found here.

Risky Business 321 -- Silvio goes to Bunnings
0:00 / 57:18

Risky Business #320 -- Hacking cars with Charlie Miller

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're chatting with security researcher Charlie Miller about the work he's been doing with Chris Valasek on hacking cars. It's fun stuff, but yeah, it might make you want to go back to driving an older car.

This week's show is sponsored by BugCrowd. We've got a great interview with BugCrowd founder and CEO Casey Ellis about a really, really interesting little case study he went through involving a random bug-hunter who'd tried blackmailing a BugCrowd client. The solution they came up with was ingenious and spectacularly lulzy.

Show notes

Microsoft fixes big IE bug -- even on Windows XP - CNET
http://www.cnet.com/news/microsoft-fixes-big-ie-bug-on-windows-xp-even/

Microsoft tells IE users how to defend against zero-day bug - CNET
http://www.cnet.com/news/microsoft-tells-ie-users-how-to-defend-against-...

Flash Zero Day Used to Target Victims in Syria | Threatpost | The first stop for security news
http://threatpost.com/flash-zero-day-used-to-target-victims-in-syria/105726

Mozilla Redesigns Firefox, Fixes Security Vulnerabilities | Threatpost | The first stop for security news
http://threatpost.com/mozilla-redesigns-firefox-browser-fixes-security-v...

Mozilla Offers Bug Bounty for Heartbleed-like Crypto Bugs | Threatpost | The first stop for security news
http://threatpost.com/mozilla-offers-bug-bounty-for-new-certificate-veri...

After Heartbleed, NSA reveals some flaws are kept secret - CNET
http://www.cnet.com/news/after-heartbleed-nsa-reveals-some-flaws-are-kep...

Obama Policy on Zero Days Craps Out - Forbes
http://www.forbes.com/sites/jennifergranick/2014/04/29/obama-policy-on-z...

Target Accelerates Chip-and-Pin Roll Out, Hires New CIO | Threatpost | The first stop for security news
http://threatpost.com/target-accelerates-chip-and-pin-roll-out-hires-new...

Anonymous activist pleads guilty to threatening FBI agent - CNET
http://www.cnet.com/news/anonymous-activist-pleads-guilty-to-threatening...

Inside the 'DarkMarket' Prototype, a Silk Road the FBI Can Never Seize | Threat Level | WIRED
http://www.wired.com/2014/04/darkmarket/

It's Insanely Easy to Hack Hospital Equipment | Threat Level | WIRED
http://www.wired.com/2014/04/hospital-equipment-vulnerable/

Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars | Threat Level | WIRED
http://www.wired.com/2014/04/traffic-lights-hacking/

Exploiting Facebook Notes to Launch DDoS | Threatpost | The first stop for security news
http://threatpost.com/exploiting-facebook-notes-to-launch-ddos/105701

UltraDNS Dealing with DDoS Attack | Threatpost | The first stop for security news
http://threatpost.com/ultradns-dealing-with-ddos-attack/105806

Vishing Attacks Targeting Dozens of Banks, Users' Card Data | Threatpost | The first stop for security news
http://threatpost.com/vishing-attacks-targeting-dozens-of-banks/105774

AOL Breached, Investigating Spam from Spoofed Accounts | Threatpost | The first stop for security news
http://threatpost.com/aol-investigating-breach-urges-users-to-change-pas...

Apache Struts Zero Day Vulnerability Patch to be Re-Issued | Threatpost | The first stop for security news
http://threatpost.com/apache-warns-of-faulty-zero-day-patch-for-struts/1...

Vulnerability in Viber Allows Snooping of Images, Videos | Threatpost | The first stop for security news
http://threatpost.com/vulnerability-in-viber-allows-intercept-of-images-...

60 Minutes shocked to find 8-inch floppies drive nuclear deterrent | Ars Technica
http://arstechnica.com/information-technology/2014/04/60-minutes-shocked...

RIP | Every Day Carry
http://everydaycarry.bandcamp.com/releases

Risky Business #320 -- Hacking cars with Charlie Miller
0:00 / 61:42