Podcasts

News, analysis and commentary

PRESENTATION: AusCERT opening keynote with Google's Michael Jones

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

We're kicking off our AusCERT 2013 coverage today with the conference's opening keynote by Michael Jones, Google's chief technology advocate. He's charged with advancing technology to organise the world's information and make it universally accessible and useful.

Michael has worked as chief technologist of Google Maps, Earth, was the CTO of Keyhole Corporation, the company that developed the technology behind Google Earth and was also CEO of Intrinsic Graphics, and was director of advanced graphics at Silicon Graphics.

His presentation was called Security's Biggest Risk, and it basically boils down to the dumb stuff bringing us unstuck. It's a very high level talk that definitely has its moments, and I hope you enjoy it. Here he is.

PRESENTATION: AusCERT opening keynote with Google's Michael Jones
0:00 / 43:58

PRESENTATION: HD Moore's AusCERT plenary

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a recording of HD Moore's AusCERT plenary, all about the research he's done scanning the entire Internet. HD is one of the smartest guys in the business, and it's a great talk. But you might actually need to slow it down a bit, because I don't think I've ever encountered anyone in my life who can speak as fast as HD does. He sometimes speaks at a pace that is faster than my ability to comprehend what he's saying. But as I say, it's a great talk -- it's called Global Vulnerability Analysis.

PRESENTATION: HD Moore's AusCERT plenary
0:00 / 40:12

SPONSOR INTERVIEW: Paul Ducklin on code signing cert pinning

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor interview we chat with Paul Ducklin of Sophos about trends in code signing technology designed to combat malware.

During the great "SSL wars" of 2011, when hackers like Comodohacker went cyber-berserk owning CAs and minting their own certificates for sites like Gmail and Facebook, valuable lessons were learned. It's becoming the norm for browsers to pin certs for well known websites... and now this same approach to certificate sanity checking is finding its way into code signing checks.

Microsoft's latest EMET, version 4.0 which I think is still in Beta, will pin certs for signed applications. It's a good idea -- it makes life a little tougher for the bad guys, but as you'll hear, it's not going to kick the can THAT far down the road, as Paul Ducklin explains.

SPONSOR INTERVIEW: Paul Ducklin on code signing cert pinning
0:00 / 12:19

PRESENTATION: BYOD in government, a high level talk

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a recorded presentation from AusCERT. It's by Al Blake, the Chief Information Officer of the Department of Sustainability, Environment, Water, Population and Communities. In it he talks about BYOD, basically, from an Australian government perspective. It's not an overly technical talk, but it is a good overview of what a CIO like him has to consider when allowing staff to use their own devices in a heavily regulated environment.

PRESENTATION: BYOD in government, a high level talk
0:00 / 40:23

SPONSOR INTERVIEW: Are bug bounties more effective than pentesting?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.

When Casey co-founded the business the idea was simple -- the company would host outsourced bug bounty programs for clients that didn't have the expertise to run their own. As some of you may know, the idea really took off, but what no one expected was for BugCrowd's registered testers to do a better job than many penetration testing teams.

It's cheaper than a pentest, and in the case of Web application or mobile application security testing, these bug bounty programs are turning up more actionable issues than penetration testing teams.

Could these types of programs be disruptive to the penetration testing services industry? Casey joined me to discuss.

SPONSOR INTERVIEW: Are bug bounties more effective than pentesting?
0:00 / 9:52

Risky Business #281 -- Eyes on DPRK

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's feature interview is with Dave Jorm, a Brisbane-based security geek and environmental science aficionado who's done some really interesting OSINT analysis of agricultural efficiency in North Korea with publicly available satellite data.

He's presenting his findings at AusCERT's annual conference on the Gold Coast next week; he joins the podcast to talk about his work and the online community of North Korea watchers.

Ok, so it's not exactly about infosec, but it's really interesting stuff and I hope you all enjoy it!

This week's show is brought to you by the fine folks at HackLabs, the Australian pentesting firm. If you need your pens tested, get in touch with the team at HackLabs.com.

This week's sponsor interview is with HackLabs head honcho Chris Gatford. We chat to him about a tale of two banks -- one big Middle Eastern bank and one small Australian bank. They're two organisations with very different approaches to security and very different security postures, but both eventually failed penetration tests by making the same simple mistakes.

Show notes

LulzSec Hackers Sentenced to Prison by London Court | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/lulzsec-sony-hackers-sentenced/

Hacker Aush0k fronts Sydney court - Hackers - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/343301,hacker-aush0k-fronts-sydney-cou...

$45M Bank Hack Suspect Was Shot Dead While Playing Dominoes | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/bank-cashing-suspect-killed/

Judge Allows Evidence Gathered From FBI's Spoofed Cell Tower | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/rigmaiden-cell-tower-evidence/

Saudi Telecom Sought U.S. Researcher's Help in Spying on Mobile Users | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/saudi-telecom-sought-spy-help/

Bloomberg Leaks Private Messages from Data-Mining Project | Threatpost
http://threatpost.com/bloomberg-posts-10000-private-messages-over-the-in...

Obama Administration Secretly Obtains Phone Records of AP Journalists | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/doj-got-reporter-phone-records/

Lawmakers Introduce Bill Requiring Court Order to Seize Phone Records | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/court-order-for-phone-records/

FBI's Latest Proposal for a Wiretap-Ready Internet Should Be Trashed | Wired Opinion | Wired.com
http://www.wired.com/opinion/2013/05/the-fbis-plan-for-a-wiretap-ready-i...

Biometric Database of All Adult Americans Hidden in Immigration Reform | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/immigration-reform-dossiers/

Syrian Internet Connection Cut Off Again | Threatpost
http://threatpost.com/syria-severed-from-internet-again/

Trade Sanctions Cited in Hundreds of Syrian Domain Seizures - Krebs on Security
http://krebsonsecurity.com/2013/05/trade-sanctions-cited-in-hundreds-of-...

DDoS Services Advertise Openly, Take PayPal - Krebs on Security
http://krebsonsecurity.com/2013/05/ddos-services-advertise-openly-take-p...

Honeynet Project Researchers Build ICS Honeypot | Threatpost
http://threatpost.com/honeynet-project-researchers-build-publicly-availa...

Attackers Target Older Java Bugs | Threatpost
http://threatpost.com/attackers-target-older-java-bugs/

Malicious Firefox, Chrome Extensions Target Facebook Users | Threatpost
http://threatpost.com/malicious-browser-extensions-target-facebook-profi...

Spyware Campaign Originating in India Targeting Pakistanis | Threatpost
http://threatpost.com/new-india-based-spy-malware-campaign-targeting-pak...

Firefox 21 Update Patches 8 Vulnerabilities, 3 Critical | Threatpost
http://threatpost.com/firefox-21-fixes-three-critical-flaws-introduces-n...

Microsoft Patches IE Zero Day Used In Watering Hole Attack | Threatpost
http://threatpost.com/microsoft-patches-department-of-labor-pwn2own-ie-v...

Adobe Patches ColdFusion Flaws Exploited in Wild | Threatpost
http://threatpost.com/adobe-patches-coldfusion-flash-reader-vulnerabilit...

How a Career Con Man Led a Federal Sting That Cost Google $500 Million | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/google-pharma-whitaker-sting/all/

Zuluboy - Mbombela (A Twist of Bayethe) - YouTube
http://www.youtube.com/watch?v=KFS4cSmzjYY

,

With that sentencing, they will know be very vigilant of what they are all about. I guess they are all ears on that one. - Mission Maids

,

Hi Patrick!!

Thanks for your show. I am an avid listener, still a computer security student. :)

So, thanks again.

Risky Business #281 -- Eyes on DPRK
0:00 / 59:02

Risky Business #280 -- South Africa edition

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's show was being produced on the road so it's a bit of a different format -- I did a longer than usual news panel session from the conference floor!

Our news discussion panel consists of:

The Grugq
Dominic White, SensePost
Charl van der Walt, SensePost
Andrew MacPherson, Paterva (Maltego)

After that we've got this week's sponsor interview with Peleus Uhley of Adobe.

Adobe is this week's sponsor, big thanks to them, and Peleus joins the show to talk about throwing a spanner in the works of mass malware customisation. We look at some of the approaches large vendors are using these days to disrupt the development lifecycle of the bad guys. It's interesting stuff and it's after the news.

Show notes

You can find episode 280 here.

LivingSocial Ups its Password Encryption After Breach | Threatpost
http://threatpost.com/livingsocial-ups-its-password-encryption-following...

Hacker Jailbreaks Google Glass for Root Access Unlock | Threatpost
http://threatpost.com/google-glass-cracked/

Dutchman Arrested in Spamhaus DDoS - Krebs on Security
http://krebsonsecurity.com/2013/04/dutchman-arrested-in-spamhaus-ddos/

Alleged SpyEye Seller 'Bx1\u2032 Extradited to U.S. - Krebs on Security
http://krebsonsecurity.com/2013/05/alleged-spyeye-seller-bx1-extradited-...

Two-Factor Authentication Won't Stop Twitter Compromises | Threatpost
http://threatpost.com/two-factor-authentication-no-cure-all-for-twitter-...

More Malware Showing Up as Fake SourceForge Web Sites | Threatpost
http://threatpost.com/more-malware-showing-up-on-fake-sourceforge-web-si...

Ramnit Man-in-the-Browser Attack Targets UK Banks | Threatpost
http://threatpost.com/ramnit-variant-targets-uk-banks-with-otp-attack/

Google Play Android Apps Must Update in Google Store | Threatpost
http://threatpost.com/google-mandates-app-updates-come-from-google-play/

Obama Expands Surveillance to Critical Infrastructure | Threatpost
http://threatpost.com/executive-order-expands-warrantless-network-monito...

CISPA Is Dead. Now Let's Do a Cybersecurity Bill Right | Wired Opinion | Wired.com
http://www.wired.com/opinion/2013/04/cispas-dead-now-lets-resurrect-it/

Law Requiring Warrants for E-Mail Wins Senate Committee Approval | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/04/email-warrants-bill/

Man Convicted of Hacking Despite Not Hacking | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/04/man-convicted-of-hacking-despit...

Oracle Delays Java 8 Features for Security Overhaul | Threatpost
http://threatpost.com/does-java-8-delay-mean-oracle-finally-serious-abou...

Security Explorations Finds Seven New Flaws in IBM SDK | Threatpost
http://threatpost.com/java-bugs-new-and-old-affecting-ibm-sdk/

IE 8 Zero Day Widens Scope of DoL Watering Hole Attack | Threatpost
http://threatpost.com/ie-8-zero-day-found-as-dol-watering-hole-attack-sp...

Pentagon Approves Samsung KNOX Android Platform for DoD | Threatpost
http://threatpost.com/samsungs-secure-version-of-android-gets-dod-blessing/

Australian police arrest alleged leader of LulzSec hacking group | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57581074-83/australian-police-arrest-al...

Researchers Hack Building Control System at Google Australia Office | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/googles-control-system-hacked/

Hacker Breached U.S. Army Database Containing Sensitive Information on Dams | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/05/hacker-breached-dam-database/

Bank Sues Cyberheist Victim to Recover Funds - Krebs on Security
http://krebsonsecurity.com/2013/04/bank-sues-cyberheist-victim-to-recove...

Senators propose law to go after foreign cybercriminals | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57583379-83/senators-propose-law-to-go-...

Brad Arkin Named Adobe CSO | Threatpost
http://threatpost.com/brad-arkin-named-adobe-seo/

Freddie Hubbard - Red Clay (Complete) - YouTube
http://www.youtube.com/watch?v=wA1ZelIbUfI

,

I can't figure out how cats and dogs live together. This is cool. - Kris Krohn Strongbrook

Risky Business #280 -- South Africa edition
0:00 / 62:45

Risky Business #279 -- Retarded Persistent Threat

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's edition of the show is pre-recorded because I'm off surfing in Jeffreys Bay, South Africa. There will be no show next week, but the week after that I'll be bringing you an episode from the ITWeb Security Summit in Johannesburg where I'm speaking.

In this week's show we've got a great interview with Wade Baker, the managing principal of Verizon's RISK team, and the topic, of course, is this year's Verizon Data Breach Investigations Report.

We've also got a sponsor interview with Marcus Ranum of Tenable Network Security. Tenable is this week's sponsor, so you can thank them for making this week's show possible. Do check out Tenable.com for all your vulnerability scanning and SIEM needs!

We chat with Marcus about what he calls economic spoiler attacks -- these are the disruptive, state-sponsored attacks we've seen against Saudi Aramco and South Korea.

If you'd like to download this week's track, you can grab it for free from the TripleJ Unearthed website here.

Risky Business #279 -- Retarded Persistent Threat
0:00 / 44:05

Risky Business #278 -- Pentest revenue figures puzzling

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's show is jam packed. We'll be hearing from our favourite firmware hacker, sneaky Snare, all about the leak of AMI's UEFI implementation source code and firmware signing key. What will it mean for firmware research?

We'll also be chatting with Nick Ellsmore. Nick founded a company here in Australia called SIFT, which eventually merged with Stratsec, which was then bought by BAE. These days, apart from being ridiculously wealthy, Nick has put together Delling Advisory, a consultancy focussing on mergers and acquisitions in information security.

And he's been writing some very interesting blog posts about the Australian information security market. He might be focussing on things downunder, but I'm pretty sure what we're talking about today applies everywhere -- penetration testing revenue estimates just don't add up. Nick believes a lot of mandated pentesting work in Australia is actually being done by IT systems integrators that don't actually have appropriate skills, or isn't being done at all.

This week's show is brought to you by Senetas, an absolutely awesome company that makes layer two crypto gear. You should go to Senetas.com and buy all their things. In this week's sponsor interview we're chatting with Senetas CTO Julian Fay about a proposed extension to BitCoin called Zerocoin. The extension is designed to make Bitcoin anonymous.

As always, Adam Boileau joins us for the week's news headlines. Show notes are here.

Risky Business #278 -- Pentest revenue figures puzzling
0:00 / 61:34

Risky Business #277 -- Vuln research trends with Mark Dowd

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's feature interview is with Mark Dowd of Azimuth Security. Mark joins the show to fill us in on the latest trends in vulnerability research and exploit development. We recap CanSecWest's Pwn2Own competition and look at what 2013 has in store research-wise.

Risky.Biz is pleased to welcome a new sponsor to the lineup -- Solera Networks, makers of fine, big data security software.

These guys make packet capture-based security kit that I'm told is pretty impressive. And we've got an interesting chat in this week's sponsor interview with Solera's chief technology officer Joe Levy. We chat to him about some of the basics of big data security, as well as looking at how point solution providers are increasingly integrating their kit with established SIEM gear and log management consoles.

Insomnia Security's Adam Boileau joins us for a discussion of the week's news.

Show notes here.

Risky Business #277 -- Vuln research trends with Mark Dowd
0:00 / 57:07