Podcasts

News, analysis and commentary

INTERVIEW: Did Google dodge the Android pwnbullet?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This podcast is an interview I did with Accuvant's Joshua Drake, aka jduck. His Breakpoint presentation was on the topic of Android security.

As regular listeners of the Risky Business podcast would know, we're pretty much convinced Android was rushed to market -- it was insecure, immature, way too open and a big, glaring risk to its users. Combine that with the inherent problems with the Android ecosystem and you had a recipe for disaster.

For those unfamiliar with those ecosystem problems, Android is very difficult to patch. Android users must wait for Google to update the OS, then ship the updates to the manufacturers who customise them for their hardware, then in turn they have to pass them on to the carriers, who may or may not customise those OS builds for compatibility with their apps and then pass the updates out over the air. Long story short, most Android devices wind up remaining unpatched.

Well, things have changed. As Joshua outlined in his presentation, Google has built a lot of exploit mitigations into the mobile OS and they're starting to look pretty effective. Is it possible that Google has dodged what many saw as an inevitable bullet?

INTERVIEW: Did Google dodge the Android pwnbullet?
0:00 / 9:38

INTERVIEW: Barnaby Jack on hacking implantable medical devices

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This podcast is an interview I did with Barnaby Jack, a security researcher with IOActive. Barnes is probably best known for his work on ATM security. He famously "jackpotted" an ATM live on stage at BlackHat in 2010, but if he were to do a live demo of his latest research he'd probably wind up in prison.

That's because he's been looking at implantable defibrillators and pacemakers. As it turns out they have wireless interfaces that allow you to connect to them. You can bypass their rudimentary authentication and start sending 830 volt zaps into your victim's heart which, obviously, isn't ideal.

Jack says these techniques could be used for targeted assassinations, or perhaps even more worryingly, a maliciously motivated person could actually create an auto-propagating worm designed to kill people!

INTERVIEW: Barnaby Jack on hacking implantable medical devices
0:00 / 11:47

SPONSOR INTERVIEW: Pcap analysis in the cloud

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

All our coverage of the Breakpoint security conference was made possible by our sponsor PacketLoop.

PacketLoop is a new Australian business that applies big data analysis techniques to your packet captures... you can visualise your captures, drill down into them, and even spot successful 0day attacks against your organisation after the event -- that's a simple trick, that one, they just loop your packet captures through IPSs after the fact... when they get signature updates, they loop them through again. Hence the name, PacketLoop.

You can sign up to a Beta at PacketLoop.com, and I suggest you do. Think of this stuff as like NetWitness in the cloud.

I caught up with PacketLoop co-founder Michael Baker to discuss his presentation at the Ruxcon conference, which was all about Big Data security analytics. I started off by asking him roughly what he planned to talk about.

SPONSOR INTERVIEW: Pcap analysis in the cloud
0:00 / 13:05

Risky Business #259 -- MSDfail, Brett Moore and moooore!

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's show is being produced entirely on the ground at the Ruxcon Breakpoint security conference in my old home town of Melbourne Australia! And it's a shorter show than usual because I'm pretty busy down here producing a bunch of podcasts as a part of some joint coverage I'm doing for both Risky.Biz and The Register. If you want to check out some audio and blog posts from Breakpoint, head to http://risky.biz/breakpoint. They're not up yet, but you'll soon find some interviews with people like Barnaby Jack and Joshua Drake (jduck) there\u2026 or you can subscribe to the RB2 podcast feed at http://risky.biz/feeds if you want that content automagically.

In this week's sponsor interview we're chatting with Insomnia Security founder Brett Moore. Thanks to Insomnia security for all its support of this podcast. If you're a CSO in New Zealand and you've never had a pen test from these guys you're doing it wrong.

It's a company founded by Brett Moore and staffed by the likes of our regular news co-host Adam Boileau and his sometime fill in Mark Piper, as well as a few other guys. Brett joins us to recap Breakpoint and tell us what he thinks of the epic MSDfail in NZ. Why do organisations commission expert advice if they're just going to ignore it?

Show notes

MSD admits not acting on early system breach alerts... | Stuff.co.nz
http://www.stuff.co.nz/technology/digital-living/7826984/MSD-admits-not-...

Russian Anti-Virus Firm Plans Secure Operating System to Combat Stuxnet | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/kaspersky-operating-system/

Second LulzSec member pleads out in Sony Pictures attack - SC Magazine
http://www.scmagazine.com/second-lulzsec-member-pleads-out-in-sony-pictu...

Pentagon Hacker McKinnon Wins 10-Year Extradition Battle | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/mckinnon-extradition-win/

State-Sponsored Malware 'Flame' Has Smaller, More Devious Cousin | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/miniflame-espionage-tool/

WikiLeaks Goes Behind Paywall, Anonymous Cries Foul | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/wikileaks-paywall-anonymous/

Cyberthieves steal $400,000 from Bank of America | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57533007-83/cyberthieves-steal-$400000-from-bank-of-america/

Hackers target Fairfax holiday site Stayz, altering bank details on listings | News.com.au
http://www.news.com.au/travel/australia/hackers-target-fairfax-holiday-s...

Roxon issues discussion paper on mandatory data breach laws - Risk - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/319578,roxon-issues-discussion-paper-o...

Zero-day attacks last much longer than most would believe - SC Magazine
http://www.scmagazine.com/zero-day-attacks-last-much-longer-than-most-wo...

Pacemakers, defibrillators open to attack \u2022 The Register
http://www.theregister.co.uk/2012/10/17/pacemakers_open_to_wireless_attack/

Information Disclosure Zero-Day Discovered in Novell ZENworks | threatpost
http://threatpost.com/en_us/blogs/information-disclosure-zero-day-discov...

Oracle Patch Update to Include 109 Patches | threatpost
http://threatpost.com/en_us/blogs/oracle-patch-update-include-109-patche...

Oracle Leaves Fix for Java SE Zero Day Until February Patch Update | threatpost
http://threatpost.com/en_us/blogs/oracle-leaves-fix-java-se-zero-day-unt...

Adobe Extends Security of Reader and Acrobat With Better Sandbox, Force ASLR | threatpost
http://threatpost.com/en_us/blogs/adobe-extends-security-reader-and-acro...

Exploit Code Released Targeting Firefox 16 Vulnerability | threatpost
http://threatpost.com/en_us/blogs/exploit-code-released-targeting-firefo...

The Cactus Channel - Official Site
http://www.thecactuschannel.com/

,

The breach in the system is always there. We need to get used to it sometimes. - Mission Maids

Risky Business #259 -- MSDfail, Brett Moore and moooore!
0:00 / 38:46

Ruxcon Breakpoint kicks off with a bang

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This morning's first presentation was a talk by Roelof Temmingh, the creator of Maltego. The Maltego software, for those who don't know it, is essentially a data analysis and reconnaissance tool with some pretty powerful features.

It was a fascinating presentation that gave conference delegates some real out-of-the-box ideas on target acquisition. Using Maltego it's possible to geographically target random people, for example. If you're interested in targeting agents at a spy agency, you might look for geotagged tweets that originated from the agency's vicinity.

Once you have a list of users who are sloppy with their geodata you can start narrowing down your selection, seeing where else they go, what other social media accounts they have and so on. Temmingh played a video demonstration of this type of target acquisition, honing in on one poor sap who likes to send geo-tagged tweets from the car park of a well known intelligence agency.

From there he established the target's full name, email address, date of birth, education history, employment history, family member identities, travel history, phone make and model, plus camera make, model and serial number.

Temmingh also demonstrated some of the automated network reconnaissance features in the newest release of Maltego, Radium. He's one of the only people on the planet who can turn up to a conference like this and do a one hour product demonstration and still impress people.

Roelof discussed Radium on episode 253 of Risky Business. Check it out here.

The next talk was by famed ATM hacker and all-round nice guy Barnaby Jack. Barnes turned his attention to medical device security some time ago, with his initial research focussing on insulin pumps. Today, however, he went a step further, unveiling research that would enable him to quite literally kill hundreds of thousands of people by creating a peer-to-peer spreading pacemaker and defibrillator device worm.

It would be hilarious if it wasn't so serious. I filed a piece on this for The Register, so go check it out if you're interested.

Following that was a talk by Azimuth Security's Mark Dowd and Tarjei Mandt on the security of Apple's iOS 6 operating system security. It's a topic that Mark has discussed on the Risky Business podcast before, so if you're interested in a broad-brush description of his talk, check out episode 246 here. His interview runs after the news segment.

Matt Miller, who develops exploit mitigation technology at Microsoft, gave a fascinating talk about his challenge in disrupting the workflow of exploit writers. It's more of a niche topic primarily of interest to people working at the cutting edge of exploit creation and mitigation.

That's right, we're only half way through the fourth talk and this is what we've already seen.

Risky.Biz will be bringing you blog posts and audio from the event over the next few days. It might take us a few days to edit and process the audio, so be patient. In the mean time, big thanks to our Breakpoint coverage sponsor PacketLoop. Without those guys none of this coverage would be possible, so go check out their website and sign up for their pre-launch Beta.

,

The kicks are really good. We all have been pretty cool about that one. - Lindsay Rosenwald

Pacemakers, defibrillators open to attack (The Register)

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The researcher in question, Barnaby Jack, today told the Ruxcon Breakpoint security conference in Melbourne, Australia that "the most obvious scenario would be a targeted attack against a high profile individual."

Jack also warned of a worst-case scenario "worm with the ability to commit mass murder".

Such devices are accessible through a wireless interface designed to deliver telemetry and allow maintenance. But Jack, who works for US-based security company IOActive, has subverted security in that interface and showed delegates a video demonstration of a wireless attack against an Implantable Cardioverter-Defibrillator (ICD). "There's 830 volts going into the heart there, which is a bummer," he said as an audible zap played over the conference audio system.

The attacks work at a range of up to 50 feet.

Read the rest of this piece at The Register.

,

The pacemakers are something they have been making sure of. I guess they are up to the task. - Flemings Ultimate Garage

,

Hello,

Scary stuff. For me, this type of article is where disclosure of security research crosses the line as people could actually get hurt. I think in this case, a code of ethics in disclosure would be useful - i.e "You found the bug, you fix the bug" before disclosure? If the company doesn't want to fix it after taking account of the research, they should be held liable.

Interesting to note that before drugs come to the market they have to undergo strict testing. What happened to the code audit before the device was deemed fit to be implanted? Perhaps a new area of IT compliance to be introduced?

Risky Business #258 -- Kevin Mitnick on identity verification

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're chatting with Kevin Mitnick! Arguably the world's best known hacker, Kevin used to be a very naughty boy, and that saw him sent to prison a few times... but since his most recent release over 12 years ago he's established himself as a security consultant, author and globetrotting public speaker.

We're chatting to him about the fundamentals of identity verification. How can you be sure that person on the phone requesting a password reset really is your customer? Can you rely solely on static identity information in this day and age?

This week's show is brought to you by PacketLoop, an Australian start-up doing really interesting packet capture analysis. It's big data security analytics! It's really interesting stuff and we're thrilled to have the support of a local company doing new things.

We'll be chatting to PacketLoop co-founder and CTO Michael Baker in this week's sponsor interview about roughly what they're doing.

PacketLoop is also sponsoring our coverage of Ruxcon Breakpoint next week. Just head to http://risky.biz/breakpoint for all our breakpoint coverage, with thanks to PacketLoop. I'll be down there dual filing stories and audio for Risky.Biz and The Register.

Show notes

Report: Chinese Tech Firms Should Be Viewed With Suspicion, Barred From U.S. Networks | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/chinese-telecoms-suspicious/

Hackable Huawei - F-Secure Weblog : News from the Lab
http://www.f-secure.com/weblog/archives/00002442.html

Philippines court halts a contentious cybercrime law | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57529298-83/philippines-court-halts-a-c...

Worm spreading on Skype IM installs ransomware | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57528353-83/worm-spreading-on-skype-im-...

Symantec: Russian criminals sell Web 'proxy' with backdoors | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57528254-83/symantec-russian-criminals-...

Middle East cyberattacks on Google users increasing | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57525334-83/middle-east-cyberattacks-on...

Microsoft Patches Critical Word Flaw; Certificate Key Length Changes are Official | threatpost
http://threatpost.com/en_us/blogs/microsoft-patches-critical-word-flaw-c...

Adobe, Microsoft Issue Updates for Critical Flaws in Flash Player | threatpost
http://threatpost.com/en_us/blogs/adobe-microsoft-issue-updates-critical...

New Tactics Helping Toll Fraud Malware on Android Avoid Detection | threatpost
http://threatpost.com/en_us/blogs/new-tactics-helping-toll-fraud-malware...

Zitmo Growing More Sophisticated, Prevalent in Android | threatpost
http://threatpost.com/en_us/blogs/zitmo-growing-more-sophisticated-preva...

Malware Signed by Adobe Certificate Only Used in Limited Targeted Attacks | threatpost
http://threatpost.com/en_us/blogs/malware-signed-adobe-certificate-only-...

Hack In The Box: Pirate Bay MIA, Chrome vulnerability found | ZDNet
http://www.zdnet.com/hack-in-the-box-pirate-bay-mia-chrome-vulnerability...

Proof-of-Concept Exploits HTML5 Fullscreen API for Social Engineering | threatpost
http://threatpost.com/en_us/blogs/proof-concept-exploits-html5-fullscree...

\ufeffGoogle App Engine open to session jacking - Web/client - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/318610,65279google-app-engine-open-to-...

Flaws allow 3G devices to be tracked - Networks - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/317819,flaws-allow-3g-devices-to-be-tr...

3000 EU infosec pros engage in mock attacks - Networks - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/318261,3000-eu-infosec-pros-engage-in-...

Twitter outage caused by human error, domain briefly yanked | Internet & Media - CNET News
http://news.cnet.com/8301-1023_3-57528165-93/twitter-outage-caused-by-hu...

Hacker Goes on Massive WoW Killing Spree; World Survives | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/hacker-kills-thousands-in-wow/

Packetloop
http://www.packetloop.com/

The Izzys: Change Your Mind
http://www.shazam.com/music/web/track?id=57992307

,

The US are really careful of China. They have these kind of measures to ensure they don't get so far. - James D. Sterling

Risky Business #258 -- Kevin Mitnick on identity verification
0:00 / 62:13

Kernel crimps make Windows 8 a hacker hassle (The Register)

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Now chief architect at CrowdStrke, a security company focused on nation-state adversaries, Ionescu says Windows 8 builds on the usermode exploit mitigations introduced into Windows Vista and 7 with new approaches to security that attempt to mitigate kernel mode attacks.

Ionescu will outline those new defences at the Ruxcon Breakpoint security conference in Melbourne, Australia, next week.

He'll tell the audience that many pathways to exploitation will be sealed off in the latest Windows release. "As usermode's been getting tighter and tighter to attack and as in the Windows case more and more services have been moved to the kernel, it's become quite a target \u2026 and the rewards are quite great," Ionescu says. "It'll be interesting to see how attackers deal with the new landscape [after the release of Windows 8]."

That Windows will be targeted is hard to doubt, given that in the past hackers have treated security in Microsoft's flagship as an unmitigated joke. Writing exploits for Windows XP was extremely easy and the resulting boom in malware affecting Windows users was unprecedented. But companies like Microsoft and Adobe have made significant headway in recent years by introducing exploit mitigations to their products.

That's not to say the vulnerabilities have all gone away, but features like application sandboxing, Data Execution Prevention (DEP) and Address Space Layout Randomisation (ASLR) make them difficult to exploit.

Microsoft's efforts started taking shape around 2004, when Service Pack 2 for Windows XP was released. It introduced a basic firewall to the operating system and pestered users into installing anti-virus software and opting for automatic OS updates.

Next came Vista with its much-loathed UAC feature and some basic memory mitigations like DEP and ASLR, with those features tweaked and carried over into Windows 7. All of a sudden, exploiting bugs on current-generation Windows became suddenly significantly harder and the number of usable exploits dropped off. The deluge, today, looks more like a trickle.

READ THE REST OF THIS PIECE AT THE REGISTER.

,

The hacker has been a good one. He really made sure that he leaves an imprint of what he has done. - James D. Sterling

,

Peck of pickled peppers? We felt all over her and it turned out that she had sore
peck!Click www.n8fan.net for more information.

MARIZ
www.n8fan.net

,

Still we find application are vulnerable enough to be exploited and which could not be prevented by so called OS security feature.

Risky Business #257 -- Exploits for Win8 no mean feat

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

On this week's show we're taking a look at Windows 8 with Alex Ionescu. Alex works for Crowdstrike, he's a genuine expert in Windows internals and he says exploit writing and persistence when it comes to owning windows boxes is about to get a whole lot harder. That's after the news.

This week's show is brought to you by Insomnia Security. Insomnia is a New Zealand-based consultancy founded by Brett Moore. But these days Insomnia is much bigger than Brett. It has six full timers and they're all very clever chaps. Adam Boileau works there, as does this week's sponsor guest Mark Piper! We're chatting to Mark about what "typical" APT attackers get up to. What does the run of the mill APT MO actually look like?

Show notes

Hackers Breached Adobe Server in Order to Sign Their Malware | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/09/adobe-digital-cert-hacked/

Adobe to revoke code signing certificate | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57521794-83/adobe-to-revoke-code-signin...

White House confirms 'spearphishing' intrusion | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57523621-83/white-house-confirms-spearp...

Chinese Hackers Blamed for Intrusion at Energy Industry Giant Telvent - Krebs on Security
https://krebsonsecurity.com/2012/09/chinese-hackers-blamed-for-intrusion...

Regulators shut down global PC 'tech support' scam | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57525250-83/regulators-shut-down-global...

Australia Post customers exposed in direct object reference flaw - Web/client - SC Magazine Australia
http://www.scmagazine.com.au/News/317651,australia-post-customers-expose...

FTC Takes On Scareware Marketers, Court Imposes $163M Judgment | threatpost
http://threatpost.com/en_us/blogs/ftc-takes-scareware-marketers-court-im...

Web security protocol HSTS wins proposed standard status | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57524915-83/web-security-protocol-hsts-...

SHA-3 Winner Chosen, But It May Be Years Before Keccak Has an Effect | threatpost
http://threatpost.com/en_us/blogs/sha-3-winner-chosen-it-may-be-years-ke...

Authentication Implications in Uniquely Identifiable Graphics Cards | threatpost
http://threatpost.com/en_us/blogs/authentication-implications-uniquely-i...

Microsoft Reaches Settlement with Site Linked to Nitol Botnet | threatpost
http://threatpost.com/en_us/blogs/microsoft-reaches-settlement-site-link...

Mozilla's Persona Web Authentication System Moves into Beta | threatpost
http://threatpost.com/en_us/blogs/mozillas-persona-web-authentication-sy...

DHS Issued False 'Water Pump Hack' Report; Called It a 'Success' | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/10/dhs-false-water-pump-hack/

Cisco Patches Numerous Bugs in IOS, UCM | threatpost
http://threatpost.com/en_us/blogs/cisco-patches-numerous-bugs-ios-ucm-09...

City of Tulsa website not hacked after all | Tulsa World
http://www.tulsaworld.com/news/article.aspx?subjectid=334&articleid=2012...

IBM - My notifications
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&...

Nmap Development: Re: Hakin9's new Nmap Guide
http://seclists.org/nmap-dev/2012/q4/18

Breakpoint 2012 Speakers List
http://www.ruxconbreakpoint.com/speakers/#Alex Ionescu

Insomnia Security, New Zealand
http://www.insomniasec.com/

Breakpoint 2012 Training List
http://www.ruxconbreakpoint.com/training/

Bag Raiders - So Demanding - YouTube
http://www.youtube.com/watch?v=_Q0VERQxy_w

,

The signing certificate has been pretty good so far. That is really good if we need to do that. - Flemings Ultimate Garage

Risky Business #257 -- Exploits for Win8 no mean feat
0:00 / 61:44

Risky Business #256 -- NFC and public transport ticketing

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we're taking a look at public transport ticketing security. Some clever fellows from the US of A have figured out how to reset their RFID tickets with a nifty little app for NFC-enabled smartphones. All this due to some positively boneheaded mistakes made during the initial rollout of some ticketing systems. That interview is with Corey Benninger of Intrepidus Group.

This week's show is brought to you by Tenable Network Security. Tenable's co-founder and CEO Ron Gula will be joining the program to talk about the possibility of US president Obama issuing an executive order designed to replace the doomed Cybersecurity Act of 2012, which was shot down by the US congress.

Insomnia Security's Mark Piper fills in for Adam Boileau in this week's news segment.

Show notes

New Java flaw could hit 1 billion users | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57520532-83/new-java-flaw-could-hit-1-b...

Microsoft Releases Out-Of-Band IE Zero-Day Patch | threatpost
http://threatpost.com/en_us/blogs/microsoft-releases-out-band-ie-zero-da...

SourceForge Investigates Backdoor Code Found in Copy of phpMyAdmin | threatpost
http://threatpost.com/en_us/blogs/sourceforge-investigates-backdoor-code...

Researcher Finds 100k IEEE.org Passwords Stored in Plain-Text on Public FTP Server | threatpost
http://threatpost.com/en_us/blogs/researcher-finds-100k-ieeeorg-password...

Samsung offers up patch for Galaxy S3 remote wipe vulnerability | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57520467-83/samsung-offers-up-patch-for...

Apple TV vulnerabilities closed after being watched for months | ZDNet
http://www.zdnet.com/apple-tv-vulnerabilities-closed-after-being-watched...

Large-Scale Water Holing Attack Campaigns Hitting Key Targets | threatpost
http://threatpost.com/en_us/blogs/large-scale-water-holing-attack-campai...

Forthcoming SHA-3 Hash Function May Be Unnecessary | threatpost
http://threatpost.com/en_us/blogs/forthcoming-sha-3-hash-function-may-be...

New Zealand Intel Agency Investigated for Unlawful Spying on Kim Dotcom | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/09/illegal-spying-on-kim-dotcom/

Google pays bug hunters for finding Windows flaw | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57520440-83/google-pays-bug-hunters-for...

ACLU sues to get U.S. agencies' license plate tracking records | Security & Privacy - CNET News
http://news.cnet.com/8301-1009_3-57520336-83/aclu-sues-to-get-u.s-agenci...

How long will it be before iOS 6 Maps kills someone? | ZDNet
http://www.zdnet.com/how-long-will-it-be-before-ios-6-maps-kills-someone...

Australian police want telco customer data retained forever | ZDNet
http://www.zdnet.com/australian-police-want-telco-customer-data-retained...

Special Report: iOS app piracy soars - Applications - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/316996,special-report-ios-app-piracy-s...

Hackers ransom $3000 from NT business - Applications - SC Magazine Australia - Secure Business Intelligence
http://www.scmagazine.com.au/News/316663,hackers-ransom-3000-from-nt-bus...

Adobe releases open-source coding typeface - Boing Boing
http://boingboing.net/2012/09/24/adobe-releases-open-source-cod.html

UltraReset - Bypassing NFC access control with your smartphone - Intrepidus Group - Insight
http://intrepidusgroup.com/insight/2012/09/ultrareset-bypassing-nfc-acce...

Video of Intrepidus demonstrating NFC ticketing resets:
http://vimeo.com/49664045

Slide deck:
https://media3.risky.biz/EUSecWest-SoBenn-Transit2012-Preview.pdf

The Public Opinion Afro Orchestra - Shake on Official.fm
http://official.fm/tracks/daLt/file

,

That out of brand IE is really getting my attention. What would that be if I may ask? - Steven Wyer

Risky Business #256 -- NFC and public transport ticketing
0:00 / 58:27