Podcasts

News, analysis and commentary

Big W infecting photo printing customers?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Photo kiosks in Big W stores are allegedly infecting customers with USB-borne viruses.

The Windows-based Fuji photo kiosks located in the company's stores apparently don't run antivirus software, so lovely little bits of malicious software like Trojan.Poison-36 are winding up on customers' USB keys, according to Risky Business listener and blogger Morgan Storey.

On its own, an isolated incident of a photo kiosk infecting a USB device might not be newsworthy. But what makes this item stick out is Big W's reply to Morgan after he notified the company of the issue:



That's right folks, Big W, a subsidiary of Woolworths, didn't think it necessary to install antivirus on its photo printing kiosks. Sure, they're evaluating AV now, but blind Freddy could have seen this problem coming last year when the kiosks were installed.

What the hell were they thinking?

It's not just the lack of AV that's the problem. As Morgan points out it appears there's been zero thought put into the problem of malware spreading via these kiosks. Why not just treat customers USB devices as read-only? Why allow the kiosks to write to them at all?

Risky.Biz has so far been unable to confirm Morgan's post with Big W. According to the company's HQ the PR guy doesn't like being phoned and only takes media requests via e-mail. Seems an odd way to conduct PR, but hey, each to their own.

Risky.Biz e-mailed a series of questions to Big W at lunchtime today but as yet they remain unanswered.

It would be interesting to find out which company -- Fuji, Big W or even some other third party -- is responsible for the maintenance of the machines. It would also be interesting to find out if there are any liability issues here for Big W in light of its boneheaded lack of security planning.

Risky Business #157 -- Voluntary codes versus regulation

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

WARNING: This week we missed some bad language during the edit... so hide this filthy podcast from your children's innocent ears.

On this week's show we're chatting with the head of Australia's Internet Industry Association (IIA), Peter Coroneos, about the government's plan to force internet users here to use antivirus software or be kicked off the tubes!

Peter was the architect of Australia's just released voluntary code for ISPs, but he'll be along soon to talk about why he thinks regulation here is actually a BAD idea. That's coming up soon.

In this week's sponsor interview we chat with Tenable Network Security CEO Ron Gula about APTs, or Advanced Persistent Threats. Are APTs a big deal? Are they real? Is this marketing hype? What's going on?

That's this week's sponsor interview, and it's coming up later.

Adam Boileau, as always, joins the show to discuss the week's news headlines.

Risky Business #157 -- Voluntary codes versus regulation
0:00 / 50:49

BLOG POST: Wired takes pot shot at Wikileaks

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

I've followed with great interest Wired.com's coverage of the arrest of Private Bradley Manning, the young American soldier who allegedly leaked reams of classified US military material to Wikileaks.

I've also watched in disbelief as Wikileaks has lashed out at Wired.com journalist Kevin Poulsen, suggesting he somehow acted unethically in his reporting of the arrest.

In my mind all he did was scoop other outlets with the news of Manning's troubles. That's not unethical, that's just good journalism.

The Wikileaks Twitter account disagreed, suggesting there's a "special place in hell" for journalists like Poulsen and Adrian Lamo, the one-time greyhat hacker who turned Manning in.

Wikileaks founder Julian Assange is most likely the author of those infantile tweets.

Poulsen's reporting was excellent. My guess is Assange just didn't like the story. But instead of turning the other cheek, Wired.com has apparently fired back.

This piece by the Website's journalist Ryan Singel -- it would look bad if penned by Poulsen, after all -- breaks the news of Wikileaks apparently broken submission process.

While unquestionably newsworthy, the article reads like a classic attack piece, dripping with sarcasm. It's mocking.

In my view it is intended, clearly, to go beyond describing the broken submission process and portray Wikileaks as an unprofessional organisation undeserving of the "mostly-laudatory media portraying Wikileaks as a fearless, unstoppable outlet for documents that embarrass corporations and overbearing governments".

My guess is if Wikileaks is indeed sitting on 260,000 leaked diplomatic cables that describe, in painstaking detail, every example of skulduggery the US government has inflicted upon the Middle East in the last decade, a broken SSL cert is probably the last thing on its mind.

They might be more worried about, you know, the CIA death squads on their ass.

If Wired wants to hold the high ground in this little pissing contest it needs to be much more careful. The article makes no mention of the spat between Wired.com and Wikileaks and that's a big pile-o-fail, right there. That sort of thing needs to be disclosed to readers.

While we might expect this sort of behaviour from a pseudo-activist organisation like Wikileaks, we deserve better from a professional media organisation.

As for Wikileaks, keep 'dem docs coming.

We'll ignore your ridiculously biased contextualising of leaks if you keep giving us unedited source material.

You're not a professional news organisation that needs to be held to the same standard as Wired. Be as infantile as you want on Twitter.

(Wikileaks has denied the Wired story, saying its submission process is being upgraded to "deal with growth".)

Click here to listen to Risky.Biz's interview with former grey-hat hacker Adrian Lamo about his decision to turn in Manning.

What do you think? Comment below.

Risky Business #156 -- ICQ heads to Russia, feds worry

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

In this week's show we have a chat with iDefense threat analyst Kimberly Zenz.

Apparently Russian cybercrooks love to use ICQ, so US-based investigators are worried about the planned sale of ICQ to a Russia-based company called Digital Sky.

Kimberly's specialty is the Russian cybercrime scene, and apparently this mooted sale is interesting for a number of reasons. She joins the show to explain!

Adam Boileau is this week's news guest, and Vitaly Kamlyuk of Kaspersky Labs is this week's sponsor guest. In it we discuss the number of malware samples with valid authenticode signatures that are popping up.

With a system this loose is there actually a point to signing code?

Risky Business #156 -- ICQ heads to Russia, feds worry
0:00 / 48:30

Risky Business #155 -- Can AusCERT survive?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we take a look at Australia's CERT wars. The Australian government has more or less declared AusCERT dead. It says its new group, CERT Australia, which is run out of the Attorney General's Department, will act as the sole point of contact for organisations in Australia when seeking CERT services or coordination.

AusCERT doesn't see it that way. Its general manager, Graham Ingram, fronts this week's program to claim it's business as usual for the member-funded NGO. We also have a chat with our secret squirrel, an anonymous source close to the war.

Mark Dowd is this week's news guest, filling in for Adam Boileau this week. Adam's off presenting at Syscan in Singapore, but he'll be back on deck next week.

In this week's sponsor interview we speak with Check Point's Engineering Services Manager Aviv Abramovich about using logging as a deterrent to data theft.

Risky Business #155 -- Can AusCERT survive?
0:00 / 52:17

Risky Business #154 -- Adrian Lamo: Why I turned informer

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this week's feature interview we chat with Adrian Lamo. Best known as the "homeless hacker," Lamo is in the news again over his decision to inform on US Army Specialist Bradley Manning, the alleged leaker of the so-called "Collateral Murder" video published by Wikileaks in April.

Manning is now in detention in Kuwait. We ask Lamo why he turned him in.

Also this week, Veracode co-founder and chief scientist Christien Rioux joins the show to talk about some fresh approaches to information security and cloud computing in our sponsor interview. Sounds boring. Isn't.

Adam Boileau, of course, joins us to discuss the week's news.

Risky Business #154 -- Adrian Lamo: Why I turned informer
0:00 / 50:51

Risky Business #153 -- Google ditching Windows for... Red Hat 6.2?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we take a look at reports that Google is set to banish Microsoft Windows from its operating system over security concerns.

The tech giant says running Windows is just too risky. Google was, after all, famously owned in the Aurora incident through holes in Internet Explorer 6.

But our guest this week, Neohapsis CTO Greg Shipley, says getting owned by a hole in a nine year old browser is probably a sign that your desktop management is the problem, not the platform you've chosen.

Also this week, Marcus Ranum joins us to talk about what he describes ad the non-existent meme that is "Cyberwar". That's this week's sponsor interview.

Adam Boileau, as always, checks in to discuss the week's news.

Risky Business #153 -- Google ditching Windows for... Red Hat 6.2?
0:00 / 47:18

RB2: Research in Motion VP of Security, Scott Totzke

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

RB2 is brought to you exclusively by Symantec.

Mobile security is all the rage these days, so when Research In Motion (RIM) VP of security Scott Totzke came to Australia a few weeks ago, we made sure we got an interview.

RIM is the company that makes the Blackberry. While it doesn't have as many cool points as the iPhone, the Blackberry has become the mobile workhorse of the modern enterprise. US President Barack Obama famously insisted on keeping his Blackberry when he came to office, so obviously anything Scott has to say about mobile security deserves to be heard.

I spoke to him by phone a couple of weeks ago.

RB2: Research in Motion VP of Security, Scott Totzke
0:00 / 13:59

Risky Business #152 -- Playing in the sandbox with Mark Dowd

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

Our feature guest this week Azimuth Security's Mark Dowd.

Mark is widely regarded as one of the best vulnerability researchers in the industry. He's published remote flaws in software like Sendmail and SSH, he's even created new classes of bugs. Remember that cross platform Flash bug a while ago? That was him, too.

So it's no surprise that when Google wanted someone to look over the security architecture of its Chrome browser, they turned to Mark. He went over Chrome with a fine tooth comb, uncovering some bugs as he went. But as you'll hear, Mark says the basic architecture of Chrome's sandbox is solid.

In this week's sponsor interview with speak with Eugene Kaspersky about the future of security on mobile devices. Kaspersky believes that mobile devices in the future will be much more complicated than they are now, and that will mean the current model of application verification won't last. People will always go to the more open platforms, he says.

Adam Boileau, as always, joins us for a discussion of the week's news headlines.

Risky Business #152 -- Playing in the sandbox with Mark Dowd
0:00 / 43:08

UNCUT: AFP says Facebook putting "lives at risk"

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is a longer, uncut version of a story that appeared on the front pages of The Age and Sydney Morning Herald yesterday.

Facebook's woeful relationship with law enforcement bodies is hampering police investigations and putting lives at risk, the Australian Federal Police says.

AFP assistant commissioner and head of high tech crime operations Neil Gaughan will fly to Washington DC today for a high level meeting convened by the US Department of Justice in which senior law enforcement officials from around the world will discuss their concerns with the social networking website.

Both state and federal police have told The Age the company has been unwilling to provide police with the intelligence they need for investigations. They want Facebook to appoint a dedicated law enforcement liaison in Australia who can match user accounts suspected of criminal activity to physical Internet addresses, for example.

''This [current] situation could lead to loss of life, there's no doubt about that at all,'' Mr. Gaughan told The Age. ''It's just a matter of time.''

However Facebook doused expectations of such a hire in a statement issued to The Age. ''Facebook does not put [law enforcement] people in every country where Facebook has users; it's just not the way companies scale,'' the statement said.

A senior investigator with a state police service said Facebook was prepared to assist officers when someone's life was in danger, but otherwise ''they give you the bird,'' he said.

''They only comply to subpoenas issued by a US court,'' said the investigator, who did not wish to be identified.

Police services have also demanded Facebook's law enforcement guidelines document be brought into line with Australian law and legal terminology. Mr Gaughan said that in one case Facebook had ignored an Australian warrant because it was issued by a judicial officer rather than a court as its current guidelines require.

''Information was not provided and it slowed down our ability to... obtain a search warrant for a premises,'' Mr. Gaughan said. ''In this instance we still got the result but much slower than should have been the case.''

Facebook has recently faced criticism over the vandalism of tribute pages set up to honour the victims of crime. Pages dedicated to slain teenagers Elliot Fletcher, Michele Morrissey and murdered child Trinity Bates among others were defaced.

On Monday night Senator Stephen Conroy lambasted the site over its ''complete disregard'' for its members privacy during a senate estimates hearing, and the company is facing intense media scrutiny following the death of Sydney teenager Nona Belomesoff two weeks ago, who met her alleged killer, a man posing as a wildlife carer, via Facebook.

The trial of Melbourne man Ron Felicite, who killed his wife over her involvement with a man she met via the social networking site, has also made headlines and the company is weathering a grassroots backlash over controversial changes to its privacy policy.

''It's not only Australia where we're having these issues with Facebook,'' Mr. Gaughan says. ''I know it's a significant problem in the UK... what I'm hearing from my US and Canadian counterparts is this is also issue for them.''

Senior law enforcement representatives from the UK, USA and Canada will also attend the meeting in Washington on Thursday, which will be chaired by the US Department of Justice National Coordinator for Child Protection and Interdiction Ms. Francey Hakes.

Facebook's rival social networking site MySpace did have a dedicated law enforcement liaison in Australia, Mr. David Batch. He was made redundant last year following the site's decline in market share.

Mr. Batch, a former AFP agent, said he had worked closely with police. ''The only service I could provide was an intelligence service... but that was enough to keep law enforcement on side and happy,'' he says.

''Nine times out of 10, intelligence would be enough to get [investigations] over the line.''

Police can use such intelligence to locate suspected offenders and then to apply for search warrants to gain access to the suspect's computer, for example. But such intelligence cannot be used as evidence in a trial -- only evidence collected via the Mutual Assistance in Criminal Matters Act of 1987 can be used in court.

Under the complicated mutual assistance regime police requests for correctly formatted, admissible evidence are funnelled between the Attorneys General in each country.

Mr. Batch says a typical request via the mutual assistance act typically takes 6-18 months to be returned.

In a written statement Facebook said it works closely with the Attorney General's Department and the AFP to make ''our law enforcement requests as efficient and helpful as possible''. The company said it dedicated ''significant resource to Australian law enforcement relationship building and information processing''.