Podcasts

News, analysis and commentary

Risky Business #159 -- Skimmers pay massive bribes downunder

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week's show we take a fresh look at the insider threat in light of the news, here in Australia, that criminal syndicates are paying up to $40,000 to bribe service station attendants into helping them skim cards.

If the bad guys are willing to pay $40k for someone that low on the food chain, what will they pay to get at someone in your organisation?

To find out we'll be joined by Gartner research director, AusCERT co-founder and former Commonwealth Bank security big-wig Rob McMillan.

Also this week we chat with Kaspersky's Vitaly Kamlyuk in the sponsor interview.

We'll be chatting about Mozilla's blocking of a malicious plugin that siphoned usernames and passwords off unsuspecting users. What should browser manufacturers be doing to stop this sort of thing from happening?

Adam Boileau, as always, stops in with the week's news.

Risky Business #159 -- Skimmers pay massive bribes downunder
0:00 / 43:17

GUEST POST: 'Robin Sage' fooled no one but the media

Presented by

I am talking about the coverage of that story, where the reporting has largely been horrible, gullible, naive crap.\xa0 Sorry folks, but yes, that includes coverage from people I like.\xa0 If you believe a lot of what you read, you would think that a lot of people were "duped" into following/friending/linking/whatevering Ms. Sage.\xa0 This shows a gross lack of understanding of both social networking and the security community- both on the part of the journalists, and to a lesser extent, the researcher.

The people who "over-shared" really are a problem, and it may be interesting to see what Thomas Ryan (the person behind Robin Sage) presents at DefCon.\xa0 It looks like s/he got a lot of sensitive information from people who should know better- three letter agencies, military, and more.\xa0 Interesting, but "people are stupid and gullible" is not really ground-breaking, nor is mining/abusing social networking to prove this point a new idea either.\xa0 It does sound like the scope and scale may be noteworthy.\xa0 But not new, and being a skeptic, I'm not sure it is newsworthy.

Where things fall apart is the nonsense over stories which pretty much proclaim that MILLIONS OF SECURITY PROS DUPED, and point to the number of friends/links/etc. the virtually perky Ms. Sage gathered.\xa0 I would like to point out four things:

  1. Different people use social networks in different ways.\xa0 Just because someone accepts your connection request does not mean they are fooled by you.\xa0 They may not even care if you are real or fake.
  • Maybe they (sadly common) think that more connections means they are more important.
  • Maybe they are public figures of some kind, and accept most requests as a matter of policy.\xa0 If people are careful with what information they share, there is nothing wrong with this. Nothing. It is voluntary, get over it.\xa0 It is how Social Media and Social Networking work for many people.\xa0 If you don't like this approach- don't use it.
  • The decision to accept may be based on connections offered (via friend-of-a-friend linking) instead of being based on the person making the request.\xa0 Again, if you are cautious about what you share, there isn't a risk here- even if it is a pretty shallow move.\xa0 Robin certainly had some interesting friends/links to entice people.\xa0 Put another way: Some days, the wingman scores.
  • Once Robin Sage became fairly visible, the drama got interesting and a lot of people began following/linking to the myriad of Robin Sages (yes, there were clones and evil twins, too) just to watch the train wreck.\xa0 I was one of these, and like many others I had my suspicions- but didn't care if she was real, fake, or just another troll, there was entertainment.\xa0 People were not duped, they grabbed a beer and some popcorn and watched the show.
  • Robin Sage was called out.\xa0 Spotted.\xa0 Thoroughly outed.\xa0 Many thought "something was fishy".\xa0 Some people did actual research and provided real details.\xa0 People had to connect/accept to do the research and confirm their suspicions.\xa0 The press almost completely missed this critical point.\xa0 They also missed the fact that once this was widely known, even more people connected to and followed Robin to watch the evolving train wreck mentioned in point 2.
  • Mr.. Ryan apparently convinced (socially engineered) much of the media into thinking this was something it wasn't, then and the result was not journalism, it was an embarrassment.
  • And this is just the worst of it this week.\xa0 Half baked ideas, giant (and flawed) leaps of logic, obvious vendor spin, and more were on parade this week.\xa0 Maybe it was the heat and no one could think clearly.\xa0 Maybe it was Vacation from Healthy Skepticism Week and no one told me.\xa0 I don't know, but I'm not happy about it.

    Jack

    [Note: since posting, the question of linking to specific examples has come up. I debated it while writing this post, but in the end I decided that the issue was so pervasive that calling out specific writers or articles would not have been productive.]

    This post originally ran on Jack Daniel's blog.

    Risky Business #158 -- Pwning up Apple's iTunes store

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    Adam Boileau
    Adam Boileau

    Technology Editor

    On this week's edition of the show we take a look at the security of Apple's iTunes store. If you haven't heard the news, it seems a rogue app developer was able to bill Apple customers for apps they never bought.

    We'll find out just how well the Apple app store was put together in the first place when we speak with Karl Chaffey. He works for a mobile development company and put together an interesting lightning talk for last year's Kiwicon conference which was all about the iTunes store.

    Also this week we'll be chatting with Veracode's director of product management Tim Jarrett in our sponsor interview. We'll be talking about how to keep things nice when you're maintaining live code... how much automated scanning should you do? How much manual testing?

    Adam Boileau is the week's news guest.

    Risky Business #158 -- Pwning up Apple's iTunes store
    0:00 / 43:35

    BLOG POST: Manning not charged with leaking 150k cables

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    US soldier Bradley Manning has been charged with disclosing classified material to whistleblower site Wikileaks.

    But it's what he hasn't been charged with that's interesting.

    Since the news of Manning's arrest broke there has been much speculation about the fate of 150,000 diplomatic cables the young soldier is alleged to have stolen.

    However, according to the charge sheet, only 50 diplomatic cables were disclosed to an unnamed third party.

    In the charge document the US government alleges Manning did "willfully communicate, deliver and transmit the cables, or cause the cables to be communicated, delivered, and transmitted, to a person not entitled to receive them".

    While the charges allege Manning also stole 150,000 diplomatic cables, there's no mention of him leaking them to a "person not entitled to receive them".

    This doesn't actually tell us whether or not Manning has leaked the 150,000 cables. What it does tell us is the US Military does not possess enough evidence to charge Manning with leaking that material.

    Could it be that Wikileaks is sitting on those cables, withholding their publication until Manning's legal problems are over with? Or could it be that Manning was arrested before he could leak the 150,000 cables he allegedly stole?

    It's impossible to say. But the omission of a charge involving the leaking of that information is certainly interesting.

    Big W infecting photo printing customers?

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    Photo kiosks in Big W stores are allegedly infecting customers with USB-borne viruses.

    The Windows-based Fuji photo kiosks located in the company's stores apparently don't run antivirus software, so lovely little bits of malicious software like Trojan.Poison-36 are winding up on customers' USB keys, according to Risky Business listener and blogger Morgan Storey.

    On its own, an isolated incident of a photo kiosk infecting a USB device might not be newsworthy. But what makes this item stick out is Big W's reply to Morgan after he notified the company of the issue:



    That's right folks, Big W, a subsidiary of Woolworths, didn't think it necessary to install antivirus on its photo printing kiosks. Sure, they're evaluating AV now, but blind Freddy could have seen this problem coming last year when the kiosks were installed.

    What the hell were they thinking?

    It's not just the lack of AV that's the problem. As Morgan points out it appears there's been zero thought put into the problem of malware spreading via these kiosks. Why not just treat customers USB devices as read-only? Why allow the kiosks to write to them at all?

    Risky.Biz has so far been unable to confirm Morgan's post with Big W. According to the company's HQ the PR guy doesn't like being phoned and only takes media requests via e-mail. Seems an odd way to conduct PR, but hey, each to their own.

    Risky.Biz e-mailed a series of questions to Big W at lunchtime today but as yet they remain unanswered.

    It would be interesting to find out which company -- Fuji, Big W or even some other third party -- is responsible for the maintenance of the machines. It would also be interesting to find out if there are any liability issues here for Big W in light of its boneheaded lack of security planning.

    Risky Business #157 -- Voluntary codes versus regulation

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    Adam Boileau
    Adam Boileau

    Technology Editor

    WARNING: This week we missed some bad language during the edit... so hide this filthy podcast from your children's innocent ears.

    On this week's show we're chatting with the head of Australia's Internet Industry Association (IIA), Peter Coroneos, about the government's plan to force internet users here to use antivirus software or be kicked off the tubes!

    Peter was the architect of Australia's just released voluntary code for ISPs, but he'll be along soon to talk about why he thinks regulation here is actually a BAD idea. That's coming up soon.

    In this week's sponsor interview we chat with Tenable Network Security CEO Ron Gula about APTs, or Advanced Persistent Threats. Are APTs a big deal? Are they real? Is this marketing hype? What's going on?

    That's this week's sponsor interview, and it's coming up later.

    Adam Boileau, as always, joins the show to discuss the week's news headlines.

    Risky Business #157 -- Voluntary codes versus regulation
    0:00 / 50:49

    BLOG POST: Wired takes pot shot at Wikileaks

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    I've followed with great interest Wired.com's coverage of the arrest of Private Bradley Manning, the young American soldier who allegedly leaked reams of classified US military material to Wikileaks.

    I've also watched in disbelief as Wikileaks has lashed out at Wired.com journalist Kevin Poulsen, suggesting he somehow acted unethically in his reporting of the arrest.

    In my mind all he did was scoop other outlets with the news of Manning's troubles. That's not unethical, that's just good journalism.

    The Wikileaks Twitter account disagreed, suggesting there's a "special place in hell" for journalists like Poulsen and Adrian Lamo, the one-time greyhat hacker who turned Manning in.

    Wikileaks founder Julian Assange is most likely the author of those infantile tweets.

    Poulsen's reporting was excellent. My guess is Assange just didn't like the story. But instead of turning the other cheek, Wired.com has apparently fired back.

    This piece by the Website's journalist Ryan Singel -- it would look bad if penned by Poulsen, after all -- breaks the news of Wikileaks apparently broken submission process.

    While unquestionably newsworthy, the article reads like a classic attack piece, dripping with sarcasm. It's mocking.

    In my view it is intended, clearly, to go beyond describing the broken submission process and portray Wikileaks as an unprofessional organisation undeserving of the "mostly-laudatory media portraying Wikileaks as a fearless, unstoppable outlet for documents that embarrass corporations and overbearing governments".

    My guess is if Wikileaks is indeed sitting on 260,000 leaked diplomatic cables that describe, in painstaking detail, every example of skulduggery the US government has inflicted upon the Middle East in the last decade, a broken SSL cert is probably the last thing on its mind.

    They might be more worried about, you know, the CIA death squads on their ass.

    If Wired wants to hold the high ground in this little pissing contest it needs to be much more careful. The article makes no mention of the spat between Wired.com and Wikileaks and that's a big pile-o-fail, right there. That sort of thing needs to be disclosed to readers.

    While we might expect this sort of behaviour from a pseudo-activist organisation like Wikileaks, we deserve better from a professional media organisation.

    As for Wikileaks, keep 'dem docs coming.

    We'll ignore your ridiculously biased contextualising of leaks if you keep giving us unedited source material.

    You're not a professional news organisation that needs to be held to the same standard as Wired. Be as infantile as you want on Twitter.

    (Wikileaks has denied the Wired story, saying its submission process is being upgraded to "deal with growth".)

    Click here to listen to Risky.Biz's interview with former grey-hat hacker Adrian Lamo about his decision to turn in Manning.

    What do you think? Comment below.

    Risky Business #156 -- ICQ heads to Russia, feds worry

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    Adam Boileau
    Adam Boileau

    Technology Editor

    In this week's show we have a chat with iDefense threat analyst Kimberly Zenz.

    Apparently Russian cybercrooks love to use ICQ, so US-based investigators are worried about the planned sale of ICQ to a Russia-based company called Digital Sky.

    Kimberly's specialty is the Russian cybercrime scene, and apparently this mooted sale is interesting for a number of reasons. She joins the show to explain!

    Adam Boileau is this week's news guest, and Vitaly Kamlyuk of Kaspersky Labs is this week's sponsor guest. In it we discuss the number of malware samples with valid authenticode signatures that are popping up.

    With a system this loose is there actually a point to signing code?

    Risky Business #156 -- ICQ heads to Russia, feds worry
    0:00 / 48:30

    Risky Business #155 -- Can AusCERT survive?

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    Adam Boileau
    Adam Boileau

    Technology Editor

    On this week's show we take a look at Australia's CERT wars. The Australian government has more or less declared AusCERT dead. It says its new group, CERT Australia, which is run out of the Attorney General's Department, will act as the sole point of contact for organisations in Australia when seeking CERT services or coordination.

    AusCERT doesn't see it that way. Its general manager, Graham Ingram, fronts this week's program to claim it's business as usual for the member-funded NGO. We also have a chat with our secret squirrel, an anonymous source close to the war.

    Mark Dowd is this week's news guest, filling in for Adam Boileau this week. Adam's off presenting at Syscan in Singapore, but he'll be back on deck next week.

    In this week's sponsor interview we speak with Check Point's Engineering Services Manager Aviv Abramovich about using logging as a deterrent to data theft.

    Risky Business #155 -- Can AusCERT survive?
    0:00 / 52:17

    Risky Business #154 -- Adrian Lamo: Why I turned informer

    Presented by

    Patrick Gray
    Patrick Gray

    CEO and Publisher

    In this week's feature interview we chat with Adrian Lamo. Best known as the "homeless hacker," Lamo is in the news again over his decision to inform on US Army Specialist Bradley Manning, the alleged leaker of the so-called "Collateral Murder" video published by Wikileaks in April.

    Manning is now in detention in Kuwait. We ask Lamo why he turned him in.

    Also this week, Veracode co-founder and chief scientist Christien Rioux joins the show to talk about some fresh approaches to information security and cloud computing in our sponsor interview. Sounds boring. Isn't.

    Adam Boileau, of course, joins us to discuss the week's news.

    Risky Business #154 -- Adrian Lamo: Why I turned informer
    0:00 / 50:51