Podcasts

News, analysis and commentary

INTERVIEW: David Litchfield, NGS Software

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview database security legend David Litchfield from NGS Software talks about his latest research and development efforts. We caught up with Litchfield at the last AusCERT conference as well. When we interviewed him back in 2007, he told us about his plans to launch FEDS -- the forensic examiner's database scalpel. Well, Litchfield says it should be released in the next few months.

We talk about FEDS in this interview and also talk about lateral SQL injection, a vulnerability class he recently unveiled. We also talked to David about the recent spate of SQL injection attacks that have compromised half a million hosts... enjoy!

INTERVIEW: David Litchfield, NGS Software
0:00 / 0:00

Risky Business AusCERT Special -- Day one coverage is live!

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

Day one of ITRadio's AusCERT conference coverage is up and ready! You can go to our special AusCERT sub-site to download interviews and presentations. We've already got heaps on the site (www.itradio.com.au/AusCERT08/) for you to go and grab, including an interview with the former technical director of the NSA, Brian Snow.

Click here to visit ITRadio's special AusCERT site...

Risky Business AusCERT Special -- Day one coverage is live!
0:00 / 0:00

PRESENTATION: William Cheswick, AT&T, on passwords

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this AusCERT presentation by AT&T staffer and security legend Bill Cheswick says passwords, as they exist today, are dead. While it might not be the most original topic, Cheswick's presentation is a lot of fun.

He worked on early firewalls and honeypots at Bell labs in the 80s, and has since done a bunch of interesting stuff including thew internet mapping project. Have you ever heard of a network being described as crunchy on the outside and gooey on the inside? Well, that came from a USENIX paper Cheswick wrote in the early 90s. He's also an excellent speaker.

So here's his AusCERT talk, where he spends the first minute and a half reading from various password policies... bear with him though, it's a great presentation.

PRESENTATION: William Cheswick, AT&T, on passwords
0:00 / 0:00

PRESENTATION: Shadowserver Foundation

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

You may or may not have heard of the Shadowserver foundation. It's a volunteer run organisation designed to track malware, botnet activity and electronic fraud. Richard Perlotto runs the technology and operational side of the organisation, but his day job is as a security advisor to Cisco Systems.

Before that, he ran Security Operations for Cisco worldwide for almost four years. In this AusCERT presentation, Perlotto talks about what the Shadowserver foundation actually does -- how it collects its data and what it actually does with that information once it has it.

PRESENTATION: Shadowserver Foundation
0:00 / 0:00

PRESENTATION: Former NSA technical director Brian Snow...

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This presentation is by the former Director of Information Assurance for America's National Security Agency, Brian Snow. He joined the NSA in 1971 after founding the computer science department at Ohio University in the 60s. He spent his first 20 years at the NSA directing research and development into cryptographic and secure systems. He also created and managed NSA's secure systems design division in the 80s.

In this presentation, Snow argues commercial software lacks quality, reliability and safety -- in other words, we can do better. So here it is, former NSA technical director Brian Snow's presentation to AusCERT's 2008 conference on the Gold Coast.

UPDATE: Brian Snow was the Technical Director of IAD, not the Director...

PRESENTATION: Former NSA technical director Brian Snow...
0:00 / 0:00

INTERVIEW: William Cheswick, AT&T

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview, Risky Business host Patrick Gray talks to Bill Cheswick, who's been doing security research since the 1980s. He was a speaker at AusCERT this year, and you can find his talk here.

The interview is pretty wide ranging, touching on new approaches to security in desktop virtualisation, the quality of Brian Snow's AusCERT address and much more. Cheswick is a lot of fun, so check it out!

INTERVIEW: William Cheswick, AT&T
0:00 / 0:00

INTERVIEW: Microsoft's Security Intelligence Report...

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview, Risky Business host Patrick Gray discusses Microsoft's Security Intelligence Report with the company's general manager of product security, George Stathakopoulos, and Ziv Mador -- a response coordinator for Microsoft's Malware Protection Centre.

These guys have access to intel from 450 million machines. You can read the report here.

INTERVIEW: Microsoft's Security Intelligence Report...
0:00 / 0:00

INTERVIEW: Former NSA technical director Brian Snow...

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

The following is an interview with the former director of Information Assurance for America's National Security Agency, Brian Snow. He joined the NSA in 1971 after founding the computer science department at Ohio University in the 60s. He spent his first 20 years at the NSA directing research and development into cryptographic and secure systems. He also created and managed NSA's secure systems design division in the 80s.

In this interview Snow argues software companies need to back off their time-to-market driven policies and focus more on quality. You can listen to his AusCERT talk by clicking here.

UPDATE: Brian Snow was the Technical Director of IAD, not the Director...

INTERVIEW: Former NSA technical director Brian Snow...
0:00 / 0:00

INTERVIEW: AusCERT's home user security survey...

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Traditionally, AusCERT has conducted an annual corporate and government computer crime survey. But last year the Australian Institute of Criminology decided it was going to do a bigger, better funded survey... so AusCERT has mixed things up and this year released a report on home user security.

I spoke to AusCERT's threats and assessments manager Kathryn Kerr about the home user survey, which can be downloaded here.

As you'll hear, AusCERT was surprised by some of the findings -- for example, 62% of respondents would like their ISPs to disconnect from the Internet if malware is detected on their systems... So here it is now, a chat with Kathryn Kerr about home user security and AusCERT's home user security survey...

INTERVIEW: AusCERT's home user security survey...
0:00 / 0:00

Risky Business NEWSFLASH -- Debian disaster more serious than first thought... interview with H D Moore

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

(UPDATE: H D Moore's PRNG Debian toys can be found here.)

This is a special newsflash edition of Risky Business, posting at 4pm on Wednesday May 14. Most listeners would be aware that a serious bug in Debian's random number generator has been patched overnight. Unfortunately, all keys generated by Debian systems (and by the looks of things Ubuntu systems as well) are completely useless and need to be regenerated.

That means you SSH and SSL content encryption AND authentication has been rendered ineffective. Not only are your server generated keypairs ineffective, any user-generated keypair made with a Debian or Ubuntu box and accepted by an SSH server is vulnerable.

H D Moore is currently working on what sounds like a rainbow table-style attack which will allow him to brute force authentication over SSH in 2.5 to 6 hours. Because of the rainbow table nature of the attack, it also means he can decode intercepted packets in a matter of seconds.

Risky Business spoke to H D Moore via a VoIP line to his mobile phone in Texas, where he's pulling a late night working on this...

UPDATE: Here's a quick script to re-generate your ssh keys, and display the fingerprint (dont forget to update your openssl first!!)

Risky Business NEWSFLASH -- Debian disaster more serious than first thought... interview with H D Moore
0:00 / 0:00