Accounts – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 03 Jul 2019 04:28:17 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Accounts – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Partner Password Policy | User Error 69 https://original.jupiterbroadcasting.net/132516/partner-password-policy-user-error-69/ Fri, 05 Jul 2019 00:15:34 +0000 https://original.jupiterbroadcasting.net/?p=132516 Show Notes: error.show/69

The post Partner Password Policy | User Error 69 first appeared on Jupiter Broadcasting.

]]>

Show Notes: error.show/69

The post Partner Password Policy | User Error 69 first appeared on Jupiter Broadcasting.

]]>
Persona Non Grata | CR 92 https://original.jupiterbroadcasting.net/53142/persona-non-grata-cr-92/ Mon, 10 Mar 2014 10:33:44 +0000 https://original.jupiterbroadcasting.net/?p=53142 We discuss Mozilla’s Persona being put out to pasture and the difficult problem that creates for developers.

The post Persona Non Grata | CR 92 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We embrace Daylight saving time with a special call-in edition of Coder Radio. Topics include a chat with one of the developers behind the online JavaScript assembly emulator, the encroachment of DRM in everyday life, and why Mozilla’s Persona has been put out to pasture and the difficult problem that creates for developers.

Plus your feedback, and much more!

Thanks to:


\"GoDaddy\"


\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes: —

Feedback

Open Mic:

The post Persona Non Grata | CR 92 first appeared on Jupiter Broadcasting.

]]>
SSD Powered NAS? | TechSNAP 139 https://original.jupiterbroadcasting.net/47547/ssd-powered-nas-techsnap-139/ Thu, 05 Dec 2013 17:39:04 +0000 https://original.jupiterbroadcasting.net/?p=47547 SSDs in your Network Attached Storage? Maybe! We’ll share our thoughts. Two Million passwords stolen by Keylogging malware, but the data is where the fun is at.

The post SSD Powered NAS? | TechSNAP 139 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

SSDs in your Network Attached Storage? Maybe! We’ll share our thoughts. Two Million passwords stolen by Keylogging malware, but the data is where the fun is at.

Plus a great batch of your questions, our answers!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Show Notes:

D-Link finally released fix for some vulnerable routers, over a month late

  • In TechSNAP 132 (October 17 2013) we told you about a flaw in D-Link routers that allowed an attacker to entirely bypass the authentication system
  • Any user accessing a vulnerable device with the string “xmlset_roodkcableoj28840ybtide” (backwards: edit by 04882 joel backdoor) as their useragent is granted administrative privileges
  • D-Link promised to issue fixed firmware by the end of October
  • That updated firmware has finally be released, in December
  • Newer firmware does not seem to be available for all of the devices

2 Million passwords stolen by Key logging malware

  • Spider Labs managed to take over a Pony botnet controller
  • The botnet of infected machines was harvesting passwords with a keylogger
  • Total Haul:
  • ~1,580,000 website login credentials stolen
  • ~320,000 email account credentials stolen
  • ~41,000 FTP account credentials stolen
  • ~3,000 RDP credentials stolen
  • ~3,000 SSH account credentials stolen
  • Top Domains:
    • 325,000 Facebook
    • 70,000 Google
    • 60,000 Yahoo
    • 22,000 Twitter
    • 8,000 Linkedin
  • While the statistics make it look like many of the compromised machines were from the Netherlands, it seems most of the traffic was from a few IP addresses that seem to have been acting as reverse proxies for the infected machines
  • Strength of the observed passwords:
    • 6% Terrible
    • 28% Bad
    • 44% Medium
    • 17% Good
    • 5% Excellent
  • Conclusion: Even have years of being told to pick good unique passwords, and after multiple breaches like MySpace, Gawker, LinkedIn, and Adobe etc, people still choose terrible passwords
  • Additional Coverage

  • GoDaddy ad: https://hostcabi.net/hosting_infographic Godaddy hosts one of the largest proportion of the 100,000 most popular websites on the Internet

Hackers courted by Governments for Cyber Warfare jobs

  • Rolling Stone does profiles and Interviews at HackMiami, a meetup for hackers to show off their skills to corporate and government recruiters. There is also a ‘Cyber War Games’, where hackers simulate attacks against various targets and networks
  • One recruiters pitch: “We built an environment that allows people to legally do the things that would put them in jail”
  • “A leaked report from the Department of Homeland Security in May found “increasing hostility” aimed online against “U.S. critical infrastructure organizations” – power grids, water supplies, banks and so on. “
  • Dave Marcus, director of threat intelligence and advance research at McAfee Federal Advanced Programs Groups, says the effects would be devastating. “If you shut off large portions of power, you’re not bringing people back to 1960, you’re bringing them back to 1860,” he says. “Shut off an interconnected society’s power for three weeks in this country, you will have chaos.”
  • In one profile, Rolling Stone looks at ‘Street’, an expert at social engineering. “Government agencies and corporations fly Street around the world to see if he can bullshit his way into their most sensitive data centers. He has scammed his way into a bank in Beirut, a financial center across from Ground Zero, a state treasury department. He usually records his infiltrations on a spy watch, a 16-gigabyte HD video recorder with infrared lights, then turns over the footage to his clients. When I ask Street the tricks of his trade, he tells me there are two keys to stealing data in person: act like you’re supposed to be there and carry a tablet PC, which convinces victims he’s a tech-support worker. “People see this thing,” he says, waving his tablet, “and think it’s magical.”” — The digital equivalent to a clipboard
  • “To see what the front line of cyberwar really looks like, I visit the National Cybersecurity and Communications Integration Center in Arlington, Virginia, the Department of Homeland Security’s mission control. It’s one of our most important hubs in digital warfare, alongside the FBI and NSA. A wall of video screens show online the attacks on the IRS and NASA – both agencies were compromised by a Distributed Denial of Service Attack, a technique that floods a site with access requests, slowing or downing it completely. “

Feedback:


Round Up:

The post SSD Powered NAS? | TechSNAP 139 first appeared on Jupiter Broadcasting.

]]>