documents – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 01 Apr 2016 22:13:23 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png documents – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Doxing ISIS | Unfilter 179 https://original.jupiterbroadcasting.net/97541/doxing-isis-unfilter-179/ Thu, 10 Mar 2016 23:01:46 +0000 https://original.jupiterbroadcasting.net/?p=97541 It’s a document extravaganza this week, with newly released Bin Laden files, ISIS informants & document treasure troves. We cover what surely must be a great week for the intelligence agencies. Plus an update on the Apple vs DOJ case, the latest terrorism bogeyman, a 2016 race update, a high-note & even more! Direct Download: […]

The post Doxing ISIS | Unfilter 179 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s a document extravaganza this week, with newly released Bin Laden files, ISIS informants & document treasure troves. We cover what surely must be a great week for the intelligence agencies.

Plus an update on the Apple vs DOJ case, the latest terrorism bogeyman, a 2016 race update, a high-note & even more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Doxing ISIS | Unfilter 179 first appeared on Jupiter Broadcasting.

]]>
Naked Line In The Sand | Unfilter 140 https://original.jupiterbroadcasting.net/80182/naked-line-in-the-sand-unfilter-140/ Wed, 08 Apr 2015 20:18:19 +0000 https://original.jupiterbroadcasting.net/?p=80182 We review and discuss the most important bits from Edward Snowden’s Interview on John Oliver’s Last Week Tonight program. Plus an update on the situation in Yemen & the US’s increasing involvement. Russia hacks the White House but the White House won’t confirm & a high note worth millions. Direct Download: Video | MP3 Audio […]

The post Naked Line In The Sand | Unfilter 140 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We review and discuss the most important bits from Edward Snowden’s Interview on John Oliver’s Last Week Tonight program. Plus an update on the situation in Yemen & the US’s increasing involvement.

Russia hacks the White House but the White House won’t confirm & a high note worth millions.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News:

Oh, Google.

Tsarnaev

Dzokhar Tsarnaev is found guilty, and could face death penalty

Russia

How Russians hacked the White House – CNN.com

Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say.

Snowden:

An Edward Snowden Statue Was Replaced By A Hovering Snowden Image Last Night

Last Week Tonight with John Oliver: Government Surveillance (HBO) – YouTube

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

High Note:

Bob Marley-branded weed is helping pot startups break funding records

GOP medical marijuana bill delayed until next year

The post Naked Line In The Sand | Unfilter 140 first appeared on Jupiter Broadcasting.

]]>
Google’s Automated Outage | TechSNAP 147 https://original.jupiterbroadcasting.net/50702/googles-automated-outage-techsnap-147/ Thu, 30 Jan 2014 17:44:34 +0000 https://original.jupiterbroadcasting.net/?p=50702 Microsoft has been breached, Google suffers a major outage, and finally some solid technical details on Target’s massive credit card hack.

The post Google's Automated Outage | TechSNAP 147 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft has been breached, Google suffers a major outage, and finally some solid technical details on Target’s massive credit card hack.

Plus a great batch of your questions, a rockin roundup, and much much more.

Thanks to:


GoDaddy


Ting

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Microsoft breach leads to hackers stealing Law Enforcement documents

  • According to the company, a number of Microsoft employees were targeted with attacks aiming to compromise both email and social media accounts, and in some cases, the attacks were successful.
  • “It appears that documents associated with law enforcement inquiries were stolen”
  • Adrienne Hall, General Manager at Microsoft’s Trustworthy Computing Group, wrote in a blog post.
  • He continues: “If we find that customer information related to those requests has been compromised, we will take appropriate action,” Hall continued. “Out of regard for the privacy of our employees and customers – as well as the sensitivity of law enforcement inquiries – we will not comment on the validity of any stolen emails or documents.”
  • The attackers have conducted their offensive against both email and social media accounts of Microsoft’s employees, the company did not reveal how many documents might have been exposed neither the nature of the attackers.
  • What’s interesting about this is that the incident was significant enough to disclose, indicating that a fair number of documents could have been exposed, or that the company fears some documents will make their way to the public if released by the attackers.
  • According to Microsoft, the Syrian Electronic Army may be behind the attacks.
  • “Our current information suggests the phishing attacks are related,” Hall told SecurityWeek in an emailed statement.
  • In March 2013, Microsoft released its first transparency report, noting that it had received over 70,000 law enforcement requests in 2012.
  • Additional Coverage:
  • Spear phishing against Microsoft, exposed law enforcement inquiries
  • Microsoft Believes Law Enforcement Documents Compromised in Hack
  • Microsoft says new phishing attacks targeted law enforcement documents | Ars Technica
  • Microsoft: documents were stolen during recent employee email hack | The Verge
  • Syrian Electronic Army stole law enforcement docs from Microsoft

Target Update

  • An examination of the malware used in the Target breach suggests that the attackers may have had help from a poorly secured feature built into a widely-used IT management software
  • As we previously noted the attackers used malware on the POS boxes to send credit card data read from memory to a central control server on Targets internal network.
  • The user account “Best1_user” and password “BackupU$r” were used to log in to the shared drive (indicated by the “S:” under the “Resource Type” heading in the image above.
  • That username is the same one that gets installed with an IT management software suite called Performance Assurance for Microsoft Servers. This product, according to its maker — Houston, Texas base BMC Software — includes administrator-level user account called “Best1_user.”
  • BMC explains the Best1_user account is installed by the software to do routine tasks. That article states that while the Best1_user account is essentially a “system” or “administrator” level account on the host machine
  • The Best1_user account appears to be associated with the Performance Assurance component of BMC Software’s Patrol product. According to BMC’s documentation, this account is normally restricted, but the attackers may have usurped control to facilitate lateral movement within the network.” According to a Dell SecureWorks paper being circulated to certain Dell customers.
  • According to SecureWorks, one component of the malware installed itself as a service called “BladeLogic,” a service name no doubt designed to mimic another BMC product called BMC BladeLogic Automation Suite.
  • According to a trusted Krebs source who uses mostly open-source data to keep tabs on the software and hardware used in various retail environments, BMC’s software is in use at many major retail and grocery chains across the country, including Kroger, Safeway, Home Depot, Sam’s Club and The Vons Companies, among many others.
  • Initial entry into the network is suspected to have been facilitated by a SQL injection attack, according to Malcovery.
  • Update: BMC says it is working with McAfee to investigate
  • Krebs: WSJ says that vendor credentials that were used in the attack may have been from vendor other than BMC
  • Additional Coverage – Ars Technica

Google breaks itself, and then fixes itself, while Engineers are busy on Reddit

  • At 10:55 a.m. PST this morning, an internal system that generates configurations—essentially, information that tells other systems how to behave—encountered a software bug and generated an incorrect configuration.
  • The incorrect configuration was sent to live services over the next 15 minutes, caused users’ requests for their data to be ignored, and those services, in turn, generated errors.
  • Users began seeing these errors on affected services at 11:02 a.m., and at that time our internal monitoring alerted Google’s Site Reliability Team. Engineers were still debugging 12 minutes later when the same system, having automatically cleared the original error, generated a new correct configuration at 11:14 a.m. and began sending it; errors subsided rapidly starting at this time.
  • By 11:30 a.m. the correct configuration was live everywhere and almost all users’ service was restored.
  • Reddit AMA
  • Additional Coverage – Reuters
  • Additional Coverage – TechCrunch
  • Additional Coverage – FoxNews

Feedback:

Round-Up:

The post Google's Automated Outage | TechSNAP 147 first appeared on Jupiter Broadcasting.

]]>