reader – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:46:59 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png reader – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Celebrity Bugs | TechSNAP 191 https://original.jupiterbroadcasting.net/73082/celebrity-bugs-techsnap-191/ Thu, 04 Dec 2014 20:52:33 +0000 https://original.jupiterbroadcasting.net/?p=73082 2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits. Plus practical way to protect yourself from ATM Skimmers, how they work & much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: […]

The post Celebrity Bugs | TechSNAP 191 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits.

Plus practical way to protect yourself from ATM Skimmers, how they work & much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Wiretapping ATMs

  • “Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called “wiretapping” device that is inserted through a tiny hole cut in the cash machine’s front. The hole is covered up by a fake decal, and the thieves then use custom-made equipment to attach the device to ATM’s internal card reader.”
  • “The criminals cut a hole in the fascia around the card reader where the decal is situated,” EAST described in a recent, non-public report. “A device is then inserted and connected internally onto the card reader, and the hole covered with a fake decal”
  • “It’s where a tap is attached to the pre-read head or read head of the card reader,” Lachlan said. “The card data is then read through the tap. We still classify it as skimming, but technically the magnetic stripe [on the customer/victim’s card] is not directly skimmed as the data is intercepted.”
  • So, they attach to the REAL card reader, and siphon off a copy of the data as the card is read
  • That makes this form of skimming pretty much undetectable (except possibly by the fake decal used to cover the hole cut in the front of the ATM)
  • The Krebs article also talks about new “insert transmitter skimmers”, that use a small battery and transmit the skimmed data a short distance, meaning the attacker does not have to return to the scene of the crime to collect the stolen data, decreasing their risk of getting caught
  • “It’s best to focus instead on protecting your own physical security while at the cash machine. If you visit an ATM that looks strange, tampered with, or out of place, try to find another ATM. Use only machines in public, well-lit areas, and avoid ATMs in secluded spots”
  • “Last, but certainly not least, cover the PIN pad with your hand when entering your PIN: That way, if even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well. You’d be amazed at how many people fail to take this basic precaution. Yes, there is still a chance that thieves could use a PIN-pad overlay device to capture your PIN, but in my experience these are far less common than hidden cameras (and quite a bit more costly for thieves who aren’t making their own skimmers).”

Bug naming and shaming

  • This article discusses the advantages and disadvantages to having named and branded bugs like Heartbleed, as well as some behind the scenes info on that exploit, and the people behind the naming of various other vulnerabilities since then
  • “If the bug is dangerous enough, it gets a name. Heartbleed’s branding changed the way we talk about security, but did giving a bug a logo make it frivolous… or is this the evolution of infosec?”
  • Heartbleed was discovered some time before Friday, March 21, 2014 by a Google security researcher. It was later shared with Open SSL, Red Hat, CloudFlare, Facebook, and Akamia
  • Finnish security company Codenomicon separately discovered Heartbleed on April 3, and informing the National Cyber Security Centre Finland the next day”
  • They then immediately went to work on a marketing plan. This discovery was going to launch their small firm into super stardom. They had a logo and website designed, and prepared for the public disclosure of the bug
  • The original public disclosure was supposed to be made on April 9th. However, after details started to leak, and the OpenSSL team decided that if more than 1 group had already discovered the bug, more would quickly follow, they released the details early, on April 7th
  • “Half an hour after OpenSSL published a security advisory the morning of April 7, CloudFlare bragged in a blog post and a tweet that it was first to protect its customers, and how CloudFlare was enacting an example for “responsible disclosure.”
  • “An hour after CloudFlare’s little surprise, Codenomicon tweeted to announce the bug, now named Heartbleed, linking to a fully prepared website, with a logo, and an alternate SVG file of the logo made available for download.”
  • “Heartbleed — birth name CVE-2014-0160 — became a household term overnight, even though average households still don’t actually understand what it is.”
  • “The media mostly didn’t understand what Heartbleed was either, but its logo was featured on every major news site in the world, and the news spread quickly. Which was good, because for the organizations who needed to remediate Heartbleed, it was critical to move fast.”
  • In the end, it seems Heartbleed was a success, most systems were patched quite quickly, although many systems did not follow the full procedure, and that has had some fallout that we have covered
  • In justifying the name given to a Russian hacking group, iSight Partners said: “Without naming these teams, it would be impossible for a network defender to keep track of them all. We think that’s essential, because intimately understanding these teams is the first step to mounting an effective defense. Giving a name to a team — as we have done with Sandworm — helps practitioners and researchers track and attribute tactics, techniques, procedures and ongoing campaigns back to the team. By assigning identities, It helps to bring these actors out of the shadows and into the light.“
  • Other vulnerabilities, like POODLE, had alarmingly bad reporting that may have done more harm than good
  • ShellShock was the anti-case. It didn’t have a logo, or an official website. ShellShock timeline
  • It was actually originally dubbed BashDoor by its creator, but when it was leaked to the press by someone else, they provided the name ShellShock
  • Further, because the initial fix for the ShellShock vulnerability did not entirely solve the problem, there was much confusion, where people thought they had already patched, but didn’t have the “latest” patch
  • Then, there were a number of follow-on vulnerabilities in bash, that didn’t have names, but were lumped in with ShellShock, which lead to even more confusion
  • Closing Quote: “The researchers didn’t tell their closest biz-buddies in a game of telephone, one in which Heartbleed became an arms race of egos, insider information trading, and opportunism”
  • Who gets to decide what bugs are bad enough to get a name instead of just a CVE number? Should MITRE start tracking names along with the CVE numbers?
  • Who gains more for naming bugs, the end users who might become more aware of the issue and be able to protect themselves, or the PR powered firms that exploit it for their own good?

Feedback:


Round Up:


The post Celebrity Bugs | TechSNAP 191 first appeared on Jupiter Broadcasting.

]]>
Cloud Gateway Drug | Tech Talk Today 33 https://original.jupiterbroadcasting.net/63257/cloud-gateway-drug-tech-talk-today-33/ Mon, 28 Jul 2014 10:03:22 +0000 https://original.jupiterbroadcasting.net/?p=63257 Amazon’s success with EC2 and S3 is making them bleed money, as investors start to get nervous we’ll debate if the cloud’s price race to the bottom can lead to anything but awful. Linus tells it like it is, we bust some Android FUD, and more! Direct Download: MP3 Audio | OGG Audio | Video […]

The post Cloud Gateway Drug | Tech Talk Today 33 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Amazon’s success with EC2 and S3 is making them bleed money, as investors start to get nervous we’ll debate if the cloud’s price race to the bottom can lead to anything but awful.

Linus tells it like it is, we bust some Android FUD, and more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Amazon apparently set to launch Square-competitor in August as it develops biometric payment solutions

Amazon could be preparing to launch its own mobile credit card reading hardware in the coming weeks, according to internal Staples documents hinting at such a launch that we’ve obtained. According to the documents, Staples stores will prepare next month to stock a new product called the “Amazon Card Reader” alongside existing card readers from Square, PayPal, and Staples’ own in-house brand. The small hardware, which will likely connect to smartphones to process payments, will cost $9.99, according to the Staples internal sales systems…

An exact launch date for the product is unconfirmed, but Staples has asked its stores to wait until Tuesday, August 12th to put up new signage related to the Amazon Card Reader, so it’s possible that the release is scheduled for that week.

Amazon’s Cloud Is Growing So Fast It’s Scaring Shareholders

Yesterday Amazon said that while its cloud business grew by 90 percent last year, it was significantly less profitable. Amazon’s AWS cloud business makes up the majority of a balance sheet item it labels as “other” (along with its credit card and advertising revenue) and that revenue from that line of business grew by 38 percent. Last quarter, revenue grew by 60 percent. In other words, Amazon is piling on customers faster than it’s adding dollars to its bottom line.


The company’s chief financial officer, Tom Szkutak, blamed the drop on “substantial” price reductions the company has made to products such as its core EC2, storage and database services. “They ranged from 28 percent to 51 percent depending on the service,” he said on a conference call with analysts.


The thing is that even as Amazon’s business matures to the size of a company like VMware, its worrying to investors to see profitability slipping. That’s pretty much the meta-narrative of Amazon as a whole, though, which says it could lose as much as $810 million in the current quarter. The company is taking losses to invest in the future, and Amazon’s 10 percent stock drop today shows that some investors are uncomfortable with that.

Amazon.com Inc. missed analysts’ estimates for a second straight quarter, sending the shares tumbling 11 percent.

Trend Micro backs off Google Play malware claims

In a recent press release, Trend Micro made a fairly bold claim about malware running rampant in the Google Play Store. The release, dated July 15, 2014, began as follows:

Google Play populated with fake apps, with more than half carrying malware

Potentially evil doppelgangers for the most popular apps are inundating the Google Play store, with many carrying malware, according to a new blog post and report by Trend Micro, a global developer of cyber security solutions.

In the report more than 77 percent of the top 50 apps on the Google Play store have repackaged or fake apps associated with them.


It turns out that Trend Micro is guilty of a little over-eager language that obfuscated the nature of some of these threats. While there are indeed fake versions of many popular Android apps available for download, Trend failed to mention in their initial promotion for the report that the apps in question were posted outside the Play Store, and had to be installed manually in what’s commonly known as a side-load. This requires users to download the app in a browser, ignore a standard security warning about APK files, and disable a security option in Android’s main settings menu.

Linus Torvalds: “GCC 4.9.0 Seems To Be Terminally Broken” – Slashdot

A critique from Linus Torvalds of GCC 4.9.0. after a random panic was discovered in a load balance function in Linux 3.16-rc6. in an email to the Linux kernel mailing list outlining two separate but possibly related bugs, Linus describes the compiler as “terminally broken,” and worse (“pure and utter sh*t,” only with no asterisk).

  • A slice:

“Lookie here, your compiler does some absolutely insane things with the spilling, including spilling a *constant. For chrissake, that compiler shouldn’t have been allowed to graduate from kindergarten. We’re talking “sloth that was dropped on the head as a baby” level retardation levels here …. Anyway, this is not a kernel bug. This is your compiler creating completely broken code. We may need to add a warning to make sure nobody compiles with gcc-4.9.0, and the Debian people should probably downgrate their shiny new compiler.”*

The post Cloud Gateway Drug | Tech Talk Today 33 first appeared on Jupiter Broadcasting.

]]>
License to Kill | CR 42 https://original.jupiterbroadcasting.net/34181/license-to-kill-cr-42/ Mon, 25 Mar 2013 11:01:28 +0000 https://original.jupiterbroadcasting.net/?p=34181 Mike and Chris contemplate how to gracefully kill a project, end a contract, or quit a job. Then they debate the merits of Google killing Reader and more.

The post License to Kill | CR 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike and Chris contemplate how to gracefully kill a project, end a contract, or quit a job. Then they debate the merits of Google killing Reader, the challenges of Android, and reservations about open sourcing your code.

And much more, on this week’s Coder Radio!

Thanks to:

Use our code coder295 to get a .COM for $2.95.

 

Visit coderradio.ting.com to save $25 off your device or service credits.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes —

Feedback

Pick of the week:

[asa]B0089VO71U[/asa]
[asa]B009QW3TBK[/asa]

Follow the show

The post License to Kill | CR 42 first appeared on Jupiter Broadcasting.

]]>
Packets Over 90,000 | TechSNAP 102 https://original.jupiterbroadcasting.net/34026/packets-over-90000-techsnap-102/ Thu, 21 Mar 2013 16:48:28 +0000 https://original.jupiterbroadcasting.net/?p=34026 A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

The post Packets Over 90,000 | TechSNAP 102 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

Some old school malware gets the job done, Allan’s cool toys from Japan, a big batch of your questions our answers, and much more on this week’s TechSNAP.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: