SEC – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 30 Mar 2020 02:02:38 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png SEC – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 151 https://original.jupiterbroadcasting.net/140652/linux-action-news-151/ Sun, 29 Mar 2020 18:15:00 +0000 https://original.jupiterbroadcasting.net/?p=140652 Show Notes: linuxactionnews.com/151

The post Linux Action News 151 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/151

The post Linux Action News 151 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 127 https://original.jupiterbroadcasting.net/135677/linux-action-news-127/ Sun, 13 Oct 2019 18:20:29 +0000 https://original.jupiterbroadcasting.net/?p=135677 Show Notes: linuxactionnews.com/127

The post Linux Action News 127 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/127

The post Linux Action News 127 first appeared on Jupiter Broadcasting.

]]>
Laying Internet Pipe | TechSNAP 339 https://original.jupiterbroadcasting.net/118836/laying-internet-pipe-techsnap-339/ Thu, 05 Oct 2017 14:43:57 +0000 https://original.jupiterbroadcasting.net/?p=118836 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Google Will Survive SESTA. Your Startup Might Not. Requires unreliastic levels of censorship by platforms; not even the big players will be able to comply 100% Proponents consider startups to be outliers, which […]

The post Laying Internet Pipe | TechSNAP 339 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Google Will Survive SESTA. Your Startup Might Not.

Companies Look to an Old Technology to Protect Against New Threats

  • Tape is an old techology. It is also highly reliable and stable

  • Tape sales are increasing

  • Yep, backup to NAS is great, but do you have different versions of your data?

CBS’s Showtime caught mining crypto-coins in viewers’ web browsers

  • This isn’t about CBS. It’s about the potential for abuse by website owners

  • Code unlikely to be official sanctioned / added by CBS; mure more likely it was a malicious third party or insider.

  • The email address associated with the mining account is personal, not corporate

  • Ethical issues for content providers to figure out


Feedback


Round Up:

The post Laying Internet Pipe | TechSNAP 339 first appeared on Jupiter Broadcasting.

]]>
Ending Ransomware | TechSNAP 275 https://original.jupiterbroadcasting.net/101186/ending-ransomware-techsnap-275/ Thu, 14 Jul 2016 17:35:38 +0000 https://original.jupiterbroadcasting.net/?p=101186 A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows. Plus your questions, our answers, a packed roundup & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | […]

The post Ending Ransomware | TechSNAP 275 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows.

Plus your questions, our answers, a packed roundup & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

CitiGroup hit with $7 million fine over software bug dating back to 1999

  • CitiGroup, a large US Financial institution, is being fined for failing to properly report to the US Securities and Exchange Commission (SEC)
  • According to the SEC, the error [PDF] resulted in the financial regulator being sent incomplete “blue sheet” information for a remarkable 15 years – from May 1999 to April 2014.
  • The bank was required to send details of all stock transactions, and due to a bug, a number of branches were never included in those reports
  • The details are quite amusing
  • “The mistake was discovered by Citigroup itself when it was asked to send a large but precise chunk of trading data to the SEC in April 2014 and asked its technical support team to help identify which internal ID numbers they should run a request on.”
  • “That team quickly noticed that some branches’ trades were not being included in the automated system and alerted those above them. Four days later a patch was in place, but it wasn’t until eight months later that the company received a formal report noting that the error had affected SEC reports going back more than a decade. The next month, January 2015, Citigroup fessed up to the SEC.”
  • “It turned out that the error was a result of how the company introduced new alphanumeric branch codes. When the system was introduced in the mid-1990s, the program code filtered out any transactions that were given three-digit branch codes from 089 to 100 and used those prefixes for testing purposes.”
  • So any transaction with a branch code in that range, was considered test data, and not reported to the government
  • “But in 1998, the company started using alphanumeric branch codes as it expanded its business. Among them were the codes 10B, 10C and so on, which the system treated as being within the excluded range, and so their transactions were removed from any reports sent to the SEC.”
  • “The SEC routinely sends requests to financial institutions asking them to send all details on transactions between specific dates as a way of checking that nothing untoward is going on. The coding error had resulted in Citigroup failing to send information on 26,810 transactions in over 2,300 such requests.”
  • “The SEC was not impressed and said in a statement announcing the fine that the “failure to discover the coding error and to produce the missing data for many years potentially impacted numerous Commission investigations.””
  • “Broker-dealers have a core responsibility to promptly provide the SEC with accurate and complete trading data for us to analyze during enforcement investigations,” said Robert Cohen, co-chief of the SEC enforcement division’s market abuse unit. “Citigroup did not live up to that responsibility for an inexcusably long period of time, and it must pay the largest penalty to date for blue sheet violations.”
  • 7 Million seems like a relatively small fine for such a large screw up, but it does not appear to have been malicious.

New system to detect ransomware by looking at filesystem patterns

  • “Our system is more of an early-warning system. It doesn’t prevent the ransomware from starting … it prevents the ransomware from completing its task … so you lose only a couple of pictures or a couple of documents rather than everything that’s on your hard drive, and it relieves you of the burden of having to pay the ransom,” said Nolen Scaife, a UF doctoral student and founding member of UF’s Florida Institute for Cybersecurity Research.
  • “Attacks most often show up in the form of an email that appears to be from someone familiar. The recipient clicks on a link in the email and unknowingly unleashes malware that encrypts his or her data. The next thing to appear is a message demanding the ransom, typically anywhere from a few hundred to a few thousand dollars.”
  • “It’s an incredibly easy way to monetize a bad use of software,” said Patrick Traynor, an associate professor in UF’s department of computer and information science and engineering at UF and also a member of the Florida Institute for Cybersecurity Research. He and Scaife worked together on developing CryptoDrop.
  • “We ran our detector against several hundred ransomware samples that were live,” Scaife said, “and in those case it detected 100 percent of those malware samples and it did so after only a median of 10 files were encrypted.”
  • “About one-tenth of 1 percent of the files were lost,” Traynor said, “but the advantage is that it’s flexible. We don’t have to wait for that anti-virus update. If you have a new version of your ransomware, our system can detect that.”
  • Video – Extortion extinction: Ransomware
  • It seems like it would be fairly trivial to detect the pattern that ransomware uses. I imagine most ransomware creates a new file, named original.ext.locked and then encrypts the contents of the original file, then removes the original
  • It is possible newer ransomware could use new patterns, like renaming files and overwriting in place, or encrypting files in random order instead of walking the directory tree to make it harder to detect
  • Additional Coveragge: Phys.org

Dropbox open sources Lepton image compression algorithm, save 22% by losslessly compressing JPEGs

  • “Lepton achieves a 22% savings reduction for existing JPEG images, by predicting coefficients in JPEG blocks and feeding those predictions as context into an arithmetic coder. Lepton preserves the original file bit-for-bit perfectly. It compresses JPEG files at a rate of 5 megabytes per second and decodes them back to the original bits at 15 megabytes per second, securely, deterministically, and in under 24 megabytes of memory.”
  • Speed seems very slow, compression is 5 MB/s, and decompression is 15 MB/s
  • It is not clear if the encoding can be multithreaded across many cores to increase speed, like xz can do. Even without that, in most cases you would be dealing with many image files at once, but even compressing many files at once, that is quite slow
  • “We have used Lepton to encode 16 billion images saved to Dropbox, and are rapidly recoding our older images. Lepton has already saved Dropbox multiple petabytes of space.”
  • The article has a very good description of how JPEG encoding works
  • “The DC coefficient (brightness in each 8×8 block) takes up a lot of room (over 8%) in a typical iPhone photograph so it’s important to compress it well. Most image formats put the DC coefficients before any AC coefficients in the file format. Lepton gets a compression advantage by coding the DC as the last value in each block. Since the DCs are serialized last, there is a wealth of information from the AC coefficients available to predict the DC coefficient. By defining a good and reproducible prediction, we can subtract the actual DC coefficient from the predicted DC coefficient, and only encode the delta. Then in the future we can use the prediction along with the saved delta to get the original DC coefficient. In almost all cases, this technique results in a significantly reduced number of symbols to feed into our arithmetic coder.”
  • “Lepton can decompress significantly faster than line-speed for typical consumer and business connections. Lepton is a fully streamable format, meaning the decompression can be applied to any file as that file is being transferred over the network. Hence, streaming overlaps the computational work of the decompression with the file transfer itself, hiding latency from the user.”
  • Because it can be streamed, this means that mobile devices could work via a proxy, that compresses all JPEG content before transmitting it to the mobile device, then an application on the mobile device could decompression it and display the resulting JPEG

Flaw in Windows Printing subsystem affects all versions of Windows

  • “A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.”
  • “Most organizations try to apply the principle of least privilege to the devices in their networks. This works pretty well for things like laptops or desktops since the hardware they use doesn’t change that often. However printers are a bit different. While they still need drivers, printers need to support virtually any user that wants to connect to them. As end-users move through a building, they naturally want to use the printer closest to them. Mobile users expect to be able to easily connect and use a printer when they come into the office. In addition, most organizations don’t standardize on a single printer, and will have multiple models and manufacturers often within a single network.”
  • “So instead of having system administrators push all possible printer drivers to all workstations in the network, the solution was to develop a way to deliver the driver to a user device right before the printer is used. And this is where Point-and-Print showed up. This approach stores a shared driver on the printer or print server, and only the users of that printer receive the driver that they need. At first glance, this is a practical and simple solution to driver deployment. The user gets access to the printer driver they need without requiring an administrator – a nice win-win.”
  • “By default, in corporate networks, network admins allow printers to deliver the necessary drivers to workstations connected to the network. These drivers are silently installed without any user interaction and run under the SYSTEM user, with all the available privileges.”
  • The researchers managed to dissect a firmware update for an existing printer, and modify it to infect Windows clients that load its driver with malware
  • The malware allowed them access to the target Windows client, as the SYSTEM user
  • They detail a number of other ways this vulnerability could be exploited:
  • Watering hole attacks:
  • Backdooring an existing printer or printer server.
  • Microsoft print server: driver path: c:\windows\system32\spool\drivers*\3...
  • Linux/BSD cups server: check for share driver print$ in the configuration.
  • Multiple vendors support Point-and-Print on the printer itself
  • Re-flash printer with backdoored drivers.
  • Create a fake print server and broadcast with auto discovery.
  • Privilege escalation:
  • Use the add printer as a privileged escalation mechanism to get system access.
  • Mitm attack to the printer and inject the backdoored driver instead of the real one.
  • Going more global with IPP and Webpnp. Send users email with a link, when clicked, it attempts to connect to the (fake?) printer in question, and results in the driver being installed on the target computer
  • There is more detail in the blog post about infecting a computer remotely
  • Researcher blog post
  • Microsoft released a fix for this vulnerability as part of the July patch Tuesday
  • Official Microsoft Bulletin
  • Additional Coverage: softpedia

Feedback:


Round Up:


The post Ending Ransomware | TechSNAP 275 first appeared on Jupiter Broadcasting.

]]>
Summer of Bitcoin | Plan B 16 https://original.jupiterbroadcasting.net/40712/summer-of-bitcoin-plan-b-16/ Tue, 23 Jul 2013 18:43:36 +0000 https://original.jupiterbroadcasting.net/?p=40712 A series of events kick off this week that lay the foundation for a very productive Bitcoin summer!

The post Summer of Bitcoin | Plan B 16 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A series of events kick off this week that lay the foundation for a very productive Bitcoin summer, plus a popular Bitcoin gambling site sells for a record breaking amount, a Bitcoin Ponzi scheme is busted, your emails of the week, and a few surprises!

Downloads:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | Ogg Feed

\"coinbaseqr\"

— Feedback —

Erupter Follow Up:

Help spread the word on iTunes with a Rating and Review:

Call or txt the Show:

1 (352) 587-5262

(352) 58-PLANB

— Discussion —


Stossel discusses the gold standard and bitcoin

Economist Ben Powell and Laissez Faire Books executive editor Jeff Tucker on investing in gold and the bitcoin


SatoshiDice sells for 126,315 BTC

Blockchain-based betting game SatoshiDice has been sold for 126,315 BTC, which at the time of writing was worth around $11.47 million.


SEC Charges Texas Man in Bitcoin Ponzi Scheme

The SEC charged Shavers with violating the Securities Act of 1933 for unlawfully selling unregistered securities, as well as intentionally misleading and defrauding investors. Their alert provides an overview of Ponzi schemes — a fund that pays earlier investors with new investors\’ money, often promising returns far exceeding alternative opportunities. The SEC document also explains that virtual currencies may be seen as especially attractive to those looking to conduct fraud as a result of the perceived ability to remain anonymous. Importantly, the filing also notes, \”Any investment in securities in the United states remains subject to the jurisdiction of the seC regardless of whether the investment is made in U.S. dollars or a virtual currency.\”

The Securities and Exchange Commission today charged a Texas man and his company with defrauding investors in a Ponzi scheme involving Bitcoin, a virtual currency traded on online exchanges for conventional currencies like the U.S. dollar or used to purchase goods or services online.

The SEC alleges that Shavers promised investors up to 7 percent weekly interest based on BTCST’s Bitcoin market arbitrage activity, which supposedly included selling to individuals who wished to buy Bitcoin “off the radar” in quick fashion or large quantities. In reality, BTCST was a sham and a Ponzi scheme in which Shavers used Bitcoin from new investors to make purported interest payments and cover investor withdrawals on outstanding BTCST investments.

Shavers also diverted investors’ Bitcoin for day trading in his account on a Bitcoin currency exchange, and exchanged investors’ Bitcoin for U.S. dollars to pay his personal expenses.

The SEC issued an investor alert today warning investors about the dangers of potential investment scams involving virtual currencies promoted through the Internet.

“Fraudsters are not beyond the reach of the SEC just because they use Bitcoin or another virtual currency to mislead investors and violate the federal securities laws,” said Andrew M. Calamari, Director of the SEC’s New York Regional Office.

The Movie by Project Bitcoin

A documentary about the socioeconomic impact that Bitcoin is making around the world. Comprised of interviews from global Bitcoin users

Bitcoin Pick

— Watch Live —

Tuesday 2pm PDT / 5pm EDT / 9pm GMT

— Plan B Subreddit —

— Contact us —

— Music —

\"coinbaseqr\"

— Support the Show —

The post Summer of Bitcoin | Plan B 16 first appeared on Jupiter Broadcasting.

]]>
Skype Exposes Pirates | TechSNAP 29 https://original.jupiterbroadcasting.net/13262/skype-exposes-pirates-techsnap-29/ Thu, 27 Oct 2011 18:43:12 +0000 https://original.jupiterbroadcasting.net/?p=13262 Researches have developed a way to tie your file sharing to your Skype account. We’ll share the details on how this works, and what you can do to prevent it!

The post Skype Exposes Pirates | TechSNAP 29 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on this week’s TechSNAP…

Researches have developed a way to tie your file sharing to your Skype account. We’ll share the details on how this works, and what you can do to prevent being tracked!

Plus we cover the Ultimate way to host your own email, and what happened when Chinese hackers took control of US Satellites!

All that and more, on this week’s episode of TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:


[ad#shownotes]

Show Notes:

Audible.com:

Suspected Chinese Military Hackers take control of US Satellites

  • On four separate occasions during 2007 and 2008 US satellites were hijacked by way of their ground control stations.
  • The effected satellites were Landsat–7 (Terrain Mapping and Satellite Photography, example 1 example 2) and Terra AM–1 (Climate and Environmental Monitoring, 2010 Hurricane Karl)
  • While the US does not directly accuse the Chinese government in writing, these types of actions are consistent with known war plans that involve disabling communications, command and control, and GPS satellites as a precursor to war.
  • In one incident with NASA’s Terra AM–1, “the responsible party achieved all steps required to command the satellite,” however the attackers never actually took control of the satellite.
  • It was not until the 2008 investigation that the previous compromises in 2007 were detected
  • This raises an important question, are the US military and other NATO members, too reliant of satellite communications and GPS?
  • In a recent NATO exercise called ‘Joint Warrior’, it was planned to jam GPS satellite signals, however the jamming was suspended after pressure on the governments over civilian safety concerns. Story

Researchers develop a procedure to link Skype users to their Bittorrent downloads

  • The tools developed by the researchers at New York University allow any to determine a strong correlation between bittorrent downloads and a specific skype user.
  • Importantly, unlike RIAA/MPAA law suites, the researchers consider the possibility of false positives because of multiple users behind NAT.
  • The researchers resolve this issue by probing both the skype and bittorrent clients after a correlation is suspected. By generating a response from both clients at nearly the same time and comparing the IP ID (similar to a sequence number) of the packets, if the ID numbers are close together, than it is extremely likely that the response was generated by the same physical machine. If the IDs are very different, then it is likely that the Skype and BitTorrent users are on different machines, and there is no correlation between them.
  • This same technique could be made to work with other VoIP and P2P applications, and could be used to gather enough evidence to conclusively prove a bittorrent user’s identity.
  • This situation can be mitigated by using the feature of some OS’s that randomizes the IP ID to prevent such tracking. (net.inet.ip.random_id in FreeBSD, separate ‘scrub random-id’ feature in the BSD PF firewall)
  • The discovery could also be prevented by fixing the skype client such that it will not reply with its IP address if the privacy settings do not allow calls from that user. The current system employed by the researches does not actually place a call to the user, just tricks skype into thinking that a call will be placed, and skype then leaks the sensitive information by returning its IP address or initiating a connection to the attacker.
  • Read the full research paper

NASDAQ web application Directors Desk hacked

  • Directors Desk is a web application designed to allow executives to share documents and other sensitive information
  • When NASDAQ was hacked in February, they did not believe that any customer data was stolen
  • The attackers implanted spyware into the Directors Desk application and were able to spy on the sensitive documents of publicly traded companies as they were passed back and forth through the system
  • This is another example of the Advanced Persistent Threat (APT) as we saw with the RSA and South Korea Telecom hacks, where the attackers went after a service provider (in his case NASDAQ) to compromise the ultimate targets, the publicly traded companies and their sensitive documents.
  • It is not known what if any protection or encryption systems were part of Directors Desk, but it seems that the application was obviously lacking some important security measures, including an Intrusion Detection System that would have detected the modifications to the application.

SEC says companies may need to disclose cyber attacks in regulatory filings

  • The new guidance from the SEC spells out some of the things that companies may need to disclose to investors and others, depending upon their situation.
  • Some of the potential items companies may need to disclose include:
  • Discussion of aspects of the registrant’s business or operations that give rise to material cybersecurity risks and the potential costs and consequences
  • To the extent the registrant outsources functions that have material cyber security risks, description of those functions and how the registrant addresses those risks
  • Description of cyber incidents experienced by the registrant that are individually, or in the aggregate, material, including a description of the costs and other consequences
  • Risks related to cyber incidents that may remain undetected for an extended period
  • “For example, if material intellectual property is stolen in a cyber attack, and the effects of the theft are reasonably likely to be material, the registrant should describe the property that was stolen and the effect of the attack on its results of operations, liquidity, and financial condition and whether the attack would cause reported financial information not to be indicative of future operating results or financial condition,” the statement says.
  • From the SEC guidance: The federal securities laws, in part, are designed to elicit disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision”
  • CF Disclosure Guidance: Topic No. 2 – Cybersecurity

Feedback:

It is definitely advantageous to own the domain that your email address is on. On top of looking more professional than a hotmail, or even gmail address, it also allows you to choose your host and have full control over everything. There are some caveats though, of course you must remember to renew your domain name, else your email stops working (just ask Chris about that one), you also have to be careful about picking where to host your domain, having your site or email hosted by a less reputable service can result in your domain being included on blacklists and stopping delivery of your mail to some users. The biggest problem with hosting your own email, from your home, is that you must keep the server up 24/7, and it must have a reasonable static IP address. If you are going to host from your home, I recommend you get a ‘backup mx’ service, a backup mail server that will collect mail sent to you while you are offline, and then forward it to your server when it is back up. Even if you are using a dedicated server or VPS, this is important, because email is usually the most critical service on your server. The other major issue with hosting your email from home, is that most ISPs block port 25 inbound and outbound, to prevent infected computers from sending spam. This means that you will not be able to send or receive email to other servers. Usually your ISP will require you to have a more expensive business class connection with a dedicated static IP address in order to allow traffic on port 25. Also, a great many spam filtering systems, such as spamassassin, use blacklists that contain the IP ranges of all consumer/home Internet providers, designed to stop spam from virus infected machines, because email should not be send from individual client machines, but through the ISP or Domain email server.

Round Up:

The post Skype Exposes Pirates | TechSNAP 29 first appeared on Jupiter Broadcasting.

]]>