subnet – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 19 Dec 2014 02:51:04 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png subnet – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Don’t Fire IT | TechSNAP 193 https://original.jupiterbroadcasting.net/74187/dont-fire-it-techsnap-193/ Thu, 18 Dec 2014 18:51:04 +0000 https://original.jupiterbroadcasting.net/?p=74187 More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain. Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video […]

The post Don’t Fire IT | TechSNAP 193 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain.

Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Illinois Hospital being blackmailed with stolen Patient Data

  • “An Illinois hospital says someone attempted to blackmail it to stop the release of data about some of its patients.”
  • The hospital chain received an anonymous email asking for a substantial amount of money in order to prevent the release of patient data. A sample of the data was included in the email as proof
  • “The hospital says it immediately notified law enforcement agencies.”
  • “An investigation discovered the data relates to patients who visited Clay County Hospital clinics on or before February 2012. A hospital representative declined to disclose how many people are involved but said the data is limited to their names, addresses, Social Security numbers and dates of birth. No medical information was compromised in the breach”
  • “The hospital believes the data has not been released so far. It didn’t disclose how the data was obtained but said an audit by an outside expert concluded the hospital hadn’t been hacked.”
  • The age of the data suggests that the compromise may have involved backups and/or cold storage
  • It is not clear of the Hospital stores the older data themselves, or if they rely on a 3rd party provider that may have been compromised
  • “A recent report by the Identity Theft Report Center found that by early December there had been 304 breaches so far this year in the U.S. healthcare sector. That’s 42 percent of the 720 breaches reported across the country. But, in part because of the massive breaches at major retailers, the entire healthcare sector only accounted for 9.7 percent of all records compromised in reported breaches so far in 2014.”

Sony cancels the release of “The Interview” – plays the victim


Feedback:


Round Up:


The post Don’t Fire IT | TechSNAP 193 first appeared on Jupiter Broadcasting.

]]>
Bait and Phish | TechSNAP 181 https://original.jupiterbroadcasting.net/67657/bait-and-phish-techsnap-181/ Thu, 25 Sep 2014 11:21:20 +0000 https://original.jupiterbroadcasting.net/?p=67657 We’ll tell you about a major German hack that lasted 12 years, and struck over 300 business. Plus researchers discover a nasty Android bug that impacts over 70% of users. Then it’s a great big batch of your networking questions, our answers & much much more! Thanks to: Direct Download: HD Video | Mobile Video […]

The post Bait and Phish | TechSNAP 181 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll tell you about a major German hack that lasted 12 years, and struck over 300 business. Plus researchers discover a nasty Android bug that impacts over 70% of users.

Then it’s a great big batch of your networking questions, our answers & much much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Operation Harkonnen, a 12 year long intrusion to over 300 businesses

  • “From 2002 a German cybercrime network performed numerous targeted penetrations to over 300 organizations, including tier one commercial companies, government institutions, research laboratories and critical infrastructure facilities in the German speaking countries. The attackers planted Trojans in specific workstations in the organizations, gained access to sensitive confidential documents and information and silently exfiltrating them to the organizations who ordered the attack”
  • “Once embedded in the system the files started to send data from the target computer to an external domain. The analysis revealed the domain was registered by a UK company, with the exact address and contact details of 833 other companies, most of which are already dissolved”
  • “The British relatively tolerant requirements to purchasing SSL security certificates were exploited by the network to create pseudo legitimate Internet service names and to use them to camouflage their fraudulent activity”
  • Specifically, it is quite easy to establish a new company in England
  • It is estimated that the attackers spent as much as $150,000 establishing fake companies, and arming them with domains and SSL certificates in order to make their spear-phishing campaign appear more legitimate
  • “The discovery happened at a leading, 30 year old, 300 employees’ German organization that holds extremely sensitive information with a strategic value to many adverse organizations and countries. The organizational network contains 5 domains with complex architecture of multiple network segments and sites, connected through VPN.“
  • Additional Coverage: TheHackerNews

Researcher finds same-origin-policy bypass for Android browser, allows attacker to read your browser tabs

  • Android versions before 4.4 (75% of all current Android phones) are vulnerable
  • CVE-2014-6041, and was disclosed on September 1, 2014 by Rafay Baloch on his blog.
  • By malforming a javascript: URL handler with a prepended null byte, an attacker can avoid the Android Open Source Platform (AOSP) Browser’s Same-Origin Policy (SOP) browser security control.
  • What this means is, any arbitrary website (say, one controlled by a spammer or a spy) can peek into the contents of any other web page.
  • The attacker could scrape your e-mail data and see what your browser sees.
  • Or snag a copy of your session cookie and hijack your session completely, and read and write webmail on your behalf.
  • As part of its attempts to gain more control over Android, Google has discontinued the AOSP Browser.
  • Android Browser used to be the default browser on Google, but this changed in Android 4.2, when Google switched to Chrome.
  • The core parts of Android Browser were still used to power embedded Web view controls within applications, this changed in Android 4.4, when it switched to a Chromium-based browser engine.
  • Users of Android 4.0 and up can avoid much of the exposure by switching to Chrome, Firefox, or Opera, none of which should use the broken code.
  • Update: Google has offered the following statement:

We have reviewed this report and Android users running Chrome as their browser, or those who are on Android 4.4+ are not affected. For earlier versions of Android, we have already released patches (1, 2) to AOSP.


Feedback:


Round Up:


The post Bait and Phish | TechSNAP 181 first appeared on Jupiter Broadcasting.

]]>