Visa – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 21 Apr 2016 18:41:52 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Visa – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 One Key to Rule Them All | TechSNAP 263 https://original.jupiterbroadcasting.net/98991/one-key-to-rule-them-all-techsnap-263/ Thu, 21 Apr 2016 10:41:52 +0000 https://original.jupiterbroadcasting.net/?p=98991 This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that’s bribing the world & Researchers find a flaw in the visa database. All that plus a packed feedback, roundup & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video […]

The post One Key to Rule Them All | TechSNAP 263 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that’s bribing the world & Researchers find a flaw in the visa database.

All that plus a packed feedback, roundup & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

FBI says APT6 has pwning the government for the last 5 years

  • The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard
  • The official advisory is available on the Open Threat Exchange website
  • The alert, which is also available online, shows that foreign government hackers are still successfully hacking and stealing data from US government’s servers, their activities going unnoticed for years. This comes months after the US government revealed that a group of hackers, widely believed to be working for the Chinese government, had for more than a year infiltrated the computer systems of the Office of Personnel Management, or OPM. In the process, they stole highly sensitive data about several millions of government workers and even spies.
  • In the alert, the FBI lists a long series of websites used as command and control servers to launch phishing attacks “in furtherance of computer network exploitation (CNE) activities [read: hacking] in the United States and abroad since at least 2011.” Domains controlled by the hackers were “suspended” as of late December 2015, according to the alert, but it’s unclear if the hackers have been pushed out or they are still inside the hacked networks.
  • Looks like they were in for years before they were caught, god knows where they are,” Michael Adams, an information security expert who served more than two decades in the US Special Operations Command, and who has reviewed the alert, told Motherboard. “Anybody who’s been in that network all this long, they could be anywhere and everywhere.
  • “This is one of the earlier APTs, they definitely go back further than 2011 or whatever—more like 2008 I believe,” Kurt Baumgartner, a researcher at the Russian security firm Kaspersky Lab, told me. (Baumgartner declined to say whether the group was Chinese or not, but said its targets align with the interest of a state-sponsored attacker.)
  • Kyrk Storer, a spokesperson with FireEye, confirmed that the domains listed in the alert “were associated with APT6 and one of their malware backdoors,” and that the hackers “targeted the US and UK defense industrial base.” APT6 is ”likely a nation-state sponsored group based in China,” according to FireEye, which ”has been dormant for the past several years.”
  • Another researcher at a different security company, who spoke on condition of anonymity because he wasn’t authorized to speak publicly about the hacker’s activities, said this was the “current campaign of an older group,” and said there “likely” was an FBI investigation ongoing. (Several other security companies declined to comment for this story.) At this point, it’s unclear whether the FBI’s investigation will lead to any concrete result. But two years after the US government charged five Chinese military members for hacking US companies, it’s clear hackers haven’t given up attacking US targets.

Unaoil: the company that bribed the world

  • After a six-month investigation across two continents, Fairfax Media and The Huffington Post are revealing that billions of dollars of government contracts were awarded as the direct result of bribes paid on behalf of firms including British icon Rolls-Royce, US giant Halliburton, Australia’s Leighton Holdings and Korean heavyweights Samsung and Hyundai.
  • A massive leak of confidential documents, and a large email, has for the first time exposed the true extent of corruption within the oil industry, implicating dozens of leading companies, bureaucrats and politicians in a sophisticated global web of bribery.
  • The investigation centres on a Monaco company called Unaoil.
  • Following a coded ad in a French newspaper, a series of clandestine meetings and midnight phone calls led to our reporters obtaining hundreds of thousands of the Ahsanis’ leaked emails and documents.
  • The leaked files expose as corrupt two Iraqi oil ministers, a fixer linked to Syrian dictator Bashar al-Assad, senior officials from Libya’s Gaddafi regime, Iranian oil figures, powerful officials in the United Arab Emirates and a Kuwaiti operator known as “the big cheese”.
  • Western firms involved in Unaoil’s Middle East operation include some of the world’s wealthiest and most respected companies: Rolls-Royce and Petrofac from Britain; US companies FMC Technologies, Cameron and Weatherford; Italian giants Eni and Saipem; German companies MAN Turbo (now know as MAN Diesal & Turbo) and Siemens; Dutch firm SBM Offshore; and Indian giant Larsen & Toubro. They also show the offshore arm of Australian company Leighton Holdings was involved in serious, calculated corruption.
  • The leaked files reveal that some people in these firms believed they were hiring a genuine lobbyist, and others who knew or suspected they were funding bribery simply turned a blind eye.
  • The files expose the betrayal of ordinary people in the Middle East. After Saddam Hussein was toppled, the US declared Iraq’s oil would be managed to benefit the Iraqi people. Today, in part one of the ‘Global Bribe Factory’ expose, that claim is demolished.
  • It is the Monaco company that almost perfected the art of corruption.
  • It is called Unaoil and it is run by members of the Ahsani family – Monaco millionaires who rub shoulders with princes, sheikhs and Europe’s and America’s elite business crowd.
  • How they make their money is simple. Oil-rich countries often suffer poor governance and high levels of corruption. Unaoil’s business plan is to play on the fears of large Western companies that they cannot win contracts without its help.
  • Its operatives then bribe officials in oil-producing nations to help these clients win government-funded projects. The corrupt officials might rig a tender committee. Or leak inside information. Or ensure a contract is awarded without a competitive tender.
  • On a semi-related note, another big story for you to go read:
  • How to hack an Election from someone who has done it, more than once

Researchers find flaw in Visa database

  • No, not that kind of Visa, the other one.
  • Systems run by the US State Department, that issue Travel Visas that are required for visitors from most countries to be admitted to the US
  • This has very important security considerations, as the application process for getting a visa is when most security checks are done
  • Cyber-defense experts found security gaps in a State Department system that could have allowed hackers to doctor visa applications or pilfer sensitive data from the half-billion records on file, according to several sources familiar with the matter –- though defenders of the agency downplayed the threat and said the vulnerabilities would be difficult to exploit.
  • Briefed to high-level officials across government, the discovery that visa-related records were potentially vulnerable to illicit changes sparked concern because foreign nations are relentlessly looking for ways to plant spies inside the United States, and terrorist groups like ISIS have expressed their desire to exploit the U.S. visa system, sources added
  • After commissioning an internal review of its cyber-defenses several months ago, the State Department learned its Consular Consolidated Database –- the government’s so-called “backbone” for vetting travelers to and from the United States –- was at risk of being compromised, though no breach had been detected, according to sources in the State Department, on Capitol Hill and elsewhere.
  • As one of the world’s largest biometric databases –- covering almost anyone who has applied for a U.S. passport or visa in the past two decades -– the “CCD” holds such personal information as applicants’ photographs, fingerprints, Social Security or other identification numbers and even children’s schools.
  • “Every visa decision we make is a national security decision,” a top State Department official, Michele Thoren Bond, told a recent House panel.
  • Despite repeated requests for official responses by ABC News, Kirby and others were unwilling to say whether the vulnerabilities have been resolved or offer any further information about where efforts to patch them now stand.
  • State Department documents describe CCD as an “unclassified but sensitive system.” Connected to other federal agencies like the FBI, Department of Homeland Security and Defense Department, the database contains more than 290 million passport-related records, 184 million visa records and 25 million records on U.S. citizens overseas.
  • “Because of the CCD’s importance to national security, ensuring its data integrity, availability, and confidentiality is vital,” the State Department’s inspector general warned in 2011.

Feedback:


Round Up:


The post One Key to Rule Them All | TechSNAP 263 first appeared on Jupiter Broadcasting.

]]>
Tough Market | CR 201 https://original.jupiterbroadcasting.net/98926/tough-market-cr-201/ Mon, 18 Apr 2016 09:19:21 +0000 https://original.jupiterbroadcasting.net/?p=98926 In this episode, Noah joins Chris to talk about the whole hiring process & experiences they’ve had while also taking a look back into the past of the show to some of the more interesting topics on the matter. Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | OGG Audio | […]

The post Tough Market | CR 201 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In this episode, Noah joins Chris to talk about the whole hiring process & experiences they’ve had while also taking a look back into the past of the show to some of the more interesting topics on the matter.

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Patreon

— Show Notes: —

Episode Links

The post Tough Market | CR 201 first appeared on Jupiter Broadcasting.

]]>
Get Back to the ’50s | CR 130 https://original.jupiterbroadcasting.net/72752/get-back-to-the-50s-cr-130/ Mon, 01 Dec 2014 16:30:48 +0000 https://original.jupiterbroadcasting.net/?p=72752 That tech worker “shortage” Facebook and Microsoft keep telling you about is bogus. We’ll go over the study and reports that back that claim up. Then we dig into the rather understandable reasons why developers wages are being pushed down & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | […]

The post Get Back to the '50s | CR 130 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

That tech worker “shortage” Facebook and Microsoft keep telling you about is bogus. We’ll go over the study and reports that back that claim up. Then we dig into the rather understandable reasons why developers wages are being pushed down & more!

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

— Show Notes: —

Feedback / Follow Up:

Dev Hoopla:

The Tech Worker Shortage Doesn’t Really Exist

“There’s no evidence of any way, shape, or form that there’s a shortage in the conventional sense,” says Hal Salzman, a professor of planning and public policy at Rutgers University. “They may not be able to find them at the price they want. But I’m not sure that qualifies as a shortage, any more than my not being able to find a half-priced TV.”

The post Get Back to the '50s | CR 130 first appeared on Jupiter Broadcasting.

]]>
FizzBuzzed! | CR 62 https://original.jupiterbroadcasting.net/41452/fizzbuzzed-cr-62/ Mon, 12 Aug 2013 10:54:44 +0000 https://original.jupiterbroadcasting.net/?p=41452 The guys share the horror stories from interviews they’ve conducted that went horribly wrong. Plus a few tips for getting a gig.

The post FizzBuzzed! | CR 62 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Hiring can be a real pain in the butt. The guys share the horror stories from interviews they’ve conducted that went horribly wrong. Plus a few tips for getting a gig.

Then the guys chew on the dev hoopla of the week, and read some great emails.

Thanks to:

Use our code coder249 to get a .COM for $2.49.

 

Visit dirwiz.com/unitysync use code coder for an extended trial and a year of maintenance.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

Dev World Hoopla

Infosys allegedly achieved this ratio \”by directly discriminating against individuals who are not of South Asian decent in hiring, by abusing the H-1B visa process to bring workers of South Asian descent into the country rather than hiring qualified individuals already in the United States, and by abusing the B-1 visa system to bring workers of South Asian descent into the United States to perform work not allowed by their visa status rather than hiring individuals already in the United States to perform the work.\” Infosys \”used B-1 visa holders because they could be paid considerably lower wages than other workers including American-born workers,\” the lawsuit states.

Interviewing

The \”Fizz-Buzz test\” is an interview question designed to help filter out the 99.5% of programming job candidates who can\’t seem to program their way out of a wet paper bag.
The text of the programming assignment is as follows:

Fizz buzz (also known as bizz buzz, or simply buzz) is a group word game for children to teach them about division.[1] Players take turns to count incrementally, replacing any number divisible by three with the word \”fizz\”, and any number divisible by five with the word \”buzz\”.

Like me, the author is having trouble with the fact that 199 out of 200 applicants for every programming job can\’t write code at all. I repeat: they can\’t write any code whatsoever.

Book Pick:

[asa]0735611319[/asa]

Follow the show

The post FizzBuzzed! | CR 62 first appeared on Jupiter Broadcasting.

]]>
Digital Wallets | J@N | 5.17.11 https://original.jupiterbroadcasting.net/8361/digital-wallets-jn-5-17-11/ Tue, 17 May 2011 21:29:00 +0000 https://original.jupiterbroadcasting.net/?p=8361 We look at Near-Field Communication technology, and the concept of ‘digital wallets' and which big players in the tech industry appear to be getting behind NFC

The post Digital Wallets | J@N | 5.17.11 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

All this week on J@N, we’re talking about technology that will fundamentally change the way that we interact with the world around us.

For the first round, we’re going to take a look at Near-Field Communication technology, and the concept of ‘digital wallets.’ Several big players in the tech industry appear to be getting behind this innovation, as well as at least one notable financial institution!

Could this technology replace our need for physical wallets, and even our car or house keys? Tune in to find out our thoughts on how this could reshape the future as we know it.

Show Feeds:

[ad#shownotes]

Show Notes:

Digital wallets / NFC tech
VISA commercial about paying with phones
Visa Digital Wallet Accelerates Mobile-Payments Race
Experimenting with NFC check-ins for Google I/O
Next iPhone will not have NFC chip, BUT
NFC payments appearing in Apple stores leading to speculation that the iPhone 5 will have this capability as part of its core functionality.

Google also showed off NFC capabilities at Google I/O, but used for controlling external devices, not for transmitting data for transactions.
Google Places already using decals to transmit data to mobile devices using NFC.

Download:

The post Digital Wallets | J@N | 5.17.11 first appeared on Jupiter Broadcasting.

]]>