Blog

2017 DerbyCon Podcaster's Podcast

Critical Security Controls: Part 1 (with Brian Ventura)

Critical Security Controls: Part 1 (with Brian Ventura) (WITH BRIAN VENTURA) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 23 GUEST: BRIAN VENTURA October 24, 2016 If you enjoy this podcast, be sure to give …

2017 DerbyCon Podcaster's Podcast

Intro to App Sec (with Frank Rietta)

This episode we discuss Application Security (App Sec) from a high level and graze the surface on a few other vital security concepts and frameworks. We also discuss local happenings in the Security Community and other relevant topics in security.

US Elections Hacked?

Cybersecurity & the US 2016 Presidential Election

First, I would like to thank you for reading this blog post. It is the first of two, maybe more, parts. Before we get started, read the three disclaimers below. …

BSides Knoxville (with Roger Seagle)

CSA Treacherous 12 Concerns: 1-4

Cloud Security is nothing new. However, it is growing in implementation and popularity. This is causing a ripple effect in terms of attacks originating in the cloud, attacking assets in the cloud, and using cloud resources for availability attacks. The purpose of this podcast is to discuss the CSA Treacherous 12 Concerns.

petya

Jam Session: Ransomware Threat In 2016

We all know that Ransomware is a PITA (Pain in the ___). This podcast, we discuss modern examples, infection vectors, mitigations, and root causes. This podcast is meant to start the discussion with management to begin to prevent malware infections instead of scramble to decrypt files or pay the extortionists.

Qatar Bank Breached after Bangladesh

Qatar Bank Breached After Bangladesh

Qatar Bank Breached After Bangladesh  It’s been quite the week for the banking industry with multiple headlining hacks occurring throughout the world with Qatar National Bank being the latest victim.  …

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD …with a $10 router …and NO firewall …We’re NOT making this up… The Bangladesh’s Central Bank was hacked in February 2016 that stole $80 million (they …

2017 DerbyCon Podcaster's Podcast

Mobile Insecurity (with Georgia Weidman)

Everyone wants to think about how secure they are. This podcast flips the script and assesses insecurity, specifically Mobile Insecurity. We discuss issues within the mobile computing ecosystem.

1. Current Event: Apple Quick Time and why could it not have been Flash. Georgia’s dad still uses Microsoft XP and won’t connect his printer to the network.
2. Georgia delivers her “Mobile Insecurity” talk and we discuss issues in the mobile threat landscape and possible mobile issues.
3. Mobile Malware, Ransomware, and MDM are discussed. Issues within the actual mobile Operating Systems are discussed briefly.
4. Joe asks if Georgia sees mobile devices distributing Ransomware and Malware to cars.
5. Quick banter of Apple vs FBI and the implications of the precedent both attempted and actually set.

AVG

AVG Exposes 9 Million Users’ Data with Chrome Plugin

AVG Exposes 9 Million Users’ Data with Chrome Plugin In today’s ever-growing cyber world, consumers look to cyber security giants for 24-hour support and protection, but we are constantly reminded …

4 Things to Know About Ransomware

Top 5 Cybersecurity Threats in 2015

Top 5 Cybersecurity Threats in 2015   In this week’s Top 5 review we will be discussing the Top 5 cybersecurity vulnerabilities and threats in 2015.  This isn’t designed to be …

U.S. House Approves E-Mail Bill

Congress Pushes Revamped CISPA

Congress Pushes Revamped CISPA It seems as if the US Congress is back in the business of making “powerful friends” again. By friends, I mean enemies. This time, it is …

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability Carnegie Mellon University CERT database has published a vulnerability notice regarding the newest security vulnerability that affects Long Term Evolution (LTE) mobile networks. Per …

NSA breaks 1024-bit encryption

NSA breaks 1024-bit encryption | NSA

NSA breaks 1024-bit encryption According to a recent article by Alex Halderman and Nadia Heninger, what most people feared in the cryptography fields looks all too real, the NSA is in the …

Beware: US Elections Phishing, Malware, & Hoaxes

Donald Trump’s Hotels Infected with Malware

Everything seems to be going the right way for Presidential Candidate Donald Trump lately, until yesterday that is. Trump Hotel Collection (“THC”) released a legal statement (Trump Hotel Collection, 2015) …

Cyber Security and the Automobile Industry

Cyber Security and the Automobile Industry

Cyber Security and the Automobile Industry   In the wake of several other cyber security blunders in the automobile industry as of late, namely (Tesla) and (Chrysler), Volkswagen is now …