贵州11先5开奖结果:Symantec Cyber Security Brief Podcast

贵州十一选五开奖走势图 www.lrxsa.cn Your weekly dose of cyber security news, hosted by threat researchers from Symantec Security Response

Episodes

Posted:

Highlights from RSA Conference 2019

In this week's Cyber Security Brief, we chat about some of the highlights from this year's RSA conference including zero trust security, tackling fake news, the impending 5G network, IoT security, and a Symantec demonstration showing how much damage attackers can carry out in under seven minutes.

Download
Posted:

ISTR Special: Enterprise

This week’s Cyber Security Brief is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman, and Candid Wueest discuss some of the events and trends that affected enterprises the most in 2018.

Download
Posted:

ISTR Special: Consumers

This week’s Cyber Security Brief is the first of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman and Candid Wueest take a look at the 2018 events and trends that hit consumers the most.

Download
Posted:

Google backtracks, Apple gets sued, and Australia a victim of state-sponsored cyber attack

In this week’s Cyber Security Brief podcast, we recap Google’s decision to backtrack on proposed changes to its Chrome web browser that would have rendered many ad blocking extensions inoperable. We also discuss the two security issues that were recently addressed by Facebook, including one that could have allowed accounts to be taken over. We also chat about another batch of online accounts that have been put up for sale on the dark web, the man who is suing Apple because he doesn’t like 2FA, and the “sophisticated state actor” reportedly responsible for cyber attacks targeting Australia’s parliament and a number of its political parties. And also, two UK soaps team up for a cyber security special…

Download
Posted:

Stolen data for sale, Mac malware, and container vulnerabilities

In this week’s Cyber Security Brief, we chat about a slew of stolen online account data found for sale on the dark web, malware targeting Macs, and container vulnerabilities. Also this week, we look at a Wi-Fi connected USB cable that can allow for remote attacks on targeted computers.

Download
Posted:

Insecure IoT devices, password breach checks, and misleading phone apps

In this week’s Cyber Security Brief, we discuss a bad week for cryptocurrencies, the new Google Chrome extension that will let you know if your password has been breached, why parents should be wary of kids’ smartwatches, and why we all should be wary of phone apps that promise to make you look beautiful. Plus, we chat about the experience of one Illinois family who felt the heat after their suite of Nest devices was hacked.

Download
Posted:

Japan to hack civilians’ IoT devices, Apple Facetime bug, and an evolution in BEC scams

In this week’s Symantec Cyber Security Brief we discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.

Download
Posted:

Attacks on financial institutions in Africa, dodgy free mobile VPN apps, and Facebook shutters multiple “inauthentic” accounts

On this week’s Cyber Security Brief podcast, Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform.

Download
Posted:

Ukrainians indicted, cash for Tesla hacks, and cryptocurrency exchanges breached

In this week’s Cyber Security Brief, we discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage.

Download
Posted:

German data leak, untrustworthy IoT devices, and PewDiePie hackers go quiet

Welcome to the first Cyber Security Brief podcast of 2019! On this week’s episode we discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.

Download
Posted:

What Were the Top 5 Cyber Security Stories of 2018?

In the final Cyber Security Brief podcast of 2018, we take a look back at the year that has gone by in cyber security, and count down the top 5 biggest cyber security stories of 2018. Listen to find out what we thought they were!

Download
Posted:

Money mule arrests, grandparent scams, and new research into the Seedworm group

On this week’s Cyber Security Brief podcast, money is a big theme! We discuss a series of heists on banks in Eastern Europe that sound like something out of a Hollywood movie, a rise in the money lost to so-called “grandparent scams”, a crackdown by cops on money mules operating throughout Europe, and a new twist to the sextortion email scams we have previously discussed on this podcast. Also this week, we chat about new research Symantec has just published into the Seedworm group (aka Muddywater), which has hit more than 130 victims in 30 organisations since September 2018.

Download
Posted:

SamSam developments, an AI gaffe, and some massive data breaches

In this week’s Cyber Security Brief, we discuss the latest developments in the SamSam ransomware, with two of the people reportedly behind the ransomware having been recently indicted. Dick O’Brien, Candid Wueest and Brigid O Gorman also discuss the recent huge data breach at the Marriot-owned Starwood chain of hotels, as well as a large breach at Q & A website Quora. The hacker who hijacked 50,000 printers to spam people to support infamous YouTuber PewDiePie, a gaffe by an AI jaywalking detection system in a city in China, and malicious fitness apps on the Apple App Store are also up for discussion.

Download
Posted:

Operation Eversion, Magecart, and the UK parliament takes on Facebook

On this week’s Cyber Security Brief, we discuss Symantec’s role in an FBI takedown of ad-fraud infrastructure dubbed Operation Eversion. We also discuss the latest developments in the Facebook/Cambridge Analytica scandal, as well as the most recent activity from Magecart. Also, the dangers of most phishing sites having the padlock sign beside their address, and the curious incident of a security researcher who responsibly reported a vulnerability but was still subsequently reported to the police.

Download
Posted:

Special Report: Conficker’s 10th anniversary

On this week’s episode of the Cyber Security Brief, Brigid O Gorman is joined by Candid Wueest to discuss the infamous Conficker worm, which marks its 10th anniversary this week. This worm first appeared on November 21, 2008, and despite the many changes that have occurred in the cyber security landscape since then we still see hundreds and thousands of detections of Conficker in the wild today. As well as Conficker, we also discuss some of the other old threats that are still around today – and speculate as to whether any of today’s threats are likely to have similar longevity.

Download
Posted:

Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions

In this week’s Cyber Security Brief podcast, Dick O’Brien, Candid Wueest and Brigid O Gorman discuss new research into formjacking and the Megecart group; a subsidiary of French movie chain Pathe loses more than $20 million in a Business Email Compromise (BEC) scam, and a whole slew of vulnerabilities get patched.

Download
Posted:

Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk

In this week’s Cyber Security Brief podcast we discuss the FASTCash attacks, in which the Lazarus group has been emptying ATMs, and highlight the research we have published into this activity. We also discuss a new report highlighting small businesses’ cyber risk, the Inception Framework using a new backdoor, and a vulnerability in a building management software.

Download
Posted:

SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking

In this week’s Cyber Security Brief podcast we discuss our newly-published research into the SamSam ransomware, exposed Docker APIs being used for cryptojacking, and some new activity from the Emotet botnet. With the midterm elections in the U.S. fast approaching we also take a look at some of the election security stories that have come up in the last week. Finally, we discuss a cautionary tale underlining why you shouldn’t use your work laptop to visit “adult” websites.

Download
Posted:

Super Micro spy chip story contradictions, Russian woman indicted in U.S. for conspiring to interfere in U.S. elections, and Twitter tackles disinformation campaigns

In this week’s Cyber Security Brief podcast, we discuss the claims and counter claims related to the Bloomberg Businessweek story published at the start of October that alleged Chinese spies had infiltrated U.S. companies by implanting secret chips on Super Micro motherboards – a story that has been rebutted by almost all the companies mentioned in it, including Super Micro itself, Apple and Amazon. With calls from those companies now for Bloomberg to retract the story, we discuss this ongoing saga. Also in the last week, a Russian woman was indicted in the U.S. on charges of playing a role in a conspiracy to interfere in the U.S. political system, meanwhile, Twitter released a huge trove of tweets it had identified that were attempting to influence political campaigns in the last couple of years. We consider the significance of that move from the social media giant.

Download
Posted:

Special Report: What is it Really Like to Work in Cyber Security?

Something a little different this week as we take a behind-the-scenes look at life in Symantec. Dick O’Brien chats to three Symantec engineers working in different parts of the company, and at different stages in their careers, to find out what it is really like to work as an engineer in a cyber security firm. Dick is joined by Symantec engineers Sayali Kulkarni, Conor Murray and Eric Chien to discuss the evolution of their careers in cyber security.

Download
Posted:

Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation

In this week’s Cyber Security Brief, Dick O’Brien is joined by Symantec threat researchers Jon DiMaggio and Candid Wueest to discuss the big cyber security stories of the last week. We talk about Symantec’s latest research on a previously-unknown attack group called Gallmaker, which is using “living off the land” and publicly-available hack tools to target organizations in the government and defense sectors. We also discuss the hack of the SpankChain cryptocurrency project, the breach at Garmin-owned boating app Navionics, and how Fitbit data has been used in a murder investigation.

Download
Posted:

APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone

In this week’s Symantec Cyber Security Brief we discuss two of our recently-published pieces of research. First, we are joined by Threat Analyst Stephen Doherty to discuss the recent activity of APT28 (aka Swallowtail, Fancy Bear), which made headlines in 2016 due to its involvement in cyber attacks against an organisation involved in the U.S. presidential election. Then, we talk about our newly published whitepaper examining the topic of cryptojacking – one of the hottest subjects in the world of cyber security in 2018. Finally, we discuss a first-of-its-kind case in the U.S. where a criminal suspect was forced by the FBI to use Face ID to unlock his iPhone.

Download
Posted:

Formjacking research, WordPress plugins cause problems, the dangers of plaintext password storage, and the Mojave zero day

In this week’s Symantec Cyber Security Brief, we discuss recent research Symantec has published on formjacking, as well as the formjacking attacks that have been carried out by the Magecart group. We also discuss how outdated plugins are allowing malicious code to be injected into WordPress sites, the Apple macOS Mojave zero day, and why it’s never a good idea for companies to store their customers’ passwords in plaintext.

Download
Posted:

Xbash threat, TripAdvisor fake review clampdown, blockchain casinos targeted, and who is behind DDoS attacks on UK unis?

On this week’s podcast Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the biggest cyber security stories of the week. We take a look at the newly-discovered Xbash malware family and what it can do, as well as discussing the first case of its kind where a man was convicted and imprisoned for writing fake reviews on TripAdvisor. Also, we look at some recent hacks against blockchain casinos, and speculate on the likely perpetrators behind DDoS attacks on UK university networks.

Download
Posted:

Deep Dive: Symantec Takes on Software Supply Chain Attacks

Dick O’Brien is joined by Symantec product manager Arvind Rao and architect Haik Mesropian to discuss their work, and what they are doing to combat software supply chain attacks, the products they are building, and how they are hoping their efforts will help developers combat these attacks.

Download
Posted:

One billion dollars in Bitcoin on the move, data breaches, Mastercard and Google’s info-sharing deal, and MikroTik developments

In this week’s podcast we discuss how insiders are often the ones to blame for data breaches, and how often data breaches are caused by human error more often than malicious attackers. We look at the implications of a deal between Mastercard and Google that allows advertisers to figure out how effective their ads are at getting consumers to make purchases in the real world, and a development in the MikroTik routers hack. Also, we discuss $1 billion in Bitcoin that has suddenly started to move – and ask who might be in control of it?

Download
Posted:

Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments

On this week’s podcast we discuss the DNC “hack” that wasn’t, developments on dark web marketplaces, and the release of a Windows zero day on Twitter. We also discuss the Andromeda botnet, following the release from prison of one of the people accused of being behind it.

Download
Posted:

How much do your mobile apps really know about you? Is your charging cable safe? And is end-to-end encryption under threat?

This week, Dick O’Brien is joined by Symantec threat researcher Gillian Cleary, who discusses her recent research into the 100 most popular mobile apps, and how much information they are really gathering about their users. We also discuss an attack dubbed USBHarpoon that turns USB charging cables malicious, and we look at a court case in the U.S. where the government is reportedly attempting to compel Facebook to break the encryption on its Messenger service.

Download
Posted:

Special Report: Financial Threats

This week we bring you a special podcast taking an in-depth look at the financial threats cyber crime landscape. Brigid O’Gorman is joined by Symantec threat analysts Stephen Doherty and Eric Chien to discuss the threats facing both banking consumers and banks themselves. We also discuss the Lazarus group’s role in recent high-value attacks targeting financial institutions, and talk about the future of the financial threats landscape.

Download
Posted:

“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat

In this week’s cyber security news round-up, we chat about Threat Intel’s Liam O’Murchu’s Black Hat presentation: How To Use Machine Learning to Discover New Targeted Attacks. We also discuss the Snapchat source code leak, the coin mining campaign targeting MikroTik routers, and the concept of “security through obscurity” – adding more bugs to code to make it harder for black hat hackers to figure out which bugs are the exploitable ones.

Download
Posted:

Coin mining in games, SIM hijacking, connected car vulnerabilities, and attacks on the software supply chain within the supply chain

Welcome to your weekly cyber security news round-up. This week we discuss the simple-seeming game that was exploiting users’ CPU to mine cryptocurrency. We look at the story of prisoners in the U.S. who hacked their prison-issued tablets, and discuss the teen who stole $5 million through SIM hijacking. We also consider some of the issues that can arise when you buy second-hand connected cars and, yet again, we cover another attack on the software supply chain.

Download
Posted:

Leafminer research, data breaches, credential stuffing, and IoT security fails

In this week’s round-up of all things cyber security we discuss newly-released research from Symantec detailing the activity of Leafminer, a threat actor carrying out campaigns that target organisations in the Middle East. We also discuss the continuing problem of data breaches, and how these can facilitate credential stuffing attacks by cyber criminals. The Internet of things (IoT), and the security failures that often occur in that space, is also up for discussion.

Download
Posted:

Powershell risks, extortion scams that threaten embarrassment, Twitter clamps down on dodgy accounts, and the financial impact of data breaches

This week we look back at the week that was in cyber security. Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the latest research Symantec has just published about how Powershell is being leveraged by malicious actors. We also discuss extortion scams where people are tricked into transferring money to scammers who claim they have video of them visiting adult websites, how Twitter is trying to clean up its platform, and the financial cost of data breaches for business.

Download
Posted:

Special Report: Software Update Supply Chain Attacks

In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 percent between 2016 and 2017, with at least one attack every month in 2017. Dick O’Brien is joined by Symantec threat researchers Candid Wueest and Gavin O’Gorman to discuss this surge in attacks, and also to talk about two high-profile examples of these kind of attacks: the Petya/NotPetya and CCleaner attacks.

Download
Posted:

Mid-year review: Some of the biggest stories of 2018 so far, including VPNFilter, Orangeworm, and Meltdown and Spectre

In this week’s podcast we take a look back at the first six months of the year, and review some of the biggest cyber security stories. We discuss VPNFilter, a router malware that, unusually, is able to survive the router being rebooted, as well as highlighting the tool that Symantec has released to tell users whether or not their router is infected with VPNFilter. We also look back at investigations into the Orangeworm and Inception Framework attack groups, as well as reviewing the impact of the Meltdown and Spectre bugs. Finally we look to the world of IoT and discuss smart locks, and if they’re really as smart as they claim to be…

Download
Posted:

Ticketmaster breach, insider attacks, the issue of legacy systems in businesses, and is encrypted ransomware a new trend?

In this week’s essential cyber security news round-up, we discuss the recent data breach at Ticketmaster, and also look at encrypted ransomware and wonder whether it's set to become a new trend. Also, after news broke last week that an employee at Tesla had been caught changing code and passing sensitive company information to third parties, we discuss the dangers of insider threats for business, and we also look at the reasons why, in a recent survey, almost 90 percent of UK businesses admitted to running legacy systems in order to keep data accessible.

Download
Posted:

New Symantec research on the Thrip cyber espionage group, BEC scammers, and coinminers in court in Japan

We discuss a major law enforcement operation against Business Email Compromise (BEC) scammers, an interesting court case in Japan regarding the legality of browser-based coinmining, and we also talk to Jon Di Maggio, the Symantec investigator responsible for our latest research into the cyber espionage group Thrip.

Download