HJDL9: Security

Share:

Listens: 0

HARAJUKU DATA LAKE

Technology


In this week's episode, Morris and Sergio chat about security: Sergio's background in security, pen testing, the evolution of security threats, security auditing, defensive practices, careers in security, and recent developments.Show NotesFollow us on Twitter!Like us on Facebook!Rate us in iTunesSubscribe in OvercastChanging your Windows 3.1 Wallpaper. Incidentally, this is what the web looked like in the 90s: Loud colorful repeating background images, completely nonstandard navigation, strange text colors, a simple list with no context, and a link (‘unzip’) pointing directly at an EXE file on an FTP server.Intros are tiny demos. A couple modern 4k intros. 1kb JavaScript intros.Animate (YouTube) was the 4k intro that blew Morris’ mind in 1995. He never imagined his 386 PC was capable of realtime 3D animation, let alone that it could be produced by a 4KB executable.Black hat (Wikipedia)Stuxnet (Wikipedia)Evolution of Security Threats (PDF) The first five slides of this presentation provide an excellent overview of how security threats have evolved.Zero day (Wikipedia)Hacking Team (Wikipedia) A cybersecurity firm that has been criticized for providing surveillance tools to oppressive governments.Black Lives Matter organizers monitored by a cyber security firm (Mother Jones)Penetration test (Wikipedia)Chaos Monkey (Netflix)HJDL Episode 7: IoT SecurityIntent to Deprecate and Remove: Trust in Existing Symantec-Issued Certificates (Hacker News)Let’s Encrypt and Phishing SitesCeci n’est pas une pipeMacBook Pro’s new Touch Bar is powered by iOS (Cult of Mac)“The hidden dangers inside the platform” by Mickey Shkatov & Jesse Michael (YouTube). Two security researchers from Intel demonstrate a hack targeting an LTE modem inside a tablet.Behavioral Game Theory in Defensive Security (SlideShare) by Kelly ShortridgeGoogle’s Project Zero