<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/_hSKbGFl" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>The Host Unknown Podcast</title>
    <description>Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails.

With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them),  it is with a combination of luck and utter lack of good judgement that a show is ever produced and released.

Host Unknown is available for sponsorship, conferences, other web shows or indeed anything that pays a little bit of money to keep the debt collectors away. You can contact them at contact@hostunknown.tv for details</description>
    <copyright>All rights reserved - Hands Off!</copyright>
    <language>en</language>
    <pubDate>Wed, 4 Mar 2026 10:15:26 +0000</pubDate>
    <lastBuildDate>Wed, 4 Mar 2026 10:15:37 +0000</lastBuildDate>
    <image>
      <link>https://podcast.hostunknown.tv</link>
      <title>The Host Unknown Podcast</title>
      <url>https://image.simplecastcdn.com/images/56d09b53-f126-47be-840c-5fde5a6d15ea/29fc74ff-826a-4382-9ff9-f71ad343e485/3000x3000/avatars-000145974577-kah3ks-original.png?aid=rss_feed</url>
    </image>
    <link>https://podcast.hostunknown.tv</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails.

With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them),  it is with a combination of luck and utter lack of good judgement that a show is ever produced and released.

Host Unknown is available for sponsorship, conferences, other web shows or indeed anything that pays a little bit of money to keep the debt collectors away. You can contact them at contact@hostunknown.tv for details</itunes:summary>
    <itunes:author>Host Unknown, Javvad Malik, Andrew Agnes, Thom Langford</itunes:author>
    <itunes:explicit>true</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/56d09b53-f126-47be-840c-5fde5a6d15ea/29fc74ff-826a-4382-9ff9-f71ad343e485/3000x3000/avatars-000145974577-kah3ks-original.png?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/_hSKbGFl</itunes:new-feed-url>
    <itunes:keywords>rant of the week, tweet of the week, billy big balls of the week, host unknown, infosec, this week in infosec, cyber security, risk management, hackers, cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>Host Unknown</itunes:name>
      <itunes:email>thom@tl2security.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Entrepreneurship"/>
    </itunes:category>
    <itunes:category text="Comedy">
      <itunes:category text="Improv"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">3facabf6-20e4-4f4f-a890-e526ebc96de2</guid>
      <title>233: Doorbell surveillance, Audits, and Office Space</title>
      <description><![CDATA[<p>19th February 1999:</p>
<p>The movie "Office Space" was released. With a budget of $10 million, it grossed a measly $13 million worldwide, but became a cult classic with its homage to Superman III's salami slicing and Jennifer Aniston's rant against 37 pieces of flair. Now where's my stapler?</p>
<p>It's a masterclass in a fraud , a segregation of duties failure, or a monitoring gap — but back in 1999, it was just a comedy plot.</p>
<p><a href="https://www.404media.co/leaked-email-suggests-ring-plans-to-expand-search-party-surveillance-beyond-dogs/" rel="noopener noreferrer">Leaked Email Suggests Ring Plans to Expand ‘Search Party’ Surveillance Beyond Dogs</a></p>
<p>Ring’s controversial, AI-powered “Search Party” feature isn’t intended to always be limited only to dogs, the company’s founder, Jamie Siminoff, told Ring employees in an internal email obtained by 404 Media</p>
<p><a href="https://x.com/it_unprofession/status/2024506010488946926" rel="noopener noreferrer">Just found out we’re being audited by our cyber insurance provider </a></p>
<p>Industry news </p>
<p>Tweet of the week<br><a href="https://x.com/whoaish/status/2024344477465456936" rel="noopener noreferrer">https://x.com/whoaish/status/2024344477465456936</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 4 Mar 2026 10:15:26 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/233-doorbell-surveillance-audits-and-office-space-hF3aHtpu</link>
      <content:encoded><![CDATA[<p>19th February 1999:</p>
<p>The movie "Office Space" was released. With a budget of $10 million, it grossed a measly $13 million worldwide, but became a cult classic with its homage to Superman III's salami slicing and Jennifer Aniston's rant against 37 pieces of flair. Now where's my stapler?</p>
<p>It's a masterclass in a fraud , a segregation of duties failure, or a monitoring gap — but back in 1999, it was just a comedy plot.</p>
<p><a href="https://www.404media.co/leaked-email-suggests-ring-plans-to-expand-search-party-surveillance-beyond-dogs/" rel="noopener noreferrer">Leaked Email Suggests Ring Plans to Expand ‘Search Party’ Surveillance Beyond Dogs</a></p>
<p>Ring’s controversial, AI-powered “Search Party” feature isn’t intended to always be limited only to dogs, the company’s founder, Jamie Siminoff, told Ring employees in an internal email obtained by 404 Media</p>
<p><a href="https://x.com/it_unprofession/status/2024506010488946926" rel="noopener noreferrer">Just found out we’re being audited by our cyber insurance provider </a></p>
<p>Industry news </p>
<p>Tweet of the week<br><a href="https://x.com/whoaish/status/2024344477465456936" rel="noopener noreferrer">https://x.com/whoaish/status/2024344477465456936</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38964287" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/13f4f3aa-8629-4025-9c27-6278dc868ad8/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/audio/group/b5341d3b-c315-4fdc-8cd6-3e1e60c28553/group-item/131ce76d-f9ef-4095-b5f7-fa3b413b7f02/128_default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>233: Doorbell surveillance, Audits, and Office Space</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:40:35</itunes:duration>
      <itunes:summary>This week in Infosec asks us all “what would you say you do here?

Rant of the week is the Orwellian nightmare coming true

Billy Big Balls Is a new story about how we used to do things in the old days (isn’t that right Andy?)

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week proves that disappointing our parents happens whomever you are</itunes:summary>
      <itunes:subtitle>This week in Infosec asks us all “what would you say you do here?

Rant of the week is the Orwellian nightmare coming true

Billy Big Balls Is a new story about how we used to do things in the old days (isn’t that right Andy?)

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week proves that disappointing our parents happens whomever you are</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>233</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5540349c-7755-49cd-a185-2a26b8fff3c2</guid>
      <title>232: Back with the glass smash</title>
      <description><![CDATA[<p>This week in Infosec reminds us of the real reason we click on links</p><p>Rant of the week is going to put a lot of Parisien street artists out of work</p><p>Billy Big Balls proves that on the internet nobody knows you are a dog</p><p>Industry News brings us the latest and greatest security news stories from around the world</p><p>And</p><p>Tweet of the Week makes Thom wonder when Fat Thursdays are coming to the UK</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 17 Feb 2026 23:07:48 +0000</pubDate>
      <author>thom@tl2security.com (javvad malik, Sirjester, old man, thom langford, andrew agnes, Cynic)</author>
      <link>https://podcast.hostunknown.tv/episodes/232-back-with-the-glass-smash-mt0Y6rJL</link>
      <content:encoded><![CDATA[<p>This week in Infosec reminds us of the real reason we click on links</p><p>Rant of the week is going to put a lot of Parisien street artists out of work</p><p>Billy Big Balls proves that on the internet nobody knows you are a dog</p><p>Industry News brings us the latest and greatest security news stories from around the world</p><p>And</p><p>Tweet of the Week makes Thom wonder when Fat Thursdays are coming to the UK</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41185741" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1b7542c8-efb6-407c-8aed-e822cb90c8ad/audio/fd0c07be-13e8-4acd-95b8-63911dfa5132/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>232: Back with the glass smash</itunes:title>
      <itunes:author>javvad malik, Sirjester, old man, thom langford, andrew agnes, Cynic</itunes:author>
      <itunes:duration>00:42:54</itunes:duration>
      <itunes:summary>After an extended end of year back - the boys are back - bigger, worser than ever, and taking no hostages in the world of cyber</itunes:summary>
      <itunes:subtitle>After an extended end of year back - the boys are back - bigger, worser than ever, and taking no hostages in the world of cyber</itunes:subtitle>
      <itunes:keywords>award winning cyber security podcast, cyber security, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>232</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">656bf09d-99cd-4188-b497-fdc22d66fa36</guid>
      <title>Episode 231: A teeny weeny bit late on this one</title>
      <description><![CDATA[<p>Same format. </p><p>Banter, lame jokes, inside jokes, lame inside jokes. </p><p>This week in infosec </p><p>A weak rant.</p><p>A billy big balls </p><p>Industry news</p><p>Some tweet of the week.</p><p>And closing thoughts</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 15 Jan 2026 18:18:40 +0000</pubDate>
      <author>thom@tl2security.com (andy agnes, thom langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-231-a-teeny-weeny-bit-late-on-this-one-b8muRabg</link>
      <content:encoded><![CDATA[<p>Same format. </p><p>Banter, lame jokes, inside jokes, lame inside jokes. </p><p>This week in infosec </p><p>A weak rant.</p><p>A billy big balls </p><p>Industry news</p><p>Some tweet of the week.</p><p>And closing thoughts</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41789692" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a17854b6-516d-4956-badf-2b8ac275db57/audio/e1c7ba30-fd8f-4f5c-937e-621e215c39d8/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 231: A teeny weeny bit late on this one</itunes:title>
      <itunes:author>andy agnes, thom langford, Javvad Malik</itunes:author>
      <itunes:duration>00:43:31</itunes:duration>
      <itunes:summary>While the boys enjoy their winter vacation, spending all the money they didn&apos;t make on sponsorship deals because Thom continues to insult anyone that offers. Here&apos;s the last episode they recorded in November... so some news may be out of date.</itunes:summary>
      <itunes:subtitle>While the boys enjoy their winter vacation, spending all the money they didn&apos;t make on sponsorship deals because Thom continues to insult anyone that offers. Here&apos;s the last episode they recorded in November... so some news may be out of date.</itunes:subtitle>
      <itunes:keywords>cyber security, most entertaining podcast, best non-vendor cybersecurity podcast, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>231</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f114a318-0fda-4509-aab9-ea1bd0d24e76</guid>
      <title>Episode 230: A number we all agree upon</title>
      <description><![CDATA[<ol><li>5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs.</li></ol><p><a href="https://x.com/todayininfosec/status/1986164925039841770">https://x.com/todayininfosec/status/1986164925039841770</a>  </p><ol><li>24th October 2002: The worm-like Friendgreet propagated by emailing all Outlook contacts from each computer where it was installed. But THERE WAS A TWIST!</li></ol><p>The software presented a EULA stating it would do that!</p><p>They gave fair warning, right!?</p><p>(EULA = End User License Agreement)</p><img /><p><a href="https://x.com/todayininfosec/status/1981885412374114601">https://x.com/todayininfosec/status/1981885412374114601</a></p><p> </p><p><a href="https://doublepulsar.com/cyberslop-meet-the-new-threat-actor-mit-and-safe-security-d250d19d02a4">CyberSlop — meet the new threat actor, MIT and Safe Security</a></p><p>Cybersecurity vendors peddling nonsense isn’t new, but lately we have a new dimension — Generative AI. This has allowed vendors — and educators — to peddle cyberslop for profit.</p><p>Earlier this year, MIT released a working paper and made a webpage around 80% of ransomware attacks using Generative AI<br /><br /><a href="https://www.straitstimes.com/singapore/politics/law-passed-for-scammers-mules-to-be-caned-after-victims-in-singapore-lose-almost-4b-since-2020">Law passed for scammers, mules to be caned after victims in Singapore lose almost $4b since 2020</a></p><p>SINGAPORE – Scammers will get at least six strokes of the cane, with the punishment going up to 24 strokes depending on the severity of the offence.</p><p>Those to be caned will include syndicate members and recruiters, and those who help them, such as money mules who provide their bank accounts, SIM cards or Singpass credentials.</p><p>These mules will face discretionary caning of up to 12 strokes.<br /><br />Tweet of the week: <a href="https://x.com/phl43/status/1985841184141689196">https://x.com/phl43/status/1985841184141689196 </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 18 Nov 2025 17:03:39 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-230-a-number-we-all-agree-upon-pd4EYaQd</link>
      <content:encoded><![CDATA[<ol><li>5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs.</li></ol><p><a href="https://x.com/todayininfosec/status/1986164925039841770">https://x.com/todayininfosec/status/1986164925039841770</a>  </p><ol><li>24th October 2002: The worm-like Friendgreet propagated by emailing all Outlook contacts from each computer where it was installed. But THERE WAS A TWIST!</li></ol><p>The software presented a EULA stating it would do that!</p><p>They gave fair warning, right!?</p><p>(EULA = End User License Agreement)</p><img /><p><a href="https://x.com/todayininfosec/status/1981885412374114601">https://x.com/todayininfosec/status/1981885412374114601</a></p><p> </p><p><a href="https://doublepulsar.com/cyberslop-meet-the-new-threat-actor-mit-and-safe-security-d250d19d02a4">CyberSlop — meet the new threat actor, MIT and Safe Security</a></p><p>Cybersecurity vendors peddling nonsense isn’t new, but lately we have a new dimension — Generative AI. This has allowed vendors — and educators — to peddle cyberslop for profit.</p><p>Earlier this year, MIT released a working paper and made a webpage around 80% of ransomware attacks using Generative AI<br /><br /><a href="https://www.straitstimes.com/singapore/politics/law-passed-for-scammers-mules-to-be-caned-after-victims-in-singapore-lose-almost-4b-since-2020">Law passed for scammers, mules to be caned after victims in Singapore lose almost $4b since 2020</a></p><p>SINGAPORE – Scammers will get at least six strokes of the cane, with the punishment going up to 24 strokes depending on the severity of the offence.</p><p>Those to be caned will include syndicate members and recruiters, and those who help them, such as money mules who provide their bank accounts, SIM cards or Singpass credentials.</p><p>These mules will face discretionary caning of up to 12 strokes.<br /><br />Tweet of the week: <a href="https://x.com/phl43/status/1985841184141689196">https://x.com/phl43/status/1985841184141689196 </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="36600310" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a7f25e21-b3dc-4c9b-9ef4-8c5196baa927/audio/1c32c97d-e786-4365-b5f7-aac4a4185d8e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 230: A number we all agree upon</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, Thom Langford</itunes:author>
      <itunes:duration>00:38:07</itunes:duration>
      <itunes:summary>The boys are back, find out who has travelled where, who has purchased a house, and why the French may want to skip this episode. </itunes:summary>
      <itunes:subtitle>The boys are back, find out who has travelled where, who has purchased a house, and why the French may want to skip this episode. </itunes:subtitle>
      <itunes:keywords>award winning cyber security podcast, cyber security, security industry news, eu security blogger awards, we love you graham and carole, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>230</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">406d4fb9-5d63-4084-9f71-a3c2c1d3bce3</guid>
      <title>Episode 229: The Rapture One</title>
      <description><![CDATA[<p>This week in InfoSec is a Mitnick/Android double act</p><p><a href="https://www.computerhistory.org/tdih/september/27/#hacker-mitnick-indicted-on-charges">https://www.computerhistory.org/tdih/september/27/#hacker-mitnick-indicted-on-charges</a></p><p><a href="https://thisdayintechhistory.com/09/23/the-first-android-introduced/">https://thisdayintechhistory.com/09/23/the-first-android-introduced/ </a></p><p>Rant of the Week is the future of the UK, the future I tell you…</p><p><a href="https://www.bbc.co.uk/news/articles/cn832y43ql5o">New digital ID will be mandatory for workers in the UK</a></p><p>Billy Big Balls gives the best reason ever to go full speed ahead with AI</p><p><a href="https://www.theverge.com/ai-artificial-intelligence/785407/peter-thiel-antichrist-tech-regulation">Silicon Valley’s latest argument against regulating AI: that would literally be the Antichrist </a></p><p>Industry News is the latest and greatest security news stories from around the world</p><p>Tweet of the Week is valuable fitness advice from infosec</p><p><a href="https://bsky.app/profile/secure-ics-ot.bsky.social/post/3lzpgdl7dts2u">https://bsky.app/profile/secure-ics-ot.bsky.social/post/3lzpgdl7dts2u </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 6 Oct 2025 23:00:00 +0000</pubDate>
      <author>thom@tl2security.com (javvad malik, thom langford, andrew agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-289-the-rapture-one-sE8a_Thw</link>
      <content:encoded><![CDATA[<p>This week in InfoSec is a Mitnick/Android double act</p><p><a href="https://www.computerhistory.org/tdih/september/27/#hacker-mitnick-indicted-on-charges">https://www.computerhistory.org/tdih/september/27/#hacker-mitnick-indicted-on-charges</a></p><p><a href="https://thisdayintechhistory.com/09/23/the-first-android-introduced/">https://thisdayintechhistory.com/09/23/the-first-android-introduced/ </a></p><p>Rant of the Week is the future of the UK, the future I tell you…</p><p><a href="https://www.bbc.co.uk/news/articles/cn832y43ql5o">New digital ID will be mandatory for workers in the UK</a></p><p>Billy Big Balls gives the best reason ever to go full speed ahead with AI</p><p><a href="https://www.theverge.com/ai-artificial-intelligence/785407/peter-thiel-antichrist-tech-regulation">Silicon Valley’s latest argument against regulating AI: that would literally be the Antichrist </a></p><p>Industry News is the latest and greatest security news stories from around the world</p><p>Tweet of the Week is valuable fitness advice from infosec</p><p><a href="https://bsky.app/profile/secure-ics-ot.bsky.social/post/3lzpgdl7dts2u">https://bsky.app/profile/secure-ics-ot.bsky.social/post/3lzpgdl7dts2u </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="43572287" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/cbd078bc-ac83-4f15-bc45-cff2449696c6/audio/4c6e6d0f-6986-4dc5-87a2-f5cc11a21569/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 229: The Rapture One</itunes:title>
      <itunes:author>javvad malik, thom langford, andrew agnes</itunes:author>
      <itunes:duration>00:45:23</itunes:duration>
      <itunes:summary>In this episode, join Sirjester, Javvad, and Thom as they dive into a lively discussion on the quirks of modern technology, the nostalgia of past innovations, and the humorous side of cybersecurity. From cold plunges to digital IDs, and the infamous PayPal Mafia, the trio navigates through a blend of personal anecdotes and industry insights. Tune in for a mix of laughter, thought-provoking commentary, and a touch of nostalgia

</itunes:summary>
      <itunes:subtitle>In this episode, join Sirjester, Javvad, and Thom as they dive into a lively discussion on the quirks of modern technology, the nostalgia of past innovations, and the humorous side of cybersecurity. From cold plunges to digital IDs, and the infamous PayPal Mafia, the trio navigates through a blend of personal anecdotes and industry insights. Tune in for a mix of laughter, thought-provoking commentary, and a touch of nostalgia

</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>229</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2d8419a7-6f5e-4d79-91ab-9eef7357e53a</guid>
      <title>Episode 228: Legal and MFA delays</title>
      <description><![CDATA[<ol><li>18th September 2014: Home Depot disclosed that its data breach was estimated to impact 56 million unique payment cards.</li></ol><p>Home Depot disclosed that its data breach was estimated to impact 56 million unique payment cards.</p><p><a href="https://x.com/todayininfosec/status/1968870469408309285">https://x.com/todayininfosec/status/1968870469408309285</a></p><ol><li>18th September 2001: The Nimda worm was released. Utilizing 5 different infection vectors, it became the most widespread virus/worm ever after only 22 minutes.</li></ol><p>Why "Nimda"?</p><p>$ echo "admin" | rev</p><p>nimda</p><p><a href="https://x.com/todayininfosec/status/1968721441836134825">https://x.com/todayininfosec/status/1968721441836134825</a></p><p> </p><p>Rant of the week <a href="https://www.theregister.com/2025/09/18/google_chrome_ai_browser/">Google stuffs Chrome full of AI features whether you like it or not</a></p><p> </p><p>Billy big balls <a href="https://www.siliconrepublic.com/business/data-protection-commission-niamh-sweeney-appointment">Former Facebook policy lead Niamh Sweeney appointed DPC commissioner </a></p><p> </p><p>Tweet of the week <a href="https://bsky.app/profile/jwgoerlich.bsky.social/post/3lz4qt5a64k2p">https://bsky.app/profile/jwgoerlich.bsky.social/post/3lz4qt5a64k2p </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 1 Oct 2025 13:08:12 +0000</pubDate>
      <author>thom@tl2security.com (thom langford, andrew agnes, javvad malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-288-legal-and-mfa-delays-vTbg9qFe</link>
      <content:encoded><![CDATA[<ol><li>18th September 2014: Home Depot disclosed that its data breach was estimated to impact 56 million unique payment cards.</li></ol><p>Home Depot disclosed that its data breach was estimated to impact 56 million unique payment cards.</p><p><a href="https://x.com/todayininfosec/status/1968870469408309285">https://x.com/todayininfosec/status/1968870469408309285</a></p><ol><li>18th September 2001: The Nimda worm was released. Utilizing 5 different infection vectors, it became the most widespread virus/worm ever after only 22 minutes.</li></ol><p>Why "Nimda"?</p><p>$ echo "admin" | rev</p><p>nimda</p><p><a href="https://x.com/todayininfosec/status/1968721441836134825">https://x.com/todayininfosec/status/1968721441836134825</a></p><p> </p><p>Rant of the week <a href="https://www.theregister.com/2025/09/18/google_chrome_ai_browser/">Google stuffs Chrome full of AI features whether you like it or not</a></p><p> </p><p>Billy big balls <a href="https://www.siliconrepublic.com/business/data-protection-commission-niamh-sweeney-appointment">Former Facebook policy lead Niamh Sweeney appointed DPC commissioner </a></p><p> </p><p>Tweet of the week <a href="https://bsky.app/profile/jwgoerlich.bsky.social/post/3lz4qt5a64k2p">https://bsky.app/profile/jwgoerlich.bsky.social/post/3lz4qt5a64k2p </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="37166737" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/300c71e1-4ad9-44bd-8854-cef3b8496a44/audio/116f1b21-8dfa-445b-b750-f7aecec62136/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 228: Legal and MFA delays</itunes:title>
      <itunes:author>thom langford, andrew agnes, javvad malik</itunes:author>
      <itunes:duration>00:38:42</itunes:duration>
      <itunes:summary>After paying off a few lawyers and getting Thom a new phone, we finally squeezed this out a while later than anticipated. 

This week in InfoSec is a 22 minute world record (back in the day at least)

Rant of the Week is how Google is giving us so much free stuff, whether we want it or not

Billy Big Balls goes from top of the morning to top of the data tree
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is The Wolf taking care of business
</itunes:summary>
      <itunes:subtitle>After paying off a few lawyers and getting Thom a new phone, we finally squeezed this out a while later than anticipated. 

This week in InfoSec is a 22 minute world record (back in the day at least)

Rant of the Week is how Google is giving us so much free stuff, whether we want it or not

Billy Big Balls goes from top of the morning to top of the data tree
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is The Wolf taking care of business
</itunes:subtitle>
      <itunes:keywords>award winning cyber security podcast, most entertaining podcast, podcast, cybersecurity, host unknown, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>228</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f7ae179f-3dc3-4a94-ad02-1b38d543789e</guid>
      <title>Episode 227: The Coup</title>
      <description><![CDATA[<p>The notes go here. I really can't go and look for them right now. </p><p> </p><p>This week in InfoSec is a sticky pickle</p><p>Rant of the Week will have you guessing at who it could possibly be, again…</p><p>Billy Big Balls is why british men need to take their passport to the bathroom these days</p><p>Industry News is the latest and greatest security news stories from around the world</p><p>And</p><p>Tweet of the Week is well... Thom got it wrong. </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 1 Sep 2025 16:19:35 +0000</pubDate>
      <author>thom@tl2security.com (carole Theriault, andrew agnes, thom langford, javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-227-the-coup-1_dQ8OAY</link>
      <content:encoded><![CDATA[<p>The notes go here. I really can't go and look for them right now. </p><p> </p><p>This week in InfoSec is a sticky pickle</p><p>Rant of the Week will have you guessing at who it could possibly be, again…</p><p>Billy Big Balls is why british men need to take their passport to the bathroom these days</p><p>Industry News is the latest and greatest security news stories from around the world</p><p>And</p><p>Tweet of the Week is well... Thom got it wrong. </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="51910670" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/48d8a029-c4ad-484b-9cce-58b8e7b7ed10/audio/808cec20-8c71-46df-b428-b5686f86af27/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 227: The Coup</itunes:title>
      <itunes:author>carole Theriault, andrew agnes, thom langford, javvad Malik</itunes:author>
      <itunes:duration>00:54:04</itunes:duration>
      <itunes:summary>In this episode, the boys land the biggest coup in the cybersecurity podcast world.

But with lawyers hot on their tails, and NDA&apos;s to navigate... will they ever get the episode out in time? Or ever? </itunes:summary>
      <itunes:subtitle>In this episode, the boys land the biggest coup in the cybersecurity podcast world.

But with lawyers hot on their tails, and NDA&apos;s to navigate... will they ever get the episode out in time? Or ever? </itunes:subtitle>
      <itunes:keywords>we signed her up, even better than smashing security, cybersecurity, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>227</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">94b3d82c-305d-446a-8547-b18651b7a16e</guid>
      <title>Episode 226: The Prime Episode</title>
      <description><![CDATA[<p>8th July 2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan.</p><p><a href="https://x.com/todayininfosec/status/1942695691270193211">https://x.com/todayininfosec/status/1942695691270193211</a></p><p>10th July 1999: Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America". </p><p><a href="https://x.com/todayininfosec/status/1943440335608385876">https://x.com/todayininfosec/status/1943440335608385876</a></p><p><br /><a href="https://www.reco.ai/blog/coinbase-breach">Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center</a></p><p><a href="https://reporter.deepspecter.com/the-gps-leak-no-one-talked-about-uffizios-silent-exposure-03b5dfb23556">The GPS Leak No One Talked About: Uffizio’s Silent Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-malicious-domains/">Hundreds of Malicious Domains Registered Ahead of Prime Day</a></p><p><a href="https://www.infosecurity-magazine.com/news/ms-chairman-declines-ransom-payment/">M&S Chair Details Ransomware Attack, Declines to Confirm if Payment Was Made</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-state-hacker-charged-covid/">Chinese State-Sponsored Hacker Charged Over COVID-19 Research Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/qantas-57m-data-breach/">Qantas Confirms 5.7 Million Customers Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tribunal-ruling-tiktok-fine/">Tribunal Ruling Brings ICO’s £12.7m TikTok Fine Closer</a></p><p><a href="https://www.infosecurity-magazine.com/news/four-arrested-uk-retail-attacks/">Four Arrested in Connection with April UK Retail Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-handling-eu-user-data-china/">TikTok's Handling of EU User Data in China Comes Under Scrutiny Again</a></p><p><a href="https://www.infosecurity-magazine.com/news/llms-fall-vulnerability-discovery/">LLMs Fall Short in Vulnerability Discovery and Exploitation</a></p><p><a href="https://www.infosecurity-magazine.com/news/mps-warn-iranian-threat/">MPs Warn of “Significant” Iranian Cyber-Threat to UK</a></p><p> </p><p> </p><p><a href="https://x.com/krezae/status/1943463109173338558">https://x.com/krezae/status/1943463109173338558</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Jul 2025 16:35:27 +0000</pubDate>
      <author>thom@tl2security.com (andrew agnes, javvad malik, thom langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-226-the-prime-episode-bgDNgmst</link>
      <content:encoded><![CDATA[<p>8th July 2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan.</p><p><a href="https://x.com/todayininfosec/status/1942695691270193211">https://x.com/todayininfosec/status/1942695691270193211</a></p><p>10th July 1999: Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America". </p><p><a href="https://x.com/todayininfosec/status/1943440335608385876">https://x.com/todayininfosec/status/1943440335608385876</a></p><p><br /><a href="https://www.reco.ai/blog/coinbase-breach">Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center</a></p><p><a href="https://reporter.deepspecter.com/the-gps-leak-no-one-talked-about-uffizios-silent-exposure-03b5dfb23556">The GPS Leak No One Talked About: Uffizio’s Silent Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-malicious-domains/">Hundreds of Malicious Domains Registered Ahead of Prime Day</a></p><p><a href="https://www.infosecurity-magazine.com/news/ms-chairman-declines-ransom-payment/">M&S Chair Details Ransomware Attack, Declines to Confirm if Payment Was Made</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-state-hacker-charged-covid/">Chinese State-Sponsored Hacker Charged Over COVID-19 Research Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/qantas-57m-data-breach/">Qantas Confirms 5.7 Million Customers Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tribunal-ruling-tiktok-fine/">Tribunal Ruling Brings ICO’s £12.7m TikTok Fine Closer</a></p><p><a href="https://www.infosecurity-magazine.com/news/four-arrested-uk-retail-attacks/">Four Arrested in Connection with April UK Retail Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-handling-eu-user-data-china/">TikTok's Handling of EU User Data in China Comes Under Scrutiny Again</a></p><p><a href="https://www.infosecurity-magazine.com/news/llms-fall-vulnerability-discovery/">LLMs Fall Short in Vulnerability Discovery and Exploitation</a></p><p><a href="https://www.infosecurity-magazine.com/news/mps-warn-iranian-threat/">MPs Warn of “Significant” Iranian Cyber-Threat to UK</a></p><p> </p><p> </p><p><a href="https://x.com/krezae/status/1943463109173338558">https://x.com/krezae/status/1943463109173338558</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41926461" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/133fb731-0c6b-4d4b-acc9-cb61112a7d92/audio/149f13fd-2f0b-4faf-9b9a-7015acccc054/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 226: The Prime Episode</itunes:title>
      <itunes:author>andrew agnes, javvad malik, thom langford</itunes:author>
      <itunes:duration>00:43:40</itunes:duration>
      <itunes:summary>Thom, Andy, and Javvad give you another amazing, insightful, and wonderfully put together show 
This week in InfoSec proves it is never DNS. Spoiler alert, it is always DNS.

Rant of the Week tells us how the tables have turned.
Billy Big Balls is Big Brother always watching you.
Industry News is the latest and greatest security news stories from around the world
And
Tweet of the Week is a non infosec tip on staying in your family’s life forever.</itunes:summary>
      <itunes:subtitle>Thom, Andy, and Javvad give you another amazing, insightful, and wonderfully put together show 
This week in InfoSec proves it is never DNS. Spoiler alert, it is always DNS.

Rant of the Week tells us how the tables have turned.
Billy Big Balls is Big Brother always watching you.
Industry News is the latest and greatest security news stories from around the world
And
Tweet of the Week is a non infosec tip on staying in your family’s life forever.</itunes:subtitle>
      <itunes:keywords>cyber security, most entertaining podcast, best non-vendor cybersecurity podcast, not smashing security, best podcast ever, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>226</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f5c7eb23-e32c-4bc5-a322-628c363192b8</guid>
      <title>Episode 225: The finding a job episode</title>
      <description><![CDATA[<p>27th June 2007: Live Free or Die Hard was released. Cop John McClane partners with hacker Matt Farrell to stop cyberterrorists trying to take down the US's infrastructure. Traceroute (1337!) is used to find the ringleader's location, then McClane kills him by shooting HIS OWN shoulder.</p><p><a href="https://x.com/todayininfosec/status/1938731279937057144">https://x.com/todayininfosec/status/1938731279937057144</a>     </p><p>1st July 2003: California's data breach notification law went into effect. California became the first US state to require disclosure of breaches of personal information.<br /><a href="https://x.com/todayininfosec/status/1940220561080332760">https://x.com/todayininfosec/status/1940220561080332760 </a><br /><br /><a href="https://www.theregister.com/2025/07/03/meta_ec_dma_sulk/">Meta calls €200M EU fine over pay-or-consent ad model 'unlawful' </a></p><p><a href="https://www.theverge.com/news/697846/soham-parekh-startups-multiple-jobs-founders">Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously </a></p><p><a href="https://x.com/nickvangilder/status/1940110830085054891">https://x.com/nickvangilder/status/1940110830085054891</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 10 Jul 2025 11:52:35 +0000</pubDate>
      <author>thom@tl2security.com (javvad Malik, Thom Langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-225-the-finding-a-job-episode-65GXjlqd</link>
      <content:encoded><![CDATA[<p>27th June 2007: Live Free or Die Hard was released. Cop John McClane partners with hacker Matt Farrell to stop cyberterrorists trying to take down the US's infrastructure. Traceroute (1337!) is used to find the ringleader's location, then McClane kills him by shooting HIS OWN shoulder.</p><p><a href="https://x.com/todayininfosec/status/1938731279937057144">https://x.com/todayininfosec/status/1938731279937057144</a>     </p><p>1st July 2003: California's data breach notification law went into effect. California became the first US state to require disclosure of breaches of personal information.<br /><a href="https://x.com/todayininfosec/status/1940220561080332760">https://x.com/todayininfosec/status/1940220561080332760 </a><br /><br /><a href="https://www.theregister.com/2025/07/03/meta_ec_dma_sulk/">Meta calls €200M EU fine over pay-or-consent ad model 'unlawful' </a></p><p><a href="https://www.theverge.com/news/697846/soham-parekh-startups-multiple-jobs-founders">Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously </a></p><p><a href="https://x.com/nickvangilder/status/1940110830085054891">https://x.com/nickvangilder/status/1940110830085054891</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45726964" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/9155341b-f5c6-4bd4-a6d5-a6100eadd1d1/audio/2c2730c4-03e0-4984-983b-af36ada47963/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 225: The finding a job episode</itunes:title>
      <itunes:author>javvad Malik, Thom Langford, Andrew Agnes</itunes:author>
      <itunes:duration>00:47:37</itunes:duration>
      <itunes:summary>This week in InfoSec gives the war cry “yippee ki yay, Mother Hubbard”
Rant of the Week proves that if it isn’t enthusiastic consent, it isn’t legal
Billy Big Balls has made all three of us here felt seen
Industry News is the latest and greatest security news stories from around the world
And
Tweet of the Week is some real world advice on how to get into the industry
</itunes:summary>
      <itunes:subtitle>This week in InfoSec gives the war cry “yippee ki yay, Mother Hubbard”
Rant of the Week proves that if it isn’t enthusiastic consent, it isn’t legal
Billy Big Balls has made all three of us here felt seen
Industry News is the latest and greatest security news stories from around the world
And
Tweet of the Week is some real world advice on how to get into the industry
</itunes:subtitle>
      <itunes:keywords>sponsor us, cybersecurity, host unknown, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>225</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aeff5c5c-c253-4a30-831c-3591a0a26f7a</guid>
      <title>Episode 224: Where we argue about Cyber Essentials</title>
      <description><![CDATA[<p>17th June 1995: Spyglass goes public</p><p>World Wide Web software producer Spyglass Inc. went public, the year after it had begun distributing its Spyglass Mosaic software, an early browser for navigating the Web. With previous year's earnings at $7 million, Spyglass was founded by students at the Illinois Supercomputing Center, which also inspired Netscape Communications Corp.</p><p><a href="https://www.computerhistory.org/tdih/june/27/#spyglass-goes-public">https://www.computerhistory.org/tdih/june/27/#spyglass-goes-public</a>  </p><p>26th June 1989: Robert Tappan Morris (who released the Morris worm in 1988) became the first person to be indicted under the US's Computer Fraud and Abuse Act (CFAA), enacted by Congress 3 years earlier. He was later sentenced to three years of probation and fined $10,050</p><p><a href="https://x.com/todayininfosec/status/1938292354965770278">https://x.com/todayininfosec/status/1938292354965770278</a></p><p><a href="https://www.theregister.com/2025/06/25/us_student_visa_applicants_social_media_public/">Visiting students can't hide social media accounts from Uncle Sam anymore </a></p><p><a href="https://www.computing.co.uk/news/2025/legislation-regulation/meta-s-ai-training-on-copyrighted-content-is-fair-use-us-judge-says">Meta’s AI training on copyrighted content is ‘fair use’, US judge says</a></p><p><a href="https://x.com/filip_dragovic/status/1937932750415086010">https://x.com/filip_dragovic/status/1937932750415086010</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 30 Jun 2025 12:45:21 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-224-where-we-argue-about-cyber-essentials-TlBhM3oo</link>
      <content:encoded><![CDATA[<p>17th June 1995: Spyglass goes public</p><p>World Wide Web software producer Spyglass Inc. went public, the year after it had begun distributing its Spyglass Mosaic software, an early browser for navigating the Web. With previous year's earnings at $7 million, Spyglass was founded by students at the Illinois Supercomputing Center, which also inspired Netscape Communications Corp.</p><p><a href="https://www.computerhistory.org/tdih/june/27/#spyglass-goes-public">https://www.computerhistory.org/tdih/june/27/#spyglass-goes-public</a>  </p><p>26th June 1989: Robert Tappan Morris (who released the Morris worm in 1988) became the first person to be indicted under the US's Computer Fraud and Abuse Act (CFAA), enacted by Congress 3 years earlier. He was later sentenced to three years of probation and fined $10,050</p><p><a href="https://x.com/todayininfosec/status/1938292354965770278">https://x.com/todayininfosec/status/1938292354965770278</a></p><p><a href="https://www.theregister.com/2025/06/25/us_student_visa_applicants_social_media_public/">Visiting students can't hide social media accounts from Uncle Sam anymore </a></p><p><a href="https://www.computing.co.uk/news/2025/legislation-regulation/meta-s-ai-training-on-copyrighted-content-is-fair-use-us-judge-says">Meta’s AI training on copyrighted content is ‘fair use’, US judge says</a></p><p><a href="https://x.com/filip_dragovic/status/1937932750415086010">https://x.com/filip_dragovic/status/1937932750415086010</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45973080" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/b5541f02-d352-4033-801a-689d27d4e7ae/audio/68b65f05-985d-4130-94c3-7639a7eb910a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 224: Where we argue about Cyber Essentials</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:47:53</itunes:duration>
      <itunes:summary>Jav has a new clackity clickety thing, Thom is his mothers 2nd favourite son (despite being an only child), and Andy tries to educate everyone on what cyber essentials is actually all about. </itunes:summary>
      <itunes:subtitle>Jav has a new clackity clickety thing, Thom is his mothers 2nd favourite son (despite being an only child), and Andy tries to educate everyone on what cyber essentials is actually all about. </itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>224</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1f156a3-76ff-4070-87c1-83b725badd97</guid>
      <title>Episode 223: The never-ending train journey episode</title>
      <description><![CDATA[<p>11th June 1986: Ferris Bueller's Day Off was released. https://x.com/todayininfosec/status/1932838235102716317</p><p>13th June 1994: A Russian hacker group led by Vladimir Levin stole $10.7 million from Citibank via X.25, in what was the first international bank robbery over a network to be made public. Levin was caught in London in 1995 and sentenced in the US to 3 years in prison in 1998. https://x.com/todayininfosec/status/1933504310643773697 </p><p> </p><p><a href="https://www.zeropartydata.es/p/localhost-tracking-explained-it-could">“Localhost tracking” explained. It could cost Meta 32 billion. </a></p><p><a href="https://www.theregister.com/2025/06/13/infosec_employers_demanding_too_much/">Wanted: Junior cybersecurity staff with 10 years' experience and a PhD </a></p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/cyber-trends-cisos-know/">#Infosec2025: Top Six Cyber Trends CISOs Need to Know</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-mobile-users-now-face/">Half of Mobile Users Now Face Daily Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/zeroday-20-misconfigurations-in/">Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/hands-on-skills-first-cyber-role/">Hands-On Skills Now Key to Landing Your First Cyber Role</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-alert-erie-insurance/">Phishing Alert as Erie Insurance Reveals Cyber “Event”</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-criminal-demand-data/">Europol Says Criminal Demand for Data is “Skyrocketing”</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-zero-trust-implementation/">NIST Publishes New Zero Trust Implementation Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/">Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-journalists-paragon/">European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms</a></p><p>Tweet of the week</p><p><a href="https://bsky.app/profile/brianhonan.bsky.social/post/3lrilyd7rpk2m">https://bsky.app/profile/brianhonan.bsky.social/post/3lrilyd7rpk2m </a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 19 Jun 2025 17:23:17 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-223-the-never-ending-train-journey-episode-L0bRUUM_</link>
      <content:encoded><![CDATA[<p>11th June 1986: Ferris Bueller's Day Off was released. https://x.com/todayininfosec/status/1932838235102716317</p><p>13th June 1994: A Russian hacker group led by Vladimir Levin stole $10.7 million from Citibank via X.25, in what was the first international bank robbery over a network to be made public. Levin was caught in London in 1995 and sentenced in the US to 3 years in prison in 1998. https://x.com/todayininfosec/status/1933504310643773697 </p><p> </p><p><a href="https://www.zeropartydata.es/p/localhost-tracking-explained-it-could">“Localhost tracking” explained. It could cost Meta 32 billion. </a></p><p><a href="https://www.theregister.com/2025/06/13/infosec_employers_demanding_too_much/">Wanted: Junior cybersecurity staff with 10 years' experience and a PhD </a></p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/cyber-trends-cisos-know/">#Infosec2025: Top Six Cyber Trends CISOs Need to Know</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-mobile-users-now-face/">Half of Mobile Users Now Face Daily Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/zeroday-20-misconfigurations-in/">Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/hands-on-skills-first-cyber-role/">Hands-On Skills Now Key to Landing Your First Cyber Role</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-alert-erie-insurance/">Phishing Alert as Erie Insurance Reveals Cyber “Event”</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-criminal-demand-data/">Europol Says Criminal Demand for Data is “Skyrocketing”</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-zero-trust-implementation/">NIST Publishes New Zero Trust Implementation Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/">Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-journalists-paragon/">European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms</a></p><p>Tweet of the week</p><p><a href="https://bsky.app/profile/brianhonan.bsky.social/post/3lrilyd7rpk2m">https://bsky.app/profile/brianhonan.bsky.social/post/3lrilyd7rpk2m </a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41933562" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/16f1f834-b417-454b-98af-c5d7f4b46bce/audio/2e9731b3-cad6-45d7-b42b-6f88ac656f68/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 223: The never-ending train journey episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, Thom Langford</itunes:author>
      <itunes:duration>00:43:40</itunes:duration>
      <itunes:summary>This week in InfoSec gives us all a little “Ummmmmm Bow Bow, chik chikka chikahaa”

Rant of the Week proves that nothing is off the table for our favourite lizard king

Billy Big Balls is making the problem, highlighting the problem and then charging money to solve the problem
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week asks “are you feeling lucky, punk?”
</itunes:summary>
      <itunes:subtitle>This week in InfoSec gives us all a little “Ummmmmm Bow Bow, chik chikka chikahaa”

Rant of the Week proves that nothing is off the table for our favourite lizard king

Billy Big Balls is making the problem, highlighting the problem and then charging money to solve the problem
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week asks “are you feeling lucky, punk?”
</itunes:subtitle>
      <itunes:keywords>brian honan, train journeys, industry news, rant, billy big balls, thom langford, javvad malik, smashing security isn&apos;t here, cybersecurity, host unknown, andrew agnes, friday the 13th</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>223</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6d0ccf6e-2610-4737-8ae6-859240f4782e</guid>
      <title>Episode 222: The Curious Case of the Oxford Comma Episode</title>
      <description><![CDATA[<ol><li>26th May 1995: Realizing his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft CEO Bill Gates issues a memo titled, “<a href="http://battellemedia.com/archives/2012/02/larry-pages-tidal-wave-moment.php">The Internet Tidal Wave</a>,” which signaled the company’s focus on the global network. In the memo, Gates declared that the Internet was the “most important single development” since the IBM personal computer — a development that he was assigning “the highest level of importance.” Still, it is curious why it took someone who was regarded as a technology “innovator” so long to realize this.</li></ol><p><a href="https://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/">https://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/</a></p><ol><li>30th May 1996: AT&T Announces Video Phone Call System.  AT&T held a meeting to announce a system that would allow personal computers to make and receive video phone calls over standard telephone lines. In years of efforts by AT&T and others to find success in the technology, the AT&T system made use of Intel's Pentium processors and compression software to allow both video and audio information to share a phone line rather than a high-capacity ISDN, T-1, or T-3 line.</li></ol><p><a href="https://www.computerhistory.org/tdih/may/30/#att-announces-video-phone-call-system">https://www.computerhistory.org/tdih/may/30/#att-announces-video-phone-call-system</a></p><p><a href="https://www.theregister.com/2025/05/30/sentinelone_outage/">Security outfit SentinelOne's services back online after lengthy outage</a></p><p><a href="https://www.theregister.com/2025/05/29/openai_model_modifies_shutdown_script/">OpenAI model modifies shutdown script in apparent sabotage effort</a></p><p>https://bsky.app/profile/robmesure.bsky.social/post/3lqcn6kq5oc26 </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 May 2025 16:00:27 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-222-the-curious-case-of-the-oxford-comma-episode-Lfke_NID</link>
      <content:encoded><![CDATA[<ol><li>26th May 1995: Realizing his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft CEO Bill Gates issues a memo titled, “<a href="http://battellemedia.com/archives/2012/02/larry-pages-tidal-wave-moment.php">The Internet Tidal Wave</a>,” which signaled the company’s focus on the global network. In the memo, Gates declared that the Internet was the “most important single development” since the IBM personal computer — a development that he was assigning “the highest level of importance.” Still, it is curious why it took someone who was regarded as a technology “innovator” so long to realize this.</li></ol><p><a href="https://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/">https://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/</a></p><ol><li>30th May 1996: AT&T Announces Video Phone Call System.  AT&T held a meeting to announce a system that would allow personal computers to make and receive video phone calls over standard telephone lines. In years of efforts by AT&T and others to find success in the technology, the AT&T system made use of Intel's Pentium processors and compression software to allow both video and audio information to share a phone line rather than a high-capacity ISDN, T-1, or T-3 line.</li></ol><p><a href="https://www.computerhistory.org/tdih/may/30/#att-announces-video-phone-call-system">https://www.computerhistory.org/tdih/may/30/#att-announces-video-phone-call-system</a></p><p><a href="https://www.theregister.com/2025/05/30/sentinelone_outage/">Security outfit SentinelOne's services back online after lengthy outage</a></p><p><a href="https://www.theregister.com/2025/05/29/openai_model_modifies_shutdown_script/">OpenAI model modifies shutdown script in apparent sabotage effort</a></p><p>https://bsky.app/profile/robmesure.bsky.social/post/3lqcn6kq5oc26 </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44488493" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/82d30e86-12ff-43f9-946e-de67cb4b463d/audio/e45f4a93-233c-4889-8266-a8bf91f31346/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 222: The Curious Case of the Oxford Comma Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew agnes, Thom Langford</itunes:author>
      <itunes:duration>00:46:20</itunes:duration>
      <itunes:summary>This Episode discusses the use of the Oxford comma, video call technology advancements, and the implications of AI refusing shutdown commands. They also share personal anecdotes, highlight the challenges of remote working tools, and examine a SentinelOne outage. We also get commentary on an internet-connected toothbrush</itunes:summary>
      <itunes:subtitle>This Episode discusses the use of the Oxford comma, video call technology advancements, and the implications of AI refusing shutdown commands. They also share personal anecdotes, highlight the challenges of remote working tools, and examine a SentinelOne outage. We also get commentary on an internet-connected toothbrush</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>222</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d862cac-8143-4e59-8a3a-698babbe196a</guid>
      <title>Episode 221: The Was Jav On the BBC? Episode</title>
      <description><![CDATA[<p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeJ8jA0cNWFR5TUFMquCSiS6Hjh2BYlXptd9Rx7zicmHuUfcw98gBAaDAZj3kSvJAMiUBI0f2FSEhtZc3RmgVYwZyvNVbjrro-RkZgaJOJZQbN7dpXMUuyk9rZkJdaAE2zV9Qqd9Q?key=aDEUWIvkiNMd1-MVkuj-kg" /><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdZijrPn0OpQdmWJsH0P4VwZJt00zVThHjNf6bcm-Zhp2TcuztuP9R4glu_zE1LAlNO5E2KptArcwgckWilAWcX3W7OnVTTXNB7mOZZfKUn7kXMuaTuYw-UZv_q4__qEP_esl-7sg?key=aDEUWIvkiNMd1-MVkuj-kg" /><p> </p><p><a href="https://www.theregister.com/2025/05/22/irish_data_protection_commission_gives/">Irish privacy watchdog OKs Meta to train AI on EU folks' posts</a><br /><br /><a href="https://www.theregister.com/2025/05/21/judge_allows_deltas_lawsuit_against/">Judge allows Delta's lawsuit against CrowdStrike to proceed with millions in damages on the line</a><br /><br /><a href="https://x.com/fesshole/status/1925815219655233765?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/fesshole/status/1925815219655233765?s=46&amp;t=1-Sjo1Vy8SG7OdizJ3wVbg</a><br /><br /><strong>And of course... can't NOT mention: https://www.bbc.co.uk/iplayer/episode/m002d2lh/inside-the-high-street-cyberattacks </strong></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 27 May 2025 09:44:31 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-221-the-was-jav-on-the-bbc-episode-xdyHZNum</link>
      <content:encoded><![CDATA[<p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeJ8jA0cNWFR5TUFMquCSiS6Hjh2BYlXptd9Rx7zicmHuUfcw98gBAaDAZj3kSvJAMiUBI0f2FSEhtZc3RmgVYwZyvNVbjrro-RkZgaJOJZQbN7dpXMUuyk9rZkJdaAE2zV9Qqd9Q?key=aDEUWIvkiNMd1-MVkuj-kg" /><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdZijrPn0OpQdmWJsH0P4VwZJt00zVThHjNf6bcm-Zhp2TcuztuP9R4glu_zE1LAlNO5E2KptArcwgckWilAWcX3W7OnVTTXNB7mOZZfKUn7kXMuaTuYw-UZv_q4__qEP_esl-7sg?key=aDEUWIvkiNMd1-MVkuj-kg" /><p> </p><p><a href="https://www.theregister.com/2025/05/22/irish_data_protection_commission_gives/">Irish privacy watchdog OKs Meta to train AI on EU folks' posts</a><br /><br /><a href="https://www.theregister.com/2025/05/21/judge_allows_deltas_lawsuit_against/">Judge allows Delta's lawsuit against CrowdStrike to proceed with millions in damages on the line</a><br /><br /><a href="https://x.com/fesshole/status/1925815219655233765?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/fesshole/status/1925815219655233765?s=46&amp;t=1-Sjo1Vy8SG7OdizJ3wVbg</a><br /><br /><strong>And of course... can't NOT mention: https://www.bbc.co.uk/iplayer/episode/m002d2lh/inside-the-high-street-cyberattacks </strong></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44512788" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/df52b761-26e1-462a-8221-57ceaa383187/audio/eecda013-d5ab-4041-baaa-57c1df1a881b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 221: The Was Jav On the BBC? Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, Thom Langford</itunes:author>
      <itunes:duration>00:46:22</itunes:duration>
      <itunes:summary>The gang is back, with Thom on fire without the burdens of editing. They navigate the service outage caused by CrowdStrike, discussing the financial implications for Delta. Delve into a controversy about the Irish DPC. Tweet of the Week humorously addresses extreme measures taken to tackle persistent spam emails. Amidst the laughs, Javvad subtly plugs his appearance in a BBC documentary.</itunes:summary>
      <itunes:subtitle>The gang is back, with Thom on fire without the burdens of editing. They navigate the service outage caused by CrowdStrike, discussing the financial implications for Delta. Delve into a controversy about the Irish DPC. Tweet of the Week humorously addresses extreme measures taken to tackle persistent spam emails. Amidst the laughs, Javvad subtly plugs his appearance in a BBC documentary.</itunes:subtitle>
      <itunes:keywords>andy anti dpc, javvad on the bbc, cybersecurity, thom not editing</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>221</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e6c66b00-11f6-4d3d-85d5-06692ee77d5a</guid>
      <title>220 - The Frequent Flyer Frustrations Episode</title>
      <description><![CDATA[<p>As always we will bring you today in infosec, a rant, admire a billy big ball move, talk about industry news, and bring you a tweet or alternatively suitable social media post of the week.</p><p>Hey, it's hard enough Thom being off that I have to edit and publish this, I need to find an AI to write the notes for me. Love you all, Javvad... now go an subscribe! </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 21 May 2025 09:38:56 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andy Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/220-the-frequent-flyer-frustrations-episode-lkoE3sor</link>
      <content:encoded><![CDATA[<p>As always we will bring you today in infosec, a rant, admire a billy big ball move, talk about industry news, and bring you a tweet or alternatively suitable social media post of the week.</p><p>Hey, it's hard enough Thom being off that I have to edit and publish this, I need to find an AI to write the notes for me. Love you all, Javvad... now go an subscribe! </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38795106" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8dfd7a3a-8f7e-4f91-a380-0c15e839865f/audio/4b45a1fd-697c-4346-81fc-44fccf887abf/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>220 - The Frequent Flyer Frustrations Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andy Agnes</itunes:author>
      <itunes:duration>00:40:24</itunes:duration>
      <itunes:summary> This week in InfoSec talks about an episode from that non PC show, Friends 

Rant of the week asks if the state of AI is in disarray. 

Billy Big Bulls delivers fakes, ghosts, and phantoms and all within 30 minutes.

Industry news is latest and greatest security news stories from around the world, 

and 

Tweet of the week is a Freudian alliterative slipup. 
</itunes:summary>
      <itunes:subtitle> This week in InfoSec talks about an episode from that non PC show, Friends 

Rant of the week asks if the state of AI is in disarray. 

Billy Big Bulls delivers fakes, ghosts, and phantoms and all within 30 minutes.

Industry news is latest and greatest security news stories from around the world, 

and 

Tweet of the week is a Freudian alliterative slipup. 
</itunes:subtitle>
      <itunes:keywords>even better than smashing security, cyber security, best non-vendor cybersecurity podcast, doordash, best podcast ever, 3 guys ranting, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>220</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1e4118e8-c437-4724-91bb-0328ffa34213</guid>
      <title>219 - The Lightweight and Aerodynamic Episode</title>
      <description><![CDATA[<p>Episode 219 of the Host Unknown Podcast covers a wide range of humorous and insightful discussions relating to both technology and personal anecdotes. Key segments include a nostalgic look back at significant moments in InfoSec history, as well as a critique of a poorly-constructed analogy between casino strategies and cybersecurity. The hosts also discuss the misadventures of an AI app that wasn't really AI, cyber insurance claims, the fines against TikTok and NSO Group, and the importance of Cyber Essentials certification. The episode is peppered with casual banter about everyday life and observations, making for an entertaining yet informative listen. </p><p>00:00 Introduction and Initial Banter </p><p>00:57 Podcast Introduction and Missing Guest </p><p>01:29 Wrestling Anecdotes and Technical Difficulties </p><p>03:04 Travel Plans and Airport Preferences </p><p>05:12 Manchester Trip and Quiet Carriage Etiquette </p><p>08:58 InfoSec History: Banned from the Internet </p><p>11:00 InfoSec History: The Love Letter Virus </p><p>14:17 Rant of the Week: Casino Mindset in Security </p><p>18:19 Understanding the Author's Perspective </p><p>19:19 AI Shopping App Scandal </p><p>24:30 Industry News Highlights </p><p>26:00 TikTok's Data Transfer Fine </p><p>29:08 Meta vs. NSO Group 31:40 Cyber Essentials Certification </p><p>35:58 Tweet of the Week </p><p>38:23 Conclusion and Farewell</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 12 May 2025 16:53:00 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/219-the-lightweight-and-aerodynamic-episode-BzlwPQCR</link>
      <content:encoded><![CDATA[<p>Episode 219 of the Host Unknown Podcast covers a wide range of humorous and insightful discussions relating to both technology and personal anecdotes. Key segments include a nostalgic look back at significant moments in InfoSec history, as well as a critique of a poorly-constructed analogy between casino strategies and cybersecurity. The hosts also discuss the misadventures of an AI app that wasn't really AI, cyber insurance claims, the fines against TikTok and NSO Group, and the importance of Cyber Essentials certification. The episode is peppered with casual banter about everyday life and observations, making for an entertaining yet informative listen. </p><p>00:00 Introduction and Initial Banter </p><p>00:57 Podcast Introduction and Missing Guest </p><p>01:29 Wrestling Anecdotes and Technical Difficulties </p><p>03:04 Travel Plans and Airport Preferences </p><p>05:12 Manchester Trip and Quiet Carriage Etiquette </p><p>08:58 InfoSec History: Banned from the Internet </p><p>11:00 InfoSec History: The Love Letter Virus </p><p>14:17 Rant of the Week: Casino Mindset in Security </p><p>18:19 Understanding the Author's Perspective </p><p>19:19 AI Shopping App Scandal </p><p>24:30 Industry News Highlights </p><p>26:00 TikTok's Data Transfer Fine </p><p>29:08 Meta vs. NSO Group 31:40 Cyber Essentials Certification </p><p>35:58 Tweet of the Week </p><p>38:23 Conclusion and Farewell</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38388437" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/030bf270-4152-45d5-98e4-08d7125a2d51/audio/c6558427-19d7-4a15-b67f-2522d04a4073/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>219 - The Lightweight and Aerodynamic Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes</itunes:author>
      <itunes:duration>00:39:59</itunes:duration>
      <itunes:summary>In this segment of the Host Unknown Podcast, Javvad and Andy navigate without their usual companion, Thom, to present a delightful mishmash of discussions ranging from old man Langford&apos;s age jokes, quirky travel anecdotes, humorous takes on cybersecurity themes, to industry news and a particularly tone-deaf response from a venture capitalist on social media. Amid managing technical glitches and humorous misunderstandings, they cover a myriad of topics including ransomware attacks, AI fraud, and cybersecurity essentials, while nostalgic discussions on old technology and internet histories are revisited. </itunes:summary>
      <itunes:subtitle>In this segment of the Host Unknown Podcast, Javvad and Andy navigate without their usual companion, Thom, to present a delightful mishmash of discussions ranging from old man Langford&apos;s age jokes, quirky travel anecdotes, humorous takes on cybersecurity themes, to industry news and a particularly tone-deaf response from a venture capitalist on social media. Amid managing technical glitches and humorous misunderstandings, they cover a myriad of topics including ransomware attacks, AI fraud, and cybersecurity essentials, while nostalgic discussions on old technology and internet histories are revisited. </itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>219</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6ebfffc-1e16-496d-9b26-1b51aa4e823b</guid>
      <title>Episode  213 - The So Many Technical Issues Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (10:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion".</p><p><a href="https://x.com/todayininfosec/status/1907094503552336134">https://x.com/todayininfosec/status/1907094503552336134</a>     </p><p>1st April 2004: The now ubiquitous Gmail service is launched as an invitation-only beta service. At first met with skepticism due to it being launched on April Fool’s Day, the ease of use and speed that Gmail offered for a web-based e-mail service quickly won converts. The fact that Gmail was invitiation-only for a long time helped fueled a mystique that those who had a Gmail address were hip and uber-cool. Those of us who are actually hip and uber-cool didn’t mind, of course, as those types of things don’t bother hip and uber-cool people. </p><p><a href="https://thisdayintechhistory.com/04/01/gmail-launched/">https://thisdayintechhistory.com/04/01/gmail-launched/</a>  </p><p> </p><p><strong>Rant of the Week (14:07)</strong></p><p>Kink and LGBT dating apps exposed 1.5m private user images online</p><p><a href="https://www.bbc.co.uk/news/articles/c05m5m5v327o">https://www.bbc.co.uk/news/articles/c05m5m5v327o</a></p><p>Researchers have discovered nearly 1.5 million pictures from specialist dating apps – many of which are explicit – being stored online without password protection, leaving them vulnerable to hackers and extortionists.</p><p>Anyone with the link was able to view the private photos from five platforms developed by M.A.D Mobile: kink sites BDSM People and Chica, and LGBT apps Pink, Brish and Translove.</p><p>These services are used by an estimated 800,000 to 900,000 people.</p><p>M.A.D Mobile was first warned about the security flaw on 20 January but didn't take action until the BBC emailed on Friday.</p><p>They have since fixed it but not said how it happened or why they failed to protect the sensitive images.</p><p> </p><p><strong>Billy Big Balls of the Week (24:00)</strong></p><p><a href="https://www.theregister.com/2025/04/02/oracle_breach_disaster_planning/">Oracle's masterclass in breach comms: Deny, deflect, repeat</a></p><p>There have been some disclosure stinkers in the past. Back in 2016, The Reg discovered that Yahoo! had taken a few years to disclose security snafus that occured in 2013 and 2014, for example. These days we often see organizations simply choose not to publicly address their issues. A quick self-referral to the regulators and some letters sent directly to those affected pass as the bare minimum, and while these organizations won't get any Brownie points for transparency, the approach doesn't tend to invite too much in the way of long-lasting criticism either.</p><p>When Oracle issued its flat-out denial of the first breach allegations that surfaced from cybercrime forums, it seemed like it was yet another wannabe big-time scriptkiddie making false claims for clout.</p><p>To make matters worse, Oracle seemingly tried to swerve any flak with some careful semantics. Its original denial stated: "There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data."</p><p>Infosec experts Kevin Beaumont and Jake Williams later both claimed that Oracle appears to have used the Internet Wayback Machine's archive exclusion process to remove evidence about the intrusion.</p><p> </p><p><strong>Industry News (33:25)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-switch-e2ee-all-gmail-users/">Google to Switch on E2EE for All Gmail Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-apologizes-data-protection/">ICO Apologizes After Data Protection Response Snafu</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-fake-it-worker-europe/">North Korea's Fake IT Worker Scheme Sets Sights on Europe</a></p><p><a href="https://www.infosecurity-magazine.com/news/royal-mail-investigates-data/">Royal Mail Investigates Data Breach Affecting Supplier</a></p><p><a href="https://www.infosecurity-magazine.com/news/stripe-api-skimming-campaign-new/">Stripe API Skimming Campaign Unveils New Techniques for Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-attacks-electricity-water/">Over Half of Attacks on Electricity and Water Firms Are Destructive</a></p><p><a href="https://www.infosecurity-magazine.com/news/coquettte-hacker-malware-bph/">Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/crushftp-flaw-exploited-disclosure/">CrushFTP Vulnerability Exploited Following Disclosure Issues</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-platform-child-exploitation/">Major Online Platform for Child Exploitation Dismantled</a></p><p> </p><p><strong>Tweet of the Week (41:25)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeUaH7SUWByVYOnwtXk_QbftznOKTA92Ee6jfCOBxvk8vOml3qKs47RI_WNXfIPjfoPMaGMDdylc_trhSsjPC6keFS9bHaaosckEJ0TONftRu0UWcULgznut2uR_ib85BItuQrf4w?key=8LvGHyGuD6HC_hGyvDorotHj" /><p><a href="https://x.com/MalwareJake/status/1907416667052786110">https://x.com/MalwareJake/status/1907416667052786110</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Apr 2025 15:34:28 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-213-60KB1dMY</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (10:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion".</p><p><a href="https://x.com/todayininfosec/status/1907094503552336134">https://x.com/todayininfosec/status/1907094503552336134</a>     </p><p>1st April 2004: The now ubiquitous Gmail service is launched as an invitation-only beta service. At first met with skepticism due to it being launched on April Fool’s Day, the ease of use and speed that Gmail offered for a web-based e-mail service quickly won converts. The fact that Gmail was invitiation-only for a long time helped fueled a mystique that those who had a Gmail address were hip and uber-cool. Those of us who are actually hip and uber-cool didn’t mind, of course, as those types of things don’t bother hip and uber-cool people. </p><p><a href="https://thisdayintechhistory.com/04/01/gmail-launched/">https://thisdayintechhistory.com/04/01/gmail-launched/</a>  </p><p> </p><p><strong>Rant of the Week (14:07)</strong></p><p>Kink and LGBT dating apps exposed 1.5m private user images online</p><p><a href="https://www.bbc.co.uk/news/articles/c05m5m5v327o">https://www.bbc.co.uk/news/articles/c05m5m5v327o</a></p><p>Researchers have discovered nearly 1.5 million pictures from specialist dating apps – many of which are explicit – being stored online without password protection, leaving them vulnerable to hackers and extortionists.</p><p>Anyone with the link was able to view the private photos from five platforms developed by M.A.D Mobile: kink sites BDSM People and Chica, and LGBT apps Pink, Brish and Translove.</p><p>These services are used by an estimated 800,000 to 900,000 people.</p><p>M.A.D Mobile was first warned about the security flaw on 20 January but didn't take action until the BBC emailed on Friday.</p><p>They have since fixed it but not said how it happened or why they failed to protect the sensitive images.</p><p> </p><p><strong>Billy Big Balls of the Week (24:00)</strong></p><p><a href="https://www.theregister.com/2025/04/02/oracle_breach_disaster_planning/">Oracle's masterclass in breach comms: Deny, deflect, repeat</a></p><p>There have been some disclosure stinkers in the past. Back in 2016, The Reg discovered that Yahoo! had taken a few years to disclose security snafus that occured in 2013 and 2014, for example. These days we often see organizations simply choose not to publicly address their issues. A quick self-referral to the regulators and some letters sent directly to those affected pass as the bare minimum, and while these organizations won't get any Brownie points for transparency, the approach doesn't tend to invite too much in the way of long-lasting criticism either.</p><p>When Oracle issued its flat-out denial of the first breach allegations that surfaced from cybercrime forums, it seemed like it was yet another wannabe big-time scriptkiddie making false claims for clout.</p><p>To make matters worse, Oracle seemingly tried to swerve any flak with some careful semantics. Its original denial stated: "There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data."</p><p>Infosec experts Kevin Beaumont and Jake Williams later both claimed that Oracle appears to have used the Internet Wayback Machine's archive exclusion process to remove evidence about the intrusion.</p><p> </p><p><strong>Industry News (33:25)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-switch-e2ee-all-gmail-users/">Google to Switch on E2EE for All Gmail Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-apologizes-data-protection/">ICO Apologizes After Data Protection Response Snafu</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-fake-it-worker-europe/">North Korea's Fake IT Worker Scheme Sets Sights on Europe</a></p><p><a href="https://www.infosecurity-magazine.com/news/royal-mail-investigates-data/">Royal Mail Investigates Data Breach Affecting Supplier</a></p><p><a href="https://www.infosecurity-magazine.com/news/stripe-api-skimming-campaign-new/">Stripe API Skimming Campaign Unveils New Techniques for Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-attacks-electricity-water/">Over Half of Attacks on Electricity and Water Firms Are Destructive</a></p><p><a href="https://www.infosecurity-magazine.com/news/coquettte-hacker-malware-bph/">Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/crushftp-flaw-exploited-disclosure/">CrushFTP Vulnerability Exploited Following Disclosure Issues</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-platform-child-exploitation/">Major Online Platform for Child Exploitation Dismantled</a></p><p> </p><p><strong>Tweet of the Week (41:25)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeUaH7SUWByVYOnwtXk_QbftznOKTA92Ee6jfCOBxvk8vOml3qKs47RI_WNXfIPjfoPMaGMDdylc_trhSsjPC6keFS9bHaaosckEJ0TONftRu0UWcULgznut2uR_ib85BItuQrf4w?key=8LvGHyGuD6HC_hGyvDorotHj" /><p><a href="https://x.com/MalwareJake/status/1907416667052786110">https://x.com/MalwareJake/status/1907416667052786110</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50029621" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e09c0071-a4e4-4dc3-9046-2a592aa52a15/audio/a5bfc830-0196-4f61-957f-fe3e9754bf88/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode  213 - The So Many Technical Issues Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/103c2aec-911d-4fec-ac41-2443805e4778/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:06</itunes:duration>
      <itunes:summary>This week in InfoSec shows us that this wonderful industry is not immune to April fools pranks

Rant of the Week warns of the dangers of using kinky sites

Billy Big Balls is a masterclass in PR
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week Is a reminder to update your vernacular</itunes:summary>
      <itunes:subtitle>This week in InfoSec shows us that this wonderful industry is not immune to April fools pranks

Rant of the Week warns of the dangers of using kinky sites

Billy Big Balls is a masterclass in PR
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week Is a reminder to update your vernacular</itunes:subtitle>
      <itunes:keywords>april fools, ba, going for gold, mad mobile, oracle breach, not blacklisting, gmail, not whitelisting</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>213</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2fb630cd-6ea8-420f-a477-f14847eb90fb</guid>
      <title>Episode 222 - The Disappearing Episodes Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (11:22)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th February 2002: Timothy Allen Lloyd was sentenced to 41 months in prison for activating a logic bomb at Omega Engineering, 20 days after being fired as a network administrator.</p><p><a href="https://x.com/todayininfosec/status/1895255588881474024">https://x.com/todayininfosec/status/1895255588881474024</a>    </p><p>18th February 2013: Burger King's Twitter account was compromised, had its name changed to McDonalds, and shared offensive tweets. The incident was a...well...Whopper! </p><p><a href="https://x.com/todayininfosec/status/1891999132866183322">https://x.com/todayininfosec/status/1891999132866183322</a></p><p> </p><p><strong>Rant of the Week (17:34)</strong></p><p><a href="https://www.theregister.com/2025/02/27/army_soldier_accused_of_att/">Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</a></p><p>The US Army soldier suspected of compromising AT&T and bragging about getting his hands on President Trump's call logs allegedly tried to sell stolen information to a foreign intel agent.</p><p>The military man even Google searched for "can hacking be treason," and "US military personnel defecting to Russia," according to prosecutors who argue he poses a serious flight risk and should be detained.</p><p>Cameron John Wagenius, 21, was <a href="https://www.theregister.com/2025/02/20/us_army_snowflake_theft/">arrested</a> in Texas in December, and last week told a federal court judge he <a href="https://www.theregister.com/2025/02/20/us_army_snowflake_theft/">intends to plead guilty</a> to unlawfully posting and transferring confidential phone records. </p><p>Prosecutors have also linked Wagenius to two other men accused of stealing data from <a href="https://www.theregister.com/2024/06/04/snowflake_report_pulled/">more than 150 Snowflake cloud accounts</a> in April 2024, and then demanding payment to keep a lid on that info.</p><p>After admitting his crimes in court, and showing a willingness to enter a guilty plea, "Wagenius should be detained as both a danger to the community — given his ability to access sensitive datasets — and a serious risk of flight," Uncle Sam's attorneys argued.</p><p>"While engaged in these criminal activities, Wagenius conducted online searches about how to defect to countries that do not extradite to the United States and that he previously attempted to sell hacked information to at least one foreign intelligence service," the documents allege. </p><p> </p><p><strong>Billy Big Balls of the Week (24:32)</strong></p><p><a href="https://www.theregister.com/2025/02/26/nsa_firings_intelink_chats/">100-plus spies fired after NSA internal chat board used for kinky sex talk</a></p><p>More than 100 US spies have been fired, and their security clearance revoked, after an internal NSA messaging system was used by staff to chat about their sex lives.</p><p>After the NSA – the National Security Agency, that is, not the other meaning – confirmed <a href="https://x.com/NSAGov/status/1894471720687559074">on state media</a> it was "aware of posts that appear to show inappropriate discussions" by intelligence community employees and that "investigations to address this misuse of government systems are ongoing," Trump's Director of National Intelligence Tulsi Gabbard announced more than 100 people had since been terminated.</p><p>The messaging app in question is the NSA's Intelink, a secure intranet service used by various American military and intelligence teams to share information, including top secret and classified threat intel.</p><p>Federal workers said to have been involved in the NSFW Intelink chatter included personnel at the NSA, the Defense Intelligence Agency, and US Naval Intelligence.</p><p>"There are over 100 people from across the intelligence community that contributed to and participated in … what is really just an egregious violation of trust," Gabbard <a href="https://www.foxnews.com/shows/jesse-watters-primetime">told</a> Fox News commentator Jesse Watters Tuesday. "What to speak of, like basic rules and standards around professionalism."</p><p> </p><p><strong>Industry News (32:54)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-silver-fox-backdoors/">Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-genea-ivf-patient-data/">Ransomware Gang Publishes Stolen Genea IVF Patient Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/haveibeenpwned-244-million/">HaveIBeenPwned Adds 244 Million Passwords Stolen By Infostealers</a></p><p><a href="https://www.infosecurity-magazine.com/news/signal-exit-sweden-government/">Signal May Exit Sweden If Government Imposes Encryption Backdoor</a></p><p><a href="https://www.infosecurity-magazine.com/news/disa-global-solutions-confirms/">DISA Global Solutions Confirms Data Breach Affecting 3.3M People</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-confirms-north-koreas-lazarus/">FBI Confirms North Korea’s Lazarus Group as Bybit Crypto Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/openssf-security-framework-open/">OpenSSF Publishes Security Framework for Open Source Software</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-vulnerabilities-nine/">Software Vulnerabilities Take Almost Nine Months to Patch</a></p><p><a href="https://www.infosecurity-magazine.com/news/6tb-data-stolen-saudi-cyber-attack/">DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen</a></p><p> </p><p><strong>Tweet of the Week (42:59)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfUo6ItUXVzw8x7B3OYGRrx_RZRXkqIsM2_btqG_IaGugJy8yZ8RCQFDyDRfJqoQOm81gFFozdjZQTFdCwm3ngCrJBIRLQNrOd21PP_3DnPIXjMklFJUPLgE3A4O1eumwNhGG_F8g?key=XAI2C-hDF8BOUXHBbePqKZ4c" /><p><a href="https://x.com/roytait/status/1895224942565970354">https://x.com/roytait/status/1895224942565970354</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 3 Mar 2025 23:54:02 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-222-i54Mrqgk</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (11:22)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th February 2002: Timothy Allen Lloyd was sentenced to 41 months in prison for activating a logic bomb at Omega Engineering, 20 days after being fired as a network administrator.</p><p><a href="https://x.com/todayininfosec/status/1895255588881474024">https://x.com/todayininfosec/status/1895255588881474024</a>    </p><p>18th February 2013: Burger King's Twitter account was compromised, had its name changed to McDonalds, and shared offensive tweets. The incident was a...well...Whopper! </p><p><a href="https://x.com/todayininfosec/status/1891999132866183322">https://x.com/todayininfosec/status/1891999132866183322</a></p><p> </p><p><strong>Rant of the Week (17:34)</strong></p><p><a href="https://www.theregister.com/2025/02/27/army_soldier_accused_of_att/">Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</a></p><p>The US Army soldier suspected of compromising AT&T and bragging about getting his hands on President Trump's call logs allegedly tried to sell stolen information to a foreign intel agent.</p><p>The military man even Google searched for "can hacking be treason," and "US military personnel defecting to Russia," according to prosecutors who argue he poses a serious flight risk and should be detained.</p><p>Cameron John Wagenius, 21, was <a href="https://www.theregister.com/2025/02/20/us_army_snowflake_theft/">arrested</a> in Texas in December, and last week told a federal court judge he <a href="https://www.theregister.com/2025/02/20/us_army_snowflake_theft/">intends to plead guilty</a> to unlawfully posting and transferring confidential phone records. </p><p>Prosecutors have also linked Wagenius to two other men accused of stealing data from <a href="https://www.theregister.com/2024/06/04/snowflake_report_pulled/">more than 150 Snowflake cloud accounts</a> in April 2024, and then demanding payment to keep a lid on that info.</p><p>After admitting his crimes in court, and showing a willingness to enter a guilty plea, "Wagenius should be detained as both a danger to the community — given his ability to access sensitive datasets — and a serious risk of flight," Uncle Sam's attorneys argued.</p><p>"While engaged in these criminal activities, Wagenius conducted online searches about how to defect to countries that do not extradite to the United States and that he previously attempted to sell hacked information to at least one foreign intelligence service," the documents allege. </p><p> </p><p><strong>Billy Big Balls of the Week (24:32)</strong></p><p><a href="https://www.theregister.com/2025/02/26/nsa_firings_intelink_chats/">100-plus spies fired after NSA internal chat board used for kinky sex talk</a></p><p>More than 100 US spies have been fired, and their security clearance revoked, after an internal NSA messaging system was used by staff to chat about their sex lives.</p><p>After the NSA – the National Security Agency, that is, not the other meaning – confirmed <a href="https://x.com/NSAGov/status/1894471720687559074">on state media</a> it was "aware of posts that appear to show inappropriate discussions" by intelligence community employees and that "investigations to address this misuse of government systems are ongoing," Trump's Director of National Intelligence Tulsi Gabbard announced more than 100 people had since been terminated.</p><p>The messaging app in question is the NSA's Intelink, a secure intranet service used by various American military and intelligence teams to share information, including top secret and classified threat intel.</p><p>Federal workers said to have been involved in the NSFW Intelink chatter included personnel at the NSA, the Defense Intelligence Agency, and US Naval Intelligence.</p><p>"There are over 100 people from across the intelligence community that contributed to and participated in … what is really just an egregious violation of trust," Gabbard <a href="https://www.foxnews.com/shows/jesse-watters-primetime">told</a> Fox News commentator Jesse Watters Tuesday. "What to speak of, like basic rules and standards around professionalism."</p><p> </p><p><strong>Industry News (32:54)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-silver-fox-backdoors/">Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-genea-ivf-patient-data/">Ransomware Gang Publishes Stolen Genea IVF Patient Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/haveibeenpwned-244-million/">HaveIBeenPwned Adds 244 Million Passwords Stolen By Infostealers</a></p><p><a href="https://www.infosecurity-magazine.com/news/signal-exit-sweden-government/">Signal May Exit Sweden If Government Imposes Encryption Backdoor</a></p><p><a href="https://www.infosecurity-magazine.com/news/disa-global-solutions-confirms/">DISA Global Solutions Confirms Data Breach Affecting 3.3M People</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-confirms-north-koreas-lazarus/">FBI Confirms North Korea’s Lazarus Group as Bybit Crypto Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/openssf-security-framework-open/">OpenSSF Publishes Security Framework for Open Source Software</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-vulnerabilities-nine/">Software Vulnerabilities Take Almost Nine Months to Patch</a></p><p><a href="https://www.infosecurity-magazine.com/news/6tb-data-stolen-saudi-cyber-attack/">DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen</a></p><p> </p><p><strong>Tweet of the Week (42:59)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfUo6ItUXVzw8x7B3OYGRrx_RZRXkqIsM2_btqG_IaGugJy8yZ8RCQFDyDRfJqoQOm81gFFozdjZQTFdCwm3ngCrJBIRLQNrOd21PP_3DnPIXjMklFJUPLgE3A4O1eumwNhGG_F8g?key=XAI2C-hDF8BOUXHBbePqKZ4c" /><p><a href="https://x.com/roytait/status/1895224942565970354">https://x.com/roytait/status/1895224942565970354</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44869915" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3e2dd0ea-6501-4e87-8056-d94b59a4fa70/audio/2a6a7e37-2a91-4d99-a6e3-d8e929822ac3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 222 - The Disappearing Episodes Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/be303312-0b3e-4697-9323-bee5b94dfc3a/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:44</itunes:duration>
      <itunes:summary>This week in InfoSec uses a phrase for the oldies in the room (“Logic Bomb”)

Rant of the Week warns of what NOT to search after committing a crime

Billy Big Balls is a reminder that chats on company networks are not private
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week Is the reason you are hearing our dulcet tones today!</itunes:summary>
      <itunes:subtitle>This week in InfoSec uses a phrase for the oldies in the room (“Logic Bomb”)

Rant of the Week warns of what NOT to search after committing a crime

Billy Big Balls is a reminder that chats on company networks are not private
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week Is the reason you are hearing our dulcet tones today!</itunes:subtitle>
      <itunes:keywords>is hacking treason?, roy tait, backdoors, wagenius, burger king, nsa, mcdonalds, intelink, logic bomb, lazarous, kinky, smashin security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>212</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d01f720f-084f-46e6-8f50-fca70a3694d1</guid>
      <title>Episode 211 - The Last of the Year Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (11:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th December 2013: Troy Hunt launched the free-to-search site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? Billions of  compromised records from hundreds of breaches.</p><p><a href="https://twitter.com/todayininfosec/status/1864299155583127739">https://twitter.com/todayininfosec/status/1864299155583127739</a>    </p><p> </p><p>5th December 1996: Julian Assange pleaded guilty to 25 of 31 hacking charges and related charges and was ordered to repay $2,100 to Australian National University. He had been arrested in 1994 for hacking crimes committed in 1991. The court case details weren't released until 2011.</p><p><a href="https://twitter.com/todayininfosec/status/1864664694243434977">https://twitter.com/todayininfosec/status/1864664694243434977</a></p><p> </p><p><strong>Rant of the Week (17:21)</strong></p><p><a href="https://www.theregister.com/2024/12/03/ncsc_annual_review">Severity of the risk facing the UK is widely underestimated, NCSC annual review warns</a></p><p>The number of security threats in the UK that hit the country's National Cyber Security Centre's (NCSC) maximum severity threshold has tripled compared to the previous 12 months.</p><p>Published Tuesday 3rd December, GCHQ's tech offshoot's 2024 review reveals that 12 incidents topped the NCSC's severity classification system out of a total 430 cases that required support from its Incident Management (IM) team between September 2023 and August 2024. The finding represents a 16 percent increase year-over-year.</p><p>The number of nationally significant incidents also rose from 62 last year to 89 in the latest data, six of which were caused by exploiting two Palo Alto and Cisco zero-days. This number includes the 12 deemed maximally severe and an undetermined number of attacks on the UK's central government.</p><p> </p><p><strong>Billy Big Balls of the Week (25:50)</strong></p><p><a href="https://www.theregister.com/2024/12/06/badass_russian_techie_outsmarts_fsb/">Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware</a></p><p>A Russian programmer defied the Federal Security Service (FSB) by publicizing the fact his phone was infected with spyware after being confiscated by authorities.</p><p>Kirill Parubets was detained in Russia for 15 days after being accused of sending money to Ukraine, during which time the man was beaten and subjected to aggressive efforts to recruit him as an FSB informant on his contacts in Ukraine.</p><p>According to his account of the story, published with his consent by <a href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Toronto University's Citizen Lab</a> and First Department legal organization, he says he was threatened with life imprisonment if he failed to comply with the recruitment drive.</p><p>In order to secure release, he agreed but before he was indoctrinated he and his wife fled the country. Always keep a second passport, if possible. </p><p> </p><p><strong>Industry News (32:21)</strong></p><p><a href="http://crypto.com">Crypto.com Launches Massive $2m Bug Bounty Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/german-police-shutter-largest-dark/">German Police Shutter Country’s Largest Dark Web Market</a></p><p><a href="https://www.infosecurity-magazine.com/news/enisa-launches-first-state-eu/">ENISA Launches First State of EU Cybersecurity Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/wirral-hospital-recovery-continues/">Wirral Hospital Recovery Continues One Week After Cyber Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-genai-financial-fraud/">FBI Warns GenAI is Boosting Financial Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-online-fraud-platform/">Europol Dismantles Major Online Fraud Platform in Major Blow to Fraudsters</a></p><p><a href="https://www.infosecurity-magazine.com/news/deloitte-denies-breach-claims/">Deloitte Denies Breach, Claims Cyber-Attack Targeted Single Client</a></p><p><a href="https://www.infosecurity-magazine.com/news/romania-tiktok-propaganda-campaign/">Romania Exposes TikTok Propaganda Campaign Supporting Pro-Russian Candidate</a></p><p><a href="https://www.infosecurity-magazine.com/news/fcc-cybersecurity-rules-for-us/">FCC Proposes Stricter Cybersecurity Rules for US Telecoms</a></p><p> </p><p><strong>Tweet of the Week  (43:43)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXduZzET0cJcZpAS3HLtLQbmhpr8Cz0MsF0pAUosldDfLOne9VFnsKcBHxzs-YXEUSfwDn8D1tOFy2dzpxSfuSA39h8asblIsuqKfoRnixTtm6nZqCYynNGjRfCpA-xzTxijU5F1_A?key=EnDS0829BZjstPZDwRyS7m6O" /><p> </p><p><a href="https://twitter.com/McGrewSecurity/status/1865050788369772974">https://twitter.com/McGrewSecurity/status/1865050788369772974</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 11 Dec 2024 08:42:26 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-211-MACeoW8U</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (11:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th December 2013: Troy Hunt launched the free-to-search site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? Billions of  compromised records from hundreds of breaches.</p><p><a href="https://twitter.com/todayininfosec/status/1864299155583127739">https://twitter.com/todayininfosec/status/1864299155583127739</a>    </p><p> </p><p>5th December 1996: Julian Assange pleaded guilty to 25 of 31 hacking charges and related charges and was ordered to repay $2,100 to Australian National University. He had been arrested in 1994 for hacking crimes committed in 1991. The court case details weren't released until 2011.</p><p><a href="https://twitter.com/todayininfosec/status/1864664694243434977">https://twitter.com/todayininfosec/status/1864664694243434977</a></p><p> </p><p><strong>Rant of the Week (17:21)</strong></p><p><a href="https://www.theregister.com/2024/12/03/ncsc_annual_review">Severity of the risk facing the UK is widely underestimated, NCSC annual review warns</a></p><p>The number of security threats in the UK that hit the country's National Cyber Security Centre's (NCSC) maximum severity threshold has tripled compared to the previous 12 months.</p><p>Published Tuesday 3rd December, GCHQ's tech offshoot's 2024 review reveals that 12 incidents topped the NCSC's severity classification system out of a total 430 cases that required support from its Incident Management (IM) team between September 2023 and August 2024. The finding represents a 16 percent increase year-over-year.</p><p>The number of nationally significant incidents also rose from 62 last year to 89 in the latest data, six of which were caused by exploiting two Palo Alto and Cisco zero-days. This number includes the 12 deemed maximally severe and an undetermined number of attacks on the UK's central government.</p><p> </p><p><strong>Billy Big Balls of the Week (25:50)</strong></p><p><a href="https://www.theregister.com/2024/12/06/badass_russian_techie_outsmarts_fsb/">Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware</a></p><p>A Russian programmer defied the Federal Security Service (FSB) by publicizing the fact his phone was infected with spyware after being confiscated by authorities.</p><p>Kirill Parubets was detained in Russia for 15 days after being accused of sending money to Ukraine, during which time the man was beaten and subjected to aggressive efforts to recruit him as an FSB informant on his contacts in Ukraine.</p><p>According to his account of the story, published with his consent by <a href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Toronto University's Citizen Lab</a> and First Department legal organization, he says he was threatened with life imprisonment if he failed to comply with the recruitment drive.</p><p>In order to secure release, he agreed but before he was indoctrinated he and his wife fled the country. Always keep a second passport, if possible. </p><p> </p><p><strong>Industry News (32:21)</strong></p><p><a href="http://crypto.com">Crypto.com Launches Massive $2m Bug Bounty Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/german-police-shutter-largest-dark/">German Police Shutter Country’s Largest Dark Web Market</a></p><p><a href="https://www.infosecurity-magazine.com/news/enisa-launches-first-state-eu/">ENISA Launches First State of EU Cybersecurity Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/wirral-hospital-recovery-continues/">Wirral Hospital Recovery Continues One Week After Cyber Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-genai-financial-fraud/">FBI Warns GenAI is Boosting Financial Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-online-fraud-platform/">Europol Dismantles Major Online Fraud Platform in Major Blow to Fraudsters</a></p><p><a href="https://www.infosecurity-magazine.com/news/deloitte-denies-breach-claims/">Deloitte Denies Breach, Claims Cyber-Attack Targeted Single Client</a></p><p><a href="https://www.infosecurity-magazine.com/news/romania-tiktok-propaganda-campaign/">Romania Exposes TikTok Propaganda Campaign Supporting Pro-Russian Candidate</a></p><p><a href="https://www.infosecurity-magazine.com/news/fcc-cybersecurity-rules-for-us/">FCC Proposes Stricter Cybersecurity Rules for US Telecoms</a></p><p> </p><p><strong>Tweet of the Week  (43:43)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXduZzET0cJcZpAS3HLtLQbmhpr8Cz0MsF0pAUosldDfLOne9VFnsKcBHxzs-YXEUSfwDn8D1tOFy2dzpxSfuSA39h8asblIsuqKfoRnixTtm6nZqCYynNGjRfCpA-xzTxijU5F1_A?key=EnDS0829BZjstPZDwRyS7m6O" /><p> </p><p><a href="https://twitter.com/McGrewSecurity/status/1865050788369772974">https://twitter.com/McGrewSecurity/status/1865050788369772974</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49268517" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/24916493-7a82-4120-b4fd-a8088bf5c62b/audio/72a914ca-c132-40a8-b317-16139f556e62/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 211 - The Last of the Year Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/aa51d0c5-924b-44bd-884a-988d49249cb2/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:19</itunes:duration>
      <itunes:summary>This week in InfoSec is the O.G. credential dump

Rant of the Week warns that we don’t even know what we don’t know

Billy Big Balls is a reminder to always keep a second passport
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week reminds us that while an eagle soars, a hawk tuahs</itunes:summary>
      <itunes:subtitle>This week in InfoSec is the O.G. credential dump

Rant of the Week warns that we don’t even know what we don’t know

Billy Big Balls is a reminder to always keep a second passport
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week reminds us that while an eagle soars, a hawk tuahs</itunes:subtitle>
      <itunes:keywords>kiril parubets, have i been pwned, russia, fsb, assange, crypto.com, troy hunt with a c, hawk tuah, rug pull, romania, bug bounty</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>211</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">794fe6a9-12ea-40cd-843c-25d7db9f5ab4</guid>
      <title>Episode 210 - The Is Andy Paying Attention? Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. Oops.</p><p><a href="https://twitter.com/todayininfosec/status/1860803840620044356">https://twitter.com/todayininfosec/status/1860803840620044356</a>   </p><p>22nd November 2010: Matt Blaze published the PowerPoint slides he was contractually required to submit for his 2011 RSA Security Conference presentation. Matt hates PowerPoint. Take a moment to admire the slides he submitted.</p><p><a href="https://twitter.com/todayininfosec/status/1860027850369519669">https://twitter.com/todayininfosec/status/1860027850369519669</a></p><p> </p><p><strong>Rant of the Week (12:47)</strong></p><p><a href="https://www.theregister.com/2024/11/26/third_major_cyber_incident_declared/">https://www.theregister.com/2024/11/26/third_major_cyber_incident_declared/</a></p><p>A UK hospital is declaring a "major incident," cancelling all outpatient appointments due to "cybersecurity reasons."</p><p>The Wirral University Teaching Hospital NHS Trust, located in North West England, said the so-called "incident" affects the whole Trust, which oversees Wirral Women and Children's Hospital, Clatterbridge Hospital, and Arrowe Park Hospital.</p><p>Although the tech problems began on Monday, officials confirmed to The Register it is still dealing with the fallout as of Tuesday morning. </p><p>All outpatient appointments were canceled on Monday and the same decision was made today, according to Arrowe Park and Clatterbridge's social media posting. All patients whose appointments were canceled will be contacted to rearrange them.</p><p> </p><p><strong>Billy Big Balls of the Week (20:48)</strong></p><p><a href="https://www.theregister.com/2024/11/21/japan_digital_end_of_life/">Put your usernames and passwords in your will, advises Japan's government</a></p><p>Japan's National Consumer Affairs Center on Wednesday suggested citizens start "digital end of life planning" and offered tips on how to do it.</p><p>The Center's somewhat maudlin advice is motivated by recent incidents in which citizens struggled to cancel subscriptions their loved ones signed up for before their demise, because they didn't know their usernames or passwords. The resulting "digital legacy" can be unpleasant to resolve, the agency warns, so suggested four steps to simplify ensure our digital legacies aren't complicated:</p><p>Ensuring family members can unlock your smartphone or computer in case of emergency;</p><p>Maintain a list of your subscriptions, user IDs and passwords;</p><p>Consider putting those details in a document intended to be made available when your life ends;</p><p>Use a service that allows you to designate someone to have access to your smartphone and other accounts once your time on Earth ends.</p><p>The Center suggests now is the time for it to make this suggestion because it is aware of struggles to discover and resolve ongoing expenses after death. With smartphones ubiquitous, the org fears more people will find themselves unable to resolve their loved ones' digital affairs – and powerless to stop their credit cards being charged for services the departed cannot consume.</p><p>Some entrepreneurs have already identified end of life services as an opportunity. "Dead Man's Switch" apps can be set to contact whomever you choose if you do not sign in to certain accounts after a period you select as a likely indicator of your departure from this world.</p><p>Meta also offers the chance to nominate a "legacy contact" who can manage your account.</p><p>Such services aren't just opportunistic: grieving people have a lot on their plate, and executing wills is not always straightforward. </p><p> </p><p><strong>Industry News (31:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ico-urges-data-sharing-tackle/">ICO Urges More Data Sharing to Tackle Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-third-firms-struggling-shadow/">Over a Third of Firms Struggling With Shadow AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/darknet-services-fuel-holiday-scams/">Darknet Services Fuel Holiday Scams and E-Commerce Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-trust-major-incident/">NHS Trust Declares Major Incident for “Cybersecurity Reasons”</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuclear-decommissioning-authority/">Nuclear Decommissioning Authority Opens Sellafield Cyber Center</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-commission-healthcare-cyber-plan/">New EU Commission to Unveil Healthcare Cybersecurity Plan in First 100 Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-salt-typhoon-did-not/">T-Mobile Claims Salt Typhoon Did Not Access Customer Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/albanian-drug-busted-cops-decrypt/">Albanian Drug Smugglers Busted After Cops Decrypt Comms</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-justice-cybercrime-victims/">UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds</a></p><p> </p><p><strong>Tweet of the Week (39:43)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfoGjpUXpGlntfsVF1leQZ5WeiEznIAuBgeAItH1yqFmnibGsLQ98qecO-FqYO03_eSS-tYSUgAwH3bH81JZK1oS-2KJQsAz31jefl1Yk5wRzgYoj4WxKHSC0upML_Cj_ntvOWeIQ?key=47IH23IxFBXnOOMBRlMAW1EJ" /><p><a href="https://bsky.app/profile/mattpotteruk.bsky.social/post/3lbyu4dy3b22f">https://bsky.app/profile/mattpotteruk.bsky.social/post/3lbyu4dy3b22f</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 3 Dec 2024 09:17:37 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-210-FDYAvlJw</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. Oops.</p><p><a href="https://twitter.com/todayininfosec/status/1860803840620044356">https://twitter.com/todayininfosec/status/1860803840620044356</a>   </p><p>22nd November 2010: Matt Blaze published the PowerPoint slides he was contractually required to submit for his 2011 RSA Security Conference presentation. Matt hates PowerPoint. Take a moment to admire the slides he submitted.</p><p><a href="https://twitter.com/todayininfosec/status/1860027850369519669">https://twitter.com/todayininfosec/status/1860027850369519669</a></p><p> </p><p><strong>Rant of the Week (12:47)</strong></p><p><a href="https://www.theregister.com/2024/11/26/third_major_cyber_incident_declared/">https://www.theregister.com/2024/11/26/third_major_cyber_incident_declared/</a></p><p>A UK hospital is declaring a "major incident," cancelling all outpatient appointments due to "cybersecurity reasons."</p><p>The Wirral University Teaching Hospital NHS Trust, located in North West England, said the so-called "incident" affects the whole Trust, which oversees Wirral Women and Children's Hospital, Clatterbridge Hospital, and Arrowe Park Hospital.</p><p>Although the tech problems began on Monday, officials confirmed to The Register it is still dealing with the fallout as of Tuesday morning. </p><p>All outpatient appointments were canceled on Monday and the same decision was made today, according to Arrowe Park and Clatterbridge's social media posting. All patients whose appointments were canceled will be contacted to rearrange them.</p><p> </p><p><strong>Billy Big Balls of the Week (20:48)</strong></p><p><a href="https://www.theregister.com/2024/11/21/japan_digital_end_of_life/">Put your usernames and passwords in your will, advises Japan's government</a></p><p>Japan's National Consumer Affairs Center on Wednesday suggested citizens start "digital end of life planning" and offered tips on how to do it.</p><p>The Center's somewhat maudlin advice is motivated by recent incidents in which citizens struggled to cancel subscriptions their loved ones signed up for before their demise, because they didn't know their usernames or passwords. The resulting "digital legacy" can be unpleasant to resolve, the agency warns, so suggested four steps to simplify ensure our digital legacies aren't complicated:</p><p>Ensuring family members can unlock your smartphone or computer in case of emergency;</p><p>Maintain a list of your subscriptions, user IDs and passwords;</p><p>Consider putting those details in a document intended to be made available when your life ends;</p><p>Use a service that allows you to designate someone to have access to your smartphone and other accounts once your time on Earth ends.</p><p>The Center suggests now is the time for it to make this suggestion because it is aware of struggles to discover and resolve ongoing expenses after death. With smartphones ubiquitous, the org fears more people will find themselves unable to resolve their loved ones' digital affairs – and powerless to stop their credit cards being charged for services the departed cannot consume.</p><p>Some entrepreneurs have already identified end of life services as an opportunity. "Dead Man's Switch" apps can be set to contact whomever you choose if you do not sign in to certain accounts after a period you select as a likely indicator of your departure from this world.</p><p>Meta also offers the chance to nominate a "legacy contact" who can manage your account.</p><p>Such services aren't just opportunistic: grieving people have a lot on their plate, and executing wills is not always straightforward. </p><p> </p><p><strong>Industry News (31:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ico-urges-data-sharing-tackle/">ICO Urges More Data Sharing to Tackle Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-third-firms-struggling-shadow/">Over a Third of Firms Struggling With Shadow AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/darknet-services-fuel-holiday-scams/">Darknet Services Fuel Holiday Scams and E-Commerce Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-trust-major-incident/">NHS Trust Declares Major Incident for “Cybersecurity Reasons”</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuclear-decommissioning-authority/">Nuclear Decommissioning Authority Opens Sellafield Cyber Center</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-commission-healthcare-cyber-plan/">New EU Commission to Unveil Healthcare Cybersecurity Plan in First 100 Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-salt-typhoon-did-not/">T-Mobile Claims Salt Typhoon Did Not Access Customer Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/albanian-drug-busted-cops-decrypt/">Albanian Drug Smugglers Busted After Cops Decrypt Comms</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-justice-cybercrime-victims/">UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds</a></p><p> </p><p><strong>Tweet of the Week (39:43)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfoGjpUXpGlntfsVF1leQZ5WeiEznIAuBgeAItH1yqFmnibGsLQ98qecO-FqYO03_eSS-tYSUgAwH3bH81JZK1oS-2KJQsAz31jefl1Yk5wRzgYoj4WxKHSC0upML_Cj_ntvOWeIQ?key=47IH23IxFBXnOOMBRlMAW1EJ" /><p><a href="https://bsky.app/profile/mattpotteruk.bsky.social/post/3lbyu4dy3b22f">https://bsky.app/profile/mattpotteruk.bsky.social/post/3lbyu4dy3b22f</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44774620" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c23026c1-0e9c-4383-aa95-71da65b94842/audio/891ed8cf-2e2a-4e32-ade8-f4a75ca307fa/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 210 - The Is Andy Paying Attention? Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/55ebae65-ecac-4095-a77a-6bcdc9fbc43f/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:38</itunes:duration>
      <itunes:summary>This week in InfoSec was not updated in the show notes

Rant of the Week was not updated in the show notes

Billy Big Balls was not updated in the show notes
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week was not updated in the show notes
</itunes:summary>
      <itunes:subtitle>This week in InfoSec was not updated in the show notes

Rant of the Week was not updated in the show notes

Billy Big Balls was not updated in the show notes
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week was not updated in the show notes
</itunes:subtitle>
      <itunes:keywords>keys, nhs, tsa, japan, training, password sharing, powerpoint, ico, salt typhoon, pirating ai, wills</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>210</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd1ffb8c-6b27-4e9d-988e-5f9c27970ce5</guid>
      <title>Episode 209 - The Javvad Is In Big Trouble Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:24)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th November 2012: John McAfee went into hiding because his neighbour, Gregory Faull, was found dead from a gunshot. Belize police wanted him to come in for questioning, but he fled to Guatemala where he was then arrested. He was never charged, though he lost a $25 million wrongful death suit.</p><p><a href="https://x.com/todayininfosec/status/1856538748361515355">https://x.com/todayininfosec/status/1856538748361515355</a>   </p><p>12th November 2000: Bill Gates demonstrates a functional prototype of a Tablet PC. Microsoft claims “<a href="https://news.microsoft.com/2000/11/12/microsoft-chief-software-architect-lays-out-a-blueprint-for-the-future-of-the-internet/">the Tablet PC will represent the next major evolution in PC design and functionality.</a>” However, the Tablet PC initiative never really took off and it wasn't until <a href="https://thisdayintechhistory.com/01/27/ipad-introduced/">Apple introduced the iPad in 2010</a> that tablet computing was widely adopted.</p><p><a href="https://thisdayintechhistory.com/11/12/microsoft-declares-tablets-are-the-future/">Microsoft Declares Tablets Are the Future</a></p><p> </p><p><strong>Rant of the Week (15:41)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-moveit-leaker-claims">Amazon MOVEit Leaker Claims to Be Ethical Hacker</a></p><p>A threat actor who posted 2.8 million lines of Amazon employee data last week has taken to the dark web to claim they are doing so to raise awareness of poor security practice.</p><p>The individual, who goes by the online moniker “Nam3L3ss,” claimed in a series of posts to have obtained data from 25 organisations whose data was compromised via last year’s MOVEit exploit.</p><p> </p><p><strong>Billy Big Balls of the Week (24:12)</strong></p><p><a href="https://www.theregister.com/2024/11/15/o2_ai_granny/">O2's AI granny knits tall tales to waste scam callers' time</a></p><p>Watch out, scammers. O2 has created a new weapon in the fight against fraud: an AI granny that will keep you talking until you get bored and give up.</p><p>O2, the mobile operator arm of Brit telecoms giant Virgin Media, says it has built the human-like AI to answer calls from fraudsters in real time, keeping them busy on the phone and wasting their time by pretending to be a potential vulnerable target.</p><p>"Daisy" is claimed to be indistinguishable from a real person, fooling scammers into thinking they've found perfect prey thanks to its ability to engage in "human-like" rambling chat, the biz claims.</p><p>For several weeks in the run-up to International Fraud Awareness Week (November 17–23), the AI has already frustrated scam callers with meandering stories about her family and talked at length about her passion for knitting, according to O2.</p><p> </p><p><strong>Industry News (28:20)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-moveit-leaker-claims/">Amazon MOVEit Leaker Claims to Be Ethical Hacker</a></p><p><a href="https://www.infosecurity-magazine.com/news/bank-england-uturns-vulnerability/">Bank of England U-turns on Vulnerability Disclosure Rules</a></p><p><a href="https://www.infosecurity-magazine.com/news/telecom-hack-exposes-us-officials/">Massive Telecom Hack Exposes US Officials to Chinese Espionage</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-power-pages/">Microsoft Power Pages Misconfiguration Leads to Data Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/sitting-ducks-dns-attacks-global/">Sitting Ducks DNS Attacks Put Global Domains at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-granny-outsmarts-scam-callers/">O2’s AI Granny Outsmarts Scam Callers with Knitting Tales</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-groups-cloud-services/">Ransomware Groups Use Cloud Services For Data Exfiltration</a></p><p><a href="https://www.infosecurity-magazine.com/news/bitfinex-hacker-jailed-5-years/">Bitfinex Hacker Jailed for Five Years Over Billion Dollar Crypto Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/palo-alto-confirms-new-0day/">Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors</a></p><p> </p><p><strong>Tweet of the Week (36:05)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdT5vBbRBwBJRhU9zdzbdei9ISpKQrycVvHZLswZtjgjNCjz3zO4AYnCNbv8IIYhozKq5OdAtJyql0JvflKLe_O0D42TIP2FpG-gpuVatqYOEo-6cA-2vzZg21K1On6yIcOa_2Oug?key=yOC16TOVs2MlQgScpz6_L163" /><p><a href="https://x.com/J4vv4D/status/1856981250306687143">https://x.com/J4vv4D/status/1856981250306687143</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 18 Nov 2024 14:41:44 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-209-lUu_bZnu</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:24)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th November 2012: John McAfee went into hiding because his neighbour, Gregory Faull, was found dead from a gunshot. Belize police wanted him to come in for questioning, but he fled to Guatemala where he was then arrested. He was never charged, though he lost a $25 million wrongful death suit.</p><p><a href="https://x.com/todayininfosec/status/1856538748361515355">https://x.com/todayininfosec/status/1856538748361515355</a>   </p><p>12th November 2000: Bill Gates demonstrates a functional prototype of a Tablet PC. Microsoft claims “<a href="https://news.microsoft.com/2000/11/12/microsoft-chief-software-architect-lays-out-a-blueprint-for-the-future-of-the-internet/">the Tablet PC will represent the next major evolution in PC design and functionality.</a>” However, the Tablet PC initiative never really took off and it wasn't until <a href="https://thisdayintechhistory.com/01/27/ipad-introduced/">Apple introduced the iPad in 2010</a> that tablet computing was widely adopted.</p><p><a href="https://thisdayintechhistory.com/11/12/microsoft-declares-tablets-are-the-future/">Microsoft Declares Tablets Are the Future</a></p><p> </p><p><strong>Rant of the Week (15:41)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-moveit-leaker-claims">Amazon MOVEit Leaker Claims to Be Ethical Hacker</a></p><p>A threat actor who posted 2.8 million lines of Amazon employee data last week has taken to the dark web to claim they are doing so to raise awareness of poor security practice.</p><p>The individual, who goes by the online moniker “Nam3L3ss,” claimed in a series of posts to have obtained data from 25 organisations whose data was compromised via last year’s MOVEit exploit.</p><p> </p><p><strong>Billy Big Balls of the Week (24:12)</strong></p><p><a href="https://www.theregister.com/2024/11/15/o2_ai_granny/">O2's AI granny knits tall tales to waste scam callers' time</a></p><p>Watch out, scammers. O2 has created a new weapon in the fight against fraud: an AI granny that will keep you talking until you get bored and give up.</p><p>O2, the mobile operator arm of Brit telecoms giant Virgin Media, says it has built the human-like AI to answer calls from fraudsters in real time, keeping them busy on the phone and wasting their time by pretending to be a potential vulnerable target.</p><p>"Daisy" is claimed to be indistinguishable from a real person, fooling scammers into thinking they've found perfect prey thanks to its ability to engage in "human-like" rambling chat, the biz claims.</p><p>For several weeks in the run-up to International Fraud Awareness Week (November 17–23), the AI has already frustrated scam callers with meandering stories about her family and talked at length about her passion for knitting, according to O2.</p><p> </p><p><strong>Industry News (28:20)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-moveit-leaker-claims/">Amazon MOVEit Leaker Claims to Be Ethical Hacker</a></p><p><a href="https://www.infosecurity-magazine.com/news/bank-england-uturns-vulnerability/">Bank of England U-turns on Vulnerability Disclosure Rules</a></p><p><a href="https://www.infosecurity-magazine.com/news/telecom-hack-exposes-us-officials/">Massive Telecom Hack Exposes US Officials to Chinese Espionage</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-power-pages/">Microsoft Power Pages Misconfiguration Leads to Data Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/sitting-ducks-dns-attacks-global/">Sitting Ducks DNS Attacks Put Global Domains at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-granny-outsmarts-scam-callers/">O2’s AI Granny Outsmarts Scam Callers with Knitting Tales</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-groups-cloud-services/">Ransomware Groups Use Cloud Services For Data Exfiltration</a></p><p><a href="https://www.infosecurity-magazine.com/news/bitfinex-hacker-jailed-5-years/">Bitfinex Hacker Jailed for Five Years Over Billion Dollar Crypto Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/palo-alto-confirms-new-0day/">Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors</a></p><p> </p><p><strong>Tweet of the Week (36:05)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdT5vBbRBwBJRhU9zdzbdei9ISpKQrycVvHZLswZtjgjNCjz3zO4AYnCNbv8IIYhozKq5OdAtJyql0JvflKLe_O0D42TIP2FpG-gpuVatqYOEo-6cA-2vzZg21K1On6yIcOa_2Oug?key=yOC16TOVs2MlQgScpz6_L163" /><p><a href="https://x.com/J4vv4D/status/1856981250306687143">https://x.com/J4vv4D/status/1856981250306687143</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42682316" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a60b9ad1-d0cf-4929-9114-fd26b3294c4b/audio/caa66bbd-fc1c-46c6-ac99-05d11d449c92/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 209 - The Javvad Is In Big Trouble Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/94b8b898-0084-4dc0-b6bb-5ab52470bfeb/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:27</itunes:duration>
      <itunes:summary>This week in InfoSec is about Microsoft’s futurists being too futury

Rant of the Week is time to moveit moveit

Billy Big Balls is the revenge of SuperGran
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is about revenge of the auditor</itunes:summary>
      <itunes:subtitle>This week in InfoSec is about Microsoft’s futurists being too futury

Rant of the Week is time to moveit moveit

Billy Big Balls is the revenge of SuperGran
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is about revenge of the auditor</itunes:subtitle>
      <itunes:keywords>o2, nex tit security, mcafee, spammer, boe, bot, ai, microsoft, moveit, the slate, ethical hacker, bleeding obvious, ipad, tablet</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>209</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f0486fb-d871-46f6-8735-f6a93ae1950f</guid>
      <title>Episode 208 - The Dedicated to Cesar Romero Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (13:28)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs.</p><p><a href="https://twitter.com/todayininfosec/status/1853799779626578186">https://twitter.com/todayininfosec/status/1853799779626578186</a>  </p><p> </p><p>5th November 2007: Google introduces the Android platform, its mobile operating system for cell phones based on a modified version of the Linux operating system. <a href="https://thisdayintechhistory.com/2012/09/23/the-first-android-introduced/">The first Android-based phone</a> would ship in September of 2008.</p><p><a href="https://thisdayintechhistory.com/11/05/android-introduced/">https://thisdayintechhistory.com/11/05/android-introduced/</a></p><p> </p><p><strong>Rant of the Week (18:54)  </strong></p><p><a href="https://www.404media.co/voted-in-america-this-site-doxed-you/">Voted in America? This Site Doxed You</a></p><p>If you voted in the U.S. presidential election yesterday in which Donald Trump won comfortably, or a previous election, a website powered by a right-wing group is probably doxing you. VoteRef makes it trivial for anyone to search the name, physical address, age, party affiliation, and whether someone voted that year for people living in most states instantly and for free. This can include ordinary citizens, celebrities, domestic abuse survivors, and many other people.</p><p>Voting rolls are public records, and ways to more readily access them are not new. But during a time of intense division, political violence, or even the broader threat of data being used to dox or harass anyone, sites like VoteRef turn a vital part of the democratic process—simply voting—into a security and privacy threat.</p><p> </p><p><strong>Billy Big Balls of the Week (27:09)</strong></p><p>Schneider Electric ransomware crew demands $125k paid in baguettes</p><p><a href="https://www.theregister.com/2024/11/05/schneider_electric_cybersecurity_incident/">https://www.theregister.com/2024/11/05/schneider_electric_cybersecurity_incident/</a></p><p>Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data — and demanded the French multinational energy management company pay $125,000 in baguettes or else see its sensitive customer and operational information leaked.</p><p>And yes, you read that right: payment in baguettes. As in bread.</p><p>Schneider Electric declined to answer The Register's specific questions about the intrusion, including if the attackers really want $125,000 in baguettes or if they would settle for cryptocurrency. </p><p>A spokesperson, however, emailed us the following statement:</p><p>"Schneider Electric is investigating a cybersecurity incident involving unauthorised access to one of our internal project execution tracking platforms which is hosted within an isolated environment. Our Global Incident Response team has been immediately mobilised to respond to the incident. Schneider Electric's products and services remain unaffected."</p><p> </p><p><strong>Industry News (33:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-cloud-mandate-mfa-2025/">Google Cloud to Mandate Multifactor Authentication by 2025</a></p><p><a href="https://www.infosecurity-magazine.com/news/orgs-victim-predictable-attacks/">IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/defenders-attackers-ai-adoption/">Defenders Outpace Attackers in AI Adoption</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-wages-above/">UK Cybersecurity Wages Soar Above Inflation as Stress Levels Rise</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-publishes-tips-tackle/">NCSC Publishes Tips to Tackle Malvertising Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/canada-orders-shutdown-tiktok/">Canada Orders Shutdown of Local TikTok Branch Over Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-regulator-data-protection-ai/">UK Regulator Urges Stronger Data Protection in AI Recruitment Tools</a></p><p><a href="https://www.infosecurity-magazine.com/news/interlock-ransomware-us-healthcare/">Interlock Ransomware Targets US Healthcare, IT and Government Sectors</a></p><p><a href="https://www.infosecurity-magazine.com/news/newpark-resources-oilfield/">Major Oilfield Supplier Hit by Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week (41:01)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcITxHhX2jgJZLXthTZmWvTmozi1zfsLuF2_xIyeutW0-GuKuOJ0Mh3cbVKeNCNhyK4niiUNkOxrsa2JOJ4m9zTSyBMki350LLH7ygE0XeNbPuPGZympSxUb-Zo02Atnckz4RJs3Q?key=QQidbDhcg365XXp5Rd7xmhDE" /><p><a href="https://twitter.com/fesshole/status/1854832499714576399">https://twitter.com/fesshole/status/1854832499714576399</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 11 Nov 2024 16:51:11 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-208-eDGVVCP4</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (13:28)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th November 1993: Bugtraq was created by Scott Chasin as a full disclosure vulnerability reporting mailing list at the dawn of the World Wide Web. Bugtraq had an enormous influence on how orgs responded to vuln disclosure and paved the way for a shift which led to bug bounty programs.</p><p><a href="https://twitter.com/todayininfosec/status/1853799779626578186">https://twitter.com/todayininfosec/status/1853799779626578186</a>  </p><p> </p><p>5th November 2007: Google introduces the Android platform, its mobile operating system for cell phones based on a modified version of the Linux operating system. <a href="https://thisdayintechhistory.com/2012/09/23/the-first-android-introduced/">The first Android-based phone</a> would ship in September of 2008.</p><p><a href="https://thisdayintechhistory.com/11/05/android-introduced/">https://thisdayintechhistory.com/11/05/android-introduced/</a></p><p> </p><p><strong>Rant of the Week (18:54)  </strong></p><p><a href="https://www.404media.co/voted-in-america-this-site-doxed-you/">Voted in America? This Site Doxed You</a></p><p>If you voted in the U.S. presidential election yesterday in which Donald Trump won comfortably, or a previous election, a website powered by a right-wing group is probably doxing you. VoteRef makes it trivial for anyone to search the name, physical address, age, party affiliation, and whether someone voted that year for people living in most states instantly and for free. This can include ordinary citizens, celebrities, domestic abuse survivors, and many other people.</p><p>Voting rolls are public records, and ways to more readily access them are not new. But during a time of intense division, political violence, or even the broader threat of data being used to dox or harass anyone, sites like VoteRef turn a vital part of the democratic process—simply voting—into a security and privacy threat.</p><p> </p><p><strong>Billy Big Balls of the Week (27:09)</strong></p><p>Schneider Electric ransomware crew demands $125k paid in baguettes</p><p><a href="https://www.theregister.com/2024/11/05/schneider_electric_cybersecurity_incident/">https://www.theregister.com/2024/11/05/schneider_electric_cybersecurity_incident/</a></p><p>Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data — and demanded the French multinational energy management company pay $125,000 in baguettes or else see its sensitive customer and operational information leaked.</p><p>And yes, you read that right: payment in baguettes. As in bread.</p><p>Schneider Electric declined to answer The Register's specific questions about the intrusion, including if the attackers really want $125,000 in baguettes or if they would settle for cryptocurrency. </p><p>A spokesperson, however, emailed us the following statement:</p><p>"Schneider Electric is investigating a cybersecurity incident involving unauthorised access to one of our internal project execution tracking platforms which is hosted within an isolated environment. Our Global Incident Response team has been immediately mobilised to respond to the incident. Schneider Electric's products and services remain unaffected."</p><p> </p><p><strong>Industry News (33:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-cloud-mandate-mfa-2025/">Google Cloud to Mandate Multifactor Authentication by 2025</a></p><p><a href="https://www.infosecurity-magazine.com/news/orgs-victim-predictable-attacks/">IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/defenders-attackers-ai-adoption/">Defenders Outpace Attackers in AI Adoption</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-wages-above/">UK Cybersecurity Wages Soar Above Inflation as Stress Levels Rise</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-publishes-tips-tackle/">NCSC Publishes Tips to Tackle Malvertising Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/canada-orders-shutdown-tiktok/">Canada Orders Shutdown of Local TikTok Branch Over Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-regulator-data-protection-ai/">UK Regulator Urges Stronger Data Protection in AI Recruitment Tools</a></p><p><a href="https://www.infosecurity-magazine.com/news/interlock-ransomware-us-healthcare/">Interlock Ransomware Targets US Healthcare, IT and Government Sectors</a></p><p><a href="https://www.infosecurity-magazine.com/news/newpark-resources-oilfield/">Major Oilfield Supplier Hit by Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week (41:01)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcITxHhX2jgJZLXthTZmWvTmozi1zfsLuF2_xIyeutW0-GuKuOJ0Mh3cbVKeNCNhyK4niiUNkOxrsa2JOJ4m9zTSyBMki350LLH7ygE0XeNbPuPGZympSxUb-Zo02Atnckz4RJs3Q?key=QQidbDhcg365XXp5Rd7xmhDE" /><p><a href="https://twitter.com/fesshole/status/1854832499714576399">https://twitter.com/fesshole/status/1854832499714576399</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44917144" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0a55343d-01f1-450d-8b45-0a3bca31344b/audio/31e357d0-d477-4b54-b034-3ebab0f861ea/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 208 - The Dedicated to Cesar Romero Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6d058622-262e-4794-8ffa-80db1085ef82/3000x3000/hu-20podcast-20artwork-202020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:47</itunes:duration>
      <itunes:summary>This week in InfoSec is a creepy crawly story of bugs as old as time

Rant of the Week is evidence of party games darker side

Billy Big Balls is pumping and dumping
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is shocking evidence that UK adverts are not the best </itunes:summary>
      <itunes:subtitle>This week in InfoSec is a creepy crawly story of bugs as old as time

Rant of the Week is evidence of party games darker side

Billy Big Balls is pumping and dumping
 
Industry News is the latest and greatest security news stories from around the world

And

Tweet of the Week is shocking evidence that UK adverts are not the best </itunes:subtitle>
      <itunes:keywords>infosecurity magazine, vpn, trains, baguettes, schneider electric, voter identity, fake news, ransomware, adverts, irisscon, bugtrack, android</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>208</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2c4bf916-810a-4f35-a280-963c08abd41d</guid>
      <title>Episode 207 - The Raw! Live! Uncut! Episode</title>
      <description><![CDATA[<p>No notes this week - Andy had ONE job...</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 5 Nov 2024 10:54:36 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-207-oiwmwopv-b241NK2x</link>
      <content:encoded><![CDATA[<p>No notes this week - Andy had ONE job...</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46082414" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6a661a28-b824-4efe-b6ea-9bf1b1962da8/audio/4891d9a6-b033-4a5a-b72d-37e145d25c34/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 207 - The Raw! Live! Uncut! Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik</itunes:author>
      <itunes:duration>00:48:00</itunes:duration>
      <itunes:summary>This Week in InfoSec
Rant of the Week
Billy Big Balls of the Week
Industry news
Tweet of the Week</itunes:summary>
      <itunes:subtitle>This Week in InfoSec
Rant of the Week
Billy Big Balls of the Week
Industry news
Tweet of the Week</itunes:subtitle>
      <itunes:keywords>difference\, no, make, popularity, to, an, episodes, who, these, knew?, apparently</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>207</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc2ec3a9-a674-46d4-9430-35877c41b06e</guid>
      <title>Episode 206 The Sole Founder Episode</title>
      <description><![CDATA[<p>How does Thom also do the episode notes? </p><p>This week in infosec  was about a EULA</p><p>Rant of the week</p><p>https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html</p><p>Billy Big Balls</p><p>https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/</p><p>Some news articles from infosecurity-magazine.com </p><p>Tweet of the week </p><p>https://x.com/thomas_violence/status/1849627627474293148 </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Oct 2024 15:56:23 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-206-the-sole-founder-episode-n8___3AR</link>
      <content:encoded><![CDATA[<p>How does Thom also do the episode notes? </p><p>This week in infosec  was about a EULA</p><p>Rant of the week</p><p>https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html</p><p>Billy Big Balls</p><p>https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/</p><p>Some news articles from infosecurity-magazine.com </p><p>Tweet of the week </p><p>https://x.com/thomas_violence/status/1849627627474293148 </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="16857240" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/63881b57-29cb-44a7-98d5-345a43bb882c/audio/5e3cbafd-f86f-42e7-a5fe-1fde4b2989cb/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 206 The Sole Founder Episode</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:17:33</itunes:duration>
      <itunes:summary>Today in infosec brings you a reminder to always read your end user license agreement

Rant of the week is a cautionary tale about what happens when you let PR do your incident response

Billy big balls talks about the rise of the machines

Industry news brings you the latest and greatest stories from around the world 

and tweet of the week will leave you searching in pain</itunes:summary>
      <itunes:subtitle>Today in infosec brings you a reminder to always read your end user license agreement

Rant of the week is a cautionary tale about what happens when you let PR do your incident response

Billy big balls talks about the rise of the machines

Industry news brings you the latest and greatest stories from around the world 

and tweet of the week will leave you searching in pain</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>206</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77f5f323-5889-445e-8180-cf26b25789a0</guid>
      <title>Episode 205 The Stone Cold Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:29)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th October 1995: Netscape introduced the "Netscape Bugs Bounty", a program rewarding users who report "bugs" in the beta versions of its recently announced Netscape Navigator 2.0 web browser.</p><p>Navigator was the dominant browser from 1995-1998, when it was overtaken by Internet Explorer.</p><p><a href="https://twitter.com/todayininfosec/status/1844466277718556683">https://twitter.com/todayininfosec/status/1844466277718556683</a></p><p>8th October 2008: University student David Kernell was arraigned. He compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, using public info to reset her password, posting her emails to 4chan. He was later found guilty and died from MS complications in 2018.</p><p><a href="https://twitter.com/todayininfosec/status/1843619068302983592">https://twitter.com/todayininfosec/status/1843619068302983592</a></p><p> </p><p><strong>Rant of the Week (20:24) </strong></p><p><a href="https://www.theregister.com/2024/10/10/cards_against_humanity_us_election/">Cards Against Humanity campaigns to encourage voting, expose personal data abuse</a></p><p>Up to $100 for planning to vote and a public smear – how is this not illegal?</p><p>The troublemakers behind the party game Cards Against Humanity have launched a campaign demonstrating how easy it is to buy sensitive personal data about American voters, while simultaneously encouraging those Americans to plan how to cast a vote in the upcoming presidential election.</p><p>The "Cards Against Humanity Pays You to Give a Shit" <a href="https://www.apologize.lol/">campaign</a> uses US citizens' personal data obtained from a broker to identify whether individuals voted in the 2020 US presidential election and how they lean politically. Those who didn't vote are asked to put info into the website, promise to vote in the upcoming election, make a voting plan, "and publicly post 'Donald Trump is a human toilet'" in exchange for up to $100.</p><p> </p><p><strong>Billy Big Balls of the Week (28:42)</strong></p><p><a href="https://www.theregister.com/2024/10/11/fbi_nexfundai_crypto_fraud_sting/">FBI created a cryptocurrency so it could watch it being abused</a></p><p>The FBI created its own cryptocurrency so it could watch suspected fraudsters use it – an idea that worked so well it produced arrests in three countries</p><p>News of the Feds' currency, an Ethereum-based instrument named NexFundAI, appeared in a Wednesday <a href="https://www.justice.gov/usao-ma/pr/eighteen-individuals-and-entities-charged-international-operation-targeting-widespread">Department of Justice announcement</a> that eighteen individuals have been charged "for widespread fraud and manipulation in the cryptocurrency markets."</p><p>The Feds allege some of the fraud involved "wash trades" – transactions conducted solely to increase the volume of trades in a security or other asset. Rising volumes of trades are often seen as an indicator that a stock is of increasing interest as it has good growth prospects – a signal that can see prices rise. But wash trades are often conducted by related entities, or even the same entity, to create a false market signal – an arrangement also known as "pump and dump."</p><p> </p><p><strong>Industry News (34:36) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/new-eu-body-complaints-against/">New EU Body to Centralize Complaints Against Facebook, TikTok, YouTube</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-gen-malicious-qr-codes/">New Generation of Malicious QR Codes Uncovered by Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/apples-iphone-mirroring-flaw/">Apple’s iPhone Mirroring Flaw Exposes Employee Privacy Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/rac-employees-suspended-sentence/">Former RAC Employees Get Suspended Sentence for Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-archive-breach-31m/">Internet Archive Breached, 31 Million Records Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/marriott-settlement-massive-data/">Marriott Agrees $52m Settlement for Massive Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-adopts-cyber-resilience-act/">EU Adopts Cyber Resilience Act for Connected Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/">Over 10m Conversations Exposed in AI Call Center Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/disinformation-targets-moldova-eu/">Disinformation Campaign Targets Moldova Ahead of EU Referendum</a></p><p> </p><p><strong>Tweet of the Week (45:07)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXepETn0L7wlGJZtwqU1wYaJaHWqgCpV_t-6OSl8byfDlUTmeNSqYpr62Cp9ze0uHjueb1ozmKBJBVovnajyHfRV8X6MSqR9xHiggqa4qXkXXqsv9GutvOFjeSEb-3AK64PaPcnHc_9TGdqrfIjXnQDgsjkW?key=gHs-ZJTAAAROJLk7AwhOmA" /><p><a href="https://twitter.com/JackRhysider/status/1844502566799085769">https://twitter.com/JackRhysider/status/1844502566799085769</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 14 Oct 2024 15:50:58 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-205-7SSS9LJ_</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:29)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th October 1995: Netscape introduced the "Netscape Bugs Bounty", a program rewarding users who report "bugs" in the beta versions of its recently announced Netscape Navigator 2.0 web browser.</p><p>Navigator was the dominant browser from 1995-1998, when it was overtaken by Internet Explorer.</p><p><a href="https://twitter.com/todayininfosec/status/1844466277718556683">https://twitter.com/todayininfosec/status/1844466277718556683</a></p><p>8th October 2008: University student David Kernell was arraigned. He compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, using public info to reset her password, posting her emails to 4chan. He was later found guilty and died from MS complications in 2018.</p><p><a href="https://twitter.com/todayininfosec/status/1843619068302983592">https://twitter.com/todayininfosec/status/1843619068302983592</a></p><p> </p><p><strong>Rant of the Week (20:24) </strong></p><p><a href="https://www.theregister.com/2024/10/10/cards_against_humanity_us_election/">Cards Against Humanity campaigns to encourage voting, expose personal data abuse</a></p><p>Up to $100 for planning to vote and a public smear – how is this not illegal?</p><p>The troublemakers behind the party game Cards Against Humanity have launched a campaign demonstrating how easy it is to buy sensitive personal data about American voters, while simultaneously encouraging those Americans to plan how to cast a vote in the upcoming presidential election.</p><p>The "Cards Against Humanity Pays You to Give a Shit" <a href="https://www.apologize.lol/">campaign</a> uses US citizens' personal data obtained from a broker to identify whether individuals voted in the 2020 US presidential election and how they lean politically. Those who didn't vote are asked to put info into the website, promise to vote in the upcoming election, make a voting plan, "and publicly post 'Donald Trump is a human toilet'" in exchange for up to $100.</p><p> </p><p><strong>Billy Big Balls of the Week (28:42)</strong></p><p><a href="https://www.theregister.com/2024/10/11/fbi_nexfundai_crypto_fraud_sting/">FBI created a cryptocurrency so it could watch it being abused</a></p><p>The FBI created its own cryptocurrency so it could watch suspected fraudsters use it – an idea that worked so well it produced arrests in three countries</p><p>News of the Feds' currency, an Ethereum-based instrument named NexFundAI, appeared in a Wednesday <a href="https://www.justice.gov/usao-ma/pr/eighteen-individuals-and-entities-charged-international-operation-targeting-widespread">Department of Justice announcement</a> that eighteen individuals have been charged "for widespread fraud and manipulation in the cryptocurrency markets."</p><p>The Feds allege some of the fraud involved "wash trades" – transactions conducted solely to increase the volume of trades in a security or other asset. Rising volumes of trades are often seen as an indicator that a stock is of increasing interest as it has good growth prospects – a signal that can see prices rise. But wash trades are often conducted by related entities, or even the same entity, to create a false market signal – an arrangement also known as "pump and dump."</p><p> </p><p><strong>Industry News (34:36) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/new-eu-body-complaints-against/">New EU Body to Centralize Complaints Against Facebook, TikTok, YouTube</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-gen-malicious-qr-codes/">New Generation of Malicious QR Codes Uncovered by Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/apples-iphone-mirroring-flaw/">Apple’s iPhone Mirroring Flaw Exposes Employee Privacy Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/rac-employees-suspended-sentence/">Former RAC Employees Get Suspended Sentence for Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-archive-breach-31m/">Internet Archive Breached, 31 Million Records Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/marriott-settlement-massive-data/">Marriott Agrees $52m Settlement for Massive Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-adopts-cyber-resilience-act/">EU Adopts Cyber Resilience Act for Connected Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/">Over 10m Conversations Exposed in AI Call Center Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/disinformation-targets-moldova-eu/">Disinformation Campaign Targets Moldova Ahead of EU Referendum</a></p><p> </p><p><strong>Tweet of the Week (45:07)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXepETn0L7wlGJZtwqU1wYaJaHWqgCpV_t-6OSl8byfDlUTmeNSqYpr62Cp9ze0uHjueb1ozmKBJBVovnajyHfRV8X6MSqR9xHiggqa4qXkXXqsv9GutvOFjeSEb-3AK64PaPcnHc_9TGdqrfIjXnQDgsjkW?key=gHs-ZJTAAAROJLk7AwhOmA" /><p><a href="https://twitter.com/JackRhysider/status/1844502566799085769">https://twitter.com/JackRhysider/status/1844502566799085769</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48674179" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/29408c22-3994-47af-bb8b-02f445c9d8bc/audio/10ea9623-cde5-4897-9746-5ef66461988a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 205 The Stone Cold Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0b6933f9-5568-4c3a-89ee-900fd6eb517e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:42</itunes:duration>
      <itunes:summary>This week in InfoSec is a creepy crawly story of bugs as old as time

Rant of the Week is evidence of party games darker side

Billy Big Balls is pumping and dumping
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week asks how secure does your diary need to be</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a creepy crawly story of bugs as old as time

Rant of the Week is evidence of party games darker side

Billy Big Balls is pumping and dumping
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week asks how secure does your diary need to be</itunes:subtitle>
      <itunes:keywords>usa, cards against humanity, cryptocurrency, sarah palin, fbi, diary, ai, geoff white, social media complaints, bug bounty, wash trades, the lazerous heist, netscape</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>205</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f25ba997-430b-43aa-8fdf-e0f64f4a7140</guid>
      <title>Episode 204 - The Umms and Ahhs Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (10:01)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the dawn of cybercrime toolkits.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeDA-ija4WHRWmMsibfSZX0xdVopTSOofvc34L28yMb6nQ-rsFbqQa0tVefHAcaWn46LuLH3urcijKKuCZcNICYpAkty-aVepV1_gNpYwYn4NNewKmUXjAKKC-scuqX0e6rPRzSDwCG8CLpkIyBtds5uCA?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/todayininfosec/status/1839709145282277614">https://twitter.com/todayininfosec/status/1839709145282277614</a></p><p>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress that one person in the IT department was at fault.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXf2JbDyi-hb_90TUwgbkK32Zge6mkgdOTfrnU2upkksgznCHjJs5SYPr1c4T6Z0JH2V46PjXMrTQc3FxIT1NPVSdR1cGz2TiX9oa63hLBMylTmwxIR1qy0jipphUBKjko-cOgv1PqA7xc4BrEHFBUQ4VCbZ?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/todayininfosec/status/1841893372035838342">https://twitter.com/todayininfosec/status/1841893372035838342</a></p><p> </p><p><strong>Rant of the Week (14:52)</strong></p><p><a href="https://www.theregister.com/2024/10/03/social_media_conservative_moderation/">It's true, social media moderators do go after conservatives</a></p><p>Because they're most likely to share crappy misinformation online</p><p>Since Elon Musk bought Twitter nearly two years ago – a $44 billion acquisition he tried to pull out of – the mogul has driven a narrative that moderation of the microblogging website disproportionately targeted conservatives, libertarians, and Trump supporters.</p><p>A scientific paper published in the journal Nature this week confirms that was the case, with justification. The groups more likely to be subjected to moderation were also more likely to share misinformation from low-quality news sites.</p><p> </p><p><strong>Billy Big Balls of the Week (21:49)</strong></p><p>Use this link to read the story: <a href="https://www.404media.co/email/e7ecda94-675a-4538-901f-b2ccb35fe916/?ref=daily-stories-newsletter">https://www.404media.co/email/e7ecda94-675a-4538-901f-b2ccb35fe916/?ref=daily-stories-newsletter</a> - the other link below for the show notes (the one above is tied to my account)</p><p><a href="https://www.404media.co/someone-put-facial-recognition-tech-onto-metas-smart-glasses-to-instantly-dox-strangers/">Someone Put Facial Recognition Tech onto Meta's Smart Glasses to Instantly Dox Strangers</a></p><p>A pair of students at Harvard have built what big tech companies refused to release publicly due to the overwhelming risks and danger involved: smart glasses with facial recognition technology that automatically looks up someone’s face and identifies them. The students have gone a step further too. Their customized glasses also pull other information about their subject from around the web, including their home address, phone number, and family members.</p><p> </p><p><strong>Industry News (32:05)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/pwc-boards-cisos-seat-table/">PwC Urges Boards to Give CISOs a Seat at the Table</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attacks-third-english-schools/">Cyber-Attacks Hit Over a Third of English Schools</a></p><p><a href="https://www.infosecurity-magazine.com/news/isaca-european-security/">ISACA: European Security Teams Are Understaffed and Underfunded</a></p><p><a href="https://www.infosecurity-magazine.com/news/t-mobile-penalty-data-breaches/">T-Mobile to Pay $15.75m Penalty for Multiple Data Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/briton-charged-us-dollar375m/">British Hacker Charged in the US For $3.75m Insider Trading Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-teams-up-banks-target/">Meta Teams Up with Banks to Target Fraudsters</a></p><p><a href="https://www.infosecurity-magazine.com/news/fin7-hides-malware-ai-deepnude/">FIN7 Gang Hides Malware in AI “Deepnude” Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/northern-ireland-police-data-leak-1/">Northern Ireland Police Data Leak Sees Service Fined by ICO</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-us-govenment-disrupt/">Microsoft and US Government Disrupt Russian Star Blizzard Operations</a></p><p> </p><p><strong>Tweet of the Week (38:52)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4rvyV50gFhlVZpsVou5_Q42Jk9j8jJK6rBCnGp6jIcT8gd48ASwuDMKdbBu4PqbX_ntbnWdFWvE4Ityt2pqw8EMy6Zrr2bRdeIuAAx2q6E850W9cKXawtDE4YIGYQ5A3NRxDzSEbzPmt4NG0PVlJ1-pAc?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/iamdevloper/status/1842097858196979989">https://twitter.com/iamdevloper/status/1842097858196979989</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 7 Oct 2024 20:14:31 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-204-As1F6_Bo</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (10:01)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the dawn of cybercrime toolkits.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeDA-ija4WHRWmMsibfSZX0xdVopTSOofvc34L28yMb6nQ-rsFbqQa0tVefHAcaWn46LuLH3urcijKKuCZcNICYpAkty-aVepV1_gNpYwYn4NNewKmUXjAKKC-scuqX0e6rPRzSDwCG8CLpkIyBtds5uCA?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/todayininfosec/status/1839709145282277614">https://twitter.com/todayininfosec/status/1839709145282277614</a></p><p>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress that one person in the IT department was at fault.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXf2JbDyi-hb_90TUwgbkK32Zge6mkgdOTfrnU2upkksgznCHjJs5SYPr1c4T6Z0JH2V46PjXMrTQc3FxIT1NPVSdR1cGz2TiX9oa63hLBMylTmwxIR1qy0jipphUBKjko-cOgv1PqA7xc4BrEHFBUQ4VCbZ?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/todayininfosec/status/1841893372035838342">https://twitter.com/todayininfosec/status/1841893372035838342</a></p><p> </p><p><strong>Rant of the Week (14:52)</strong></p><p><a href="https://www.theregister.com/2024/10/03/social_media_conservative_moderation/">It's true, social media moderators do go after conservatives</a></p><p>Because they're most likely to share crappy misinformation online</p><p>Since Elon Musk bought Twitter nearly two years ago – a $44 billion acquisition he tried to pull out of – the mogul has driven a narrative that moderation of the microblogging website disproportionately targeted conservatives, libertarians, and Trump supporters.</p><p>A scientific paper published in the journal Nature this week confirms that was the case, with justification. The groups more likely to be subjected to moderation were also more likely to share misinformation from low-quality news sites.</p><p> </p><p><strong>Billy Big Balls of the Week (21:49)</strong></p><p>Use this link to read the story: <a href="https://www.404media.co/email/e7ecda94-675a-4538-901f-b2ccb35fe916/?ref=daily-stories-newsletter">https://www.404media.co/email/e7ecda94-675a-4538-901f-b2ccb35fe916/?ref=daily-stories-newsletter</a> - the other link below for the show notes (the one above is tied to my account)</p><p><a href="https://www.404media.co/someone-put-facial-recognition-tech-onto-metas-smart-glasses-to-instantly-dox-strangers/">Someone Put Facial Recognition Tech onto Meta's Smart Glasses to Instantly Dox Strangers</a></p><p>A pair of students at Harvard have built what big tech companies refused to release publicly due to the overwhelming risks and danger involved: smart glasses with facial recognition technology that automatically looks up someone’s face and identifies them. The students have gone a step further too. Their customized glasses also pull other information about their subject from around the web, including their home address, phone number, and family members.</p><p> </p><p><strong>Industry News (32:05)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/pwc-boards-cisos-seat-table/">PwC Urges Boards to Give CISOs a Seat at the Table</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attacks-third-english-schools/">Cyber-Attacks Hit Over a Third of English Schools</a></p><p><a href="https://www.infosecurity-magazine.com/news/isaca-european-security/">ISACA: European Security Teams Are Understaffed and Underfunded</a></p><p><a href="https://www.infosecurity-magazine.com/news/t-mobile-penalty-data-breaches/">T-Mobile to Pay $15.75m Penalty for Multiple Data Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/briton-charged-us-dollar375m/">British Hacker Charged in the US For $3.75m Insider Trading Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-teams-up-banks-target/">Meta Teams Up with Banks to Target Fraudsters</a></p><p><a href="https://www.infosecurity-magazine.com/news/fin7-hides-malware-ai-deepnude/">FIN7 Gang Hides Malware in AI “Deepnude” Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/northern-ireland-police-data-leak-1/">Northern Ireland Police Data Leak Sees Service Fined by ICO</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-us-govenment-disrupt/">Microsoft and US Government Disrupt Russian Star Blizzard Operations</a></p><p> </p><p><strong>Tweet of the Week (38:52)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4rvyV50gFhlVZpsVou5_Q42Jk9j8jJK6rBCnGp6jIcT8gd48ASwuDMKdbBu4PqbX_ntbnWdFWvE4Ityt2pqw8EMy6Zrr2bRdeIuAAx2q6E850W9cKXawtDE4YIGYQ5A3NRxDzSEbzPmt4NG0PVlJ1-pAc?key=VjJmQzhHMZro1H4x8p-23Q" /><p><a href="https://twitter.com/iamdevloper/status/1842097858196979989">https://twitter.com/iamdevloper/status/1842097858196979989</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="40590013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/19c4fd7d-aeb5-4d1a-9a1e-5fe855587651/audio/e60eb849-d622-4cfe-9c7c-6db034f2853c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 204 - The Umms and Ahhs Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7028b12a-2cea-4642-8962-8b139507128a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:16</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of the dawn of virus toolkits

Rant of the Week is a report from the school of the bleeding obvious

Billy Big Balls is the future we’ve been waiting for
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is two sides of the same coin</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of the dawn of virus toolkits

Rant of the Week is a report from the school of the bleeding obvious

Billy Big Balls is the future we’ve been waiting for
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is two sides of the same coin</itunes:subtitle>
      <itunes:keywords>leon musk, dox, equifax, star blizzard, anna kournikova, facial recognition, psni, ico, fake news, intern, pwc, nature, twitter, meta, virus, code review</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>204</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aced537b-c1d0-4c2f-b55a-0b82c4311cd5</guid>
      <title>Episode 203 - The Too Soon Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (10:44)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes.</p><p><a href="https://twitter.com/todayininfosec/status/1836495262409175187">https://twitter.com/todayininfosec/status/1836495262409175187</a>  </p><p>17th September 2014: Apple announced that the iOS 8 operating system (used on iPhone and iPad) would be architected to prevent it from being technically feasible for the company to extract data from customer devices. A day later Google made a similar announcement pertaining to Android.</p><p><a href="https://www.entrepreneur.com/science-technology/with-ios-8-update-apple-will-no-longer-provide-user-data/237599">With iOS 8 Update, Apple Will No Longer Provide User Data to Police</a></p><p><a href="https://twitter.com/todayininfosec/status/1836071319030374437">https://twitter.com/todayininfosec/status/1836071319030374437</a></p><p> </p><p><strong>Rant of the Week  (17:50)</strong></p><p><a href="https://www.theregister.com/2024/09/19/social_media_data_harvesting_handling_ftc/">No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom</a></p><p>Buried beneath the endless feeds and attention-grabbing videos of the modern internet is a network of data harvesting and sale that's perhaps far more vast than most people realise, and it desperately needs regulation. </p><p>That's the <a href="https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-staff-report-finds-large-social-media-video-streaming-companies-have-engaged-vast-surveillance?">conclusion</a> the FTC made after spending nearly four years poring over internal data from nine major social media and video streaming corporations in the US.</p><p>These internet behemoths are collecting vast amounts of data, both on and off their services, and the handling of such data is "woefully inadequate," particularly around data belonging to children and teenagers, the FTC said. </p><p> </p><p><strong>Billy Big Balls of the Week (28:06)</strong></p><p><a href="https://www.theregister.com/2024/09/19/linkedin_ai_data_access/">LinkedIn started harvesting people's posts for training AI without asking for opt-in</a></p><p>LinkedIn started harvesting user-generated content to train its AI without asking for permission, angering netizens.</p><p>Microsoft’s self-help network on Wednesday <a href="https://www.linkedin.com/blog/member/trust-and-safety/updates-to-our-terms-of-service-2024">published</a> a "trust and safety" update in which senior veep and general counsel Blake Lawit revealed LinkedIn's use of people's posts and other data for both training and using its generative AI features.</p><p>In doing so, he said the site's <a href="https://www.linkedin.com/legal/privacy-policy">privacy policy</a> had been updated. We note this policy links to <a href="https://www.linkedin.com/help/linkedin/answer/a5538339?hcppcid=search">an FAQ</a> that was updated sometime last week also confirming the automatic collecting of posts for training – meaning it appears LinkedIn started gathering up content for its AI models, and opting in users, well before Lawit’s post and the updated privacy policy advised of the changes today.</p><p> </p><p><strong>Industry News (35:07)  </strong></p><p><a href="https://www.infosecurity-magazine.com/news/over-half-breached-uk-firms-pay/">Over Half of Breached UK Firms Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-sky-betting-gaming/">ICO Acts Against Sky Betting and Gaming Over Cookies</a></p><p><a href="https://www.infosecurity-magazine.com/news/att-13m-fcc-settlement-cloud-data/">AT&T Agrees $13m FCC Settlement Over Cloud Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-disrupts-ghost-criminal/">Europol Taskforce Disrupts Global Criminal Network Through Supply Chain Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-street-view-extortion/">Google Street View Images Used For Extortion Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/8000-claimants-sue-outsourcing/">8000 Claimants Sue Outsourcing Giant Capita Over 2023 Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-ncsc-china-botnet/">Western Agencies Warn Risk from Chinese-Controlled Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/hsbc-quantum-safe-technology/">Going for Gold: HSBC Approves Quantum-Safe Technology for Tokenized Bullions</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-skills-gap-cloud/">Cybersecurity Skills Gap Leaves Cloud Environments Vulnerable</a></p><p> </p><p><strong>Tweet of the Week  (42:39)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe-I63sYsMxnDVBU2hlell2dU1Q72YzrOQrmAri6tPo9cCdPbpGiSPZ0xkLXoXwT-cimpO73hOmtOqpbSLOactiuOsp2KMOjHEw4rGuc7NoPHedqrybi5GZ9Yw6uMyFfPx4aXHMzJBSndN2RSTW-KbgdmM?key=4eRG-YiTpy9Rgp2OO0wOwg" /><p><a href="https://twitter.com/ProfWoodward/status/1837084678836171089">https://twitter.com/ProfWoodward/status/1837084678836171089</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 24 Sep 2024 10:08:20 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-203-FZJAHx2B</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (10:44)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes.</p><p><a href="https://twitter.com/todayininfosec/status/1836495262409175187">https://twitter.com/todayininfosec/status/1836495262409175187</a>  </p><p>17th September 2014: Apple announced that the iOS 8 operating system (used on iPhone and iPad) would be architected to prevent it from being technically feasible for the company to extract data from customer devices. A day later Google made a similar announcement pertaining to Android.</p><p><a href="https://www.entrepreneur.com/science-technology/with-ios-8-update-apple-will-no-longer-provide-user-data/237599">With iOS 8 Update, Apple Will No Longer Provide User Data to Police</a></p><p><a href="https://twitter.com/todayininfosec/status/1836071319030374437">https://twitter.com/todayininfosec/status/1836071319030374437</a></p><p> </p><p><strong>Rant of the Week  (17:50)</strong></p><p><a href="https://www.theregister.com/2024/09/19/social_media_data_harvesting_handling_ftc/">No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom</a></p><p>Buried beneath the endless feeds and attention-grabbing videos of the modern internet is a network of data harvesting and sale that's perhaps far more vast than most people realise, and it desperately needs regulation. </p><p>That's the <a href="https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-staff-report-finds-large-social-media-video-streaming-companies-have-engaged-vast-surveillance?">conclusion</a> the FTC made after spending nearly four years poring over internal data from nine major social media and video streaming corporations in the US.</p><p>These internet behemoths are collecting vast amounts of data, both on and off their services, and the handling of such data is "woefully inadequate," particularly around data belonging to children and teenagers, the FTC said. </p><p> </p><p><strong>Billy Big Balls of the Week (28:06)</strong></p><p><a href="https://www.theregister.com/2024/09/19/linkedin_ai_data_access/">LinkedIn started harvesting people's posts for training AI without asking for opt-in</a></p><p>LinkedIn started harvesting user-generated content to train its AI without asking for permission, angering netizens.</p><p>Microsoft’s self-help network on Wednesday <a href="https://www.linkedin.com/blog/member/trust-and-safety/updates-to-our-terms-of-service-2024">published</a> a "trust and safety" update in which senior veep and general counsel Blake Lawit revealed LinkedIn's use of people's posts and other data for both training and using its generative AI features.</p><p>In doing so, he said the site's <a href="https://www.linkedin.com/legal/privacy-policy">privacy policy</a> had been updated. We note this policy links to <a href="https://www.linkedin.com/help/linkedin/answer/a5538339?hcppcid=search">an FAQ</a> that was updated sometime last week also confirming the automatic collecting of posts for training – meaning it appears LinkedIn started gathering up content for its AI models, and opting in users, well before Lawit’s post and the updated privacy policy advised of the changes today.</p><p> </p><p><strong>Industry News (35:07)  </strong></p><p><a href="https://www.infosecurity-magazine.com/news/over-half-breached-uk-firms-pay/">Over Half of Breached UK Firms Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-sky-betting-gaming/">ICO Acts Against Sky Betting and Gaming Over Cookies</a></p><p><a href="https://www.infosecurity-magazine.com/news/att-13m-fcc-settlement-cloud-data/">AT&T Agrees $13m FCC Settlement Over Cloud Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-disrupts-ghost-criminal/">Europol Taskforce Disrupts Global Criminal Network Through Supply Chain Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-street-view-extortion/">Google Street View Images Used For Extortion Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/8000-claimants-sue-outsourcing/">8000 Claimants Sue Outsourcing Giant Capita Over 2023 Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-ncsc-china-botnet/">Western Agencies Warn Risk from Chinese-Controlled Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/hsbc-quantum-safe-technology/">Going for Gold: HSBC Approves Quantum-Safe Technology for Tokenized Bullions</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-skills-gap-cloud/">Cybersecurity Skills Gap Leaves Cloud Environments Vulnerable</a></p><p> </p><p><strong>Tweet of the Week  (42:39)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe-I63sYsMxnDVBU2hlell2dU1Q72YzrOQrmAri6tPo9cCdPbpGiSPZ0xkLXoXwT-cimpO73hOmtOqpbSLOactiuOsp2KMOjHEw4rGuc7NoPHedqrybi5GZ9Yw6uMyFfPx4aXHMzJBSndN2RSTW-KbgdmM?key=4eRG-YiTpy9Rgp2OO0wOwg" /><p><a href="https://twitter.com/ProfWoodward/status/1837084678836171089">https://twitter.com/ProfWoodward/status/1837084678836171089</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44869915" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1f7c59ed-8471-4590-9c86-ef5de3b77e52/audio/792e5489-d11a-4558-bc86-024f10c00f2e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 203 - The Too Soon Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f3d66d6a-764a-48a7-94ee-ab493d6143f1/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:44</itunes:duration>
      <itunes:summary>This week in InfoSec shows that we didn’t always have a clever name for viruses

Rant of the Week is a report from the school of the bleeding obvious

Billy Big Balls is an example of companies just not giving a toss because there are no consequences
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week addresses a new fear which was recently unlocked </itunes:summary>
      <itunes:subtitle>This week in InfoSec shows that we didn’t always have a clever name for viruses

Rant of the Week is a report from the school of the bleeding obvious

Billy Big Balls is an example of companies just not giving a toss because there are no consequences
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week addresses a new fear which was recently unlocked </itunes:subtitle>
      <itunes:keywords>linkedin, freedom, exploding phones, quantum, apple, ransomware, ai, microsoft, privacy, encryption, nimda, bug tech, lindt chocolate, ftc, hsbc, skills gap</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>203</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a2d8b38c-6708-4a39-99ad-0f50af80823d</guid>
      <title>Episode 202 - The Dog Eating Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (11:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th September 2014: Stephane Chazelas contacted Bash maintainer Chet Ramey about a vulnerability he dubbed "Bashdoor", which later becoming known as Shellshock. It was publicly disclosed 12 days later.</p><p>Shellshock was kind of a big deal - and the vuln had been in Bash for 25 years!</p><p><a href="https://x.com/todayininfosec/status/1834293229472416242">https://x.com/todayininfosec/status/1834293229472416242</a>  </p><p>9th September 2001: Mark Curphey started OWASP (the Open Web Application Security Project). In 2023 it was renamed the Open Worldwide Application Security Project.</p><p><a href="https://x.com/todayininfosec/status/1833191889790480500">https://x.com/todayininfosec/status/1833191889790480500</a>  </p><p> </p><p><strong>Rant of the Week (16:33)</strong></p><p><a href="https://www.theregister.com/2024/09/09/whatsapp_view_once_flaw/">WhatsApp's 'View Once' could be 'View Whenever' due to a flaw</a></p><p>A popular privacy feature in WhatsApp is "completely broken and can be trivially bypassed," according to developers at cryptowallet startup Zengo.</p><p>According to cofounder Tal Be'ery, his team was building a web interface when they discovered a flaw in WhatsApp's View Once. While the feature was supposed to be limited to platforms where the necessary controls could be enforced, such as mobile clients, the WhatsApp API server didn't properly enforce it.</p><p>The server would still send these messages to other platforms, but they couldn't be viewed - unless someone fiddled with the code.</p><p>"The View [O]nce media messages are technically the same as regular media messages, only with the “view once” flag set," the technical explanation <a href="https://medium.com/@TalBeerySec/once-and-forever-whatsapps-view-once-functionality-is-broken-302a508390b0">states</a>.</p><p>"Which means it’s the virtual equivalent of putting a note on the picture that says 'don’t look.' All that is required for attackers to circumvent it, is merely to set this flag to false and the media become regular and can be downloaded, forwarded and shared."</p><p> </p><p>Billy Big Balls of the Week (27:10)</p><p><a href="https://www.theregister.com/2024/09/13/australia_vs_big_tech/">Australia’s government spent the week boxing Big Tech</a></p><p>The fun started on Monday when prime minister Anthony Albanese <a href="https://twitter.com/AlboMP/status/1833093955053044132">announced</a> his intention to introduce a minimum age for social media, with a preference for the services to be off limits until kids turn 16.</p><p>"I want kids to have a childhood," the PM <a href="https://twitter.com/AlboMP/status/1833272514723909659">urged</a>. "I want them off their devices … I want them to have real experiences with real people."</p><p>Albanese promised legislation to enact the rule will be tabled before Australia's next election, due by 2025. Opposition leader Peter Dutton broadly supported the proposal, which is pitched at parents who are tired of having to protect their kids online.</p><p> </p><p><strong>Industry news (34:34)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doj-185m-western-union-fraud/">DoJ Distributes $18.5m to Western Union Fraud Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/poland-court-blocks-pegasus/">Poland's Supreme Court Blocks Pegasus Spyware Probe</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-data-centers-critical-national/">UK Recognizes Data Centers as Critical National Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/mastercard-acquires-recorded-future/">Mastercard Acquires Global Threat Intelligence Firm Recorded Future for $2.65bn</a></p><p><a href="https://www.infosecurity-magazine.com/news/tfl-customer-data-breach-arrest/">TfL Confirms Customer Data Breach, 17-Year-Old Suspect Arrested</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-regulator-google-ai/">Irish Data Protection Regulator to Investigate Google AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-prevent-crowdstrike/">Microsoft Vows to Prevent Future CrowdStrike-Like Outages</a></p><p><a href="https://www.infosecurity-magazine.com/news/record-settlement-hacked-patient/">Record $65m Settlement for Hacked Patient Photos</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-false-us-voter-breach/">Malicious Actors Spreading False US Voter Registration Breach Claims</a></p><p> </p><p><strong>Tweet of the Week (41:57)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXft1_LG7yFsh9tiPH3d8bWVxcYfVM6-xO8Lpw8l4gp-BGW6bAku9-xTPX6EJGQALx2HtbwCNRWb8ADqTAISY8vTwWRtTQ-sMZSTkYPvCWFQYGfv6ZOghG2FjumsQ1Ibr3CuQixY0vcQiB6eQ447ipVjAWHs?key=LLB-coUTx-RU93c8sBtkCA" /><p><a href="https://x.com/MikeTalonNYC/status/1834311262563377553">https://x.com/MikeTalonNYC/status/1834311262563377553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 16 Sep 2024 21:11:24 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-202-LRPpMPyl</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (11:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th September 2014: Stephane Chazelas contacted Bash maintainer Chet Ramey about a vulnerability he dubbed "Bashdoor", which later becoming known as Shellshock. It was publicly disclosed 12 days later.</p><p>Shellshock was kind of a big deal - and the vuln had been in Bash for 25 years!</p><p><a href="https://x.com/todayininfosec/status/1834293229472416242">https://x.com/todayininfosec/status/1834293229472416242</a>  </p><p>9th September 2001: Mark Curphey started OWASP (the Open Web Application Security Project). In 2023 it was renamed the Open Worldwide Application Security Project.</p><p><a href="https://x.com/todayininfosec/status/1833191889790480500">https://x.com/todayininfosec/status/1833191889790480500</a>  </p><p> </p><p><strong>Rant of the Week (16:33)</strong></p><p><a href="https://www.theregister.com/2024/09/09/whatsapp_view_once_flaw/">WhatsApp's 'View Once' could be 'View Whenever' due to a flaw</a></p><p>A popular privacy feature in WhatsApp is "completely broken and can be trivially bypassed," according to developers at cryptowallet startup Zengo.</p><p>According to cofounder Tal Be'ery, his team was building a web interface when they discovered a flaw in WhatsApp's View Once. While the feature was supposed to be limited to platforms where the necessary controls could be enforced, such as mobile clients, the WhatsApp API server didn't properly enforce it.</p><p>The server would still send these messages to other platforms, but they couldn't be viewed - unless someone fiddled with the code.</p><p>"The View [O]nce media messages are technically the same as regular media messages, only with the “view once” flag set," the technical explanation <a href="https://medium.com/@TalBeerySec/once-and-forever-whatsapps-view-once-functionality-is-broken-302a508390b0">states</a>.</p><p>"Which means it’s the virtual equivalent of putting a note on the picture that says 'don’t look.' All that is required for attackers to circumvent it, is merely to set this flag to false and the media become regular and can be downloaded, forwarded and shared."</p><p> </p><p>Billy Big Balls of the Week (27:10)</p><p><a href="https://www.theregister.com/2024/09/13/australia_vs_big_tech/">Australia’s government spent the week boxing Big Tech</a></p><p>The fun started on Monday when prime minister Anthony Albanese <a href="https://twitter.com/AlboMP/status/1833093955053044132">announced</a> his intention to introduce a minimum age for social media, with a preference for the services to be off limits until kids turn 16.</p><p>"I want kids to have a childhood," the PM <a href="https://twitter.com/AlboMP/status/1833272514723909659">urged</a>. "I want them off their devices … I want them to have real experiences with real people."</p><p>Albanese promised legislation to enact the rule will be tabled before Australia's next election, due by 2025. Opposition leader Peter Dutton broadly supported the proposal, which is pitched at parents who are tired of having to protect their kids online.</p><p> </p><p><strong>Industry news (34:34)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doj-185m-western-union-fraud/">DoJ Distributes $18.5m to Western Union Fraud Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/poland-court-blocks-pegasus/">Poland's Supreme Court Blocks Pegasus Spyware Probe</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-data-centers-critical-national/">UK Recognizes Data Centers as Critical National Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/mastercard-acquires-recorded-future/">Mastercard Acquires Global Threat Intelligence Firm Recorded Future for $2.65bn</a></p><p><a href="https://www.infosecurity-magazine.com/news/tfl-customer-data-breach-arrest/">TfL Confirms Customer Data Breach, 17-Year-Old Suspect Arrested</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-regulator-google-ai/">Irish Data Protection Regulator to Investigate Google AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-prevent-crowdstrike/">Microsoft Vows to Prevent Future CrowdStrike-Like Outages</a></p><p><a href="https://www.infosecurity-magazine.com/news/record-settlement-hacked-patient/">Record $65m Settlement for Hacked Patient Photos</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-false-us-voter-breach/">Malicious Actors Spreading False US Voter Registration Breach Claims</a></p><p> </p><p><strong>Tweet of the Week (41:57)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXft1_LG7yFsh9tiPH3d8bWVxcYfVM6-xO8Lpw8l4gp-BGW6bAku9-xTPX6EJGQALx2HtbwCNRWb8ADqTAISY8vTwWRtTQ-sMZSTkYPvCWFQYGfv6ZOghG2FjumsQ1Ibr3CuQixY0vcQiB6eQ447ipVjAWHs?key=LLB-coUTx-RU93c8sBtkCA" /><p><a href="https://x.com/MikeTalonNYC/status/1834311262563377553">https://x.com/MikeTalonNYC/status/1834311262563377553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="43157954" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/17062171-3a5d-4372-a7a9-685e2d87d010/audio/0a6cd75a-c761-421c-8328-994d8ac9d142/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 202 - The Dog Eating Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/11b630ab-cb48-4942-8e88-0a169b935c57/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:57</itunes:duration>
      <itunes:summary>This week in InfoSec shows that you’re always running a vulnerability

Rant of the Week is a politically insensitive wiretap

Billy Big Balls is an example of governments taking on big tech
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is all about the points</itunes:summary>
      <itunes:subtitle>This week in InfoSec shows that you’re always running a vulnerability

Rant of the Week is a politically insensitive wiretap

Billy Big Balls is an example of governments taking on big tech
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is all about the points</itunes:subtitle>
      <itunes:keywords>social media, australia, whatsapp, mastercard, view once, bashdoor, recorded futures, owasp, meta, springfield, dogs</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>202</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9a0c3408-fb9c-4741-afa3-a74374a8ffce</guid>
      <title>Episode 201 - The Difficult 201st Podcast</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (13:08)  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd September 2014: Twitter launched its bug bounty program via the HackerOne platform, stating it would award at least $140 for vulnerabilities found in<a href="https://x.com/"> http://x.com/</a> or its Android or iOS apps.</p><p>$140? 140 was the max tweet length. $1.6 million has been paid out since inception.</p><p><a href="https://twitter.com/XSecurity/status/507220774336225280">https://twitter.com/XSecurity/status/507220774336225280</a></p><p><a href="https://x.com/todayininfosec/status/1831408686604140602">https://x.com/todayininfosec/status/1831408686604140602</a></p><p>30th August 2014: A user of the message board 4chan posted leaked nude photos of Jennifer Lawrence, Kate Upton, Kirsten Dunst, and other celebrities. Several years later 4 people were sentenced for crimes related to the hacking of Apple iCloud accounts of dozens of targeted individuals.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcPuChOK2gGNAWlWkCCUEqy4d801o1hGQljzZCNObu3OjAnReT2juDtMQ65ujbb1I1umu85p4gdeqKWdZlmiYMmV9zVHTBBFj3kG2lBsU87LJq3jQnTuJiuW3OvMajqEpugq-7qfxTMkqlB4mHB-ZLsh43q?key=hFHLhcsZ4spnnn6C3ga6Hw" alt="Image" /><p><a href="https://arstechnica.com/information-technology/2014/09/apple-knew-of-icloud-api-weakness-months-before-celeb-photo-leak-broke/">Apple knew of iCloud API weakness months before celeb photo leak broke</a></p><p><a href="https://x.com/todayininfosec/status/1830016468328575386">https://x.com/todayininfosec/status/1830016468328575386</a></p><p> </p><p><strong>Rant of the Week (19:09)</strong></p><p><a href="https://www.theregister.com/2024/09/04/error_amazon_alexa_k/">'Error' causes Alexa to endorse Kamala Harris, refuse to discuss Trump</a></p><p>It would be perfectly reasonable to expect Amazon's digital assistant Alexa to decline to state opinions about the 2024 presidential race, but up until recently, that assumption would have been incorrect.</p><p>When asked to give reasons to vote for former President Donald Trump, Alexa demurred, according to a <a href="https://www.foxbusiness.com/video/6361450470112">video</a> from Fox Business. </p><p>"I cannot provide responses that endorse any political party or its leader," Alexa responded. When asked the same about Vice President Kamala Harris, the Amazon AI was more than willing to endorse the Democratic candidate. </p><p>"There are many reasons to vote for Kamala Harris," Alexa said. Among the reasons given was that Harris has a "comprehensive plan to address racial injustice," that she promises a "tough on crime approach," and that her record on criminal justice and immigration reform make her a "compelling candidate." </p><p> </p><p><strong>Billy Big Balls of the Week (26:45)</strong></p><p><a href="https://www.404media.co/heres-22-examples-of-google-employees-trying-to-avoid-creating-evidence-in-antitrust-case/?ref=daily-stories-newsletter">Examples of Google Employees Trying to Avoid Creating Evidence in Antitrust Case</a></p><p>In its antitrust case against Google, the Federal Government <a href="https://storage.courtlistener.com/recap/gov.uscourts.vaed.533508/gov.uscourts.vaed.533508.1203.3_1.pdf?ref=404media.co">filed a list of chats it had obtained</a> that show Google employees explicitly asking each other to turn off a chat history feature to discuss sensitive subjects, showing repeatedly that Google workers understood they should try to avoid creating a paper trail of some of their activities. </p><p>The filing came following a hearing in which judge Leonie Brinkema <a href="https://www.adweek.com/programmatic/the-doj-alleged-google-destroyed-relevant-evidence-ahead-of-its-antitrust-adtech-trial/?ref=404media.co">ripped Google for “destroyed” evidence</a> while considering a filing from the Department of Justice asking the court to find “adverse interference” against Google, which would allow the court to assume it purposefully destroyed evidence. </p><p>Previous filings, including in the Epic Games v Google lawsuit and this current antitrust case, have also shown Google employees <a href="https://www.fastcompany.com/90955785/google-deleted-chats-in-doj-antitrust-trial?ref=404media.co">purposefully turning history off</a>.</p><p>The chats show 22 instances in which one Google employee told another Google employee to turn chat history off. In total, the court has dozens of specific employees who have told others to turn history off in DMs or broader group chats and channels. The document includes exchanges like this (each exchange includes different employees)</p><p>AND</p><p><a href="https://www.bleepingcomputer.com/news/security/musician-charged-with-10m-streaming-royalties-fraud-using-ai-and-bots/">Musician charged with $10M streaming royalties fraud using AI and bots</a></p><p>North Carolina musician Michael Smith was indicted for collecting over $10 million in royalty payments from Spotify, Amazon Music, Apple Music, and YouTube Music using AI-generated songs streamed by thousands of bots in a massive streaming fraud scheme.</p><p>According to <a href="https://www.justice.gov/usao-sdny/media/1366241/dl">court documents</a>, Smith fraudulently inflated music streams on digital platforms between 2017 and 2024 with the assistance of an unnamed music promoter and the Chief Executive Officer of an AI music company.</p><p>He acquired hundreds of thousands of songs generated through artificial intelligence (AI) from a coconspirator and uploaded them to these streaming platforms. He then used automated bots to stream the AI-generated tracks billions of times.</p><p> </p><p><strong>Industry News (36:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/south-korea-police-telegram/">South Korea Police Investigates Telegram Over Deepfake Porn</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-wildlife-park-breach/">Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tfl-cyberincident-not-impacting/">TfL Claims Cyber-Incident is Not Impacting Services</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-plead-guilty-running-mfa/">Three Plead Guilty to Running MFA Bypass Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/rights-groups-spyware-controls/">Civil Rights Groups Call For Spyware Controls</a></p><p><a href="https://www.infosecurity-magazine.com/news/clearview-ai-fined-30m-netherlands/">Clearview AI Fined €30.5m by Dutch Watchdog Over Illegal Data Collection</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-disinformation-us-election/">Russian Blamed For Mass Disinformation Campaign Ahead of US Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/onlyfans-hackers-targeted/">OnlyFans Hackers Targeted With Infostealer Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-signs-council-of-europe-ai/">UK Signs Council of Europe AI Convention</a></p><p> </p><p><strong>Tweet of the Week (42:50)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfdQeB7nclZww4fSl0AmPdxv4ElYFNNrwKKshNPIIahnooqfbisQ45DJV0HQEZbECFJBBM0D1w2KdGE7Ah0NDYemasGz6lBIPBhJS7irJrkE9dl9I8xDp1XqysD4H4uvA87e18PVztaWFjQqV9_WaOp8vQ?key=hFHLhcsZ4spnnn6C3ga6Hw" /><p><a href="https://twitter.com/0xdade/status/1831387831677415923">https://twitter.com/0xdade/status/1831387831677415923</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 9 Sep 2024 15:59:40 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-201-IlwZtYjA</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (13:08)  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd September 2014: Twitter launched its bug bounty program via the HackerOne platform, stating it would award at least $140 for vulnerabilities found in<a href="https://x.com/"> http://x.com/</a> or its Android or iOS apps.</p><p>$140? 140 was the max tweet length. $1.6 million has been paid out since inception.</p><p><a href="https://twitter.com/XSecurity/status/507220774336225280">https://twitter.com/XSecurity/status/507220774336225280</a></p><p><a href="https://x.com/todayininfosec/status/1831408686604140602">https://x.com/todayininfosec/status/1831408686604140602</a></p><p>30th August 2014: A user of the message board 4chan posted leaked nude photos of Jennifer Lawrence, Kate Upton, Kirsten Dunst, and other celebrities. Several years later 4 people were sentenced for crimes related to the hacking of Apple iCloud accounts of dozens of targeted individuals.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcPuChOK2gGNAWlWkCCUEqy4d801o1hGQljzZCNObu3OjAnReT2juDtMQ65ujbb1I1umu85p4gdeqKWdZlmiYMmV9zVHTBBFj3kG2lBsU87LJq3jQnTuJiuW3OvMajqEpugq-7qfxTMkqlB4mHB-ZLsh43q?key=hFHLhcsZ4spnnn6C3ga6Hw" alt="Image" /><p><a href="https://arstechnica.com/information-technology/2014/09/apple-knew-of-icloud-api-weakness-months-before-celeb-photo-leak-broke/">Apple knew of iCloud API weakness months before celeb photo leak broke</a></p><p><a href="https://x.com/todayininfosec/status/1830016468328575386">https://x.com/todayininfosec/status/1830016468328575386</a></p><p> </p><p><strong>Rant of the Week (19:09)</strong></p><p><a href="https://www.theregister.com/2024/09/04/error_amazon_alexa_k/">'Error' causes Alexa to endorse Kamala Harris, refuse to discuss Trump</a></p><p>It would be perfectly reasonable to expect Amazon's digital assistant Alexa to decline to state opinions about the 2024 presidential race, but up until recently, that assumption would have been incorrect.</p><p>When asked to give reasons to vote for former President Donald Trump, Alexa demurred, according to a <a href="https://www.foxbusiness.com/video/6361450470112">video</a> from Fox Business. </p><p>"I cannot provide responses that endorse any political party or its leader," Alexa responded. When asked the same about Vice President Kamala Harris, the Amazon AI was more than willing to endorse the Democratic candidate. </p><p>"There are many reasons to vote for Kamala Harris," Alexa said. Among the reasons given was that Harris has a "comprehensive plan to address racial injustice," that she promises a "tough on crime approach," and that her record on criminal justice and immigration reform make her a "compelling candidate." </p><p> </p><p><strong>Billy Big Balls of the Week (26:45)</strong></p><p><a href="https://www.404media.co/heres-22-examples-of-google-employees-trying-to-avoid-creating-evidence-in-antitrust-case/?ref=daily-stories-newsletter">Examples of Google Employees Trying to Avoid Creating Evidence in Antitrust Case</a></p><p>In its antitrust case against Google, the Federal Government <a href="https://storage.courtlistener.com/recap/gov.uscourts.vaed.533508/gov.uscourts.vaed.533508.1203.3_1.pdf?ref=404media.co">filed a list of chats it had obtained</a> that show Google employees explicitly asking each other to turn off a chat history feature to discuss sensitive subjects, showing repeatedly that Google workers understood they should try to avoid creating a paper trail of some of their activities. </p><p>The filing came following a hearing in which judge Leonie Brinkema <a href="https://www.adweek.com/programmatic/the-doj-alleged-google-destroyed-relevant-evidence-ahead-of-its-antitrust-adtech-trial/?ref=404media.co">ripped Google for “destroyed” evidence</a> while considering a filing from the Department of Justice asking the court to find “adverse interference” against Google, which would allow the court to assume it purposefully destroyed evidence. </p><p>Previous filings, including in the Epic Games v Google lawsuit and this current antitrust case, have also shown Google employees <a href="https://www.fastcompany.com/90955785/google-deleted-chats-in-doj-antitrust-trial?ref=404media.co">purposefully turning history off</a>.</p><p>The chats show 22 instances in which one Google employee told another Google employee to turn chat history off. In total, the court has dozens of specific employees who have told others to turn history off in DMs or broader group chats and channels. The document includes exchanges like this (each exchange includes different employees)</p><p>AND</p><p><a href="https://www.bleepingcomputer.com/news/security/musician-charged-with-10m-streaming-royalties-fraud-using-ai-and-bots/">Musician charged with $10M streaming royalties fraud using AI and bots</a></p><p>North Carolina musician Michael Smith was indicted for collecting over $10 million in royalty payments from Spotify, Amazon Music, Apple Music, and YouTube Music using AI-generated songs streamed by thousands of bots in a massive streaming fraud scheme.</p><p>According to <a href="https://www.justice.gov/usao-sdny/media/1366241/dl">court documents</a>, Smith fraudulently inflated music streams on digital platforms between 2017 and 2024 with the assistance of an unnamed music promoter and the Chief Executive Officer of an AI music company.</p><p>He acquired hundreds of thousands of songs generated through artificial intelligence (AI) from a coconspirator and uploaded them to these streaming platforms. He then used automated bots to stream the AI-generated tracks billions of times.</p><p> </p><p><strong>Industry News (36:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/south-korea-police-telegram/">South Korea Police Investigates Telegram Over Deepfake Porn</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-wildlife-park-breach/">Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tfl-cyberincident-not-impacting/">TfL Claims Cyber-Incident is Not Impacting Services</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-plead-guilty-running-mfa/">Three Plead Guilty to Running MFA Bypass Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/rights-groups-spyware-controls/">Civil Rights Groups Call For Spyware Controls</a></p><p><a href="https://www.infosecurity-magazine.com/news/clearview-ai-fined-30m-netherlands/">Clearview AI Fined €30.5m by Dutch Watchdog Over Illegal Data Collection</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-disinformation-us-election/">Russian Blamed For Mass Disinformation Campaign Ahead of US Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/onlyfans-hackers-targeted/">OnlyFans Hackers Targeted With Infostealer Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-signs-council-of-europe-ai/">UK Signs Council of Europe AI Convention</a></p><p> </p><p><strong>Tweet of the Week (42:50)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfdQeB7nclZww4fSl0AmPdxv4ElYFNNrwKKshNPIIahnooqfbisQ45DJV0HQEZbECFJBBM0D1w2KdGE7Ah0NDYemasGz6lBIPBhJS7irJrkE9dl9I8xDp1XqysD4H4uvA87e18PVztaWFjQqV9_WaOp8vQ?key=hFHLhcsZ4spnnn6C3ga6Hw" /><p><a href="https://twitter.com/0xdade/status/1831387831677415923">https://twitter.com/0xdade/status/1831387831677415923</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44394277" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/4439e365-b504-4f87-9c72-c18017bbb313/audio/338d7b2d-eb82-440d-953c-45c4c7ddbcc3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 201 - The Difficult 201st Podcast</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8a3521f8-c8a5-4563-8d72-38e86e6fc1b7/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:14</itunes:duration>
      <itunes:summary>This week in InfoSec is a reminder of the simpler days of 140

Rant of the Week is a politically insensitive wiretap

Billy Big Balls is a story about one of the world’s largest data brokers activating the Enron protocol
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is about risks in context</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a reminder of the simpler days of 140

Rant of the Week is a politically insensitive wiretap

Billy Big Balls is a story about one of the world’s largest data brokers activating the Enron protocol
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is about risks in context</itunes:subtitle>
      <itunes:keywords>fappening, yubikey, hackerone, google chat, streaming fraud, alexa, type 2 diabeted, onlyfans, ai, bug bounty, liver failure, deepfake, infostealer malware, kamala harris</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>201</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">647fca7f-d1c0-4fb8-9981-691949b96c4e</guid>
      <title>Episode 200 - The Bicentennial men Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (07:42)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th August 1990: The UK's Computer Misuse Act 1990 went into effect, introducing 3 criminal offences related to unauthorised access and modification of "computer material".</p><p><a href="https://twitter.com/todayininfosec/status/1829252932178719161">https://twitter.com/todayininfosec/status/1829252932178719161</a>  </p><p>27th August 1999: One of the first companies to offer a dedicated web application firewall (WAF) was Perfecto Technologies with its AppShield product. But it didn't use the terminology "WAF", instead describing it as "a plug and play" Internet application security solution."</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXettGrUgvFAr32Zy25Bxv7PGN9jk5ZhDFnjlDtydms37J8Ib-7QuGOYGlk3tssCSFJGtVUttqkYnHgdTkoaU36w5sdbRgtriO40SyBPsxNaH9IsLIBT8-y025wCx7PGRZ8WT9hzEH7AFhU95sGQLU9_ASg?key=2j4iBL7gaJLkrsb2XA0xwA" /><p><a href="https://twitter.com/todayininfosec/status/1828483993001492969">https://twitter.com/todayininfosec/status/1828483993001492969</a></p><p> </p><p><strong>Rant of the Week (13:25) </strong></p><p><a href="https://www.theregister.com/2024/08/26/fbi_data_security/">Watchdog warns FBI is sloppy on secure data storage and destruction</a></p><p>The FBI has made serious slip-ups in how it processes and destroys electronic storage media seized as part of investigations, according to an audit by the Department of Justice Office of the Inspector General.</p><p>Drives containing national security data, Foreign Intelligence Surveillance Act information and documents classified as Secret were routinely unlabeled, opening the potential for it to be either lost or stolen, the <a href="https://oig.justice.gov/sites/default/files/reports/24-093.pdf">report</a> [PDF] addressed to FBI Director Christopher Wray states.</p><p>Ironically, this lack of identification might be considered a benefit, given the lax security at the FBI's facility used to destroy such media after they have been finished with.</p><p>The OIG report notes that it found boxes of hard drives and removable storage sitting open and unattended for "days or even weeks" because they were only sealed once the boxes were full. This potentially allows any of the 395 staff and contractors with access to the facility to have a rummage around.</p><p> </p><p><strong>Billy Big Balls of the Week (22:01)</strong></p><p><a href="https://www.theregister.com/2024/08/21/man_jailed_faking_death_online/">Deadbeat dad faked his own death by hacking government databases</a></p><p>A US man has been sentenced to 81 months in jail for faking his own death by hacking government systems and officially marking himself as deceased.</p><p>The US Department of Justice on Tuesday detailed the case of Jesse Kipf, 39, who was sent down for computer fraud and aggravated identity theft.</p><p>In January 2023, Kipf used the credentials of a physician to access Hawaii's Death Registry System and create a "case" that recorded his own death.</p><p>"Kipf then completed a State of Hawaii Death Certificate Worksheet, assigned himself as the medical certifier for the case and certified his death, using the digital signature of the doctor," the DoJ wrote. The paperwork was all correct, so many government databases listed Kipf as deceased.</p><p>But he was very much alive and enjoying the fact that his "death" meant he didn't have to make child support payments or catch up on those he'd already missed. Evidence presented in court included internet search histories recorded on a laptop, with Kipf looking up terms including "Remove California child support for deceased."</p><p> </p><p><strong>Industry News (28:13)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uber-hit-with-290m-gdpr-fine/">Uber Hit With €290m GDPR Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-flawed-data-security-concerns/">FBI Flawed Data Handling Raises Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-365-copilot-flaw-exposes/">Microsoft 365 Copilot Vulnerability Exposes User Data Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/money-laundering-dominates-uk/">Money Laundering Dominates UK Fraud Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-exposed-67m-records/">Ransomware Attacks Exposed 6.7 Million Records in US Schools</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-engineer-charged-extort-former/">IT Engineer Charged For Attempting to Extort Former Employer</a></p><p><a href="https://www.infosecurity-magazine.com/news/surge-new-scams-pig-butchering/">Surge in New Scams as Pig Butchering Dominates</a></p><p><a href="https://www.infosecurity-magazine.com/news/unpatched-cctv-cameras-exploited/">Unpatched CCTV Cameras Exploited to Spread Mirai Variant</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-launch-npm-package/">North Korean Hackers Launch New Wave of npm Package Attacks</a></p><p> </p><p><strong>Tweet of the Week (36:20)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdaz073Vdfzcp4A7Fz-c4D7ir5HT9aN3xGhrayEalLDMkV1R3lMYGqnrENGTf5kf0UPSWVabTtGCHq_Dd2OQGrjShC1cdF7LGdn21v_N0bgvwhWgGn35TFrWOTFRav491fkI26rdncEsX9aUqWDFcnBgG5w?key=2j4iBL7gaJLkrsb2XA0xwA" /><p><a href="https://x.com/fesshole/status/1828921760147767400">https://x.com/fesshole/status/1828921760147767400</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 2 Sep 2024 22:10:24 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-200-UbCVNgfK</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (07:42)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th August 1990: The UK's Computer Misuse Act 1990 went into effect, introducing 3 criminal offences related to unauthorised access and modification of "computer material".</p><p><a href="https://twitter.com/todayininfosec/status/1829252932178719161">https://twitter.com/todayininfosec/status/1829252932178719161</a>  </p><p>27th August 1999: One of the first companies to offer a dedicated web application firewall (WAF) was Perfecto Technologies with its AppShield product. But it didn't use the terminology "WAF", instead describing it as "a plug and play" Internet application security solution."</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXettGrUgvFAr32Zy25Bxv7PGN9jk5ZhDFnjlDtydms37J8Ib-7QuGOYGlk3tssCSFJGtVUttqkYnHgdTkoaU36w5sdbRgtriO40SyBPsxNaH9IsLIBT8-y025wCx7PGRZ8WT9hzEH7AFhU95sGQLU9_ASg?key=2j4iBL7gaJLkrsb2XA0xwA" /><p><a href="https://twitter.com/todayininfosec/status/1828483993001492969">https://twitter.com/todayininfosec/status/1828483993001492969</a></p><p> </p><p><strong>Rant of the Week (13:25) </strong></p><p><a href="https://www.theregister.com/2024/08/26/fbi_data_security/">Watchdog warns FBI is sloppy on secure data storage and destruction</a></p><p>The FBI has made serious slip-ups in how it processes and destroys electronic storage media seized as part of investigations, according to an audit by the Department of Justice Office of the Inspector General.</p><p>Drives containing national security data, Foreign Intelligence Surveillance Act information and documents classified as Secret were routinely unlabeled, opening the potential for it to be either lost or stolen, the <a href="https://oig.justice.gov/sites/default/files/reports/24-093.pdf">report</a> [PDF] addressed to FBI Director Christopher Wray states.</p><p>Ironically, this lack of identification might be considered a benefit, given the lax security at the FBI's facility used to destroy such media after they have been finished with.</p><p>The OIG report notes that it found boxes of hard drives and removable storage sitting open and unattended for "days or even weeks" because they were only sealed once the boxes were full. This potentially allows any of the 395 staff and contractors with access to the facility to have a rummage around.</p><p> </p><p><strong>Billy Big Balls of the Week (22:01)</strong></p><p><a href="https://www.theregister.com/2024/08/21/man_jailed_faking_death_online/">Deadbeat dad faked his own death by hacking government databases</a></p><p>A US man has been sentenced to 81 months in jail for faking his own death by hacking government systems and officially marking himself as deceased.</p><p>The US Department of Justice on Tuesday detailed the case of Jesse Kipf, 39, who was sent down for computer fraud and aggravated identity theft.</p><p>In January 2023, Kipf used the credentials of a physician to access Hawaii's Death Registry System and create a "case" that recorded his own death.</p><p>"Kipf then completed a State of Hawaii Death Certificate Worksheet, assigned himself as the medical certifier for the case and certified his death, using the digital signature of the doctor," the DoJ wrote. The paperwork was all correct, so many government databases listed Kipf as deceased.</p><p>But he was very much alive and enjoying the fact that his "death" meant he didn't have to make child support payments or catch up on those he'd already missed. Evidence presented in court included internet search histories recorded on a laptop, with Kipf looking up terms including "Remove California child support for deceased."</p><p> </p><p><strong>Industry News (28:13)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uber-hit-with-290m-gdpr-fine/">Uber Hit With €290m GDPR Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-flawed-data-security-concerns/">FBI Flawed Data Handling Raises Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-365-copilot-flaw-exposes/">Microsoft 365 Copilot Vulnerability Exposes User Data Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/money-laundering-dominates-uk/">Money Laundering Dominates UK Fraud Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-exposed-67m-records/">Ransomware Attacks Exposed 6.7 Million Records in US Schools</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-engineer-charged-extort-former/">IT Engineer Charged For Attempting to Extort Former Employer</a></p><p><a href="https://www.infosecurity-magazine.com/news/surge-new-scams-pig-butchering/">Surge in New Scams as Pig Butchering Dominates</a></p><p><a href="https://www.infosecurity-magazine.com/news/unpatched-cctv-cameras-exploited/">Unpatched CCTV Cameras Exploited to Spread Mirai Variant</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-launch-npm-package/">North Korean Hackers Launch New Wave of npm Package Attacks</a></p><p> </p><p><strong>Tweet of the Week (36:20)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdaz073Vdfzcp4A7Fz-c4D7ir5HT9aN3xGhrayEalLDMkV1R3lMYGqnrENGTf5kf0UPSWVabTtGCHq_Dd2OQGrjShC1cdF7LGdn21v_N0bgvwhWgGn35TFrWOTFRav491fkI26rdncEsX9aUqWDFcnBgG5w?key=2j4iBL7gaJLkrsb2XA0xwA" /><p><a href="https://x.com/fesshole/status/1828921760147767400">https://x.com/fesshole/status/1828921760147767400</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="37641311" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/5284b8bc-c0f8-4167-9bb7-27fd8039eff3/audio/2d3e8943-236f-4bfe-b0d8-ddf115a83c5f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 200 - The Bicentennial men Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5c76bf81-6b6b-4c40-ba53-80641fae8891/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:12</itunes:duration>
      <itunes:summary>This week in InfoSec is an illegal game of wiff waff before even Bojo thought of it

Rant of the Week is the stuff of nightmares for any records management professional

Billy Big Balls is a story from NCIS Santa Barbara
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a dish best served cold</itunes:summary>
      <itunes:subtitle>This week in InfoSec is an illegal game of wiff waff before even Bojo thought of it

Rant of the Week is the stuff of nightmares for any records management professional

Billy Big Balls is a story from NCIS Santa Barbara
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a dish best served cold</itunes:subtitle>
      <itunes:keywords>computer misuse act, secure data storage, north korea, bare minimum, aliexpress, pig buthering, erratasec, charlatan, child support, fbi, 200!, waf, gdpr, uber, petty revenge, deadbeat dad, faked death</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>200</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a44fa424-2eea-4af6-97a0-97cd8841c767</guid>
      <title>Episode 199 - The Holiday Is Over Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (06:43)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2004: Text messages sent to promote the video game "Resident Evil: Outbreak" stated "Outbreak: I'm infecting you with t-virus". This scared recipients, who were only about 7% less technologically savvy than mobile phone users today.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfas98Q56wqA0kculTi168whNimPt09qNFVRgyFqkyWXT9BrVANAxXdKr4IJNlvTnytHhM3ql8wBkBUnCU4ig74bxOTxYIsTOiuezpYjdmO0rgslWnqSP0zaPXganaQWvzUTa4uyVSEuPNgbe9hnk0rnMY?key=0-zj3U6cUJaAHZo8oyQIFw" /><p><a href="https://x.com/todayininfosec/status/1825257955878641888">https://x.com/todayininfosec/status/1825257955878641888</a>   </p><p> </p><p>20th August 2003: Philippe Oechslin shared his technique he called "rainbow tables" during a talk at the 23rd annual crypto conference, Crypto 2003.</p><p>It became a popular approach for cracking password hashes. Today it's less widely used due to adoption of practices that reduce its efficacy.</p><p><a href="https://x.com/todayininfosec/status/1825865870716870802">https://x.com/todayininfosec/status/1825865870716870802</a></p><p> </p><p><strong>Rant of the Week  (10:59)</strong></p><p><a href="https://www.theregister.com/2024/08/22/ucsc_phishing_test_ebola/">This uni thought it would be a good idea to do a phishing test with a fake Ebola scare</a></p><p>University of California Santa Cruz (UCSC) students may be relieved to hear that an emailed warning about a staff member infected with the Ebola virus was just a phishing exercise.</p><p>The message, titled "Emergency Notification: Ebola Virus Case on Campus," went out to the university community on Sunday, August 18. It began, "We regret to inform you that a member of our staff, who recently returned from South Africa, has tested positive for the Ebola virus."</p><p>The <a href="https://www.reddit.com/r/UCSC/comments/1evao2v/is_this_a_scam/#lightbox">message</a> went on to say that the university has initiated a contact tracing protocol and asks message recipients to "Please Log In to the Access Information Page for more details" – the very activity phishing messages attempt to encourage in order to capture login credentials.</p><p>The simulated attack was similar to <a href="https://its.ucsc.edu/security/images/credharv812024.png">an actual phishing message</a> sent on August 1, 2024, as shown on the <a href="https://its.ucsc.edu/security/phish-bowl.html">UCSC Phish Bowl</a>, a collection of real and test phishing attempts.</p><p>But the one sent on Sunday was intended to raise awareness of phishing rather than to actually steal information.</p><p>In that, it succeeded. The message prompted the UCSC Student Health Center to publish <a href="https://healthcenter.ucsc.edu/news-events/news/phishing-email-alert.html">a notice</a> about a "Phishing email with misleading health information."</p><p>On Monday, Brian Hall, chief information security officer for UCSC, sent out <a href="https://www.reddit.com/r/UCSC/comments/1ewfg12/so_it_looks_like_its_realized_their_mistake/">an apology</a> to the university community.</p><p> </p><p><strong>Billy Big Balls of the Week (18:20)</strong></p><p><a href="https://www.theregister.com/2024/08/21/russia_memo_ukraine_invasion/">Russia tells citizens to switch off home surveillance because the Ukrainians are coming</a></p><p>Russia's Ministry of Internal Affairs is warning residents of under-siege regions to switch off home surveillance systems and dating apps to stop Ukraine from using them for intel-gathering purposes.</p><p>Residents of the Bryansk, Kursk, and Belgorod regions were issued with the warnings amid what seems like Russia being thoroughly rattled by Ukraine's incursion into the country's southwest.</p><p>"The enemy is massively identifying IP ranges in our territories and connecting to unprotected video surveillance cameras remotely, viewing everything from private yards to roads and highways of strategic importance," said the ministry, according to Russian newswire <a href="https://www.interfax.ru/russia/977231">Interfax</a>. "In this regard, if there is no urgent need, it is better not to use video surveillance cameras.</p><p>"It is highly discouraged to use online dating services. The enemy actively uses such resources for the covert collection of information."</p><p>These warnings were just two of many included in a public memo aimed at protecting the identities of high-value Russian individuals, including military personnel, law enforcement agents, and nuclear energy workers.</p><p> </p><p><strong>Industry News (24:51)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/iran-trump-campaign-hack-us/">Iran Behind Trump Campaign Hack, US Government Confirms</a></p><p><a href="https://www.infosecurity-magazine.com/news/dns-based-backdoor-taiwanese/">New DNS-Based Backdoor Threat Discovered at Taiwanese University</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-ransomware-attacks-happen/">Most Ransomware Attacks Now Happen at Night</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-new-hq-524m-contract/">CISA to Get New Headquarters as $524M Contract Awarded</a></p><p><a href="https://www.infosecurity-magazine.com/news/australia-calls-off-clearview-ai/">Australia Calls Off Clearview AI Investigation Despite Lack of Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/backdoor-mifare-smart-cards-open/">Backdoor in Mifare Smart Cards Could Open Doors Around the World</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-uk-political/">Security Flaws in UK Political Party Donation Platforms Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/lingo-telecom-fine-1m-fake-joe/">Company Fined $1m for Fake Joe Biden AI Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/faa-gaps-aircraft-cybersecurity/">FAA Admits Gaps in Aircraft Cybersecurity Rules: New Regulation Proposed</a></p><p> </p><p><strong>Tweet of the Week (32:19)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXctJ48GhNCjfqiqMlmOSmmp4mkhty37_l0txjHClcB0aJ_2vAeyKD5yzQQqGgEt6I6Yo9LJV6s_6MwAtKC4pbg-0e0DPiSAGZPld6yYh0zUKRK_wSJ7Sn1A8Z46tY3eQ280bDtjHzBZDWMhKFhSH4VmoXi3?key=0-zj3U6cUJaAHZo8oyQIFw" /><p><a href="https://x.com/anon_opin/status/1826015107857416458?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/anon_opin/status/1826015107857416458?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 27 Aug 2024 19:55:54 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-199-g8OodmG9</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (06:43)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2004: Text messages sent to promote the video game "Resident Evil: Outbreak" stated "Outbreak: I'm infecting you with t-virus". This scared recipients, who were only about 7% less technologically savvy than mobile phone users today.</p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfas98Q56wqA0kculTi168whNimPt09qNFVRgyFqkyWXT9BrVANAxXdKr4IJNlvTnytHhM3ql8wBkBUnCU4ig74bxOTxYIsTOiuezpYjdmO0rgslWnqSP0zaPXganaQWvzUTa4uyVSEuPNgbe9hnk0rnMY?key=0-zj3U6cUJaAHZo8oyQIFw" /><p><a href="https://x.com/todayininfosec/status/1825257955878641888">https://x.com/todayininfosec/status/1825257955878641888</a>   </p><p> </p><p>20th August 2003: Philippe Oechslin shared his technique he called "rainbow tables" during a talk at the 23rd annual crypto conference, Crypto 2003.</p><p>It became a popular approach for cracking password hashes. Today it's less widely used due to adoption of practices that reduce its efficacy.</p><p><a href="https://x.com/todayininfosec/status/1825865870716870802">https://x.com/todayininfosec/status/1825865870716870802</a></p><p> </p><p><strong>Rant of the Week  (10:59)</strong></p><p><a href="https://www.theregister.com/2024/08/22/ucsc_phishing_test_ebola/">This uni thought it would be a good idea to do a phishing test with a fake Ebola scare</a></p><p>University of California Santa Cruz (UCSC) students may be relieved to hear that an emailed warning about a staff member infected with the Ebola virus was just a phishing exercise.</p><p>The message, titled "Emergency Notification: Ebola Virus Case on Campus," went out to the university community on Sunday, August 18. It began, "We regret to inform you that a member of our staff, who recently returned from South Africa, has tested positive for the Ebola virus."</p><p>The <a href="https://www.reddit.com/r/UCSC/comments/1evao2v/is_this_a_scam/#lightbox">message</a> went on to say that the university has initiated a contact tracing protocol and asks message recipients to "Please Log In to the Access Information Page for more details" – the very activity phishing messages attempt to encourage in order to capture login credentials.</p><p>The simulated attack was similar to <a href="https://its.ucsc.edu/security/images/credharv812024.png">an actual phishing message</a> sent on August 1, 2024, as shown on the <a href="https://its.ucsc.edu/security/phish-bowl.html">UCSC Phish Bowl</a>, a collection of real and test phishing attempts.</p><p>But the one sent on Sunday was intended to raise awareness of phishing rather than to actually steal information.</p><p>In that, it succeeded. The message prompted the UCSC Student Health Center to publish <a href="https://healthcenter.ucsc.edu/news-events/news/phishing-email-alert.html">a notice</a> about a "Phishing email with misleading health information."</p><p>On Monday, Brian Hall, chief information security officer for UCSC, sent out <a href="https://www.reddit.com/r/UCSC/comments/1ewfg12/so_it_looks_like_its_realized_their_mistake/">an apology</a> to the university community.</p><p> </p><p><strong>Billy Big Balls of the Week (18:20)</strong></p><p><a href="https://www.theregister.com/2024/08/21/russia_memo_ukraine_invasion/">Russia tells citizens to switch off home surveillance because the Ukrainians are coming</a></p><p>Russia's Ministry of Internal Affairs is warning residents of under-siege regions to switch off home surveillance systems and dating apps to stop Ukraine from using them for intel-gathering purposes.</p><p>Residents of the Bryansk, Kursk, and Belgorod regions were issued with the warnings amid what seems like Russia being thoroughly rattled by Ukraine's incursion into the country's southwest.</p><p>"The enemy is massively identifying IP ranges in our territories and connecting to unprotected video surveillance cameras remotely, viewing everything from private yards to roads and highways of strategic importance," said the ministry, according to Russian newswire <a href="https://www.interfax.ru/russia/977231">Interfax</a>. "In this regard, if there is no urgent need, it is better not to use video surveillance cameras.</p><p>"It is highly discouraged to use online dating services. The enemy actively uses such resources for the covert collection of information."</p><p>These warnings were just two of many included in a public memo aimed at protecting the identities of high-value Russian individuals, including military personnel, law enforcement agents, and nuclear energy workers.</p><p> </p><p><strong>Industry News (24:51)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/iran-trump-campaign-hack-us/">Iran Behind Trump Campaign Hack, US Government Confirms</a></p><p><a href="https://www.infosecurity-magazine.com/news/dns-based-backdoor-taiwanese/">New DNS-Based Backdoor Threat Discovered at Taiwanese University</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-ransomware-attacks-happen/">Most Ransomware Attacks Now Happen at Night</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-new-hq-524m-contract/">CISA to Get New Headquarters as $524M Contract Awarded</a></p><p><a href="https://www.infosecurity-magazine.com/news/australia-calls-off-clearview-ai/">Australia Calls Off Clearview AI Investigation Despite Lack of Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/backdoor-mifare-smart-cards-open/">Backdoor in Mifare Smart Cards Could Open Doors Around the World</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-uk-political/">Security Flaws in UK Political Party Donation Platforms Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/lingo-telecom-fine-1m-fake-joe/">Company Fined $1m for Fake Joe Biden AI Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/faa-gaps-aircraft-cybersecurity/">FAA Admits Gaps in Aircraft Cybersecurity Rules: New Regulation Proposed</a></p><p> </p><p><strong>Tweet of the Week (32:19)</strong></p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXctJ48GhNCjfqiqMlmOSmmp4mkhty37_l0txjHClcB0aJ_2vAeyKD5yzQQqGgEt6I6Yo9LJV6s_6MwAtKC4pbg-0e0DPiSAGZPld6yYh0zUKRK_wSJ7Sn1A8Z46tY3eQ280bDtjHzBZDWMhKFhSH4VmoXi3?key=0-zj3U6cUJaAHZo8oyQIFw" /><p><a href="https://x.com/anon_opin/status/1826015107857416458?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/anon_opin/status/1826015107857416458?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="34479032" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c804f36f-ecfc-4b27-a2b9-0cdca11e8345/audio/8f9bd12d-857b-4bf7-bc7f-ea5e069d83b7/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 199 - The Holiday Is Over Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8b2877ce-0227-4b47-ac91-a7bce740270c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:54</itunes:duration>
      <itunes:summary>This week in InfoSec is pride-themed

Rant of the Week is a sweet tale of a flesh eating virus

Billy Big Balls is a story of how the turns have tabled
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week Makes the case for extra intelligence among us</itunes:summary>
      <itunes:subtitle>This week in InfoSec is pride-themed

Rant of the Week is a sweet tale of a flesh eating virus

Billy Big Balls is a story of how the turns have tabled
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week Makes the case for extra intelligence among us</itunes:subtitle>
      <itunes:keywords>biden, night attacks, phishing, backdoor, microwaves aliens, t-virus, ebola, resident evil, slava ukraine, ai, rainbow tables, technology</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>199</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">398524ae-1fac-42ca-bade-63b9eea05b3d</guid>
      <title>Episode 198</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (10:28)</strong></p><p>10th July 1999 - Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America".</p><p><a href="https://twitter.com/todayininfosec/status/1811133606015983680">https://twitter.com/todayininfosec/status/1811133606015983680</a></p><p>9th July 1981 - The game that launched two of the most famous characters in video game history is released for sale. Donkey Kong was created by Nintendo, a Japanese playing card and toy company turned fledgling video game developer, who was trying to create a hit game for the North American market. Unable at the time to acquire a license to create a video game based on the Popeye character, Nintendo decides to create a game mirroring the characteristics and rivalry of Popeye and Bluto. Donkey Kong is named after the game’s villain, a pet gorilla gone rogue. The game’s hero is originally called Jumpman, but is retroactively renamed Mario once the game becomes popular and Nintendo decides to use the character in future games.</p><p>Due to the similarity between Donkey Kong and King Kong, Universal Studios sued Nintendo claiming Donkey Kong violated their trademark. Kong, however, is common Japanese slang for gorilla. The lawsuit was ruled in favor of Nintendo. The success of Donkey Kong helped Nintendo become one of the dominant companies in the video game market.</p><p> </p><p><strong>Rant of the Week (15:55)</strong></p><p><a href="https://www.bbc.co.uk/news/articles/cger582weplo">Palestinians say Microsoft unfairly closing their accounts</a></p><p>Palestinians living abroad have accused Microsoft of closing their email accounts without warning - cutting them off from crucial online services.</p><p>They say it has left them unable to access bank accounts and job offers - and stopped them using Skype, which Microsoft owns, to contact relatives in war-torn Gaza.</p><p>Microsoft says they violated its terms of service - a claim they dispute.</p><p> </p><p><strong>Billy Big Balls of the Week (27:39)</strong></p><p><a href="https://www.404media.co/scalpers-are-working-with-hackers-to-liberate-non-transferable-tickets-from-ticketmasters-ecosystem/">Scalpers Work With Hackers to Liberate Ticketmaster's ‘Non-Transferable’ Tickets</a></p><p>A lawsuit filed in California by concert giant AXS has revealed a legal and technological battle between ticket scalpers and platforms like Ticketmaster and AXS, in which scalpers have figured out how to extract “untransferable” tickets from their accounts by generating entry barcodes on parallel infrastructure that the scalpers control and which can then be sold and transferred to customers.</p><p>By reverse-engineering how Ticketmaster and AXS actually make their electronic tickets, scalpers have essentially figured out how to regenerate specific, genuine tickets that they have legally purchased from scratch onto infrastructure that they control. In doing so, they are removing the anti-scalping restrictions put on the tickets by Ticketmaster and AXS. </p><p><a href="https://www.computing.co.uk/news/4334320/gay-furry-hackers-breach-conservative-us-tank-project-2025">'Gay furry hackers' breach conservative US think tank behind Project 2025</a></p><p>A collective of self-described "gay furry hackers" have released 2GB of data lifted from the Heritage Foundation, the conservative think-tank behind Project 2025 - a set of proposals that would bring the USA closer to being an authoritarian state.</p><p>The hacktivist group, known as SiegedSec, has been running a campaign it calls "OpTransRights," targeting (mostly government) websites to disrupt efforts to enact or enforce anti-trans and anti-abortion laws.</p><p> </p><p><strong>Industry News (33:26)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/10-billion-passwords-leaked/">10 Billion Passwords Leaked on Hacking Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-thefts-double-2024-trm-labs/">Crypto Thefts Double to $1.4 Billion, TRM Labs Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-blocks-vpn-services-2024/">Russia Blocks VPN Services in Information Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/ticketmaster-extortion-conitnues/">Ticketmaster Extortion Continues, Threat Actor Claims New Ticket Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-evolve-bank-exposed/">Cyber-Attack on Evolve Bank Exposed Data of 7.6 Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-security-pros-shadow-saas-ai/">Most Security Pros Admit Shadow SaaS and AI Use</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-rt-ai-software/">Russian Media Uses AI-Powered Software to Spread Disinformation</a></p><p><a href="https://www.infosecurity-magazine.com/news/smishing-triad-targets-india-fraud/">Smishing Triad Targets India with Fraud Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/fraud-campaign-russians-fake/">Fraud Campaign Targets Russians with Fake Olympics Tickets</a></p><p> </p><p><strong>Tweet of the Week (41:18)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeXxp8m2H8PAd9H1HZO0XeR2Vj95vba-OTlXYr264xpkpgSA4VU6If30_h2VeLk5djV2jEBR2g9GKwOrqCCogltM-5J0b1lcdyY3MtTFVnINauI1WkWje0_phPIoMknmENrlD1pG6cL1JYhEAWYMtj70Qg?key=CWaUPrZ9TzMUSesE6rX6Eg" /><p><a href="https://x.com/dennishegstad/status/1810044171765645568">https://x.com/dennishegstad/status/1810044171765645568</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 15 Jul 2024 17:41:20 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-198-CsE7ZA7t</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (10:28)</strong></p><p>10th July 1999 - Cult of the Dead Cow (cDc) member DilDog debuted the program Back Orifice 2000 (BO2k) at DEF CON 7. It was the successor to Back Orifice, released by cDc a year prior. DilDog proclaimed it "a remote administration tool for corporate America".</p><p><a href="https://twitter.com/todayininfosec/status/1811133606015983680">https://twitter.com/todayininfosec/status/1811133606015983680</a></p><p>9th July 1981 - The game that launched two of the most famous characters in video game history is released for sale. Donkey Kong was created by Nintendo, a Japanese playing card and toy company turned fledgling video game developer, who was trying to create a hit game for the North American market. Unable at the time to acquire a license to create a video game based on the Popeye character, Nintendo decides to create a game mirroring the characteristics and rivalry of Popeye and Bluto. Donkey Kong is named after the game’s villain, a pet gorilla gone rogue. The game’s hero is originally called Jumpman, but is retroactively renamed Mario once the game becomes popular and Nintendo decides to use the character in future games.</p><p>Due to the similarity between Donkey Kong and King Kong, Universal Studios sued Nintendo claiming Donkey Kong violated their trademark. Kong, however, is common Japanese slang for gorilla. The lawsuit was ruled in favor of Nintendo. The success of Donkey Kong helped Nintendo become one of the dominant companies in the video game market.</p><p> </p><p><strong>Rant of the Week (15:55)</strong></p><p><a href="https://www.bbc.co.uk/news/articles/cger582weplo">Palestinians say Microsoft unfairly closing their accounts</a></p><p>Palestinians living abroad have accused Microsoft of closing their email accounts without warning - cutting them off from crucial online services.</p><p>They say it has left them unable to access bank accounts and job offers - and stopped them using Skype, which Microsoft owns, to contact relatives in war-torn Gaza.</p><p>Microsoft says they violated its terms of service - a claim they dispute.</p><p> </p><p><strong>Billy Big Balls of the Week (27:39)</strong></p><p><a href="https://www.404media.co/scalpers-are-working-with-hackers-to-liberate-non-transferable-tickets-from-ticketmasters-ecosystem/">Scalpers Work With Hackers to Liberate Ticketmaster's ‘Non-Transferable’ Tickets</a></p><p>A lawsuit filed in California by concert giant AXS has revealed a legal and technological battle between ticket scalpers and platforms like Ticketmaster and AXS, in which scalpers have figured out how to extract “untransferable” tickets from their accounts by generating entry barcodes on parallel infrastructure that the scalpers control and which can then be sold and transferred to customers.</p><p>By reverse-engineering how Ticketmaster and AXS actually make their electronic tickets, scalpers have essentially figured out how to regenerate specific, genuine tickets that they have legally purchased from scratch onto infrastructure that they control. In doing so, they are removing the anti-scalping restrictions put on the tickets by Ticketmaster and AXS. </p><p><a href="https://www.computing.co.uk/news/4334320/gay-furry-hackers-breach-conservative-us-tank-project-2025">'Gay furry hackers' breach conservative US think tank behind Project 2025</a></p><p>A collective of self-described "gay furry hackers" have released 2GB of data lifted from the Heritage Foundation, the conservative think-tank behind Project 2025 - a set of proposals that would bring the USA closer to being an authoritarian state.</p><p>The hacktivist group, known as SiegedSec, has been running a campaign it calls "OpTransRights," targeting (mostly government) websites to disrupt efforts to enact or enforce anti-trans and anti-abortion laws.</p><p> </p><p><strong>Industry News (33:26)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/10-billion-passwords-leaked/">10 Billion Passwords Leaked on Hacking Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-thefts-double-2024-trm-labs/">Crypto Thefts Double to $1.4 Billion, TRM Labs Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-blocks-vpn-services-2024/">Russia Blocks VPN Services in Information Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/ticketmaster-extortion-conitnues/">Ticketmaster Extortion Continues, Threat Actor Claims New Ticket Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-evolve-bank-exposed/">Cyber-Attack on Evolve Bank Exposed Data of 7.6 Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-security-pros-shadow-saas-ai/">Most Security Pros Admit Shadow SaaS and AI Use</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-rt-ai-software/">Russian Media Uses AI-Powered Software to Spread Disinformation</a></p><p><a href="https://www.infosecurity-magazine.com/news/smishing-triad-targets-india-fraud/">Smishing Triad Targets India with Fraud Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/fraud-campaign-russians-fake/">Fraud Campaign Targets Russians with Fake Olympics Tickets</a></p><p> </p><p><strong>Tweet of the Week (41:18)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeXxp8m2H8PAd9H1HZO0XeR2Vj95vba-OTlXYr264xpkpgSA4VU6If30_h2VeLk5djV2jEBR2g9GKwOrqCCogltM-5J0b1lcdyY3MtTFVnINauI1WkWje0_phPIoMknmENrlD1pG6cL1JYhEAWYMtj70Qg?key=CWaUPrZ9TzMUSesE6rX6Eg" /><p><a href="https://x.com/dennishegstad/status/1810044171765645568">https://x.com/dennishegstad/status/1810044171765645568</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42064155" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d17de94b-7095-41a8-97d1-7d1a856b0a94/audio/03915007-9d39-4d97-92bd-c9f7a4d1df56/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 198</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/d6e8fb06-f824-4539-bed2-6eb6e849f877/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:48</itunes:duration>
      <itunes:summary>This week in InfoSec Talks about the gorilla in the room

Rant of the Week is asking whose side is Microsoft on?

Billy Big Balls is about furry scalpers 

Industry News brings us the latest and greatest news stories from around the globe

And

Tweet of the Week  is irony epitomised</itunes:summary>
      <itunes:subtitle>This week in InfoSec Talks about the gorilla in the room

Rant of the Week is asking whose side is Microsoft on?

Billy Big Balls is about furry scalpers 

Industry News brings us the latest and greatest news stories from around the globe

And

Tweet of the Week  is irony epitomised</itunes:subtitle>
      <itunes:keywords>evolvce bank, email, donkey kong, sharing, gay furry hackers, ticketmaster, gaza, palestine, microsoft, nintendo, shadow saas, scalpers</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>198</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a4aaec7e-fd29-456d-9b54-2e5cfcb918b2</guid>
      <title>Episode 197 - The Andy Is Distracted Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (07:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3 July 1996 - a mere 28 years ago the movie Independence Day was released.  In it, Jeff Goldblum and Will Smith fly into an alien vessel in a 50-year-old space junker, then upload a computer virus in less than 5 minutes</p><p><a href="https://twitter.com/todayininfosec/status/1808464060972667170">https://twitter.com/todayininfosec/status/1808464060972667170</a></p><p> </p><p><strong>Rant of the Week (11:07)</strong></p><p>Cancer patient forced to make terrible decision after Qilin attack on London hospitals</p><p><a href="https://www.theregister.com/2024/07/05/qilin_impacts_patient/">https://www.theregister.com/2024/07/05/qilin_impacts_patient/</a></p><p>EXCLUSIVE The latest figures suggest that around 1,500 medical procedures have been canceled across some of London's biggest hospitals in the four weeks since Qilin's ransomware attack hit pathology services provider Synnovis. But perhaps no single person was affected as severely as Johanna Groothuizen.</p><p>Hanna – the name she goes by – is now missing her right breast after her skin-sparing mastectomy and immediate breast reconstruction surgery was swapped out for a simple mastectomy at the last minute.</p><p> </p><p><strong>Billy Big Balls of the Week (18:20)</strong></p><p>Ransomware scum who hit Indonesian government apologizes, hands over encryption key</p><p><a href="https://www.theregister.com/2024/07/04/hackers_of_indonesian_government_apologize/">https://www.theregister.com/2024/07/04/hackers_of_indonesian_government_apologize/</a></p><p> </p><p><strong>Industry News (24:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/vinted-fined-2-million-euros-gdpr/">Vinted Fined €2.3m Over Data Protection Failure</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-home-routing/">Europol Warns of Home Routing Challenges For Lawful Interception</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-suspension-ai-data-training/">Meta Faces Suspension of AI Data Training in Brazil</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-phones-execs/">New Ransomware Group Phones Execs to Extort Payment</a></p><p><a href="https://www.infosecurity-magazine.com/news/uks-nca-leads-major-cobalt-strike/">UK’s NCA Leads Major Cobalt Strike Takedown</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-extortion-soars-smb-hit/">Cyber Extortion Soars: SMBs Hit Four Times Harder</a></p><p><a href="https://www.infosecurity-magazine.com/news/report-exposes-psychological-toll/">New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action</a></p><p><a href="https://www.infosecurity-magazine.com/news/dozens-arrests-disrupt-25m-vishing/">Dozens of Arrests Disrupt €2.5m Vishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/health-tech-execs-1bn-fraud/">Health Tech Execs Get Jail Time For $1bn Fraud Scheme</a></p><p> </p><p><strong>Tweet of the Week (31:07)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfbzEEGo7mHqGSpCryhteRuRhZ9UmZghYA6FWjcDvGby42kDyx7U0sFseVmC8W7mqlmybvOXkgu31mT0WdFjzd7-6lJWL4mY3QL706YCEAcaXGTc_aiRaQbc3GIhgzftZd3JSZ9inLD104Jxy-6JmsSNxDE?key=yHITW9noIQsO5EZeywMIGQ" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 8 Jul 2024 18:07:00 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-197-GkUdfvpd</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (07:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3 July 1996 - a mere 28 years ago the movie Independence Day was released.  In it, Jeff Goldblum and Will Smith fly into an alien vessel in a 50-year-old space junker, then upload a computer virus in less than 5 minutes</p><p><a href="https://twitter.com/todayininfosec/status/1808464060972667170">https://twitter.com/todayininfosec/status/1808464060972667170</a></p><p> </p><p><strong>Rant of the Week (11:07)</strong></p><p>Cancer patient forced to make terrible decision after Qilin attack on London hospitals</p><p><a href="https://www.theregister.com/2024/07/05/qilin_impacts_patient/">https://www.theregister.com/2024/07/05/qilin_impacts_patient/</a></p><p>EXCLUSIVE The latest figures suggest that around 1,500 medical procedures have been canceled across some of London's biggest hospitals in the four weeks since Qilin's ransomware attack hit pathology services provider Synnovis. But perhaps no single person was affected as severely as Johanna Groothuizen.</p><p>Hanna – the name she goes by – is now missing her right breast after her skin-sparing mastectomy and immediate breast reconstruction surgery was swapped out for a simple mastectomy at the last minute.</p><p> </p><p><strong>Billy Big Balls of the Week (18:20)</strong></p><p>Ransomware scum who hit Indonesian government apologizes, hands over encryption key</p><p><a href="https://www.theregister.com/2024/07/04/hackers_of_indonesian_government_apologize/">https://www.theregister.com/2024/07/04/hackers_of_indonesian_government_apologize/</a></p><p> </p><p><strong>Industry News (24:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/vinted-fined-2-million-euros-gdpr/">Vinted Fined €2.3m Over Data Protection Failure</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-home-routing/">Europol Warns of Home Routing Challenges For Lawful Interception</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-suspension-ai-data-training/">Meta Faces Suspension of AI Data Training in Brazil</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-phones-execs/">New Ransomware Group Phones Execs to Extort Payment</a></p><p><a href="https://www.infosecurity-magazine.com/news/uks-nca-leads-major-cobalt-strike/">UK’s NCA Leads Major Cobalt Strike Takedown</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-extortion-soars-smb-hit/">Cyber Extortion Soars: SMBs Hit Four Times Harder</a></p><p><a href="https://www.infosecurity-magazine.com/news/report-exposes-psychological-toll/">New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action</a></p><p><a href="https://www.infosecurity-magazine.com/news/dozens-arrests-disrupt-25m-vishing/">Dozens of Arrests Disrupt €2.5m Vishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/health-tech-execs-1bn-fraud/">Health Tech Execs Get Jail Time For $1bn Fraud Scheme</a></p><p> </p><p><strong>Tweet of the Week (31:07)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfbzEEGo7mHqGSpCryhteRuRhZ9UmZghYA6FWjcDvGby42kDyx7U0sFseVmC8W7mqlmybvOXkgu31mT0WdFjzd7-6lJWL4mY3QL706YCEAcaXGTc_aiRaQbc3GIhgzftZd3JSZ9inLD104Jxy-6JmsSNxDE?key=yHITW9noIQsO5EZeywMIGQ" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="18936703" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8eb7a4db-7551-4e5c-943a-8581d96445d4/audio/03e8bd8a-7675-46ef-b97d-8d6fc15f7093/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 197 - The Andy Is Distracted Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/dae4ddb9-4f5d-47fb-b86d-7d0510a093a3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:27</itunes:duration>
      <itunes:summary>This week in InfoSec takes us to a time where Mac was compatible with everything

Rant of the Week is, unfortunately, the very real impact of criminal hacking

Billy Big Balls  is a selfless act of kindness
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week  is the reality behind VCs</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us to a time where Mac was compatible with everything

Rant of the Week is, unfortunately, the very real impact of criminal hacking

Billy Big Balls  is a selfless act of kindness
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week  is the reality behind VCs</itunes:subtitle>
      <itunes:keywords>nhs, indonesia, lawful interception, ransomware, europol, criminal execs, vishing, wilin, vinted</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>197</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce511f9f-c4da-4a84-8156-f9f81852755b</guid>
      <title>Episode 196 - The Nuclear Option Episode</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (12:30)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th June 1987: The movie Spaceballs was released. With a budget of $23 million, it grossed $38 million at the box office in North America. Though 37 years have passed, the secret code scene remains a reminder of why security is hard.</p><p>Watch the secret code scene from Spaceballs and weep. Or laugh. Or both. Has much changed when it comes to password security since the movie was released 37 years ago today?</p><p>The 64 second scene: <a href="https://www.youtube.com/watch?v=a6iW-8xPw3k">https:///youtu.be/a6iW-8xPw3k</a></p><p><a href="https://x.com/todayininfosec/status/1805302016451002501">https://x.com/todayininfosec/status/1805302016451002501</a>  </p><p> </p><p>27th June 2011: Anonymous released its first cache from Operation AntiSec, information from a US anti-cyberterrorism program.</p><p><a href="https://x.com/todayininfosec/status/1806302186487345226">https://x.com/todayininfosec/status/1806302186487345226</a></p><p> </p><p><strong>Rant of the Week (18:15)</strong></p><p><a href="https://www.theregister.com/2024/06/27/kt_p2p_malware_claim/">Korean telco allegedly infected its P2P users with malware</a><br />A South Korean media outlet has alleged that local telco KT deliberately infected some customers with malware due to their excessive use of peer-to-peer (P2P) downloading tools.</p><p>The number of infected users of “web hard drives” – the South Korean term for the online storage services that allow uploading and sharing of content – has <a href="https://mnews.jtbc.co.kr/News/Article.aspx?news_id=NB12201880">reportedly</a> reached 600,000.</p><p> </p><p><strong>Billy Big Balls of the Week (26:33)</strong></p><p><a href="https://www.theregister.com/2024/06/25/predators_steal_additional_10m/">Crypto scammers circle back, pose as lawyers, steal an extra $10M in truly devious plan</a><br />The FBI says in just 12 months, scumbags stole circa $10 million from victims of crypto scams after posing as helpful lawyers offering to recover their lost tokens.</p><p>Between February 2023-2024, scammers were kicking US victims while they were already down, preying on their financial vulnerability to defraud them for a second time in what must be seen as a new low, even for that particular breed of dirtball.</p><p>It's the latest update from the FBI's Internet Crime Complaint Center (IC3) on the ongoing issue which was first publicized in August last year. </p><p> </p><p><strong>Industry News (34:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-bans-kaspersky-kremlin-links/">US Bans Kaspersky Over Alleged Kremlin Links</a></p><p><a href="https://www.infosecurity-magazine.com/news/sellafield-pleads-guilty/">Sellafield Pleads Guilty to Historic Cybersecurity Offenses</a></p><p><a href="https://www.infosecurity-magazine.com/news/polish-prosecutors-probe-pegasus/">Polish Prosecutors Step Up Probe into Pegasus Spyware Operation</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-stuffing-72000-levis/">Credential Stuffing Attack Hits 72,000 Levi’s Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-naptime-vulnerability/">Google's Naptime Framework to Boost Vulnerability Research with AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-law-firms-scam-victims-crypto/">Fake Law Firms Con Victims of Crypto Scams, Warns FBI</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-fiftyfifty-using-genai/">IT Leaders Split on Using GenAI For Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/open-source-projects-memory-unsafe/">Majority of Critical Open Source Projects Contain Memory Unsafe Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-prioritize-savings-long-term/">CISOs Reveal Firms Prioritize Savings Over Long-Term Security</a></p><p> </p><p><strong>Tweet of the Week (43:08)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcRL-D5S7EnY9uUuzcptwIewXzkhSUcg0fQn4ux8gT9AFgYk44rexB16bRIAOo3oYCAWwSrUMHDVx8KnF1kraXdLNm-6rclgR9euYfUfukeD2x8TGWW_KXpyGoxeOBuApO7RMcJtTrJWaa0UyOs8nDnXchV?key=p6RsvAhFToDA9bKMpt-EGg" /><p> </p><p><a href="https://twitter.com/StuAlanBecker/status/1806137799248359443">https://twitter.com/StuAlanBecker/status/1806137799248359443</a></p><p>Comments: <a href="https://twitter.com/derJamesJackson/status/1806307954586538205">https://twitter.com/derJamesJackson/status/1806307954586538205</a>  </p><p> </p><p>Alternate TotW: </p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfOdDyRA_RZoz4qcHJgusaBfy5GMvRhDGOgciG8IhHO4pEuTisdMeThY9XOfrJNFRi7d4sTq_Y0rwn0wCD1TgZ3n8EfJ4g2hZNaN5-4S7sHSlnBSmhYe2CL3DxS1Y0lGo8mb_C0djp8EovLZGJJU09EGbM?key=p6RsvAhFToDA9bKMpt-EGg" /><p><a href="https://twitter.com/susisnyder/status/1806222280382406836">https://twitter.com/susisnyder/status/1806222280382406836</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 1 Jul 2024 23:15:04 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-196-bujo6Ait</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (12:30)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th June 1987: The movie Spaceballs was released. With a budget of $23 million, it grossed $38 million at the box office in North America. Though 37 years have passed, the secret code scene remains a reminder of why security is hard.</p><p>Watch the secret code scene from Spaceballs and weep. Or laugh. Or both. Has much changed when it comes to password security since the movie was released 37 years ago today?</p><p>The 64 second scene: <a href="https://www.youtube.com/watch?v=a6iW-8xPw3k">https:///youtu.be/a6iW-8xPw3k</a></p><p><a href="https://x.com/todayininfosec/status/1805302016451002501">https://x.com/todayininfosec/status/1805302016451002501</a>  </p><p> </p><p>27th June 2011: Anonymous released its first cache from Operation AntiSec, information from a US anti-cyberterrorism program.</p><p><a href="https://x.com/todayininfosec/status/1806302186487345226">https://x.com/todayininfosec/status/1806302186487345226</a></p><p> </p><p><strong>Rant of the Week (18:15)</strong></p><p><a href="https://www.theregister.com/2024/06/27/kt_p2p_malware_claim/">Korean telco allegedly infected its P2P users with malware</a><br />A South Korean media outlet has alleged that local telco KT deliberately infected some customers with malware due to their excessive use of peer-to-peer (P2P) downloading tools.</p><p>The number of infected users of “web hard drives” – the South Korean term for the online storage services that allow uploading and sharing of content – has <a href="https://mnews.jtbc.co.kr/News/Article.aspx?news_id=NB12201880">reportedly</a> reached 600,000.</p><p> </p><p><strong>Billy Big Balls of the Week (26:33)</strong></p><p><a href="https://www.theregister.com/2024/06/25/predators_steal_additional_10m/">Crypto scammers circle back, pose as lawyers, steal an extra $10M in truly devious plan</a><br />The FBI says in just 12 months, scumbags stole circa $10 million from victims of crypto scams after posing as helpful lawyers offering to recover their lost tokens.</p><p>Between February 2023-2024, scammers were kicking US victims while they were already down, preying on their financial vulnerability to defraud them for a second time in what must be seen as a new low, even for that particular breed of dirtball.</p><p>It's the latest update from the FBI's Internet Crime Complaint Center (IC3) on the ongoing issue which was first publicized in August last year. </p><p> </p><p><strong>Industry News (34:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-bans-kaspersky-kremlin-links/">US Bans Kaspersky Over Alleged Kremlin Links</a></p><p><a href="https://www.infosecurity-magazine.com/news/sellafield-pleads-guilty/">Sellafield Pleads Guilty to Historic Cybersecurity Offenses</a></p><p><a href="https://www.infosecurity-magazine.com/news/polish-prosecutors-probe-pegasus/">Polish Prosecutors Step Up Probe into Pegasus Spyware Operation</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-stuffing-72000-levis/">Credential Stuffing Attack Hits 72,000 Levi’s Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-naptime-vulnerability/">Google's Naptime Framework to Boost Vulnerability Research with AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-law-firms-scam-victims-crypto/">Fake Law Firms Con Victims of Crypto Scams, Warns FBI</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-fiftyfifty-using-genai/">IT Leaders Split on Using GenAI For Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/open-source-projects-memory-unsafe/">Majority of Critical Open Source Projects Contain Memory Unsafe Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-prioritize-savings-long-term/">CISOs Reveal Firms Prioritize Savings Over Long-Term Security</a></p><p> </p><p><strong>Tweet of the Week (43:08)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcRL-D5S7EnY9uUuzcptwIewXzkhSUcg0fQn4ux8gT9AFgYk44rexB16bRIAOo3oYCAWwSrUMHDVx8KnF1kraXdLNm-6rclgR9euYfUfukeD2x8TGWW_KXpyGoxeOBuApO7RMcJtTrJWaa0UyOs8nDnXchV?key=p6RsvAhFToDA9bKMpt-EGg" /><p> </p><p><a href="https://twitter.com/StuAlanBecker/status/1806137799248359443">https://twitter.com/StuAlanBecker/status/1806137799248359443</a></p><p>Comments: <a href="https://twitter.com/derJamesJackson/status/1806307954586538205">https://twitter.com/derJamesJackson/status/1806307954586538205</a>  </p><p> </p><p>Alternate TotW: </p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfOdDyRA_RZoz4qcHJgusaBfy5GMvRhDGOgciG8IhHO4pEuTisdMeThY9XOfrJNFRi7d4sTq_Y0rwn0wCD1TgZ3n8EfJ4g2hZNaN5-4S7sHSlnBSmhYe2CL3DxS1Y0lGo8mb_C0djp8EovLZGJJU09EGbM?key=p6RsvAhFToDA9bKMpt-EGg" /><p><a href="https://twitter.com/susisnyder/status/1806222280382406836">https://twitter.com/susisnyder/status/1806222280382406836</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46792945" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/b44fc6e1-4c74-4b52-baca-e77fbd83a4ea/audio/f7a55f8f-bc9d-4c89-b462-fc126ba23b3b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 196 - The Nuclear Option Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/ca16d338-e3d5-4a34-9285-54eb16620cad/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:44</itunes:duration>
      <itunes:summary>This week in InfoSec Reminisces about what we considered a silly password 37 years ago

Rant of the Week is a tough move from an ISP

Billy Big Balls is a perfectly executed double-dip
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week briefly looks at why coups just ain’t what they used to be</itunes:summary>
      <itunes:subtitle>This week in InfoSec Reminisces about what we considered a silly password 37 years ago

Rant of the Week is a tough move from an ISP

Billy Big Balls is a perfectly executed double-dip
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week briefly looks at why coups just ain’t what they used to be</itunes:subtitle>
      <itunes:keywords>thom langford vetting service, good woman, graham cluley</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>196</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">97824ea6-132f-4725-b5d1-2a56fc6cee89</guid>
      <title>Episode 195 - The Smashing Unknown Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (11:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th of June  1991, a mere 33 years ago, : Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet. </p><p>From the man himself, </p><p>First, I sent it to Allan Hoeltje, who posted it to Peacenet, an ISP that specialized in grassroots political organizations, mainly in the peace movement. Peacenet was accessible to political activists all over the world. Then, I uploaded it to Kelly Goen, who proceeded to upload it to a Usenet newsgroup that specialized in distributing source code. At my request, he marked the Usenet posting as "US only". Kelly also uploaded it to many BBS systems around the country. I don't recall if the postings to the Internet began on June 5th or 6th.</p><p>It may be surprising to some that back in 1991, I did not yet know enough about Usenet newsgroups to realize that a "US only" tag was merely an advisory tag that had little real effect on how Usenet propagated newsgroup postings. I thought it actually controlled how Usenet routed the posting. But back then, I had no clue how to post anything on a newsgroup, and didn't even have a clear idea what a newsgroup was.</p><p>After releasing PGP, I immediately diverted my attention back to consulting work, to try to get caught up on my mortgage payments. I thought I could just release PGP 1.0 for MSDOS, and leave it alone for awhile, and let people play with it. I thought I could get back to it later, at my leisure. Little did I realize what a feeding frenzy PGP would set off. Apparently, there was a lot of pent-up demand for a tool like this. Volunteers from around the world were clamoring to help me port it to other platforms, add enhancements, and generally promote it. I did have to go back to work on paying gigs, but PGP continued to demand my time, pulled along by public enthusiasm.</p><p>I assembled a team of volunteer engineers from around the world. They ported PGP to almost every platform (except for the Mac, which turned out to be harder). They translated PGP into foreign languages. And I started designing the PGP trust model, which I did not have time to finish in the first release. Fifteen months later, in September 1992, we released PGP 2.0, for MSDOS, several flavors of Unix, Commodore Amiga, Atari, and maybe a few other platforms, and in about ten foreign languages. PGP 2.0 had the now-famous PGP trust model, essentially in its present form.</p><p>It was shortly after PGP 2.0's release that US Customs took an interest in the case. Little did they realize that they would help propel PGP's popularity, helping to ignite a controversy that would eventually lead to the demise of the US export restrictions on strong cryptography.</p><p>7 June 2009. A mere 15 years ago.  Sophos launched its (utterly shit) IT vigilante marketing campaign</p><p>Dress up a British man (who appears to have had a nervous breakdown over a corporate data breach incident) in an orange gimp suit – that will sell security software for sure!</p><p>At least, that was the plan made by Sophos’s marketing department for its “IT Vigilante” campaign.</p><p><a href="https://www.youtube.com/watch?v=-gc6sDqofcI">https://www.youtube.com/watch?v=-gc6sDqofcI</a></p><p><a href="https://grahamcluley.com/top-five-worst-videos-anti-virus/">https://grahamcluley.com/top-five-worst-videos-anti-virus/</a></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfB_NJxauD7AFbm2MyQCxlOn5QResnThc-iTrkTE0NqurQohs8fAC7CBd1OpXQL9xWCQEcT2OVEmlcyFpPwPxqhUEwzEDmeM3PemvVdb6Wv01k5WeuDR3K9vPnzZAoBOkYBsCj2eUkOPOrSEsQ-yrEh9VSU?key=755JU92MZwlCNabCYRfWhQ" /><p>Other awful videos:</p><p>Happy birthday Eugene Kaspersky: <a href="https://www.youtube.com/watch?v=ujnq188E5-w">https://www.youtube.com/watch?v=ujnq188E5-w</a></p><p>Eugene’s “silent movie”: <a href="https://www.youtube.com/watch?v=Ib8UjCQl5sE&t=6s">https://www.youtube.com/watch?v=Ib8UjCQl5sE&t=6s</a></p><p> </p><p><strong>Rant of the Week (22:45)</strong></p><p><a href="https://www.bbc.co.uk/news/articles/cxee7317kgmo">https://www.bbc.co.uk/news/articles/cxee7317kgmo</a></p><p>Russian hackers are behind the cyber attack on a number of major London hospitals, according to the former chief executive of the National Cyber Security Centre.</p><p>Ransomware attacks on the <a href="https://cybernews.com/security/black-basta-alert-follows-ascension-hospitals-breach/">healthcare industry</a> as a whole have increased significantly over the past year. Whaley attributes the uptick to “lives on the line.”</p><p>“While no sector is invulnerable to these attacks… healthcare providers have proven time and time again that they’re the most willing to pay a ransom following these incidents," Whaley said.</p><p>“Bad actors know this and smell blood in water,” he added. </p><p>Whaley pointed out that the rise in state-sponsored cyberattacks combined “with the further digitization of the NHS paints a pretty grim picture for the defensive capabilities of the British healthcare sector… and possibly a warning sign of much larger attacks to come.”</p><p> </p><p><strong>Graham's Giant Gonads of the Week (30:51)</strong></p><p>Apple refused to pay bug bounty to Russian cybersecurity firm Kaspersky Lab</p><p><a href="https://therecord.media/kaspersky-apple-bug-bounty-declined">https://therecord.media/kaspersky-apple-bug-bounty-declined</a></p><p><a href="https://securelist.com/trng-2023/">https://securelist.com/trng-2023/</a></p><p>Apple has snubbed Russian cybersecurity firm Kaspersky Lab, refusing to shell out a bug bounty for four zero-day vulnerabilities discovered in iPhone software.  </p><p>Targets were infected using zero-click exploits via the iMessage platform, and the malware ran with root privileges, gaining complete control over the device and user data. </p><p>The twist?</p><p>The vulnerabilities were used to spy on Kaspersky employees.</p><p>Kaspersky politely enquired whether it could be rewarded for finding the vulnerabilities used in the espionage campaign - known as Operation Triangulation.</p><p>Kaspersky claims it was a "highly sophisticated" attack, so intricate it needed 13 bullet points to explain.</p><p>Russia, not one to be outdone in the drama department, accused the U.S. and Apple of colluding to spy on Russian diplomats. Apple, of course, vehemently denied these allegations.</p><p>It's like Eastenders.</p><p>Amidst all this chaos, the U.S. and Russia are engaged in a geopolitical staring contest, with Apple caught in the crossfire. Apple, being an American company, has taken a stand against Russia's actions in Ukraine, suspending sales and removing apps. It's a bit like a tech giant trying to play peacemaker in a playground brawl.</p><p>Kaspersky, meanwhile, has its own history with the U.S. government, having been banned from government use due to security concerns. It's a classic case of "guilty by association."</p><p>So, will Kaspersky continue to report bugs to Apple despite the lack of reward? Only time will tell.</p><p><i>Speaking to Russian-language media agency RTVI, Kaspersky’s research head Dmitry Galov</i><a href="https://rtvi.com/stories/apple-otkazalas-vyplatit-laboratorii-kasperskogo-1-mln-za-najdennuyu-dyru-v-iphone/"><i> said</i></a><i> that typically cybersecurity companies like Kaspersky nominated a charity to receive the funds from the Apple Bug Bounty program instead of collecting the revenue itself. </i></p><p><i>He added that although Kaspersky was confident the attacker was state-sponsored, he and his research team did not have the technical data needed to identify which state may have been behind the attack.</i></p><p><i>A spokesperson for Kaspersky did not respond to whether it had nominated a charity when initially contacting Apple, nor whether the company’s refusal to issue a bounty would affect its decision to disclose vulnerabilities discovered in the future.</i></p><p> </p><p><strong>Industry News (40:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/london-hospitals-cancel-operations/">London Hospitals Cancel Operations Following Ransomware Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/emailgpt-exposed-prompt-injection/">EmailGPT Exposed to Prompt Injection Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec2024-passwordless-future/">#Infosec2024: CISOs Need to Move Beyond Passwords to Keep Up With Security Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-transformed-new-groups/">#Infosec2024: Ransomware Ecosystem Transformed, New Groups “Changing the Rules”</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-found-woocommerce/">Security Flaws Found in Popular WooCommerce Plugin</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec2024-collaboration-security/">#Infosec2024: Collaboration is Key to an Effective Security Culture</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-ai-red-teaming-mindgard/">#Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-warns-rise-wfh-scams/">FBI Warns of Rise in Work-From-Home Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/ato-outpace-ransomware-top/">Account Takeovers Outpace Ransomware as Top Security Concern</a></p><p> </p><p><strong>Tweet of the Week (44:27)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeajFHGl_yfd8R6f1YdOrjEIFLJOF5Rt2pIffIH-o0ZKfAWZZei7Sy6OdzeNYC2Q-JvZpERJ6Ndw1590E7Q1p83ab7ZjTP3NPinME4IUS0-rq__i-aRMAJt1QUvX7s2iE9Hz8Ds2b5gTvAcexmD6gt8uVrm?key=755JU92MZwlCNabCYRfWhQ" /><p><a href="https://x.com/dakacki/status/1798882732203803070">https://x.com/dakacki/status/1798882732203803070</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 10 Jun 2024 18:57:10 +0000</pubDate>
      <author>thom@tl2security.com (Graham Cluley, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-195-xlPxhGqT</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (11:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th of June  1991, a mere 33 years ago, : Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet. </p><p>From the man himself, </p><p>First, I sent it to Allan Hoeltje, who posted it to Peacenet, an ISP that specialized in grassroots political organizations, mainly in the peace movement. Peacenet was accessible to political activists all over the world. Then, I uploaded it to Kelly Goen, who proceeded to upload it to a Usenet newsgroup that specialized in distributing source code. At my request, he marked the Usenet posting as "US only". Kelly also uploaded it to many BBS systems around the country. I don't recall if the postings to the Internet began on June 5th or 6th.</p><p>It may be surprising to some that back in 1991, I did not yet know enough about Usenet newsgroups to realize that a "US only" tag was merely an advisory tag that had little real effect on how Usenet propagated newsgroup postings. I thought it actually controlled how Usenet routed the posting. But back then, I had no clue how to post anything on a newsgroup, and didn't even have a clear idea what a newsgroup was.</p><p>After releasing PGP, I immediately diverted my attention back to consulting work, to try to get caught up on my mortgage payments. I thought I could just release PGP 1.0 for MSDOS, and leave it alone for awhile, and let people play with it. I thought I could get back to it later, at my leisure. Little did I realize what a feeding frenzy PGP would set off. Apparently, there was a lot of pent-up demand for a tool like this. Volunteers from around the world were clamoring to help me port it to other platforms, add enhancements, and generally promote it. I did have to go back to work on paying gigs, but PGP continued to demand my time, pulled along by public enthusiasm.</p><p>I assembled a team of volunteer engineers from around the world. They ported PGP to almost every platform (except for the Mac, which turned out to be harder). They translated PGP into foreign languages. And I started designing the PGP trust model, which I did not have time to finish in the first release. Fifteen months later, in September 1992, we released PGP 2.0, for MSDOS, several flavors of Unix, Commodore Amiga, Atari, and maybe a few other platforms, and in about ten foreign languages. PGP 2.0 had the now-famous PGP trust model, essentially in its present form.</p><p>It was shortly after PGP 2.0's release that US Customs took an interest in the case. Little did they realize that they would help propel PGP's popularity, helping to ignite a controversy that would eventually lead to the demise of the US export restrictions on strong cryptography.</p><p>7 June 2009. A mere 15 years ago.  Sophos launched its (utterly shit) IT vigilante marketing campaign</p><p>Dress up a British man (who appears to have had a nervous breakdown over a corporate data breach incident) in an orange gimp suit – that will sell security software for sure!</p><p>At least, that was the plan made by Sophos’s marketing department for its “IT Vigilante” campaign.</p><p><a href="https://www.youtube.com/watch?v=-gc6sDqofcI">https://www.youtube.com/watch?v=-gc6sDqofcI</a></p><p><a href="https://grahamcluley.com/top-five-worst-videos-anti-virus/">https://grahamcluley.com/top-five-worst-videos-anti-virus/</a></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfB_NJxauD7AFbm2MyQCxlOn5QResnThc-iTrkTE0NqurQohs8fAC7CBd1OpXQL9xWCQEcT2OVEmlcyFpPwPxqhUEwzEDmeM3PemvVdb6Wv01k5WeuDR3K9vPnzZAoBOkYBsCj2eUkOPOrSEsQ-yrEh9VSU?key=755JU92MZwlCNabCYRfWhQ" /><p>Other awful videos:</p><p>Happy birthday Eugene Kaspersky: <a href="https://www.youtube.com/watch?v=ujnq188E5-w">https://www.youtube.com/watch?v=ujnq188E5-w</a></p><p>Eugene’s “silent movie”: <a href="https://www.youtube.com/watch?v=Ib8UjCQl5sE&t=6s">https://www.youtube.com/watch?v=Ib8UjCQl5sE&t=6s</a></p><p> </p><p><strong>Rant of the Week (22:45)</strong></p><p><a href="https://www.bbc.co.uk/news/articles/cxee7317kgmo">https://www.bbc.co.uk/news/articles/cxee7317kgmo</a></p><p>Russian hackers are behind the cyber attack on a number of major London hospitals, according to the former chief executive of the National Cyber Security Centre.</p><p>Ransomware attacks on the <a href="https://cybernews.com/security/black-basta-alert-follows-ascension-hospitals-breach/">healthcare industry</a> as a whole have increased significantly over the past year. Whaley attributes the uptick to “lives on the line.”</p><p>“While no sector is invulnerable to these attacks… healthcare providers have proven time and time again that they’re the most willing to pay a ransom following these incidents," Whaley said.</p><p>“Bad actors know this and smell blood in water,” he added. </p><p>Whaley pointed out that the rise in state-sponsored cyberattacks combined “with the further digitization of the NHS paints a pretty grim picture for the defensive capabilities of the British healthcare sector… and possibly a warning sign of much larger attacks to come.”</p><p> </p><p><strong>Graham's Giant Gonads of the Week (30:51)</strong></p><p>Apple refused to pay bug bounty to Russian cybersecurity firm Kaspersky Lab</p><p><a href="https://therecord.media/kaspersky-apple-bug-bounty-declined">https://therecord.media/kaspersky-apple-bug-bounty-declined</a></p><p><a href="https://securelist.com/trng-2023/">https://securelist.com/trng-2023/</a></p><p>Apple has snubbed Russian cybersecurity firm Kaspersky Lab, refusing to shell out a bug bounty for four zero-day vulnerabilities discovered in iPhone software.  </p><p>Targets were infected using zero-click exploits via the iMessage platform, and the malware ran with root privileges, gaining complete control over the device and user data. </p><p>The twist?</p><p>The vulnerabilities were used to spy on Kaspersky employees.</p><p>Kaspersky politely enquired whether it could be rewarded for finding the vulnerabilities used in the espionage campaign - known as Operation Triangulation.</p><p>Kaspersky claims it was a "highly sophisticated" attack, so intricate it needed 13 bullet points to explain.</p><p>Russia, not one to be outdone in the drama department, accused the U.S. and Apple of colluding to spy on Russian diplomats. Apple, of course, vehemently denied these allegations.</p><p>It's like Eastenders.</p><p>Amidst all this chaos, the U.S. and Russia are engaged in a geopolitical staring contest, with Apple caught in the crossfire. Apple, being an American company, has taken a stand against Russia's actions in Ukraine, suspending sales and removing apps. It's a bit like a tech giant trying to play peacemaker in a playground brawl.</p><p>Kaspersky, meanwhile, has its own history with the U.S. government, having been banned from government use due to security concerns. It's a classic case of "guilty by association."</p><p>So, will Kaspersky continue to report bugs to Apple despite the lack of reward? Only time will tell.</p><p><i>Speaking to Russian-language media agency RTVI, Kaspersky’s research head Dmitry Galov</i><a href="https://rtvi.com/stories/apple-otkazalas-vyplatit-laboratorii-kasperskogo-1-mln-za-najdennuyu-dyru-v-iphone/"><i> said</i></a><i> that typically cybersecurity companies like Kaspersky nominated a charity to receive the funds from the Apple Bug Bounty program instead of collecting the revenue itself. </i></p><p><i>He added that although Kaspersky was confident the attacker was state-sponsored, he and his research team did not have the technical data needed to identify which state may have been behind the attack.</i></p><p><i>A spokesperson for Kaspersky did not respond to whether it had nominated a charity when initially contacting Apple, nor whether the company’s refusal to issue a bounty would affect its decision to disclose vulnerabilities discovered in the future.</i></p><p> </p><p><strong>Industry News (40:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/london-hospitals-cancel-operations/">London Hospitals Cancel Operations Following Ransomware Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/emailgpt-exposed-prompt-injection/">EmailGPT Exposed to Prompt Injection Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec2024-passwordless-future/">#Infosec2024: CISOs Need to Move Beyond Passwords to Keep Up With Security Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-transformed-new-groups/">#Infosec2024: Ransomware Ecosystem Transformed, New Groups “Changing the Rules”</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-found-woocommerce/">Security Flaws Found in Popular WooCommerce Plugin</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec2024-collaboration-security/">#Infosec2024: Collaboration is Key to an Effective Security Culture</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-ai-red-teaming-mindgard/">#Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-warns-rise-wfh-scams/">FBI Warns of Rise in Work-From-Home Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/ato-outpace-ransomware-top/">Account Takeovers Outpace Ransomware as Top Security Concern</a></p><p> </p><p><strong>Tweet of the Week (44:27)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeajFHGl_yfd8R6f1YdOrjEIFLJOF5Rt2pIffIH-o0ZKfAWZZei7Sy6OdzeNYC2Q-JvZpERJ6Ndw1590E7Q1p83ab7ZjTP3NPinME4IUS0-rq__i-aRMAJt1QUvX7s2iE9Hz8Ds2b5gTvAcexmD6gt8uVrm?key=755JU92MZwlCNabCYRfWhQ" /><p><a href="https://x.com/dakacki/status/1798882732203803070">https://x.com/dakacki/status/1798882732203803070</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47057095" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7eafdc0a-f6ef-4631-8e22-a9aad1651d3b/audio/c6f06048-6901-4e29-be15-0c0141bac02c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 195 - The Smashing Unknown Episode</itunes:title>
      <itunes:author>Graham Cluley, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f78e1e5e-bd39-4b00-82f0-89873a8b3d08/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:01</itunes:duration>
      <itunes:summary>This week in InfoSec - is Pretty Good

Rant of the Week 

Billy Big Balls is more like Timmy big Apples

Industry News brings you the latest and greatest stories

And

Tweet of the Week is corporate bullshit
</itunes:summary>
      <itunes:subtitle>This week in InfoSec - is Pretty Good

Rant of the Week 

Billy Big Balls is more like Timmy big Apples

Industry News brings you the latest and greatest stories

And

Tweet of the Week is corporate bullshit
</itunes:subtitle>
      <itunes:keywords>dentist, russian hackers, pgp, layoffs, nhs, bad video, kaspersky, apple, bugbounty, sophos, infosec europe</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>195</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f127556-9cb4-46bb-beff-8a333003dac3</guid>
      <title>Episode 194</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (07:29)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>28th May: 2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest.</p><p><a href="https://x.com/todayininfosec/status/1795228730735886650">https://x.com/todayininfosec/status/1795228730735886650</a></p><p>25th May 2018: The General Data Protection Regulation (GDPR) in the European Union (EU) to strengthen and unify data protection became effective - just over 2 years after it was adopted by the EU.</p><p><a href="https://twitter.com/todayininfosec/status/1794461551534936503">https://twitter.com/todayininfosec/status/1794461551534936503</a></p><p> </p><p><strong>Rant of the Week (18:34)</strong></p><p><a href="https://arstechnica.com/gadgets/2024/05/bing-outage-shows-just-how-little-competition-google-search-really-has/">Bing outage shows just how little competition Google search really has</a></p><p>Bing, Microsoft's search engine platform, went down in <a href="https://searchengineland.com/bing-search-outages-since-early-this-morning-442499">the very early morning </a>23rd May. That meant that searches from Microsoft's Edge browsers that had yet to change their default providers didn't work. It also meant that services relying on Bing's search API—Microsoft's own Copilot, ChatGPT search, Yahoo, Ecosia, and DuckDuckGo—similarly failed.</p><p>If dismay about AI's hallucinations, power draw, or <a href="https://www.404media.co/google-is-paying-reddit-60-million-for-fucksmith-to-tell-its-users-to-eat-glue/">pizza recipes</a> concern you—along with perhaps broader Google issues involving privacy, tracking, news, SEO, or monopoly power—most of your other major options were brought down by a single API outage this morning. Moving past that kind of single point of vulnerability will take some work, both by the industry and by you, the person wondering if there's a real alternative.</p><p> </p><p><strong>Billy Big Balls of the Week (26:56)</strong></p><p><a href="https://www.theregister.com/2024/05/30/it_worker_defamation_lawsuit_police/">IT worker sued over ‘vengeful’ cyber harassment of policeman who issued a jaywalking ticket</a></p><p><br />In an ongoing civil lawsuit, an IT worker is accused of launching a "destructive cyber campaign of hate and revenge" against a police officer and his family after being issued a ticket for jaywalking.</p><p> </p><p><strong>Industry News (34:44)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/check-point-urges-vpn-configuration/">Check Point Urges VPN Configuration Review Amid Attack Spike</a></p><p><a href="https://www.infosecurity-magazine.com/news/courtroom-software-vulnerable/">Courtroom Recording Software Vulnerable to Backdoor Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-north-korean-hacking-group/">New North Korean Hacking Group Identified by Microsoft</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-archive-ddos-attack/">Internet Archive Disrupted by Sustained and “Mean” DDoS Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/aff-targets-colleges-free-piano/">Advance Fee Fraud Targets Colleges With Free Piano Offers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-operation-world-largest-botnet/">US-Led Operation Takes Down World’s Largest Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/first-american-data-breach/">First American Reveals Data Breach Impacting 44,000 Individuals</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-operation-endgame-hits/">Europol-Led Operation Endgame Hits Botnet, Ransomware Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/bbc-pension-breached-employee-data/">BBC Pension Scheme Breached, Exposing Employee Data</a></p><p> </p><p><strong>Tweet of the Week (47.14)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdLmMTisCXxiQUL92nTyi3N-AhVmiaYo0E6H3IzA2aRVh4MjT4ZgpQJji00DM30uV9opFGXDMu9dMCp_Mx6fksxZSbD2lR8bZkY6fWyphzM7X6vsNLbHwxzY98bnJCnsUbNW8ZYkGYd0PFZkf6rksLVZrw?key=xiA1gn9ByedT45FFooxBNg" /><p><a href="https://twitter.com/DebugPrivilege/status/1795823939631067165">https://twitter.com/DebugPrivilege/status/1795823939631067165  </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 3 Jun 2024 21:55:04 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-194-8_f4JAmy</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (07:29)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>28th May: 2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest.</p><p><a href="https://x.com/todayininfosec/status/1795228730735886650">https://x.com/todayininfosec/status/1795228730735886650</a></p><p>25th May 2018: The General Data Protection Regulation (GDPR) in the European Union (EU) to strengthen and unify data protection became effective - just over 2 years after it was adopted by the EU.</p><p><a href="https://twitter.com/todayininfosec/status/1794461551534936503">https://twitter.com/todayininfosec/status/1794461551534936503</a></p><p> </p><p><strong>Rant of the Week (18:34)</strong></p><p><a href="https://arstechnica.com/gadgets/2024/05/bing-outage-shows-just-how-little-competition-google-search-really-has/">Bing outage shows just how little competition Google search really has</a></p><p>Bing, Microsoft's search engine platform, went down in <a href="https://searchengineland.com/bing-search-outages-since-early-this-morning-442499">the very early morning </a>23rd May. That meant that searches from Microsoft's Edge browsers that had yet to change their default providers didn't work. It also meant that services relying on Bing's search API—Microsoft's own Copilot, ChatGPT search, Yahoo, Ecosia, and DuckDuckGo—similarly failed.</p><p>If dismay about AI's hallucinations, power draw, or <a href="https://www.404media.co/google-is-paying-reddit-60-million-for-fucksmith-to-tell-its-users-to-eat-glue/">pizza recipes</a> concern you—along with perhaps broader Google issues involving privacy, tracking, news, SEO, or monopoly power—most of your other major options were brought down by a single API outage this morning. Moving past that kind of single point of vulnerability will take some work, both by the industry and by you, the person wondering if there's a real alternative.</p><p> </p><p><strong>Billy Big Balls of the Week (26:56)</strong></p><p><a href="https://www.theregister.com/2024/05/30/it_worker_defamation_lawsuit_police/">IT worker sued over ‘vengeful’ cyber harassment of policeman who issued a jaywalking ticket</a></p><p><br />In an ongoing civil lawsuit, an IT worker is accused of launching a "destructive cyber campaign of hate and revenge" against a police officer and his family after being issued a ticket for jaywalking.</p><p> </p><p><strong>Industry News (34:44)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/check-point-urges-vpn-configuration/">Check Point Urges VPN Configuration Review Amid Attack Spike</a></p><p><a href="https://www.infosecurity-magazine.com/news/courtroom-software-vulnerable/">Courtroom Recording Software Vulnerable to Backdoor Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-north-korean-hacking-group/">New North Korean Hacking Group Identified by Microsoft</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-archive-ddos-attack/">Internet Archive Disrupted by Sustained and “Mean” DDoS Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/aff-targets-colleges-free-piano/">Advance Fee Fraud Targets Colleges With Free Piano Offers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-operation-world-largest-botnet/">US-Led Operation Takes Down World’s Largest Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/first-american-data-breach/">First American Reveals Data Breach Impacting 44,000 Individuals</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-operation-endgame-hits/">Europol-Led Operation Endgame Hits Botnet, Ransomware Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/bbc-pension-breached-employee-data/">BBC Pension Scheme Breached, Exposing Employee Data</a></p><p> </p><p><strong>Tweet of the Week (47.14)</strong></p><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdLmMTisCXxiQUL92nTyi3N-AhVmiaYo0E6H3IzA2aRVh4MjT4ZgpQJji00DM30uV9opFGXDMu9dMCp_Mx6fksxZSbD2lR8bZkY6fWyphzM7X6vsNLbHwxzY98bnJCnsUbNW8ZYkGYd0PFZkf6rksLVZrw?key=xiA1gn9ByedT45FFooxBNg" /><p><a href="https://twitter.com/DebugPrivilege/status/1795823939631067165">https://twitter.com/DebugPrivilege/status/1795823939631067165  </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48840527" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/51b80ace-a59d-4a35-a90e-26fd9caad5e9/audio/8026b701-d657-4bdf-a281-f38dc065b6b1/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 194</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/71dffc4a-8bf8-4971-9195-70a9b529cedc/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:52</itunes:duration>
      <itunes:summary>This week in InfoSec Takes a look back at one of the greatest regulations in the world

Rant of the Week is a reminder that we’re all (mostly) Google’s bitch

Billy Big Balls is a lesson on why you don’t upset the crazy cybersec guy
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is an example of time-saving</itunes:summary>
      <itunes:subtitle>This week in InfoSec Takes a look back at one of the greatest regulations in the world

Rant of the Week is a reminder that we’re all (mostly) Google’s bitch

Billy Big Balls is a lesson on why you don’t upset the crazy cybersec guy
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is an example of time-saving</itunes:subtitle>
      <itunes:keywords>bing, fnar fnar, cyberstalking, backdoor attack, google, malware, gdpr, bbc, sabu</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>194</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">caa29922-d303-41a5-b732-4b6b3384fa69</guid>
      <title>Episode 193 - The &quot;At Last!&quot; Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (11:36) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th May 2015: CNN published their article on a statement Cybersecurity Consultant, Chris Roberts had publicly made on Twitter a month earlier.  There were lots of accusations made regarding Chris Roberts' actions hacking into computer systems while a passenger on multiple airline flights. Did he actually cause a plane to fly sideways? Maybe? But it's not like he made it fly upside down.</p><p><a href="https://edition.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/index.html">FBI: Hacker claimed to have taken over flight’s engine controls</a></p><p><a href="https://twitter.com/todayininfosec/status/1791214444980080724">https://twitter.com/todayininfosec/status/1791214444980080724</a></p><p> </p><p>26th May 1995: Gates Declares Internet "Most Important Single Development"</p><p>Realising his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft Corp. CEO Bill Gates issued a memo titled, "The Internet Tidal Wave," which signaled the company's renewed focus on that arena. In the memo, Gates declared that the Internet was the "most important single development" since the IBM personal computer -- a development that he was assigning "the highest level of importance”.</p><p><a href="https://1995blog.com/2020/05/25/25-years-on-bill-gates-internet-tidal-wave-memo-a-seminal-document-of-the-unfolding-digital-age/">https://1995blog.com/2020/05/25/25-years-on-bill-gates-internet-tidal-wave-memo-a-seminal-document-of-the-unfolding-digital-age/</a></p><p> </p><p><strong>Rant of the Week (18:00)</strong></p><p><a href="https://www.theregister.com/2024/05/22/windows_recall">Giving Windows total recall of everything a user does is a privacy minefield</a></p><p>Microsoft's Windows Recall feature is attracting controversy before even venturing out of preview.</p><p>Like so many of Microsoft's AI-infused products, Windows Recall will remain in preview while Microsoft refines it based on user feedback – or simply gives up and pretends it never happened.</p><p>The principle is simple. Windows takes a snapshot of a user's active screen every few seconds and dumps it to disk. The user can then scroll through the archive of snapshots to find what were doing some time back, or query an AI system to recall past screenshots by text.</p><p> </p><p><strong>Billy Big Balls of the Week (28:58)</strong></p><p><a href="https://www.404media.co/hacker-breaches-scam-call-center-emails-its-scam-victims/">Hacker Breaches Scam Call Center, Warns Victims They've Been Scammed</a></p><p>A hacker claims to have breached a scam call center, stolen the source code for the company’s tools, and emailed the company’s scam victims.</p><p>The hack is the latest in a long series of vigilante actions in which hackers take matters into their own hands and breach or otherwise disrupt scam centers. A massively popular YouTube community, with creators mocking their targets, also exists around the practice.</p><img src="https://lh7-us.googleusercontent.com/dlhxuHImSI1pcfIosbl5kHf4TtUDlkmAqz332u1BZ_ogN5X3jRx9umnbfsHlyN0PyxTxIXBvnMwAVYAHTJjUAnoZceAOwcKWLcWNQnKSyOjjW26RNZIckMydkbIAgJ6XOyp7DxmlSYXo5qjir_gLWEs" /><p> </p><p><strong>Industry News (34:17)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/arrest-100m-incognito-drugs-market/">Authorities Arrest $100m Incognito Drugs Market Suspect</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-seoul-summit-safety-commitments/">AI Seoul Summit: 16 AI Companies Sign Frontier AI Safety Commitments</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-85m-tackle-ai/">UK Government in £8.5m Bid to Tackle AI Cyber-Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/mastercard-fraud-detection/">Mastercard Doubles Speed of Fraud Detection with Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/psni-750000-data-breach-fine/">PSNI Faces £750,000 Data Breach Fine After Spreadsheet Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-maximum-severity-flaw/">GitHub Fixes Maximum Severity Flaw in Enterprise Server</a></p><p><a href="https://www.infosecurity-magazine.com/news/records-scotland-data-nhs-attack/">National Records of Scotland Data Breached in NHS Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/nvd-exploited-vulnerabilities/">NVD Leaves Exploited Vulnerabilities Unchecked</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-gift-card-fraud-costing/">Microsoft: Gift Card Fraud Rising, Costing Businesses up to $100,000 a Day</a></p><p> </p><p><strong>Tweet of the Week (41:59)</strong></p><img src="https://lh7-us.googleusercontent.com/HrKHjTLmKZnUIBxTYhp65vxoS8UwkNUoEAB2GCzCvjAjmkTJF1BimSNlKtJkAetYBA0nSZqhFqGiPbH7276j9Q95JrBqXd_P2GIemkiW06xdOp-jeP_1KJdkR9HiLilXEu74rRgphKtTjp2YIbYfFEc" /><p><a href="https://twitter.com/gcluley/status/1792881296907043217">https://twitter.com/gcluley/status/1792881296907043217</a></p><p>Two for one:</p><img src="https://lh7-us.googleusercontent.com/dSEfKVyvbP2MrDvSiJhkUExGmmilXfH-CRSSFIM-LF0yuJZKk4WxAmfHQCtvw711B5IKOnztkEA7x2eL4sxi5b_pdcLv8ZsiPRiIWLg1lkxapb_kxr1baxrtO7QyjDdB8x6p6srvl2suHa8xnYisciA" /><p><a href="https://twitter.com/mer__edith/status/1793888092321202634">https://twitter.com/mer__edith/status/1793888092321202634</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 27 May 2024 22:08:22 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-193-vEJC0XK6</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (11:36) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th May 2015: CNN published their article on a statement Cybersecurity Consultant, Chris Roberts had publicly made on Twitter a month earlier.  There were lots of accusations made regarding Chris Roberts' actions hacking into computer systems while a passenger on multiple airline flights. Did he actually cause a plane to fly sideways? Maybe? But it's not like he made it fly upside down.</p><p><a href="https://edition.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/index.html">FBI: Hacker claimed to have taken over flight’s engine controls</a></p><p><a href="https://twitter.com/todayininfosec/status/1791214444980080724">https://twitter.com/todayininfosec/status/1791214444980080724</a></p><p> </p><p>26th May 1995: Gates Declares Internet "Most Important Single Development"</p><p>Realising his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft Corp. CEO Bill Gates issued a memo titled, "The Internet Tidal Wave," which signaled the company's renewed focus on that arena. In the memo, Gates declared that the Internet was the "most important single development" since the IBM personal computer -- a development that he was assigning "the highest level of importance”.</p><p><a href="https://1995blog.com/2020/05/25/25-years-on-bill-gates-internet-tidal-wave-memo-a-seminal-document-of-the-unfolding-digital-age/">https://1995blog.com/2020/05/25/25-years-on-bill-gates-internet-tidal-wave-memo-a-seminal-document-of-the-unfolding-digital-age/</a></p><p> </p><p><strong>Rant of the Week (18:00)</strong></p><p><a href="https://www.theregister.com/2024/05/22/windows_recall">Giving Windows total recall of everything a user does is a privacy minefield</a></p><p>Microsoft's Windows Recall feature is attracting controversy before even venturing out of preview.</p><p>Like so many of Microsoft's AI-infused products, Windows Recall will remain in preview while Microsoft refines it based on user feedback – or simply gives up and pretends it never happened.</p><p>The principle is simple. Windows takes a snapshot of a user's active screen every few seconds and dumps it to disk. The user can then scroll through the archive of snapshots to find what were doing some time back, or query an AI system to recall past screenshots by text.</p><p> </p><p><strong>Billy Big Balls of the Week (28:58)</strong></p><p><a href="https://www.404media.co/hacker-breaches-scam-call-center-emails-its-scam-victims/">Hacker Breaches Scam Call Center, Warns Victims They've Been Scammed</a></p><p>A hacker claims to have breached a scam call center, stolen the source code for the company’s tools, and emailed the company’s scam victims.</p><p>The hack is the latest in a long series of vigilante actions in which hackers take matters into their own hands and breach or otherwise disrupt scam centers. A massively popular YouTube community, with creators mocking their targets, also exists around the practice.</p><img src="https://lh7-us.googleusercontent.com/dlhxuHImSI1pcfIosbl5kHf4TtUDlkmAqz332u1BZ_ogN5X3jRx9umnbfsHlyN0PyxTxIXBvnMwAVYAHTJjUAnoZceAOwcKWLcWNQnKSyOjjW26RNZIckMydkbIAgJ6XOyp7DxmlSYXo5qjir_gLWEs" /><p> </p><p><strong>Industry News (34:17)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/arrest-100m-incognito-drugs-market/">Authorities Arrest $100m Incognito Drugs Market Suspect</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-seoul-summit-safety-commitments/">AI Seoul Summit: 16 AI Companies Sign Frontier AI Safety Commitments</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-85m-tackle-ai/">UK Government in £8.5m Bid to Tackle AI Cyber-Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/mastercard-fraud-detection/">Mastercard Doubles Speed of Fraud Detection with Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/psni-750000-data-breach-fine/">PSNI Faces £750,000 Data Breach Fine After Spreadsheet Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-maximum-severity-flaw/">GitHub Fixes Maximum Severity Flaw in Enterprise Server</a></p><p><a href="https://www.infosecurity-magazine.com/news/records-scotland-data-nhs-attack/">National Records of Scotland Data Breached in NHS Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/nvd-exploited-vulnerabilities/">NVD Leaves Exploited Vulnerabilities Unchecked</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-gift-card-fraud-costing/">Microsoft: Gift Card Fraud Rising, Costing Businesses up to $100,000 a Day</a></p><p> </p><p><strong>Tweet of the Week (41:59)</strong></p><img src="https://lh7-us.googleusercontent.com/HrKHjTLmKZnUIBxTYhp65vxoS8UwkNUoEAB2GCzCvjAjmkTJF1BimSNlKtJkAetYBA0nSZqhFqGiPbH7276j9Q95JrBqXd_P2GIemkiW06xdOp-jeP_1KJdkR9HiLilXEu74rRgphKtTjp2YIbYfFEc" /><p><a href="https://twitter.com/gcluley/status/1792881296907043217">https://twitter.com/gcluley/status/1792881296907043217</a></p><p>Two for one:</p><img src="https://lh7-us.googleusercontent.com/dSEfKVyvbP2MrDvSiJhkUExGmmilXfH-CRSSFIM-LF0yuJZKk4WxAmfHQCtvw711B5IKOnztkEA7x2eL4sxi5b_pdcLv8ZsiPRiIWLg1lkxapb_kxr1baxrtO7QyjDdB8x6p6srvl2suHa8xnYisciA" /><p><a href="https://twitter.com/mer__edith/status/1793888092321202634">https://twitter.com/mer__edith/status/1793888092321202634</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46510405" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/37d47f98-2ab9-428b-9759-2d5503e9afc8/audio/a9dc28b8-e6b8-4d49-a606-38620be8af25/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 193 - The &quot;At Last!&quot; Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/90adaac8-7d03-45a0-952a-72a712a48a81/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:26</itunes:duration>
      <itunes:summary>This week in InfoSec Talks about the visionary that is Mr Bill Gates

Rant of the Week is a privacy horror show

Billy Big Balls tells the story of the insider threat
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a self-promoting tweet from one of our presenters</itunes:summary>
      <itunes:subtitle>This week in InfoSec Talks about the visionary that is Mr Bill Gates

Rant of the Week is a privacy horror show

Billy Big Balls tells the story of the insider threat
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a self-promoting tweet from one of our presenters</itunes:subtitle>
      <itunes:keywords>scammer, copiulot+, mastercard, satya nadella, waredot, google search, illness, bill gates, fbi, chris roberts, sfo, hire graham cluley, reddit chatbot, gift card fraud</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>193</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">724c00bc-2838-4098-b74a-f783c934c50a</guid>
      <title>Episode 192 - The Unedited Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th April 2012: The Information Commissioner's Office (ICO) in the UK issued its first-ever data breach fine to an NHS (National Health Service) organisation, fining Aneurin Bevan Health Board in Wales £70,000. </p><p><a href="https://www.digitalhealth.net/2012/04/first-nhs-fine-issued-by-ico/">https://www.digitalhealth.net/2012/04/first-nhs-fine-issued-by-ico/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2024/05/02/dropbox_sign_attack/?td=rt-3a">Dropbox dropped the ball on security, haemorrhaging customer and third-party info</a></p><p>Dropbox has revealed a major attack on its systems that saw customers' personal information accessed by unknown and unauthorized entities.</p><p>The attack, detailed in a <a href="https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm">regulatory filing</a>, impacted Dropbox Sign – a service it bills as an "eSignature solution [that] lets you send, sign, and store important documents in one seamless workflow, without ever leaving Dropbox." So basically a DocuSign clone.</p><p>The filing states that management became aware of the incident last week – on April 24 – and "immediately activated our cyber security incident response process to investigate, contain, and remediate the incident."</p><p>That effort led to the discovery that "the threat actor had accessed data related to all users of Dropbox Sign, such as emails and usernames, in addition to general account settings."</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2024/05/03/china_gov_web_vuln/">Chinese government website security is often worryingly bad, say Chinese researchers</a></p><p>Five Chinese researchers examined the configurations of nearly 14,000 government websites across the country and found worrying lapses that could lead to malicious attacks, according to a not-yet-peer-reviewed study released last week.</p><p>The researchers concluded the investigation has uncovered "pressing security and dependency issues" that may not have a quick fix.</p><p>"Despite thorough analyses, practical solutions to bolster the security of these systems remain elusive," wrote the researchers. "Their susceptibility to cyber attacks, which could facilitate the spread of malicious content or malware, underscores the urgent need for real-time monitoring and malicious activity detection."</p><p>The study also highlights the need for "stringent vetting and regular updates" of third-party libraries and advocates "a diversified distribution of network nodes, which could substantially augment system resilience and performance."</p><p>The study will likely not go down well in Beijing, as China's government has urged improvements to government digital services and apps often issues edicts about improving cybersecurity. </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-blocks-23-million-apps-play/">Google Blocks 2.3 Million Apps From Play Store Listing</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-probe-faceboo-instagram/">Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncscs-mobile-risk-model-highthreat/">NCSC’s New Mobile Risk Model Aimed at “High-Threat” Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawsuits-company-devaluations/">Lawsuits and Company Devaluations Await For Breached Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/unitedhealth-breach-stolen/">UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFA</a></p><p><a href="https://www.infosecurity-magazine.com/news/revil-ransomware-affiliate/">REvil Ransomware Affiliate Sentenced to Over 13 Years in Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-breach-dropbox-sign/">Security Breach Exposes Dropbox Sign Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/indonesia-spyware-haven-amnesty/">Indonesia is a Spyware Haven, Amnesty International Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-spoofing-journalist/">North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh7-us.googleusercontent.com/mmXX9dB5tIj2ZxxjlwcnCnK1YtSRlc1mTSNBRr-bEtS2sQsDcfpeBJ9qMYs90S1XgFgmNR2EqFhDUFCawROKKhElIrtGvoeW1LXYU9Ao6BYn5v6kxgQlBlSonTYwIL7XcqlJqOB5wab-OwgsBBj49wA" /><p><a href="https://twitter.com/summer__heidi/status/1783829402574639187">https://twitter.com/summer__heidi/status/1783829402574639187</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 8 May 2024 17:01:06 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-192-0YvE0jyz</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th April 2012: The Information Commissioner's Office (ICO) in the UK issued its first-ever data breach fine to an NHS (National Health Service) organisation, fining Aneurin Bevan Health Board in Wales £70,000. </p><p><a href="https://www.digitalhealth.net/2012/04/first-nhs-fine-issued-by-ico/">https://www.digitalhealth.net/2012/04/first-nhs-fine-issued-by-ico/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2024/05/02/dropbox_sign_attack/?td=rt-3a">Dropbox dropped the ball on security, haemorrhaging customer and third-party info</a></p><p>Dropbox has revealed a major attack on its systems that saw customers' personal information accessed by unknown and unauthorized entities.</p><p>The attack, detailed in a <a href="https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm">regulatory filing</a>, impacted Dropbox Sign – a service it bills as an "eSignature solution [that] lets you send, sign, and store important documents in one seamless workflow, without ever leaving Dropbox." So basically a DocuSign clone.</p><p>The filing states that management became aware of the incident last week – on April 24 – and "immediately activated our cyber security incident response process to investigate, contain, and remediate the incident."</p><p>That effort led to the discovery that "the threat actor had accessed data related to all users of Dropbox Sign, such as emails and usernames, in addition to general account settings."</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2024/05/03/china_gov_web_vuln/">Chinese government website security is often worryingly bad, say Chinese researchers</a></p><p>Five Chinese researchers examined the configurations of nearly 14,000 government websites across the country and found worrying lapses that could lead to malicious attacks, according to a not-yet-peer-reviewed study released last week.</p><p>The researchers concluded the investigation has uncovered "pressing security and dependency issues" that may not have a quick fix.</p><p>"Despite thorough analyses, practical solutions to bolster the security of these systems remain elusive," wrote the researchers. "Their susceptibility to cyber attacks, which could facilitate the spread of malicious content or malware, underscores the urgent need for real-time monitoring and malicious activity detection."</p><p>The study also highlights the need for "stringent vetting and regular updates" of third-party libraries and advocates "a diversified distribution of network nodes, which could substantially augment system resilience and performance."</p><p>The study will likely not go down well in Beijing, as China's government has urged improvements to government digital services and apps often issues edicts about improving cybersecurity. </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-blocks-23-million-apps-play/">Google Blocks 2.3 Million Apps From Play Store Listing</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-probe-faceboo-instagram/">Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncscs-mobile-risk-model-highthreat/">NCSC’s New Mobile Risk Model Aimed at “High-Threat” Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawsuits-company-devaluations/">Lawsuits and Company Devaluations Await For Breached Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/unitedhealth-breach-stolen/">UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFA</a></p><p><a href="https://www.infosecurity-magazine.com/news/revil-ransomware-affiliate/">REvil Ransomware Affiliate Sentenced to Over 13 Years in Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-breach-dropbox-sign/">Security Breach Exposes Dropbox Sign Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/indonesia-spyware-haven-amnesty/">Indonesia is a Spyware Haven, Amnesty International Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-spoofing-journalist/">North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh7-us.googleusercontent.com/mmXX9dB5tIj2ZxxjlwcnCnK1YtSRlc1mTSNBRr-bEtS2sQsDcfpeBJ9qMYs90S1XgFgmNR2EqFhDUFCawROKKhElIrtGvoeW1LXYU9Ao6BYn5v6kxgQlBlSonTYwIL7XcqlJqOB5wab-OwgsBBj49wA" /><p><a href="https://twitter.com/summer__heidi/status/1783829402574639187">https://twitter.com/summer__heidi/status/1783829402574639187</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47437857" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d2041c6a-6365-42fb-aac7-498377ba7b09/audio/3bf15fcd-72b4-4415-a9c1-81efa5488488/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 192 - The Unedited Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0492190a-8d3a-47ba-a737-0f52b44f9c97/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:24</itunes:duration>
      <itunes:summary>This week in InfoSec Talks about an NHS first!

Rant of the Week is the age old abuse of power

Billy Big Balls Says it was China
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is sound advice to increase your resistance to malware</itunes:summary>
      <itunes:subtitle>This week in InfoSec Talks about an NHS first!

Rant of the Week is the age old abuse of power

Billy Big Balls Says it was China
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is sound advice to increase your resistance to malware</itunes:subtitle>
      <itunes:keywords>dead security researchers, immunity, united health, nhs, china, ico, virus, gina!, mfa, dropbox</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>192</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8988fbcb-520a-42a7-a58b-d8eab8271dfa</guid>
      <title>Episode 191 - This One&apos;s For The Boomers</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (07:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p><i>23rd April 2005</i>: The first video uploaded to <a href="http://en.wikipedia.org/wiki/YouTube">YouTube</a>, “<a href="http://www.youtube.com/watch?v=jNQXAC9IVRw">Me at the zoo</a>,” is posted on April 23, 2005 at 8:27 PM by co-founder <a href="http://en.wikipedia.org/wiki/Jawed_Karim">Jawed Karim</a>. For now being a piece of history, the video is actually pretty dumb.</p><p>Note to future entrepreneurs: what you do may be for posterity. Choose wisely.</p><p><i>22nd April 1988</i>: 1988: The VIRUS-L email mailing list was created and moderated by Ken van Wyk while he was working at Lehigh University. It was the first electronic forum dedicated to discussing computer viruses.</p><p><a href="https://twitter.com/todayininfosec/status/1782424224348446910">https://twitter.com/todayininfosec/status/1782424224348446910</a></p><p> </p><p><strong>Rant of the Week (13:21)</strong></p><p><a href="https://www.theregister.com/2024/04/25/ring_ftc_settlement/">Ring dinged for $5.6M after, among other claims, rogue insider spied on 'pretty girls'</a></p><p>The FTC today announced it would be sending refunds totaling $5.6 million to Ring customers, paid from the Amazon subsidiary's coffers.</p><p>The windfall <a href="https://www.ftc.gov/news-events/news/press-releases/2024/04/ftc-sends-refunds-ring-customers-stemming-2023-settlement-over-charges-company-failed-block">stems from</a> allegations made by the US watchdog that folks could have been, and were, spied upon by cybercriminals and rogue Ring workers via their Ring home security cameras.</p><p>The regulator last year accused Ring of <a href="https://www.theregister.com/2023/06/01/ftc_alexa_ring_amazon_settlement/">sloppy privacy protections</a> that allowed the aforementioned spying to occur or potentially occur.</p><p>Specifically, the FTC formally charged Ring with "compromising its customers' privacy by allowing any employee or contractor to access consumers' private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers' accounts, cameras, and videos."</p><p> </p><p><strong>Billy Big Balls of the Week (21:41)</strong><br /><a href="https://www.theregister.com/2024/04/25/ai_voice_arrest/">Cops cuff man for allegedly framing colleague with AI-generated hate speech clip</a></p><p>Baltimore police have arrested Dazhon Leslie Darien, the former athletic director of Pikesville High School (PHS), for allegedly impersonating the school's principal using AI software to make it seem as if he made racist and antisemitic remarks.</p><p>Darien, of Baltimore, Maryland, was subsequently charged with witness retaliation, stalking, theft, and disrupting school operations. He was detained late at night trying to board a flight at BWI Thurgood Marshall Airport. Security personnel stopped him because the declared firearm he had with him was improperly packed and an ensuing background check revealed an open warrant for his arrest.</p><p>He is quoted as saying “Arse cock pussy”. 😀</p><p>"On January 17, 2024, the Baltimore County Police Department became aware of a voice recording being circulated on social media," said Robert McCullough, Chief of Baltimore County Police, at a streamed press conference today. "It was alleged the voice captured on the audio file belong to Mr Eric Eiswert, the Principal at the Pikesville High School. We now have conclusive evidence that the recording was not authentic.</p><p> </p><p><strong>Industry News (30:51)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/quishing-attacks-tenfold/">Quishing Attacks Jump Tenfold, Attachment Payloads Halve</a></p><p><a href="https://www.infosecurity-magazine.com/news/alarming-decline-cyber-jobs-us/">Alarming Decline in Cybersecurity Job Postings in the US</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-pwcs-richard-horne-new-ceo/">NCSC Announces PwC’s Richard Horne as New CEO</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/">NSA Launches Guidance for Secure AI Deployment</a></p><p><a href="https://www.infosecurity-magazine.com/news/e2e-encryption-sparks-concerns-eu/">End-to-End Encryption Sparks Concerns Among EU Law Enforcement</a></p><p><a href="https://www.infosecurity-magazine.com/news/fifth-cisos-staff-leaked-data-genai/">Fifth of CISOs Admit Staff Leaked Data Via GenAI</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-congress-passes-bill-ban-tiktok/">US Congress Passes Bill to Ban TikTok</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-banking-security-which/">Online Banking Security Still Not Up to Par, Says Which?</a></p><p><a href="https://www.infosecurity-magazine.com/news/ring-pay-out-56m-dollars-refunds/">Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach</a></p><p> </p><p><strong>Tweet of the Week   (38:56)</strong></p><img src="https://lh7-us.googleusercontent.com/x8PByCLYo7uuKstjrPT4QlOvfJVP9szsmr3thY5vZHG2sQqewK3vPqUax5gBTHDOvH49O9eivVv6KuAALZR4_CtF141vliTEgtmTHRgByqMFbT_I7uh5114ohz6apdnP8ltFeOTuLAcbq4vdpYOc0BI" /><p><a href="https://twitter.com/KimZetter/status/1783556843798671591">https://twitter.com/KimZetter/status/1783556843798671591</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 29 Apr 2024 16:59:52 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-191-UZIl3frk</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (07:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p><i>23rd April 2005</i>: The first video uploaded to <a href="http://en.wikipedia.org/wiki/YouTube">YouTube</a>, “<a href="http://www.youtube.com/watch?v=jNQXAC9IVRw">Me at the zoo</a>,” is posted on April 23, 2005 at 8:27 PM by co-founder <a href="http://en.wikipedia.org/wiki/Jawed_Karim">Jawed Karim</a>. For now being a piece of history, the video is actually pretty dumb.</p><p>Note to future entrepreneurs: what you do may be for posterity. Choose wisely.</p><p><i>22nd April 1988</i>: 1988: The VIRUS-L email mailing list was created and moderated by Ken van Wyk while he was working at Lehigh University. It was the first electronic forum dedicated to discussing computer viruses.</p><p><a href="https://twitter.com/todayininfosec/status/1782424224348446910">https://twitter.com/todayininfosec/status/1782424224348446910</a></p><p> </p><p><strong>Rant of the Week (13:21)</strong></p><p><a href="https://www.theregister.com/2024/04/25/ring_ftc_settlement/">Ring dinged for $5.6M after, among other claims, rogue insider spied on 'pretty girls'</a></p><p>The FTC today announced it would be sending refunds totaling $5.6 million to Ring customers, paid from the Amazon subsidiary's coffers.</p><p>The windfall <a href="https://www.ftc.gov/news-events/news/press-releases/2024/04/ftc-sends-refunds-ring-customers-stemming-2023-settlement-over-charges-company-failed-block">stems from</a> allegations made by the US watchdog that folks could have been, and were, spied upon by cybercriminals and rogue Ring workers via their Ring home security cameras.</p><p>The regulator last year accused Ring of <a href="https://www.theregister.com/2023/06/01/ftc_alexa_ring_amazon_settlement/">sloppy privacy protections</a> that allowed the aforementioned spying to occur or potentially occur.</p><p>Specifically, the FTC formally charged Ring with "compromising its customers' privacy by allowing any employee or contractor to access consumers' private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers' accounts, cameras, and videos."</p><p> </p><p><strong>Billy Big Balls of the Week (21:41)</strong><br /><a href="https://www.theregister.com/2024/04/25/ai_voice_arrest/">Cops cuff man for allegedly framing colleague with AI-generated hate speech clip</a></p><p>Baltimore police have arrested Dazhon Leslie Darien, the former athletic director of Pikesville High School (PHS), for allegedly impersonating the school's principal using AI software to make it seem as if he made racist and antisemitic remarks.</p><p>Darien, of Baltimore, Maryland, was subsequently charged with witness retaliation, stalking, theft, and disrupting school operations. He was detained late at night trying to board a flight at BWI Thurgood Marshall Airport. Security personnel stopped him because the declared firearm he had with him was improperly packed and an ensuing background check revealed an open warrant for his arrest.</p><p>He is quoted as saying “Arse cock pussy”. 😀</p><p>"On January 17, 2024, the Baltimore County Police Department became aware of a voice recording being circulated on social media," said Robert McCullough, Chief of Baltimore County Police, at a streamed press conference today. "It was alleged the voice captured on the audio file belong to Mr Eric Eiswert, the Principal at the Pikesville High School. We now have conclusive evidence that the recording was not authentic.</p><p> </p><p><strong>Industry News (30:51)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/quishing-attacks-tenfold/">Quishing Attacks Jump Tenfold, Attachment Payloads Halve</a></p><p><a href="https://www.infosecurity-magazine.com/news/alarming-decline-cyber-jobs-us/">Alarming Decline in Cybersecurity Job Postings in the US</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-pwcs-richard-horne-new-ceo/">NCSC Announces PwC’s Richard Horne as New CEO</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/">NSA Launches Guidance for Secure AI Deployment</a></p><p><a href="https://www.infosecurity-magazine.com/news/e2e-encryption-sparks-concerns-eu/">End-to-End Encryption Sparks Concerns Among EU Law Enforcement</a></p><p><a href="https://www.infosecurity-magazine.com/news/fifth-cisos-staff-leaked-data-genai/">Fifth of CISOs Admit Staff Leaked Data Via GenAI</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-congress-passes-bill-ban-tiktok/">US Congress Passes Bill to Ban TikTok</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-banking-security-which/">Online Banking Security Still Not Up to Par, Says Which?</a></p><p><a href="https://www.infosecurity-magazine.com/news/ring-pay-out-56m-dollars-refunds/">Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach</a></p><p> </p><p><strong>Tweet of the Week   (38:56)</strong></p><img src="https://lh7-us.googleusercontent.com/x8PByCLYo7uuKstjrPT4QlOvfJVP9szsmr3thY5vZHG2sQqewK3vPqUax5gBTHDOvH49O9eivVv6KuAALZR4_CtF141vliTEgtmTHRgByqMFbT_I7uh5114ohz6apdnP8ltFeOTuLAcbq4vdpYOc0BI" /><p><a href="https://twitter.com/KimZetter/status/1783556843798671591">https://twitter.com/KimZetter/status/1783556843798671591</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41992685" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/13539bab-9820-4a3d-8f62-b6b9c8def1b2/audio/03af31da-5f6b-4c40-b280-d782f534f94c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 191 - This One&apos;s For The Boomers</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5bfc0333-e376-4c9c-aadb-19486cf7f216/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:44</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the foundations of the modern influencer’s infrastructure 

Rant of the Week is the age old abuse of power

Billy Big Balls asks “Why has this not happened more often?”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week may be remembered as the modern equivalent of shouting at the moon</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the foundations of the modern influencer’s infrastructure 

Rant of the Week is the age old abuse of power

Billy Big Balls asks “Why has this not happened more often?”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week may be remembered as the modern equivalent of shouting at the moon</itunes:subtitle>
      <itunes:keywords>phishing, quishing, hate-speech, chatgpt, ring, ai, amazon, smishing, ftc</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>191</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6b7d79e0-a1bf-4185-b5d8-4136de6a2b18</guid>
      <title>Episode 190 - The Very Serious Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:49)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th April 1969: <a href="https://en.wikipedia.org/wiki/Steve_Crocker">Steve Crocker</a>, a graduate student at UCLA and part of the team developing ARPANET, writes the first “<a href="https://en.wikipedia.org/wiki/Request_for_Comments">Request for Comments</a>“. The ARPANET, a research project of the Department of Defense’s Advanced Research Projects Agency (ARPA), was the foundation of today’s modern Internet. <a href="https://www.rfc-editor.org/rfc/rfc1.html">RFC 1</a> defined the design of the host software for communication between ARPANET nodes. This host software would be run on Interface Message Processors or IMPs, which were the precursor to Internet routers. The “host software” defined in RFC 1 would later be known as the Network Control Protocol or NCP, which itself was the forerunner to the modern TCP/IP protocol the Internet runs on today.</p><p><a href="https://thisdayintechhistory.com/04/07/rfc-1-defines-the-building-block-of-internet-communication/">https://thisdayintechhistory.com/04/07/rfc-1-defines-the-building-block-of-internet-communication/</a></p><p>7th April 2014: The Heartbleed Bug was publicly disclosed. The buffer over-read vulnerability had been discovered by Neel Mehta and later privately reported to the OpenSSL project, which patched it the next day. The vulnerability was inadvertently introduced into OpenSSL 2 years prior.</p><p><a href="https://twitter.com/todayininfosec/status/1777136463882183076">https://twitter.com/todayininfosec/status/1777136463882183076</a>  </p><p> </p><p><strong>Rant of the Week (17:09)</strong></p><p><a href="https://www.bleepingcomputer.com/news/technology/opentable-is-adding-your-first-name-to-previously-anonymous-reviews/">OpenTable is adding your first name to previously anonymous reviews</a></p><p>Restaurant reservation platform OpenTable says that all reviews on the platform will no longer be fully anonymous starting May 22nd and will now show members' profile pictures and first names.</p><p>OpenTable notified members of this new policy change today in emails to members who had previously left a review on the platform, stating the change was made to provide more transparency.</p><p>"At OpenTable, we strive to build a community in which diners can help other diners discover new restaurants, and reviews are a big part of that," reads the OpenTable email seen by BleepingComputer.</p><p>"We've heard from you, our diners, that trust and transparency are important when looking at reviews."</p><p>"To build on the credibility of our review program, starting May 22, 2024, OpenTable will begin displaying diner first names and profile photos on all diner reviews. This update will also apply to past reviews.</p><img src="https://lh7-us.googleusercontent.com/aq1Ml8P0UdP_ucvtCTIl7hIZzObVBQ5676dVT7igAWbMNB7ghJA2uoJLwiNK4-BGHzRiYEhSx1WS0C9y4y0Y_5-mx8fXuCuiYBV79Vgi9c8nvb4-Mi6eTqqwz5BjTYxpOy4R9GWwftzrVkalI2kY8pU" /><p> </p><p><strong>Billy Big Balls of the Week (26:36)</strong><br /><a href="https://www.ft.com/content/6951335c-07f0-4e92-bd53-4fd69e6afa90">Lloyds Bank axes risk staff after executives complain they are a ‘blocker’</a></p><p>Lloyds Banking Group plans to cut jobs in risk management after an internal review found the function was a “blocker to our strategic transformation”.  </p><p>The restructuring was outlined in a memo last month from Lloyds’ chief risk officer Stephen Shelley, who said two-thirds of executives believed risk management was blocking progress while “less than half our workforce believe intelligent risk-taking is encouraged”.  The lender was “resetting our approach to risk and controls”, Shelley said in the memo, seen by the Financial Times, adding that “the initial focus is on non-financial risks”. </p><p> </p><p><strong>Industry News (33:55)</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/youtube-channels-hacked/">Famous YouTube Channels Hacked to Distribute Infostealers</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-federal-privacy-law-legislators/">US Federal Data Privacy Law Introduced by Legislators</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/foreign-interference-record-ip/">Foreign Interference Drives Record Surge in IP Theft</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/half-uk-businesses-cyber-incident/">Half of UK Businesses Hit by Cyber-Incident in Past Year, UK Government Finds</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-recovered-14bn-covid-fraud/">US Claims to Have Recovered $1.4bn in COVID Fraud</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/women-exclusion-twice/">Women Experience Exclusion Twice as Often as Men in Cybersecurity</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/threat-actors-game-github-search/">Threat Actors Game GitHub Search to Spread Malware</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/data-breach-exposes-300k-taxi/">Data Breach Exposes 300k Taxi Passengers’ Information</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/apple-boosts-spyware-alerts/">Apple Boosts Spyware Alerts For Mercenary Attacks</a></p><p> </p><p><strong>Tweet of the Week  (52:08)</strong></p><img src="https://lh7-us.googleusercontent.com/yketwQJb4HZmesVe0Y96P144V9-qDJh9fhLudJB_S0Lqi5mRF1lHZrRs233tTc1R1f_0uKZTMcmUAqOn9Om6erEtO3oivYPa33CK763B3NU808R81W3b9dH1amB5cSblMAN81oMNln6PB1IWp-A1ooc" /><p><a href="https://x.com/ErrataRob/status/1778536622163984590">https://x.com/ErrataRob/status/1778536622163984590</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 15 Apr 2024 18:36:42 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-190-_kP89qGQ</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:49)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th April 1969: <a href="https://en.wikipedia.org/wiki/Steve_Crocker">Steve Crocker</a>, a graduate student at UCLA and part of the team developing ARPANET, writes the first “<a href="https://en.wikipedia.org/wiki/Request_for_Comments">Request for Comments</a>“. The ARPANET, a research project of the Department of Defense’s Advanced Research Projects Agency (ARPA), was the foundation of today’s modern Internet. <a href="https://www.rfc-editor.org/rfc/rfc1.html">RFC 1</a> defined the design of the host software for communication between ARPANET nodes. This host software would be run on Interface Message Processors or IMPs, which were the precursor to Internet routers. The “host software” defined in RFC 1 would later be known as the Network Control Protocol or NCP, which itself was the forerunner to the modern TCP/IP protocol the Internet runs on today.</p><p><a href="https://thisdayintechhistory.com/04/07/rfc-1-defines-the-building-block-of-internet-communication/">https://thisdayintechhistory.com/04/07/rfc-1-defines-the-building-block-of-internet-communication/</a></p><p>7th April 2014: The Heartbleed Bug was publicly disclosed. The buffer over-read vulnerability had been discovered by Neel Mehta and later privately reported to the OpenSSL project, which patched it the next day. The vulnerability was inadvertently introduced into OpenSSL 2 years prior.</p><p><a href="https://twitter.com/todayininfosec/status/1777136463882183076">https://twitter.com/todayininfosec/status/1777136463882183076</a>  </p><p> </p><p><strong>Rant of the Week (17:09)</strong></p><p><a href="https://www.bleepingcomputer.com/news/technology/opentable-is-adding-your-first-name-to-previously-anonymous-reviews/">OpenTable is adding your first name to previously anonymous reviews</a></p><p>Restaurant reservation platform OpenTable says that all reviews on the platform will no longer be fully anonymous starting May 22nd and will now show members' profile pictures and first names.</p><p>OpenTable notified members of this new policy change today in emails to members who had previously left a review on the platform, stating the change was made to provide more transparency.</p><p>"At OpenTable, we strive to build a community in which diners can help other diners discover new restaurants, and reviews are a big part of that," reads the OpenTable email seen by BleepingComputer.</p><p>"We've heard from you, our diners, that trust and transparency are important when looking at reviews."</p><p>"To build on the credibility of our review program, starting May 22, 2024, OpenTable will begin displaying diner first names and profile photos on all diner reviews. This update will also apply to past reviews.</p><img src="https://lh7-us.googleusercontent.com/aq1Ml8P0UdP_ucvtCTIl7hIZzObVBQ5676dVT7igAWbMNB7ghJA2uoJLwiNK4-BGHzRiYEhSx1WS0C9y4y0Y_5-mx8fXuCuiYBV79Vgi9c8nvb4-Mi6eTqqwz5BjTYxpOy4R9GWwftzrVkalI2kY8pU" /><p> </p><p><strong>Billy Big Balls of the Week (26:36)</strong><br /><a href="https://www.ft.com/content/6951335c-07f0-4e92-bd53-4fd69e6afa90">Lloyds Bank axes risk staff after executives complain they are a ‘blocker’</a></p><p>Lloyds Banking Group plans to cut jobs in risk management after an internal review found the function was a “blocker to our strategic transformation”.  </p><p>The restructuring was outlined in a memo last month from Lloyds’ chief risk officer Stephen Shelley, who said two-thirds of executives believed risk management was blocking progress while “less than half our workforce believe intelligent risk-taking is encouraged”.  The lender was “resetting our approach to risk and controls”, Shelley said in the memo, seen by the Financial Times, adding that “the initial focus is on non-financial risks”. </p><p> </p><p><strong>Industry News (33:55)</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/youtube-channels-hacked/">Famous YouTube Channels Hacked to Distribute Infostealers</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-federal-privacy-law-legislators/">US Federal Data Privacy Law Introduced by Legislators</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/foreign-interference-record-ip/">Foreign Interference Drives Record Surge in IP Theft</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/half-uk-businesses-cyber-incident/">Half of UK Businesses Hit by Cyber-Incident in Past Year, UK Government Finds</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-recovered-14bn-covid-fraud/">US Claims to Have Recovered $1.4bn in COVID Fraud</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/women-exclusion-twice/">Women Experience Exclusion Twice as Often as Men in Cybersecurity</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/threat-actors-game-github-search/">Threat Actors Game GitHub Search to Spread Malware</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/data-breach-exposes-300k-taxi/">Data Breach Exposes 300k Taxi Passengers’ Information</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/apple-boosts-spyware-alerts/">Apple Boosts Spyware Alerts For Mercenary Attacks</a></p><p> </p><p><strong>Tweet of the Week  (52:08)</strong></p><img src="https://lh7-us.googleusercontent.com/yketwQJb4HZmesVe0Y96P144V9-qDJh9fhLudJB_S0Lqi5mRF1lHZrRs233tTc1R1f_0uKZTMcmUAqOn9Om6erEtO3oivYPa33CK763B3NU808R81W3b9dH1amB5cSblMAN81oMNln6PB1IWp-A1ooc" /><p><a href="https://x.com/ErrataRob/status/1778536622163984590">https://x.com/ErrataRob/status/1778536622163984590</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53120430" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/be7329ab-0b92-4f33-89b2-2b7f388018fb/audio/098ae857-5ea1-42ec-850b-7ffcfedb5b82/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 190 - The Very Serious Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/73645b39-a8e5-4eba-8295-5f94082aa2ba/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:19</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the building blocks of the internet 

Rant of the Week is an experiment in snitches get stitches

Billy Big Balls identifies a genius way to reduce risks
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is another loss for anonymity</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the building blocks of the internet 

Rant of the Week is an experiment in snitches get stitches

Billy Big Balls identifies a genius way to reduce risks
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is another loss for anonymity</itunes:subtitle>
      <itunes:keywords>whats the worst that could happen, github, youtube, covid fraud, rfc1, lloyds bank, snitxhes, opentable, risk, apple, arpanet, heartbleed, interupting sloth</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>190</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7be4e237-725c-4706-a522-4afd310341e7</guid>
      <title>Episode 189 - The Something Something Band Something Something Together Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (06:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd April 2011: Email marketing and loyalty program management company Epsilon reported a data breach of names and email addresses of numerous companies' customers, totaling at least 60 million records. Dozens of companies were impacted, including Kroger, Walgreens, Verizon, and Chase.</p><p><a href="https://twitter.com/todayininfosec/status/1775598288277835996">https://twitter.com/todayininfosec/status/1775598288277835996</a>  </p><p>1st April 1995: US President Bill Clinton and Russian President Boris Yeltsin announced a pact to exchange their personal PGP keys and to make the technology available to all citizens worldwide. (April Fools' Day)</p><img src="https://lh7-us.googleusercontent.com/sRTCJ1GKFWKQNQbJ9N5Hl3flgPpSUhH3dhV8gzJndsy3EfcjY5ffUtTTs9tnSmQOrlUyHfefqj2jjUyJ3YHNcc6oiXPUlu0C8z9FrIJdkJXexNNiw2lDwPidB3Pad_U7ib6CsdqZtNIGysj5wxr-QY4" /><p><a href="https://twitter.com/todayininfosec/status/1774994645053010184">https://twitter.com/todayininfosec/status/1774994645053010184</a></p><p> </p><p><strong>Rant of the Week (13:06)</strong></p><p><a href="https://www.independent.co.uk/news/uk/politics/william-wragg-honey-trap-grindr-b2523778.html">William Wragg honey trap scandal is ‘extremely troubling’ says minister</a></p><p>Explosive revelations that a senior Conservative MP leaked <a href="https://www.independent.co.uk/politics/william-wragg-mp-honeytrap-scandal-whatsapp-b2523610.html">colleagues’ phone numbers</a> to a man he had met on the gay dating app Grindr are “very serious”, a minister has warned, amid questions over whether the MP will face sanctions.</p><p>Vice chairman of the 1922 committee William Wragg admitted he sent the numbers after becoming concerned about the power the recipient had over him since he had sent intimate pictures of himself.</p><p>Treasury minister <a href="https://www.independent.co.uk/topic/gareth-davies">Gareth Davies</a> said the situation was “incredibly troubling and very serious” but maintained that Mr Wragg would keep the party whip while the incident is being investigated.</p><p> </p><p><strong>Billy Big Balls of the Week (24:09)</strong><br /><a href="https://gizmodo.com/amazon-reportedly-ditches-just-walk-out-grocery-stores-1851381116">Amazon Ditches 'Just Walk Out' Checkouts at Its Grocery Stores</a></p><p>Amazon Fresh is moving away from a feature of its grocery stores where customers could skip checkout altogether.</p><p>Amazon is phasing out its <a href="https://gizmodo.com/amazon-tests-grocery-store-with-no-checkout-1789683651">checkout-less grocery stores</a> with “Just Walk Out” technology, first reported by <a href="https://www.theinformation.com/articles/amazons-grocery-stores-to-drop-just-walk-out-checkout-tech?rc=5xvgzc">The Information</a> Tuesday. The company’s senior vice president of grocery stores says they’re moving away from Just Walk Out, which relied on cameras and sensors to track what people were leaving the store with.</p><p>Just over half of Amazon Fresh stores are equipped with Just Walk Out. The technology allows customers to skip checkout altogether by scanning a QR code when they enter the store. Though it seemed completely automated, Just Walk Out relied on more than <a href="https://www.theinformation.com/articles/how-amazons-big-bet-on-just-walk-out-stumbled?rc=5xvgzc">1,000 people in India watching and labeling videos</a> to ensure accurate checkouts. The cashiers were simply moved off-site, and they watched you as you shopped.</p><p>On Wednesday, <a href="https://www.geekwire.com/2024/amazon-web-services-cuts-hundreds-of-jobs-in-sales-training-and-physical-stores-technology/">GeekWire</a> reported that Amazon Web Services is cutting a few hundred jobs in its Physical Stores Technology team, according to internal emails. The layoffs will allegedly impact portions of Amazon’s identity and checkout teams.</p><p> </p><p><strong>Industry News (29:46)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/atandt-confirms-73m-customer-data/">Dataset of 73 Million AT&T Customers Linked to Dark Web Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-singles-out-social-media-video/">Firms Must Work Harder to Guard Children’s Privacy, Says UK ICO</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-classified-five-eyes/">Threat Actor Claims Classified Five Eyes Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/leicester-council-documents-leaked/">Leicester Council Confirms Confidential Documents Leaked in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/jackson-county-systems-hit/">Jackson County IT Systems Hit By Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-takedown-leak-site-old/">LockBit Scrambles After Takedown, Repopulates Leak Site with Old Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-ai-content-division-us/">China Using AI-Generated Content to Sow Division in US, Microsoft Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/wiz-discovers-flaws-generative-ai/">Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-threat-ttps-ivanti/">Chinese Threat Actors Deploy New TTPs to Exploit Ivanti Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (35:58)</strong></p><img src="https://lh7-us.googleusercontent.com/lgqqtNsqywP1eYNfN2VYFBlYqGoMZAZcExp79AhpkyPZytYErez3ob6FvKsIudD8bzQYa_ljda0dqvhLid_weodHQ6zGbR8kRF-8sDtkk8b1g5IESrFOXH7BhDyB7HSeDCD2u8YO_ZqkZ6vSPFiV2IA" /><p><a href="https://twitter.com/belldotbz/status/1776187040813441272">https://twitter.com/belldotbz/status/1776187040813441272</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 8 Apr 2024 18:59:41 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-189-2WNFkcRe</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (06:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd April 2011: Email marketing and loyalty program management company Epsilon reported a data breach of names and email addresses of numerous companies' customers, totaling at least 60 million records. Dozens of companies were impacted, including Kroger, Walgreens, Verizon, and Chase.</p><p><a href="https://twitter.com/todayininfosec/status/1775598288277835996">https://twitter.com/todayininfosec/status/1775598288277835996</a>  </p><p>1st April 1995: US President Bill Clinton and Russian President Boris Yeltsin announced a pact to exchange their personal PGP keys and to make the technology available to all citizens worldwide. (April Fools' Day)</p><img src="https://lh7-us.googleusercontent.com/sRTCJ1GKFWKQNQbJ9N5Hl3flgPpSUhH3dhV8gzJndsy3EfcjY5ffUtTTs9tnSmQOrlUyHfefqj2jjUyJ3YHNcc6oiXPUlu0C8z9FrIJdkJXexNNiw2lDwPidB3Pad_U7ib6CsdqZtNIGysj5wxr-QY4" /><p><a href="https://twitter.com/todayininfosec/status/1774994645053010184">https://twitter.com/todayininfosec/status/1774994645053010184</a></p><p> </p><p><strong>Rant of the Week (13:06)</strong></p><p><a href="https://www.independent.co.uk/news/uk/politics/william-wragg-honey-trap-grindr-b2523778.html">William Wragg honey trap scandal is ‘extremely troubling’ says minister</a></p><p>Explosive revelations that a senior Conservative MP leaked <a href="https://www.independent.co.uk/politics/william-wragg-mp-honeytrap-scandal-whatsapp-b2523610.html">colleagues’ phone numbers</a> to a man he had met on the gay dating app Grindr are “very serious”, a minister has warned, amid questions over whether the MP will face sanctions.</p><p>Vice chairman of the 1922 committee William Wragg admitted he sent the numbers after becoming concerned about the power the recipient had over him since he had sent intimate pictures of himself.</p><p>Treasury minister <a href="https://www.independent.co.uk/topic/gareth-davies">Gareth Davies</a> said the situation was “incredibly troubling and very serious” but maintained that Mr Wragg would keep the party whip while the incident is being investigated.</p><p> </p><p><strong>Billy Big Balls of the Week (24:09)</strong><br /><a href="https://gizmodo.com/amazon-reportedly-ditches-just-walk-out-grocery-stores-1851381116">Amazon Ditches 'Just Walk Out' Checkouts at Its Grocery Stores</a></p><p>Amazon Fresh is moving away from a feature of its grocery stores where customers could skip checkout altogether.</p><p>Amazon is phasing out its <a href="https://gizmodo.com/amazon-tests-grocery-store-with-no-checkout-1789683651">checkout-less grocery stores</a> with “Just Walk Out” technology, first reported by <a href="https://www.theinformation.com/articles/amazons-grocery-stores-to-drop-just-walk-out-checkout-tech?rc=5xvgzc">The Information</a> Tuesday. The company’s senior vice president of grocery stores says they’re moving away from Just Walk Out, which relied on cameras and sensors to track what people were leaving the store with.</p><p>Just over half of Amazon Fresh stores are equipped with Just Walk Out. The technology allows customers to skip checkout altogether by scanning a QR code when they enter the store. Though it seemed completely automated, Just Walk Out relied on more than <a href="https://www.theinformation.com/articles/how-amazons-big-bet-on-just-walk-out-stumbled?rc=5xvgzc">1,000 people in India watching and labeling videos</a> to ensure accurate checkouts. The cashiers were simply moved off-site, and they watched you as you shopped.</p><p>On Wednesday, <a href="https://www.geekwire.com/2024/amazon-web-services-cuts-hundreds-of-jobs-in-sales-training-and-physical-stores-technology/">GeekWire</a> reported that Amazon Web Services is cutting a few hundred jobs in its Physical Stores Technology team, according to internal emails. The layoffs will allegedly impact portions of Amazon’s identity and checkout teams.</p><p> </p><p><strong>Industry News (29:46)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/atandt-confirms-73m-customer-data/">Dataset of 73 Million AT&T Customers Linked to Dark Web Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-singles-out-social-media-video/">Firms Must Work Harder to Guard Children’s Privacy, Says UK ICO</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-classified-five-eyes/">Threat Actor Claims Classified Five Eyes Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/leicester-council-documents-leaked/">Leicester Council Confirms Confidential Documents Leaked in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/jackson-county-systems-hit/">Jackson County IT Systems Hit By Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-takedown-leak-site-old/">LockBit Scrambles After Takedown, Repopulates Leak Site with Old Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-ai-content-division-us/">China Using AI-Generated Content to Sow Division in US, Microsoft Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/wiz-discovers-flaws-generative-ai/">Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-threat-ttps-ivanti/">Chinese Threat Actors Deploy New TTPs to Exploit Ivanti Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (35:58)</strong></p><img src="https://lh7-us.googleusercontent.com/lgqqtNsqywP1eYNfN2VYFBlYqGoMZAZcExp79AhpkyPZytYErez3ob6FvKsIudD8bzQYa_ljda0dqvhLid_weodHQ6zGbR8kRF-8sDtkk8b1g5IESrFOXH7BhDyB7HSeDCD2u8YO_ZqkZ6vSPFiV2IA" /><p><a href="https://twitter.com/belldotbz/status/1776187040813441272">https://twitter.com/belldotbz/status/1776187040813441272</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38259891" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/23620ea3-01bf-4d43-9a0d-f30b7f0d713b/audio/5f1960ba-42dc-4670-a90c-032327b113d0/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 189 - The Something Something Band Something Something Together Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/09acf89d-40c0-4ff3-9617-fd3b7995886c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:51</itunes:duration>
      <itunes:summary>This week in InfoSec asks “what could go wrong with a third party holding all of your contact information?”
 
Rant of the Week demonstrates the value of deep vetting in security clearance

Billy Big Balls reveals to us that AI stands for “Actual Indians”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week a new keyboard with a somewhat priapic name</itunes:summary>
      <itunes:subtitle>This week in InfoSec asks “what could go wrong with a third party holding all of your contact information?”
 
Rant of the Week demonstrates the value of deep vetting in security clearance

Billy Big Balls reveals to us that AI stands for “Actual Indians”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week a new keyboard with a somewhat priapic name</itunes:subtitle>
      <itunes:keywords>gina, april fools, grindr, keyboard, wragg, knob, china, lockbit, ai, amazon, epsilon</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>189</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b363157a-c935-45c1-b1af-b1f41b6e1a4a</guid>
      <title>Episode 188 The Don&apos;t Mention The Name Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec   (07:32)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>20th March 2007: Dragos Ruiu announced the first Pwn2Own contest, which was held that April in Vancouver, Canada. The contest is still being held today - and in fact Pwn2Own Vancouver 2024 started today.</p><p><a href="https://twitter.com/todayininfosec/status/1770592695255249038">https://twitter.com/todayininfosec/status/1770592695255249038</a></p><p>16th March 1971: The first computer virus, Creeper, infected computers on the ARPANET, displaying "I'M THE CREEPER : CATCH ME IF YOU CAN." It was named after the Creeper - a villain from a 1970 episode of the TV series "Scooby-Doo, Where Are You!"</p><p><a href="https://twitter.com/todayininfosec/status/1768973007555375317">https://twitter.com/todayininfosec/status/1768973007555375317</a></p><p> </p><p><strong>Rant of the Week (14:29)</strong></p><p><a href="https://www.theregister.com/2024/03/27/america_ad_blocker/">Majority of Americans now use ad blockers</a></p><p>More than half of Americans are using ad blocking software, and among advertising, programming, and security professionals that fraction is more like two-thirds to three-quarters.</p><p>According to a survey of 2,000 Americans conducted by research firm Censuswide, on behalf of Ghostery, a maker of software to block ads and online tracking, <a href="https://www.ghostery.com/blog/privacy-report-advertisers-and-adblockers">52 percent of Americans</a> now use an ad blocker, up from 34 percent according to 2022 Statista data.</p><p> </p><p><strong>Billy Big Balls of the Week (23:01)</strong></p><p><br /><a href="https://www.theregister.com/2024/03/28/japan_nk_arrests/">Execs in Japan busted for winning dev bids then outsourcing to North Koreans</a></p><p>Two executives were issued arrest warrants in Japan on Wednesday, reportedly for charges related to establishing a business that outsourced work to North Korean IT engineers.</p><p>At least one of the individuals – a 53 year old named Pak Hyon-il – is a South Korean national. His alleged accomplice, 42-year old Toshiron Minomo, is Japanese and once worked for Hyon-il, according to <a href="https://jen.jiji.com/jc/eng?g=eco&k=2024032700860">local media</a>.</p><p>Pak served as president of Fuchu-based IT firm ITZ, while Minomo was the head of Fukuyama-based Robast.</p><p> </p><p><strong>Industry News (29:09)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-blames-china-for-2021-electoral/">UK Blames China for 2021 Hack Targeting Millions of Voters' Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-scams-targets-ozempic/">Fake Ozempic Deals on the Rise as Experts Warn of Phishing Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/portugal-worldcoin-stop-biometric/">Portugal Forces Sam Altman's Worldcoin to Stop Collecting Biometric Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/boards-cyber-expertise-financial/">Only 5% of Boards Have Cybersecurity Expertise, Despite Financial Benefits</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-law-enforcers-arrest-400-fraud/">UK Law Enforcers Arrest 400 in Major Fraud Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-asean-entities/">Chinese Hackers Target ASEAN Entities in Espionage Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-clinical-data-leaked-ransomware/">NHS Trust Confirms Clinical Data Leaked by “Recognized Ransomware Group”</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-financial-ai/">US Treasury Urges Financial Sector to Address AI Cybersecurity Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-update-circia-us-defense/">CISA Launches New Cyber Incident Reporting Rules for US Defense Contractors</a></p><p> </p><p><strong>Tweet of the Week  (40:52)</strong></p><img src="https://lh7-us.googleusercontent.com/WjmFTrQVg-bPgQRoWszYobQZNtkmLIXsiJWrF-mL6mSrRlia29gtldClyd5r7wih6Z2T7EcrLBNp_jkNrW6DAyVyJNqFj9SAKvL9SP01RKUfUxPb2yEBG-PWjKlR2UA9rBXfrThSG-hhWsn--NBfloM" /><p><a href="https://twitter.com/bettersafetynet/status/1773626490384511113">https://twitter.com/bettersafetynet/status/1773626490384511113</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 1 Apr 2024 19:38:29 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-188-e4uSXj7Q</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec   (07:32)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>20th March 2007: Dragos Ruiu announced the first Pwn2Own contest, which was held that April in Vancouver, Canada. The contest is still being held today - and in fact Pwn2Own Vancouver 2024 started today.</p><p><a href="https://twitter.com/todayininfosec/status/1770592695255249038">https://twitter.com/todayininfosec/status/1770592695255249038</a></p><p>16th March 1971: The first computer virus, Creeper, infected computers on the ARPANET, displaying "I'M THE CREEPER : CATCH ME IF YOU CAN." It was named after the Creeper - a villain from a 1970 episode of the TV series "Scooby-Doo, Where Are You!"</p><p><a href="https://twitter.com/todayininfosec/status/1768973007555375317">https://twitter.com/todayininfosec/status/1768973007555375317</a></p><p> </p><p><strong>Rant of the Week (14:29)</strong></p><p><a href="https://www.theregister.com/2024/03/27/america_ad_blocker/">Majority of Americans now use ad blockers</a></p><p>More than half of Americans are using ad blocking software, and among advertising, programming, and security professionals that fraction is more like two-thirds to three-quarters.</p><p>According to a survey of 2,000 Americans conducted by research firm Censuswide, on behalf of Ghostery, a maker of software to block ads and online tracking, <a href="https://www.ghostery.com/blog/privacy-report-advertisers-and-adblockers">52 percent of Americans</a> now use an ad blocker, up from 34 percent according to 2022 Statista data.</p><p> </p><p><strong>Billy Big Balls of the Week (23:01)</strong></p><p><br /><a href="https://www.theregister.com/2024/03/28/japan_nk_arrests/">Execs in Japan busted for winning dev bids then outsourcing to North Koreans</a></p><p>Two executives were issued arrest warrants in Japan on Wednesday, reportedly for charges related to establishing a business that outsourced work to North Korean IT engineers.</p><p>At least one of the individuals – a 53 year old named Pak Hyon-il – is a South Korean national. His alleged accomplice, 42-year old Toshiron Minomo, is Japanese and once worked for Hyon-il, according to <a href="https://jen.jiji.com/jc/eng?g=eco&k=2024032700860">local media</a>.</p><p>Pak served as president of Fuchu-based IT firm ITZ, while Minomo was the head of Fukuyama-based Robast.</p><p> </p><p><strong>Industry News (29:09)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-blames-china-for-2021-electoral/">UK Blames China for 2021 Hack Targeting Millions of Voters' Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-scams-targets-ozempic/">Fake Ozempic Deals on the Rise as Experts Warn of Phishing Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/portugal-worldcoin-stop-biometric/">Portugal Forces Sam Altman's Worldcoin to Stop Collecting Biometric Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/boards-cyber-expertise-financial/">Only 5% of Boards Have Cybersecurity Expertise, Despite Financial Benefits</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-law-enforcers-arrest-400-fraud/">UK Law Enforcers Arrest 400 in Major Fraud Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-asean-entities/">Chinese Hackers Target ASEAN Entities in Espionage Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-clinical-data-leaked-ransomware/">NHS Trust Confirms Clinical Data Leaked by “Recognized Ransomware Group”</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-financial-ai/">US Treasury Urges Financial Sector to Address AI Cybersecurity Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-update-circia-us-defense/">CISA Launches New Cyber Incident Reporting Rules for US Defense Contractors</a></p><p> </p><p><strong>Tweet of the Week  (40:52)</strong></p><img src="https://lh7-us.googleusercontent.com/WjmFTrQVg-bPgQRoWszYobQZNtkmLIXsiJWrF-mL6mSrRlia29gtldClyd5r7wih6Z2T7EcrLBNp_jkNrW6DAyVyJNqFj9SAKvL9SP01RKUfUxPb2yEBG-PWjKlR2UA9rBXfrThSG-hhWsn--NBfloM" /><p><a href="https://twitter.com/bettersafetynet/status/1773626490384511113">https://twitter.com/bettersafetynet/status/1773626490384511113</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44822268" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3d6b419e-bff7-4327-8dc2-9bbf25daf79a/audio/0f5a4086-4d96-4ead-b737-c1de915fcdf9/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 188 The Don&apos;t Mention The Name Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3e6aeeba-5763-4198-95d2-24764f82a9d6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:41</itunes:duration>
      <itunes:summary>This week in InfoSec really requires people more qualified than us to discuss
 
Rant of the Week is all about blocking and tackling (as the Americans say)

Billy Big Balls is the ultimate outsourcing hack that companies don’t want you to know
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a challenge to change your mind</itunes:summary>
      <itunes:subtitle>This week in InfoSec really requires people more qualified than us to discuss
 
Rant of the Week is all about blocking and tackling (as the Americans say)

Billy Big Balls is the ultimate outsourcing hack that companies don’t want you to know
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a challenge to change your mind</itunes:subtitle>
      <itunes:keywords>creeper, ad blocking, north korea, ned, phishing, nhs, outsourcing, japan, pwn2own, china!, ozempic</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>188</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8db3d2c1-da9a-4e3a-8ed2-8edbcf41a154</guid>
      <title>Episode 187 - Mess of Trois</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (14:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th March 2017: WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency (CIA). Code-named Vault 7 by WikiLeaks, it was the largest ever publication of confidential documents on the agency.</p><p><a href="https://twitter.com/todayininfosec/status/1765828993713090565">https://twitter.com/todayininfosec/status/1765828993713090565</a></p><p>14th March 2013: Security journalist Brian Krebs was swatted when police responded to a spoofed 911 call claiming Russians had broken into his home and had shot his wife.</p><p>One of several people who made the false report, Eric Taylor (aka Cosmo the God), was sentenced to probation in 2017.</p><p><a href="https://twitter.com/todayininfosec/status/1768253237260435814">https://twitter.com/todayininfosec/status/1768253237260435814</a></p><p> </p><p><strong>Rant of the Week (21:38)</strong></p><p><a href="https://www.theregister.com/2024/03/14/us_congress_passes_tiktok_ban/">US Congress goes bang, bang, on TikTok sale-or-ban plan</a></p><p>The United States House of Representatives on Wednesday passed the Protecting Americans from Foreign Adversary Controlled Applications Act – a law aimed at forcing TikTok's Chinese parent ByteDance to sell the app's US operations or face the prospect of a ban.</p><p>The bill names only TikTok as a "foreign adversary controlled application" and prohibits "Providing services to distribute, maintain, or update" the app – including by offering it for sale in an app store. Even updates to the app aren't allowed.</p><p>If TikTok's US operations were locally owned and operated, none of the sanctions the bill mentions would be enforceable. And US lawmakers' fears that TikTok gives Beijing a way to gather intelligence and surveil citizens would be eased.</p><p><i>[Related or coincidental? Or a BBB?]</i></p><p><a href="https://www.theregister.com/2024/03/14/tiktok_mnuchin/">Former US Treasury secretary Steve Mnuchin thinking about buying TikTok</a></p><p>On the heels of the US House of Representatives passing a TikTok ban bill, former US Treasury secretary and private equity mogul Steve Mnuchin is apparently thinking about buying the platform.</p><p>Speaking to CNBC's pre-market team at Squawk Box, Mnuchin said he hoped the TikTok ban would pass in the Senate, forcing a sale of the platform to a US-based parent. </p><p>"It's a great business and I'm going to put together a group to buy TikTok," Mnuchin <a href="https://www.cnbc.com/2024/03/14/former-treasury-secretary-mnuchin-is-putting-together-an-investor-group-to-buy-tiktok.html">told</a> CNBC. Mnuchin didn't mention whether partners had been identified, or what phase the purchase was in.</p><p> </p><p><strong>Billy Big Balls of the Week (32:14)</strong></p><p><br /><a href="https://krebsonsecurity.com/2024/03/ceo-of-data-privacy-company-onerep-com-founded-dozens-of-people-search-firms/">CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms</a></p><p>The data privacy company Onerep.com bills itself as a Virginia-based service for helping people remove their personal information from almost 200 people-search websites. However, an investigation into the history of onerep.com finds this company is operating out of Belarus and Cyprus, and that its founder has launched dozens of people-search services over the years.</p><p>Onerep’s “Protect” service starts at $8.33 per month for individuals and $15/mo for families, and promises to remove your personal information from nearly 200 people-search sites. Onerep also markets its service to companies seeking to offer their employees the ability to have their data continuously removed from people-search sites.</p><p> </p><p><strong>Industry News (41:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/unitedhealth-restore-change/">UnitedHealth Sets Timeline to Restore Change Healthcare Systems After BlackCat Hit</a></p><p><a href="https://www.infosecurity-magazine.com/news/russias-midnight-blizzard/">Russia’s Midnight Blizzard Accesses Microsoft Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-party-mfa-british-library/">Third-Party Breach and Missing MFA Contributed to British Library Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawmakers-governments-ostrich/">Lawmakers Slam UK Government’s “Ostrich Strategy” for Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-restrict-election-answers/">Google to Restrict Election-Related Answers on AI Chatbot Gemini</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-sues-former-vp-defection-ai/">Meta Sues Former VP After Defection to AI Startup</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-paid-10m-bug-bounties/">Google Paid $10m in Bug Bounties to Security Researchers in 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-employment-agency-data/">French Employment Agency Data Breach Could Affect 43 Million People</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-faces-us-ban-house-votes/">TikTok Faces US Ban as House Votes to Compel ByteDance to Sell</a></p><p> </p><p><strong>Tweet of the Week (50:29)</strong></p><img src="https://lh7-us.googleusercontent.com/DIb42osr61lmmlHzVkoB_kJTOZMlPY8H-0gRXkqGo7l-Es1QPcQuqhtBuf00vigZeZ4A0UbG5HhNe_GRS6jaZHUMaojx9o6ytKjOU3BkoMzFBVY-u0dAybweuru_WsEMAgaXgyzjfwaIe_ovNaVGzLo" /><p><a href="https://twitter.com/andylapteff/status/1767952062279492006">https://twitter.com/andylapteff/status/1767952062279492006</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sun, 17 Mar 2024 18:35:22 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-187-_68zx9_s</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (14:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th March 2017: WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency (CIA). Code-named Vault 7 by WikiLeaks, it was the largest ever publication of confidential documents on the agency.</p><p><a href="https://twitter.com/todayininfosec/status/1765828993713090565">https://twitter.com/todayininfosec/status/1765828993713090565</a></p><p>14th March 2013: Security journalist Brian Krebs was swatted when police responded to a spoofed 911 call claiming Russians had broken into his home and had shot his wife.</p><p>One of several people who made the false report, Eric Taylor (aka Cosmo the God), was sentenced to probation in 2017.</p><p><a href="https://twitter.com/todayininfosec/status/1768253237260435814">https://twitter.com/todayininfosec/status/1768253237260435814</a></p><p> </p><p><strong>Rant of the Week (21:38)</strong></p><p><a href="https://www.theregister.com/2024/03/14/us_congress_passes_tiktok_ban/">US Congress goes bang, bang, on TikTok sale-or-ban plan</a></p><p>The United States House of Representatives on Wednesday passed the Protecting Americans from Foreign Adversary Controlled Applications Act – a law aimed at forcing TikTok's Chinese parent ByteDance to sell the app's US operations or face the prospect of a ban.</p><p>The bill names only TikTok as a "foreign adversary controlled application" and prohibits "Providing services to distribute, maintain, or update" the app – including by offering it for sale in an app store. Even updates to the app aren't allowed.</p><p>If TikTok's US operations were locally owned and operated, none of the sanctions the bill mentions would be enforceable. And US lawmakers' fears that TikTok gives Beijing a way to gather intelligence and surveil citizens would be eased.</p><p><i>[Related or coincidental? Or a BBB?]</i></p><p><a href="https://www.theregister.com/2024/03/14/tiktok_mnuchin/">Former US Treasury secretary Steve Mnuchin thinking about buying TikTok</a></p><p>On the heels of the US House of Representatives passing a TikTok ban bill, former US Treasury secretary and private equity mogul Steve Mnuchin is apparently thinking about buying the platform.</p><p>Speaking to CNBC's pre-market team at Squawk Box, Mnuchin said he hoped the TikTok ban would pass in the Senate, forcing a sale of the platform to a US-based parent. </p><p>"It's a great business and I'm going to put together a group to buy TikTok," Mnuchin <a href="https://www.cnbc.com/2024/03/14/former-treasury-secretary-mnuchin-is-putting-together-an-investor-group-to-buy-tiktok.html">told</a> CNBC. Mnuchin didn't mention whether partners had been identified, or what phase the purchase was in.</p><p> </p><p><strong>Billy Big Balls of the Week (32:14)</strong></p><p><br /><a href="https://krebsonsecurity.com/2024/03/ceo-of-data-privacy-company-onerep-com-founded-dozens-of-people-search-firms/">CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms</a></p><p>The data privacy company Onerep.com bills itself as a Virginia-based service for helping people remove their personal information from almost 200 people-search websites. However, an investigation into the history of onerep.com finds this company is operating out of Belarus and Cyprus, and that its founder has launched dozens of people-search services over the years.</p><p>Onerep’s “Protect” service starts at $8.33 per month for individuals and $15/mo for families, and promises to remove your personal information from nearly 200 people-search sites. Onerep also markets its service to companies seeking to offer their employees the ability to have their data continuously removed from people-search sites.</p><p> </p><p><strong>Industry News (41:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/unitedhealth-restore-change/">UnitedHealth Sets Timeline to Restore Change Healthcare Systems After BlackCat Hit</a></p><p><a href="https://www.infosecurity-magazine.com/news/russias-midnight-blizzard/">Russia’s Midnight Blizzard Accesses Microsoft Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-party-mfa-british-library/">Third-Party Breach and Missing MFA Contributed to British Library Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawmakers-governments-ostrich/">Lawmakers Slam UK Government’s “Ostrich Strategy” for Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-restrict-election-answers/">Google to Restrict Election-Related Answers on AI Chatbot Gemini</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-sues-former-vp-defection-ai/">Meta Sues Former VP After Defection to AI Startup</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-paid-10m-bug-bounties/">Google Paid $10m in Bug Bounties to Security Researchers in 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-employment-agency-data/">French Employment Agency Data Breach Could Affect 43 Million People</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-faces-us-ban-house-votes/">TikTok Faces US Ban as House Votes to Compel ByteDance to Sell</a></p><p> </p><p><strong>Tweet of the Week (50:29)</strong></p><img src="https://lh7-us.googleusercontent.com/DIb42osr61lmmlHzVkoB_kJTOZMlPY8H-0gRXkqGo7l-Es1QPcQuqhtBuf00vigZeZ4A0UbG5HhNe_GRS6jaZHUMaojx9o6ytKjOU3BkoMzFBVY-u0dAybweuru_WsEMAgaXgyzjfwaIe_ovNaVGzLo" /><p><a href="https://twitter.com/andylapteff/status/1767952062279492006">https://twitter.com/andylapteff/status/1767952062279492006</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53025553" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6b7936ae-0596-48c5-8176-38ac0d2f5196/audio/ee36da68-f210-47b9-99de-c3d2bae0d503/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 187 - Mess of Trois</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/cf1446b1-77d3-4f5e-9626-7485425c551a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:14</itunes:duration>
      <itunes:summary>This week in InfoSec is a tale software unknowingly spying on citizens of another nation
 
Rant of the Week is a story about the app which poses a threat to national security

Billy Big Balls is a story of playing both sides
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a recap of the rules of surveillance </itunes:summary>
      <itunes:subtitle>This week in InfoSec is a tale software unknowingly spying on citizens of another nation
 
Rant of the Week is a story about the app which poses a threat to national security

Billy Big Balls is a story of playing both sides
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a recap of the rules of surveillance </itunes:subtitle>
      <itunes:keywords>onerep.com, krebs, cia, cambridge analytica, swatting, dodgy, france, wikileaks, tiktok, meta, instagram</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>187</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1b1bef42-28a9-4a61-93f9-5b042013fa94</guid>
      <title>Episode 186</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (06:53)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy.</p><p>The virus would show a small ball bouncing around the screen in both text mode (ASCII character "•") and graphical mode.</p><p><a href="https://twitter.com/todayininfosec/status/1763540406443163705">https://twitter.com/todayininfosec/status/1763540406443163705</a>  </p><p>26th February 2004: Antivirus firm F-Secure apologized for sending the Netsky.B virus to 1000s of its UK customers & partners via a mailing list. The unknown sender sent it through the email list server, which didn't scan for viruses. And there was no business reason to accept external emails.</p><p><a href="https://twitter.com/todayininfosec/status/1762092359313936553">https://twitter.com/todayininfosec/status/1762092359313936553</a>  </p><p> </p><p><strong>Rant of the Week (11:48)</strong></p><p><a href="https://www.theregister.com/2024/02/29/meta_gdpr_complaints/">Meta's pay-or-consent model hides 'massive illegal data processing ops': lawsuit</a></p><p>Consumer groups are filing legal complaints in the EU in a coordinated attempt to use data protection law to stop Meta from giving local users a "fake choice" between paying up and consenting to being profiled and tracked via data collection.</p><p> </p><p><strong>Billy Big Balls of the Week (20:16)</strong></p><p><a href="https://www.theregister.com/2024/02/26/in_brief_security/">Fox News 'hacker' turns out to be journalist whose lawyers say was doing his job</a></p><p> A Florida journalist has been arrested and charged with breaking into protected computer systems in a case his lawyers say was less "hacking," more "good investigative journalism." </p><p>Tim Burke was arrested on Thursday and <a href="https://www.tampabay.com/news/tampa/2024/02/22/tim-burke-fox-news-indicted-tucker-carlson-federal-charges/">charged</a> with one count of conspiracy, six counts of accessing a protected computer without authorization, and seven counts of intercepting or disclosing wire, oral or electronic communications for his supposed role in the theft of unedited video streams from Fox News.</p><p> </p><p><strong>Industry News (27:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-unveils-draft-cybersecurity/">UK Unveils Draft Cybersecurity Governance Code to Boost Business Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/roblox-credentials-exposed-dark-web/">34 Million Roblox Credentials Exposed on Dark Web in Three Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-bans-mass-sale-data-hostile-1/">Biden Bans Mass Sale of Data to Hostile Nations</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-biggest-target-blackcat/">US Government Warns Healthcare is Biggest Target for BlackCat Affiliates</a></p><p><a href="https://www.infosecurity-magazine.com/news/savvy-seahorse-investment-dns-scam/">Savvy Seahorse Targets Investment Platforms With DNS Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/cencora-reports-cybersecurity/">Pharma Giant Cencora Reports Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-office-data-protection-migrant/">UK Home Office Breached Data Protection Law with Migrant Tracking Program, ICO Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-warn-ivanti/">Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-chinese-cars-us-data/">Biden Warns Chinese Cars Could Steal US Citizens' Data</a></p><p> </p><p><strong>Tweet of the Week (35:17)</strong></p><img src="https://lh7-us.googleusercontent.com/t_9QwMIuzogLstJW00w4NOWsjzZjNYjDJTcmm17fJwQiEvZLjFy2V9IoT3BA9iwgWW942wsJPJonpCswbmnh-d9zA5rSyNyRT4t2LQnn9wsj24JP2Rl8B7LZk6lHDQ4lDOajsA36_n5Zd_jNoxu47jg" /><p><a href="https://twitter.com/_FN8_/status/1762583435745402951">https://twitter.com/_FN8_/status/1762583435745402951</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Tue, 5 Mar 2024 00:16:39 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-186-uGnY_0_U</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (06:53)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy.</p><p>The virus would show a small ball bouncing around the screen in both text mode (ASCII character "•") and graphical mode.</p><p><a href="https://twitter.com/todayininfosec/status/1763540406443163705">https://twitter.com/todayininfosec/status/1763540406443163705</a>  </p><p>26th February 2004: Antivirus firm F-Secure apologized for sending the Netsky.B virus to 1000s of its UK customers & partners via a mailing list. The unknown sender sent it through the email list server, which didn't scan for viruses. And there was no business reason to accept external emails.</p><p><a href="https://twitter.com/todayininfosec/status/1762092359313936553">https://twitter.com/todayininfosec/status/1762092359313936553</a>  </p><p> </p><p><strong>Rant of the Week (11:48)</strong></p><p><a href="https://www.theregister.com/2024/02/29/meta_gdpr_complaints/">Meta's pay-or-consent model hides 'massive illegal data processing ops': lawsuit</a></p><p>Consumer groups are filing legal complaints in the EU in a coordinated attempt to use data protection law to stop Meta from giving local users a "fake choice" between paying up and consenting to being profiled and tracked via data collection.</p><p> </p><p><strong>Billy Big Balls of the Week (20:16)</strong></p><p><a href="https://www.theregister.com/2024/02/26/in_brief_security/">Fox News 'hacker' turns out to be journalist whose lawyers say was doing his job</a></p><p> A Florida journalist has been arrested and charged with breaking into protected computer systems in a case his lawyers say was less "hacking," more "good investigative journalism." </p><p>Tim Burke was arrested on Thursday and <a href="https://www.tampabay.com/news/tampa/2024/02/22/tim-burke-fox-news-indicted-tucker-carlson-federal-charges/">charged</a> with one count of conspiracy, six counts of accessing a protected computer without authorization, and seven counts of intercepting or disclosing wire, oral or electronic communications for his supposed role in the theft of unedited video streams from Fox News.</p><p> </p><p><strong>Industry News (27:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-unveils-draft-cybersecurity/">UK Unveils Draft Cybersecurity Governance Code to Boost Business Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/roblox-credentials-exposed-dark-web/">34 Million Roblox Credentials Exposed on Dark Web in Three Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-bans-mass-sale-data-hostile-1/">Biden Bans Mass Sale of Data to Hostile Nations</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-biggest-target-blackcat/">US Government Warns Healthcare is Biggest Target for BlackCat Affiliates</a></p><p><a href="https://www.infosecurity-magazine.com/news/savvy-seahorse-investment-dns-scam/">Savvy Seahorse Targets Investment Platforms With DNS Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/cencora-reports-cybersecurity/">Pharma Giant Cencora Reports Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-office-data-protection-migrant/">UK Home Office Breached Data Protection Law with Migrant Tracking Program, ICO Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-warn-ivanti/">Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-chinese-cars-us-data/">Biden Warns Chinese Cars Could Steal US Citizens' Data</a></p><p> </p><p><strong>Tweet of the Week (35:17)</strong></p><img src="https://lh7-us.googleusercontent.com/t_9QwMIuzogLstJW00w4NOWsjzZjNYjDJTcmm17fJwQiEvZLjFy2V9IoT3BA9iwgWW942wsJPJonpCswbmnh-d9zA5rSyNyRT4t2LQnn9wsj24JP2Rl8B7LZk6lHDQ4lDOajsA36_n5Zd_jNoxu47jg" /><p><a href="https://twitter.com/_FN8_/status/1762583435745402951">https://twitter.com/_FN8_/status/1762583435745402951</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38640234" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/322d6fde-b1c3-437b-bd1d-071513c34854/audio/4d6d54b5-f0bc-48c9-8820-57cacc0db0b2/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 186</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/81fb79ec-43d9-43c5-b1d7-968683344614/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:14</itunes:duration>
      <itunes:summary>This week in InfoSec is a tale of two viruses
 
Rant of the Week is Meta being meta

Billy Big Balls uses the legal defence “it’s just a prank, bro!”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a password trick Hackers HATE</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a tale of two viruses
 
Rant of the Week is Meta being meta

Billy Big Balls uses the legal defence “it’s just a prank, bro!”
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a password trick Hackers HATE</itunes:subtitle>
      <itunes:keywords>biden, consent, migrant tracking, ivanti, f-secure, hacker, unhackable, fox news, facebook, china, five eyes, ping-pong, roblox, privacy, meta</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>186</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9764df89-04b9-47a6-b3df-f9488b1d7c94</guid>
      <title>Episode 185 - The Inexplicable Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (06:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>16th February 2010: Version 2.0 of the CWE/SANS Top 25 Most Dangerous Software Errors was released.</p><p>Take a look and decide which of these weaknesses have been eradicated over the last 14 years.</p><p><a href="https://web.archive.org/web/20110704200131/https://www.sans.org/top25-software-errors/2010/">Web Archive</a></p><img src="https://lh7-us.googleusercontent.com/NQ1S34wT4XcwPdnTYKmmBeRhv_K39zSirK_UGYjJ77dcvBwkWAwuxaZmKqBYI6nkkkzv486mjk36ZCC8ST5TEvJayN1HcHRsQ7rlt7uxpjRmfXaPlMU_1lV6t_wh_TgNJuxlTJyHF47jyJVdQN8ZXLc" /><p><a href="https://twitter.com/todayininfosec/status/1758712418601971748">https://twitter.com/todayininfosec/status/1758712418601971748</a></p><p>20th February 2003: Alan Giang Tran, former network admin for 2 companies, was arrested after allegedly destroying data on the companies' networks. Two months later he pleaded guilty to a federal charge of intentionally causing damage to a protected computer.</p><img src="https://lh7-us.googleusercontent.com/-MGShkZewWIg0cPur3-Ddd7bcdefX1QH2wqQp_CFCehLwBj_XEKx8NquhEhRzWssEYll6BeU9r4Ntdy4lDf1fHziHKg9qkhsUAepvnL6cu4FVmEL78-k5SyVeETYuo-tN3PfZy7rE8DZY6yIupUA1e4" /><p><a href="https://twitter.com/todayininfosec/status/1760021831354896443">https://twitter.com/todayininfosec/status/1760021831354896443</a></p><p> </p><p><strong>Rant of the Week (14:01)</strong></p><p><a href="https://www.theverge.com/2024/2/22/24080135/avast-security-privacy-software-ftc-fine-data-harvesting">Avast fined $16.5 million for ‘privacy’ software that actually sold users’ browsing data</a></p><p>Avast, the cybersecurity software company, is facing a $16.5 million fine after it was caught storing and selling customer information without their consent. The <a href="https://www.ftc.gov/news-events/news/press-releases/2024/02/ftc-order-will-ban-avast-selling-browsing-data-advertising-purposes-require-it-pay-165-million-over">Federal Trade Commission (FTC) announced</a> the fine on Thursday and said that it’s banning Avast from selling user data for advertising purposes.</p><p>From at least 2014 to 2020, Avast harvested user web browsing information through its antivirus software and browser extension, according to <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/Complaint-Avast.pdf">the FTC’s complaint</a>. This allowed it to collect data on religious beliefs, health concerns, political views, locations, and financial status. The company then stored this information “indefinitely” and sold it to over 100 third parties without the knowledge of customers, the complaint says.</p><p> </p><p><strong>Billy Big Balls of the Week(25:02)</strong><br /><a href="https://www.bbc.co.uk/news/business-68379318">Husband 'made over a million' by eavesdropping on BP wife</a></p><p>The husband of a BP employee has been charged with insider trading in the US following claims he overheard details of calls made by his wife while working from home.</p><p>The US Securities and Exchange Commission alleged Tyler Loudon made $1.76m (£1.39m) in illegal profits.</p><p>The regulator claimed Mr Loudon heard several of his wife's conversations about BP's takeover of TravelCenters of America and bought shares in the firm.</p><p>BP has declined to comment.</p><p>The SEC said: "We allege that Mr Loudon took advantage of his remote working conditions and his wife's trust to profit from information he knew was confidential."</p><p>His wife - a mergers and acquisitions manager at BP - worked on the oil giant's takeover of TravelCenters. </p><p>The SEC said Mr Loudon purchased 46,450 shares of TravelCenter's stock, without his wife's knowledge, before the deal was made public in February last year.</p><p>Following the announcement, TravelCenter's share price rose nearly 71% and Mr Loudon allegedly immediately sold all of his newly-bought shares for a profit, the SEC said.</p><p> </p><p><strong>Industry News (32:16)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-falls-one/">Attacker Breakout Time Falls to Just One Hour</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-alarm-private-branch-exchange/">NCSC Sounds Alarm Over Private Branch Exchange Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-order-maritime-cybersecurity/">Biden Executive Order to Bolster US Maritime Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-cvss-100-screenconnect/">Ransomware Warning as CVSS 10.0 ScreenConnect Bug is Exploited</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-duo-guilty-3m-apple-fraud/">Chinese Duo Found Guilty of $3m Apple Fraud Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/owasp-security-checklist/">OWASP Releases Security Checklist for Generative AI Deployment</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-network-doppelganger/">Russian-Aligned Network Doppelgänger Targets German Elections</a></p><p><a href="https://www.infosecurity-magazine.com/news/change-healthcare-cyber/">Change Healthcare Cyber-Attack Leads to Prescription Delays</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-bans-serco-facial-recognition/">ICO Bans Serco Leisure's Use of Facial Recognition for Employee Attendance</a></p><p> </p><p><strong>Tweet of the Week (42:37)</strong></p><img src="https://lh7-us.googleusercontent.com/qiBcdlfJs1OciBFoTSkSO6j-rHTKqeGPsY88Zz5AbT2XgpV4ZvPDv-jNhkgZv-M1dlbADn5xziczQBylylQ09PBuDxjhxNOMJenRdqHuRR2G6hRHuFETKH1CAKKHZtPnxKRhrpLtyuAj1ZeS2SAefMQ" /><p><a href="https://twitter.com/lauriewired/status/1760751495073640705">https://twitter.com/lauriewired/status/1760751495073640705</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 26 Feb 2024 19:57:26 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-185-WUXJ7kMG</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (06:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>16th February 2010: Version 2.0 of the CWE/SANS Top 25 Most Dangerous Software Errors was released.</p><p>Take a look and decide which of these weaknesses have been eradicated over the last 14 years.</p><p><a href="https://web.archive.org/web/20110704200131/https://www.sans.org/top25-software-errors/2010/">Web Archive</a></p><img src="https://lh7-us.googleusercontent.com/NQ1S34wT4XcwPdnTYKmmBeRhv_K39zSirK_UGYjJ77dcvBwkWAwuxaZmKqBYI6nkkkzv486mjk36ZCC8ST5TEvJayN1HcHRsQ7rlt7uxpjRmfXaPlMU_1lV6t_wh_TgNJuxlTJyHF47jyJVdQN8ZXLc" /><p><a href="https://twitter.com/todayininfosec/status/1758712418601971748">https://twitter.com/todayininfosec/status/1758712418601971748</a></p><p>20th February 2003: Alan Giang Tran, former network admin for 2 companies, was arrested after allegedly destroying data on the companies' networks. Two months later he pleaded guilty to a federal charge of intentionally causing damage to a protected computer.</p><img src="https://lh7-us.googleusercontent.com/-MGShkZewWIg0cPur3-Ddd7bcdefX1QH2wqQp_CFCehLwBj_XEKx8NquhEhRzWssEYll6BeU9r4Ntdy4lDf1fHziHKg9qkhsUAepvnL6cu4FVmEL78-k5SyVeETYuo-tN3PfZy7rE8DZY6yIupUA1e4" /><p><a href="https://twitter.com/todayininfosec/status/1760021831354896443">https://twitter.com/todayininfosec/status/1760021831354896443</a></p><p> </p><p><strong>Rant of the Week (14:01)</strong></p><p><a href="https://www.theverge.com/2024/2/22/24080135/avast-security-privacy-software-ftc-fine-data-harvesting">Avast fined $16.5 million for ‘privacy’ software that actually sold users’ browsing data</a></p><p>Avast, the cybersecurity software company, is facing a $16.5 million fine after it was caught storing and selling customer information without their consent. The <a href="https://www.ftc.gov/news-events/news/press-releases/2024/02/ftc-order-will-ban-avast-selling-browsing-data-advertising-purposes-require-it-pay-165-million-over">Federal Trade Commission (FTC) announced</a> the fine on Thursday and said that it’s banning Avast from selling user data for advertising purposes.</p><p>From at least 2014 to 2020, Avast harvested user web browsing information through its antivirus software and browser extension, according to <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/Complaint-Avast.pdf">the FTC’s complaint</a>. This allowed it to collect data on religious beliefs, health concerns, political views, locations, and financial status. The company then stored this information “indefinitely” and sold it to over 100 third parties without the knowledge of customers, the complaint says.</p><p> </p><p><strong>Billy Big Balls of the Week(25:02)</strong><br /><a href="https://www.bbc.co.uk/news/business-68379318">Husband 'made over a million' by eavesdropping on BP wife</a></p><p>The husband of a BP employee has been charged with insider trading in the US following claims he overheard details of calls made by his wife while working from home.</p><p>The US Securities and Exchange Commission alleged Tyler Loudon made $1.76m (£1.39m) in illegal profits.</p><p>The regulator claimed Mr Loudon heard several of his wife's conversations about BP's takeover of TravelCenters of America and bought shares in the firm.</p><p>BP has declined to comment.</p><p>The SEC said: "We allege that Mr Loudon took advantage of his remote working conditions and his wife's trust to profit from information he knew was confidential."</p><p>His wife - a mergers and acquisitions manager at BP - worked on the oil giant's takeover of TravelCenters. </p><p>The SEC said Mr Loudon purchased 46,450 shares of TravelCenter's stock, without his wife's knowledge, before the deal was made public in February last year.</p><p>Following the announcement, TravelCenter's share price rose nearly 71% and Mr Loudon allegedly immediately sold all of his newly-bought shares for a profit, the SEC said.</p><p> </p><p><strong>Industry News (32:16)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-falls-one/">Attacker Breakout Time Falls to Just One Hour</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-alarm-private-branch-exchange/">NCSC Sounds Alarm Over Private Branch Exchange Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-order-maritime-cybersecurity/">Biden Executive Order to Bolster US Maritime Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-cvss-100-screenconnect/">Ransomware Warning as CVSS 10.0 ScreenConnect Bug is Exploited</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-duo-guilty-3m-apple-fraud/">Chinese Duo Found Guilty of $3m Apple Fraud Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/owasp-security-checklist/">OWASP Releases Security Checklist for Generative AI Deployment</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-network-doppelganger/">Russian-Aligned Network Doppelgänger Targets German Elections</a></p><p><a href="https://www.infosecurity-magazine.com/news/change-healthcare-cyber/">Change Healthcare Cyber-Attack Leads to Prescription Delays</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-bans-serco-facial-recognition/">ICO Bans Serco Leisure's Use of Facial Recognition for Employee Attendance</a></p><p> </p><p><strong>Tweet of the Week (42:37)</strong></p><img src="https://lh7-us.googleusercontent.com/qiBcdlfJs1OciBFoTSkSO6j-rHTKqeGPsY88Zz5AbT2XgpV4ZvPDv-jNhkgZv-M1dlbADn5xziczQBylylQ09PBuDxjhxNOMJenRdqHuRR2G6hRHuFETKH1CAKKHZtPnxKRhrpLtyuAj1ZeS2SAefMQ" /><p><a href="https://twitter.com/lauriewired/status/1760751495073640705">https://twitter.com/lauriewired/status/1760751495073640705</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44703150" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/5dfec95a-9aaf-4464-8ead-e50388cc5d32/audio/d366f55d-b76c-4696-ac6e-ffeb944e84f5/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 185 - The Inexplicable Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0848ed16-2a5e-4ae7-a98e-9de2ab4e27cd/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:33</itunes:duration>
      <itunes:summary>This week in InfoSec is a story of a guy who made his defence lawyers case very difficult
 
Rant of the Week is a privacy snafu we’re not at all surprised about

Billy Big Balls is a man who made the most of working from home, literally
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a matter of perspective</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a story of a guy who made his defence lawyers case very difficult
 
Rant of the Week is a privacy snafu we’re not at all surprised about

Billy Big Balls is a man who made the most of working from home, literally
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a matter of perspective</itunes:subtitle>
      <itunes:keywords>cross site scripting, avast, ther duchess, facial recognition, apple, bp, sql injection, trigger warnings, owasp, ftc, insider trading, teisslondon</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>185</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a7b14c0-fa08-4017-9d11-5f9ffc407c5f</guid>
      <title>Episode 184 - The Bee in the Bonnet Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:40) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>14th February 2001: In a presentation at Black Hat Windows Security Conference 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop".</p><img src="https://lh7-us.googleusercontent.com/TNEu2kZftt78MCnUbB5XFNVfj-J4HIqOfJT1PmMFZu6UOvuvn2bxfK7cQx6L9nkf3b77XClR8gqE1DO2cWJSsxtqzkbmWKsu5Ml1BX0x13xwDVB-CzF4M2BPP_l4Jyxjq_RH_EUqLYpK1EnO2h4ZOxU" /><p> </p><p><a href="https://twitter.com/todayininfosec/status/1757782275406622835">https://twitter.com/todayininfosec/status/1757782275406622835</a></p><p>16th February 2004: The Netsky worm first appeared. It spread via an email attachment which after opened would search the computer for email addresses then email itself to those addresses. Its dozens of variants accounted for almost a quarter of malware detected in 2004.</p><img src="https://lh7-us.googleusercontent.com/WgILeWlA9CeGVkQUHrqiSxO_GkiGhgMOWcZs6EsyutBg3LVEMeB3CuIcrgUCC9yw6w2_kXPSUjDxWpzySZqtaOUZRQLgvFNMMQ4Wq-GaC_FArZ0PBIeBLRJmKp78TiNmIooVoeq49jBu2onJJKGVg7s" /><p><a href="https://twitter.com/todayininfosec/status/1758497889972576608">https://twitter.com/todayininfosec/status/1758497889972576608</a>      </p><p> </p><p><strong>Rant of the Week (5:10)</strong></p><p><a href="https://www.theregister.com/2024/02/15/air_canada_chatbot_fine/">Air Canada must pay damages after chatbot lies to grieving passenger about discount</a></p><p>Air Canada must pay a passenger hundreds of dollars in damages after its online chatbot gave the guy wrong information before he booked a flight.</p><p>Jake Moffatt took the airline to a small-claims tribunal after the biz refused to refund him for flights he booked from Vancouver to Toronto following the death of his grandmother in November last year. Before he bought the tickets, he researched Air Canada's bereavement fares – special low rates for those traveling due to the loss of an immediate family member – by querying its website chatbot.</p><p>The virtual assistant told him that if he purchased a normal-price ticket he would have up to 90 days to claim back a bereavement discount. Following that advice, Moffatt booked a one-way CA$794.98 ticket to Toronto, presumably to attend the funeral or attend to family, and later an CA$845.38 flight back to Vancouver.</p><p>He also spoke to an Air Canada representative who confirmed he would be able to get a bereavement discount on his flights and that he should expect to pay roughly $380 to get to Toronto and back. Crucially, the rep didn't say anything about being able to claim the discount as money back after purchasing a ticket.</p><p>When Moffatt later submitted his claim for a refund, and included a copy of his grandmother's death certificate, all well within that 90-day window, Air Canada turned him down.</p><p>Staff at the airline told him bereavement fare rates can't be claimed back after having already purchased flights, a policy at odds with what the support chatbot told Moffatt. It's understood the virtual assistant was automated, and not a person sat at a keyboard miles away.</p><p> </p><p><strong>Billy Big Balls of the Week (22:06)</strong><br /><a href="https://www.theregister.com/2024/02/12/australia_right_to_disconnect_law/?">Australia passes Right To Disconnect law, including (for now) jail time for bosses who email after-hours</a></p><p>Australia last week passed a Right To Disconnect law that forbids employers contacting workers after hours, with penalties including jail time for bosses who do the wrong thing.</p><p>The criminal sanction will soon be overturned – it was the result of parliamentary shenanigans rather than the government's intent – and the whole law could go too if opposition parties and business groups have their way.</p><p>European companies have already <a href="https://www.theregister.com/2021/06/30/feature_always_on_culture_notifications/">introduced</a> Right To Disconnect laws in response to digital devices blurring the boundaries between working hours and personal time. The laptops or phones employers provide have obvious after-hours uses, but also mean workers can find themselves browsing emailed or texted messages from their boss at all hours – sometimes with an expectation of a response. That expectation, labor rights orgs argue, extends the working day without increasing pay.</p><p>Right To Disconnect laws might better be termed "Right to not read or respond to messages from work" laws because that's what they seek to guarantee.</p><p> </p><p><strong>Industry News (31:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-india-election-cyber/">US, UK and India Among the Countries Most At Risk of Election Cyber Interference</a></p><p><a href="https://www.infosecurity-magazine.com/news/southern-water-notifies-customers/">Southern Water Notifies Customers and Employees of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-spending-slashed-smes/">Cybersecurity Spending Expected to be Slashed in 41% of SMEs</a></p><p><a href="https://www.infosecurity-magazine.com/news/goldpickaxe-trojan-biometric/">GoldPickaxe Trojan Blends Biometrics Theft and Deepfakes to Scam Banks</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-nation-states-gen-ai/">Microsoft, OpenAI Confirm Nation-States are Weaponizing Generative AI in Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/prudential-financial-faces-breach/">Prudential Financial Faces Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-warns-unfair-ai-rules/">Google Warns Unfair AI Rules Could Empower Hackers, Harming Defense</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-exploit-eu-agenda-spear/">Hackers Exploit EU Agenda in Spear Phishing Campaigns</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-ivanti-vulnerability-security/">New Ivanti Vulnerability Observed as Widespread Security Concerns Grow</a></p><p> </p><p><strong>Tweet of the Week (39:24)</strong></p><img src="https://lh7-us.googleusercontent.com/gGqIeST0nSN2e3gDLdqg0lwDxH2M7LULgLI3-_1v0L5eFnsLy9CeMC1ud9xxrPo80GKz5kXjsQMWlgYudqX6oxrP3F7m5oTvxfJIAusE-bKUmbPkzNqkgBNakENdVQAW5nqFrpxHR3KVffhnaaK3T10" /><p><a href="https://twitter.com/MalwareJake/status/1758454999380557885">https://twitter.com/MalwareJake/status/1758454999380557885</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 19 Feb 2024 20:18:14 +0000</pubDate>
      <author>thom@tl2security.com (overtime, right to disconnect, soc2, hitrust, iso27001, compliance, Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-184-PyR5Exu_</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:40) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>14th February 2001: In a presentation at Black Hat Windows Security Conference 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop".</p><img src="https://lh7-us.googleusercontent.com/TNEu2kZftt78MCnUbB5XFNVfj-J4HIqOfJT1PmMFZu6UOvuvn2bxfK7cQx6L9nkf3b77XClR8gqE1DO2cWJSsxtqzkbmWKsu5Ml1BX0x13xwDVB-CzF4M2BPP_l4Jyxjq_RH_EUqLYpK1EnO2h4ZOxU" /><p> </p><p><a href="https://twitter.com/todayininfosec/status/1757782275406622835">https://twitter.com/todayininfosec/status/1757782275406622835</a></p><p>16th February 2004: The Netsky worm first appeared. It spread via an email attachment which after opened would search the computer for email addresses then email itself to those addresses. Its dozens of variants accounted for almost a quarter of malware detected in 2004.</p><img src="https://lh7-us.googleusercontent.com/WgILeWlA9CeGVkQUHrqiSxO_GkiGhgMOWcZs6EsyutBg3LVEMeB3CuIcrgUCC9yw6w2_kXPSUjDxWpzySZqtaOUZRQLgvFNMMQ4Wq-GaC_FArZ0PBIeBLRJmKp78TiNmIooVoeq49jBu2onJJKGVg7s" /><p><a href="https://twitter.com/todayininfosec/status/1758497889972576608">https://twitter.com/todayininfosec/status/1758497889972576608</a>      </p><p> </p><p><strong>Rant of the Week (5:10)</strong></p><p><a href="https://www.theregister.com/2024/02/15/air_canada_chatbot_fine/">Air Canada must pay damages after chatbot lies to grieving passenger about discount</a></p><p>Air Canada must pay a passenger hundreds of dollars in damages after its online chatbot gave the guy wrong information before he booked a flight.</p><p>Jake Moffatt took the airline to a small-claims tribunal after the biz refused to refund him for flights he booked from Vancouver to Toronto following the death of his grandmother in November last year. Before he bought the tickets, he researched Air Canada's bereavement fares – special low rates for those traveling due to the loss of an immediate family member – by querying its website chatbot.</p><p>The virtual assistant told him that if he purchased a normal-price ticket he would have up to 90 days to claim back a bereavement discount. Following that advice, Moffatt booked a one-way CA$794.98 ticket to Toronto, presumably to attend the funeral or attend to family, and later an CA$845.38 flight back to Vancouver.</p><p>He also spoke to an Air Canada representative who confirmed he would be able to get a bereavement discount on his flights and that he should expect to pay roughly $380 to get to Toronto and back. Crucially, the rep didn't say anything about being able to claim the discount as money back after purchasing a ticket.</p><p>When Moffatt later submitted his claim for a refund, and included a copy of his grandmother's death certificate, all well within that 90-day window, Air Canada turned him down.</p><p>Staff at the airline told him bereavement fare rates can't be claimed back after having already purchased flights, a policy at odds with what the support chatbot told Moffatt. It's understood the virtual assistant was automated, and not a person sat at a keyboard miles away.</p><p> </p><p><strong>Billy Big Balls of the Week (22:06)</strong><br /><a href="https://www.theregister.com/2024/02/12/australia_right_to_disconnect_law/?">Australia passes Right To Disconnect law, including (for now) jail time for bosses who email after-hours</a></p><p>Australia last week passed a Right To Disconnect law that forbids employers contacting workers after hours, with penalties including jail time for bosses who do the wrong thing.</p><p>The criminal sanction will soon be overturned – it was the result of parliamentary shenanigans rather than the government's intent – and the whole law could go too if opposition parties and business groups have their way.</p><p>European companies have already <a href="https://www.theregister.com/2021/06/30/feature_always_on_culture_notifications/">introduced</a> Right To Disconnect laws in response to digital devices blurring the boundaries between working hours and personal time. The laptops or phones employers provide have obvious after-hours uses, but also mean workers can find themselves browsing emailed or texted messages from their boss at all hours – sometimes with an expectation of a response. That expectation, labor rights orgs argue, extends the working day without increasing pay.</p><p>Right To Disconnect laws might better be termed "Right to not read or respond to messages from work" laws because that's what they seek to guarantee.</p><p> </p><p><strong>Industry News (31:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-india-election-cyber/">US, UK and India Among the Countries Most At Risk of Election Cyber Interference</a></p><p><a href="https://www.infosecurity-magazine.com/news/southern-water-notifies-customers/">Southern Water Notifies Customers and Employees of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-spending-slashed-smes/">Cybersecurity Spending Expected to be Slashed in 41% of SMEs</a></p><p><a href="https://www.infosecurity-magazine.com/news/goldpickaxe-trojan-biometric/">GoldPickaxe Trojan Blends Biometrics Theft and Deepfakes to Scam Banks</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-nation-states-gen-ai/">Microsoft, OpenAI Confirm Nation-States are Weaponizing Generative AI in Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/prudential-financial-faces-breach/">Prudential Financial Faces Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-warns-unfair-ai-rules/">Google Warns Unfair AI Rules Could Empower Hackers, Harming Defense</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-exploit-eu-agenda-spear/">Hackers Exploit EU Agenda in Spear Phishing Campaigns</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-ivanti-vulnerability-security/">New Ivanti Vulnerability Observed as Widespread Security Concerns Grow</a></p><p> </p><p><strong>Tweet of the Week (39:24)</strong></p><img src="https://lh7-us.googleusercontent.com/gGqIeST0nSN2e3gDLdqg0lwDxH2M7LULgLI3-_1v0L5eFnsLy9CeMC1ud9xxrPo80GKz5kXjsQMWlgYudqX6oxrP3F7m5oTvxfJIAusE-bKUmbPkzNqkgBNakENdVQAW5nqFrpxHR3KVffhnaaK3T10" /><p><a href="https://twitter.com/MalwareJake/status/1758454999380557885">https://twitter.com/MalwareJake/status/1758454999380557885</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42610846" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/2dc1f24a-50d1-4fe4-b2f8-7ae310d6057e/audio/63c07e33-e3f8-478a-8592-490a5afa1847/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 184 - The Bee in the Bonnet Episode</itunes:title>
      <itunes:author>overtime, right to disconnect, soc2, hitrust, iso27001, compliance, Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b155d26c-4266-4c7f-9a67-4ac69d249816/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:23</itunes:duration>
      <itunes:summary>This week in InfoSec is a story of default passwords
 
Rant of the Week is a Canadian argument worthy of a Billy Big Balls

Billy Big Balls is a ballsy move from the British Texans
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a plea to make the compliance work easier</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a story of default passwords
 
Rant of the Week is a Canadian argument worthy of a Billy Big Balls

Billy Big Balls is a ballsy move from the British Texans
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is a plea to make the compliance work easier</itunes:subtitle>
      <itunes:keywords>velvetsweatshop, netsky worm, excel, robot, chatbot, air canada</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>184</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fd3ccd0c-59c6-4acd-be83-b1e6332f1b7d</guid>
      <title>Episode 183 - The Midnight Express Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:59)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th February 2000: A 15-year-old Canadian identified at the time only by his handle  "MafiaBoy" launched a 4-hour DDoS attack against<a href="https://t.co/3AcGM536mA"> http://cnn.com</a>. The attacks also targeted Yahoo, eBay, Amazon and other sites over a 3 day period. In 2001 a Canadian court sentenced him to 8 months.</p><img src="https://lh7-us.googleusercontent.com/N5u4XyzUzUam67asQZu5FskrA-2TGm2JE5J6h-2iL0fycl1Qn0F-DakFLGx1gVgV-1HlDS6k9yL_hmeitwomVeQf6ziXJUOPig_MaFmOigodnCt_hjGcHLuXB_seemsCcQGwaIhpWNETjgfaoZRLrys" /><p><a href="https://twitter.com/todayininfosec/status/1755576730306089245">https://twitter.com/todayininfosec/status/1755576730306089245</a></p><p>7th February 2000: Dennis Michael Moran (aka Coolio) performed a smurf attack against Yahoo's routers, causing its websites to be inaccessible for hours. Conversations on an IRC channel led to him being identified and convicted for a series of DDoS and website defacement crimes.</p><p><a href="https://twitter.com/todayininfosec/status/1755267532540244316">https://twitter.com/todayininfosec/status/1755267532540244316</a>     </p><img src="https://lh7-us.googleusercontent.com/8oOZK161iKFEFyF6WrZAmXB5LFmf8HtdfokDmxlmygJDMJ01RIM9xWz7r_mLbXnUnECSztxwGkCkthOgSH8FzXn_VZzUSXi_cjOal_NmnZ208tELnwdY31MWPmWj9FgAmDxZ1Lau8VCX8gVGLi5JtHQ" /><p> </p><p><strong>Rant of the Week (14:35)</strong></p><p><a href="https://arstechnica.com/tech-policy/2024/02/viral-news-story-of-botnet-with-3-million-toothbrushes-was-too-good-to-be-true/">Viral news story of botnet with 3 million toothbrushes was too good to be true</a></p><p>In recent days you may have heard about the terrifying botnet consisting of 3 million electric toothbrushes that were infected with malware. While you absent-mindedly attended to your oral hygiene, little did you know that your toothbrush and millions of others were being controlled remotely by nefarious criminals.</p><p>Alas, fiction is sometimes stranger than truth. There weren't really 3 million Internet-connected toothbrushes accessing the website of a Swiss company in a DDoS attack that did millions of dollars of damage. The toothbrush botnet was just a hypothetical example that some journalists wrongly interpreted as having actually happened.</p><p>It apparently started with a January 30 <a href="https://www.aargauerzeitung.ch/wirtschaft/kriminalitaet-die-zahnbuersten-greifen-an-das-sind-die-aktuellen-cybergefahren-und-so-koennen-sie-sich-schuetzen-ld.2569480">story</a> by the Swiss German-language daily newspaper Aargauer Zeitung. Tom's Hardware helped <a href="https://archive.is/7s8yr">spread the tale in English</a> on Tuesday this week in an article titled, "Three million malware-infected smart toothbrushes used in Swiss DDoS attacks."</p><img src="https://lh7-us.googleusercontent.com/UNHXvtl1yXQB2Lcb9c8tOIw_QzuDhs5mFUsPx3bbOiUjuxE1wpNaKmwJeXFqZykjxrOKYW3AZVRRMMvB-duW6UCRddO09jZAx8apEWjml7_M1O0TwQushoV1SZFm1rg-J3Mxn85hzGwPmU1QheNWEqQ" /><p><a href="https://www.malwarebytes.com/blog/awareness/2024/02/how-to-tell-if-your-toothbrush-is-being-used-in-a-ddos-attack">https://www.malwarebytes.com/blog/awareness/2024/02/how-to-tell-if-your-toothbrush-is-being-used-in-a-ddos-attack</a></p><p> </p><p><strong>Billy Big Balls of the Week (21:50)</strong></p><p><a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’</a></p><p>A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call, according to Hong Kong police.</p><p>The elaborate scam saw the worker duped into attending a video call with what he thought were several other members of staff, but all of whom were in fact deepfake recreations, Hong Kong police said at a briefing on Friday.</p><p>“(In the) multi-person video conference, it turns out that everyone [he saw] was fake,” senior superintendent Baron Chan Shun-ching told the city’s public broadcaster RTHK.</p><p>Chan said the worker had grown suspicious after he received a message that was purportedly from the company’s UK-based chief financial officer. Initially, the worker suspected it was a phishing email, as it talked of the need for a secret transaction to be carried out.</p><p>However, the worker put aside his early doubts after the video call because other people in attendance had looked and sounded just like colleagues he recognized, Chan said.</p><p>Believing everyone else on the call was real, the worker agreed to remit a total of $200 million Hong Kong dollars – about $25.6 million, the police officer added.</p><p> </p><p><strong>Industry News (28:58)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clorox-johnson-controls-76m/">Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-oversight-board-policy-change/">Meta's Oversight Board Urges a Policy Change After a Fake Biden Video</a></p><p><a href="https://www.infosecurity-magazine.com/news/malware-service-top-threat/">Malware-as-a-Service Now the Top Threat to Organizations</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-spies-hack-dutch-1/">Chinese Spies Hack Dutch Networks With Novel Coathanger Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-introduce-label-ai-images/">Meta to Introduce Labeling for AI-Generated Images Ahead of US Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/governments-tech-giants-against/">Governments and Tech Giants Unite Against Commercial Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-33-million-social-security/">France: 33 Million Social Security Numbers Exposed in Health Insurance Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/20-years-facebook-trust-social/">20 Years of Facebook, but Trust in Social Media Remains Rock Bottom</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-robocalls-banned-us-election/">AI-Powered Robocalls Banned Ahead of US Election</a></p><p> </p><p><strong>Tweet of the Week (37:15)</strong></p><img src="https://lh7-us.googleusercontent.com/TWcsi_WCl-oVH84Z6Uj_ZKDUmbTARLvr8mlu-CasTw7aQH_Sg0rM-QzHI2Ywt-O4rc6ST4n4MHChqOfIFDqaxe4XvGQ5F5h3R52v_847vbvvem6Ex8YrMQmqjRjBwwBRS1twNkTJoRDVw554TtsQseU" /><p><a href="https://x.com/gossithedog/status/1755282171198054805?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/gossithedog/status/1755282171198054805?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 10 Feb 2024 00:11:42 +0000</pubDate>
      <author>thom@tl2security.com (facebook, meta, stock price, Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-183-G6r1_hOu</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:59)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th February 2000: A 15-year-old Canadian identified at the time only by his handle  "MafiaBoy" launched a 4-hour DDoS attack against<a href="https://t.co/3AcGM536mA"> http://cnn.com</a>. The attacks also targeted Yahoo, eBay, Amazon and other sites over a 3 day period. In 2001 a Canadian court sentenced him to 8 months.</p><img src="https://lh7-us.googleusercontent.com/N5u4XyzUzUam67asQZu5FskrA-2TGm2JE5J6h-2iL0fycl1Qn0F-DakFLGx1gVgV-1HlDS6k9yL_hmeitwomVeQf6ziXJUOPig_MaFmOigodnCt_hjGcHLuXB_seemsCcQGwaIhpWNETjgfaoZRLrys" /><p><a href="https://twitter.com/todayininfosec/status/1755576730306089245">https://twitter.com/todayininfosec/status/1755576730306089245</a></p><p>7th February 2000: Dennis Michael Moran (aka Coolio) performed a smurf attack against Yahoo's routers, causing its websites to be inaccessible for hours. Conversations on an IRC channel led to him being identified and convicted for a series of DDoS and website defacement crimes.</p><p><a href="https://twitter.com/todayininfosec/status/1755267532540244316">https://twitter.com/todayininfosec/status/1755267532540244316</a>     </p><img src="https://lh7-us.googleusercontent.com/8oOZK161iKFEFyF6WrZAmXB5LFmf8HtdfokDmxlmygJDMJ01RIM9xWz7r_mLbXnUnECSztxwGkCkthOgSH8FzXn_VZzUSXi_cjOal_NmnZ208tELnwdY31MWPmWj9FgAmDxZ1Lau8VCX8gVGLi5JtHQ" /><p> </p><p><strong>Rant of the Week (14:35)</strong></p><p><a href="https://arstechnica.com/tech-policy/2024/02/viral-news-story-of-botnet-with-3-million-toothbrushes-was-too-good-to-be-true/">Viral news story of botnet with 3 million toothbrushes was too good to be true</a></p><p>In recent days you may have heard about the terrifying botnet consisting of 3 million electric toothbrushes that were infected with malware. While you absent-mindedly attended to your oral hygiene, little did you know that your toothbrush and millions of others were being controlled remotely by nefarious criminals.</p><p>Alas, fiction is sometimes stranger than truth. There weren't really 3 million Internet-connected toothbrushes accessing the website of a Swiss company in a DDoS attack that did millions of dollars of damage. The toothbrush botnet was just a hypothetical example that some journalists wrongly interpreted as having actually happened.</p><p>It apparently started with a January 30 <a href="https://www.aargauerzeitung.ch/wirtschaft/kriminalitaet-die-zahnbuersten-greifen-an-das-sind-die-aktuellen-cybergefahren-und-so-koennen-sie-sich-schuetzen-ld.2569480">story</a> by the Swiss German-language daily newspaper Aargauer Zeitung. Tom's Hardware helped <a href="https://archive.is/7s8yr">spread the tale in English</a> on Tuesday this week in an article titled, "Three million malware-infected smart toothbrushes used in Swiss DDoS attacks."</p><img src="https://lh7-us.googleusercontent.com/UNHXvtl1yXQB2Lcb9c8tOIw_QzuDhs5mFUsPx3bbOiUjuxE1wpNaKmwJeXFqZykjxrOKYW3AZVRRMMvB-duW6UCRddO09jZAx8apEWjml7_M1O0TwQushoV1SZFm1rg-J3Mxn85hzGwPmU1QheNWEqQ" /><p><a href="https://www.malwarebytes.com/blog/awareness/2024/02/how-to-tell-if-your-toothbrush-is-being-used-in-a-ddos-attack">https://www.malwarebytes.com/blog/awareness/2024/02/how-to-tell-if-your-toothbrush-is-being-used-in-a-ddos-attack</a></p><p> </p><p><strong>Billy Big Balls of the Week (21:50)</strong></p><p><a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’</a></p><p>A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call, according to Hong Kong police.</p><p>The elaborate scam saw the worker duped into attending a video call with what he thought were several other members of staff, but all of whom were in fact deepfake recreations, Hong Kong police said at a briefing on Friday.</p><p>“(In the) multi-person video conference, it turns out that everyone [he saw] was fake,” senior superintendent Baron Chan Shun-ching told the city’s public broadcaster RTHK.</p><p>Chan said the worker had grown suspicious after he received a message that was purportedly from the company’s UK-based chief financial officer. Initially, the worker suspected it was a phishing email, as it talked of the need for a secret transaction to be carried out.</p><p>However, the worker put aside his early doubts after the video call because other people in attendance had looked and sounded just like colleagues he recognized, Chan said.</p><p>Believing everyone else on the call was real, the worker agreed to remit a total of $200 million Hong Kong dollars – about $25.6 million, the police officer added.</p><p> </p><p><strong>Industry News (28:58)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clorox-johnson-controls-76m/">Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-oversight-board-policy-change/">Meta's Oversight Board Urges a Policy Change After a Fake Biden Video</a></p><p><a href="https://www.infosecurity-magazine.com/news/malware-service-top-threat/">Malware-as-a-Service Now the Top Threat to Organizations</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-spies-hack-dutch-1/">Chinese Spies Hack Dutch Networks With Novel Coathanger Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-introduce-label-ai-images/">Meta to Introduce Labeling for AI-Generated Images Ahead of US Election</a></p><p><a href="https://www.infosecurity-magazine.com/news/governments-tech-giants-against/">Governments and Tech Giants Unite Against Commercial Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-33-million-social-security/">France: 33 Million Social Security Numbers Exposed in Health Insurance Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/20-years-facebook-trust-social/">20 Years of Facebook, but Trust in Social Media Remains Rock Bottom</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-robocalls-banned-us-election/">AI-Powered Robocalls Banned Ahead of US Election</a></p><p> </p><p><strong>Tweet of the Week (37:15)</strong></p><img src="https://lh7-us.googleusercontent.com/TWcsi_WCl-oVH84Z6Uj_ZKDUmbTARLvr8mlu-CasTw7aQH_Sg0rM-QzHI2Ywt-O4rc6ST4n4MHChqOfIFDqaxe4XvGQ5F5h3R52v_847vbvvem6Ex8YrMQmqjRjBwwBRS1twNkTJoRDVw554TtsQseU" /><p><a href="https://x.com/gossithedog/status/1755282171198054805?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg">https://x.com/gossithedog/status/1755282171198054805?s=46&t=1-Sjo1Vy8SG7OdizJ3wVbg</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="39852734" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/22678972-d5ff-48cb-bbf6-55c94eaefc12/audio/ce091530-4d65-446d-83cd-3b81096541ee/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 183 - The Midnight Express Episode</itunes:title>
      <itunes:author>facebook, meta, stock price, Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0d889a6b-8566-4245-81ea-cc97d42dc099/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:30</itunes:duration>
      <itunes:summary>This week in InfoSec is a small, blue, story wearing a white hat
 
Rant of the Week is something that needs doing twice a day

Billy Big Balls is when you can’t believe your own eyes
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week explains the real reason behind the news</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a small, blue, story wearing a white hat
 
Rant of the Week is something that needs doing twice a day

Billy Big Balls is when you can’t believe your own eyes
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week explains the real reason behind the news</itunes:subtitle>
      <itunes:keywords>toothbrushes, whatsapp, smurf attack, ddos, fake video, deepfake, fortinet, mafiaboy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>183</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30d4a670-464c-4e86-80df-26c7d7472865</guid>
      <title>Episode 182 - The Tallest &amp; Shortest Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (08:19)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st Jan 2011 (13 years ago): Chris Russo reported a vulnerability to dating website PlentyOfFish's CEO Markus Frind's wife. Yada yada yada Markus Frind then accused Russo of extortion and emailed Russo's mother.  </p><p><a href="https://techcrunch.com/2011/01/31/plentyoffish-ceo-we-were-hacked-almost-extorted-so-i-emailed-the-hackers-mom/">https://techcrunch.com/2011/01/31/plentyoffish-ceo-we-were-hacked-almost-extorted-so-i-emailed-the-hackers-mom/</a></p><p><a href="https://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/">https://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/</a></p><p> </p><p><strong>Rant of the Week (13:56)</strong></p><p><a href="https://www.wired.com/story/tiktok-hearing-congress-us-privacy-law/">The TikTok Hearing Revealed That Congress Is the Problem</a></p><p>For some, the job on Thursday was casting the hearing's only witness, TikTok CEO Shou Zi Chew, as a stand-in for the Chinese government—in some cases, for communism itself—and then belting him like a side of beef. More than a few of the questions lawmakers put to Chew were vague, speculative, and immaterial to the allegations against his company. But the members of Congress asking those questions feigned little interest in Chew’s responses anyway. </p><p>Attempts by Chew, a 40-year-old former Goldman Sachs banker, to elaborate on TikTok’s business practices were frequently interrupted, and his requests to remark on matters supposedly of considerable interest to members of Congress were blocked and occasionally ignored. These opportunities to get the CEO on record, while under oath, were repeatedly blown in the name of expediency and for mostly theatrical reasons. Chew, in contrast, was the portrait of patience, even when he was being talked over. Even when some lawmakers began asking and, without pause, answering their own questions.</p><p>The hearing might’ve been a flop, had lawmakers planned to dig up new dirt on TikTok, which is owned by China-based ByteDance, or even hash out what the company could do next to allay their concerns. But that wasn't the aim. The House Energy and Commerce Committee was gathered, it said, to investigate “how Congress can safeguard American data privacy and protect children from online harms.” And on that, the hearing revealed plenty.</p><p> </p><p><strong>Billy Big Balls of the Week (23:41)</strong></p><p><a href="https://www.bnnbloomberg.ca/icbc-partners-wary-to-resume-trading-with-bank-after-cyberattack-1.2002300">ICBC Partners Wary to Resume Trading With Bank After Cyberattack</a></p><p> Industrial & Commercial Bank of China Ltd., the world’s largest lender by assets, has been unable to convince some market participants that it’s safe to reconnect their computer networks to the bank’s US unit after a ransomware attack disrupted its systems, according to people familiar with the matter.</p><p>The attack, which was claimed by the Russia-linked LockBit cybercrime and extortion gang earlier this month, impeded trading in the $26 billion Treasury market and, the people said, it has left users of the bank’s US arm skittish about trading with the bank.</p><p>For its part, ICBC has told users that its US division is back online and operational, the people said. One person familiar with the hack and investigation said a reason the bank could get back online quickly was that a key part of its trading system was unaffected by the attack — a server that was more than 20 years old, made by now-defunct IT equipment maker Novell Inc.. That server contained much of the bank’s trading data and capabilities and is so old that LockBit’s ransomware didn’t work on it, the person said.</p><p> </p><p><strong>Industry News (35:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-agencies-ransomware-white-house/">US Agencies Failure to Oversee Ransomware Protections Threaten White House Goals</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-thwarts-volt-typhoon-espionage/">US Thwarts Volt Typhoon Cyber Espionage Campaign Through Router Disruption</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-targets-1300-suspicious/">Interpol-Led Initiative Targets 1300 Suspicious IPs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ivanti-zeroday-patches-two-new-bugs/">Ivanti Releases Zero-Day Patches and Reveals Two New Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/pumpanddump-schemes-crypto/">Pump-and-Dump Schemes Make Crypto Fraudsters $240m</a></p><p><a href="https://www.infosecurity-magazine.com/news/googles-bazel-command-injection/">Google’s Bazel Exposed to Command Injection Threat</a></p><p> </p><p><strong>Tweet of the Week (41:51)</strong></p><img src="https://lh7-us.googleusercontent.com/-Pam4LOaUijdpre3J7FgoGoRCo3kicA-fq0-rVyVuian5ufXoUKIMzzrpxPblGQqggfGhKh3F6l-jIH3_xktf9IcnKvz7SYIeOk3PaKpbmQgtgRU0uXVKC2xn7xOWN_aFtw7nFW9hX8eqV9dXEOt8dYUMVCIM2Tf4gu76SoqAVnGg90qpD0IYyPqc8b5BA" /><p><a href="https://x.com/MikeIrvo/status/1752123455125016839?s=20">https://x.com/MikeIrvo/status/1752123455125016839?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 5 Feb 2024 20:04:50 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-182-GNWzZqLC</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (08:19)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st Jan 2011 (13 years ago): Chris Russo reported a vulnerability to dating website PlentyOfFish's CEO Markus Frind's wife. Yada yada yada Markus Frind then accused Russo of extortion and emailed Russo's mother.  </p><p><a href="https://techcrunch.com/2011/01/31/plentyoffish-ceo-we-were-hacked-almost-extorted-so-i-emailed-the-hackers-mom/">https://techcrunch.com/2011/01/31/plentyoffish-ceo-we-were-hacked-almost-extorted-so-i-emailed-the-hackers-mom/</a></p><p><a href="https://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/">https://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/</a></p><p> </p><p><strong>Rant of the Week (13:56)</strong></p><p><a href="https://www.wired.com/story/tiktok-hearing-congress-us-privacy-law/">The TikTok Hearing Revealed That Congress Is the Problem</a></p><p>For some, the job on Thursday was casting the hearing's only witness, TikTok CEO Shou Zi Chew, as a stand-in for the Chinese government—in some cases, for communism itself—and then belting him like a side of beef. More than a few of the questions lawmakers put to Chew were vague, speculative, and immaterial to the allegations against his company. But the members of Congress asking those questions feigned little interest in Chew’s responses anyway. </p><p>Attempts by Chew, a 40-year-old former Goldman Sachs banker, to elaborate on TikTok’s business practices were frequently interrupted, and his requests to remark on matters supposedly of considerable interest to members of Congress were blocked and occasionally ignored. These opportunities to get the CEO on record, while under oath, were repeatedly blown in the name of expediency and for mostly theatrical reasons. Chew, in contrast, was the portrait of patience, even when he was being talked over. Even when some lawmakers began asking and, without pause, answering their own questions.</p><p>The hearing might’ve been a flop, had lawmakers planned to dig up new dirt on TikTok, which is owned by China-based ByteDance, or even hash out what the company could do next to allay their concerns. But that wasn't the aim. The House Energy and Commerce Committee was gathered, it said, to investigate “how Congress can safeguard American data privacy and protect children from online harms.” And on that, the hearing revealed plenty.</p><p> </p><p><strong>Billy Big Balls of the Week (23:41)</strong></p><p><a href="https://www.bnnbloomberg.ca/icbc-partners-wary-to-resume-trading-with-bank-after-cyberattack-1.2002300">ICBC Partners Wary to Resume Trading With Bank After Cyberattack</a></p><p> Industrial & Commercial Bank of China Ltd., the world’s largest lender by assets, has been unable to convince some market participants that it’s safe to reconnect their computer networks to the bank’s US unit after a ransomware attack disrupted its systems, according to people familiar with the matter.</p><p>The attack, which was claimed by the Russia-linked LockBit cybercrime and extortion gang earlier this month, impeded trading in the $26 billion Treasury market and, the people said, it has left users of the bank’s US arm skittish about trading with the bank.</p><p>For its part, ICBC has told users that its US division is back online and operational, the people said. One person familiar with the hack and investigation said a reason the bank could get back online quickly was that a key part of its trading system was unaffected by the attack — a server that was more than 20 years old, made by now-defunct IT equipment maker Novell Inc.. That server contained much of the bank’s trading data and capabilities and is so old that LockBit’s ransomware didn’t work on it, the person said.</p><p> </p><p><strong>Industry News (35:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-agencies-ransomware-white-house/">US Agencies Failure to Oversee Ransomware Protections Threaten White House Goals</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-thwarts-volt-typhoon-espionage/">US Thwarts Volt Typhoon Cyber Espionage Campaign Through Router Disruption</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-targets-1300-suspicious/">Interpol-Led Initiative Targets 1300 Suspicious IPs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ivanti-zeroday-patches-two-new-bugs/">Ivanti Releases Zero-Day Patches and Reveals Two New Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/pumpanddump-schemes-crypto/">Pump-and-Dump Schemes Make Crypto Fraudsters $240m</a></p><p><a href="https://www.infosecurity-magazine.com/news/googles-bazel-command-injection/">Google’s Bazel Exposed to Command Injection Threat</a></p><p> </p><p><strong>Tweet of the Week (41:51)</strong></p><img src="https://lh7-us.googleusercontent.com/-Pam4LOaUijdpre3J7FgoGoRCo3kicA-fq0-rVyVuian5ufXoUKIMzzrpxPblGQqggfGhKh3F6l-jIH3_xktf9IcnKvz7SYIeOk3PaKpbmQgtgRU0uXVKC2xn7xOWN_aFtw7nFW9hX8eqV9dXEOt8dYUMVCIM2Tf4gu76SoqAVnGg90qpD0IYyPqc8b5BA" /><p><a href="https://x.com/MikeIrvo/status/1752123455125016839?s=20">https://x.com/MikeIrvo/status/1752123455125016839?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45559130" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e13f97c7-a666-4189-8134-a6dc37ca247b/audio/3ad7da94-44fd-4967-b0df-be790d2d2498/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 182 - The Tallest &amp; Shortest Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/1c7bd0fa-43d3-4f48-adb2-8191d12301fc/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:27</itunes:duration>
      <itunes:summary>This week in InfoSec goes crying to Mummy
 
Rant of the Week  is about asking all the right questions at the wrong time and to the wrong people

Billy Big Balls proves that old is gold
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is simply horrific</itunes:summary>
      <itunes:subtitle>This week in InfoSec goes crying to Mummy
 
Rant of the Week  is about asking all the right questions at the wrong time and to the wrong people

Billy Big Balls proves that old is gold
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is simply horrific</itunes:subtitle>
      <itunes:keywords>pump and dump, plentyoffish, icbc, horror film, chris russo, novell netware, ransomware, congress, tiktok</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>182</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">460ffed7-5b28-4446-a7a7-5fed9b3807fe</guid>
      <title>Episode 181 - The Early early Show</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (04:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th January 2003: The SQL Slammer worm was first observed. It relied on a vulnerability Microsoft reported a whopping 6 months earlier via security bulletin MS02-039. Despite the long-available patch,  75,000 systems were compromised within 10 minutes..</p><p><a href="https://twitter.com/todayininfosec/status/1750529757903790431">https://twitter.com/todayininfosec/status/1750529757903790431</a></p><p>21st January 1992: Former General Dynamics employee Michael John Lauffenburger was sentenced. He had created a logic bomb, which was programmed to go off on May 24, 1991. Unfortunately for him, an employee accidentally discovered it, dismantled it, and contacted authorities.</p><p><a href="https://twitter.com/todayininfosec/status/1749184231752802757">https://twitter.com/todayininfosec/status/1749184231752802757</a>     </p><p> </p><p><strong>Rant of the Week (11:10)</strong></p><h1><a href="https://9to5mac.com/2024/01/23/third-party-ink-cartridges/" target="_blank">Third-party ink cartridges brick HP printers after ‘anti-virus’ update</a></h1><p>HP is pushing over-the-air <a href="https://support.hp.com/us-en/document/ish_6839789-6839813-16/hpsbpi03810">firmware updates</a> to its printers, bricking them if they are using third-party ink cartridges. But don’t worry, it’s not a money-grab, says the company – it’s just trying to protect you from the well-known risk of viruses embedded in ink cartridges …</p><p>HP has long been known for sketchy practices in its attempt to turn ink purchases into a subscription service. If you cancel a subscription, for example, the company will immediately stop the printer using the ink you’ve already paid for.</p><p>CEO Enrique Lores somehow managed to keep a straight face while explaining to <a href="https://www.youtube.com/watch?v=QPRMyQSZGuY"><i>CNBC</i></a> that the company was only trying to protect users from viruses which might be embedded into aftermarket ink cartridges.</p><p><i>It can create issues [where] the printers stop working because the inks have not been designed to be used in our printers, to then create security issues. We have seen that you can embed viruses in the cartridges, and through the cartridge, go to the printer; from the printer, go to the network.</i></p><p><a href="https://arstechnica.com/gadgets/2024/01/hp-ceo-blocking-third-party-ink-from-printers-fights-viruses/"><i>ArsTechnica</i></a> asked several security experts whether this could happen, and they said this is so out-there, it would have to be a nation-state attack on a specific individual.</p><p> </p><p><strong>Billy Big Balls of the Week (19:04)</strong></p><p><a href="https://www.bbc.co.uk/news/world-europe-68056421">British man Aditya Verma appears in Spanish court over plane-bomb hoax</a></p><p>A British man accused of public disorder after joking about blowing up a flight has gone on trial in Spain.</p><p>Aditya Verma made the comment on Snapchat on his way to the island of Menorca with friends in July 2022.</p><p>The message, sent before Mr Verma departed Gatwick airport, read: "On my way to blow up the plane (I'm a member of the Taliban)."</p><p>Mr Verma told a Madrid court on Monday: "The intention was never to cause public distress or cause public harm."</p><p>If found guilty, the university student faces a hefty bill for expenses after two Spanish Air Force jets were scrambled.</p><p>Mr Verma's message was picked up by the UK security services who flagged it to Spanish authorities while the easyJet plane was still in the air.</p><p>A court in Madrid heard it was assumed the message triggered alarm bells after being picked up via Gatwick's Wi-Fi network.</p><p> </p><p><strong>Industry News (27:39)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/thai-court-blocks-9nearorg/">Thai Court Blocks 9near.org to Avoid Exposure of 55M Citizens</a></p><p><a href="https://www.infosecurity-magazine.com/news/mother-breaches-unlikely-new-data/">Mega-Breach Database Exposes 26 Billion Records</a></p><p><a href="https://www.infosecurity-magazine.com/news/cnil-france-amazon-32m-fine-spying/">French Watchdog Slams Amazon with €32m Fine for Spying on Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-set-to-supercharge-ransomware/">AI Set to Supercharge Ransomware Threat, Says NCSC</a></p><p><a href="https://www.infosecurity-magazine.com/news/x-passkeys-us-based-users/">X Makes Passkeys Available for US-Based Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-cybercrime-revealed-dark/">ChatGPT Cybercrime Surge Revealed in 3000 Dark Web Posts</a></p><p><a href="https://www.infosecurity-magazine.com/news/hpe-solarwinds-hackers-accessed/">HPE Says SolarWinds Hackers Accessed its Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/southern-water-data-breach-black/">Southern Water Confirms Data Breach Following Black Basta Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-apt-blackwood-nspx30-implant/">China-Aligned APT Group Blackwood Unleashes NSPX30 Implant</a></p><p> </p><p><strong>Tweet of the Week (33:12)</strong></p><img src="https://lh7-us.googleusercontent.com/YcgvgsAPvQBNl1qFgURu2gvZPzxYqMW7K9AJvbkvKTj4gWm4AWfbu3iapS1HN-k2JaImbdAWvTSp_cYyMYoluakrFFiC3jQ-xGU8ei5e8HzcoNMwK9Hh7FdYN0p3zZA-FmlhM3ygJ--nMWfzOI4xhoo" /><img src="https://lh7-us.googleusercontent.com/uBB1ngQjfnrKvhGlJEGT9fIibE9w96ke6muUwFZNsIA5I556dl6IEcGIWZuy2nOXj2LQvmD50URpdcwvOQb9lRqhPWtpeD0Yt_NKTmGTkLHaE2znTbA4FuZSXUMGmag1MgN2tbhtwp0-J7V75uFpNwY" /><p><a href="https://x.com/TheHornetsFury/status/1750612652873928949?s=20">https://x.com/TheHornetsFury/status/1750612652873928949?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Jan 2024 10:56:24 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnēs, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-181-MwTcCyrh</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (04:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th January 2003: The SQL Slammer worm was first observed. It relied on a vulnerability Microsoft reported a whopping 6 months earlier via security bulletin MS02-039. Despite the long-available patch,  75,000 systems were compromised within 10 minutes..</p><p><a href="https://twitter.com/todayininfosec/status/1750529757903790431">https://twitter.com/todayininfosec/status/1750529757903790431</a></p><p>21st January 1992: Former General Dynamics employee Michael John Lauffenburger was sentenced. He had created a logic bomb, which was programmed to go off on May 24, 1991. Unfortunately for him, an employee accidentally discovered it, dismantled it, and contacted authorities.</p><p><a href="https://twitter.com/todayininfosec/status/1749184231752802757">https://twitter.com/todayininfosec/status/1749184231752802757</a>     </p><p> </p><p><strong>Rant of the Week (11:10)</strong></p><h1><a href="https://9to5mac.com/2024/01/23/third-party-ink-cartridges/" target="_blank">Third-party ink cartridges brick HP printers after ‘anti-virus’ update</a></h1><p>HP is pushing over-the-air <a href="https://support.hp.com/us-en/document/ish_6839789-6839813-16/hpsbpi03810">firmware updates</a> to its printers, bricking them if they are using third-party ink cartridges. But don’t worry, it’s not a money-grab, says the company – it’s just trying to protect you from the well-known risk of viruses embedded in ink cartridges …</p><p>HP has long been known for sketchy practices in its attempt to turn ink purchases into a subscription service. If you cancel a subscription, for example, the company will immediately stop the printer using the ink you’ve already paid for.</p><p>CEO Enrique Lores somehow managed to keep a straight face while explaining to <a href="https://www.youtube.com/watch?v=QPRMyQSZGuY"><i>CNBC</i></a> that the company was only trying to protect users from viruses which might be embedded into aftermarket ink cartridges.</p><p><i>It can create issues [where] the printers stop working because the inks have not been designed to be used in our printers, to then create security issues. We have seen that you can embed viruses in the cartridges, and through the cartridge, go to the printer; from the printer, go to the network.</i></p><p><a href="https://arstechnica.com/gadgets/2024/01/hp-ceo-blocking-third-party-ink-from-printers-fights-viruses/"><i>ArsTechnica</i></a> asked several security experts whether this could happen, and they said this is so out-there, it would have to be a nation-state attack on a specific individual.</p><p> </p><p><strong>Billy Big Balls of the Week (19:04)</strong></p><p><a href="https://www.bbc.co.uk/news/world-europe-68056421">British man Aditya Verma appears in Spanish court over plane-bomb hoax</a></p><p>A British man accused of public disorder after joking about blowing up a flight has gone on trial in Spain.</p><p>Aditya Verma made the comment on Snapchat on his way to the island of Menorca with friends in July 2022.</p><p>The message, sent before Mr Verma departed Gatwick airport, read: "On my way to blow up the plane (I'm a member of the Taliban)."</p><p>Mr Verma told a Madrid court on Monday: "The intention was never to cause public distress or cause public harm."</p><p>If found guilty, the university student faces a hefty bill for expenses after two Spanish Air Force jets were scrambled.</p><p>Mr Verma's message was picked up by the UK security services who flagged it to Spanish authorities while the easyJet plane was still in the air.</p><p>A court in Madrid heard it was assumed the message triggered alarm bells after being picked up via Gatwick's Wi-Fi network.</p><p> </p><p><strong>Industry News (27:39)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/thai-court-blocks-9nearorg/">Thai Court Blocks 9near.org to Avoid Exposure of 55M Citizens</a></p><p><a href="https://www.infosecurity-magazine.com/news/mother-breaches-unlikely-new-data/">Mega-Breach Database Exposes 26 Billion Records</a></p><p><a href="https://www.infosecurity-magazine.com/news/cnil-france-amazon-32m-fine-spying/">French Watchdog Slams Amazon with €32m Fine for Spying on Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-set-to-supercharge-ransomware/">AI Set to Supercharge Ransomware Threat, Says NCSC</a></p><p><a href="https://www.infosecurity-magazine.com/news/x-passkeys-us-based-users/">X Makes Passkeys Available for US-Based Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-cybercrime-revealed-dark/">ChatGPT Cybercrime Surge Revealed in 3000 Dark Web Posts</a></p><p><a href="https://www.infosecurity-magazine.com/news/hpe-solarwinds-hackers-accessed/">HPE Says SolarWinds Hackers Accessed its Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/southern-water-data-breach-black/">Southern Water Confirms Data Breach Following Black Basta Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-apt-blackwood-nspx30-implant/">China-Aligned APT Group Blackwood Unleashes NSPX30 Implant</a></p><p> </p><p><strong>Tweet of the Week (33:12)</strong></p><img src="https://lh7-us.googleusercontent.com/YcgvgsAPvQBNl1qFgURu2gvZPzxYqMW7K9AJvbkvKTj4gWm4AWfbu3iapS1HN-k2JaImbdAWvTSp_cYyMYoluakrFFiC3jQ-xGU8ei5e8HzcoNMwK9Hh7FdYN0p3zZA-FmlhM3ygJ--nMWfzOI4xhoo" /><img src="https://lh7-us.googleusercontent.com/uBB1ngQjfnrKvhGlJEGT9fIibE9w96ke6muUwFZNsIA5I556dl6IEcGIWZuy2nOXj2LQvmD50URpdcwvOQb9lRqhPWtpeD0Yt_NKTmGTkLHaE2znTbA4FuZSXUMGmag1MgN2tbhtwp0-J7V75uFpNwY" /><p><a href="https://x.com/TheHornetsFury/status/1750612652873928949?s=20">https://x.com/TheHornetsFury/status/1750612652873928949?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="35929351" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ed122087-c767-4fdd-8855-c62b7feb8ad0/audio/0e455995-2e49-4c28-af1b-36f3450172ed/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 181 - The Early early Show</itunes:title>
      <itunes:author>Andrew Agnēs, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/17ec79cb-0598-4922-8945-ae883565297f/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:25</itunes:duration>
      <itunes:summary>This week in InfoSec is of Worms and Bombs
 
Rant of the Week  tells us that our printers need anti-virus

Billy Big Balls is what happens when you say the quiet parts out loud
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week explains why we really enjoy doing the work we do</itunes:summary>
      <itunes:subtitle>This week in InfoSec is of Worms and Bombs
 
Rant of the Week  tells us that our printers need anti-virus

Billy Big Balls is what happens when you say the quiet parts out loud
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week explains why we really enjoy doing the work we do</itunes:subtitle>
      <itunes:keywords>ashamed of himself, boring industry news, subscription, hp, taliban, sql slammer, gatwick, logic bomb, shareholder value, virus, menorca</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>181</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">831368cc-890f-42d8-b9a1-7ac8bfa5d60c</guid>
      <title>Episode 180 - Its a Full House Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (09:34)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>11th January 2000: Newly declassified documents proved the existence of ECHELON, a global eavesdropping network run by the NSA.</p><p><a href="https://twitter.com/todayininfosec/status/1745518896495390826">https://twitter.com/todayininfosec/status/1745518896495390826</a>  </p><p>13th January 2009: The domain name<a href="https://t.co/7qx9fhs7Ha"> http://clintonemail.com</a> was registered - the one used for email addresses on the Clinton family's private email server, which drew controversy when it was revealed that then Secretary of State Hillary Clinton used it for official communications.</p><p><a href="https://twitter.com/todayininfosec/status/1746214861091053961">https://twitter.com/todayininfosec/status/1746214861091053961</a>    </p><p> </p><p><strong>Rant of the Week (15:53)</strong></p><p><a href="https://www.theregister.com/2024/01/17/y2k_feature/">The 'nothing-happened' Y2K bug – how the IT industry worked overtime to save world's computers</a></p><p>Forty years ago, both Jerome and Marilyn Murray saw their brainchild reach the light of day. In 1984, their book, <a href="https://search.worldcat.org/title/10558815">Computers in Crisis</a>, was published, becoming the first authoritative guide to the Millennium Bug coding problem, which, in the final year of the century, would consume media, political and business attention.</p><p>Today, more than 20 years after the date-field imposed deadline passed, the Millennium Bug — or Y2K problem — still gets a mixed reception. </p><p>While many in the industry see it as a job well done — or at least adequately done — it has also become a byword for the over-reach of experts.</p><p> </p><p><strong>Billy Big Balls of the Week (26:55)</strong></p><p><a href="https://www.upworthy.com/woman-films-herself-being-fired-by-hr-to-expose-how-cold-u-s-corporate-culture-can-be">Woman films herself being fired by HR to expose how cold U.S. corporate culture can be</a> (Link to actual TikTok video in here)</p><p>Forbes article: <a href="https://www.forbes.com/sites/jackkelly/2024/01/12/viral-tiktok-video-of-cloudflare-employee-is-a-lesson-on-how-to-not-fire-workers/">Viral TikTok Video Of Cloudflare Employee Is A Lesson On How To Not Fire Workers</a></p><p>Recently, many of the new workplace trends have emanated from TikTok. Influencers have ushered in new themes, such as <a href="https://www.forbes.com/sites/jackkelly/2023/02/22/bare-minimum-monday-is-the-newest-tiktok-trend-of-quiet-quitting-and-cyberloafing-throughout-the-work-day/">bare minimum Mondays</a>, <a href="https://www.forbes.com/sites/jackkelly/2022/09/29/acting-your-wage-is-detrimental-to-long-term-career-success/">acting your wage</a>, <a href="https://www.forbes.com/sites/jackkelly/2022/08/22/how-both-managers-and-workers-can-combat-quiet-quitting/?sh=68b767f6466d">quiet quitting</a> and <a href="https://www.forbes.com/sites/jackkelly/2023/01/09/rage-applying-to-jobs-is-the-newest-tiktok-trend/">rage applying</a>. A new phenomenon has arisen where employees are now documenting their layoffs on the social media platform.</p><p>This week, <a href="https://www.linkedin.com/in/brittany-pietsch-237893173/overlay/about-this-profile/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base%3BIhGbizEtR%2FyFfcW7frBkXg%3D%3D">Brittany Pietsch,</a> a mid-market account executive at Cloudflare, an Internet infrastructure provider that offers a variety of security, performance and reliability services for websites and applications, went viral after posting a <a href="https://www.tiktok.com/t/ZT8qgYVf9/">video</a> of her being let go from the tech company.</p><p>Pietsch anticipated her firing, as her “work bff” had been given the pink slip 30 minutes prior to her meeting. The account executive was joined on a video call by a member of the human resources team and another individual, who didn’t introduce himself and jumped right into the purpose of the call, “We have an important meeting today. We finished our evaluations of 2023 performance. This is where you have not met Cloudflare expectations for performance. We have decided to part ways with you.”</p><p> </p><p><strong>Industry News (36:02)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fnf-customers-data-ransomware/">1.3 Million FNF Customers' Data Potentially Exposed in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/hellofresh-fined-140k-80-million/">HelloFresh Fined £140K After Sending 80 Million Spam Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-library-catalogue-online/">British Library Catalogue Back Online After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/senators-probe-sec-hack-bitcoin/">Senators Demand Probe into SEC Hack After Bitcoin Price Spike</a></p><p><a href="https://www.infosecurity-magazine.com/news/tool-identifies-pegasus-ios-spyware/">Tool Identifies Pegasus and Other iOS Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/majorca-tourism-hotspot-11m-ransom/">Majorca Tourist Hotspot Hit With $11m Ransom Demand</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-gaming-fintech-kids/">AI, Gaming, FinTech Named Major Cybersecurity Threats For Kids</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-cyber-league-threat-tracking/">NCSC Builds New “Cyber League” Threat Tracking Community</a></p><p><a href="https://www.infosecurity-magazine.com/news/iranian-phishing-israel-hamas/">Iranian Phishing Campaign Targets Israel-Hamas War Experts</a></p><p> </p><p><strong>Tweet of the Week (42:01)</strong></p><img src="https://lh7-us.googleusercontent.com/f1o5DFmv1RPyhKy29SJALg-QgMgGw2k3aUQCUofa-edxa4nPh1UfqiuzwmOFQs7alOCSe6NzuzswJ5qZJB8YKb6ZbcmTcTC4Ryz6cn9IBUCqTrKpgZ4DbYpBObPpi3noxvrPbhsrdcVQOZ90yD54tLI" /><p><a href="https://twitter.com/0xdade/status/1747820425693045014">https://twitter.com/0xdade/status/1747820425693045014</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 22 Jan 2024 18:43:31 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-180-I2KPbaaR</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (09:34)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>11th January 2000: Newly declassified documents proved the existence of ECHELON, a global eavesdropping network run by the NSA.</p><p><a href="https://twitter.com/todayininfosec/status/1745518896495390826">https://twitter.com/todayininfosec/status/1745518896495390826</a>  </p><p>13th January 2009: The domain name<a href="https://t.co/7qx9fhs7Ha"> http://clintonemail.com</a> was registered - the one used for email addresses on the Clinton family's private email server, which drew controversy when it was revealed that then Secretary of State Hillary Clinton used it for official communications.</p><p><a href="https://twitter.com/todayininfosec/status/1746214861091053961">https://twitter.com/todayininfosec/status/1746214861091053961</a>    </p><p> </p><p><strong>Rant of the Week (15:53)</strong></p><p><a href="https://www.theregister.com/2024/01/17/y2k_feature/">The 'nothing-happened' Y2K bug – how the IT industry worked overtime to save world's computers</a></p><p>Forty years ago, both Jerome and Marilyn Murray saw their brainchild reach the light of day. In 1984, their book, <a href="https://search.worldcat.org/title/10558815">Computers in Crisis</a>, was published, becoming the first authoritative guide to the Millennium Bug coding problem, which, in the final year of the century, would consume media, political and business attention.</p><p>Today, more than 20 years after the date-field imposed deadline passed, the Millennium Bug — or Y2K problem — still gets a mixed reception. </p><p>While many in the industry see it as a job well done — or at least adequately done — it has also become a byword for the over-reach of experts.</p><p> </p><p><strong>Billy Big Balls of the Week (26:55)</strong></p><p><a href="https://www.upworthy.com/woman-films-herself-being-fired-by-hr-to-expose-how-cold-u-s-corporate-culture-can-be">Woman films herself being fired by HR to expose how cold U.S. corporate culture can be</a> (Link to actual TikTok video in here)</p><p>Forbes article: <a href="https://www.forbes.com/sites/jackkelly/2024/01/12/viral-tiktok-video-of-cloudflare-employee-is-a-lesson-on-how-to-not-fire-workers/">Viral TikTok Video Of Cloudflare Employee Is A Lesson On How To Not Fire Workers</a></p><p>Recently, many of the new workplace trends have emanated from TikTok. Influencers have ushered in new themes, such as <a href="https://www.forbes.com/sites/jackkelly/2023/02/22/bare-minimum-monday-is-the-newest-tiktok-trend-of-quiet-quitting-and-cyberloafing-throughout-the-work-day/">bare minimum Mondays</a>, <a href="https://www.forbes.com/sites/jackkelly/2022/09/29/acting-your-wage-is-detrimental-to-long-term-career-success/">acting your wage</a>, <a href="https://www.forbes.com/sites/jackkelly/2022/08/22/how-both-managers-and-workers-can-combat-quiet-quitting/?sh=68b767f6466d">quiet quitting</a> and <a href="https://www.forbes.com/sites/jackkelly/2023/01/09/rage-applying-to-jobs-is-the-newest-tiktok-trend/">rage applying</a>. A new phenomenon has arisen where employees are now documenting their layoffs on the social media platform.</p><p>This week, <a href="https://www.linkedin.com/in/brittany-pietsch-237893173/overlay/about-this-profile/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base%3BIhGbizEtR%2FyFfcW7frBkXg%3D%3D">Brittany Pietsch,</a> a mid-market account executive at Cloudflare, an Internet infrastructure provider that offers a variety of security, performance and reliability services for websites and applications, went viral after posting a <a href="https://www.tiktok.com/t/ZT8qgYVf9/">video</a> of her being let go from the tech company.</p><p>Pietsch anticipated her firing, as her “work bff” had been given the pink slip 30 minutes prior to her meeting. The account executive was joined on a video call by a member of the human resources team and another individual, who didn’t introduce himself and jumped right into the purpose of the call, “We have an important meeting today. We finished our evaluations of 2023 performance. This is where you have not met Cloudflare expectations for performance. We have decided to part ways with you.”</p><p> </p><p><strong>Industry News (36:02)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fnf-customers-data-ransomware/">1.3 Million FNF Customers' Data Potentially Exposed in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/hellofresh-fined-140k-80-million/">HelloFresh Fined £140K After Sending 80 Million Spam Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-library-catalogue-online/">British Library Catalogue Back Online After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/senators-probe-sec-hack-bitcoin/">Senators Demand Probe into SEC Hack After Bitcoin Price Spike</a></p><p><a href="https://www.infosecurity-magazine.com/news/tool-identifies-pegasus-ios-spyware/">Tool Identifies Pegasus and Other iOS Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/majorca-tourism-hotspot-11m-ransom/">Majorca Tourist Hotspot Hit With $11m Ransom Demand</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-gaming-fintech-kids/">AI, Gaming, FinTech Named Major Cybersecurity Threats For Kids</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-cyber-league-threat-tracking/">NCSC Builds New “Cyber League” Threat Tracking Community</a></p><p><a href="https://www.infosecurity-magazine.com/news/iranian-phishing-israel-hamas/">Iranian Phishing Campaign Targets Israel-Hamas War Experts</a></p><p> </p><p><strong>Tweet of the Week (42:01)</strong></p><img src="https://lh7-us.googleusercontent.com/f1o5DFmv1RPyhKy29SJALg-QgMgGw2k3aUQCUofa-edxa4nPh1UfqiuzwmOFQs7alOCSe6NzuzswJ5qZJB8YKb6ZbcmTcTC4Ryz6cn9IBUCqTrKpgZ4DbYpBObPpi3noxvrPbhsrdcVQOZ90yD54tLI" /><p><a href="https://twitter.com/0xdade/status/1747820425693045014">https://twitter.com/0xdade/status/1747820425693045014</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44204107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e98b4ddf-290c-4420-95b3-a8d90b9d65e6/audio/9d882c31-1053-4eb2-8ea0-371178678c3a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 180 - Its a Full House Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3ecb9498-0187-4e4e-9c69-2b8f1f3d1f58/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:02</itunes:duration>
      <itunes:summary>This week in InfoSec exonerates those who were accused of being paranoid in the 90’s
 
Rant of the Week explains why you can’t win when you do your job right

Billy Big Balls is a textbook example of how to not fire someone
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week takes a deeper dive into those metrics you’re reporting</itunes:summary>
      <itunes:subtitle>This week in InfoSec exonerates those who were accused of being paranoid in the 90’s
 
Rant of the Week explains why you can’t win when you do your job right

Billy Big Balls is a textbook example of how to not fire someone
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week takes a deeper dive into those metrics you’re reporting</itunes:subtitle>
      <itunes:keywords>email, spam, you&apos;re fired, clinton, asda, y2k, cloudflare, echelon, millenium, port scans, jpmorgan, hello fresh</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>180</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bde8422a-58a6-4bbf-b6a7-c90ee629df39</guid>
      <title>Episode 179 - The One Third Empty Show</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (06:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th January 2014: Intel renamed its McAfee subsidiary Intel Security, distancing itself from the name of McAfee's founder, John McAfee. In 2017 Intel spun off McAfee as a separate company...then several months later John McAfee and Intel settled a lawsuit over Intel's use of the McAfee name.</p><p><a href="https://twitter.com/todayininfosec/status/1743711096559554607">https://twitter.com/todayininfosec/status/1743711096559554607</a></p><p>10th January 2000: The FBI was after the hacker Maxim after he posted credit card numbers online when CD Universe refused to pay $100,000 in extortion. 6 months later it was shared that he'd likely never be prosecuted b/c 1 or more of the firms which performed IR screwed up chain of custody.</p><p><a href="https://www.zdnet.com/article/data-thief-threatens-to-strike-again-5000105098/">Data thief threatens to strike again</a></p><p><a href="https://twitter.com/todayininfosec/status/1745207259058081942">https://twitter.com/todayininfosec/status/1745207259058081942</a>   </p><p>8th January 1986: "The Hacker Manifesto" was written by Loyd Blankenship (aka The Mentor) and originally titled "The Conscience of a Hacker".</p><p>8 months later it was published in issue 7 of the hacker zine Phrack.</p><p>Read it [again]. </p><p><a href="http://phrack.org/issues/7/3.html#article">http://phrack.org/issues/7/3.html#article</a></p><p><a href="https://twitter.com/todayininfosec/status/1744413963696161010">https://twitter.com/todayininfosec/status/1744413963696161010</a></p><p> </p><p><strong>Rant of the Week (16:44)</strong></p><p><a href="https://www.theregister.com/2024/01/10/phony_ransomware_researchers/">Cybercrooks play dress-up as 'helpful' researchers in latest ransomware ruse</a></p><p>Posing as cyber samaritans, scumbags are kicking folks when they're down</p><p>Ransomware victims already reeling from potential biz disruption and the cost of resolving the matter are now being subjected to follow-on extortion attempts by criminals posing as helpful security researchers.</p><p>Researchers at Arctic Wolf Labs publicized two cases in which casulaties of the Royal and Akira ransomware gangs were targeted by a third party, believed to be the same individual or group in both scenarios, and extorted by a fake cyber samaritan.</p><p>Victims were approached by a "security researcher" who offered post-exploitation services. In one case, the mark was told the ransomware gang's server could be hacked and their stolen data could be deleted.</p><p>Another victim was told the "researcher," who used different monikers in each attempt, gained access to the servers used to store victims' stolen data, offering the chance to either delete it or grant the victim access to the server themselves.</p><p>In return, the hacked customers were asked for a fee of approximately 5 Bitcoin ($225,823 at today's exchange rate).</p><p>"As far as Arctic Wolf Labs is aware, this is the first published instance of a threat actor posing as a legitimate security researcher offering to delete hacked data from a separate ransomware group," Stefan Hostetler and Steven Campbell, both senior threat intelligence researchers at Arctic Wolf, <a href="https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/">blogged</a>.</p><p>"While the personalities involved in these secondary extortion attempts were presented as separate entities, we assess with moderate confidence that the extortion attempts were likely perpetrated by the same threat actor."</p><p> </p><p><strong>Billy Big Balls of the Week (21:34)</strong></p><p><a href="https://www.bbc.co.uk/news/world-asia-india-67860456">All India Pregnant Job service: Indian men conned by 'impregnating women' scam</a></p><p>As cyber scams go, this one is rather unique.</p><p>In early December Mangesh Kumar (name changed) was scrolling on Facebook when he came across a video from the "All India Pregnant Job Service" and decided to check it out.</p><p>The job sounded too good to be true: money - and lots of it - in return for getting a woman pregnant.</p><p>It was, of course, too good to be true. So far, the 33-year-old, who earns 15,000 rupees ($180; £142) per month working for a wedding party decoration company, has already lost 16,000 rupees to fraudsters - and they are asking for more.</p><p>But Mangesh, from the northern Indian state of Bihar, is not the only person to fall for the scam.</p><p>Deputy superintendent of police Kalyan Anand, who heads the cyber cell in Bihar's Nawada district, told the BBC there were hundreds of victims of an elaborate con where gullible men were lured to part with their cash on the promise of a huge pay day, and a night in a hotel with a childless woman.</p><p>So far, his team have arrested eight men, seized nine mobile phones and a printer, and are still searching for 18 others.</p><p>But finding the victims has proved more tricky.</p><p> </p><p><strong>Industry News (29:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/23andme-blames-user-breach/">23andMe Blames User “Negligence” for Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/merck-settles-insurers-700m/">Merck Settles With Insurers Over $700m NotPetya Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hackers-stole-crypto/">North Korean Hackers Stole $600m in Crypto in 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/anti-hezbollah-hack-beirut-airport/">Anti-Hezbollah Groups Hack Beirut Airport Screens</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-blackjack-hackers/">Ukrainian “Blackjack” Hackers Take Out Russian ISP</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurance-market-worth/">Cyber Insurance Market to be Worth Over $90bn by 2033</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-states-prepared-cyber-elections/">Only 4% of US States Fully Prepared for Cyber-Attacks Targeting Elections</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-practical-security-guidance/">NCSC Publishes Practical Security Guidance For SMBs</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-x-account-brute-force/">Mandiant's X Account Was Hacked in Brute-Force Password Attack</a></p><p> </p><p><strong>Tweet of the Week (38:11)</strong></p><img src="https://lh7-us.googleusercontent.com/0DP0n-MRu1YKv1qaWw5TwYJYVXqP5mPUIISJtaFTWFpsCZg3LC7lEpbcINCKR050QRskcd8MazuNMpmSJ_CdXgi4rZFRxTp3-bmpeTUEZ-AUpSw-ry4NN1EhjuCRpIAQ0cluDYEnIwsvrPz6FdLyoO8" /><p><a href="https://twitter.com/chris_walker_/status/1744805492273430886">https://twitter.com/chris_walker_/status/1744805492273430886</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Jan 2024 22:10:23 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-179-LH1A5D_b</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (06:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th January 2014: Intel renamed its McAfee subsidiary Intel Security, distancing itself from the name of McAfee's founder, John McAfee. In 2017 Intel spun off McAfee as a separate company...then several months later John McAfee and Intel settled a lawsuit over Intel's use of the McAfee name.</p><p><a href="https://twitter.com/todayininfosec/status/1743711096559554607">https://twitter.com/todayininfosec/status/1743711096559554607</a></p><p>10th January 2000: The FBI was after the hacker Maxim after he posted credit card numbers online when CD Universe refused to pay $100,000 in extortion. 6 months later it was shared that he'd likely never be prosecuted b/c 1 or more of the firms which performed IR screwed up chain of custody.</p><p><a href="https://www.zdnet.com/article/data-thief-threatens-to-strike-again-5000105098/">Data thief threatens to strike again</a></p><p><a href="https://twitter.com/todayininfosec/status/1745207259058081942">https://twitter.com/todayininfosec/status/1745207259058081942</a>   </p><p>8th January 1986: "The Hacker Manifesto" was written by Loyd Blankenship (aka The Mentor) and originally titled "The Conscience of a Hacker".</p><p>8 months later it was published in issue 7 of the hacker zine Phrack.</p><p>Read it [again]. </p><p><a href="http://phrack.org/issues/7/3.html#article">http://phrack.org/issues/7/3.html#article</a></p><p><a href="https://twitter.com/todayininfosec/status/1744413963696161010">https://twitter.com/todayininfosec/status/1744413963696161010</a></p><p> </p><p><strong>Rant of the Week (16:44)</strong></p><p><a href="https://www.theregister.com/2024/01/10/phony_ransomware_researchers/">Cybercrooks play dress-up as 'helpful' researchers in latest ransomware ruse</a></p><p>Posing as cyber samaritans, scumbags are kicking folks when they're down</p><p>Ransomware victims already reeling from potential biz disruption and the cost of resolving the matter are now being subjected to follow-on extortion attempts by criminals posing as helpful security researchers.</p><p>Researchers at Arctic Wolf Labs publicized two cases in which casulaties of the Royal and Akira ransomware gangs were targeted by a third party, believed to be the same individual or group in both scenarios, and extorted by a fake cyber samaritan.</p><p>Victims were approached by a "security researcher" who offered post-exploitation services. In one case, the mark was told the ransomware gang's server could be hacked and their stolen data could be deleted.</p><p>Another victim was told the "researcher," who used different monikers in each attempt, gained access to the servers used to store victims' stolen data, offering the chance to either delete it or grant the victim access to the server themselves.</p><p>In return, the hacked customers were asked for a fee of approximately 5 Bitcoin ($225,823 at today's exchange rate).</p><p>"As far as Arctic Wolf Labs is aware, this is the first published instance of a threat actor posing as a legitimate security researcher offering to delete hacked data from a separate ransomware group," Stefan Hostetler and Steven Campbell, both senior threat intelligence researchers at Arctic Wolf, <a href="https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/">blogged</a>.</p><p>"While the personalities involved in these secondary extortion attempts were presented as separate entities, we assess with moderate confidence that the extortion attempts were likely perpetrated by the same threat actor."</p><p> </p><p><strong>Billy Big Balls of the Week (21:34)</strong></p><p><a href="https://www.bbc.co.uk/news/world-asia-india-67860456">All India Pregnant Job service: Indian men conned by 'impregnating women' scam</a></p><p>As cyber scams go, this one is rather unique.</p><p>In early December Mangesh Kumar (name changed) was scrolling on Facebook when he came across a video from the "All India Pregnant Job Service" and decided to check it out.</p><p>The job sounded too good to be true: money - and lots of it - in return for getting a woman pregnant.</p><p>It was, of course, too good to be true. So far, the 33-year-old, who earns 15,000 rupees ($180; £142) per month working for a wedding party decoration company, has already lost 16,000 rupees to fraudsters - and they are asking for more.</p><p>But Mangesh, from the northern Indian state of Bihar, is not the only person to fall for the scam.</p><p>Deputy superintendent of police Kalyan Anand, who heads the cyber cell in Bihar's Nawada district, told the BBC there were hundreds of victims of an elaborate con where gullible men were lured to part with their cash on the promise of a huge pay day, and a night in a hotel with a childless woman.</p><p>So far, his team have arrested eight men, seized nine mobile phones and a printer, and are still searching for 18 others.</p><p>But finding the victims has proved more tricky.</p><p> </p><p><strong>Industry News (29:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/23andme-blames-user-breach/">23andMe Blames User “Negligence” for Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/merck-settles-insurers-700m/">Merck Settles With Insurers Over $700m NotPetya Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hackers-stole-crypto/">North Korean Hackers Stole $600m in Crypto in 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/anti-hezbollah-hack-beirut-airport/">Anti-Hezbollah Groups Hack Beirut Airport Screens</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-blackjack-hackers/">Ukrainian “Blackjack” Hackers Take Out Russian ISP</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurance-market-worth/">Cyber Insurance Market to be Worth Over $90bn by 2033</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-states-prepared-cyber-elections/">Only 4% of US States Fully Prepared for Cyber-Attacks Targeting Elections</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-practical-security-guidance/">NCSC Publishes Practical Security Guidance For SMBs</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-x-account-brute-force/">Mandiant's X Account Was Hacked in Brute-Force Password Attack</a></p><p> </p><p><strong>Tweet of the Week (38:11)</strong></p><img src="https://lh7-us.googleusercontent.com/0DP0n-MRu1YKv1qaWw5TwYJYVXqP5mPUIISJtaFTWFpsCZg3LC7lEpbcINCKR050QRskcd8MazuNMpmSJ_CdXgi4rZFRxTp3-bmpeTUEZ-AUpSw-ry4NN1EhjuCRpIAQ0cluDYEnIwsvrPz6FdLyoO8" /><p><a href="https://twitter.com/chris_walker_/status/1744805492273430886">https://twitter.com/chris_walker_/status/1744805492273430886</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41817142" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f41d1fbe-1c6e-4ca5-9bf8-d99716521db7/audio/76c90001-208c-481f-a587-960e99b765dd/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 179 - The One Third Empty Show</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7acbf3ac-aeb3-497b-8f5a-e5888094c8c4/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:33</itunes:duration>
      <itunes:summary>This week in InfoSec an industry giant addresses the question “What’s in a name?”
Rant of the Week is a story about scammers double-dipping
Billy Big Balls is a story about victims getting screwed when they were trying to screw
Industry News is the latest and greatest news stories from around the world
And
Tweet of the Week was going to be a washing machine pun but we didn’t want to rinse and repeat</itunes:summary>
      <itunes:subtitle>This week in InfoSec an industry giant addresses the question “What’s in a name?”
Rant of the Week is a story about scammers double-dipping
Billy Big Balls is a story about victims getting screwed when they were trying to screw
Industry News is the latest and greatest news stories from around the world
And
Tweet of the Week was going to be a washing machine pun but we didn’t want to rinse and repeat</itunes:subtitle>
      <itunes:keywords>23andme, north korea, social engineering, mandiant, pregnancy, lost socks, washing machine, crypto, lg, x, cyber samaritan</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>179</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">555bd7d2-649d-464b-aaa2-c6fa6b9daaa3</guid>
      <title>Episode 178 - The Last Of Us Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (12:55)</strong></p><p>With content liberated from the “Today in infosec” Twitter account and further afield</p><p>11th December 2010: The hacker group Gnosis released the source code for Gawker's website and 1.3 million of its users' password hashes.</p><p>After a jury found Gawker's parent company liable in a lawsuit filed by Hulk Hogan and awarded him $140 million, Gawker shut down in 2016. </p><p><a href="https://twitter.com/todayininfosec/status/1734217170173763907">https://twitter.com/todayininfosec/status/1734217170173763907</a></p><p>14th December 2009: RockYou admitted that 32 million users' passwords (stored as plain text) and email addresses were compromised via a SQL injection vulnerability. RockYou's customer notification said "it was important to notify you of this immediately"...10 days after they became aware.</p><p><a href="https://twitter.com/todayininfosec/status/1735357287147995514">https://twitter.com/todayininfosec/status/1735357287147995514</a>   </p><p>Not really infosec <a href="https://x.com/depthsofwiki/status/1735147763447595024?s=20">https://x.com/depthsofwiki/status/1735147763447595024?s=20</a> but 14th Dec 2008 was the infamous Bush shoeing incident. Where Bush ducked the shoes thrown by Al-Zaidi while the Iraqi PM Nouri Al-Maliki tried to parry it. </p><p> </p><p><strong>Rant of the Week (22:10)</strong></p><p><a href="https://www.theregister.com/2023/12/14/uk_jcnss_ransomware_report/">UK government woefully unprepared for 'catastrophic' ransomware attack</a></p><p>The UK has failed to address the threat posed by ransomware, leaving the country at the mercy of a catastrophic ransomware attack that the Joint Committee on National Security Strategy (JCNSS) yesterday warned could occur "at any moment."</p><p>The Parliamentary Select Committee reached this conclusion in a scathing <a href="https://committees.parliament.uk/work/7017/ransomware/news/198995/a-hostage-to-fortune-ransomware-and-uk-national-security/">report</a> released December 13 that accused the government of failing to take ransomware seriously, and of providing "next-to-no support" to victims of ransomware attacks.</p><p>"There is a high risk that the government will face a catastrophic ransomware attack at any moment, and that its planning will be found lacking," the report concluded. "There will be no excuse for this approach when a major crisis occurs, and it will rightly be seen as a strategic failure."</p><p>Recent examples of ransomware infections at UK government institutions and critical private infrastructure are not hard to find.</p><p><a href="https://www.theregister.com/2023/09/15/greater_manchester_police_breach_demonstrates/">Manchester Police</a>, <a href="https://www.theregister.com/2023/11/16/royal_mail_recovery_from_ransomware/">Royal Mail</a> and the <a href="https://www.theregister.com/2023/11/20/rhysida_claims_british_library_ransomware/">British Library</a> have all fallen victim to ransomware attacks since September 2023.</p><p>In July 2023, the Barts Health NHS Trust hospital group was <a href="https://www.theregister.com/2023/07/11/barts_blackcat_theft/">hit</a> by the BlackCat ransomware gang. The NHS had already been taught a lesson about the vicious power of ransomware in 2017 when multiple Brit hospitals stopped taking new patients, other than in emergencies, after being <a href="https://www.theregister.com/2018/02/02/nhs_wannacry_post_mortem/">hobbled</a> by WannaCry.</p><p>Third-party providers of NHS software systems have been hit as well, taking systems offline and forcing care providers to <a href="https://www.theregister.com/2022/10/14/nhs_software_hosting_provider_advanced_ransomware_lockbit/">revert to pen and paper</a>.</p><p>In short, the situation with ransomware in the UK is already bad, and the JCNSS has predicted things will likely get worse.</p><p> </p><p><strong>Billy Big Balls of the Week (29:54)</strong></p><p><a href="https://www.404media.co/polish-hackers-repaired-trains-the-manufacturer-artificially-bricked-now-the-train-company-is-threatening-them/">Polish Hackers Repaired Trains the Manufacturer Artificially Bricked.</a></p><p>After breaking trains simply because an independent repair shop had worked on them, NEWAG is now demanding that trains fixed by hackers be removed from service.</p><p>They did DRM to a train. </p><p>In one of the coolest and more outrageous repair stories in quite some time, three white-hat hackers helped a regional rail company in southwest Poland unbrick a train that had been artificially rendered inoperable by the train’s manufacturer after an independent maintenance company worked on it. The train’s manufacturer is now threatening to sue the hackers who were hired by the independent repair company to fix it. </p><p>The fallout from the situation is <a href="https://www.rynek-kolejowy.pl/wiadomosci/afera-hakerska--mamy-stanowiska-sps-i-newag--116410.html?ref=404media.co">currently roiling Polish infrastructure circles</a> and the repair world, with the manufacturer of those trains denying bricking the trains despite ample evidence to the contrary. The manufacturer is also now demanding that the repaired trains immediately be removed from service because they have been “hacked,” and thus might now be unsafe, a claim they also cannot substantiate. </p><p> </p><p><strong>Industry News (38:38)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/eu-agreement-ai-act/">EU Reaches Agreement on AI Act Amid Three-Day Negotiations</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-alarm-bluetooth-criminal/">Europol Raises Alarm on Criminal Misuse of Bluetooth Trackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-psni-data-breach/">Widespread Security Flaws Blamed for Northern Ireland Police Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/">UK Ministry of Defence Fined For Afghan Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-risk-catastrophic-ransomware/">UK at High Risk of Catastrophic Ransomware Attack, Government Ill-Prepared</a></p><p><a href="https://www.infosecurity-magazine.com/news/mitre-critical-infrastructure/">MITRE Launches Critical Infrastructure Threat Model Framework</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-prolific-outlook/">Microsoft Targets Prolific Outlook Fraudster Storm-1152</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerabilities-initial-access/">Vulnerabilities Now Top Initial Access Route For Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cozy-bear-russia-jetbrains-teamcity/">Cozy Bear Hackers Target JetBrains TeamCity Servers in Global Campaign</a></p><p> </p><p><strong>Tweet of the Week (46:06)  </strong></p><img src="https://lh7-us.googleusercontent.com/VMHhaCv1jBU2Y4uSVDCdaNKbOExVUwRaiUd5430zRKP-Q_evaeJm-rfemUNKrH-pgXH34zWbuPa6KSH2aI26WV5jIDFGniD725Nuh17D5ovWZvNxGEZRKXGjP_7vtL9rQVAakdwTXtake9cauzyWm9U" /><p><a href="https://x.com/WorkRetireDie/status/1732108681087508947?s=20">https://x.com/WorkRetireDie/status/1732108681087508947?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 16 Dec 2023 01:01:57 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-178-JWrJNYqo</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a48264d7-91d4-4a58-a151-04e0ef05e296/img-3442.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (12:55)</strong></p><p>With content liberated from the “Today in infosec” Twitter account and further afield</p><p>11th December 2010: The hacker group Gnosis released the source code for Gawker's website and 1.3 million of its users' password hashes.</p><p>After a jury found Gawker's parent company liable in a lawsuit filed by Hulk Hogan and awarded him $140 million, Gawker shut down in 2016. </p><p><a href="https://twitter.com/todayininfosec/status/1734217170173763907">https://twitter.com/todayininfosec/status/1734217170173763907</a></p><p>14th December 2009: RockYou admitted that 32 million users' passwords (stored as plain text) and email addresses were compromised via a SQL injection vulnerability. RockYou's customer notification said "it was important to notify you of this immediately"...10 days after they became aware.</p><p><a href="https://twitter.com/todayininfosec/status/1735357287147995514">https://twitter.com/todayininfosec/status/1735357287147995514</a>   </p><p>Not really infosec <a href="https://x.com/depthsofwiki/status/1735147763447595024?s=20">https://x.com/depthsofwiki/status/1735147763447595024?s=20</a> but 14th Dec 2008 was the infamous Bush shoeing incident. Where Bush ducked the shoes thrown by Al-Zaidi while the Iraqi PM Nouri Al-Maliki tried to parry it. </p><p> </p><p><strong>Rant of the Week (22:10)</strong></p><p><a href="https://www.theregister.com/2023/12/14/uk_jcnss_ransomware_report/">UK government woefully unprepared for 'catastrophic' ransomware attack</a></p><p>The UK has failed to address the threat posed by ransomware, leaving the country at the mercy of a catastrophic ransomware attack that the Joint Committee on National Security Strategy (JCNSS) yesterday warned could occur "at any moment."</p><p>The Parliamentary Select Committee reached this conclusion in a scathing <a href="https://committees.parliament.uk/work/7017/ransomware/news/198995/a-hostage-to-fortune-ransomware-and-uk-national-security/">report</a> released December 13 that accused the government of failing to take ransomware seriously, and of providing "next-to-no support" to victims of ransomware attacks.</p><p>"There is a high risk that the government will face a catastrophic ransomware attack at any moment, and that its planning will be found lacking," the report concluded. "There will be no excuse for this approach when a major crisis occurs, and it will rightly be seen as a strategic failure."</p><p>Recent examples of ransomware infections at UK government institutions and critical private infrastructure are not hard to find.</p><p><a href="https://www.theregister.com/2023/09/15/greater_manchester_police_breach_demonstrates/">Manchester Police</a>, <a href="https://www.theregister.com/2023/11/16/royal_mail_recovery_from_ransomware/">Royal Mail</a> and the <a href="https://www.theregister.com/2023/11/20/rhysida_claims_british_library_ransomware/">British Library</a> have all fallen victim to ransomware attacks since September 2023.</p><p>In July 2023, the Barts Health NHS Trust hospital group was <a href="https://www.theregister.com/2023/07/11/barts_blackcat_theft/">hit</a> by the BlackCat ransomware gang. The NHS had already been taught a lesson about the vicious power of ransomware in 2017 when multiple Brit hospitals stopped taking new patients, other than in emergencies, after being <a href="https://www.theregister.com/2018/02/02/nhs_wannacry_post_mortem/">hobbled</a> by WannaCry.</p><p>Third-party providers of NHS software systems have been hit as well, taking systems offline and forcing care providers to <a href="https://www.theregister.com/2022/10/14/nhs_software_hosting_provider_advanced_ransomware_lockbit/">revert to pen and paper</a>.</p><p>In short, the situation with ransomware in the UK is already bad, and the JCNSS has predicted things will likely get worse.</p><p> </p><p><strong>Billy Big Balls of the Week (29:54)</strong></p><p><a href="https://www.404media.co/polish-hackers-repaired-trains-the-manufacturer-artificially-bricked-now-the-train-company-is-threatening-them/">Polish Hackers Repaired Trains the Manufacturer Artificially Bricked.</a></p><p>After breaking trains simply because an independent repair shop had worked on them, NEWAG is now demanding that trains fixed by hackers be removed from service.</p><p>They did DRM to a train. </p><p>In one of the coolest and more outrageous repair stories in quite some time, three white-hat hackers helped a regional rail company in southwest Poland unbrick a train that had been artificially rendered inoperable by the train’s manufacturer after an independent maintenance company worked on it. The train’s manufacturer is now threatening to sue the hackers who were hired by the independent repair company to fix it. </p><p>The fallout from the situation is <a href="https://www.rynek-kolejowy.pl/wiadomosci/afera-hakerska--mamy-stanowiska-sps-i-newag--116410.html?ref=404media.co">currently roiling Polish infrastructure circles</a> and the repair world, with the manufacturer of those trains denying bricking the trains despite ample evidence to the contrary. The manufacturer is also now demanding that the repaired trains immediately be removed from service because they have been “hacked,” and thus might now be unsafe, a claim they also cannot substantiate. </p><p> </p><p><strong>Industry News (38:38)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/eu-agreement-ai-act/">EU Reaches Agreement on AI Act Amid Three-Day Negotiations</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-alarm-bluetooth-criminal/">Europol Raises Alarm on Criminal Misuse of Bluetooth Trackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-flaws-psni-data-breach/">Widespread Security Flaws Blamed for Northern Ireland Police Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/">UK Ministry of Defence Fined For Afghan Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-risk-catastrophic-ransomware/">UK at High Risk of Catastrophic Ransomware Attack, Government Ill-Prepared</a></p><p><a href="https://www.infosecurity-magazine.com/news/mitre-critical-infrastructure/">MITRE Launches Critical Infrastructure Threat Model Framework</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-prolific-outlook/">Microsoft Targets Prolific Outlook Fraudster Storm-1152</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerabilities-initial-access/">Vulnerabilities Now Top Initial Access Route For Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cozy-bear-russia-jetbrains-teamcity/">Cozy Bear Hackers Target JetBrains TeamCity Servers in Global Campaign</a></p><p> </p><p><strong>Tweet of the Week (46:06)  </strong></p><img src="https://lh7-us.googleusercontent.com/VMHhaCv1jBU2Y4uSVDCdaNKbOExVUwRaiUd5430zRKP-Q_evaeJm-rfemUNKrH-pgXH34zWbuPa6KSH2aI26WV5jIDFGniD725Nuh17D5ovWZvNxGEZRKXGjP_7vtL9rQVAakdwTXtake9cauzyWm9U" /><p><a href="https://x.com/WorkRetireDie/status/1732108681087508947?s=20">https://x.com/WorkRetireDie/status/1732108681087508947?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47604205" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e0e9191d-1461-4ced-9e37-f9b7a8547c0e/audio/b9bb34e5-5bb7-44c9-ae93-01569ae57c9d/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 178 - The Last Of Us Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0dac2ac5-f7f9-4d69-b4d5-78c5b616ecf5/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:35</itunes:duration>
      <itunes:summary>This week in InfoSec makes a tenuous wrestling link to a security story
 
Rant of the Week is a warning the UK government is ill-prepared for what’s coming

Billy Big Balls is a train wreck
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is sage seasonal advice</itunes:summary>
      <itunes:subtitle>This week in InfoSec makes a tenuous wrestling link to a security story
 
Rant of the Week is a warning the UK government is ill-prepared for what’s coming

Billy Big Balls is a train wreck
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week is sage seasonal advice</itunes:subtitle>
      <itunes:keywords>rockyou, kerning, cozy bear, shoegate, new trains, jcnss, fonts, airtag, powerpoint, ransomware, gawker, fatherland, uk government, drm, hulk hogan</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>178</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16a9f73a-4abc-4100-893b-c8dd2abf37e3</guid>
      <title>Episode 177 - The Are We Doing This Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (07:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th December 2011: Fyodor reported that CNET's<a href="https://t.co/PgQhBDAU40"> http://Download.com</a> had been wrapping its Nmap downloads in a trojan installer...in order to monetize spyware and adware. CNET quickly stopped, then resumed within days, it affected other downloads, and was a debacle.</p><p><a href="https://insecure.org/news/download-com-fiasco.html">Download.com Caught Adding Malware to Nmap & Other Software</a></p><p><a href="https://twitter.com/todayininfosec/status/1732073893912047860">https://twitter.com/todayininfosec/status/1732073893912047860</a></p><p>4th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? Billions of  compromised records from hundreds of breaches. Search your email addresses for free.</p><p><a href="https://twitter.com/todayininfosec/status/1731673318560801228">https://twitter.com/todayininfosec/status/1731673318560801228</a>    </p><p> </p><p><strong>Rant of the Week (13:29)</strong></p><p><a href="https://www.theregister.com/2023/12/05/uk_age_verifcation_proposals/">It's ba-ack... UK watchdog publishes age verification proposals</a></p><p>The UK's communications regulator has laid out guidance on how online services might perform age checks as part of the Online Safety Act.</p><p>The range of proposals from Ofcom are likely to send privacy activists running for the hills. These include credit card checks, facial age estimation, and photo ID matching.</p><p>The checks are all in the name of protecting children from the grot that festoons large swathes of the world wide web. However, service providers will likely be stuck between a rock and a hard place in implementing the guidance without also falling foul of privacy regulations. For example, Ofcom notes the following age checks as potentially "highly effective":</p><ul><li>Open banking, where a bank confirms a user is over 18 without sharing any other personal information.</li><li>Mobile network operator (MNO) age check, where the responsibility is shunted onto an MNO content restriction filter that can only be removed if the device user can prove to the MNO that they are over 18.</li><li>Photo ID matching, where an image of the user is compared to an uploaded document used as proof of age to verify that they are the same person.</li><li>Credit card checks, where a credit card account is checked for validity – in the UK, credit card holders must be over 18.</li><li>Digital identity wallets and, our favorite, facial age estimation, where the features of a user's face are analyzed to estimate the user's age.</li></ul><p>It doesn't take a genius to imagine how a determined teenager might circumvent many of these restrictions, nor the potential privacy nightmare inherent in many of them if an adult is forced to share this level of info when accessing age-restricted sites.</p><p> </p><p><strong>Billy Big Balls of the Week (23:12)</strong></p><p><a href="https://thehackernews.com/2023/12/whatsapps-new-secret-code-feature-lets.html">WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with Password</a></p><p>Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password on the messaging platform.</p><p>The feature has been <a href="https://blog.whatsapp.com/introducing-secret-code-for-chat-lock">described</a> as an "additional way to protect those chats and make them harder to find if someone has access to your phone or you share a phone with someone else."</p><p>Secret Code builds on another feature called <a href="https://blog.whatsapp.com/chat-lock-making-your-most-intimate-conversations-even-more-private">Chat Lock</a> that WhatsApp announced in May, which moves chats to a separate folder of their own such that they can be accessed only upon providing their device password or biometrics.</p><p>By setting a unique password for these locked chats that are different from the password used to unlock the phone, the aim is to give users an additional layer of privacy, WhatsApp noted.</p><p>"You'll have the option to hide the Locked Chats folder from your chatlist so that they can only be discovered by typing your secret code in the search bar," it added.</p><p>The development comes weeks after WhatsApp <a href="https://thehackernews.com/2023/11/whatsapp-introduces-new-privacy-feature.html">introduced</a> a "Protect IP Address in Calls" feature that masks users' IP addresses to other parties by relaying the calls through its servers.</p><p><br /><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sellafield-covering-up-major-cyber/">Sellafield Accused of Covering Up Major Cyber Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/porn-age-checks-threaten-security/">Porn Age Checks Threaten Security and Privacy, Report Warns</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-agencies-miss-deadline-incident/">US Federal Agencies Miss Deadline for Incident Response Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/disney-cyber-scheme-new-tactics/">Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-1000-suspected-money/">Police Arrest 1000 Suspected Money Mules</a></p><p><a href="https://www.infosecurity-magazine.com/news/deutsche-wohnen-ruling-drive-up/">Deutsche Wohnen Ruling Set to Drive Up GDPR Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/cambridge-hospitals-two-excel-data/">Cambridge Hospitals Admit Two Excel-Based Data Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/governments-spying-apple-google/">Governments Spying on Apple and Google Users, Says Senator</a></p><p><a href="https://www.infosecurity-magazine.com/news/liability-fears-damaging-ciso-role/">Liability Fears Damaging CISO Role, Says Former Uber CISO</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh7-us.googleusercontent.com/RunOHHN2By7zKjvMu3jOBzsXu7gizz2dlzgAHmkkjTB-ZrdI_zBIkuezA3wRKAlSJqDkljMxXimR54BL8_zGbn4SEYYTbM0NPHyn9p-Z7jFinUZ7zxj4kG82VKzF57y4gvFi_WTXROGmnLgpZMCNXa8" /><p><a href="https://twitter.com/MalwareJake/status/1732463774949310547">https://twitter.com/MalwareJake/status/1732463774949310547</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Dec 2023 14:40:44 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-177-YJxy8g3a</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/21b03e7e-c84c-4e2a-90bc-23ae3f9de8cf/img-3442.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (07:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th December 2011: Fyodor reported that CNET's<a href="https://t.co/PgQhBDAU40"> http://Download.com</a> had been wrapping its Nmap downloads in a trojan installer...in order to monetize spyware and adware. CNET quickly stopped, then resumed within days, it affected other downloads, and was a debacle.</p><p><a href="https://insecure.org/news/download-com-fiasco.html">Download.com Caught Adding Malware to Nmap & Other Software</a></p><p><a href="https://twitter.com/todayininfosec/status/1732073893912047860">https://twitter.com/todayininfosec/status/1732073893912047860</a></p><p>4th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? Billions of  compromised records from hundreds of breaches. Search your email addresses for free.</p><p><a href="https://twitter.com/todayininfosec/status/1731673318560801228">https://twitter.com/todayininfosec/status/1731673318560801228</a>    </p><p> </p><p><strong>Rant of the Week (13:29)</strong></p><p><a href="https://www.theregister.com/2023/12/05/uk_age_verifcation_proposals/">It's ba-ack... UK watchdog publishes age verification proposals</a></p><p>The UK's communications regulator has laid out guidance on how online services might perform age checks as part of the Online Safety Act.</p><p>The range of proposals from Ofcom are likely to send privacy activists running for the hills. These include credit card checks, facial age estimation, and photo ID matching.</p><p>The checks are all in the name of protecting children from the grot that festoons large swathes of the world wide web. However, service providers will likely be stuck between a rock and a hard place in implementing the guidance without also falling foul of privacy regulations. For example, Ofcom notes the following age checks as potentially "highly effective":</p><ul><li>Open banking, where a bank confirms a user is over 18 without sharing any other personal information.</li><li>Mobile network operator (MNO) age check, where the responsibility is shunted onto an MNO content restriction filter that can only be removed if the device user can prove to the MNO that they are over 18.</li><li>Photo ID matching, where an image of the user is compared to an uploaded document used as proof of age to verify that they are the same person.</li><li>Credit card checks, where a credit card account is checked for validity – in the UK, credit card holders must be over 18.</li><li>Digital identity wallets and, our favorite, facial age estimation, where the features of a user's face are analyzed to estimate the user's age.</li></ul><p>It doesn't take a genius to imagine how a determined teenager might circumvent many of these restrictions, nor the potential privacy nightmare inherent in many of them if an adult is forced to share this level of info when accessing age-restricted sites.</p><p> </p><p><strong>Billy Big Balls of the Week (23:12)</strong></p><p><a href="https://thehackernews.com/2023/12/whatsapps-new-secret-code-feature-lets.html">WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with Password</a></p><p>Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password on the messaging platform.</p><p>The feature has been <a href="https://blog.whatsapp.com/introducing-secret-code-for-chat-lock">described</a> as an "additional way to protect those chats and make them harder to find if someone has access to your phone or you share a phone with someone else."</p><p>Secret Code builds on another feature called <a href="https://blog.whatsapp.com/chat-lock-making-your-most-intimate-conversations-even-more-private">Chat Lock</a> that WhatsApp announced in May, which moves chats to a separate folder of their own such that they can be accessed only upon providing their device password or biometrics.</p><p>By setting a unique password for these locked chats that are different from the password used to unlock the phone, the aim is to give users an additional layer of privacy, WhatsApp noted.</p><p>"You'll have the option to hide the Locked Chats folder from your chatlist so that they can only be discovered by typing your secret code in the search bar," it added.</p><p>The development comes weeks after WhatsApp <a href="https://thehackernews.com/2023/11/whatsapp-introduces-new-privacy-feature.html">introduced</a> a "Protect IP Address in Calls" feature that masks users' IP addresses to other parties by relaying the calls through its servers.</p><p><br /><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sellafield-covering-up-major-cyber/">Sellafield Accused of Covering Up Major Cyber Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/porn-age-checks-threaten-security/">Porn Age Checks Threaten Security and Privacy, Report Warns</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-agencies-miss-deadline-incident/">US Federal Agencies Miss Deadline for Incident Response Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/disney-cyber-scheme-new-tactics/">Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-1000-suspected-money/">Police Arrest 1000 Suspected Money Mules</a></p><p><a href="https://www.infosecurity-magazine.com/news/deutsche-wohnen-ruling-drive-up/">Deutsche Wohnen Ruling Set to Drive Up GDPR Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/cambridge-hospitals-two-excel-data/">Cambridge Hospitals Admit Two Excel-Based Data Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/governments-spying-apple-google/">Governments Spying on Apple and Google Users, Says Senator</a></p><p><a href="https://www.infosecurity-magazine.com/news/liability-fears-damaging-ciso-role/">Liability Fears Damaging CISO Role, Says Former Uber CISO</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh7-us.googleusercontent.com/RunOHHN2By7zKjvMu3jOBzsXu7gizz2dlzgAHmkkjTB-ZrdI_zBIkuezA3wRKAlSJqDkljMxXimR54BL8_zGbn4SEYYTbM0NPHyn9p-Z7jFinUZ7zxj4kG82VKzF57y4gvFi_WTXROGmnLgpZMCNXa8" /><p><a href="https://twitter.com/MalwareJake/status/1732463774949310547">https://twitter.com/MalwareJake/status/1732463774949310547</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="38354768" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/095630f2-e549-4ea5-823f-af9a17781495/audio/f62b9a91-7271-442e-84d2-9835575da9a7/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 177 - The Are We Doing This Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b3429a78-0173-4a59-b228-c14f61286f1e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:57</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of CNETs own goal
 
Rant of the Week is asking you think of the children, yet AGAIN

Billy Big Balls is a minor step to save us from being prematurely cancelled
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week  is our first prediction for 2024</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of CNETs own goal
 
Rant of the Week is asking you think of the children, yet AGAIN

Billy Big Balls is a minor step to save us from being prematurely cancelled
 
Industry News is the latest and greatest news stories from around the world

And

Tweet of the Week  is our first prediction for 2024</itunes:subtitle>
      <itunes:keywords>bsides london, uber ciso, whatsapp, haveibeenpwned, chat lock, ofcom, sellafied, meeting with hr, online safety act, hangover, 2024 predictions</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>177</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">616138c6-6aa1-4f2c-b3fd-2c3e60a504d6</guid>
      <title>Episode 176 - The Jingle Free Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (09:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. </p><p><a href="https://twitter.com/todayininfosec/status/1728048404452782497">https://twitter.com/todayininfosec/status/1728048404452782497</a></p><p>26th November 2001: "In an effort to turn the tide in the war on terrorism", Cult of the Dead Cow offered its expertise to the FBI. How did it plan on helping? By architecting a new version of Back Orifice for use by the US federal government.</p><p><a href="https://web.archive.org/web/20121025180334/http://w3.cultdeadcow.com/cms/2001/11/the-cult-of-the.html">"THE CULT OF THE DEAD COW OFFERS A HELPING HAND IN AMERICA'S TIME OF NEED"</a></p><p><a href="https://twitter.com/todayininfosec/status/1728998509033238952">https://twitter.com/todayininfosec/status/1728998509033238952</a>   </p><p> </p><p><strong>Rant of the Week (18:55)</strong></p><p><a href="https://www.theregister.com/2023/12/01/interpol_biohub_arrest/">Interpol makes first border arrest using Biometric Hub to ID suspect</a></p><p>European police have for the first time made an arrest after remotely checking Interpol's trove of biometric data to identify a suspected smuggler.</p><p>The fugitive migrant, we're told, gave a fake name and phony identification documents at a police check in Sarajevo, Bosnia and Herzegovina, while traveling toward Western Europe. And he probably would have got away with it, too, if it weren't for you meddling kids Interpol's Biometric Hub – a recently activated tool that uses French identity and biometrics vendor Idemia's technology to match people's biometric data against the multinational policing org's global fingerprint and facial recognition databases.</p><p>"When the smuggler's photo was run through the Biometric Hub, it immediately flagged that he was wanted in another European country," Interpol <a href="https://www.interpol.int/en/News-and-Events/News/2023/INTERPOL-unveils-new-biometric-screening-tool">declared</a>. "He was arrested and is currently awaiting extradition."</p><p>Interpol introduced the Biometric Hub – aka BioHub – in October, and it is now available to law enforcement in all 196 member countries.</p><p> </p><p><strong>Billy Big Balls of the Week (27:42)</strong></p><p><a href="https://www.theregister.com/2023/11/28/cert_in_rti_exemption/">https://www.theregister.com/2023/11/28/cert_in_rti_exemption/</a></p><p>India's government has granted its Computer Emergency Response Team, CERT-In, immunity from Right To Information (RTI) requests – the nation's equivalent of the freedom of information queries in the US, UK, or Australia.</p><p>Reasons for the exemption have not been explained, but The Register has reported on one case in which an RTI request embarrassed CERT-In.</p><p>That case related to India's sudden decision, in April 2022, to <a href="https://www.theregister.com/2022/04/29/cert_in_directive/">require</a> businesses of all sizes to report infosec incidents to CERT-in within six hours of detection. The rapid reporting requirement applied both to serious incidents like ransomware attacks, and less critical messes like the compromise of a social media account.</p><p>CERT-In justified the rules as necessary to defend the nation's cyberspace and gave just sixty days notice for implementation.</p><p>The plan generated <a href="https://www.theregister.com/2022/05/10/india_infosec_rules_criticised/">local</a> and <a href="https://www.theregister.com/2022/05/29/global_opposition_india_infosec_plan/">international criticism</a> for being onerous and inconsistent with global reporting standards such as Europe's 72-hour deadline for notifying authorities of data breaches.</p><p>The reporting requirements even applied to cloud operators, who were asked to report incidents on tenants' servers. Big Tech therefore opposed the plan.</p><p> </p><p><strong>Industry News (34:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fnf-hit-by-cybersecurity-incident/">Cybersecurity Incident Hits Fidelity National Financial</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-criminals-hesitant/">Cybercriminals Hesitant About Using Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-fixes-sixth-chrome-zeroday/">Google Fixes Sixth Chrome Zero-Day Bug of the Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/weakness-google-workspace-security/">DeleFriend Weakness Puts Google Workspace Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-all-customer-support-users/">Okta Admits All Customer Support Users Impacted By Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-dollar-tree-staff/">Thousands of Dollar Tree Staff Hit By Supplier Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/booking-customers-scammend-social/">Booking.com Customers Scammed in Novel Social Engineering Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/manufacturing-top-targeted-orange/">Manufacturing Top Targeted Industry in Record-Breaking Cyber Extortion Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-amass-dollar3b-crypto/">North Korean Hackers Amass $3bn in Cryptocurrency Heists</a></p><p> </p><p><strong>Tweet of the Week (43:12)</strong></p><img src="https://lh7-us.googleusercontent.com/HOyXDMyJ7QUkiZBWq7Gfj2s9W7Y0qtodXK-NeYj6jJYYdDPu6vFJe22AMlPEts-JGbUYxppnbIEB3xEwStzcoXyENBNaqkMaSdj52DMQaaTUvLEmiGLHJTWxFjVBCi6fmqPC1oP318iv51L0HjxgaSg" /><p><a href="https://twitter.com/JamesGoz/status/1730498780812767350">https://twitter.com/JamesGoz/status/1730498780812767350</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 2 Dec 2023 23:27:12 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-176-qvjra4wv</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (09:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. </p><p><a href="https://twitter.com/todayininfosec/status/1728048404452782497">https://twitter.com/todayininfosec/status/1728048404452782497</a></p><p>26th November 2001: "In an effort to turn the tide in the war on terrorism", Cult of the Dead Cow offered its expertise to the FBI. How did it plan on helping? By architecting a new version of Back Orifice for use by the US federal government.</p><p><a href="https://web.archive.org/web/20121025180334/http://w3.cultdeadcow.com/cms/2001/11/the-cult-of-the.html">"THE CULT OF THE DEAD COW OFFERS A HELPING HAND IN AMERICA'S TIME OF NEED"</a></p><p><a href="https://twitter.com/todayininfosec/status/1728998509033238952">https://twitter.com/todayininfosec/status/1728998509033238952</a>   </p><p> </p><p><strong>Rant of the Week (18:55)</strong></p><p><a href="https://www.theregister.com/2023/12/01/interpol_biohub_arrest/">Interpol makes first border arrest using Biometric Hub to ID suspect</a></p><p>European police have for the first time made an arrest after remotely checking Interpol's trove of biometric data to identify a suspected smuggler.</p><p>The fugitive migrant, we're told, gave a fake name and phony identification documents at a police check in Sarajevo, Bosnia and Herzegovina, while traveling toward Western Europe. And he probably would have got away with it, too, if it weren't for you meddling kids Interpol's Biometric Hub – a recently activated tool that uses French identity and biometrics vendor Idemia's technology to match people's biometric data against the multinational policing org's global fingerprint and facial recognition databases.</p><p>"When the smuggler's photo was run through the Biometric Hub, it immediately flagged that he was wanted in another European country," Interpol <a href="https://www.interpol.int/en/News-and-Events/News/2023/INTERPOL-unveils-new-biometric-screening-tool">declared</a>. "He was arrested and is currently awaiting extradition."</p><p>Interpol introduced the Biometric Hub – aka BioHub – in October, and it is now available to law enforcement in all 196 member countries.</p><p> </p><p><strong>Billy Big Balls of the Week (27:42)</strong></p><p><a href="https://www.theregister.com/2023/11/28/cert_in_rti_exemption/">https://www.theregister.com/2023/11/28/cert_in_rti_exemption/</a></p><p>India's government has granted its Computer Emergency Response Team, CERT-In, immunity from Right To Information (RTI) requests – the nation's equivalent of the freedom of information queries in the US, UK, or Australia.</p><p>Reasons for the exemption have not been explained, but The Register has reported on one case in which an RTI request embarrassed CERT-In.</p><p>That case related to India's sudden decision, in April 2022, to <a href="https://www.theregister.com/2022/04/29/cert_in_directive/">require</a> businesses of all sizes to report infosec incidents to CERT-in within six hours of detection. The rapid reporting requirement applied both to serious incidents like ransomware attacks, and less critical messes like the compromise of a social media account.</p><p>CERT-In justified the rules as necessary to defend the nation's cyberspace and gave just sixty days notice for implementation.</p><p>The plan generated <a href="https://www.theregister.com/2022/05/10/india_infosec_rules_criticised/">local</a> and <a href="https://www.theregister.com/2022/05/29/global_opposition_india_infosec_plan/">international criticism</a> for being onerous and inconsistent with global reporting standards such as Europe's 72-hour deadline for notifying authorities of data breaches.</p><p>The reporting requirements even applied to cloud operators, who were asked to report incidents on tenants' servers. Big Tech therefore opposed the plan.</p><p> </p><p><strong>Industry News (34:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fnf-hit-by-cybersecurity-incident/">Cybersecurity Incident Hits Fidelity National Financial</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-criminals-hesitant/">Cybercriminals Hesitant About Using Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-fixes-sixth-chrome-zeroday/">Google Fixes Sixth Chrome Zero-Day Bug of the Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/weakness-google-workspace-security/">DeleFriend Weakness Puts Google Workspace Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-all-customer-support-users/">Okta Admits All Customer Support Users Impacted By Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-dollar-tree-staff/">Thousands of Dollar Tree Staff Hit By Supplier Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/booking-customers-scammend-social/">Booking.com Customers Scammed in Novel Social Engineering Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/manufacturing-top-targeted-orange/">Manufacturing Top Targeted Industry in Record-Breaking Cyber Extortion Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-amass-dollar3b-crypto/">North Korean Hackers Amass $3bn in Cryptocurrency Heists</a></p><p> </p><p><strong>Tweet of the Week (43:12)</strong></p><img src="https://lh7-us.googleusercontent.com/HOyXDMyJ7QUkiZBWq7Gfj2s9W7Y0qtodXK-NeYj6jJYYdDPu6vFJe22AMlPEts-JGbUYxppnbIEB3xEwStzcoXyENBNaqkMaSdj52DMQaaTUvLEmiGLHJTWxFjVBCi6fmqPC1oP318iv51L0HjxgaSg" /><p><a href="https://twitter.com/JamesGoz/status/1730498780812767350">https://twitter.com/JamesGoz/status/1730498780812767350</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45678248" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e85a3852-2370-4802-9731-3b964c27ec41/audio/6973c92d-acf8-405a-a4c0-e2b0a288515e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 176 - The Jingle Free Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e9e82c3b-87eb-4ee9-9679-0ea7c9ba11a5/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:34</itunes:duration>
      <itunes:summary>This week in InfoSec is moooving from one orifice to another
Rant of the Week is all over your face
Billy Big Balls is do as I say, not as I do
Industry News is the latest and greatest news stories from around the world
And
Tweet of the Week  is about the good old days</itunes:summary>
      <itunes:subtitle>This week in InfoSec is moooving from one orifice to another
Rant of the Week is all over your face
Billy Big Balls is do as I say, not as I do
Industry News is the latest and greatest news stories from around the world
And
Tweet of the Week  is about the good old days</itunes:subtitle>
      <itunes:keywords>cert-in, back orifice, north korea, cryptocurrency, okta, india, biohub, idemis, server reboot, bionic ever after, europol, cult of the dead cow, interpol</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>176</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0a99a439-add3-4c00-9546-b1fe3f99ada1</guid>
      <title>Episode 175 - The Sam Altman Free Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (06:40) </strong></p><p>23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan exploited. Evilgrade toolkit author Francisco Amato had reported it to Apple in 2008.</p><p><a href="https://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">Apple Took 3+ Years to Fix FinFisher Trojan Hole</a></p><p><a href="https://twitter.com/todayininfosec/status/1727687798017106025">https://twitter.com/todayininfosec/status/1727687798017106025</a></p><p>12th November 2009: John Matherly announced the public beta launch of Shodan (<a href="https://twitter.com/shodanhq">@shodanhq</a>) - the first search engine for internet-connected devices.</p><p><a href="https://twitter.com/todayininfosec/status/1727462790330232951">https://twitter.com/todayininfosec/status/1727462790330232951</a>  </p><p> </p><p><strong>Rant of the Week (10:51)</strong></p><p><a href="https://www.theregister.com/2023/11/20/former_infosec_coo_pleads_guilty/">Former infosec COO pleads guilty to attacking hospitals to drum up business</a></p><p>An Atlanta tech company's former COO has pleaded guilty to a 2018 incident in which he deliberately launched online attacks on two hospitals, later citing the incidents in sales pitches.</p><p>Under a plea deal he signed last week, Vikas Singla, a former business leader at network security vendor Securolytics – a provider to healthcare institutions, among others – admitted that in September 2018 he rendered the Ascom phone system of Gwinnett Medical Center inoperable.</p><p>Gwinnett Medical Center operates hospitals in Duluth and Lawrenceville and the deliberate disablement of the Ascom phone system meant the main communication line between doctors and nurses was unavailable to them.</p><p>More than 200 phones were taken offline, which were used for internal communications, including "code blue" incidents that often relate to cardiac or respiratory emergencies.</p><p> </p><p><strong>Billy Big Balls of the Week (18:52) </strong></p><p><a href="https://www.theregister.com/2023/11/22/uk_ico_cookie_action/">UK's cookie crumble: Data watchdog serves up tougher recipe for consent banners</a></p><p>The UK's Information Commissioner's Office (ICO) is getting tough on website design, insisting that opting out of cookies must be as simple as opting in.</p><p>At question are advertising cookies, where users should be able to "Accept All" advertising cookies or reject them. Users will still see adverts regardless of their selection, but rejecting advertising cookies means ads must not be tailored to the person browsing.</p><p>However, the ICO <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/commissioner-warns-uk-s-top-websites-to-make-cookie-changes/">noted</a> that: "Some websites do not give users fair choices over whether or not to be tracked for personalized advertising." This is despite <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/08/ico-and-cma-harmful-online-design-encourages-consumers-to-hand-over-personal-information/">guidance</a> issued in August regarding harmful designs that can trick users into giving up more personal information than intended.</p><p>A few months on, the ICO has upped the ante. It has now given 30 days' notice to companies running many of the UK's most visited sites that they must comply with data protection regulations or face enforcement action.</p><p> </p><p><strong>Industry News (26:16) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-executive-guilty/">Cybersecurity Executive Pleads Guilty to Hacking Hospitals</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-issues-privacy-ultimatum/">Regulator Issues Privacy Ultimatum to UK’s Top Websites</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/">Microsoft Launches Defender Bug Bounty Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/supply-chain-security-space/">Why Ensuring Supply Chain Security in the Space Sector is Critical</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-library-ransomware-attack/">British Library: Ransomware Attack Led to Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-cyberlink-supply-chain/">North Korea Blamed For CyberLink Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-seizes-9m-from-pig-butchering/">US Seizes $9m From Pig Butchering Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-supply-chain-booming/">North Korean Software Supply Chain Threat is Booming, UK and South Korea Warn</a></p><p><a href="https://www.infosecurity-magazine.com/news/infectedslurs-botnet-mirai-zero/">InfectedSlurs Botnet Resurrects Mirai With Zero-Days</a></p><p> </p><p><strong>Tweet of the Week (32:28)</strong></p><img src="https://lh7-us.googleusercontent.com/w3WTlsBpBs9_uIt8f-ZOH22ZGSGpF_wy27g5OxmpgcRAfb04Fx-nkAdN_sS1OOpN5Zq1ZRLR5A358YFMI5JfGFMDTAoEXKbRTtRlm_xyTaAXKRLjlRSxh2UWEmemPaUYqzOpEvNhVkCmQPi1P95d1as" /><p><a href="https://twitter.com/MichaelaOkla/status/1721715089970274542">https://twitter.com/MichaelaOkla/status/1721715089970274542</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 27 Nov 2023 20:24:07 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-175-FX_Mq3YR</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (06:40) </strong></p><p>23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan exploited. Evilgrade toolkit author Francisco Amato had reported it to Apple in 2008.</p><p><a href="https://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">Apple Took 3+ Years to Fix FinFisher Trojan Hole</a></p><p><a href="https://twitter.com/todayininfosec/status/1727687798017106025">https://twitter.com/todayininfosec/status/1727687798017106025</a></p><p>12th November 2009: John Matherly announced the public beta launch of Shodan (<a href="https://twitter.com/shodanhq">@shodanhq</a>) - the first search engine for internet-connected devices.</p><p><a href="https://twitter.com/todayininfosec/status/1727462790330232951">https://twitter.com/todayininfosec/status/1727462790330232951</a>  </p><p> </p><p><strong>Rant of the Week (10:51)</strong></p><p><a href="https://www.theregister.com/2023/11/20/former_infosec_coo_pleads_guilty/">Former infosec COO pleads guilty to attacking hospitals to drum up business</a></p><p>An Atlanta tech company's former COO has pleaded guilty to a 2018 incident in which he deliberately launched online attacks on two hospitals, later citing the incidents in sales pitches.</p><p>Under a plea deal he signed last week, Vikas Singla, a former business leader at network security vendor Securolytics – a provider to healthcare institutions, among others – admitted that in September 2018 he rendered the Ascom phone system of Gwinnett Medical Center inoperable.</p><p>Gwinnett Medical Center operates hospitals in Duluth and Lawrenceville and the deliberate disablement of the Ascom phone system meant the main communication line between doctors and nurses was unavailable to them.</p><p>More than 200 phones were taken offline, which were used for internal communications, including "code blue" incidents that often relate to cardiac or respiratory emergencies.</p><p> </p><p><strong>Billy Big Balls of the Week (18:52) </strong></p><p><a href="https://www.theregister.com/2023/11/22/uk_ico_cookie_action/">UK's cookie crumble: Data watchdog serves up tougher recipe for consent banners</a></p><p>The UK's Information Commissioner's Office (ICO) is getting tough on website design, insisting that opting out of cookies must be as simple as opting in.</p><p>At question are advertising cookies, where users should be able to "Accept All" advertising cookies or reject them. Users will still see adverts regardless of their selection, but rejecting advertising cookies means ads must not be tailored to the person browsing.</p><p>However, the ICO <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/commissioner-warns-uk-s-top-websites-to-make-cookie-changes/">noted</a> that: "Some websites do not give users fair choices over whether or not to be tracked for personalized advertising." This is despite <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/08/ico-and-cma-harmful-online-design-encourages-consumers-to-hand-over-personal-information/">guidance</a> issued in August regarding harmful designs that can trick users into giving up more personal information than intended.</p><p>A few months on, the ICO has upped the ante. It has now given 30 days' notice to companies running many of the UK's most visited sites that they must comply with data protection regulations or face enforcement action.</p><p> </p><p><strong>Industry News (26:16) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-executive-guilty/">Cybersecurity Executive Pleads Guilty to Hacking Hospitals</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-issues-privacy-ultimatum/">Regulator Issues Privacy Ultimatum to UK’s Top Websites</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/">Microsoft Launches Defender Bug Bounty Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/supply-chain-security-space/">Why Ensuring Supply Chain Security in the Space Sector is Critical</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-library-ransomware-attack/">British Library: Ransomware Attack Led to Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-cyberlink-supply-chain/">North Korea Blamed For CyberLink Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-seizes-9m-from-pig-butchering/">US Seizes $9m From Pig Butchering Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-supply-chain-booming/">North Korean Software Supply Chain Threat is Booming, UK and South Korea Warn</a></p><p><a href="https://www.infosecurity-magazine.com/news/infectedslurs-botnet-mirai-zero/">InfectedSlurs Botnet Resurrects Mirai With Zero-Days</a></p><p> </p><p><strong>Tweet of the Week (32:28)</strong></p><img src="https://lh7-us.googleusercontent.com/w3WTlsBpBs9_uIt8f-ZOH22ZGSGpF_wy27g5OxmpgcRAfb04Fx-nkAdN_sS1OOpN5Zq1ZRLR5A358YFMI5JfGFMDTAoEXKbRTtRlm_xyTaAXKRLjlRSxh2UWEmemPaUYqzOpEvNhVkCmQPi1P95d1as" /><p><a href="https://twitter.com/MichaelaOkla/status/1721715089970274542">https://twitter.com/MichaelaOkla/status/1721715089970274542</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="34431384" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/568e5222-634b-4711-b53f-91f4e9be1d24/audio/fd80c077-d5a1-4411-8fcd-9c7f3594af07/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 175 - The Sam Altman Free Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/cec60e3e-44eb-433d-bd31-3213a6fef795/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:51</itunes:duration>
      <itunes:summary>This week in InfoSec proves that 3 years is “a reasonable amount of time”
 
Rant of the Week is a traditional hospital pass
Billy Big Balls stretches the cooking analogy to the breaking point
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week  is proof that there is no such thing as paranoia, someone really is watching you</itunes:summary>
      <itunes:subtitle>This week in InfoSec proves that 3 years is “a reasonable amount of time”
 
Rant of the Week is a traditional hospital pass
Billy Big Balls stretches the cooking analogy to the breaking point
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week  is proof that there is no such thing as paranoia, someone really is watching you</itunes:subtitle>
      <itunes:keywords>finfisher, scumbaf, charlatan, shodan, apple, ico, vikas singla, black friday, cookie, privacy, securolytic, stalking</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>175</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">43181687-e570-48dc-b1ea-c9ab4f54f84f</guid>
      <title>Episode 174 - The Brexit Episode</title>
      <description><![CDATA[<p>6:48 <strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><ol><li>15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initiating the hoax..</li></ol><p><a href="https://twitter.com/todayininfosec/status/1724867863725412627">https://twitter.com/todayininfosec/status/1724867863725412627</a></p><ol><li>12th November 2012: John McAfee went into hiding because his neighbor, Gregory Faull, was found dead from a gunshot. Belize police wanted him to come in for questioning, but he fled to Guatemala where he was then arrested. He was never charged, though he lost a $25 million wrongful death suit. </li></ol><p><a href="https://twitter.com/todayininfosec/status/1723790884053938623">https://twitter.com/todayininfosec/status/1723790884053938623</a></p><p> </p><p>11:57 <strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/11/16/clorox_ciso_washes_out/">Clorox CISO flushes self after multimillion-dollar cyberattack</a></p><p>The Clorox Company's chief security officer has left her job in the wake of a corporate network breach that cost the manufacturer hundreds of millions of dollars.</p><p> </p><p> 18:15 <strong>Billy Big Balls</strong></p><p><a href="https://www.theregister.com/2023/11/16/blackcat_ransomware_luring_corporate_targets/">BlackCat plays with malvertising traps to lure corporate victims</a></p><p>Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware</p><p>AlphV files SEC complaint</p><p>Affiliates of ransomware gang AlphV (aka <a href="https://www.theregister.com/2022/03/22/talos-ransomware-blackcat/">BlackCat</a>) claimed to have compromised digital lending firm MeridianLink – and reportedly filed an SEC complaint against the fintech firm for failing to disclose the intrusion to the US watchdog.</p><p>First <a href="https://www.databreaches.net/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec/">reported</a> by DataBreaches, the break-in apparently happened on November 7. AlphaV’s operatives claimed they did not encrypt any files but did steal some data – and MeridianLink was allegedly aware of the intrusion the day it occurred.</p><p> </p><p>24:15 <strong>Industry news</strong></p><p><a href="https://www.infosecurity-magazine.com/news/mps-dangerously-uninformed-facial/">MPs Dangerously Uninformed About Facial Recognition – Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-devastating-impact/">Cyber-Attack Could Have “Devastating” Impact on Aussie Exports</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-uk-enduring-significant/">NCSC: UK Facing “Enduring and Significant” Cyber-Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-black-friday-smart/">UK Privacy Regulator Issues Black Friday Smart Device Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-gov-first-ai-roadmap-for/">US Government Unveils First AI Roadmap For Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-take-down-9m/">European Police Take Down $9m Vishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-reports-victim-to/">BlackCat Ransomware Group Reports Victim to SEC</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-sandworm-attack-danish/">Russian Hacking Group Sandworm Linked to Unprecedented Attack on Danish Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminals-gaza-crisis-fake-charity/">Cyber-Criminals Exploit Gaza Crisis With Fake Charity</a></p><p> </p><p>30:56 <strong>Tweet of the Week</strong></p><img src="https://lh7-us.googleusercontent.com/jAxifLyg9xaPJ_QHaGxP9fSS2wjjQMNFW8gz9ti72LNLYqqnin4zXZw3ximHNVoE9UMwbudCGs5agYWObD3JCVUmFUosC9HIOpGQecXbW_zcG2BO1raw-a9VrKUhiCEJv92OMm4o2N_umyVELPURnxQ" /><p><a href="https://twitter.com/FadzaiVeanah/status/1724825417196904743">https://twitter.com/FadzaiVeanah/status/1724825417196904743</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Nov 2023 23:33:58 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andy Agnês, Javvad Malik, Andrew Agnês, Also Andrew Agnes, Mostly Andy Agnes, Written by Andy A)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-174-the-brexit-episode-HAjolRW1</link>
      <content:encoded><![CDATA[<p>6:48 <strong>This week in InfoSec  </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><ol><li>15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initiating the hoax..</li></ol><p><a href="https://twitter.com/todayininfosec/status/1724867863725412627">https://twitter.com/todayininfosec/status/1724867863725412627</a></p><ol><li>12th November 2012: John McAfee went into hiding because his neighbor, Gregory Faull, was found dead from a gunshot. Belize police wanted him to come in for questioning, but he fled to Guatemala where he was then arrested. He was never charged, though he lost a $25 million wrongful death suit. </li></ol><p><a href="https://twitter.com/todayininfosec/status/1723790884053938623">https://twitter.com/todayininfosec/status/1723790884053938623</a></p><p> </p><p>11:57 <strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/11/16/clorox_ciso_washes_out/">Clorox CISO flushes self after multimillion-dollar cyberattack</a></p><p>The Clorox Company's chief security officer has left her job in the wake of a corporate network breach that cost the manufacturer hundreds of millions of dollars.</p><p> </p><p> 18:15 <strong>Billy Big Balls</strong></p><p><a href="https://www.theregister.com/2023/11/16/blackcat_ransomware_luring_corporate_targets/">BlackCat plays with malvertising traps to lure corporate victims</a></p><p>Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware</p><p>AlphV files SEC complaint</p><p>Affiliates of ransomware gang AlphV (aka <a href="https://www.theregister.com/2022/03/22/talos-ransomware-blackcat/">BlackCat</a>) claimed to have compromised digital lending firm MeridianLink – and reportedly filed an SEC complaint against the fintech firm for failing to disclose the intrusion to the US watchdog.</p><p>First <a href="https://www.databreaches.net/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec/">reported</a> by DataBreaches, the break-in apparently happened on November 7. AlphaV’s operatives claimed they did not encrypt any files but did steal some data – and MeridianLink was allegedly aware of the intrusion the day it occurred.</p><p> </p><p>24:15 <strong>Industry news</strong></p><p><a href="https://www.infosecurity-magazine.com/news/mps-dangerously-uninformed-facial/">MPs Dangerously Uninformed About Facial Recognition – Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-devastating-impact/">Cyber-Attack Could Have “Devastating” Impact on Aussie Exports</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-uk-enduring-significant/">NCSC: UK Facing “Enduring and Significant” Cyber-Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-black-friday-smart/">UK Privacy Regulator Issues Black Friday Smart Device Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-gov-first-ai-roadmap-for/">US Government Unveils First AI Roadmap For Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-take-down-9m/">European Police Take Down $9m Vishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-reports-victim-to/">BlackCat Ransomware Group Reports Victim to SEC</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-sandworm-attack-danish/">Russian Hacking Group Sandworm Linked to Unprecedented Attack on Danish Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminals-gaza-crisis-fake-charity/">Cyber-Criminals Exploit Gaza Crisis With Fake Charity</a></p><p> </p><p>30:56 <strong>Tweet of the Week</strong></p><img src="https://lh7-us.googleusercontent.com/jAxifLyg9xaPJ_QHaGxP9fSS2wjjQMNFW8gz9ti72LNLYqqnin4zXZw3ximHNVoE9UMwbudCGs5agYWObD3JCVUmFUosC9HIOpGQecXbW_zcG2BO1raw-a9VrKUhiCEJv92OMm4o2N_umyVELPURnxQ" /><p><a href="https://twitter.com/FadzaiVeanah/status/1724825417196904743">https://twitter.com/FadzaiVeanah/status/1724825417196904743</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="33207463" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/64b3cfc6-b5d3-4064-8498-582cd574a72a/audio/a7369f11-1e25-4af0-8b59-3eb8656ea894/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 174 - The Brexit Episode</itunes:title>
      <itunes:author>Thom Langford, Andy Agnês, Javvad Malik, Andrew Agnês, Also Andrew Agnes, Mostly Andy Agnes, Written by Andy A</itunes:author>
      <itunes:duration>00:34:35</itunes:duration>
      <itunes:summary>This week in InfoSec is a reminder of the Good Times, literally
With the unreliable Thom and Jav out of the country, it&apos;s left to Andy to carry the show (as usual).  
Rant of the Week is a story about finding a fall guy (or gal)
Billy Big Balls aims for compliance through extortion
Industry News brings us the latest and greatest security news stories from around the world
And Tweet of the Week  is some job hunting advice</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a reminder of the Good Times, literally
With the unreliable Thom and Jav out of the country, it&apos;s left to Andy to carry the show (as usual).  
Rant of the Week is a story about finding a fall guy (or gal)
Billy Big Balls aims for compliance through extortion
Industry News brings us the latest and greatest security news stories from around the world
And Tweet of the Week  is some job hunting advice</itunes:subtitle>
      <itunes:keywords>rant of the week, industry news, surprise me, smashing security, cyber security, this week in infosec, security podcast, blackcat, billy big balls, ransomware, ai, technology news, information security, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>174</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">38284f9e-6234-48b1-9286-852b04762369</guid>
      <title>Episode 173 - The Are We Still Doing This Episode</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (05:41) </strong></p><p>2002: In response to a report which insinuated Mac is less vulnerable than Windows, Microsoft suggested few focus on discovering Mac vulnerabilities and that products with more customers will have more vulnerabilities reported.</p><p>https://t.co/WOUUDOB0g6</p><img src="https://pbs.twimg.com/media/F-Vmv1QboAAq4pu?format=png&name=medium" alt="Image" /><p>https://x.com/todayininfosec/status/1721895407545143382?s=20</p><p> </p><p><strong>Rant of the Week (11:09)</strong></p><p>Photos of naked patients and medical records have been posted online by extortionists who hacked a Las Vegas plastic surgery, driving victims to file a lawsuit claiming not enough care was taken to protect their private information.</p><p>https://www.bitdefender.com/blog/hotforsecurity/women-sue-plastic-surgery-after-hack-saw-their-naked-photos-posted-online/</p><p>  </p><p><strong>Billy Big Balls of the Week (20:48)</strong></p><p>A federal judge on Tuesday refused to bring back a <a href="https://www.documentcloud.org/documents/24133084-22-35448">class action lawsuit</a>alleging four auto manufacturers had violated Washington state’s privacy laws by using vehicles’ on-board infotainment systems to record and intercept customers’ private text messages and mobile phone call logs.</p><p>https://therecord.media/class-action-lawsuit-cars-text-messages-privacy</p><p> </p><p><strong>Industry News (29:28) </strong></p><p><a href="https://therecord.media/sentinelone-to-acquire-krebs-stamos-group">SentinelOne to acquire cybersecurity consulting firm Krebs Stamos Group</a></p><p><a href="https://therecord.media/nato-cyber-defence-summit-collective-response">NATO allies express support for collective response to cyberattacks</a></p><p><a href="https://therecord.media/scotland-western-isles-comhairle-nan-eilean-siar-incident">Council for Scottish islands faces IT outage after ‘incident’</a></p><p><a href="https://therecord.media/mortgage-giant-mr-cooper-cyberattack">Mortgage giant Mr. Cooper using alternative payment options after cyberattack</a></p><p><a href="https://therecord.media/serbian-pleads-guilty-monolopy-market">Serbian pleads guilty to running ‘Monopoly’ darknet marketplace</a></p><p><a href="https://therecord.media/japan-aviation-electronics-says-servers-accessed-during-cyberattack">Japan Aviation Electronics says servers accessed during cyberattack</a></p><p> </p><p><strong>Tweet of the Week (42:39)</strong></p><p>https://twitter.com/j4vv4d/status/1722916507653394575?s=61&t=0s-EyC1T6uSS3Lo_cyqI4w</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Nov 2023 18:26:13 +0000</pubDate>
      <author>thom@tl2security.com (Thom langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-173-Qo58wY2X</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (05:41) </strong></p><p>2002: In response to a report which insinuated Mac is less vulnerable than Windows, Microsoft suggested few focus on discovering Mac vulnerabilities and that products with more customers will have more vulnerabilities reported.</p><p>https://t.co/WOUUDOB0g6</p><img src="https://pbs.twimg.com/media/F-Vmv1QboAAq4pu?format=png&name=medium" alt="Image" /><p>https://x.com/todayininfosec/status/1721895407545143382?s=20</p><p> </p><p><strong>Rant of the Week (11:09)</strong></p><p>Photos of naked patients and medical records have been posted online by extortionists who hacked a Las Vegas plastic surgery, driving victims to file a lawsuit claiming not enough care was taken to protect their private information.</p><p>https://www.bitdefender.com/blog/hotforsecurity/women-sue-plastic-surgery-after-hack-saw-their-naked-photos-posted-online/</p><p>  </p><p><strong>Billy Big Balls of the Week (20:48)</strong></p><p>A federal judge on Tuesday refused to bring back a <a href="https://www.documentcloud.org/documents/24133084-22-35448">class action lawsuit</a>alleging four auto manufacturers had violated Washington state’s privacy laws by using vehicles’ on-board infotainment systems to record and intercept customers’ private text messages and mobile phone call logs.</p><p>https://therecord.media/class-action-lawsuit-cars-text-messages-privacy</p><p> </p><p><strong>Industry News (29:28) </strong></p><p><a href="https://therecord.media/sentinelone-to-acquire-krebs-stamos-group">SentinelOne to acquire cybersecurity consulting firm Krebs Stamos Group</a></p><p><a href="https://therecord.media/nato-cyber-defence-summit-collective-response">NATO allies express support for collective response to cyberattacks</a></p><p><a href="https://therecord.media/scotland-western-isles-comhairle-nan-eilean-siar-incident">Council for Scottish islands faces IT outage after ‘incident’</a></p><p><a href="https://therecord.media/mortgage-giant-mr-cooper-cyberattack">Mortgage giant Mr. Cooper using alternative payment options after cyberattack</a></p><p><a href="https://therecord.media/serbian-pleads-guilty-monolopy-market">Serbian pleads guilty to running ‘Monopoly’ darknet marketplace</a></p><p><a href="https://therecord.media/japan-aviation-electronics-says-servers-accessed-during-cyberattack">Japan Aviation Electronics says servers accessed during cyberattack</a></p><p> </p><p><strong>Tweet of the Week (42:39)</strong></p><p>https://twitter.com/j4vv4d/status/1722916507653394575?s=61&t=0s-EyC1T6uSS3Lo_cyqI4w</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46153885" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c2833d90-eb72-4ea9-a518-a826b01b9f4b/audio/193679a6-dc4a-4abe-b6ce-8728a2de6519/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 173 - The Are We Still Doing This Episode</itunes:title>
      <itunes:author>Thom langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9669c605-43b0-4913-ab37-3203845a63fc/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:04</itunes:duration>
      <itunes:summary>This Week in InfoSec proves Macs don&apos;t get viruses
Rant of the Week contains naked pictures
Billy Big Balls is about your car snooping on you
Industry news brings you the latest and greatest infosec news stories from around the globe, and
Tweet of the Week is an attack on the American financial system</itunes:summary>
      <itunes:subtitle>This Week in InfoSec proves Macs don&apos;t get viruses
Rant of the Week contains naked pictures
Billy Big Balls is about your car snooping on you
Industry news brings you the latest and greatest infosec news stories from around the globe, and
Tweet of the Week is an attack on the American financial system</itunes:subtitle>
      <itunes:keywords>krebs, snooping cars, mr cooper, plastic surgery, criminals, jhapan aviation, naked, sentinelone, monopoly, stamos</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>173</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb688a93-30a2-4a89-895d-af2238e7c530</guid>
      <title>Episode 172 - The One Job Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (07:11)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th October 2006: Christopher Soghoian created a website allowing visitors to generate fake airlines boarding passes. A congressman called for his arrest, his ISP shut down his site, the FBI raided his home, and then the same congressman said DHS should hire him. His career since? Notable.</p><p><a href="https://twitter.com/todayininfosec/status/1717530966229475523">https://twitter.com/todayininfosec/status/1717530966229475523</a></p><p>24th October 2010: Eric Butler announced Firefox extension Firesheep's release at Toorcon, making HTTP session hijacking on open Wi-Fi trivial. Today >95% of websites have enabled HTTPS and efforts like browser HTTPS-Only mode have largely eliminated the risk. A security industry success! </p><p><a href="https://twitter.com/todayininfosec/status/1716990537171918976">https://twitter.com/todayininfosec/status/1716990537171918976</a></p><p> </p><p><strong>Rant of the Week (16:00)</strong></p><p><a href="https://www.theregister.com/2023/10/19/musk_x_europe/">First Brexit, now X-it: Musk 'considering' pulling platform from EU over probe</a></p><p>Elon Musk is said to be toying with the idea of withdrawing access to X in the European Union rather than go to the effort of complying with the bloc's Digital Services Act.</p><p>As The Register <a href="https://www.theregister.com/2023/10/11/eu_threatens_x_with_dsa/">reported</a> last week, His Muskiness had a rather public spat on the website with Thierry Breton, EU Commissioner for Internal Market, who was simply reminding social media platforms of their content moderation obligations under the law.</p><p>This was particularly in light of renewed hostilities between Israel and Hamas, and the potential disinformation campaigns that had begun swirling online. Meta, TikTok, and YouTube were also sent letters.</p><p>"Free speech absolutist" Musk's response was <a href="https://twitter.com/elonmusk/status/1711832919335976991">sarcastic and juvenile</a>, the kind of smack talk that would get a teen grounded. It would take a couple of days for the adult in the room, CEO Linda Yaccarino, to get a <a href="https://twitter.com/lindayaX/status/1712342353304846603">formal response</a> written.</p><p>However, by then the EU had indicated that X was now <a href="https://ec.europa.eu/commission/presscorner/detail/en/IP_23_4953">under investigation</a> on account of its designation as Very Large Online Platform under the Digital Services Act, which means it has to follow rules regarding how it handles illegal content <a href="https://www.theregister.com/2023/04/26/amazon_app_store_bookingcom_and/">among many other things</a>.</p><p>Since Musk increasingly appears to see <a href="https://www.theregister.com/2023/10/06/musk_in_hot_water_with/">obeying the law as optional</a> for him, it would be very unlike the X owner to actually do anything, and whispers out of the company seem to support this.</p><p>That most watertight of sources, "a person familiar with the matter," told <a href="https://archive.ph/jvNtQ">Insider</a> that Musk "has discussed simply removing the app's availability in the region, or blocking users in the European Union from accessing it," much like how Meta's Threads <a href="https://www.theregister.com/2023/07/05/threads_comes_to_uk/">declined to launch in the EU</a> because it was unwilling and/or unable to meet the union's onerous data protection and privacy requirements.</p><p>Twitter, which was once intensely moderated, has become a wild west of violence, misinformation, disinformation, racism, and hardcore pornography. Many of the website's rules judging what users can and can't post have been screwed up and tossed in the trash.</p><p> </p><p><strong>Billy Big Balls of the Week (26:45)</strong></p><p><a href="https://www.theregister.com/2023/10/19/north_korea_fake_freelance_avoidance/">‘How not to hire a North Korean plant posing as a techie’ guide updated by US and South Korean authorities</a></p><p>US and South Korean authorities have updated their guidance on how to avoid hiring North Korean agents seeking work as freelance IT practitioners</p><p>Thousands of North Korean techies are <a href="https://www.theregister.com/2022/05/17/fbi_korea_freelancers/">thought</a> to prowl the world’s freelance platforms seeking work outside the Republic. Kim Jong Un’s regime uses the workers to earn hard currency, and infiltrate organizations they work for to steal secrets and plant malware. The FBI has previously warned employers to watch for suspicious behavior such as logging in from multiple IP addresses, working odd hours, and inconsistencies in name spellings across different online platforms.</p><p>The <a href="https://www.ic3.gov/Media/Y2023/PSA231018">updated advice</a> adds other indicators that freelancer you are thinking about hiring could be a North Korean plant, including:</p><ul><li>Repeated requests for prepayment followed by “anger or aggression when the request is denied”;</li><li>Threats to release proprietary source codes if additional payments are not made;</li><li>Using a freight forwarder’s address as the destination for a company laptop rather than a home address, and changing that address frequently;</li><li>Evading in-person meetings or requests for drug tests;</li><li>Changing payment methods or accounts on freelance-finder platforms;</li><li>Having multiple online profiles for the same identity with different pictures, or online profiles with no picture.</li></ul><p>The updated guidance suggests requiring recruitment companies to document their background checking processes, to be sure that they can screen out North Korean stooges. </p><p>Conducting your own due diligence on workers suggested by recruiters is also recommended.</p><p> </p><p><strong>Industry News (33:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/okta-reveals-breach-via-stolen/">Okta Breached Via Stolen Credential</a></p><p><a href="https://www.infosecurity-magazine.com/news/genai-can-save-phishers-two-days/">Generative AI Can Save Phishers Two Days of Work</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-demand-digital-trust/">AI to Create Demand for Digital Trust Professionals, ISACA Survey Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/aws-security-not-a-priority-third/">AWS: Security Not a Priority For a Third of SMBs</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-to-rethink-trust-generative/">Humans Need to Rethink Trust in the Wake of Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-parliament-opens-inquiry/">UK Parliament Opens Inquiry into Cyber-Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-releases-cybersecurity/">CISA Releases Cybersecurity Toolkit For Healthcare</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-police-start-planning/">Europol: Police Must Start Planning For Post-Quantum Future</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-pros-worried-c-suite-ai-training/">UK IT Pros Express Concerns About C-Suite’s Generative AI Ambitions</a></p><p> </p><p>NADINE DORRIES: I Googled my name, and learnt all about Big Tech!</p><p><a href="https://www.dailymail.co.uk/debate/article-12663701/NADINE-DORRIES-Googled-learnt-Big-Tech.html">https://www.dailymail.co.uk/debate/article-12663701/NADINE-DORRIES-Googled-learnt-Big-Tech.html</a></p><p><a href="https://twitter.com/AdamBienkov/status/1716735397802233947">https://twitter.com/AdamBienkov/status/1716735397802233947</a></p><p>“Nadine Dorries, who until last year was in charge of digital regulation in the UK, says tech executives have “big dials” which they deliberately use to “nudge opinion ever leftwards” and suggests this was somehow hidden from her when she met them”</p><p> </p><p><strong>Tweet of the Week (41:05)</strong></p><img src="https://lh7-us.googleusercontent.com/_TFAlWy_rnlu3A8y_V--MDhmG2dyArzqOt34DZ6oEF-5stJYScl39c1L_E4rYcewXew7SQNnp3DUmq2mznsg4ies2gCg9HNCQy_AOWuWKO1qzHTZRl6OMGDW6DTO-66jo1VYfvNQyb5vtKxxbad2QRQ" /><p><a href="https://twitter.com/gcluley/status/1717433320823218640">https://twitter.com/gcluley/status/1717433320823218640</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 28 Oct 2023 00:16:45 +0000</pubDate>
      <author>thom@tl2security.com (Graham Cluley, Thom Langford, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-172-MZmkI2AV</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (07:11)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th October 2006: Christopher Soghoian created a website allowing visitors to generate fake airlines boarding passes. A congressman called for his arrest, his ISP shut down his site, the FBI raided his home, and then the same congressman said DHS should hire him. His career since? Notable.</p><p><a href="https://twitter.com/todayininfosec/status/1717530966229475523">https://twitter.com/todayininfosec/status/1717530966229475523</a></p><p>24th October 2010: Eric Butler announced Firefox extension Firesheep's release at Toorcon, making HTTP session hijacking on open Wi-Fi trivial. Today >95% of websites have enabled HTTPS and efforts like browser HTTPS-Only mode have largely eliminated the risk. A security industry success! </p><p><a href="https://twitter.com/todayininfosec/status/1716990537171918976">https://twitter.com/todayininfosec/status/1716990537171918976</a></p><p> </p><p><strong>Rant of the Week (16:00)</strong></p><p><a href="https://www.theregister.com/2023/10/19/musk_x_europe/">First Brexit, now X-it: Musk 'considering' pulling platform from EU over probe</a></p><p>Elon Musk is said to be toying with the idea of withdrawing access to X in the European Union rather than go to the effort of complying with the bloc's Digital Services Act.</p><p>As The Register <a href="https://www.theregister.com/2023/10/11/eu_threatens_x_with_dsa/">reported</a> last week, His Muskiness had a rather public spat on the website with Thierry Breton, EU Commissioner for Internal Market, who was simply reminding social media platforms of their content moderation obligations under the law.</p><p>This was particularly in light of renewed hostilities between Israel and Hamas, and the potential disinformation campaigns that had begun swirling online. Meta, TikTok, and YouTube were also sent letters.</p><p>"Free speech absolutist" Musk's response was <a href="https://twitter.com/elonmusk/status/1711832919335976991">sarcastic and juvenile</a>, the kind of smack talk that would get a teen grounded. It would take a couple of days for the adult in the room, CEO Linda Yaccarino, to get a <a href="https://twitter.com/lindayaX/status/1712342353304846603">formal response</a> written.</p><p>However, by then the EU had indicated that X was now <a href="https://ec.europa.eu/commission/presscorner/detail/en/IP_23_4953">under investigation</a> on account of its designation as Very Large Online Platform under the Digital Services Act, which means it has to follow rules regarding how it handles illegal content <a href="https://www.theregister.com/2023/04/26/amazon_app_store_bookingcom_and/">among many other things</a>.</p><p>Since Musk increasingly appears to see <a href="https://www.theregister.com/2023/10/06/musk_in_hot_water_with/">obeying the law as optional</a> for him, it would be very unlike the X owner to actually do anything, and whispers out of the company seem to support this.</p><p>That most watertight of sources, "a person familiar with the matter," told <a href="https://archive.ph/jvNtQ">Insider</a> that Musk "has discussed simply removing the app's availability in the region, or blocking users in the European Union from accessing it," much like how Meta's Threads <a href="https://www.theregister.com/2023/07/05/threads_comes_to_uk/">declined to launch in the EU</a> because it was unwilling and/or unable to meet the union's onerous data protection and privacy requirements.</p><p>Twitter, which was once intensely moderated, has become a wild west of violence, misinformation, disinformation, racism, and hardcore pornography. Many of the website's rules judging what users can and can't post have been screwed up and tossed in the trash.</p><p> </p><p><strong>Billy Big Balls of the Week (26:45)</strong></p><p><a href="https://www.theregister.com/2023/10/19/north_korea_fake_freelance_avoidance/">‘How not to hire a North Korean plant posing as a techie’ guide updated by US and South Korean authorities</a></p><p>US and South Korean authorities have updated their guidance on how to avoid hiring North Korean agents seeking work as freelance IT practitioners</p><p>Thousands of North Korean techies are <a href="https://www.theregister.com/2022/05/17/fbi_korea_freelancers/">thought</a> to prowl the world’s freelance platforms seeking work outside the Republic. Kim Jong Un’s regime uses the workers to earn hard currency, and infiltrate organizations they work for to steal secrets and plant malware. The FBI has previously warned employers to watch for suspicious behavior such as logging in from multiple IP addresses, working odd hours, and inconsistencies in name spellings across different online platforms.</p><p>The <a href="https://www.ic3.gov/Media/Y2023/PSA231018">updated advice</a> adds other indicators that freelancer you are thinking about hiring could be a North Korean plant, including:</p><ul><li>Repeated requests for prepayment followed by “anger or aggression when the request is denied”;</li><li>Threats to release proprietary source codes if additional payments are not made;</li><li>Using a freight forwarder’s address as the destination for a company laptop rather than a home address, and changing that address frequently;</li><li>Evading in-person meetings or requests for drug tests;</li><li>Changing payment methods or accounts on freelance-finder platforms;</li><li>Having multiple online profiles for the same identity with different pictures, or online profiles with no picture.</li></ul><p>The updated guidance suggests requiring recruitment companies to document their background checking processes, to be sure that they can screen out North Korean stooges. </p><p>Conducting your own due diligence on workers suggested by recruiters is also recommended.</p><p> </p><p><strong>Industry News (33:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/okta-reveals-breach-via-stolen/">Okta Breached Via Stolen Credential</a></p><p><a href="https://www.infosecurity-magazine.com/news/genai-can-save-phishers-two-days/">Generative AI Can Save Phishers Two Days of Work</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-demand-digital-trust/">AI to Create Demand for Digital Trust Professionals, ISACA Survey Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/aws-security-not-a-priority-third/">AWS: Security Not a Priority For a Third of SMBs</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-to-rethink-trust-generative/">Humans Need to Rethink Trust in the Wake of Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-parliament-opens-inquiry/">UK Parliament Opens Inquiry into Cyber-Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-releases-cybersecurity/">CISA Releases Cybersecurity Toolkit For Healthcare</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-police-start-planning/">Europol: Police Must Start Planning For Post-Quantum Future</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-pros-worried-c-suite-ai-training/">UK IT Pros Express Concerns About C-Suite’s Generative AI Ambitions</a></p><p> </p><p>NADINE DORRIES: I Googled my name, and learnt all about Big Tech!</p><p><a href="https://www.dailymail.co.uk/debate/article-12663701/NADINE-DORRIES-Googled-learnt-Big-Tech.html">https://www.dailymail.co.uk/debate/article-12663701/NADINE-DORRIES-Googled-learnt-Big-Tech.html</a></p><p><a href="https://twitter.com/AdamBienkov/status/1716735397802233947">https://twitter.com/AdamBienkov/status/1716735397802233947</a></p><p>“Nadine Dorries, who until last year was in charge of digital regulation in the UK, says tech executives have “big dials” which they deliberately use to “nudge opinion ever leftwards” and suggests this was somehow hidden from her when she met them”</p><p> </p><p><strong>Tweet of the Week (41:05)</strong></p><img src="https://lh7-us.googleusercontent.com/_TFAlWy_rnlu3A8y_V--MDhmG2dyArzqOt34DZ6oEF-5stJYScl39c1L_E4rYcewXew7SQNnp3DUmq2mznsg4ies2gCg9HNCQy_AOWuWKO1qzHTZRl6OMGDW6DTO-66jo1VYfvNQyb5vtKxxbad2QRQ" /><p><a href="https://twitter.com/gcluley/status/1717433320823218640">https://twitter.com/gcluley/status/1717433320823218640</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44180282" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c9e0cd14-aff2-4284-b3a5-f488cc0aadf9/audio/9c012a8e-475e-4008-a2c2-3e1a815d15b8/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 172 - The One Job Episode</itunes:title>
      <itunes:author>Graham Cluley, Thom Langford, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f008dca9-dead-471e-ba68-121ad6b6c47c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:01</itunes:duration>
      <itunes:summary>This week in InfoSec is a story about a catalyst for change
 
Rant of the Week puts the X-it in BreXit

Billy Big Balls asks why no one thought of this before
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week brings us full circle</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a story about a catalyst for change
 
Rant of the Week puts the X-it in BreXit

Billy Big Balls asks why no one thought of this before
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week brings us full circle</itunes:subtitle>
      <itunes:keywords>https, eu privacy, north korea, post-quantum, brexit, firefox, bureau of meteorology, hiring, musk, cyber-resilience, x</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>172</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">82f63fa1-509f-48f8-a03e-3977e908486b</guid>
      <title>Episode 171 - The Stitched Up Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec  (09:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th October 2018: Google announced that it exposed the private info of hundreds of thousands of Google+ users between 2015 and 2018, only disclosing it 7 months after discovery because it was reported by The Wall Street Journal. Social network Google+ launched in 2011 and closed in 2019. </p><p><a href="https://www.theverge.com/2018/10/8/17951914/google-plus-data-breach-exposed-user-profile-information-privacy-not-disclosed">Google hid major Google+ security flaw that exposed users’ personal information</a></p><p><a href="https://twitter.com/todayininfosec/status/1711159728552685667">https://twitter.com/todayininfosec/status/1711159728552685667</a></p><p>16th October 1983: FBI agents raided homes of "young electronics buffs known as 'hackers'" in 6 states as part of an investigation of unauthorized intrusions into scores of large commercial and DoD computers. These teens included Lord Flathead - real name Tom Anderson, future MySpace founder.</p><img src="https://lh5.googleusercontent.com/G0zFtz2V5B0Qj2ZZpYjWoQC0iuxcvxYV9EbDPcqoQVX1oxY5qxa4ZpNoSosCFWTBUVrSFhSHlhQXj9pXelC7d_FIfNacy1UymKPmtj5672a7FbgtD6taraYdVFUtSaZJmxL0onUaidnLWN7Gsae6DL0" /><p><a href="https://twitter.com/todayininfosec/status/1712593589237076056">https://twitter.com/todayininfosec/status/1712593589237076056</a></p><p> </p><p><strong>Rant of the Week (15:44)</strong></p><p><a href="https://www.theregister.com/2023/10/12/everest_courting_corporate_insiders/">Everest cybercriminals offer corporate insiders cold, hard cash for remote access</a></p><p>The Everest ransomware group is stepping up its efforts to purchase access to corporate networks directly from employees amid what researchers believe to be a major transition for the cybercriminals.</p><p>In a post at the top of its dark web victim blog, Everest said it will offer a "good percentage" of the profits generated from successful attacks to those who assist in its initial intrusion.</p><p>The group also promised to offer partners "full transparency" regarding the nature of each operation, as well as confidentiality about their role in the attack.</p><p>Everest is specifically looking for access to organizations based in the US, Canada, and Europe, and would accept remote access by a variety of means including TeamViewer, AnyDesk, and RDP.</p><img src="https://lh3.googleusercontent.com/4EiT2eNloCsWRfo9Qda62cdogx9-BJ4EPNCj4v9BNrGKwnWwVzrkW06TNtaqsTAS56hvqXk72clcuhXO45BtrXX25q0AAe2pD2X90z7VpIMHQMMb9T7LuDdzQiWEsKl4JPGz-kyISWPMVkcdJInrsPI" /><p> </p><p><strong>Billy Big Balls of the Week (22:23)</strong></p><p><a href="https://www.theregister.com/2023/10/13/chinese_citizens_feel_their_government/">Chinese citizens feel their government is doing a fine job with surveillance</a></p><p>Chinese residents are generally comfortable with widespread use of surveillance technology, according to a year-long project conducted by the Australian Strategic Policy Institute (ASPI) and an unnamed non-government research partner.</p><p>The project mainly investigated how state surveillance is conducted by Beijing and how the population of the People's Republic of China (PRC) perceives it. For the investigation, the researchers conducted media analysis, and an online survey of over 4,000 Chinese citizens.</p><p>Most respondents ranked their trust in central government positively – at an average of 7.3 on a scale out of 10. Businesses received a 6.7 rating. When it came to surveillance – by video, audio or internet activity – roughly half said they were comfortable.</p><p>As part of the project, ASPI provided a tool that could be considered quite subversive in China: an interactive website that provided access to uncensored non-Beijing information about deployed surveillance technologies and the agencies that run them. It consisted of five educational modules with quizzes at the end.</p><p>The website content was shaped by the survey results and reached over 55,000 users over the course of four months. It covered facial recognition, Wi-Fi probes, DNA surveillance, database management and surveillance cameras.</p><p> </p><p><strong>Industry News (28:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/aws-multifactor-authentication-2024/">AWS to Mandate Multi-Factor Authentication from 2024</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackbaud-settles-ransomware-case/">Blackbaud Settles Ransomware Breach Case For $49.5m</a></p><p><a href="https://www.infosecurity-magazine.com/news/dna-tester-23andme-credential/">DNA Tester 23andMe Hit By Credential Stuffing Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/mgm-resorts-dollar100m-costs/">MGM Resorts Reveals Over $100M in Costs After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/air-europa-customers-cancel-cards/">Air Europa Asks Customers to Cancel Cards After Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-smashes-data-breach-record/">US Smashes Annual Data Breach Record With Three Months Left</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-hackathon-hunts/">European Police Hackathon Hunts Down Traffickers</a></p><p><a href="https://www.infosecurity-magazine.com/news/">Chinese APT ToddyCat Targets Asian Telecoms, Governments</a></p><p><a href="https://www.infosecurity-magazine.com/news/california-enacts-delete-act/">California Enacts “Delete Act” For Data Privacy</a></p><p> </p><p><strong>Tweet of the Week (36:01) </strong></p><img src="https://lh5.googleusercontent.com/TmMoqecRzSBy1sSsGeH-X-oFPhczlEzx4EopQ4DlsRoRkjJaXJyjwAqr-gwEq7ZIiQGMZqqu_pzjmftjSKCV5KSd9aOpm91SUwa-Fk7ujyk2jXrKSUoEScqvNYyOVrK6qviZEaLw13TiAeM_5SiSTbo" /><p><a href="https://twitter.com/ireteeh/status/1712408097170325968">https://twitter.com/ireteeh/status/1712408097170325968</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 13 Oct 2023 14:45:09 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-171-C2A1FabW</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec  (09:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th October 2018: Google announced that it exposed the private info of hundreds of thousands of Google+ users between 2015 and 2018, only disclosing it 7 months after discovery because it was reported by The Wall Street Journal. Social network Google+ launched in 2011 and closed in 2019. </p><p><a href="https://www.theverge.com/2018/10/8/17951914/google-plus-data-breach-exposed-user-profile-information-privacy-not-disclosed">Google hid major Google+ security flaw that exposed users’ personal information</a></p><p><a href="https://twitter.com/todayininfosec/status/1711159728552685667">https://twitter.com/todayininfosec/status/1711159728552685667</a></p><p>16th October 1983: FBI agents raided homes of "young electronics buffs known as 'hackers'" in 6 states as part of an investigation of unauthorized intrusions into scores of large commercial and DoD computers. These teens included Lord Flathead - real name Tom Anderson, future MySpace founder.</p><img src="https://lh5.googleusercontent.com/G0zFtz2V5B0Qj2ZZpYjWoQC0iuxcvxYV9EbDPcqoQVX1oxY5qxa4ZpNoSosCFWTBUVrSFhSHlhQXj9pXelC7d_FIfNacy1UymKPmtj5672a7FbgtD6taraYdVFUtSaZJmxL0onUaidnLWN7Gsae6DL0" /><p><a href="https://twitter.com/todayininfosec/status/1712593589237076056">https://twitter.com/todayininfosec/status/1712593589237076056</a></p><p> </p><p><strong>Rant of the Week (15:44)</strong></p><p><a href="https://www.theregister.com/2023/10/12/everest_courting_corporate_insiders/">Everest cybercriminals offer corporate insiders cold, hard cash for remote access</a></p><p>The Everest ransomware group is stepping up its efforts to purchase access to corporate networks directly from employees amid what researchers believe to be a major transition for the cybercriminals.</p><p>In a post at the top of its dark web victim blog, Everest said it will offer a "good percentage" of the profits generated from successful attacks to those who assist in its initial intrusion.</p><p>The group also promised to offer partners "full transparency" regarding the nature of each operation, as well as confidentiality about their role in the attack.</p><p>Everest is specifically looking for access to organizations based in the US, Canada, and Europe, and would accept remote access by a variety of means including TeamViewer, AnyDesk, and RDP.</p><img src="https://lh3.googleusercontent.com/4EiT2eNloCsWRfo9Qda62cdogx9-BJ4EPNCj4v9BNrGKwnWwVzrkW06TNtaqsTAS56hvqXk72clcuhXO45BtrXX25q0AAe2pD2X90z7VpIMHQMMb9T7LuDdzQiWEsKl4JPGz-kyISWPMVkcdJInrsPI" /><p> </p><p><strong>Billy Big Balls of the Week (22:23)</strong></p><p><a href="https://www.theregister.com/2023/10/13/chinese_citizens_feel_their_government/">Chinese citizens feel their government is doing a fine job with surveillance</a></p><p>Chinese residents are generally comfortable with widespread use of surveillance technology, according to a year-long project conducted by the Australian Strategic Policy Institute (ASPI) and an unnamed non-government research partner.</p><p>The project mainly investigated how state surveillance is conducted by Beijing and how the population of the People's Republic of China (PRC) perceives it. For the investigation, the researchers conducted media analysis, and an online survey of over 4,000 Chinese citizens.</p><p>Most respondents ranked their trust in central government positively – at an average of 7.3 on a scale out of 10. Businesses received a 6.7 rating. When it came to surveillance – by video, audio or internet activity – roughly half said they were comfortable.</p><p>As part of the project, ASPI provided a tool that could be considered quite subversive in China: an interactive website that provided access to uncensored non-Beijing information about deployed surveillance technologies and the agencies that run them. It consisted of five educational modules with quizzes at the end.</p><p>The website content was shaped by the survey results and reached over 55,000 users over the course of four months. It covered facial recognition, Wi-Fi probes, DNA surveillance, database management and surveillance cameras.</p><p> </p><p><strong>Industry News (28:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/aws-multifactor-authentication-2024/">AWS to Mandate Multi-Factor Authentication from 2024</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackbaud-settles-ransomware-case/">Blackbaud Settles Ransomware Breach Case For $49.5m</a></p><p><a href="https://www.infosecurity-magazine.com/news/dna-tester-23andme-credential/">DNA Tester 23andMe Hit By Credential Stuffing Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/mgm-resorts-dollar100m-costs/">MGM Resorts Reveals Over $100M in Costs After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/air-europa-customers-cancel-cards/">Air Europa Asks Customers to Cancel Cards After Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-smashes-data-breach-record/">US Smashes Annual Data Breach Record With Three Months Left</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-hackathon-hunts/">European Police Hackathon Hunts Down Traffickers</a></p><p><a href="https://www.infosecurity-magazine.com/news/">Chinese APT ToddyCat Targets Asian Telecoms, Governments</a></p><p><a href="https://www.infosecurity-magazine.com/news/california-enacts-delete-act/">California Enacts “Delete Act” For Data Privacy</a></p><p> </p><p><strong>Tweet of the Week (36:01) </strong></p><img src="https://lh5.googleusercontent.com/TmMoqecRzSBy1sSsGeH-X-oFPhczlEzx4EopQ4DlsRoRkjJaXJyjwAqr-gwEq7ZIiQGMZqqu_pzjmftjSKCV5KSd9aOpm91SUwa-Fk7ujyk2jXrKSUoEScqvNYyOVrK6qviZEaLw13TiAeM_5SiSTbo" /><p><a href="https://twitter.com/ireteeh/status/1712408097170325968">https://twitter.com/ireteeh/status/1712408097170325968</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41540870" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/fd47a19f-38c1-4b4b-933b-2915d6c5165c/audio/eea20271-0209-47a8-aeb6-9f62c8d64f9a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 171 - The Stitched Up Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/278af550-c3ef-4505-b8ed-e7ec910d934e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:16</itunes:duration>
      <itunes:summary>This week in InfoSec is a story about a friend to everyone
 
Rant of the Week asks why nobody thought of this before

Billy Big Balls is a mid-year 360 review of the Chinese government, by its citizens
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week focuses on Cyber Security Awareness Month</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a story about a friend to everyone
 
Rant of the Week asks why nobody thought of this before

Billy Big Balls is a mid-year 360 review of the Chinese government, by its citizens
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week focuses on Cyber Security Awareness Month</itunes:subtitle>
      <itunes:keywords>lord flathead, google+, 23andme, everest, pci dss, china, air europa, cybersecurity challenge, sperm donor</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>171</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b0d75630-abfe-45dd-b6ad-88a84dce641a</guid>
      <title>Episode 170 - The No Show Notes Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (08:56)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>2006: The <a href="http://wikileaks.org">http://wikileaks.org</a> domain name was registered, though the first document wasn't posted to WikiLeaks until December.</p><p>Assange taken from Ecuador embassy in April 2019, since been staying at his majesty’s pleasure at Belmarsh.</p><p>2005: The Samy worm, the first self-propagating cross-site scripting worm, was released onto the mega-popular MySpace by 19-year-old Samy Kamkar (</p><p><a href="https://twitter.com/samykamkar">@samykamkar</a></p><p>He's since made numerous impactful security and privacy field contributions. </p><p><a href="https://en.m.wikipedia.org/wiki/Samy_Kamkar">https://en.m.wikipedia.org/wiki/Samy_Kamkar</a></p><p><a href="https://en.wikipedia.org/wiki/Samy_(computer_worm)">https://en.wikipedia.org/wiki/Samy_(computer_worm)</a></p><p>The worm itself was relatively harmless; it carried a <a href="https://en.wikipedia.org/wiki/Payload_(computing)">payload</a> that would display the string "but most of all, samy is my hero" on a victim's MySpace profile page as well as send Samy a friend request. When a user viewed that profile page, the payload would then be replicated and planted on their own profile page continuing the distribution of the worm. MySpace has since secured its site against the vulnerability.<a href="https://en.wikipedia.org/wiki/Samy_(computer_worm)#cite_note-tech-1">[1]</a></p><p>2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault. </p><p><a href="https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html">https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html</a></p><p>It took 960 hours (40 days) between Equifax finding out about the breach and warning the public.  Millions of people’s data in US, UK, and elsewhere stolen.</p><h2><a href="https://grahamcluley.com/three-equifax-execs-sold-1-8-million-of-stock-days-after-breach-discovery/">Three Equifax execs sold $1.8 million of stock days after breach discovery</a></h2><p> </p><p><strong>Rant of the Week (17:16) </strong></p><p><a href="https://www.theregister.com/2023/10/04/onedrive_to_acquire_copilot_skills/">https://www.theregister.com/2023/10/04/onedrive_to_acquire_copilot_skills/</a></p><p>Microsoft is to overhaul OneDrive in a move that will bring Copilot to the cloud storage service and herd users towards the tool's web interface.</p><p>Inevitably, Copilot skills are due to arrive in OneDrive. Microsoft hopes these will help users find files and stay organized. Worryingly, in the example given, Copilot can move files around and create folders depending on its interpretation of the user's instructions. What could possibly go wrong?</p><p> </p><p><strong>Billy Big Balls of the Week (26:06)</strong></p><p>EXCLUSIVE A four-hour system interruption in September at the Veterans Affairs Medical Center in Kansas City, Missouri has been attributed to a cat jumping on a technician's keyboard.</p><p>So we're told by a source, who heard the tale on one of the regular weekday calls held by the US government department with its CIO, during which recent IT problems are reviewed. We understand that roughly 100 people – contractors, vendors, and employees – participate in these calls at a time.</p><p>On a mid-September call, one of the participants explained that while a technician was reviewing the configuration of a server cluster, their cat jumped on the keyboard and deleted it. Or at least that's their story.</p><p>Kurt DelBene, assistant secretary for information and technology and CIO at the Department of Veterans Affairs, is said to have responded on the call with words to the effect that: "This is why I have a dog." There was laughter and not much more – it was a short incident report.</p><p><a href="https://www.theregister.com/2023/10/05/hospital_cat_incident/">https://www.theregister.com/2023/10/05/hospital_cat_incident/</a></p><p> </p><p><strong>Industry News (31:30)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/apple-issues-emergency-patches/">Apple Issues Emergency Patches for More Zero-Day Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-victims-leak-sites/">Record Numbers of Ransomware Victims Named on Leak Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-nsa-tackle-iam-security/">CISA and NSA Tackle IAM Security Challenges in New Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-companies-steal-crypto/">Scammers Impersonate Companies to Steal Cryptocurrency from Job Seekers</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-glibc-bug-puts-linux-risk/">Critical Glibc Bug Puts Linux Distributions at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-proposes-sbom-rules/">US Government Proposes SBOM Rules for Contractors</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-disrupt-us-infrastructure/">China Poised to Disrupt US Critical Infrastructure with Cyber-Attacks, Microsoft Warns</a></p><p><a href="https://www.infosecurity-magazine.com/news/golddigger-android-trojan-drains/">GoldDigger Android Trojan Drains Victim Bank Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/lightspy-iphone-spyware-linked/">LightSpy iPhone Spyware Linked to Chinese APT41 Group</a></p><p> </p><p><strong>Tweet of the Week (40:56)</strong></p><p><a href="https://twitter.com/infosecmo/status/1709289777973883000?s=61&t=UAjRqPj0iqNyKsG8ZaAiig">https://twitter.com/infosecmo/status/1709289777973883000?s=61&t=UAjRqPj0iqNyKsG8ZaAiig</a></p><img src="https://lh6.googleusercontent.com/xd-CvZQpFg67fd38cMWufdIUMx6x87gcLXTKsMuju5BAw_ACGBXEWFlmcGrxZf4A5ty1e5-KdcBAwP80lfy0fkvJyeT4ZW8NE1I1Knr-7fAHVzRNinshH41WcxBGB0YAhodMOgZPQQrHtDVVIMtBHTQ" alt="" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 6 Oct 2023 14:34:11 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Graham Cluley, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-170-K2jgwrsq</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (08:56)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>2006: The <a href="http://wikileaks.org">http://wikileaks.org</a> domain name was registered, though the first document wasn't posted to WikiLeaks until December.</p><p>Assange taken from Ecuador embassy in April 2019, since been staying at his majesty’s pleasure at Belmarsh.</p><p>2005: The Samy worm, the first self-propagating cross-site scripting worm, was released onto the mega-popular MySpace by 19-year-old Samy Kamkar (</p><p><a href="https://twitter.com/samykamkar">@samykamkar</a></p><p>He's since made numerous impactful security and privacy field contributions. </p><p><a href="https://en.m.wikipedia.org/wiki/Samy_Kamkar">https://en.m.wikipedia.org/wiki/Samy_Kamkar</a></p><p><a href="https://en.wikipedia.org/wiki/Samy_(computer_worm)">https://en.wikipedia.org/wiki/Samy_(computer_worm)</a></p><p>The worm itself was relatively harmless; it carried a <a href="https://en.wikipedia.org/wiki/Payload_(computing)">payload</a> that would display the string "but most of all, samy is my hero" on a victim's MySpace profile page as well as send Samy a friend request. When a user viewed that profile page, the payload would then be replicated and planted on their own profile page continuing the distribution of the worm. MySpace has since secured its site against the vulnerability.<a href="https://en.wikipedia.org/wiki/Samy_(computer_worm)#cite_note-tech-1">[1]</a></p><p>2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault. </p><p><a href="https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html">https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html</a></p><p>It took 960 hours (40 days) between Equifax finding out about the breach and warning the public.  Millions of people’s data in US, UK, and elsewhere stolen.</p><h2><a href="https://grahamcluley.com/three-equifax-execs-sold-1-8-million-of-stock-days-after-breach-discovery/">Three Equifax execs sold $1.8 million of stock days after breach discovery</a></h2><p> </p><p><strong>Rant of the Week (17:16) </strong></p><p><a href="https://www.theregister.com/2023/10/04/onedrive_to_acquire_copilot_skills/">https://www.theregister.com/2023/10/04/onedrive_to_acquire_copilot_skills/</a></p><p>Microsoft is to overhaul OneDrive in a move that will bring Copilot to the cloud storage service and herd users towards the tool's web interface.</p><p>Inevitably, Copilot skills are due to arrive in OneDrive. Microsoft hopes these will help users find files and stay organized. Worryingly, in the example given, Copilot can move files around and create folders depending on its interpretation of the user's instructions. What could possibly go wrong?</p><p> </p><p><strong>Billy Big Balls of the Week (26:06)</strong></p><p>EXCLUSIVE A four-hour system interruption in September at the Veterans Affairs Medical Center in Kansas City, Missouri has been attributed to a cat jumping on a technician's keyboard.</p><p>So we're told by a source, who heard the tale on one of the regular weekday calls held by the US government department with its CIO, during which recent IT problems are reviewed. We understand that roughly 100 people – contractors, vendors, and employees – participate in these calls at a time.</p><p>On a mid-September call, one of the participants explained that while a technician was reviewing the configuration of a server cluster, their cat jumped on the keyboard and deleted it. Or at least that's their story.</p><p>Kurt DelBene, assistant secretary for information and technology and CIO at the Department of Veterans Affairs, is said to have responded on the call with words to the effect that: "This is why I have a dog." There was laughter and not much more – it was a short incident report.</p><p><a href="https://www.theregister.com/2023/10/05/hospital_cat_incident/">https://www.theregister.com/2023/10/05/hospital_cat_incident/</a></p><p> </p><p><strong>Industry News (31:30)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/apple-issues-emergency-patches/">Apple Issues Emergency Patches for More Zero-Day Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-victims-leak-sites/">Record Numbers of Ransomware Victims Named on Leak Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-nsa-tackle-iam-security/">CISA and NSA Tackle IAM Security Challenges in New Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-companies-steal-crypto/">Scammers Impersonate Companies to Steal Cryptocurrency from Job Seekers</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-glibc-bug-puts-linux-risk/">Critical Glibc Bug Puts Linux Distributions at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-proposes-sbom-rules/">US Government Proposes SBOM Rules for Contractors</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-disrupt-us-infrastructure/">China Poised to Disrupt US Critical Infrastructure with Cyber-Attacks, Microsoft Warns</a></p><p><a href="https://www.infosecurity-magazine.com/news/golddigger-android-trojan-drains/">GoldDigger Android Trojan Drains Victim Bank Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/lightspy-iphone-spyware-linked/">LightSpy iPhone Spyware Linked to Chinese APT41 Group</a></p><p> </p><p><strong>Tweet of the Week (40:56)</strong></p><p><a href="https://twitter.com/infosecmo/status/1709289777973883000?s=61&t=UAjRqPj0iqNyKsG8ZaAiig">https://twitter.com/infosecmo/status/1709289777973883000?s=61&t=UAjRqPj0iqNyKsG8ZaAiig</a></p><img src="https://lh6.googleusercontent.com/xd-CvZQpFg67fd38cMWufdIUMx6x87gcLXTKsMuju5BAw_ACGBXEWFlmcGrxZf4A5ty1e5-KdcBAwP80lfy0fkvJyeT4ZW8NE1I1Knr-7fAHVzRNinshH41WcxBGB0YAhodMOgZPQQrHtDVVIMtBHTQ" alt="" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46938395" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1bdc61c5-3456-481e-945f-eb3439fcf194/audio/0f6ac281-4317-4f2f-9c24-3db68360add4/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 170 - The No Show Notes Episode</itunes:title>
      <itunes:author>Thom Langford, Graham Cluley, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/faf581b1-552a-4956-9013-c51caeb373f2/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:53</itunes:duration>
      <itunes:summary>This week in InfoSec is about something leaky
 
Rant of the Week is about trusting the machines with our most sensitive data

Billy Big Balls has the dog eating our homework
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week something wonderfully Danish</itunes:summary>
      <itunes:subtitle>This week in InfoSec is about something leaky
 
Rant of the Week is about trusting the machines with our most sensitive data

Billy Big Balls has the dog eating our homework
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week something wonderfully Danish</itunes:subtitle>
      <itunes:keywords>equifax, apple patch, catballs, copilot, lego, assange, onedrive, vc, wikileaks, samy worm, goldigger, crypto</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>170</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8f5318cb-cd34-4588-b6f8-05d8844f0f1a</guid>
      <title>Episode 169 - The Hat Trick Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (08:45)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th September 1986: "The Hacker Manifesto" was published by The Mentor (Loyd Blankenship) in issue 7 of the hacker zine Phrack. It was originally titled "The Conscience of a Hacker". </p><p><a href="http://phrack.org/issues/7/3.html#article">Phrack #7</a></p><p><a href="https://twitter.com/todayininfosec/status/1706364950623515017">https://twitter.com/todayininfosec/status/1706364950623515017</a>  </p><p>26th September 1988: Time Magazine published the article "Technology: Invasion of the Data Snatchers - A 'virus' epidemic strikes terror in the computer world". The 9 page article is an interesting glimpse into the state of malware risk, response, and fears 35 years ago.</p><p><a href="https://content.time.com/time/subscriber/article/0,33009,968508-1,00.html">Technology: Invasion of the Data Snatchers</a></p><p><a href="https://twitter.com/todayininfosec/status/1706690706863952278">https://twitter.com/todayininfosec/status/1706690706863952278</a></p><p> </p><p><strong>Rant of the Week (13:54) </strong></p><p><a href="https://www.theregister.com/2023/09/28/google_bard_chat/">After failing at privacy, again, Google is working to keep Bard chats out of Search</a></p><p>Google's Bard chatbot is currently being re-educated to better understand privacy.</p><p>In July, Bard gained the ability to <a href="https://support.google.com/bard/answer/13743730">share conversations</a> with other people using a unique public link. Unfortunately, Google Search has indexed those shared links, making them more widely available and discoverable than Bard patrons might expect.</p><p>[Open the story and read from there - it’s much easier 🙂]</p><p>At least such oversights don't happen all that often at Google, which has a <a href="https://www.gstatic.com/policies/privacy/pdf/20230701/4jko9ma5/google_privacy_policy_en_us.pdf">33-page privacy policy</a> [PDF] detailing how much the company values user privacy. Apart from an <a href="https://www.chicagotribune.com/business/ct-biz-google-photos-class-action-privacy-settlement-20220427-qudgj7naiffjfokrvhnxp6ingi-story.html">$100 million biometric privacy settlement</a> with Illinois in April 2022, an <a href="https://www.theregister.com/2022/10/04/google_privacy_lawsuit_settlement/">$85 million location data settlement</a> with Arizona in October 2022, a <a href="https://www.theregister.com/2022/11/15/google_391m_privacy_settlement/">$391.5 million privacy settlement</a> in November 2022 with a 40-state coalition of Attorneys General, and <a href="https://www.theregister.com/2023/01/03/google_tracking_settlements/">$29.5 million</a> to settle location tracking claims in Indiana and Washington DC, you have to back all the way to 2019 – when the FTC <a href="https://www.theregister.com/2019/09/04/google_ftc_fine/">settled</a> with Google and YouTube for gathering kids info without consent – to find substantive privacy issues at the 25-year-old search advertising biz.</p><p>Frankly, the presence of Bard chats in Google Search barely rates on a list of text ads giant's greatest privacy misses, which includes Street View cars <a href="https://www.theregister.com/2010/05/14/google_street_view_cars_were_collecting_payload_data_from_wifi_networks/">collecting sensitive data from Wi-Fi networks</a> and <a href="https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking">combining</a> its ad data with Google user's personal data.</p><p> </p><p><strong>Billy Big Balls of the Week (22:46)</strong></p><p><a href="https://www.theregister.com/2023/09/28/chen_yixin_china_digital_threats/">China's national security minister rates fake news among most pressing cyber threats</a></p><p>This story in a meme:</p><img src="https://lh3.googleusercontent.com/bWAl07Kl9iSv2XUU6nYfGcw2-K1tGEevZAD_KlphLUioSba8G86lTAn9Xd12QAL8lyZD8oBbtH0iaikAgo5bqNlvrOonCl-bFp3CQrGPbD4GEI6UJ3CJW1UbfZbUXZsrZxv3mJeXY7LQ7sklf3_5Yrw" /><p>Chinese minister for national security Chen Yixin has penned an article rating the digital risks his country faces and rated network security incidents as the most realistic source of harm to the Chinternet – both in terms of attacks and the dissemination of fake news.</p><p>The new <a href="https://mp.weixin.qq.com/s/E09baE7hhPWQL9h-ZgH-FQ">article</a> reiterates Xi Jinping's thoughts on network and cyber power, which boil down to a recognition of the internet's central role in almost all aspects of modern life and the subsequent need for security and governance.</p><p>In China governance includes restrictions on free speech and detection and deletion of information felt to be incorrect. Or as minister Chen put it, after machine translation: "The internet has increasingly become the source, conductor, and amplifier of various risks. A small incident can become a whirlpool of public opinion. Some rumours can easily turn a 'storm in a teacup' into a 'tornado' in real society."</p><p>Chen's article rates "increasingly fierce competition between great powers in cyberspace" as the most significant competitive threat China faces in the digital domain. He accused rivals of using "so-called 'risk removal' as an excuse and using ideology as a standard to create technology 'small circles' such as 'Clean Network' and 'Chip Alliance,' and even expanded the use of policy tools such as export controls, security reviews, and restricted exchanges."</p><p>The minister argues such initiatives are motivated by other nations' desire to cement technology leadership positions and build monopolies, rather than genuine concerns.</p><p> </p><p><strong>Industry News (30:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-data-bridge-confirmed/">UK-US Confirm Agreement for Personal Data Transfers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-it-staffer-espionage/">US Government IT Staffer Arrested on Espionage Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-cyberattacks-go-unreported/">Half of Cyber-Attacks Go Unreported</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-launches-cyber-incident/">NCSC Launches Cyber Incident Exercise Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/emea-financial-services-attacks/">Attacks on European Financial Services Double in a Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-warns-breaches-can-cost/">Regulator Warns Breaches Can Cost Lives</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-japan-warn-of-chinese/">US and Japan Warn of Chinese Router Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-lawmaker-government-shutdown/">US Lawmaker: Government Shutdown Will Leave Americans Exposed to Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/bookingcom-customers-targeted/">Booking.com Customers Targeted in Major Phishing Campaign</a></p><p> </p><p><strong>Tweet of the Week (37:51)</strong></p><img src="https://lh4.googleusercontent.com/3_ecgQVMcB6k2Oxc4SLAQUl8zBQnV8CCM9MtN9lVweExMqbgO9LGHE-VHhrhmBObRqCa3byT039KncVU1Ad5upNqdgksoh-peRHtXIlFcHpFfSQ0QXSSOL0B6llLVpFiGkzIdIKDuvOMjPhkkdzQfCA" /><p><a href="https://twitter.com/SoVeryBritish/status/1707463344016306453">https://twitter.com/SoVeryBritish/status/1707463344016306453</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 Sep 2023 10:59:22 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-169-uJPKsyvw</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (08:45)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th September 1986: "The Hacker Manifesto" was published by The Mentor (Loyd Blankenship) in issue 7 of the hacker zine Phrack. It was originally titled "The Conscience of a Hacker". </p><p><a href="http://phrack.org/issues/7/3.html#article">Phrack #7</a></p><p><a href="https://twitter.com/todayininfosec/status/1706364950623515017">https://twitter.com/todayininfosec/status/1706364950623515017</a>  </p><p>26th September 1988: Time Magazine published the article "Technology: Invasion of the Data Snatchers - A 'virus' epidemic strikes terror in the computer world". The 9 page article is an interesting glimpse into the state of malware risk, response, and fears 35 years ago.</p><p><a href="https://content.time.com/time/subscriber/article/0,33009,968508-1,00.html">Technology: Invasion of the Data Snatchers</a></p><p><a href="https://twitter.com/todayininfosec/status/1706690706863952278">https://twitter.com/todayininfosec/status/1706690706863952278</a></p><p> </p><p><strong>Rant of the Week (13:54) </strong></p><p><a href="https://www.theregister.com/2023/09/28/google_bard_chat/">After failing at privacy, again, Google is working to keep Bard chats out of Search</a></p><p>Google's Bard chatbot is currently being re-educated to better understand privacy.</p><p>In July, Bard gained the ability to <a href="https://support.google.com/bard/answer/13743730">share conversations</a> with other people using a unique public link. Unfortunately, Google Search has indexed those shared links, making them more widely available and discoverable than Bard patrons might expect.</p><p>[Open the story and read from there - it’s much easier 🙂]</p><p>At least such oversights don't happen all that often at Google, which has a <a href="https://www.gstatic.com/policies/privacy/pdf/20230701/4jko9ma5/google_privacy_policy_en_us.pdf">33-page privacy policy</a> [PDF] detailing how much the company values user privacy. Apart from an <a href="https://www.chicagotribune.com/business/ct-biz-google-photos-class-action-privacy-settlement-20220427-qudgj7naiffjfokrvhnxp6ingi-story.html">$100 million biometric privacy settlement</a> with Illinois in April 2022, an <a href="https://www.theregister.com/2022/10/04/google_privacy_lawsuit_settlement/">$85 million location data settlement</a> with Arizona in October 2022, a <a href="https://www.theregister.com/2022/11/15/google_391m_privacy_settlement/">$391.5 million privacy settlement</a> in November 2022 with a 40-state coalition of Attorneys General, and <a href="https://www.theregister.com/2023/01/03/google_tracking_settlements/">$29.5 million</a> to settle location tracking claims in Indiana and Washington DC, you have to back all the way to 2019 – when the FTC <a href="https://www.theregister.com/2019/09/04/google_ftc_fine/">settled</a> with Google and YouTube for gathering kids info without consent – to find substantive privacy issues at the 25-year-old search advertising biz.</p><p>Frankly, the presence of Bard chats in Google Search barely rates on a list of text ads giant's greatest privacy misses, which includes Street View cars <a href="https://www.theregister.com/2010/05/14/google_street_view_cars_were_collecting_payload_data_from_wifi_networks/">collecting sensitive data from Wi-Fi networks</a> and <a href="https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking">combining</a> its ad data with Google user's personal data.</p><p> </p><p><strong>Billy Big Balls of the Week (22:46)</strong></p><p><a href="https://www.theregister.com/2023/09/28/chen_yixin_china_digital_threats/">China's national security minister rates fake news among most pressing cyber threats</a></p><p>This story in a meme:</p><img src="https://lh3.googleusercontent.com/bWAl07Kl9iSv2XUU6nYfGcw2-K1tGEevZAD_KlphLUioSba8G86lTAn9Xd12QAL8lyZD8oBbtH0iaikAgo5bqNlvrOonCl-bFp3CQrGPbD4GEI6UJ3CJW1UbfZbUXZsrZxv3mJeXY7LQ7sklf3_5Yrw" /><p>Chinese minister for national security Chen Yixin has penned an article rating the digital risks his country faces and rated network security incidents as the most realistic source of harm to the Chinternet – both in terms of attacks and the dissemination of fake news.</p><p>The new <a href="https://mp.weixin.qq.com/s/E09baE7hhPWQL9h-ZgH-FQ">article</a> reiterates Xi Jinping's thoughts on network and cyber power, which boil down to a recognition of the internet's central role in almost all aspects of modern life and the subsequent need for security and governance.</p><p>In China governance includes restrictions on free speech and detection and deletion of information felt to be incorrect. Or as minister Chen put it, after machine translation: "The internet has increasingly become the source, conductor, and amplifier of various risks. A small incident can become a whirlpool of public opinion. Some rumours can easily turn a 'storm in a teacup' into a 'tornado' in real society."</p><p>Chen's article rates "increasingly fierce competition between great powers in cyberspace" as the most significant competitive threat China faces in the digital domain. He accused rivals of using "so-called 'risk removal' as an excuse and using ideology as a standard to create technology 'small circles' such as 'Clean Network' and 'Chip Alliance,' and even expanded the use of policy tools such as export controls, security reviews, and restricted exchanges."</p><p>The minister argues such initiatives are motivated by other nations' desire to cement technology leadership positions and build monopolies, rather than genuine concerns.</p><p> </p><p><strong>Industry News (30:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-data-bridge-confirmed/">UK-US Confirm Agreement for Personal Data Transfers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-it-staffer-espionage/">US Government IT Staffer Arrested on Espionage Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-cyberattacks-go-unreported/">Half of Cyber-Attacks Go Unreported</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-launches-cyber-incident/">NCSC Launches Cyber Incident Exercise Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/emea-financial-services-attacks/">Attacks on European Financial Services Double in a Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-warns-breaches-can-cost/">Regulator Warns Breaches Can Cost Lives</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-japan-warn-of-chinese/">US and Japan Warn of Chinese Router Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-lawmaker-government-shutdown/">US Lawmaker: Government Shutdown Will Leave Americans Exposed to Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/bookingcom-customers-targeted/">Booking.com Customers Targeted in Major Phishing Campaign</a></p><p> </p><p><strong>Tweet of the Week (37:51)</strong></p><img src="https://lh4.googleusercontent.com/3_ecgQVMcB6k2Oxc4SLAQUl8zBQnV8CCM9MtN9lVweExMqbgO9LGHE-VHhrhmBObRqCa3byT039KncVU1Ad5upNqdgksoh-peRHtXIlFcHpFfSQ0QXSSOL0B6llLVpFiGkzIdIKDuvOMjPhkkdzQfCA" /><p><a href="https://twitter.com/SoVeryBritish/status/1707463344016306453">https://twitter.com/SoVeryBritish/status/1707463344016306453</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="39734032" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/66c22225-d01e-46fb-b4c6-59cdcc6ed528/audio/f63b80a6-e2b2-4b5b-b31c-c27437427e7e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 169 - The Hat Trick Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/69b8464c-7e58-49ca-b8bb-4605745f6d99/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:23</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of the conscience of a hacker
 
Rant of the Week is a rare privacy snafu from Google

Billy Big Balls has China asking “are we the baddies?”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week something wonderfully British</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of the conscience of a hacker
 
Rant of the Week is a rare privacy snafu from Google

Billy Big Balls has China asking “are we the baddies?”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week something wonderfully British</itunes:subtitle>
      <itunes:keywords>gina, hat trick, safe harbor, hacker manifesto, privacy act, mitchell &amp; webb, 1988, british, google bard</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>169</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d3a7390d-7259-4340-bd19-4823500a87ad</guid>
      <title>Episode 168 - The Purple Pineapple Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:32)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. $ echo "admin" | rev nimda  </p><p><a href="https://twitter.com/todayininfosec/status/1703760366688211041">https://twitter.com/todayininfosec/status/1703760366688211041</a></p><p>16th September 2008: 20-year-old David Kernell compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, then posted her emails to 4chan. 2 years later he was found guilty and sentenced to a year in prison. At age 30 he died of complications related to MS.</p><p><a href="https://twitter.com/todayininfosec/status/1703169477548884296">https://twitter.com/todayininfosec/status/1703169477548884296</a></p><p> </p><p><strong>Rant of the Week (14:55)</strong></p><p>[We’re sympathetic of companies who get hacked and what they have to deal with, but there comes a time when they’re repeatedly hacked and you have to ask questions]:</p><p><a href="https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/">T-Mobile app glitch let users see other people's account info</a></p><p>T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile application.</p><p>According to user reports <a href="https://www.reddit.com/r/tmobile/comments/16nhyew/megathread_tmobile_app_was_temporarily_leaking/">on social media</a>, the exposed information included customers' names, phone numbers, addresses, account balances, and credit card details like the expiration dates and the last four digits.</p><p>As first reported by <a href="https://www.theverge.com/2023/9/20/23881825/t-mobile-account-security-breach-customer-information-leak">The Verge</a>, some of the customers affected by this issue could see the sensitive information of <a href="https://twitter.com/Ka83801602/status/1704428925357596730">multiple</a> <a href="https://twitter.com/darko_afia/status/1704441831482614085">other</a> <a href="https://twitter.com/RadioWinnerGuy/status/1704413872399036742">people</a> while logged into their own accounts.</p><p>While a massive number of reports started surfacing earlier today on Reddit and Twitter, some T-Mobile customers also claimed that they've been experiencing this throughout the last two weeks.</p><p>"Reported this issue when it first popped up here on Reddit over 2 weeks ago and sent pics of the other person's info to their security team. No response, but wow, just wow," one customer <a href="https://www.reddit.com/r/tmobile/comments/16nhyew/megathread_tmobile_app_was_temporarily_leaking/k1fch5a/">said</a>.</p><p>Nine data breaches since 2018</p><p>In May, T-Mobile <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/">disclosed the second data breach</a> since the start of 2023 after hundreds of customers had their personal information exposed between late February and March after attackers hacked into the carrier's systems.</p><p>In January, the mobile carrier <a href="https://www.bleepingcomputer.com/news/security/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach/">revealed another data breach</a> after the sensitive info of 37 million customers was stolen using one of its Application Programming Interfaces (APIs).</p><p>Since 2018, T-Mobile has been hit by seven other data breaches:</p><ul><li>In August 2018, attackers accessed the data of around <a href="https://www.bleepingcomputer.com/news/security/t-mobile-detects-and-stops-ongoing-security-breach/">3% of all T-Mobile customers</a>.</li><li>In 2019, T-Mobile <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-data-breach-impacting-prepaid-customers/">exposed the account info</a> of an undisclosed number of prepaid customers.</li><li>In March 2020, T-Mobile employees were affected by a breach <a href="https://www.bleepingcomputer.com/news/security/t-mobile-data-breach-exposes-customer-personal-financial-info/">exposing their personal and financial information</a>.</li><li>In December 2020, threat actors accessed <a href="https://www.bleepingcomputer.com/news/security/t-mobile-data-breach-exposed-phone-numbers-call-records/">customer proprietary network info (phone numbers, call records)</a>.</li><li>In February 2021, <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-data-breach-after-sim-swapping-attacks/">an internal T-Mobile app</a> was accessed by unknown attackers without authorization.</li><li>In August 2021, hackers <a href="https://www.bleepingcomputer.com/news/security/t-mobile-ceo-hacker-brute-forced-his-way-through-our-network/">brute-forced their way through T-Mobile's network</a> following a <a href="https://www.bleepingcomputer.com/news/security/t-mobile-confirms-servers-were-hacked-investigates-data-breach/">breach of one of its testing environments</a>.</li><li>In April 2022, the notorious Lapsus$ extortion gang <a href="https://www.bleepingcomputer.com/news/security/t-mobile-confirms-lapsus-hackers-breached-internal-systems/">breached T-Mobile's network</a> using stolen credentials.</li></ul><p> </p><p><strong>Billy Big Balls of the Week  (23:31)</strong></p><p><a href="https://www.theregister.com/2023/09/20/singapore_phishing_split_fraud/">Singapore may split liability for phishing losses between banks and victims</a></p><p>Singapore officials announced on Monday that next month they will deliver a consultation paper detailing a split liability scheme that will mean both consumers and banks are on the hook for financial losses flowing from scams.</p><p>It is an answer to a common question these days: in a world of rampant payment and transfer scams, who is responsible?</p><p>Countries like Australia have also <a href="https://www.ey.com/en_au/financial-services/who-should-pay-for-the-cost-of-scams-in-australia">considered</a> shared loss schemes. Meanwhile, the European Commission has proposed a "refund" to victims of certain types of fraud, including authorised push payment scams.</p><p>Starting next year, the UK will <a href="https://www.reuters.com/business/finance/uk-banks-told-reimburse-customers-tricked-by-scams-2022-09-28/">enforce</a> mandatory reimbursement by banks to scam victims up to one million pounds – with the sending and receiving banks sharing the bill.</p><p>Singapore's minister of state Alvin Tan has a different view.</p><p>"There are some views that banks can easily absorb losses arising from individual scam cases. However, full restitution without due consideration of culpability is neither fair nor desirable," he <a href="https://www.mas.gov.sg/news/parliamentary-replies/2023/reply-to-adjournment-motion-on-losses-from-scams-and-malware">told Parliament</a> on Monday.</p><p> </p><p><strong>Industry News (33:01)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/caesars-entertainment-major/">Caesars Entertainment Reveals Major Ransomware Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/pirated-software-cause-airbus/">Pirated Software Likely Cause of Airbus Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-fined-368m-child-data-1/">TikTok Fined $368m For Child Data Privacy Offenses</a></p><p><a href="https://www.infosecurity-magazine.com/news/illegal-betting-ring-used/">Illegal Betting Ring Used Satellite Tech to Get Scoop on Results</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-ai-researcher-leaked/">Microsoft AI Researchers Leak 38TB of Private Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/clorox-struggling-recover-august/">Clorox Struggling to Recover From August Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-transunion-customer/">Threat Actor Claims Major TransUnion Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/finnish-shutter-dark-web-drugs/">Finnish Authorities Shutter Dark Web Drugs Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/international-criminal-court/">International Criminal Court Reveals Security Breach</a></p><p> </p><p><strong>Tweet of the Week (41:32) </strong></p><img src="https://lh3.googleusercontent.com/prhBcYYySEtaBV4X7jCHCUs3V4EKWm-wA5mdqOYJLMq0b7ZPSIthN1al9X6T52DBaU3PmJhv_N0g4sLhMJZzGXsdiKzTj2m73ba5zEO1ek8X32fAAXkCF3K4BE15RWXt1pLuaYCHi7GKdQLYlumnWYk" /><p><a href="https://x.com/gabsmashh/status/1704875732282077244?s=20">https://x.com/gabsmashh/status/1704875732282077244?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 22 Sep 2023 11:34:39 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-168-K5Oa7dGG</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:32)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th September 2001: The Nimda worm was released. Utilising 5 different infection vectors, it became the most widespread virus/worm after only 22 minutes. $ echo "admin" | rev nimda  </p><p><a href="https://twitter.com/todayininfosec/status/1703760366688211041">https://twitter.com/todayininfosec/status/1703760366688211041</a></p><p>16th September 2008: 20-year-old David Kernell compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, then posted her emails to 4chan. 2 years later he was found guilty and sentenced to a year in prison. At age 30 he died of complications related to MS.</p><p><a href="https://twitter.com/todayininfosec/status/1703169477548884296">https://twitter.com/todayininfosec/status/1703169477548884296</a></p><p> </p><p><strong>Rant of the Week (14:55)</strong></p><p>[We’re sympathetic of companies who get hacked and what they have to deal with, but there comes a time when they’re repeatedly hacked and you have to ask questions]:</p><p><a href="https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/">T-Mobile app glitch let users see other people's account info</a></p><p>T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile application.</p><p>According to user reports <a href="https://www.reddit.com/r/tmobile/comments/16nhyew/megathread_tmobile_app_was_temporarily_leaking/">on social media</a>, the exposed information included customers' names, phone numbers, addresses, account balances, and credit card details like the expiration dates and the last four digits.</p><p>As first reported by <a href="https://www.theverge.com/2023/9/20/23881825/t-mobile-account-security-breach-customer-information-leak">The Verge</a>, some of the customers affected by this issue could see the sensitive information of <a href="https://twitter.com/Ka83801602/status/1704428925357596730">multiple</a> <a href="https://twitter.com/darko_afia/status/1704441831482614085">other</a> <a href="https://twitter.com/RadioWinnerGuy/status/1704413872399036742">people</a> while logged into their own accounts.</p><p>While a massive number of reports started surfacing earlier today on Reddit and Twitter, some T-Mobile customers also claimed that they've been experiencing this throughout the last two weeks.</p><p>"Reported this issue when it first popped up here on Reddit over 2 weeks ago and sent pics of the other person's info to their security team. No response, but wow, just wow," one customer <a href="https://www.reddit.com/r/tmobile/comments/16nhyew/megathread_tmobile_app_was_temporarily_leaking/k1fch5a/">said</a>.</p><p>Nine data breaches since 2018</p><p>In May, T-Mobile <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/">disclosed the second data breach</a> since the start of 2023 after hundreds of customers had their personal information exposed between late February and March after attackers hacked into the carrier's systems.</p><p>In January, the mobile carrier <a href="https://www.bleepingcomputer.com/news/security/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach/">revealed another data breach</a> after the sensitive info of 37 million customers was stolen using one of its Application Programming Interfaces (APIs).</p><p>Since 2018, T-Mobile has been hit by seven other data breaches:</p><ul><li>In August 2018, attackers accessed the data of around <a href="https://www.bleepingcomputer.com/news/security/t-mobile-detects-and-stops-ongoing-security-breach/">3% of all T-Mobile customers</a>.</li><li>In 2019, T-Mobile <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-data-breach-impacting-prepaid-customers/">exposed the account info</a> of an undisclosed number of prepaid customers.</li><li>In March 2020, T-Mobile employees were affected by a breach <a href="https://www.bleepingcomputer.com/news/security/t-mobile-data-breach-exposes-customer-personal-financial-info/">exposing their personal and financial information</a>.</li><li>In December 2020, threat actors accessed <a href="https://www.bleepingcomputer.com/news/security/t-mobile-data-breach-exposed-phone-numbers-call-records/">customer proprietary network info (phone numbers, call records)</a>.</li><li>In February 2021, <a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-data-breach-after-sim-swapping-attacks/">an internal T-Mobile app</a> was accessed by unknown attackers without authorization.</li><li>In August 2021, hackers <a href="https://www.bleepingcomputer.com/news/security/t-mobile-ceo-hacker-brute-forced-his-way-through-our-network/">brute-forced their way through T-Mobile's network</a> following a <a href="https://www.bleepingcomputer.com/news/security/t-mobile-confirms-servers-were-hacked-investigates-data-breach/">breach of one of its testing environments</a>.</li><li>In April 2022, the notorious Lapsus$ extortion gang <a href="https://www.bleepingcomputer.com/news/security/t-mobile-confirms-lapsus-hackers-breached-internal-systems/">breached T-Mobile's network</a> using stolen credentials.</li></ul><p> </p><p><strong>Billy Big Balls of the Week  (23:31)</strong></p><p><a href="https://www.theregister.com/2023/09/20/singapore_phishing_split_fraud/">Singapore may split liability for phishing losses between banks and victims</a></p><p>Singapore officials announced on Monday that next month they will deliver a consultation paper detailing a split liability scheme that will mean both consumers and banks are on the hook for financial losses flowing from scams.</p><p>It is an answer to a common question these days: in a world of rampant payment and transfer scams, who is responsible?</p><p>Countries like Australia have also <a href="https://www.ey.com/en_au/financial-services/who-should-pay-for-the-cost-of-scams-in-australia">considered</a> shared loss schemes. Meanwhile, the European Commission has proposed a "refund" to victims of certain types of fraud, including authorised push payment scams.</p><p>Starting next year, the UK will <a href="https://www.reuters.com/business/finance/uk-banks-told-reimburse-customers-tricked-by-scams-2022-09-28/">enforce</a> mandatory reimbursement by banks to scam victims up to one million pounds – with the sending and receiving banks sharing the bill.</p><p>Singapore's minister of state Alvin Tan has a different view.</p><p>"There are some views that banks can easily absorb losses arising from individual scam cases. However, full restitution without due consideration of culpability is neither fair nor desirable," he <a href="https://www.mas.gov.sg/news/parliamentary-replies/2023/reply-to-adjournment-motion-on-losses-from-scams-and-malware">told Parliament</a> on Monday.</p><p> </p><p><strong>Industry News (33:01)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/caesars-entertainment-major/">Caesars Entertainment Reveals Major Ransomware Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/pirated-software-cause-airbus/">Pirated Software Likely Cause of Airbus Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-fined-368m-child-data-1/">TikTok Fined $368m For Child Data Privacy Offenses</a></p><p><a href="https://www.infosecurity-magazine.com/news/illegal-betting-ring-used/">Illegal Betting Ring Used Satellite Tech to Get Scoop on Results</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-ai-researcher-leaked/">Microsoft AI Researchers Leak 38TB of Private Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/clorox-struggling-recover-august/">Clorox Struggling to Recover From August Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-transunion-customer/">Threat Actor Claims Major TransUnion Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/finnish-shutter-dark-web-drugs/">Finnish Authorities Shutter Dark Web Drugs Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/international-criminal-court/">International Criminal Court Reveals Security Breach</a></p><p> </p><p><strong>Tweet of the Week (41:32) </strong></p><img src="https://lh3.googleusercontent.com/prhBcYYySEtaBV4X7jCHCUs3V4EKWm-wA5mdqOYJLMq0b7ZPSIthN1al9X6T52DBaU3PmJhv_N0g4sLhMJZzGXsdiKzTj2m73ba5zEO1ek8X32fAAXkCF3K4BE15RWXt1pLuaYCHi7GKdQLYlumnWYk" /><p><a href="https://x.com/gabsmashh/status/1704875732282077244?s=20">https://x.com/gabsmashh/status/1704875732282077244?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42801017" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/439bf1ef-d2a2-4675-a7e9-6f1a09c810fc/audio/d4b03eed-84e4-48b6-bf92-1f87f2cdb795/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 168 - The Purple Pineapple Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9451bff3-7216-4e64-8489-781fb3bc7168/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:35</itunes:duration>
      <itunes:summary>This week in InfoSec is a story about vice presidential candidates using Yahoo! email
 
Rant of the Week asks where we should draw the line on victims

Billy Big Balls asks “won’t somebody think of  the poor banks?”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week queries a recent acquisition</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a story about vice presidential candidates using Yahoo! email
 
Rant of the Week asks where we should draw the line on victims

Billy Big Balls asks “won’t somebody think of  the poor banks?”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week queries a recent acquisition</itunes:subtitle>
      <itunes:keywords>singapore, shared loss, caesers palace, breach, t-mobile, finacial, pirated, airbus, microsoft</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>168</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d1ceb16-b392-4dfc-9ef7-40e3a9d0ae88</guid>
      <title>Episode 167 - The Sweaty B***s Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (08:18)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>13th September 2011: Backup tapes containing info on 4.9 million TRICARE military health care customers were stolen from an SAIC employee's parked car which a burglar broke into by breaking a vent window.  </p><p><a href="https://www.inforisktoday.com/tricare-breach-affects-49-million-a-4105/op-1">TRICARE Breach Affects 4.9 Million</a></p><p><a href="https://twitter.com/todayininfosec/status/1701936923579732231">https://twitter.com/todayininfosec/status/1701936923579732231</a></p><p>12th September 2001: MafiaBoy (Michael Calce) was sentenced in Canada to 8 months of open custody, 1 year of probation, and restricted Internet use for crimes related to DoS attacks he performed against numerous high profile websites at age 15 the year prior.</p><p><a href="http://web.archive.org/web/20070326115414/http://www.fbi.gov/libref/factsfigure/factsfiguresapri2003.htm">Cyber Attacks</a></p><p><a href="https://twitter.com/todayininfosec/status/1701628591262302571">https://twitter.com/todayininfosec/status/1701628591262302571</a></p><p> </p><p><strong>Rant of the Week (17:27)</strong></p><p>[Responsible disclosure?  Even close competitors share threat intel]:</p><p><br /> </p><p><a href="https://twitter.com/vegasstarfish/status/1702076730075492739">https://twitter.com/vegasstarfish/status/1702076730075492739</a> - video in link too</p><img src="https://lh5.googleusercontent.com/4P2F0TjqwAxUSQ4gkU5J2Ta5Pil05PsournO9qY_swiimEW7YlVwJEGK024QlJDq_HPTVCIjM1dotYokxdugtW-6XnKxMzUI-9m1zjAcUX8dFOct2au_8oZm48qe0Qr9MR6NtOD4DoRd-mOXtc7ESrQ" /><p> </p><p><strong>Billy Big Balls of the Week (25:21)</strong></p><p><a href="https://www.theverge.com/23868464/apple-iphone-touch-id-fingerprint-security-ten-year-anniversary">10 years ago, Apple finally convinced us to lock our phones</a></p><p>Every phone you pick up today has a fingerprint scanner, a face scanner, an option for PINs with four, six, or more digits, and often all of them at once. Phones prompt you to set up a scan and a passcode the first time you turn them on, and you’d be hard-pressed to find anyone who doesn’t have some form of security set up.</p><p>But go back just 10 years, and the story was very different. Back when our phones were still used almost entirely as phones and not teeny personal computers, most of the “locking” features on mobile devices were designed more to prevent you from butt-dialing anyone than to protect your sensitive information.</p><p>It wasn’t until the iPhone 5S came along — 10 years ago this month — that everything changed.</p><p>It just goes to show how much of an innovator and an investor in security Apple always has been. </p><p>They removed the headphone jack and called it courage…</p><p>Just a couple of days ago they pushed the boundaries of innovation even more and introduced USB C to the latest iphones. Now that’s real courage</p><p> </p><p><strong>Industry News  (34:29)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-sri-lanka-government/">Ransomware Attack Wipes Out Sri Lankan Government Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-financial-economic-crime/">Europol: Financial Crime Makes “Billions” and Impacts “Millions”</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/">Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-ncsc-share-anonymized-threat/">UK ICO and NCSC Set to Share Anonymized Threat Intelligence</a></p><p><a href="https://www.infosecurity-magazine.com/news/mgm-security-failures-blackcat/">MGM Criticized for Repeated Security Failures</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-phishing-campaign/">New Microsoft Teams Phishing Campaign Targets Corporate Employees</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-blamed-53m-heist-at/">Lazarus Group Blamed For $53m Heist at CoinEx</a></p><p><a href="https://www.infosecurity-magazine.com/news/elon-musk-ftc-twitter-x-privacy/">Elon Musk in Hot Water With FTC Over Twitter Privacy Issues</a></p><p><a href="https://www.infosecurity-magazine.com/news/manchester-police-data-breached/">Manchester Police Officers’ Data Breached in Third-Party Attack</a></p><p> </p><p><strong>Tweet of the Week (41:54)</strong></p><img src="https://lh6.googleusercontent.com/gntW6Yvjttp2GCmg6EjKr3BjLaOhEXAksr9rVF0qf8blKowdXFJEXL79Hjtworx2PzYKMghDeCMzBqqyPE62KDVZRS-k8aq0XLzxKRmTuesvv5jepYcAapK263ayHWrmicAp9qBmCyaQB5BbGap_pVM" /><p><a href="https://x.com/Marlebean/status/1308858471106871298?s=20">https://x.com/Marlebean/status/1308858471106871298?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 15 Sep 2023 18:45:20 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-167-Tmgn4iND</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (08:18)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>13th September 2011: Backup tapes containing info on 4.9 million TRICARE military health care customers were stolen from an SAIC employee's parked car which a burglar broke into by breaking a vent window.  </p><p><a href="https://www.inforisktoday.com/tricare-breach-affects-49-million-a-4105/op-1">TRICARE Breach Affects 4.9 Million</a></p><p><a href="https://twitter.com/todayininfosec/status/1701936923579732231">https://twitter.com/todayininfosec/status/1701936923579732231</a></p><p>12th September 2001: MafiaBoy (Michael Calce) was sentenced in Canada to 8 months of open custody, 1 year of probation, and restricted Internet use for crimes related to DoS attacks he performed against numerous high profile websites at age 15 the year prior.</p><p><a href="http://web.archive.org/web/20070326115414/http://www.fbi.gov/libref/factsfigure/factsfiguresapri2003.htm">Cyber Attacks</a></p><p><a href="https://twitter.com/todayininfosec/status/1701628591262302571">https://twitter.com/todayininfosec/status/1701628591262302571</a></p><p> </p><p><strong>Rant of the Week (17:27)</strong></p><p>[Responsible disclosure?  Even close competitors share threat intel]:</p><p><br /> </p><p><a href="https://twitter.com/vegasstarfish/status/1702076730075492739">https://twitter.com/vegasstarfish/status/1702076730075492739</a> - video in link too</p><img src="https://lh5.googleusercontent.com/4P2F0TjqwAxUSQ4gkU5J2Ta5Pil05PsournO9qY_swiimEW7YlVwJEGK024QlJDq_HPTVCIjM1dotYokxdugtW-6XnKxMzUI-9m1zjAcUX8dFOct2au_8oZm48qe0Qr9MR6NtOD4DoRd-mOXtc7ESrQ" /><p> </p><p><strong>Billy Big Balls of the Week (25:21)</strong></p><p><a href="https://www.theverge.com/23868464/apple-iphone-touch-id-fingerprint-security-ten-year-anniversary">10 years ago, Apple finally convinced us to lock our phones</a></p><p>Every phone you pick up today has a fingerprint scanner, a face scanner, an option for PINs with four, six, or more digits, and often all of them at once. Phones prompt you to set up a scan and a passcode the first time you turn them on, and you’d be hard-pressed to find anyone who doesn’t have some form of security set up.</p><p>But go back just 10 years, and the story was very different. Back when our phones were still used almost entirely as phones and not teeny personal computers, most of the “locking” features on mobile devices were designed more to prevent you from butt-dialing anyone than to protect your sensitive information.</p><p>It wasn’t until the iPhone 5S came along — 10 years ago this month — that everything changed.</p><p>It just goes to show how much of an innovator and an investor in security Apple always has been. </p><p>They removed the headphone jack and called it courage…</p><p>Just a couple of days ago they pushed the boundaries of innovation even more and introduced USB C to the latest iphones. Now that’s real courage</p><p> </p><p><strong>Industry News  (34:29)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-sri-lanka-government/">Ransomware Attack Wipes Out Sri Lankan Government Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-financial-economic-crime/">Europol: Financial Crime Makes “Billions” and Impacts “Millions”</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/">Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-ncsc-share-anonymized-threat/">UK ICO and NCSC Set to Share Anonymized Threat Intelligence</a></p><p><a href="https://www.infosecurity-magazine.com/news/mgm-security-failures-blackcat/">MGM Criticized for Repeated Security Failures</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-phishing-campaign/">New Microsoft Teams Phishing Campaign Targets Corporate Employees</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-blamed-53m-heist-at/">Lazarus Group Blamed For $53m Heist at CoinEx</a></p><p><a href="https://www.infosecurity-magazine.com/news/elon-musk-ftc-twitter-x-privacy/">Elon Musk in Hot Water With FTC Over Twitter Privacy Issues</a></p><p><a href="https://www.infosecurity-magazine.com/news/manchester-police-data-breached/">Manchester Police Officers’ Data Breached in Third-Party Attack</a></p><p> </p><p><strong>Tweet of the Week (41:54)</strong></p><img src="https://lh6.googleusercontent.com/gntW6Yvjttp2GCmg6EjKr3BjLaOhEXAksr9rVF0qf8blKowdXFJEXL79Hjtworx2PzYKMghDeCMzBqqyPE62KDVZRS-k8aq0XLzxKRmTuesvv5jepYcAapK263ayHWrmicAp9qBmCyaQB5BbGap_pVM" /><p><a href="https://x.com/Marlebean/status/1308858471106871298?s=20">https://x.com/Marlebean/status/1308858471106871298?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45844596" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1df5cbbe-c347-43bd-9d72-416cbacdf70f/audio/d9486467-0c01-4563-b44b-f78c504554fd/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 167 - The Sweaty B***s Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e044767a-9031-4a02-b49d-cb5f112fb6c9/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:45</itunes:duration>
      <itunes:summary>This week in InfoSec is the age old story about a 15 year old bringing down multi-million dollar companies
 
Rant of the Week could have been a casino BBB for Javvad but is instead rant from me

Billy Big Balls asks Javvad to praise Apple’s innovation to change culture
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some insurance advice</itunes:summary>
      <itunes:subtitle>This week in InfoSec is the age old story about a 15 year old bringing down multi-million dollar companies
 
Rant of the Week could have been a casino BBB for Javvad but is instead rant from me

Billy Big Balls asks Javvad to praise Apple’s innovation to change culture
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some insurance advice</itunes:subtitle>
      <itunes:keywords>courage, elon musk, akj, apple, biometric, europol, mgm resorts, casers enetrtainment, tricare, x, mafiaboy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>167</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14540b56-b8a7-4038-879e-f15ec1ae043b</guid>
      <title>Episode 166 - The Potato Quality Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th September 1987: Thomas Haynie was accused of intentionally jamming Playboy's satellite network with a text-only message. Haynie was an uplink engineer at the Christian Broadcasting Network and was on duty at the time of the jamming. He received 3 years of probation. </p><p><a href="https://www.upi.com/Archives/1990/09/19/CBN-engineer-denies-pre-empting-soft-porn-movies/1437653716800/">CBN engineer denies pre-empting soft-porn movies</a></p><p><a href="https://twitter.com/todayininfosec/status/1302620593322438656">https://twitter.com/todayininfosec/status/1302620593322438656</a></p><p> </p><p><strong>Rant of the Week (20:12)</strong></p><p><a href="https://www.theregister.com/2023/09/07/smart_devices_privacy/">If you like to play along with the illusion of privacy, smart devices are a dumb idea</a></p><p>Depressingly predictable research from Which? serves as another reminder, if one was needed, that furnishing your home with internet-connected "smart" devices could be a dumb idea if you'd rather try to preserve your privacy.</p><p>The consumer rights organization's analysis of a number of IoT products – from speakers and security cameras to TVs and washing machines – found that they all demand customer data above and beyond what is needed for the product to perform its function, and then distribute that information to a horde of faceless corporations.</p><p>Consumer campaign group Which? pointed out that this means consumers are not only in many cases paying thousands for the product itself, with all its "smart" connected bells and whistles, but continue to pay in the form of their personal data.</p><p>The outfit broke down what information is required to set up an account with the product manufacturers, what permissions the associated apps request, and what customer activity companies are tapping into.</p><p>Spoiler alert: it's all for ads and marketing.</p><p>Disturbingly, every single brand examined required both exact and approximate location data – as though your fancy washing machine needed to "know" where it is to clean your clothes.</p><p> </p><p><strong>Billy Big Balls of the Week (28:52)</strong></p><p><a href="https://www.theregister.com/2023/09/06/bitcoin_exchange_guilty/">Guy who ran Bitcoins4Less tells Feds he had less than zero laundering protections</a></p><p>A California man has admitted he failed to bake anti-money laundering protections into his cryptocurrency exchange, thus allowing scammers and drug traffickers to launder millions of dollars through the service.</p><p>Charles James Randol, 33, who is now due to be sentenced, faces a maximum of five years in federal prison and three years supervised release, plus a fine of up to $250,000 or twice the total illicit proceeds from the scams, whichever amount is greater.</p><p>Randol provided cryptocurrency exchange services in various ways, including via the post, ATMs, and occasionally in person, prosecutors told a Los Angeles federal court on Tuesday. The Santa Monica man would handle crypto-cash transactions exceeding $10,000 without knowing who his customers were – folks known only as "Puppet Shariff," "White Jetta," "Aaavvv," "Aaaa," and "Yogurt Monster," for example – which is hardly in line with regulatory requirements.</p><p>To stay on the right side <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bsa/index-bsa.html">of American law</a>, Randol should have verified and recorded their identities.</p><p>In his plea agreement, the cryptocurrency dealer admitted to three in-person transactions between October 2020 to January 2021 in which he gave an undercover FBI agent a total of $273,940 in cash for Bitcoin, and kept a four percent commission fee. </p><p>Randol "did not request a name, proof of identity, social security number, or any other information about [the undercover agent] or the source of the funds being exchanged," the plea agreement says.</p><p>[Good comment]: <i>Working for an American financial institution, we must go through mandatory AML (anti money laundering) training each year, and the consequences for the firm if an audit finds a violation tend to be in the high 6-digit payouts.</i></p><p><i>With that in mind, a kid operating a blatantly open money laundering gig takes a proportionally much smaller punishment (assuming white-glove inmates usually manage to leave the can way before their time is served)]</i></p><p> </p><p><strong>Industry News (36:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/electoral-commission-fails/">UK Electoral Commission Fails Cybersecurity Test Amid Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-casino-stakecom-online-40m/">Crypto Casino Stake.com Back Online After $40m Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-backs-down/">UK Government Backs Down on Anti-Encryption Stance</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-of-scam-pages-uncovered/">Hundreds of Scam Pages Uncovered in Major Investment Fraud Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/think-tank-urges-labour/">Think Tank Urges Labour to Promote “Securonomics” Agenda</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-hacker-steals-microsoft/">Chinese Hacker Steals Microsoft Signing Key, Spies on US Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/ibm-patient-data-breach-johnson/">IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-sanction-russians-conti/">UK and US Sanction 11 Russians Tied to Conti/TrickBot Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/zero-day-flaw-exposes-atlas-vpn/">Zero-Day Flaw Exposes Atlas VPN User IPs</a></p><p> </p><p><strong>Tweet of the Week (44:39)</strong></p><img src="https://lh4.googleusercontent.com/M9vuPCoAS1ssS7AmCXm9q9LswDJeklisjEqeFMn370bkkkykGsXIbh7W6jvfoEmkKbLwhOpsmYx5tt-Q52R-YDHWUfqpJOftmqpdHoXjLlrnHHM5J2O5Jbf9FIuila8FO3ycheJZbQsciGq7HiNiKL0" /><p><a href="https://twitter.com/KimZetter/status/1699546860187472034">https://twitter.com/KimZetter/status/1699546860187472034</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Sep 2023 12:44:40 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-166-7pmqhWFV</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:51)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th September 1987: Thomas Haynie was accused of intentionally jamming Playboy's satellite network with a text-only message. Haynie was an uplink engineer at the Christian Broadcasting Network and was on duty at the time of the jamming. He received 3 years of probation. </p><p><a href="https://www.upi.com/Archives/1990/09/19/CBN-engineer-denies-pre-empting-soft-porn-movies/1437653716800/">CBN engineer denies pre-empting soft-porn movies</a></p><p><a href="https://twitter.com/todayininfosec/status/1302620593322438656">https://twitter.com/todayininfosec/status/1302620593322438656</a></p><p> </p><p><strong>Rant of the Week (20:12)</strong></p><p><a href="https://www.theregister.com/2023/09/07/smart_devices_privacy/">If you like to play along with the illusion of privacy, smart devices are a dumb idea</a></p><p>Depressingly predictable research from Which? serves as another reminder, if one was needed, that furnishing your home with internet-connected "smart" devices could be a dumb idea if you'd rather try to preserve your privacy.</p><p>The consumer rights organization's analysis of a number of IoT products – from speakers and security cameras to TVs and washing machines – found that they all demand customer data above and beyond what is needed for the product to perform its function, and then distribute that information to a horde of faceless corporations.</p><p>Consumer campaign group Which? pointed out that this means consumers are not only in many cases paying thousands for the product itself, with all its "smart" connected bells and whistles, but continue to pay in the form of their personal data.</p><p>The outfit broke down what information is required to set up an account with the product manufacturers, what permissions the associated apps request, and what customer activity companies are tapping into.</p><p>Spoiler alert: it's all for ads and marketing.</p><p>Disturbingly, every single brand examined required both exact and approximate location data – as though your fancy washing machine needed to "know" where it is to clean your clothes.</p><p> </p><p><strong>Billy Big Balls of the Week (28:52)</strong></p><p><a href="https://www.theregister.com/2023/09/06/bitcoin_exchange_guilty/">Guy who ran Bitcoins4Less tells Feds he had less than zero laundering protections</a></p><p>A California man has admitted he failed to bake anti-money laundering protections into his cryptocurrency exchange, thus allowing scammers and drug traffickers to launder millions of dollars through the service.</p><p>Charles James Randol, 33, who is now due to be sentenced, faces a maximum of five years in federal prison and three years supervised release, plus a fine of up to $250,000 or twice the total illicit proceeds from the scams, whichever amount is greater.</p><p>Randol provided cryptocurrency exchange services in various ways, including via the post, ATMs, and occasionally in person, prosecutors told a Los Angeles federal court on Tuesday. The Santa Monica man would handle crypto-cash transactions exceeding $10,000 without knowing who his customers were – folks known only as "Puppet Shariff," "White Jetta," "Aaavvv," "Aaaa," and "Yogurt Monster," for example – which is hardly in line with regulatory requirements.</p><p>To stay on the right side <a href="https://www.occ.treas.gov/topics/supervision-and-examination/bsa/index-bsa.html">of American law</a>, Randol should have verified and recorded their identities.</p><p>In his plea agreement, the cryptocurrency dealer admitted to three in-person transactions between October 2020 to January 2021 in which he gave an undercover FBI agent a total of $273,940 in cash for Bitcoin, and kept a four percent commission fee. </p><p>Randol "did not request a name, proof of identity, social security number, or any other information about [the undercover agent] or the source of the funds being exchanged," the plea agreement says.</p><p>[Good comment]: <i>Working for an American financial institution, we must go through mandatory AML (anti money laundering) training each year, and the consequences for the firm if an audit finds a violation tend to be in the high 6-digit payouts.</i></p><p><i>With that in mind, a kid operating a blatantly open money laundering gig takes a proportionally much smaller punishment (assuming white-glove inmates usually manage to leave the can way before their time is served)]</i></p><p> </p><p><strong>Industry News (36:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/electoral-commission-fails/">UK Electoral Commission Fails Cybersecurity Test Amid Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-casino-stakecom-online-40m/">Crypto Casino Stake.com Back Online After $40m Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-backs-down/">UK Government Backs Down on Anti-Encryption Stance</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-of-scam-pages-uncovered/">Hundreds of Scam Pages Uncovered in Major Investment Fraud Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/think-tank-urges-labour/">Think Tank Urges Labour to Promote “Securonomics” Agenda</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-hacker-steals-microsoft/">Chinese Hacker Steals Microsoft Signing Key, Spies on US Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/ibm-patient-data-breach-johnson/">IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-sanction-russians-conti/">UK and US Sanction 11 Russians Tied to Conti/TrickBot Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/zero-day-flaw-exposes-atlas-vpn/">Zero-Day Flaw Exposes Atlas VPN User IPs</a></p><p> </p><p><strong>Tweet of the Week (44:39)</strong></p><img src="https://lh4.googleusercontent.com/M9vuPCoAS1ssS7AmCXm9q9LswDJeklisjEqeFMn370bkkkykGsXIbh7W6jvfoEmkKbLwhOpsmYx5tt-Q52R-YDHWUfqpJOftmqpdHoXjLlrnHHM5J2O5Jbf9FIuila8FO3ycheJZbQsciGq7HiNiKL0" /><p><a href="https://twitter.com/KimZetter/status/1699546860187472034">https://twitter.com/KimZetter/status/1699546860187472034</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46296409" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/06a78ecf-6bb0-46fc-912e-b54ff2dbcae7/audio/d8eff8d2-5414-4c59-b511-f237e1a12a20/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 166 - The Potato Quality Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5cd1d9c6-0630-4526-8649-d708187ab831/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:13</itunes:duration>
      <itunes:summary>This week in InfoSec is X rated (no. it’s not about Twitter this time)
 
Rant of the Week is just an illusion

Billy Big Balls airs it’s dirty laundry
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is as little bit sensible, actually</itunes:summary>
      <itunes:subtitle>This week in InfoSec is X rated (no. it’s not about Twitter this time)
 
Rant of the Week is just an illusion

Billy Big Balls airs it’s dirty laundry
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is as little bit sensible, actually</itunes:subtitle>
      <itunes:keywords>vpn, playboy, christian, sanctions, one-job, china, anti-encryption, kyc, privacy, whicj?, crypto, analogy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>166</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d25babbf-85cc-4c01-97e0-c016f8a4a69c</guid>
      <title>Episode 165 - The Don&apos;t Screw It Up Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (10:17)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p><strong>29th August 1990: The British Computer Misuse Act Goes into Effect  </strong></p><p>One of the earliest laws anywhere designed to address computer fraud, the Act resulted from a long debate in the 1980s over failed prosecutions of hackers -- in one well-publicised case, two men hacked into a British Telecom computer leaving messages in the Duke of Edinburgh's private mailbox.</p><p><a href="https://www.bbc.co.uk/news/technology-36306419">Archive of historic BT 'email' hack preserved</a></p><p>24th August 1993: Perhaps the most famous lawsuit in technology history is decided for Microsoft. Apple claimed that Microsoft’s Windows violated their copyrights on the “visual displays” of the Macintosh. The judge in the case ruled that most of the claims were covered by a 1985 licensing agreement. Other claims were not violations of copyright due to the “merger doctrine”, which basically states that ideas can not be copyrighted. This paved the way for Microsoft to develop Windows 95, which imitated the Macintosh even more so than previous versions of Windows.</p><p><a href="https://www.cultofmac.com/497066/tiah-apple-vs-microsoft-aug-91/">Today in Apple history: Tide turns against Apple in war with Microsoft</a></p><p> </p><p><strong>Rant of the Week (16:57)</strong></p><p><a href="https://www.theverge.com/2023/8/31/23853618/x-privacy-policy-update-biometrics-job-history">X wants permission to start collecting your biometric data and employment history</a></p><p>X, the platform previously known as Twitter, is expanding the amount of data it collects on users. The social network has updated its <a href="https://twitter.com/en/privacy#x-privacy-1">privacy policy</a> to include carveouts for “biometric information” and “employment history,” <a href="https://www.bloomberg.com/news/articles/2023-08-31/x-plans-to-collect-user-biometric-data-job-and-education-history?sref=ExbtjcSG">as spotted by Bloomberg</a>.</p><p>“Based on your consent, we may collect and use your biometric information for safety, security, and identification purposes,” the privacy policy reads. It doesn’t include any details on what kind of biometric information this includes — or how X plans to collect it — but it typically involves fingerprints, iris patterns, or facial features.</p><p>X Corp. was named in a <a href="https://s3.amazonaws.com/jnswire/jns-media/4e/52/13288870/2023ch06416.pdf">proposed class action lawsuit</a> in July over claims that its data collection violates the Illinois Biometric Information Privacy Act. The lawsuit alleges that X “has not adequately informed individuals” that it “collects and/or stores their biometric identifiers in every photograph containing a face” that’s uploaded to the platform.</p><p> </p><p><strong>Billy Big Balls of the Week (27:28)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/classiscam-fraud-as-a-service-expands-now-targets-banks-and-251-brands/">Classiscam fraud-as-a-service expands, now targets banks and 251 brands</a></p><p>The "Classiscam" scam-as-a-service operation has broadened its reach worldwide, targeting many more brands, countries, and industries, causing more significant financial damage than before.</p><p>Like a ransomware-as-a-service operation, this Telegram-based operation recruits affiliates who use the service's phishing kits to create fake ads and pages to steal money, credit card information, and, more recently, banking credentials.</p><p>Group-IB has published new information on the operation today, reporting that Classiscam has made $64.5 million in combined earnings from scamming users of classifieds sites and stealing their money and payment card details.</p><p>The number of targeted brands has also grown from 169 brands last year to 251 this year, and there are now 393 criminal gangs targeting users in 79 countries, coordinating in one of the operation's 1,366 Telegram channels.</p><p>[This is better than most public companies annual report calls]:</p><img src="https://lh5.googleusercontent.com/RyhF5o7a6cAz6ru7QT9xIvnu5jUTc0BDi1mSYGlPwqB8IYpg2WIy9BqHCLh0oL1-48c5OFzGkqogfDwX89sKIXAIyBSS7aT5CPzyDoJS2VJxgEXSMFOaFcMVYeZ_Nt0IuxJkvPVDWy_GlTbLdXh4fEc" alt="Classiscam operation stats" /><p> </p><p><strong>Industry News (33:57) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/growing-disparity-cyber-insurance/">Report Reveals Growing Disparity in Cyber Insurance Landscape</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-regulator-text-pest-cases/">Privacy Regulator Warns of Surge in “Text Pest” Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-cyber-warning-ai-chatbots/">NCSC Issues Cyber Warning Over AI Chatbots</a></p><p><a href="https://www.infosecurity-magazine.com/news/openai-promises-enterprisegrade/">OpenAI Promises Enterprise-Grade Security with ChatGPT for Business</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-operation-duck-hunt-qakbot/">FBI-Led Operation Duck Hunt Shuts Down QakBot Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-target-us-govts-barracuda/">Chinese Hackers Target US, Other Govts With Barracuda Flaw</a></p><p><a href="https://www.infosecurity-magazine.com/news/classiscam-dollar645m-scheme/">Classiscam Spreads: $64.5M Scheme Targets 79 Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-accounts-targeted-vietnam/">Facebook Accounts Targeted by Vietnamese Threat Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/airbnb-breeding-ground-cybercrime/">New Research Exposes Airbnb as Breeding Ground For Cybercrime</a></p><p> </p><p><strong>Tweet of the Week (43:17)</strong></p><img src="https://lh3.googleusercontent.com/E479R_Tljk_wcUzO_pXpcUY50z7n42eDKuVTLDMIfsN-7_q-SXXcQOiVKvzDR4-Hi4D5-Bf13YKhnI5upml_yCLyoaBETzmO-JaZbPafGtrMz43WlJ7MD2-HKMBKahqkqyua-w4wRBYJogCD8XoaXaQ" /><p><a href="https://twitter.com/HedgehogCycling/status/1696568821505552666?s=20">https://twitter.com/HedgehogCycling/status/1696568821505552666?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 1 Sep 2023 18:53:57 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-165-JICVjcU0</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (10:17)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p><strong>29th August 1990: The British Computer Misuse Act Goes into Effect  </strong></p><p>One of the earliest laws anywhere designed to address computer fraud, the Act resulted from a long debate in the 1980s over failed prosecutions of hackers -- in one well-publicised case, two men hacked into a British Telecom computer leaving messages in the Duke of Edinburgh's private mailbox.</p><p><a href="https://www.bbc.co.uk/news/technology-36306419">Archive of historic BT 'email' hack preserved</a></p><p>24th August 1993: Perhaps the most famous lawsuit in technology history is decided for Microsoft. Apple claimed that Microsoft’s Windows violated their copyrights on the “visual displays” of the Macintosh. The judge in the case ruled that most of the claims were covered by a 1985 licensing agreement. Other claims were not violations of copyright due to the “merger doctrine”, which basically states that ideas can not be copyrighted. This paved the way for Microsoft to develop Windows 95, which imitated the Macintosh even more so than previous versions of Windows.</p><p><a href="https://www.cultofmac.com/497066/tiah-apple-vs-microsoft-aug-91/">Today in Apple history: Tide turns against Apple in war with Microsoft</a></p><p> </p><p><strong>Rant of the Week (16:57)</strong></p><p><a href="https://www.theverge.com/2023/8/31/23853618/x-privacy-policy-update-biometrics-job-history">X wants permission to start collecting your biometric data and employment history</a></p><p>X, the platform previously known as Twitter, is expanding the amount of data it collects on users. The social network has updated its <a href="https://twitter.com/en/privacy#x-privacy-1">privacy policy</a> to include carveouts for “biometric information” and “employment history,” <a href="https://www.bloomberg.com/news/articles/2023-08-31/x-plans-to-collect-user-biometric-data-job-and-education-history?sref=ExbtjcSG">as spotted by Bloomberg</a>.</p><p>“Based on your consent, we may collect and use your biometric information for safety, security, and identification purposes,” the privacy policy reads. It doesn’t include any details on what kind of biometric information this includes — or how X plans to collect it — but it typically involves fingerprints, iris patterns, or facial features.</p><p>X Corp. was named in a <a href="https://s3.amazonaws.com/jnswire/jns-media/4e/52/13288870/2023ch06416.pdf">proposed class action lawsuit</a> in July over claims that its data collection violates the Illinois Biometric Information Privacy Act. The lawsuit alleges that X “has not adequately informed individuals” that it “collects and/or stores their biometric identifiers in every photograph containing a face” that’s uploaded to the platform.</p><p> </p><p><strong>Billy Big Balls of the Week (27:28)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/classiscam-fraud-as-a-service-expands-now-targets-banks-and-251-brands/">Classiscam fraud-as-a-service expands, now targets banks and 251 brands</a></p><p>The "Classiscam" scam-as-a-service operation has broadened its reach worldwide, targeting many more brands, countries, and industries, causing more significant financial damage than before.</p><p>Like a ransomware-as-a-service operation, this Telegram-based operation recruits affiliates who use the service's phishing kits to create fake ads and pages to steal money, credit card information, and, more recently, banking credentials.</p><p>Group-IB has published new information on the operation today, reporting that Classiscam has made $64.5 million in combined earnings from scamming users of classifieds sites and stealing their money and payment card details.</p><p>The number of targeted brands has also grown from 169 brands last year to 251 this year, and there are now 393 criminal gangs targeting users in 79 countries, coordinating in one of the operation's 1,366 Telegram channels.</p><p>[This is better than most public companies annual report calls]:</p><img src="https://lh5.googleusercontent.com/RyhF5o7a6cAz6ru7QT9xIvnu5jUTc0BDi1mSYGlPwqB8IYpg2WIy9BqHCLh0oL1-48c5OFzGkqogfDwX89sKIXAIyBSS7aT5CPzyDoJS2VJxgEXSMFOaFcMVYeZ_Nt0IuxJkvPVDWy_GlTbLdXh4fEc" alt="Classiscam operation stats" /><p> </p><p><strong>Industry News (33:57) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/growing-disparity-cyber-insurance/">Report Reveals Growing Disparity in Cyber Insurance Landscape</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-regulator-text-pest-cases/">Privacy Regulator Warns of Surge in “Text Pest” Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-cyber-warning-ai-chatbots/">NCSC Issues Cyber Warning Over AI Chatbots</a></p><p><a href="https://www.infosecurity-magazine.com/news/openai-promises-enterprisegrade/">OpenAI Promises Enterprise-Grade Security with ChatGPT for Business</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-operation-duck-hunt-qakbot/">FBI-Led Operation Duck Hunt Shuts Down QakBot Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-target-us-govts-barracuda/">Chinese Hackers Target US, Other Govts With Barracuda Flaw</a></p><p><a href="https://www.infosecurity-magazine.com/news/classiscam-dollar645m-scheme/">Classiscam Spreads: $64.5M Scheme Targets 79 Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-accounts-targeted-vietnam/">Facebook Accounts Targeted by Vietnamese Threat Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/airbnb-breeding-ground-cybercrime/">New Research Exposes Airbnb as Breeding Ground For Cybercrime</a></p><p> </p><p><strong>Tweet of the Week (43:17)</strong></p><img src="https://lh3.googleusercontent.com/E479R_Tljk_wcUzO_pXpcUY50z7n42eDKuVTLDMIfsN-7_q-SXXcQOiVKvzDR4-Hi4D5-Bf13YKhnI5upml_yCLyoaBETzmO-JaZbPafGtrMz43WlJ7MD2-HKMBKahqkqyua-w4wRBYJogCD8XoaXaQ" /><p><a href="https://twitter.com/HedgehogCycling/status/1696568821505552666?s=20">https://twitter.com/HedgehogCycling/status/1696568821505552666?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48698003" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0cd32a9e-30d1-48a3-b284-c5dbd5ff8fea/audio/72576281-07a7-4e77-89dd-f58ea3c13e28/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 165 - The Don&apos;t Screw It Up Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3d12d7e6-af44-4dc7-8e6f-42ef2ae40420/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:43</itunes:duration>
      <itunes:summary>This week in InfoSec talks about one of the earliest anti-hacker laws
Rant of the Week is X-rated use of biometric data
Billy Big Balls is from Group-IB reporting numbers which would please any investors
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week shows compliance and regulations really do work</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about one of the earliest anti-hacker laws
Rant of the Week is X-rated use of biometric data
Billy Big Balls is from Group-IB reporting numbers which would please any investors
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week shows compliance and regulations really do work</itunes:subtitle>
      <itunes:keywords>duck hunt, british computer misuse act, ulez, compliance, regulation, qakbot, apple, biometric, microsoft, privacy, class action, x, classiscam</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>165</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3508f98e-2da6-4fb5-bd2b-44f5962dc53b</guid>
      <title>Episode 164 - The Two Weeks Late Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (14:00)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2003: The Nachi worm began infecting Windows computers with the goal of REMOVING the Blaster worm and patching the vulnerability exploited by both worms.   </p><p><a href="https://web.archive.org/web/20031009000713/http://www.nwfusion.com/news/2003/0818unblast.html">Worm aims to eradicate Blaster</a></p><p><a href="https://twitter.com/todayininfosec/status/1692616573524050259">https://twitter.com/todayininfosec/status/1692616573524050259</a></p><p>26th August 2008: It was reported that a laptop on the International Space Station was infected by removable media containing the<a href="https://t.co/NfIIJslJCT"> http://W32.Gammima.AG</a> worm. Space. Where you don't want to be dealing with malware.</p><p><a href="https://www.zdnet.com/article/malware-detected-at-the-international-space-station/">Malware detected at the International Space Station</a></p><p><a href="https://twitter.com/todayininfosec/status/1298690676448735232">https://twitter.com/todayininfosec/status/1298690676448735232</a></p><p> </p><p><strong>Rant of the Week (19:02)</strong></p><p><a href="https://techcrunch.com/2023/08/19/cellebrite-asks-cops-to-keep-its-phone-hacking-tech-hush-hush/">Cellebrite asks cops to keep its phone hacking tech ‘hush hush’</a></p><p>For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite <a href="https://techcrunch.com/2018/02/27/cellebrite-may-have-found-a-way-to-unlock-iphones-running-ios-11/">to unlock phones</a> and obtain the data within. And the company has been keen on keeping the use of its technology “hush hush.”</p><p>As part of the deal with government agencies, Cellebrite asks users to keep its tech — and the fact that they used it — secret, TechCrunch has learned. This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.</p><p>[That was this weeks Rant of the week]</p><p> </p><p><strong>Billy Big Balls of the Week (28:35)</strong></p><p><a href="https://www.theregister.com/2023/08/24/two_teens_lapsus_jury/">Two teens were among those behind the Lapsus$ cyber-crime spree, jury finds</a></p><p>Two teenage members of the chaotic Lapsus$ cyber-crime gang helped compromise computer systems of Uber and Nvidia, and also blackmailed Grand Theft Auto maker Rockstar Games among other high-profile victims, a jury has decided.</p><p>At Southwark Crown Court in London, England, on Wednesday, Arion Kurtaj, 18, and a 17-year-old male who because of his age cannot be identified for legal reasons were found to have committed various crimes. Kurtaj was held in custody while the other was released on bail; both await sentencing.</p><p>This was an unusual case in that the jury was told not to find Kurtaj, who is autistic, guilty or not guilty as psychiatrists had earlier assessed that he was unfit to stand trial. Instead, the panel was asked to decided whether or not he did the things he was accused of.</p><p>The two teens, along with other Lapsus$ members, also broke into and attempted to extort telecoms giant BT, <a href="https://www.theregister.com/2022/03/21/microsoft_lapsus_breach_probe/">Microsoft</a>, Samsung, Vodafone, fintech firm Revolut, and <a href="https://www.theregister.com/2022/03/23/olkta_microsoft_lapsus/">Okta</a> during their crime spree between 2021 and 2022.</p><p> </p><p><strong>Industry News (36:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-ai-safety-summit-early-november/">UK’s AI Safety Summit Scheduled For Early November</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-insider-tipped-off/">Police Insider Tipped Off Criminal Friend About EncroChat Bust</a></p><p><a href="https://www.infosecurity-magazine.com/news/tesla-insiders-responsible-for/">Tesla: Insiders Responsible For Major Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-australian-utility/">Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems</a></p><p><a href="https://www.infosecurity-magazine.com/news/experian-pays-650000-settle-spam/">Experian Pays $650,000 to Settle Spam Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/winrar-flaw-affects-traders/">WinRAR Vulnerability Affects Traders Worldwide</a></p><p><a href="https://www.infosecurity-magazine.com/news/sensitive-data-10m-french/">Sensitive Data of 10 Million at Risk After French Employment Agency Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-26m-duolingo-users-leaked/">Data of 2.6 Million Duolingo Users Leaked on Hacking Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-flags-dollar40m-crypto-cash/">FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers</a></p><p> </p><p><strong>Tweet of the Week (47:47)</strong></p><img src="https://lh5.googleusercontent.com/S56glZbMcPPu3HFsVxpKEAWQSeplpi-5e5SBI5hvNgys8xWlOQbW3yO9t8AvOuY-kacwCIFgy5awKUR3ogxr10i4gAIb66jVotSfl1q3M4yiae6Gu1S2gGpSLHTtCnZffM6yO0iRdlb-7hxgqD-65aQ" /><p><a href="https://twitter.com/securityweekly/status/1694705119793746015">https://twitter.com/securityweekly/status/1694705119793746015</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Aug 2023 18:45:30 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-164-EZ7UzEsR</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (14:00)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2003: The Nachi worm began infecting Windows computers with the goal of REMOVING the Blaster worm and patching the vulnerability exploited by both worms.   </p><p><a href="https://web.archive.org/web/20031009000713/http://www.nwfusion.com/news/2003/0818unblast.html">Worm aims to eradicate Blaster</a></p><p><a href="https://twitter.com/todayininfosec/status/1692616573524050259">https://twitter.com/todayininfosec/status/1692616573524050259</a></p><p>26th August 2008: It was reported that a laptop on the International Space Station was infected by removable media containing the<a href="https://t.co/NfIIJslJCT"> http://W32.Gammima.AG</a> worm. Space. Where you don't want to be dealing with malware.</p><p><a href="https://www.zdnet.com/article/malware-detected-at-the-international-space-station/">Malware detected at the International Space Station</a></p><p><a href="https://twitter.com/todayininfosec/status/1298690676448735232">https://twitter.com/todayininfosec/status/1298690676448735232</a></p><p> </p><p><strong>Rant of the Week (19:02)</strong></p><p><a href="https://techcrunch.com/2023/08/19/cellebrite-asks-cops-to-keep-its-phone-hacking-tech-hush-hush/">Cellebrite asks cops to keep its phone hacking tech ‘hush hush’</a></p><p>For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite <a href="https://techcrunch.com/2018/02/27/cellebrite-may-have-found-a-way-to-unlock-iphones-running-ios-11/">to unlock phones</a> and obtain the data within. And the company has been keen on keeping the use of its technology “hush hush.”</p><p>As part of the deal with government agencies, Cellebrite asks users to keep its tech — and the fact that they used it — secret, TechCrunch has learned. This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.</p><p>[That was this weeks Rant of the week]</p><p> </p><p><strong>Billy Big Balls of the Week (28:35)</strong></p><p><a href="https://www.theregister.com/2023/08/24/two_teens_lapsus_jury/">Two teens were among those behind the Lapsus$ cyber-crime spree, jury finds</a></p><p>Two teenage members of the chaotic Lapsus$ cyber-crime gang helped compromise computer systems of Uber and Nvidia, and also blackmailed Grand Theft Auto maker Rockstar Games among other high-profile victims, a jury has decided.</p><p>At Southwark Crown Court in London, England, on Wednesday, Arion Kurtaj, 18, and a 17-year-old male who because of his age cannot be identified for legal reasons were found to have committed various crimes. Kurtaj was held in custody while the other was released on bail; both await sentencing.</p><p>This was an unusual case in that the jury was told not to find Kurtaj, who is autistic, guilty or not guilty as psychiatrists had earlier assessed that he was unfit to stand trial. Instead, the panel was asked to decided whether or not he did the things he was accused of.</p><p>The two teens, along with other Lapsus$ members, also broke into and attempted to extort telecoms giant BT, <a href="https://www.theregister.com/2022/03/21/microsoft_lapsus_breach_probe/">Microsoft</a>, Samsung, Vodafone, fintech firm Revolut, and <a href="https://www.theregister.com/2022/03/23/olkta_microsoft_lapsus/">Okta</a> during their crime spree between 2021 and 2022.</p><p> </p><p><strong>Industry News (36:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-ai-safety-summit-early-november/">UK’s AI Safety Summit Scheduled For Early November</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-insider-tipped-off/">Police Insider Tipped Off Criminal Friend About EncroChat Bust</a></p><p><a href="https://www.infosecurity-magazine.com/news/tesla-insiders-responsible-for/">Tesla: Insiders Responsible For Major Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-australian-utility/">Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems</a></p><p><a href="https://www.infosecurity-magazine.com/news/experian-pays-650000-settle-spam/">Experian Pays $650,000 to Settle Spam Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/winrar-flaw-affects-traders/">WinRAR Vulnerability Affects Traders Worldwide</a></p><p><a href="https://www.infosecurity-magazine.com/news/sensitive-data-10m-french/">Sensitive Data of 10 Million at Risk After French Employment Agency Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-26m-duolingo-users-leaked/">Data of 2.6 Million Duolingo Users Leaked on Hacking Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-flags-dollar40m-crypto-cash/">FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers</a></p><p> </p><p><strong>Tweet of the Week (47:47)</strong></p><img src="https://lh5.googleusercontent.com/S56glZbMcPPu3HFsVxpKEAWQSeplpi-5e5SBI5hvNgys8xWlOQbW3yO9t8AvOuY-kacwCIFgy5awKUR3ogxr10i4gAIb66jVotSfl1q3M4yiae6Gu1S2gGpSLHTtCnZffM6yO0iRdlb-7hxgqD-65aQ" /><p><a href="https://twitter.com/securityweekly/status/1694705119793746015">https://twitter.com/securityweekly/status/1694705119793746015</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="51527587" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/25457530-277d-4cc9-897d-ab9c85b4211f/audio/828ca1c6-aab9-4c76-9086-fdd124624454/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 164 - The Two Weeks Late Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/39718803-5711-4f08-afe5-4ae71b19fd13/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:40</itunes:duration>
      <itunes:summary>This week in InfoSec talks about space viruses
 
Rant of the Week says “don’t mention the tech” - we said it once but I think we got away with it

Billy Big Balls reveals the identities of sophisticated hackers
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week asks you to think of the pain you cause your family</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about space viruses
 
Rant of the Week says “don’t mention the tech” - we said it once but I think we got away with it

Billy Big Balls reveals the identities of sophisticated hackers
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week asks you to think of the pain you cause your family</itunes:subtitle>
      <itunes:keywords>lapsus$, duolingo, ai, cellebrite, winrar, nachi, ianal, blaster, android</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>164</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">36084388-45db-4530-828a-0a1c6b717106</guid>
      <title>Episode 163 - The Sombre Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:56)</strong></p><p>With content liberated from the “Today in Infosec” Twitter account and further afield</p><p>4th August 1998: Microsoft published a critical security bulletin MS98-010, titled 'Information on the "Back Orifice" Program'.  </p><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-010">Microsoft Security Bulletin MS98-010 - Critical</a></p><p><a href="https://twitter.com/todayininfosec/status/1423037189714219020">https://twitter.com/todayininfosec/status/1423037189714219020</a>   </p><p>27th July 2000: In security bulletin MS00-047, Microsoft thanked PGP's COVERT Labs and Sir Dystic of Cult of the Dead Cow for reporting NetBIOS vulnerabilities </p><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-047">Patch Available for 'NetBIOS Name Server Protocol Spoofing' Vulnerability</a></p><p><a href="https://twitter.com/todayininfosec/status/1287934373019385861">https://twitter.com/todayininfosec/status/1287934373019385861</a></p><p> </p><p><strong>Rant of the Week (18:31)</strong></p><p><a href="https://www.theregister.com/2023/08/03/nhs_ico_warning/">Brit healthcare body rapped for WhatsApp chat sharing patient data</a></p><p>Staff at NHS Lanarkshire - which serves over half a million Scottish residents - used WhatsApp to swap photos and personal info about patients, including children's names and addresses.</p><p>Following a probe, the UK Information Commissioner's Office (ICO) has now issued a heavily redacted official reprimand to the organization, which <a href="https://www.nhslanarkshire.scot.nhs.uk/about-us/">oversees</a> three hospitals plus clinics and more across rural and urban Lanarkshire in the Central Lowlands of Scotland. It said a group chat created in March 2020 – just as the UK government issued the first COVID lockdown – was in breach of Article 58 of the UK GDPR.</p><p>Information was shared between 26 staff for more than two years – from 1 April 2020 to 25 April 2022 – over hundreds of entries within the WhatsApp group that included adult and child patients' names, plus hundreds of patients' phone numbers, many dates of birth, and at least 28 home addresses, "15 images, three videos, and four screenshots." Some of this info included clinical information, and therefore "special category" data in breach of Article 9 of the UK GDPR.</p><p>Yes, on their actual work phones, using software provided via NHS portal.</p><p>The staffers were using copies of WhatsApp downloaded directly via NHS Lanarkshire's portal on their work phones, it emerged, but someone, whose name was redacted, was added to the group "in error." That "unauthorised individual" was given access to "four students' names and student numbers, one child's name, and two children's names and addresses."</p><p>The ICO noted that since WhatsApp stated it was an encrypted platform, staff thought it would be secure. This, the watchdog said, "demonstrates that information governance expectations regarding WhatsApp were not understood by staff involved in the WhatsApp Group."</p><p> </p><p><strong>Billy Big Balls of the Week (31:21)</strong></p><p>[The fact the government doesn’t even try to hide what they do and gaslight the country by saying it would be the worst intelligence failure of their time is a BBB move to me - but I’ll let Jav decide 😀]</p><p><a href="https://www.theregister.com/2023/07/31/biden_section_702_intelligence/">White House: Losing Section 702 spy powers would be among 'worst intelligence failures of our time'</a></p><p>The White House has weighed in on the Section 702 debate, urging lawmakers to reauthorize, "without new and operationally damaging restrictions," the controversial snooping powers before they expire at the end of the year.</p><p>Section 702 of the Foreign Intelligence Surveillance Act (FISA) allows the American government to monitor electronic communications of foreign persons outside of the United States [<a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">PDF</a>], and people they confer with, including US persons. While it's supposed to be used as an intelligence tool — to prevent terrorist attacks or track down similar targets — it's also at times abused to conduct warrantless snooping on Americans including protesters, campaign donors, and <a href="https://www.theregister.com/2023/07/22/us_senator_caught_in_section_702/">elected officials</a>.</p><p>The controversial law, introduced in 2008, is up for renewal at the end of the year, and the US intelligence community has been frantically lobbying to keep these surveillance powers. FBI Director Chris Wray <a href="https://www.theregister.com/2023/07/28/fbi_section_702/">said last week</a> that Section 702 data was responsible for "97 percent of our raw technical reporting on cyber actors."</p><p>Now the White House has thrown its weight behind its intel services, arguing that curbing the legislation or letting it drop would be "one of the worst intelligence failures of our time."</p><p>Despite unanimously recommending that Congress renew Section 702, the PIAB's report [<a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/Presidents-Intelligence-Advisory-Board-and-Intelligence-Oversight-Board-Review-of-FISA-Section-702-and-Recommendations-for-Reauthorization.pdf">PDF</a>] does acknowledge that "complacency, a lack of proper procedures, and the sheer volume of Section 702 activity led to FBI's inappropriate use" of the surveillance powers to query US persons</p><p> </p><p><strong>Industry News  (37:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-staff-reprimanded-whatsapp/">NHS Staff Reprimanded For WhatsApp Data Sharing</a></p><p><a href="https://www.infosecurity-magazine.com/news/canon-inkjet-printers-expose-wi-fi/">Canon Inkjet Printers Expose Wi-Fi Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-phishing-driving-ransomware/">AI-Enhanced Phishing Driving Ransomware Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-citrix-compromised/">Hundreds of Citrix Endpoints Compromised With Webshells</a></p><p><a href="https://www.infosecurity-magazine.com/news/cocaine-smugglers-posed-pc-sellers/">Cocaine Smugglers that Posed as PC Sellers Jailed</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-detect-deefake-speech/">Humans Unable to Reliably Detect Deepfake Speech</a></p><p><a href="https://www.infosecurity-magazine.com/news/menlo-advanced-technology-browser/">Menlo Leverages Advanced Technology to Combat Surging Browser Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-midnight-blizzard/">Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/mysterious-team-bangladesh-revealed/">Hacktivist Collective “Mysterious Team Bangladesh” Revealed</a></p><p> </p><p>Noteworthy mention:<a href="https://www.infosecurity-magazine.com/news/security-unsung-heroes-awards-2023/"> Security Serious Unsung Heroes Awards 2023 Open for Nominations</a></p><p> </p><p><strong>Tweet of the Week (47:23)</strong></p><img src="https://lh4.googleusercontent.com/Jl26PAjttQx5_YauEq8U2fVUv2ujXgLPB85RZPIx67YPj2uukmiE3HOEjbUzA5gOGzTKZdlDVXnSYHaS6X3EMcpWPXuedRJWjePh81V8VsPwjNlQDKNxDhw4_WLRVX1Jr9JjhVianor0ayQ6eMrJQT4" /><p><a href="https://twitter.com/Sheriffie/status/1686864006160711680">https://twitter.com/Sheriffie/status/1686864006160711680</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Aug 2023 15:37:29 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-163-ULxoJsh5</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:56)</strong></p><p>With content liberated from the “Today in Infosec” Twitter account and further afield</p><p>4th August 1998: Microsoft published a critical security bulletin MS98-010, titled 'Information on the "Back Orifice" Program'.  </p><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-010">Microsoft Security Bulletin MS98-010 - Critical</a></p><p><a href="https://twitter.com/todayininfosec/status/1423037189714219020">https://twitter.com/todayininfosec/status/1423037189714219020</a>   </p><p>27th July 2000: In security bulletin MS00-047, Microsoft thanked PGP's COVERT Labs and Sir Dystic of Cult of the Dead Cow for reporting NetBIOS vulnerabilities </p><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-047">Patch Available for 'NetBIOS Name Server Protocol Spoofing' Vulnerability</a></p><p><a href="https://twitter.com/todayininfosec/status/1287934373019385861">https://twitter.com/todayininfosec/status/1287934373019385861</a></p><p> </p><p><strong>Rant of the Week (18:31)</strong></p><p><a href="https://www.theregister.com/2023/08/03/nhs_ico_warning/">Brit healthcare body rapped for WhatsApp chat sharing patient data</a></p><p>Staff at NHS Lanarkshire - which serves over half a million Scottish residents - used WhatsApp to swap photos and personal info about patients, including children's names and addresses.</p><p>Following a probe, the UK Information Commissioner's Office (ICO) has now issued a heavily redacted official reprimand to the organization, which <a href="https://www.nhslanarkshire.scot.nhs.uk/about-us/">oversees</a> three hospitals plus clinics and more across rural and urban Lanarkshire in the Central Lowlands of Scotland. It said a group chat created in March 2020 – just as the UK government issued the first COVID lockdown – was in breach of Article 58 of the UK GDPR.</p><p>Information was shared between 26 staff for more than two years – from 1 April 2020 to 25 April 2022 – over hundreds of entries within the WhatsApp group that included adult and child patients' names, plus hundreds of patients' phone numbers, many dates of birth, and at least 28 home addresses, "15 images, three videos, and four screenshots." Some of this info included clinical information, and therefore "special category" data in breach of Article 9 of the UK GDPR.</p><p>Yes, on their actual work phones, using software provided via NHS portal.</p><p>The staffers were using copies of WhatsApp downloaded directly via NHS Lanarkshire's portal on their work phones, it emerged, but someone, whose name was redacted, was added to the group "in error." That "unauthorised individual" was given access to "four students' names and student numbers, one child's name, and two children's names and addresses."</p><p>The ICO noted that since WhatsApp stated it was an encrypted platform, staff thought it would be secure. This, the watchdog said, "demonstrates that information governance expectations regarding WhatsApp were not understood by staff involved in the WhatsApp Group."</p><p> </p><p><strong>Billy Big Balls of the Week (31:21)</strong></p><p>[The fact the government doesn’t even try to hide what they do and gaslight the country by saying it would be the worst intelligence failure of their time is a BBB move to me - but I’ll let Jav decide 😀]</p><p><a href="https://www.theregister.com/2023/07/31/biden_section_702_intelligence/">White House: Losing Section 702 spy powers would be among 'worst intelligence failures of our time'</a></p><p>The White House has weighed in on the Section 702 debate, urging lawmakers to reauthorize, "without new and operationally damaging restrictions," the controversial snooping powers before they expire at the end of the year.</p><p>Section 702 of the Foreign Intelligence Surveillance Act (FISA) allows the American government to monitor electronic communications of foreign persons outside of the United States [<a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">PDF</a>], and people they confer with, including US persons. While it's supposed to be used as an intelligence tool — to prevent terrorist attacks or track down similar targets — it's also at times abused to conduct warrantless snooping on Americans including protesters, campaign donors, and <a href="https://www.theregister.com/2023/07/22/us_senator_caught_in_section_702/">elected officials</a>.</p><p>The controversial law, introduced in 2008, is up for renewal at the end of the year, and the US intelligence community has been frantically lobbying to keep these surveillance powers. FBI Director Chris Wray <a href="https://www.theregister.com/2023/07/28/fbi_section_702/">said last week</a> that Section 702 data was responsible for "97 percent of our raw technical reporting on cyber actors."</p><p>Now the White House has thrown its weight behind its intel services, arguing that curbing the legislation or letting it drop would be "one of the worst intelligence failures of our time."</p><p>Despite unanimously recommending that Congress renew Section 702, the PIAB's report [<a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/Presidents-Intelligence-Advisory-Board-and-Intelligence-Oversight-Board-Review-of-FISA-Section-702-and-Recommendations-for-Reauthorization.pdf">PDF</a>] does acknowledge that "complacency, a lack of proper procedures, and the sheer volume of Section 702 activity led to FBI's inappropriate use" of the surveillance powers to query US persons</p><p> </p><p><strong>Industry News  (37:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-staff-reprimanded-whatsapp/">NHS Staff Reprimanded For WhatsApp Data Sharing</a></p><p><a href="https://www.infosecurity-magazine.com/news/canon-inkjet-printers-expose-wi-fi/">Canon Inkjet Printers Expose Wi-Fi Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-phishing-driving-ransomware/">AI-Enhanced Phishing Driving Ransomware Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/hundreds-citrix-compromised/">Hundreds of Citrix Endpoints Compromised With Webshells</a></p><p><a href="https://www.infosecurity-magazine.com/news/cocaine-smugglers-posed-pc-sellers/">Cocaine Smugglers that Posed as PC Sellers Jailed</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-detect-deefake-speech/">Humans Unable to Reliably Detect Deepfake Speech</a></p><p><a href="https://www.infosecurity-magazine.com/news/menlo-advanced-technology-browser/">Menlo Leverages Advanced Technology to Combat Surging Browser Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-midnight-blizzard/">Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/mysterious-team-bangladesh-revealed/">Hacktivist Collective “Mysterious Team Bangladesh” Revealed</a></p><p> </p><p>Noteworthy mention:<a href="https://www.infosecurity-magazine.com/news/security-unsung-heroes-awards-2023/"> Security Serious Unsung Heroes Awards 2023 Open for Nominations</a></p><p> </p><p><strong>Tweet of the Week (47:23)</strong></p><img src="https://lh4.googleusercontent.com/Jl26PAjttQx5_YauEq8U2fVUv2ujXgLPB85RZPIx67YPj2uukmiE3HOEjbUzA5gOGzTKZdlDVXnSYHaS6X3EMcpWPXuedRJWjePh81V8VsPwjNlQDKNxDhw4_WLRVX1Jr9JjhVianor0ayQ6eMrJQT4" /><p><a href="https://twitter.com/Sheriffie/status/1686864006160711680">https://twitter.com/Sheriffie/status/1686864006160711680</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50076850" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e924f26a-3636-47dd-a31e-4471c5fea868/audio/7ec975a9-0eec-4596-bff7-78d880376fbd/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 163 - The Sombre Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/544daf47-90db-4f7d-b25f-40c1510b1137/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:09</itunes:duration>
      <itunes:summary>This week in InfoSec talks about orifices
 
Rant of the Week discusses personal data in group chats

Billy Big Balls asks you to think of the poor US government
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some career advice</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about orifices
 
Rant of the Week discusses personal data in group chats

Billy Big Balls asks you to think of the poor US government
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some career advice</itunes:subtitle>
      <itunes:keywords>whatsapp, soft skills, section 702, token ring, back orific, nhs, whitehouse, communication, l0phtcrack, netbios</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28ee1f0c-6b3b-403c-a6eb-f08bd06e3e51</guid>
      <title>Episode 162 - The Do Not Google It Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (05:54)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats".  </p><p><a href="https://twitter.com/todayininfosec/status/1416957326205100035">https://twitter.com/todayininfosec/status/1416957326205100035</a>  </p><p>27th July 1990: The case of United States v. Riggs was decided. Robert J. Riggs (Prophet) had stolen the E911 file from BellSouth, then co-defendant Craig Neidorf (Knight Lightning) had published it in Phrack. The file was neither valuable nor confidential. </p><p><a href="https://twitter.com/todayininfosec/status/1287768573310533633">https://twitter.com/todayininfosec/status/1287768573310533633</a></p><p> </p><p><strong>Rant of the Week (16:59)</strong></p><p><a href="https://www.theregister.com/2023/07/21/virustotal_data_exposure_apology/">VirusTotal: We're sorry someone fat-fingered and exposed 5,600 users</a></p><p>VirusTotal today issued a mea culpa, saying a blunder earlier this week by one of its staff exposed information belonging to 5,600 customers, including the email addresses of US Cyber Command, FBI, and NSA employees.</p><p>The unintentional leak was due to the <a href="https://www.theregister.com/2016/08/03/humans_always_trump_antiphishing_schemes/">layer-eight</a> problem; human error. On June 29, an employee accidentally uploaded a .csv file of customer info to VirusTotal itself, said Emiliano Martinez, tech lead of the Google-owned malware analysis site.</p><p>"This CSV file contained limited information of our Premium account customers, specifically the names of companies, the associated VirusTotal group names, and the email addresses of group administrators," Martinez <a href="https://blog.virustotal.com/2023/07/apology-and-update-on-recent-accidental.html">wrote</a> in a Friday disclosure.</p><p>"We removed the file, which was only accessible to partners and corporate clients, from our platform within one hour of its posting."</p><p>The employee had this list in the first place because the customer data was "critical to their role," we're told.</p><p>For those who don't know: VirusTotal allows netizens to – among other things – upload files, or submit a URL to one, and the site runs the material through various malware-scanning engines to see if anything malicious is detected or identified. Premium subscribers can also <a href="https://developers.virustotal.com/reference/files-download">download</a> uploaded samples, and thus that's how the uploaded .csv file of customer info was accidentally leaked.</p><p><a href="https://www.bbc.co.uk/news/uk-politics-66333488">https://www.bbc.co.uk/news/uk-politics-66333488</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:01)</strong></p><p><a href="https://www.theregister.com/2023/07/26/sec_reporting_security/">Crooks pwned your servers? You've got four days to tell us, SEC tells public companies</a></p><p>Public companies that suffer a computer crime likely to cause a "material" hit to an investor will soon face a four-day time limit to disclose the incident, according to rules approved today by the US Securities and Exchange Commission.</p><p>The SEC <a href="https://www.theregister.com/2022/03/09/sec_cyberattack_disclosure/">proposed</a> the changes last March, and on Wednesday the financial watchdog voted to adopt the requirements [<a href="https://www.sec.gov/rules/final/2023/33-11216.pdf">PDF</a>]. The rules, which take effect 30 days after being signed into the Federal Register later this year, will require publicly traded firms to openly disclose in a new section (Item 1.05) of Form 8-K any cybersecurity incident that has a material impact on their business. </p><p>Companies must make this determination "without reasonable delay," according to the new rules. If they decide a security breach is material, then they have four days to submit an Item 1.05 Form 8-K report detailing the material impact of the incident's "nature, scope, and timing," plus any impact or likely impact on the business. Those 8-K forms are made public by the SEC.</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p><strong>Industry News (30:05)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/booz-allen-377m-settle-government/">Booz Allen Pays $377m to Settle Government Fraud Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-strikes-norwegian/">Cyber-Attack Strikes Norwegian Government Ministries</a></p><p><a href="https://www.infosecurity-magazine.com/news/industry-coalition-calls-network/">Industry Coalition Calls For Enhanced Network Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-markets-fraudgpt-ai-tool/">Dark Web Markets Offer New FraudGPT AI Tool</a></p><p><a href="https://www.infosecurity-magazine.com/news/group-ib-sentenced-russia-14-years/">Group-IB Founder Sentenced in Russia to 14 Years for Treason</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-cyberincident-disclosure-four/">SEC Wants Cyber-Incident Disclosure Within Four Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/supply-chain-attack-hits-nhs/">Supply Chain Attack Hits NHS Ambulance Trusts</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-publishes-new-guidance-on/">NCSC Publishes New Guidance on Shadow IT</a></p><p><a href="https://www.infosecurity-magazine.com/news/openai-microsoft-google-anthropic/">OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI</a></p><p> </p><p><a href="https://www.outkick.com/robot-pizza-start-up-shuts-down-because-they-couldnt-keep-cheese-from-sliding-off/">https://www.outkick.com/robot-pizza-start-up-shuts-down-because-they-couldnt-keep-cheese-from-sliding-off/</a></p><p> </p><p><strong>Tweet of the Week (42:02)</strong></p><img src="https://lh4.googleusercontent.com/JfAPvy0QfnHfFTlY1E5wXEC6wHm8S4KevP4ByOsmqVq5_wi_aXIICtFCVGUYYQZh_Xz4p6xAidlX8e1T0COdwAspYEq2GSxONxmlfriDO2ArsJX0jImXqnwv6SM3efixCQmgqO-Hcz_Mrpr4PmhONr8" /><p><a href="https://twitter.com/hilare_belloc/status/1683797122628321280">https://twitter.com/hilare_belloc/status/1683797122628321280</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 Jul 2023 16:44:18 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-162-the-thoms-laptop-doesnt-work-episode-CBVGmz46</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (05:54)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats".  </p><p><a href="https://twitter.com/todayininfosec/status/1416957326205100035">https://twitter.com/todayininfosec/status/1416957326205100035</a>  </p><p>27th July 1990: The case of United States v. Riggs was decided. Robert J. Riggs (Prophet) had stolen the E911 file from BellSouth, then co-defendant Craig Neidorf (Knight Lightning) had published it in Phrack. The file was neither valuable nor confidential. </p><p><a href="https://twitter.com/todayininfosec/status/1287768573310533633">https://twitter.com/todayininfosec/status/1287768573310533633</a></p><p> </p><p><strong>Rant of the Week (16:59)</strong></p><p><a href="https://www.theregister.com/2023/07/21/virustotal_data_exposure_apology/">VirusTotal: We're sorry someone fat-fingered and exposed 5,600 users</a></p><p>VirusTotal today issued a mea culpa, saying a blunder earlier this week by one of its staff exposed information belonging to 5,600 customers, including the email addresses of US Cyber Command, FBI, and NSA employees.</p><p>The unintentional leak was due to the <a href="https://www.theregister.com/2016/08/03/humans_always_trump_antiphishing_schemes/">layer-eight</a> problem; human error. On June 29, an employee accidentally uploaded a .csv file of customer info to VirusTotal itself, said Emiliano Martinez, tech lead of the Google-owned malware analysis site.</p><p>"This CSV file contained limited information of our Premium account customers, specifically the names of companies, the associated VirusTotal group names, and the email addresses of group administrators," Martinez <a href="https://blog.virustotal.com/2023/07/apology-and-update-on-recent-accidental.html">wrote</a> in a Friday disclosure.</p><p>"We removed the file, which was only accessible to partners and corporate clients, from our platform within one hour of its posting."</p><p>The employee had this list in the first place because the customer data was "critical to their role," we're told.</p><p>For those who don't know: VirusTotal allows netizens to – among other things – upload files, or submit a URL to one, and the site runs the material through various malware-scanning engines to see if anything malicious is detected or identified. Premium subscribers can also <a href="https://developers.virustotal.com/reference/files-download">download</a> uploaded samples, and thus that's how the uploaded .csv file of customer info was accidentally leaked.</p><p><a href="https://www.bbc.co.uk/news/uk-politics-66333488">https://www.bbc.co.uk/news/uk-politics-66333488</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:01)</strong></p><p><a href="https://www.theregister.com/2023/07/26/sec_reporting_security/">Crooks pwned your servers? You've got four days to tell us, SEC tells public companies</a></p><p>Public companies that suffer a computer crime likely to cause a "material" hit to an investor will soon face a four-day time limit to disclose the incident, according to rules approved today by the US Securities and Exchange Commission.</p><p>The SEC <a href="https://www.theregister.com/2022/03/09/sec_cyberattack_disclosure/">proposed</a> the changes last March, and on Wednesday the financial watchdog voted to adopt the requirements [<a href="https://www.sec.gov/rules/final/2023/33-11216.pdf">PDF</a>]. The rules, which take effect 30 days after being signed into the Federal Register later this year, will require publicly traded firms to openly disclose in a new section (Item 1.05) of Form 8-K any cybersecurity incident that has a material impact on their business. </p><p>Companies must make this determination "without reasonable delay," according to the new rules. If they decide a security breach is material, then they have four days to submit an Item 1.05 Form 8-K report detailing the material impact of the incident's "nature, scope, and timing," plus any impact or likely impact on the business. Those 8-K forms are made public by the SEC.</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p><strong>Industry News (30:05)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/booz-allen-377m-settle-government/">Booz Allen Pays $377m to Settle Government Fraud Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-strikes-norwegian/">Cyber-Attack Strikes Norwegian Government Ministries</a></p><p><a href="https://www.infosecurity-magazine.com/news/industry-coalition-calls-network/">Industry Coalition Calls For Enhanced Network Resilience</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-markets-fraudgpt-ai-tool/">Dark Web Markets Offer New FraudGPT AI Tool</a></p><p><a href="https://www.infosecurity-magazine.com/news/group-ib-sentenced-russia-14-years/">Group-IB Founder Sentenced in Russia to 14 Years for Treason</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-cyberincident-disclosure-four/">SEC Wants Cyber-Incident Disclosure Within Four Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/supply-chain-attack-hits-nhs/">Supply Chain Attack Hits NHS Ambulance Trusts</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-publishes-new-guidance-on/">NCSC Publishes New Guidance on Shadow IT</a></p><p><a href="https://www.infosecurity-magazine.com/news/openai-microsoft-google-anthropic/">OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI</a></p><p> </p><p><a href="https://www.outkick.com/robot-pizza-start-up-shuts-down-because-they-couldnt-keep-cheese-from-sliding-off/">https://www.outkick.com/robot-pizza-start-up-shuts-down-because-they-couldnt-keep-cheese-from-sliding-off/</a></p><p> </p><p><strong>Tweet of the Week (42:02)</strong></p><img src="https://lh4.googleusercontent.com/JfAPvy0QfnHfFTlY1E5wXEC6wHm8S4KevP4ByOsmqVq5_wi_aXIICtFCVGUYYQZh_Xz4p6xAidlX8e1T0COdwAspYEq2GSxONxmlfriDO2ArsJX0jImXqnwv6SM3efixCQmgqO-Hcz_Mrpr4PmhONr8" /><p><a href="https://twitter.com/hilare_belloc/status/1683797122628321280">https://twitter.com/hilare_belloc/status/1683797122628321280</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46819694" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1d1aa482-bc9e-46cc-966d-1d038972c778/audio/ad84b2ed-17c3-447f-97e3-1101881398b3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 162 - The Do Not Google It Episode</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0a5b496a-3a62-46e0-b415-d694f524b95c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:46</itunes:duration>
      <itunes:summary>This week in InfoSec reminisces about simpler passwords

Rant of the Week looks at a layer 8 problem

Billy Big Balls is the SEC no longer messing around

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week - could be a trip down infosec memory lane</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminisces about simpler passwords

Rant of the Week looks at a layer 8 problem

Billy Big Balls is the SEC no longer messing around

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week - could be a trip down infosec memory lane</itunes:subtitle>
      <itunes:keywords>goatse, al, sec, fraudgpt, virustotal, hotmail, shadow it, prophet, pizza, phrack, ilovecats, knight lighning</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>162</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d11a1d97-7a1b-4fe6-8367-b07c8f937cae</guid>
      <title>Episode 161 - The Receding Hairline and Glasses Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:59)</strong></p><p>With content liberated from the “Today in infosec” Twitter account and further afield</p><p>18th July 2011: LulzSec hacked the Sun newspaper's website, redirecting visitors to a hoax article claiming Rupert Murdoch died after ingesting palladium.  </p><p><a href="https://www.theregister.com/2011/07/18/murdoch_sun_hacked/">Hacked Sun site greatly exaggerates Murdoch's death</a></p><p><a href="https://twitter.com/todayininfosec/status/1681469966527213568">https://twitter.com/todayininfosec/status/1681469966527213568</a></p><p> </p><p>14th July 2000: <a href="https://twitter.com/hashtag/Wireshark?src=hashtag_click">#Wireshark</a> was released</p><p>Wireshark Is 25: <a href="https://blog.wireshark.org/2023/07/wireshark-is-25/">The email that started it all and the lessons learned along the way</a></p><p> </p><p><strong>Rant of the Week (16:49)</strong></p><p><a href="https://www.engadget.com/french-assembly-passes-bill-allowing-police-to-remotely-activate-phone-cameras-and-microphones-for-surveillance-210539401.html">French Assembly passes bill allowing police to remotely activate phone cameras and microphones for surveillance</a></p><p>French law enforcement may soon have far-reaching authority to snoop on alleged criminals. Lawmakers in France's National Assembly have <a href="https://www.lemonde.fr/en/france/article/2023/07/06/france-set-to-allow-police-to-spy-through-phones_6044269_7.html">passed</a> a bill that lets police surveil suspects by remotely activating cameras, microphones and GPS location systems on phones and other devices. A judge will have to approve use of the powers, and the recently amended bill forbids use against journalists, lawyers and other "sensitive professions," according to Le Monde. The measure is also meant to limit use to serious cases, and only for a maximum of six months. Geolocation would be limited to crimes that are punishable by at least five years in prison.</p><p>An earlier version of the bill passed the Senate, but the amendment will require that legislative body's approval before it can become law.</p><p>Civil liberties advocates are alarmed. The digital rights group La Quadrature du Net previously <a href="https://www.laquadrature.net/2023/05/31/transformer-les-objets-connectes-en-mouchards-la-surenchere-securitaire-du-gouvernement/">pointed</a> out the potential for abuse. As the bill isn't clear about what constitutes a serious crime, there are fears the French government might use this to target environmental activists and others who aren't grave threats. The organization also notes that worrying security policies have a habit of expanding to less serious crimes. Genetic registration was only used for sex offenders at first, La Quadrature says, but is now being used for most crimes.</p><p> </p><p><strong>Billy Big Balls of the Week (26:37)</strong></p><p>OBITUARY Kevin David Mitnick</p><p><a href="https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668">https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668</a></p><p>Kevin David Mitnick, 59, died peacefully on Sunday, July 16, 2023, after valiantly battling pancreatic cancer for more than a year. Kevin is survived by his beloved wife, Kimberley Mitnick, who remained by his side throughout their 14-month ordeal. Kimberley is pregnant with their first child. Kevin was ecstatic about this new chapter in his and Kimberley's life together, which has now been sadly cut short.</p><p>When his desire to push boundaries led him too far astray, he landed in juvenile detention and eventually served a couple of stints in prison. His time on the FBI's Most Wanted List was well documented in his New York Times bestselling book, The Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, and his other titles: The Art of Deception, The Art of Intrusion, both co-authored with William Simon, and The Art of Invisibility with Robert Vamosi.</p><p>Kevin emerged from his final prison term, which he deemed a 'vacation,' in January 2000. He was a changed individual, and began constructing a new career, as a White Hat hacker and security consultant. He became a highly sought-after global public speaker, a writer, and established the successful Mitnick Security Consulting. In November 2011, he became the Chief Hacking Officer and part owner of security awareness training company KnowBe4, founded by close friend and business partner Stu Sjouwerman.</p><p> </p><p><strong>Industry News (36:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/it-security-pro-jailed-for/">IT Security Pro Jailed for Attempted Extortion</a></p><p><a href="https://www.infosecurity-magazine.com/news/scareware-arrested-after-decade-on/">Suspected Scareware Fraudster Arrested After Decade on the Run</a></p><p><a href="https://www.infosecurity-magazine.com/news/nca-nation-states-cybercrime/">NCA: Nation States Using Cybercrime Groups as Proxies</a></p><p><a href="https://www.infosecurity-magazine.com/news/scam-job-offers-target-uni-students/">Scam Job Offers Target Uni Students</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-cisa-update-secure-design/">Industry Experts Urge CISA to Update Secure by Design Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-publish-smart-device-cyber/">Biden-Harris Administration Unveils Smart Device Cyber Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/estee-lauder-breached-two/">Estee Lauder Breached by Two Ransomware Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/old-roblox-data-leak-resurfaces/">Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-enhances-cloud-logging/">Microsoft Strengthens Cloud Logging Against Nation-State Threats</a></p><p> </p><p><strong>Tweet of the Week (44:05)</strong></p><img src="https://lh6.googleusercontent.com/j2JyPUN62V9_Q3t_fJXnqYl5C22Hbc-0z1QGkq-diWxGxMPUgPqp8Z2tEcfyeS4c8uwC1qpwUrDdjKn1xyq5gnm_VVsFqB3nFRsOh7aFXr26a8hsXWliY-VluA0uEBKE1JVX7POjYI1TIAfBHhhOkIc" /><p><a href="https://twitter.com/mattjay/status/1681710314381770752">https://twitter.com/mattjay/status/1681710314381770752</a></p><img src="https://lh6.googleusercontent.com/_dL5NpdVnOz9xQ6PI0QS8yOLmjLuqwkuJL0zCBT3xh-u98wICfAsMw7PyLy09aYevqbU_sbtqIssLMQgLzH5fzEThaDmA_6jeyrwTwKaCyb0i8zUrJQDV65f6woc3O0GVE8ZRrkP7mEpPFc57b40xds" /><img src="https://lh3.googleusercontent.com/W85uuyDnbnz-LhzOW6kx6b4JTaJbef-0l88fPP06dWY05ieB2iXPCPHgQnqohNgLtIk2Dbpwt3xIKBBMVXmoxuNG0M41fNYw6VbklbywalCDq6Uk-A867-B5jIQr-coukoW2vJ0u8XI1uztrU1lI21k" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sun, 23 Jul 2023 19:10:20 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-161-the-receding-hairline-and-glasses-episode-Y5M4olWd</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:59)</strong></p><p>With content liberated from the “Today in infosec” Twitter account and further afield</p><p>18th July 2011: LulzSec hacked the Sun newspaper's website, redirecting visitors to a hoax article claiming Rupert Murdoch died after ingesting palladium.  </p><p><a href="https://www.theregister.com/2011/07/18/murdoch_sun_hacked/">Hacked Sun site greatly exaggerates Murdoch's death</a></p><p><a href="https://twitter.com/todayininfosec/status/1681469966527213568">https://twitter.com/todayininfosec/status/1681469966527213568</a></p><p> </p><p>14th July 2000: <a href="https://twitter.com/hashtag/Wireshark?src=hashtag_click">#Wireshark</a> was released</p><p>Wireshark Is 25: <a href="https://blog.wireshark.org/2023/07/wireshark-is-25/">The email that started it all and the lessons learned along the way</a></p><p> </p><p><strong>Rant of the Week (16:49)</strong></p><p><a href="https://www.engadget.com/french-assembly-passes-bill-allowing-police-to-remotely-activate-phone-cameras-and-microphones-for-surveillance-210539401.html">French Assembly passes bill allowing police to remotely activate phone cameras and microphones for surveillance</a></p><p>French law enforcement may soon have far-reaching authority to snoop on alleged criminals. Lawmakers in France's National Assembly have <a href="https://www.lemonde.fr/en/france/article/2023/07/06/france-set-to-allow-police-to-spy-through-phones_6044269_7.html">passed</a> a bill that lets police surveil suspects by remotely activating cameras, microphones and GPS location systems on phones and other devices. A judge will have to approve use of the powers, and the recently amended bill forbids use against journalists, lawyers and other "sensitive professions," according to Le Monde. The measure is also meant to limit use to serious cases, and only for a maximum of six months. Geolocation would be limited to crimes that are punishable by at least five years in prison.</p><p>An earlier version of the bill passed the Senate, but the amendment will require that legislative body's approval before it can become law.</p><p>Civil liberties advocates are alarmed. The digital rights group La Quadrature du Net previously <a href="https://www.laquadrature.net/2023/05/31/transformer-les-objets-connectes-en-mouchards-la-surenchere-securitaire-du-gouvernement/">pointed</a> out the potential for abuse. As the bill isn't clear about what constitutes a serious crime, there are fears the French government might use this to target environmental activists and others who aren't grave threats. The organization also notes that worrying security policies have a habit of expanding to less serious crimes. Genetic registration was only used for sex offenders at first, La Quadrature says, but is now being used for most crimes.</p><p> </p><p><strong>Billy Big Balls of the Week (26:37)</strong></p><p>OBITUARY Kevin David Mitnick</p><p><a href="https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668">https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668</a></p><p>Kevin David Mitnick, 59, died peacefully on Sunday, July 16, 2023, after valiantly battling pancreatic cancer for more than a year. Kevin is survived by his beloved wife, Kimberley Mitnick, who remained by his side throughout their 14-month ordeal. Kimberley is pregnant with their first child. Kevin was ecstatic about this new chapter in his and Kimberley's life together, which has now been sadly cut short.</p><p>When his desire to push boundaries led him too far astray, he landed in juvenile detention and eventually served a couple of stints in prison. His time on the FBI's Most Wanted List was well documented in his New York Times bestselling book, The Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, and his other titles: The Art of Deception, The Art of Intrusion, both co-authored with William Simon, and The Art of Invisibility with Robert Vamosi.</p><p>Kevin emerged from his final prison term, which he deemed a 'vacation,' in January 2000. He was a changed individual, and began constructing a new career, as a White Hat hacker and security consultant. He became a highly sought-after global public speaker, a writer, and established the successful Mitnick Security Consulting. In November 2011, he became the Chief Hacking Officer and part owner of security awareness training company KnowBe4, founded by close friend and business partner Stu Sjouwerman.</p><p> </p><p><strong>Industry News (36:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/it-security-pro-jailed-for/">IT Security Pro Jailed for Attempted Extortion</a></p><p><a href="https://www.infosecurity-magazine.com/news/scareware-arrested-after-decade-on/">Suspected Scareware Fraudster Arrested After Decade on the Run</a></p><p><a href="https://www.infosecurity-magazine.com/news/nca-nation-states-cybercrime/">NCA: Nation States Using Cybercrime Groups as Proxies</a></p><p><a href="https://www.infosecurity-magazine.com/news/scam-job-offers-target-uni-students/">Scam Job Offers Target Uni Students</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-cisa-update-secure-design/">Industry Experts Urge CISA to Update Secure by Design Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-publish-smart-device-cyber/">Biden-Harris Administration Unveils Smart Device Cyber Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/estee-lauder-breached-two/">Estee Lauder Breached by Two Ransomware Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/old-roblox-data-leak-resurfaces/">Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-enhances-cloud-logging/">Microsoft Strengthens Cloud Logging Against Nation-State Threats</a></p><p> </p><p><strong>Tweet of the Week (44:05)</strong></p><img src="https://lh6.googleusercontent.com/j2JyPUN62V9_Q3t_fJXnqYl5C22Hbc-0z1QGkq-diWxGxMPUgPqp8Z2tEcfyeS4c8uwC1qpwUrDdjKn1xyq5gnm_VVsFqB3nFRsOh7aFXr26a8hsXWliY-VluA0uEBKE1JVX7POjYI1TIAfBHhhOkIc" /><p><a href="https://twitter.com/mattjay/status/1681710314381770752">https://twitter.com/mattjay/status/1681710314381770752</a></p><img src="https://lh6.googleusercontent.com/_dL5NpdVnOz9xQ6PI0QS8yOLmjLuqwkuJL0zCBT3xh-u98wICfAsMw7PyLy09aYevqbU_sbtqIssLMQgLzH5fzEThaDmA_6jeyrwTwKaCyb0i8zUrJQDV65f6woc3O0GVE8ZRrkP7mEpPFc57b40xds" /><img src="https://lh3.googleusercontent.com/W85uuyDnbnz-LhzOW6kx6b4JTaJbef-0l88fPP06dWY05ieB2iXPCPHgQnqohNgLtIk2Dbpwt3xIKBBMVXmoxuNG0M41fNYw6VbklbywalCDq6Uk-A867-B5jIQr-coukoW2vJ0u8XI1uztrU1lI21k" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48911998" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0e71fb88-7461-48fa-af37-4c933d7b6361/audio/ad454887-4cae-462d-9cba-84316ae91c2e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 161 - The Receding Hairline and Glasses Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b86abbe8-7078-4f6a-9ba7-113b58c8deb3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:56</itunes:duration>
      <itunes:summary>This week in InfoSec reminisce about reporting the death of a media mogul
 
Rant of the Week is government abuse that is less “ooh la la” and more “sacre bleu!”

Billy Big Balls is about a reformed criminal
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week helps to make you feel better about yourself</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminisce about reporting the death of a media mogul
 
Rant of the Week is government abuse that is less “ooh la la” and more “sacre bleu!”

Billy Big Balls is about a reformed criminal
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week helps to make you feel better about yourself</itunes:subtitle>
      <itunes:keywords>wireshark, obituary, ester lauder, iot, kevin mitnick, smart device, snooping, the french</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>161</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7a30c93f-a8de-46b5-871a-ab1f450e54de</guid>
      <title>Episode 160 - The Lacklustre Performance Vol 2 Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>13th July 2001: <a href="https://thisdayintechhistory.com/07/13/code-red-worms-its-way-into-the-internet/">Code Red Worms its Way into the Internet</a></p><p>The <a href="http://en.wikipedia.org/wiki/Code_Red_worm">Code Red worm</a> is released onto the Internet. Targeting Microsoft’s IIS web server, Code Red had a significant effect on the Internet due to the <a href="http://www.symantec.com/connect/articles/brief-history-worm">speed and efficiency of its spread</a>. Much of this was due to the fact that IIS was often enabled by default on many installations of Windows NT and Windows 2000. However, <a href="http://www.macintouch.com/codered.html">Code Red also affected many other systems with web servers</a>, mostly by way of side-effect, exacerbating the overall impact of the worm, ensuring its place in history among the many malware outbreaks infecting Windows systems in the late 1990’s and early 2000’s.  </p><p>10th July 1995: After writing the initial version of the yet-to-be-released SSH, Tatu Ylonen emailed a request to IANA for SSH to be assigned port 22, receiving approval/assignment mere hours later.</p><p><a href="https://www.ssh.com/academy/ssh/port">https://www.ssh.com/academy/ssh/port</a></p><p><a href="https://twitter.com/todayininfosec/status/1281629953360982016">https://twitter.com/todayininfosec/status/1281629953360982016</a></p><p>]</p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/07/07/robodebt_royal_comission_report_australia/">Australia's 'great example of government using technology' found to be 'crude and cruel'. And literally lethal to citizens</a></p><p>An Australian government initiative described by the then-minister in charge as "a great example of the Government using technology" has been described by a Royal Commission as "a crude and cruel mechanism, neither fair nor legal, and it made many people feel like criminals."</p><p>The initiative came to be known as "Robodebt" – reflecting its automated matching of data sets and issuance of debt notices to welfare recipients.</p><p>But the algorithm Australia's government used to calculate the debts was based on massively and tragically incorrect assumptions.</p><p>Australians are eligible for welfare payments if their income dips below certain levels in a given two-week period. In the early 2010s, the government of the day decided to ensure that welfare recipients hadn't received more payments than they were due, with data sharing between welfare and tax agencies informing the process.</p><p>To assess whether proper payments had been made, the relevant department averaged recipients' income across a year.</p><p>Which was a huge mistake.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2023/07/13/dukaan_ai_support_replacement/">Indian developer fired 90 percent of tech support team, outsourced the job to AI</a></p><p>Here's a story from the Department of Massive and Terrifying Irony: a startup Indian software developer struggled to afford its customer support team, so outsourced it – to an AI chatbot that was more efficient and cheaper.</p><p>The developer is called <a href="https://mydukaan.io/">Dukaan</a> and offers a platform it promises allows rapid deployment of online stores.</p><p>Founder Suumit Shah <a href="https://twitter.com/suumitshah/status/1678460567000850450">took to Twitter</a> to reveal that the change to robo-service saw time to first response fall – from a minute and 44 seconds to zero. Resolution time plunged as well – from two hours and 13 minutes when humans were doing it, down to three minutes and 12 seconds with AI on the job. Overall customer support costs dropped by around 85 percent.</p><p>Shah detailed how Dukaan struggled to hire people with the skills to work as support agents. </p><p>"It's like – Lionel Messi doing a full time job at Decathlon, though the theory has some merit, but is ultimately flawed," he wrote.</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p>Industry News </p><p><a href="https://www.infosecurity-magazine.com/news/martin-lewis-deepfake-investment/">Martin Lewis Shocked at Deepfake Investment Scam Ad</a></p><p><a href="https://www.infosecurity-magazine.com/news/central-bankers-framework-securing/">Central Bankers Develop Framework For Securing Digital Currencies</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-us-data-privacy-agreement/">EU Adopts New US Data Privacy Agreement</a></p><p><a href="https://www.infosecurity-magazine.com/news/clop-moveit-adaptable-persistent/">Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/ethical-hackers-generative-ai/">Ethical Hackers Reveal How They Use Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/fewer-100-scammers-global-email/">Fewer Than 100 Scammers Responsible For Global Email Extortion</a></p><p><a href="https://www.infosecurity-magazine.com/news/white-house-plan-us-national-cyber/">White House Publishes Plan to Implement US National Cybersecurity Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-russian-gru-cyber/">Mandiant Unveils Russian GRU's Cyber Playbook Against Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/cvss-version-unveiled-cyber-threats/">New CVSS Version Unveiled Amid Rising Cyber Threats</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/-NdyeF8a99jf0byL-k9an7b0bSweAIO7SqThP-Fw-tIkMgmv4buUHIx03WYZG0oH4fvLMmWaumCc69KIMd66QIs6Jl55fbpmqymWmO72qz__9kH8ViCyEks9zrO43tlRB0gEhb9gauamZlLnC1r--T8" /><p><a href="https://twitter.com/matthew_d_green/status/1679215510951477248">https://twitter.com/matthew_d_green/status/1679215510951477248</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 Jul 2023 18:26:59 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-160-the-laclustre-performance-vol-2-episode-He8FqFSm</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>13th July 2001: <a href="https://thisdayintechhistory.com/07/13/code-red-worms-its-way-into-the-internet/">Code Red Worms its Way into the Internet</a></p><p>The <a href="http://en.wikipedia.org/wiki/Code_Red_worm">Code Red worm</a> is released onto the Internet. Targeting Microsoft’s IIS web server, Code Red had a significant effect on the Internet due to the <a href="http://www.symantec.com/connect/articles/brief-history-worm">speed and efficiency of its spread</a>. Much of this was due to the fact that IIS was often enabled by default on many installations of Windows NT and Windows 2000. However, <a href="http://www.macintouch.com/codered.html">Code Red also affected many other systems with web servers</a>, mostly by way of side-effect, exacerbating the overall impact of the worm, ensuring its place in history among the many malware outbreaks infecting Windows systems in the late 1990’s and early 2000’s.  </p><p>10th July 1995: After writing the initial version of the yet-to-be-released SSH, Tatu Ylonen emailed a request to IANA for SSH to be assigned port 22, receiving approval/assignment mere hours later.</p><p><a href="https://www.ssh.com/academy/ssh/port">https://www.ssh.com/academy/ssh/port</a></p><p><a href="https://twitter.com/todayininfosec/status/1281629953360982016">https://twitter.com/todayininfosec/status/1281629953360982016</a></p><p>]</p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/07/07/robodebt_royal_comission_report_australia/">Australia's 'great example of government using technology' found to be 'crude and cruel'. And literally lethal to citizens</a></p><p>An Australian government initiative described by the then-minister in charge as "a great example of the Government using technology" has been described by a Royal Commission as "a crude and cruel mechanism, neither fair nor legal, and it made many people feel like criminals."</p><p>The initiative came to be known as "Robodebt" – reflecting its automated matching of data sets and issuance of debt notices to welfare recipients.</p><p>But the algorithm Australia's government used to calculate the debts was based on massively and tragically incorrect assumptions.</p><p>Australians are eligible for welfare payments if their income dips below certain levels in a given two-week period. In the early 2010s, the government of the day decided to ensure that welfare recipients hadn't received more payments than they were due, with data sharing between welfare and tax agencies informing the process.</p><p>To assess whether proper payments had been made, the relevant department averaged recipients' income across a year.</p><p>Which was a huge mistake.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2023/07/13/dukaan_ai_support_replacement/">Indian developer fired 90 percent of tech support team, outsourced the job to AI</a></p><p>Here's a story from the Department of Massive and Terrifying Irony: a startup Indian software developer struggled to afford its customer support team, so outsourced it – to an AI chatbot that was more efficient and cheaper.</p><p>The developer is called <a href="https://mydukaan.io/">Dukaan</a> and offers a platform it promises allows rapid deployment of online stores.</p><p>Founder Suumit Shah <a href="https://twitter.com/suumitshah/status/1678460567000850450">took to Twitter</a> to reveal that the change to robo-service saw time to first response fall – from a minute and 44 seconds to zero. Resolution time plunged as well – from two hours and 13 minutes when humans were doing it, down to three minutes and 12 seconds with AI on the job. Overall customer support costs dropped by around 85 percent.</p><p>Shah detailed how Dukaan struggled to hire people with the skills to work as support agents. </p><p>"It's like – Lionel Messi doing a full time job at Decathlon, though the theory has some merit, but is ultimately flawed," he wrote.</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p>Industry News </p><p><a href="https://www.infosecurity-magazine.com/news/martin-lewis-deepfake-investment/">Martin Lewis Shocked at Deepfake Investment Scam Ad</a></p><p><a href="https://www.infosecurity-magazine.com/news/central-bankers-framework-securing/">Central Bankers Develop Framework For Securing Digital Currencies</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-us-data-privacy-agreement/">EU Adopts New US Data Privacy Agreement</a></p><p><a href="https://www.infosecurity-magazine.com/news/clop-moveit-adaptable-persistent/">Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/ethical-hackers-generative-ai/">Ethical Hackers Reveal How They Use Generative AI</a></p><p><a href="https://www.infosecurity-magazine.com/news/fewer-100-scammers-global-email/">Fewer Than 100 Scammers Responsible For Global Email Extortion</a></p><p><a href="https://www.infosecurity-magazine.com/news/white-house-plan-us-national-cyber/">White House Publishes Plan to Implement US National Cybersecurity Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-russian-gru-cyber/">Mandiant Unveils Russian GRU's Cyber Playbook Against Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/cvss-version-unveiled-cyber-threats/">New CVSS Version Unveiled Amid Rising Cyber Threats</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/-NdyeF8a99jf0byL-k9an7b0bSweAIO7SqThP-Fw-tIkMgmv4buUHIx03WYZG0oH4fvLMmWaumCc69KIMd66QIs6Jl55fbpmqymWmO72qz__9kH8ViCyEks9zrO43tlRB0gEhb9gauamZlLnC1r--T8" /><p><a href="https://twitter.com/matthew_d_green/status/1679215510951477248">https://twitter.com/matthew_d_green/status/1679215510951477248</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48198542" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3f115a37-ce2e-4a86-a85a-e58b35688265/audio/0acbc6af-4683-4b3d-a6e6-41e87f59f0e2/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 160 - The Lacklustre Performance Vol 2 Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8f7477a3-c6df-4791-9e12-5d497f4c9965/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:12</itunes:duration>
      <itunes:summary>This week in InfoSec is code red (literally)!
 
Rant of the Week is a great example of government using technology

Billy Big Balls is a great example of the private sector using AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week predicts the future for Twitter</itunes:summary>
      <itunes:subtitle>This week in InfoSec is code red (literally)!
 
Rant of the Week is a great example of government using technology

Billy Big Balls is a great example of the private sector using AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week predicts the future for Twitter</itunes:subtitle>
      <itunes:keywords>code red, australia, ssh, dukaan, port 22, cuck, robodebt, martin lewis, ai, clop, twitter</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>160</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f5e64ed8-3233-42d3-8b10-9dda5d2cc054</guid>
      <title>Episode 159 - The Organ Grinder Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th July 1995: <a href="https://thisdayintechhistory.com/07/06/1-2-3-ibm-buys-lotus/">Simple as 1-2-3: IBM Buys Lotus</a></p><p>IBM completes a $3.5 billion buyout of Lotus Development, the producer of the once-dominant Lotus 1-2-3 spreadsheet software and the then-popular Lotus Notes groupware. IBM had hoped to leverage Lotus 1-2-3 to challenge the increasingly demanded Microsoft Excel software, but alas, there was little slowing down the Microsoft juggernaut during the 1990’s. Lotus 1-2-3 steadily lost market share, and <a href="http://www.zdnet.com/goodbye-lotus-1-2-3-7000015385/">IBM finally announced the end of support for the software in 2013</a>.  </p><p>Lotus Notes groupware faired little better than 1-2-3, succumbing to Microsoft Exchange as the dominant groupware platform among large companies, but it remained entrenched among certain corporations for many years under the name IBM notes. <a href="https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B">In 2018 IBM sold Notes along with other software products to HCL Software for $1.8 Billion</a>. HCL still develops and supports Notes to this day with a focus on security and lower cost as a way to compete with Microsoft Exchange.</p><p> </p><p>1st July 2003: California's data breach notification law went into effect. It was the first US state to require disclosure of breaches of personal info.</p><p><a href="https://www.csub.edu/its/security/california-sb-1386">California SB 1386 - Personal Information: Privacy</a></p><p><a href="https://twitter.com/todayininfosec/status/1410750152671825925">https://twitter.com/todayininfosec/status/1410750152671825925</a></p><p> </p><p><strong>Rant of the Week (20:12)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nickelodeon-investigates-breach-after-leak-of-decades-old-data/">Nickelodeon investigates breach after leak of 'decades old’ data</a></p><p>At the end of June, a rumour emerged about a major leak from Nickelodeon's animation department. Proof of the alleged data leak started circulating on social media, showing an extensive collection of reportedly 500GB in documents and media files.</p><p>Nickelodeon has confirmed that the data leaked from an alleged breach of the company is legitimate but some of it appears to be decades old.</p><p>The data breach supposedly occurred in January this year and allegedly ended with Nickelodeon blocking the unauthorised access two months later. However, there is no reliable evidence about this..</p><p>According to some sources, all the files were leaked on a private Discord server, and many of them are being reposted elsewhere.</p><p> </p><p><strong>Billy Big Balls of the Week (28:38)</strong></p><p>Study shows 25% of kids apps violate COPPA.</p><p>The researchers at Comparitech analyzed the top four hundred children’s apps offered in Apple’s App Store and<a href="https://www.comparitech.com/blog/vpn-privacy/app-store-coppa-study/"> found</a> that one in four potentially violate the Children’s Online Privacy Protection Act (COPPA). </p><p> </p><p><strong>Industry News (37:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/croydon-council-enforcement-notice/">Croydon Council Hit With Enforcement Notice For FOI Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/companies-unprepared-darknet-data/">Report Reveals Companies Unprepared For Darknet Data Leaks</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-experts-major-concerns/">Security Experts Raise Major Concerns With Online Safety Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-commission-tweak-gdpr/">European Commission to Tweak GDPR For Cross-Border Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-nhs-ai-privacy/">UK Citizens Wary of NHS AI Use, Citing Privacy Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/nagoya-port-disruption-ransomware/">Nagoya Port Faces Disruption After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspicious-email-reports-up-a/">Suspicious Email Reports Up a Third as NCSC Hails Active Defense</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-opera1er-cybercrime/">Police Arrest Suspected OPERA1ER Cybercrime Kin</a></p><p><a href="https://www.infosecurity-magazine.com/news/human-error-cloud-data-breaches/">Human Error the Leading Cause of Cloud Data Breaches</a></p><p> </p><p><strong>Tweet of the Week (48:03)</strong></p><img src="https://lh6.googleusercontent.com/YDlo_NILDqAB9Nd-PsCF2Dv2ARo8roCKCd8cfWAGygh18jeKnjFLd8ZX1fc4dvGe-UokkLUU112OaFf8QR4nXIHgminIjSuYSNDb-V5byn7aOnH8gPGX7frOmjZsHCYIf_2mbHq-VQGsqYltTYpdBBg" /><p><a href="https://twitter.com/jason_kint/status/1676791388145430528">https://twitter.com/jason_kint/status/1676791388145430528</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 7 Jul 2023 16:23:31 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Carole Theriault, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-159-the-organ-grinder-episode-12bvjFm5</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th July 1995: <a href="https://thisdayintechhistory.com/07/06/1-2-3-ibm-buys-lotus/">Simple as 1-2-3: IBM Buys Lotus</a></p><p>IBM completes a $3.5 billion buyout of Lotus Development, the producer of the once-dominant Lotus 1-2-3 spreadsheet software and the then-popular Lotus Notes groupware. IBM had hoped to leverage Lotus 1-2-3 to challenge the increasingly demanded Microsoft Excel software, but alas, there was little slowing down the Microsoft juggernaut during the 1990’s. Lotus 1-2-3 steadily lost market share, and <a href="http://www.zdnet.com/goodbye-lotus-1-2-3-7000015385/">IBM finally announced the end of support for the software in 2013</a>.  </p><p>Lotus Notes groupware faired little better than 1-2-3, succumbing to Microsoft Exchange as the dominant groupware platform among large companies, but it remained entrenched among certain corporations for many years under the name IBM notes. <a href="https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B">In 2018 IBM sold Notes along with other software products to HCL Software for $1.8 Billion</a>. HCL still develops and supports Notes to this day with a focus on security and lower cost as a way to compete with Microsoft Exchange.</p><p> </p><p>1st July 2003: California's data breach notification law went into effect. It was the first US state to require disclosure of breaches of personal info.</p><p><a href="https://www.csub.edu/its/security/california-sb-1386">California SB 1386 - Personal Information: Privacy</a></p><p><a href="https://twitter.com/todayininfosec/status/1410750152671825925">https://twitter.com/todayininfosec/status/1410750152671825925</a></p><p> </p><p><strong>Rant of the Week (20:12)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nickelodeon-investigates-breach-after-leak-of-decades-old-data/">Nickelodeon investigates breach after leak of 'decades old’ data</a></p><p>At the end of June, a rumour emerged about a major leak from Nickelodeon's animation department. Proof of the alleged data leak started circulating on social media, showing an extensive collection of reportedly 500GB in documents and media files.</p><p>Nickelodeon has confirmed that the data leaked from an alleged breach of the company is legitimate but some of it appears to be decades old.</p><p>The data breach supposedly occurred in January this year and allegedly ended with Nickelodeon blocking the unauthorised access two months later. However, there is no reliable evidence about this..</p><p>According to some sources, all the files were leaked on a private Discord server, and many of them are being reposted elsewhere.</p><p> </p><p><strong>Billy Big Balls of the Week (28:38)</strong></p><p>Study shows 25% of kids apps violate COPPA.</p><p>The researchers at Comparitech analyzed the top four hundred children’s apps offered in Apple’s App Store and<a href="https://www.comparitech.com/blog/vpn-privacy/app-store-coppa-study/"> found</a> that one in four potentially violate the Children’s Online Privacy Protection Act (COPPA). </p><p> </p><p><strong>Industry News (37:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/croydon-council-enforcement-notice/">Croydon Council Hit With Enforcement Notice For FOI Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/companies-unprepared-darknet-data/">Report Reveals Companies Unprepared For Darknet Data Leaks</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-experts-major-concerns/">Security Experts Raise Major Concerns With Online Safety Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-commission-tweak-gdpr/">European Commission to Tweak GDPR For Cross-Border Cases</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-nhs-ai-privacy/">UK Citizens Wary of NHS AI Use, Citing Privacy Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/nagoya-port-disruption-ransomware/">Nagoya Port Faces Disruption After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspicious-email-reports-up-a/">Suspicious Email Reports Up a Third as NCSC Hails Active Defense</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-opera1er-cybercrime/">Police Arrest Suspected OPERA1ER Cybercrime Kin</a></p><p><a href="https://www.infosecurity-magazine.com/news/human-error-cloud-data-breaches/">Human Error the Leading Cause of Cloud Data Breaches</a></p><p> </p><p><strong>Tweet of the Week (48:03)</strong></p><img src="https://lh6.googleusercontent.com/YDlo_NILDqAB9Nd-PsCF2Dv2ARo8roCKCd8cfWAGygh18jeKnjFLd8ZX1fc4dvGe-UokkLUU112OaFf8QR4nXIHgminIjSuYSNDb-V5byn7aOnH8gPGX7frOmjZsHCYIf_2mbHq-VQGsqYltTYpdBBg" /><p><a href="https://twitter.com/jason_kint/status/1676791388145430528">https://twitter.com/jason_kint/status/1676791388145430528</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50386140" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c54f79a1-7937-4fbf-a9e6-793f50567811/audio/4a5bbc01-300a-4ed3-8c6d-77a306659145/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 159 - The Organ Grinder Episode</itunes:title>
      <itunes:author>Andrew Agnês, Carole Theriault, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/76626222-7214-4adc-b664-796aa6f08f14/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:29</itunes:duration>
      <itunes:summary>This week in InfoSec is as simple as 1-2-3
 
Rant of the Week looks at the data retention practices of a children’s tv channel

Billy Big Balls is a COPPA
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week says “sign me up!”</itunes:summary>
      <itunes:subtitle>This week in InfoSec is as simple as 1-2-3
 
Rant of the Week looks at the data retention practices of a children’s tv channel

Billy Big Balls is a COPPA
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week says “sign me up!”</itunes:subtitle>
      <itunes:keywords>nhs, more threads, sb1386, and threads again, ai, nickelodeon, lotus, artwork, threads, coppa</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>159</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">528fb35a-9efb-4510-a438-09bbd133a052</guid>
      <title>Episode 158 - The Highly Reviewed Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:36) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th June 1997: Communications Decency Act Declared Unconstitutional</p><p>The US Supreme Court ruled the Communications Decency Act unconstitutional on a 7-2 vote. The act, passed by both houses of Congress, sought to control the content of the Internet in an effort to keep pornography from minors. In an opinion written by Justice John Paul Stevens, the Supreme Court ruled the act a violation of free speech as guaranteed by the US Constitution.</p><p> </p><p>29th June 2007: The phone that changed everything</p><p>Nearly 6 months after it was introduced, Apple’s highly-anticipated <a href="http://en.wikipedia.org/wiki/IPhone_(original)">iPhone</a> goes on sale. Generally downplayed by Old Word Technology pundits after its introduction, the iPhone was greeted by long lines of buyers around the country on that first day. Quickly becoming an overnight phenomenon, one million iPhones were sold in only 74 days. Since those early days, the ensuing iPhone models have continued to set sales records and have completely changed not only the smartphone and technology industries, but the world as well.</p><p> </p><p><strong>Rant of the Week (19:19)</strong></p><p><a href="https://www.theregister.com/2023/06/27/letmespy_stalkerware_app_hacked/">Miscreants leak texts and info siphoned by Android stalkerware app LetMeSpy</a></p><p>It's bad enough there's some Android stalkerware out there with the not-at-all-creepy moniker LetMeSpy. Now someone's got hold of the information the app collects – such as victims' text messages and call logs – as well as the email addresses of those who sought out the software, and leaked it all.</p><p>The stolen data has been circulating online for at least a few days, we're told, and the spyware's users – those who got the app to put on someone else's device – reportedly include government workers and a ton of US college students.</p><p>The Polish developer of the app said the information was swiped in a "security incident" that happened on June 21, when someone obtained "unauthorised access" to its website's databases.</p><p>Yes, we appreciate the irony of the maker of a phone-monitoring app that boasts about secretly collecting call logs, text messages, and whereabouts while remaining "invisible to the user" admitting that someone else gained unauthorised access to their information.</p><p> </p><p><strong>Billy Big Balls of the Week (28:33)</strong></p><p><a href="https://www.theregister.com/2023/06/29/russian_facct_employee_extradiation/">Network security guy in extradition tug of war between US and Russia</a></p><p>A Russian network security specialist and former editor of Hacker magazine who is wanted by the US and Russia on cybercrime charges has been detained in Kazakhstan as the two governments seek his extradition.</p><p>Nikita Kislitsin, an employee of Russian infosec shop FACCT, was detained on June 22 at the request of the US, according to a statement by his employer.</p><p>"According to the information we have, the claims against Kislitsin are not related to his work at FACCT, but are related to a case more than ten years ago when Nikita worked as a journalist and independent researcher," the <a href="https://www.facct.ru/media-center/press-releases/zayavlenie-kompanii-otnositelno-zaderzhaniya-nikity-kislitsina/">statement</a> reads.</p><p>"We are convinced that there are no legal grounds for detention on the territory of Kazakhstan."</p><p>FACCT is not under investigation and has not been charged with any wrongdoing, the org added. It has has hired lawyers to defend Kislitsin, and has also sent an appeal to the Consulate General of the Russian Federation in Kazakhstan "to assist in protecting our employee," according to the statement.</p><p> </p><p><strong>Industry News (34:27) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/are-gpt-models-the-right-fit-for/">Are GPT-Based Models the Right Fit for AI-Powered Cybersecurity?</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-uk-banks-exposing-customers/">Over Half of UK Banks Are Exposing Customers to Email Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/submarine-cables-risk-cyber-attacks/">Submarine Cables at Growing Risk of Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/hack-american-southwest-airlines/">Third-Party Vendor Hack Exposes Data at American, Southwest Airlines</a></p><p><a href="https://www.infosecurity-magazine.com/news/encrochat-bust-leads-to-6500/">EncroChat Bust Leads to 6500 Arrests in Three Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/vpn-rdp-exploitation-common-attack/">VPN and RDP Exploitation the Most Common Attack Technique</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-dominates-ransomware-1/">LockBit Dominates Ransomware World, New Report Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/charming-kittens-powerstar-malware/">Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques</a></p><p><a href="https://www.infosecurity-magazine.com/news/mit-framework-evaluate/">MIT Publishes Framework to Evaluate Cybersecurity Methods</a></p><p> </p><p><strong>Tweet of the Week (43:14)</strong></p><img src="https://lh4.googleusercontent.com/1pvK1xaJ_l-lLWUE0Jn-1u8DzIYZB6v70fLgvg_PwKUya0qoaZreIMaayzZ2RPbSqseJGtSbh3aoKWB3sLffEnRlcnarFcvaqCd-vitJKi3GhPPY1JZFUVUant122L4rBWaQndtYi7qOXmhEBj_g1Mc" /><p><a href="https://twitter.com/UK_Daniel_Card/status/1674094965348073474">https://twitter.com/UK_Daniel_Card/status/1674094965348073474</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 Jun 2023 12:16:57 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-158-the-highly-reviewed-episode-oN1_9EKX</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:36) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th June 1997: Communications Decency Act Declared Unconstitutional</p><p>The US Supreme Court ruled the Communications Decency Act unconstitutional on a 7-2 vote. The act, passed by both houses of Congress, sought to control the content of the Internet in an effort to keep pornography from minors. In an opinion written by Justice John Paul Stevens, the Supreme Court ruled the act a violation of free speech as guaranteed by the US Constitution.</p><p> </p><p>29th June 2007: The phone that changed everything</p><p>Nearly 6 months after it was introduced, Apple’s highly-anticipated <a href="http://en.wikipedia.org/wiki/IPhone_(original)">iPhone</a> goes on sale. Generally downplayed by Old Word Technology pundits after its introduction, the iPhone was greeted by long lines of buyers around the country on that first day. Quickly becoming an overnight phenomenon, one million iPhones were sold in only 74 days. Since those early days, the ensuing iPhone models have continued to set sales records and have completely changed not only the smartphone and technology industries, but the world as well.</p><p> </p><p><strong>Rant of the Week (19:19)</strong></p><p><a href="https://www.theregister.com/2023/06/27/letmespy_stalkerware_app_hacked/">Miscreants leak texts and info siphoned by Android stalkerware app LetMeSpy</a></p><p>It's bad enough there's some Android stalkerware out there with the not-at-all-creepy moniker LetMeSpy. Now someone's got hold of the information the app collects – such as victims' text messages and call logs – as well as the email addresses of those who sought out the software, and leaked it all.</p><p>The stolen data has been circulating online for at least a few days, we're told, and the spyware's users – those who got the app to put on someone else's device – reportedly include government workers and a ton of US college students.</p><p>The Polish developer of the app said the information was swiped in a "security incident" that happened on June 21, when someone obtained "unauthorised access" to its website's databases.</p><p>Yes, we appreciate the irony of the maker of a phone-monitoring app that boasts about secretly collecting call logs, text messages, and whereabouts while remaining "invisible to the user" admitting that someone else gained unauthorised access to their information.</p><p> </p><p><strong>Billy Big Balls of the Week (28:33)</strong></p><p><a href="https://www.theregister.com/2023/06/29/russian_facct_employee_extradiation/">Network security guy in extradition tug of war between US and Russia</a></p><p>A Russian network security specialist and former editor of Hacker magazine who is wanted by the US and Russia on cybercrime charges has been detained in Kazakhstan as the two governments seek his extradition.</p><p>Nikita Kislitsin, an employee of Russian infosec shop FACCT, was detained on June 22 at the request of the US, according to a statement by his employer.</p><p>"According to the information we have, the claims against Kislitsin are not related to his work at FACCT, but are related to a case more than ten years ago when Nikita worked as a journalist and independent researcher," the <a href="https://www.facct.ru/media-center/press-releases/zayavlenie-kompanii-otnositelno-zaderzhaniya-nikity-kislitsina/">statement</a> reads.</p><p>"We are convinced that there are no legal grounds for detention on the territory of Kazakhstan."</p><p>FACCT is not under investigation and has not been charged with any wrongdoing, the org added. It has has hired lawyers to defend Kislitsin, and has also sent an appeal to the Consulate General of the Russian Federation in Kazakhstan "to assist in protecting our employee," according to the statement.</p><p> </p><p><strong>Industry News (34:27) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/are-gpt-models-the-right-fit-for/">Are GPT-Based Models the Right Fit for AI-Powered Cybersecurity?</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-uk-banks-exposing-customers/">Over Half of UK Banks Are Exposing Customers to Email Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/submarine-cables-risk-cyber-attacks/">Submarine Cables at Growing Risk of Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/hack-american-southwest-airlines/">Third-Party Vendor Hack Exposes Data at American, Southwest Airlines</a></p><p><a href="https://www.infosecurity-magazine.com/news/encrochat-bust-leads-to-6500/">EncroChat Bust Leads to 6500 Arrests in Three Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/vpn-rdp-exploitation-common-attack/">VPN and RDP Exploitation the Most Common Attack Technique</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-dominates-ransomware-1/">LockBit Dominates Ransomware World, New Report Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/charming-kittens-powerstar-malware/">Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques</a></p><p><a href="https://www.infosecurity-magazine.com/news/mit-framework-evaluate/">MIT Publishes Framework to Evaluate Cybersecurity Methods</a></p><p> </p><p><strong>Tweet of the Week (43:14)</strong></p><img src="https://lh4.googleusercontent.com/1pvK1xaJ_l-lLWUE0Jn-1u8DzIYZB6v70fLgvg_PwKUya0qoaZreIMaayzZ2RPbSqseJGtSbh3aoKWB3sLffEnRlcnarFcvaqCd-vitJKi3GhPPY1JZFUVUant122L4rBWaQndtYi7qOXmhEBj_g1Mc" /><p><a href="https://twitter.com/UK_Daniel_Card/status/1674094965348073474">https://twitter.com/UK_Daniel_Card/status/1674094965348073474</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47342561" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/b94e9d88-f053-4f47-a10b-10cd12181509/audio/c81cb157-d011-49c3-8d00-eedb1d3da7c7/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 158 - The Highly Reviewed Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5f66a949-eb48-47d0-88c9-5b02aeb77abe/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:18</itunes:duration>
      <itunes:summary>This week in InfoSec thanks the first amendment for easily accessible porn
 
Rant of the Week Is a pot calling the kettle black

Billy Big Balls is a US vs Russia tug of war
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Asks the value of a lock screen </itunes:summary>
      <itunes:subtitle>This week in InfoSec thanks the first amendment for easily accessible porn
 
Rant of the Week Is a pot calling the kettle black

Billy Big Balls is a US vs Russia tug of war
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Asks the value of a lock screen </itunes:subtitle>
      <itunes:keywords>iphone, dmarc, chat-gpt, facct, mxtoolbox.com, tim cook, free porn, frameworks, letmespy, lockscreen, extradition</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">96912fae-2ab2-466b-8168-c9eebd28dd94</guid>
      <title>Episode 157 - The Special Guest Star Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (10:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th June 1997: A group of users organised over the Internet cracked the <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">Data Encryption Standard</a> — the strongest legally exportable encryption software in the United States to that point — after only five months of work. The United States at the time banned the export of stronger encryption software out of fear that it would be used by terrorists, but companies designing the software claimed such restrictions were worthless because foreign countries offer much stronger programs. The US eventually relaxed certain restrictions but to this day still claims to exert authority over encryption technologies under the commerce clause. </p><p>17th June 1983: The movie "Superman III" was released. Gus Gorman lands a data entry job at Webscoe Industries, hacks into its computer systems, and funnels all of the half-cents into his next check, accruing $85,789.90. This type of crime would later be named "salami slicing".</p><p><a href="https://twitter.com/todayininfosec/status/1405615484091916294">https://twitter.com/todayininfosec/status/1405615484091916294</a></p><p> </p><p><strong>Rant of the Week (15:16)</strong></p><p><a href="https://www.theregister.com/2023/06/21/dna_testing_company_ftc_complaint/">FTC accuses DNA testing company of lying about dumping samples</a></p><p>The Federal Trade Commission has alleged that genetic testing firm 1Health.io, also known as Vitagene, deceived people when it said it would dispose of their physical DNA sample as well as their collected health data.</p><p>To make matters worse, the FTC also alleged in a consent order made public last week that the company didn't secure the information properly, and further, that it changed its privacy policy retroactively without properly notifying or getting consent from people whose data the company had already collected – people who had signed a different, earlier version of the policy.</p><p>Under the proposed settlement, Vitagene/1Health.io will have to sharpen its data protection practices and put into place procedures to keep them sharp, as well as a pay a fine. The company has neither admitted nor denied any of the allegations.</p><p> </p><p><strong>Billy Big Balls of the Week  (24:29)</strong></p><p><a href="https://www.theregister.com/2023/06/20/reddit_confirms_blackcat_extortion_attempt/">Reddit confirms BlackCat gang pinched some data</a></p><p>Reddit this week confirmed ransomware gang BlackCat, aka AlphaV, broke into its corporate systems in February.</p><p>The crew just the other day had bragged it stole 80GB from the biz, and had demanded the social media company pay $4.5 million to keep a lid on the data as well as ditch its controversial API pricing changes.</p><p>A spokesperson for Reddit declined to comment on BlackCat's specific boasts, and insisted it's not the result of a fresh intrusion. The theft happened a few months ago, and was the result of a "<a href="https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/">sophisticated phishing campaign</a>" against its staff that Reddit said it encountered on February 5 and disclosed on February 9. </p><p>See also: <a href="https://www.theverge.com/2023/6/19/23765895/reddit-hack-phishing-leak-api-pricing-steve-huffman">Reddit hackers demand $4.5 million ransom and API pricing changes</a></p><p> </p><p><strong>Industry News  (31:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-offers-10m-reward-for-moveit/">US Offers $10m Reward For MOVEit Attackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/smart-pet-feeders-expose-personal/">Smart Pet Feeders Expose Personal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-spyware-implant-triangledb/">Security Researchers Uncover New Spyware Implant TriangleDB</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-immune-system-of-the/">#InfosecurityEurope: Hackers Are the Immune System of the Digital Age</a></p><p><a href="https://www.infosecurity-magazine.com/news/think-creatively-to-combat-skills/">#InfosecurityEurope: It’s Time to Think Creatively to Combat Skills Shortages</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosecurity-drone-industry/">#InfosecurityEurope: Drones Contain Over 156 Different Cyber Threats, Angoka Research Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/redeyes-group-targets-individuals/">RedEyes Group Targets Individuals with Wiretapping Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-launches-new-security-cyber/">US Justice Department Launches New National Security Cyber Section</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-addresses-exploited-flaws-in/">Apple Addresses Exploited Security Flaws in iOS, macOS and Safari</a></p><p> </p><p><strong>Tweet of the Week (41:36)</strong></p><img src="https://lh4.googleusercontent.com/tAImNxgjAZTH9zrNtPvGAkcIfgn27fU1aAiF-C2qTnWYloN45Dr2iZ24lLToaOVaT3GwS2mYjO5Z4dwtAHJ13FGbgEpkfUp_QOHjC8mizOwDl92DsHsX24X0FLRmKbGqvEljPpybT_mekJimFFmUnbE" /><p><a href="https://twitter.com/tarah/status/1671691691965939712">https://twitter.com/tarah/status/1671691691965939712</a></p><p>----</p><p>Back up story: <a href="https://www.theverge.com/2023/6/21/23769263/mark-zuckerberg-elon-musk-fight-cage-match-worldstar">Mark Zuckerberg is ready to fight Elon Musk in a cage match</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 23 Jun 2023 15:07:55 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-167-the-special-guest-star-episode-gC87Aktp</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (10:26)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th June 1997: A group of users organised over the Internet cracked the <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">Data Encryption Standard</a> — the strongest legally exportable encryption software in the United States to that point — after only five months of work. The United States at the time banned the export of stronger encryption software out of fear that it would be used by terrorists, but companies designing the software claimed such restrictions were worthless because foreign countries offer much stronger programs. The US eventually relaxed certain restrictions but to this day still claims to exert authority over encryption technologies under the commerce clause. </p><p>17th June 1983: The movie "Superman III" was released. Gus Gorman lands a data entry job at Webscoe Industries, hacks into its computer systems, and funnels all of the half-cents into his next check, accruing $85,789.90. This type of crime would later be named "salami slicing".</p><p><a href="https://twitter.com/todayininfosec/status/1405615484091916294">https://twitter.com/todayininfosec/status/1405615484091916294</a></p><p> </p><p><strong>Rant of the Week (15:16)</strong></p><p><a href="https://www.theregister.com/2023/06/21/dna_testing_company_ftc_complaint/">FTC accuses DNA testing company of lying about dumping samples</a></p><p>The Federal Trade Commission has alleged that genetic testing firm 1Health.io, also known as Vitagene, deceived people when it said it would dispose of their physical DNA sample as well as their collected health data.</p><p>To make matters worse, the FTC also alleged in a consent order made public last week that the company didn't secure the information properly, and further, that it changed its privacy policy retroactively without properly notifying or getting consent from people whose data the company had already collected – people who had signed a different, earlier version of the policy.</p><p>Under the proposed settlement, Vitagene/1Health.io will have to sharpen its data protection practices and put into place procedures to keep them sharp, as well as a pay a fine. The company has neither admitted nor denied any of the allegations.</p><p> </p><p><strong>Billy Big Balls of the Week  (24:29)</strong></p><p><a href="https://www.theregister.com/2023/06/20/reddit_confirms_blackcat_extortion_attempt/">Reddit confirms BlackCat gang pinched some data</a></p><p>Reddit this week confirmed ransomware gang BlackCat, aka AlphaV, broke into its corporate systems in February.</p><p>The crew just the other day had bragged it stole 80GB from the biz, and had demanded the social media company pay $4.5 million to keep a lid on the data as well as ditch its controversial API pricing changes.</p><p>A spokesperson for Reddit declined to comment on BlackCat's specific boasts, and insisted it's not the result of a fresh intrusion. The theft happened a few months ago, and was the result of a "<a href="https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/">sophisticated phishing campaign</a>" against its staff that Reddit said it encountered on February 5 and disclosed on February 9. </p><p>See also: <a href="https://www.theverge.com/2023/6/19/23765895/reddit-hack-phishing-leak-api-pricing-steve-huffman">Reddit hackers demand $4.5 million ransom and API pricing changes</a></p><p> </p><p><strong>Industry News  (31:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-offers-10m-reward-for-moveit/">US Offers $10m Reward For MOVEit Attackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/smart-pet-feeders-expose-personal/">Smart Pet Feeders Expose Personal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-spyware-implant-triangledb/">Security Researchers Uncover New Spyware Implant TriangleDB</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-immune-system-of-the/">#InfosecurityEurope: Hackers Are the Immune System of the Digital Age</a></p><p><a href="https://www.infosecurity-magazine.com/news/think-creatively-to-combat-skills/">#InfosecurityEurope: It’s Time to Think Creatively to Combat Skills Shortages</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosecurity-drone-industry/">#InfosecurityEurope: Drones Contain Over 156 Different Cyber Threats, Angoka Research Finds</a></p><p><a href="https://www.infosecurity-magazine.com/news/redeyes-group-targets-individuals/">RedEyes Group Targets Individuals with Wiretapping Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-launches-new-security-cyber/">US Justice Department Launches New National Security Cyber Section</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-addresses-exploited-flaws-in/">Apple Addresses Exploited Security Flaws in iOS, macOS and Safari</a></p><p> </p><p><strong>Tweet of the Week (41:36)</strong></p><img src="https://lh4.googleusercontent.com/tAImNxgjAZTH9zrNtPvGAkcIfgn27fU1aAiF-C2qTnWYloN45Dr2iZ24lLToaOVaT3GwS2mYjO5Z4dwtAHJ13FGbgEpkfUp_QOHjC8mizOwDl92DsHsX24X0FLRmKbGqvEljPpybT_mekJimFFmUnbE" /><p><a href="https://twitter.com/tarah/status/1671691691965939712">https://twitter.com/tarah/status/1671691691965939712</a></p><p>----</p><p>Back up story: <a href="https://www.theverge.com/2023/6/21/23769263/mark-zuckerberg-elon-musk-fight-cage-match-worldstar">Mark Zuckerberg is ready to fight Elon Musk in a cage match</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44489154" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/02ba0c80-a091-4ef9-a022-c2dc2c66b5ce/audio/dcfb67fe-6edc-4389-9b1b-8d57ad3bfae9/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 157 - The Special Guest Star Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e5dff88b-6da4-4046-924f-a11bcd04e57c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:20</itunes:duration>
      <itunes:summary>This week in InfoSec tells the tale of DES’s dastardly demise
 
Rant of the Week Is another slap on the wrist for losing your spit

Billy Big Balls show Reddit’s woes are continuing
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Is a story of layers (and possible cages)</itunes:summary>
      <itunes:subtitle>This week in InfoSec tells the tale of DES’s dastardly demise
 
Rant of the Week Is another slap on the wrist for losing your spit

Billy Big Balls show Reddit’s woes are continuing
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Is a story of layers (and possible cages)</itunes:subtitle>
      <itunes:keywords>1health.io, cagefight, drones, api, blackcat, infosecurityeurope, reddit, des, vitagene, gus gorman, privacy, superman 3</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>157</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">73c336be-1379-4d53-bb68-e259ed9e0a14</guid>
      <title>Episode 156 - The Smashing Security Takeover Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (12:01) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th June 1989: Callers to a Florida probation office were connected to a phone sex line. Southern Bell officials said it was the first time their switching equipment had been reprogrammed by a hacker. </p><p><a href="http://phrack.org/issues/27/12.html#article">Phrack #27</a></p><p><a href="https://twitter.com/todayininfosec/status/1668417281112637441">https://twitter.com/todayininfosec/status/1668417281112637441</a></p><p>15th June 2004: The first mobile phone virus, Cabir, was discovered. It infected devices running the Symbian OS and spread via Bluetooth. 68% of you are thinking "Symbian OS? Never heard of it." </p><p>Learn how it got its name and how it spread in a stadium in Finland:</p><p><a href="https://eugene.kaspersky.com/2014/06/15/10-years-since-the-first-smartphone-malware-to-the-minute/">First smartphone malware</a></p><p><a href="https://twitter.com/todayininfosec/status/1669380905662545921">https://twitter.com/todayininfosec/status/1669380905662545921</a></p><p> </p><p><strong>Rant of the Week (21:09)</strong></p><p><a href="https://www.theregister.com/2023/06/14/capita_city_of_london_fraud_reporting_service_contract/">Capita wins £50M fraud reporting contract with City of London cops</a></p><p>Capita, which is still dealing with a digital break-in that exposed customers' data to criminals, has scored a £50 million contract with the City of London police to run contact and engagement services for the force's fraud reporting service.</p><p>The five-year agreement kicks off in 2024 and the territorial cops responsible for law enforcement in the financial district of the capital (aka the "square mile," – the Met looks after Greater London) have an option to extend it for a further two years, should they wish to do so.</p><p>The work will see Capita provide an "end-to-end customer management process" to potential victims of fraud when they contract the service. The current iteration receives upwards of 350,000 calls and 2.3m unique visits to the website annually.</p><p>In a statement, Capita pledged to "deploy" its "customer experience model for identifying, managing and monitoring customers using data and specialist coaching to support potential victims of crime."</p><p><a href="https://www.theregister.com/2023/06/16/breton_calls_for_eu_huawei_bans/">EU boss Breton: There's no Huawei that Chinese comms kit is safe to use in Europe</a></p><p>European Commission's own networks to toss Middle Kingdom boxes amid calls for total replacement</p><p>European commissioner Thierry Breton wants Huawei and ZTE barred throughout the EU, and revealed plans to remove kit made by the Chinese telecom vendors from the Commission's internal networks.</p><p>"We cannot afford to maintain critical dependencies that could become a weapon against our interests," he declared in a Thursday <a href="https://ec.europa.eu/commission/presscorner/detail/en/speech_23_3314">speech</a>.</p><p>The Chinese vendors' presence in foreign networks has been a point of concern for years. </p><p>There are concerns that <a href="https://www.theregister.com/2020/02/12/us_huawei_backdoor/">backdoors in Huawei equipment</a> could allow China to spy on foreign nations, given Chinese law requires local businesses to share info with Beijing. However, </p><p>Huawei has repeatedly rejected the claims of backdoors, insisted it follows the law of the land wherever it operates, and denied that Chinese laws would see it sell out customers.</p><p>Those protestations haven't stopped the US, UK, and at least ten EU countries from banning the manufacturer's kit from their networks. ZTE has also run afoul of regulators.</p><p> </p><p><strong>Billy Big Balls of the Week (32:17)</strong></p><p><a href="https://www.theguardian.com/us-news/2023/jun/14/ai-kidnapping-scam-senate-hearing-jennifer-destefano">US mother gets call from ‘kidnapped daughter’ – but it’s really an AI scam</a></p><p>After being scammed into thinking her daughter was kidnapped, an <a href="https://www.theguardian.com/us-news/arizona">Arizona</a> woman testified in the US Senate about the dangerous side of artificial intelligence technology when in the hands of criminals.</p><p>Jennifer DeStefano told the Senate judiciary committee about the fear she felt when she received an ominous phone call on a Friday last April.</p><p>Thinking the unknown number was a doctor’s office, she answered the phone just before 5pm on the final ring. On the other end of the line was her 15-year-old daughter – or at least what sounded exactly like her daughter’s voice.</p><p> </p><p><strong>Industry News (42:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-deal-personal-data/">Data Flows Between UK and US to be Simplified Under New Agreement</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcom-latest-moveit-victim-exploit/">Ofcom Latest MOVEit Victim as Exploit Code Released</a></p><p>G<a href="https://www.infosecurity-magazine.com/news/microsoft-pays-20m-settle-ftc/">Microsoft Pays $20m to Settle Another FTC COPPA Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/no-zerodays-pgm-flaws-patch/">No Zero-Days but PGM Flaws Cause Patch Tuesday Concern</a></p><p><a href="https://www.infosecurity-magazine.com/news/mfa-bypass-account-million-monthly/">MFA Bypass Kits Account For One Million Monthly Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-metaverse-and-ai/">Europol Warns of Metaverse and AI Terror Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-passes-landmark-ai-act/">EU Passes Landmark Artificial Intelligence Act</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-distribute-fake-exploits/">Malicious Actors Exploit GitHub to Distribute Fake Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-makes-91m-us-victims-two/">LockBit Makes $91m From US Victims in Two Years</a></p><p> </p><p><strong>Tweet of the Week (50:49)</strong></p><img src="https://lh4.googleusercontent.com/kUTh0nHB2Ala1Kyx9XcjPPdu87L8F1-U4a1O1SmvViyP6ijiHHc20Np8W_Ye3gxZ6WspfcrMGfzgbQOem_9S6ES9G2AFowePp7USwlsaXOOwWcnZtiRVKi6YDIWxMXDfkoloFnTGY3wPLEKI3n8UlxQ" /><p><a href="https://twitter.com/InfoSecSherpa/status/1062036305146724354">https://twitter.com/InfoSecSherpa/status/1062036305146724354</a></p><img src="https://lh3.googleusercontent.com/WHx59EDogkOSYql5yK3w6Od60SvEjxr4Aguln35MKGm2VpTqK9E19xykYJyVMPfrxue2-M6fynmnJ7GW67IgFyMMiiQUgSHQ6sijBhEJXJcBMv4u1QAkfQ4JEHpf21p8tMeGogE_Quz2eroFhUhwoIc" /><p><a href="https://twitter.com/fesshole/status/1662495137992175617">https://twitter.com/fesshole/status/1662495137992175617</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Jun 2023 16:29:13 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Graham Cluley)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-156-the-smashing-security-takeover-episode-Pyem_AMU</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (12:01) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th June 1989: Callers to a Florida probation office were connected to a phone sex line. Southern Bell officials said it was the first time their switching equipment had been reprogrammed by a hacker. </p><p><a href="http://phrack.org/issues/27/12.html#article">Phrack #27</a></p><p><a href="https://twitter.com/todayininfosec/status/1668417281112637441">https://twitter.com/todayininfosec/status/1668417281112637441</a></p><p>15th June 2004: The first mobile phone virus, Cabir, was discovered. It infected devices running the Symbian OS and spread via Bluetooth. 68% of you are thinking "Symbian OS? Never heard of it." </p><p>Learn how it got its name and how it spread in a stadium in Finland:</p><p><a href="https://eugene.kaspersky.com/2014/06/15/10-years-since-the-first-smartphone-malware-to-the-minute/">First smartphone malware</a></p><p><a href="https://twitter.com/todayininfosec/status/1669380905662545921">https://twitter.com/todayininfosec/status/1669380905662545921</a></p><p> </p><p><strong>Rant of the Week (21:09)</strong></p><p><a href="https://www.theregister.com/2023/06/14/capita_city_of_london_fraud_reporting_service_contract/">Capita wins £50M fraud reporting contract with City of London cops</a></p><p>Capita, which is still dealing with a digital break-in that exposed customers' data to criminals, has scored a £50 million contract with the City of London police to run contact and engagement services for the force's fraud reporting service.</p><p>The five-year agreement kicks off in 2024 and the territorial cops responsible for law enforcement in the financial district of the capital (aka the "square mile," – the Met looks after Greater London) have an option to extend it for a further two years, should they wish to do so.</p><p>The work will see Capita provide an "end-to-end customer management process" to potential victims of fraud when they contract the service. The current iteration receives upwards of 350,000 calls and 2.3m unique visits to the website annually.</p><p>In a statement, Capita pledged to "deploy" its "customer experience model for identifying, managing and monitoring customers using data and specialist coaching to support potential victims of crime."</p><p><a href="https://www.theregister.com/2023/06/16/breton_calls_for_eu_huawei_bans/">EU boss Breton: There's no Huawei that Chinese comms kit is safe to use in Europe</a></p><p>European Commission's own networks to toss Middle Kingdom boxes amid calls for total replacement</p><p>European commissioner Thierry Breton wants Huawei and ZTE barred throughout the EU, and revealed plans to remove kit made by the Chinese telecom vendors from the Commission's internal networks.</p><p>"We cannot afford to maintain critical dependencies that could become a weapon against our interests," he declared in a Thursday <a href="https://ec.europa.eu/commission/presscorner/detail/en/speech_23_3314">speech</a>.</p><p>The Chinese vendors' presence in foreign networks has been a point of concern for years. </p><p>There are concerns that <a href="https://www.theregister.com/2020/02/12/us_huawei_backdoor/">backdoors in Huawei equipment</a> could allow China to spy on foreign nations, given Chinese law requires local businesses to share info with Beijing. However, </p><p>Huawei has repeatedly rejected the claims of backdoors, insisted it follows the law of the land wherever it operates, and denied that Chinese laws would see it sell out customers.</p><p>Those protestations haven't stopped the US, UK, and at least ten EU countries from banning the manufacturer's kit from their networks. ZTE has also run afoul of regulators.</p><p> </p><p><strong>Billy Big Balls of the Week (32:17)</strong></p><p><a href="https://www.theguardian.com/us-news/2023/jun/14/ai-kidnapping-scam-senate-hearing-jennifer-destefano">US mother gets call from ‘kidnapped daughter’ – but it’s really an AI scam</a></p><p>After being scammed into thinking her daughter was kidnapped, an <a href="https://www.theguardian.com/us-news/arizona">Arizona</a> woman testified in the US Senate about the dangerous side of artificial intelligence technology when in the hands of criminals.</p><p>Jennifer DeStefano told the Senate judiciary committee about the fear she felt when she received an ominous phone call on a Friday last April.</p><p>Thinking the unknown number was a doctor’s office, she answered the phone just before 5pm on the final ring. On the other end of the line was her 15-year-old daughter – or at least what sounded exactly like her daughter’s voice.</p><p> </p><p><strong>Industry News (42:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-us-deal-personal-data/">Data Flows Between UK and US to be Simplified Under New Agreement</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcom-latest-moveit-victim-exploit/">Ofcom Latest MOVEit Victim as Exploit Code Released</a></p><p>G<a href="https://www.infosecurity-magazine.com/news/microsoft-pays-20m-settle-ftc/">Microsoft Pays $20m to Settle Another FTC COPPA Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/no-zerodays-pgm-flaws-patch/">No Zero-Days but PGM Flaws Cause Patch Tuesday Concern</a></p><p><a href="https://www.infosecurity-magazine.com/news/mfa-bypass-account-million-monthly/">MFA Bypass Kits Account For One Million Monthly Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-metaverse-and-ai/">Europol Warns of Metaverse and AI Terror Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-passes-landmark-ai-act/">EU Passes Landmark Artificial Intelligence Act</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-distribute-fake-exploits/">Malicious Actors Exploit GitHub to Distribute Fake Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-makes-91m-us-victims-two/">LockBit Makes $91m From US Victims in Two Years</a></p><p> </p><p><strong>Tweet of the Week (50:49)</strong></p><img src="https://lh4.googleusercontent.com/kUTh0nHB2Ala1Kyx9XcjPPdu87L8F1-U4a1O1SmvViyP6ijiHHc20Np8W_Ye3gxZ6WspfcrMGfzgbQOem_9S6ES9G2AFowePp7USwlsaXOOwWcnZtiRVKi6YDIWxMXDfkoloFnTGY3wPLEKI3n8UlxQ" /><p><a href="https://twitter.com/InfoSecSherpa/status/1062036305146724354">https://twitter.com/InfoSecSherpa/status/1062036305146724354</a></p><img src="https://lh3.googleusercontent.com/WHx59EDogkOSYql5yK3w6Od60SvEjxr4Aguln35MKGm2VpTqK9E19xykYJyVMPfrxue2-M6fynmnJ7GW67IgFyMMiiQUgSHQ6sijBhEJXJcBMv4u1QAkfQ4JEHpf21p8tMeGogE_Quz2eroFhUhwoIc" /><p><a href="https://twitter.com/fesshole/status/1662495137992175617">https://twitter.com/fesshole/status/1662495137992175617</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53881533" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/b227a31f-1a0e-462f-bfe2-eaac4dcf1e87/audio/78d7f21e-1238-4cf6-97bf-1e7b4cd88e8a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 156 - The Smashing Security Takeover Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Graham Cluley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7d8c74ae-e755-4c54-ac96-38616125482e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:07</itunes:duration>
      <itunes:summary>This week in InfoSec asks Graham to educate us on the first mobile phone virus
 
Rant of the Week proves that getting hacked doesn’t necessarily lose you business

Billy Big Balls is another use for AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the greatest phishing campaign idea</itunes:summary>
      <itunes:subtitle>This week in InfoSec asks Graham to educate us on the first mobile phone virus
 
Rant of the Week proves that getting hacked doesn’t necessarily lose you business

Billy Big Balls is another use for AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the greatest phishing campaign idea</itunes:subtitle>
      <itunes:keywords>tesco bank, capita, panty lady, southern bell, phishing, thierry breton, laughologist, city of london police, symbian, zte, cabir, huaweii</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>156</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2114d91a-b847-48a0-8103-cb2586d5d6e2</guid>
      <title>Episode 155 - The Really Late Show</title>
      <description><![CDATA[<p><strong>This week in InfoSec (10:21)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th June 1989: The beta release of the Bourne Again SHell (Bash) was announced as version 0.99. 2 months later Shellshock was introduced into the Bash source code and persisted in subsequent versions for over 25 years.</p><p>v0.99 release <a href="https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1">announcement</a></p><p><a href="https://twitter.com/todayininfosec/status/1666487525320318988">https://twitter.com/todayininfosec/status/1666487525320318988</a></p><p>3rd June 1983: <a href="https://thisdayintechhistory.com/06/03/would-you-like-to-play-a-game/">Would You Like to Play a Game?</a></p><p>The science fiction film <a href="http://en.wikipedia.org/wiki/WarGames">WarGames</a> is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. </p><p>Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.</p><p> </p><p><strong>Rant of the Week (17:16)</strong></p><p><a href="https://krebsonsecurity.com/2023/06/barracuda-urges-replacing-not-patching-its-email-security-gateways/">Barracuda Urges Replacing — Not Patching — Its Email Security Gateways</a></p><p>It’s not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware — as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely updated with software fixes.</p><p><a href="https://www.theregister.com/2023/06/08/barracuda_immediately_replace_esg/">Barracuda tells its ESG owners to 'immediately' junk buggy kit</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:45)</strong></p><p><a href="https://www.theregister.com/2023/06/06/us_contractors_tiktok_ban/">US govt now bans TikTok from contractors' work gear</a></p><p>BYODALAINGTI (as long as it's not got TikTok installed)</p><p>The US federal government's ban on TikTok has been extended to include devices used by its many contractors - even those that are privately owned. The bottom line: if some electronics are used for government work, it better not have any ByteDance bits on it. </p><p>The <a href="https://www.federalregister.gov/documents/2023/06/02/2023-11755/federal-acquisition-regulation-federal-acquisition-circular-2023-04-introduction">interim rule</a> was jointly issued by NASA, the Department of Defense and the General Services Administration, which handles contracting for US federal agencies. The change amends the Federal Acquisition Regulation to prohibit TikTok, any successor application, or any software produced by TikTok's Beijing-based parent ByteDance from being present on contractor devices. </p><p>"This prohibition applies to devices regardless of whether the device is owned by the government, the contractor, or the contractor's employees. A personally-owned cell phone that is not used in the performance of the contract is not subject to the prohibition," the trio said in their update notice published in the Federal Register. </p><p>The rule would apply to all contracts, even those below the "simplified acquisition threshold" of $250,000, purchases of commercial and off-the-shelf equipment, and commercial services so get ready to wipe those company phones, cloud services providers and MSPs that do business with Uncle Sam. </p><p>AND </p><p><a href="https://www.theregister.com/2023/06/05/british_airways_boots_moveit/">British Airways, Boots, BBC payroll data stolen in MOVEit supply-chain attack</a></p><p>British Airways, the BBC, and UK pharmacy chain Boots are among the companies whose data has been compromised after miscreants exploited a critical vulnerability in deployments of the MOVEit document-transfer app.</p><p>Microsoft reckons the Russian <a href="https://www.theregister.com/2022/08/18/clop_ransomware_uk_water/">Clop ransomware crew</a> stole the information.</p><p>British Airways, the BBC, and Boots were not hit directly. Instead, payroll services provider Zellis on Monday admitted its MOVEit installation had been exploited, and as a result "a small number of our customers" – including the aforementioned British trio – had their information stolen.</p><p>Zellis claims to be the largest payroll and human resources provider in the UK, and its customers include Sky, Harrods, Jaguar, Land Rover, Dyson, and Credit Suisse. In a <a href="https://www.zellis.com/resources/press-and-media/press-statement-on-moveit-transfer-data-breach/">statement</a> posted on its website, Zellis blamed the MOVEit vulnerability for the security breach, and noted "all Zellis-owned software is unaffected and there are no associated incidents or compromises to any other part of our IT estate."</p><p> </p><p><strong>Industry News  (34:33)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clop-ransom-gang-big-names-moveit/">Clop Ransom Gang Breaches Big Names Via MOVEit Flaw</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-warns-surge-deepfake-2/">FBI Warns of Surge in Deepfake Sextortion Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-counterfeiter-pleads-guilty/">Cisco Counterfeiter Pleads Guilty to $100m Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-extortionists-fresh-victims/">Cyber Extortionists Seek Out Fresh Victims in LatAm and Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-blamed-for-atomic/">Lazarus Group Blamed for Atomic Wallet Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-human-trafficking/">Interpol: Human Trafficking is Fueling Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-brings-openai-tech-us/">Microsoft Brings OpenAI Tech to US Agencies</a></p><p><a href="https://www.infosecurity-magazine.com/news/eisai-group-hit-ransomware/">Pharmaceutical Giant Eisai Hit By Ransomware Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-africa-attacks-stealth/">Espionage Attacks in North Africa Linked to "Stealth Soldier" Backdoor</a></p><p> </p><p><strong>Tweet of the Week (43:58)</strong></p><img src="https://lh5.googleusercontent.com/k1sUYjUKCZjIIqhW5O5dPFV_QddilahEyRF-Kq13iqV08BBxjj3ENfucYhlIwh0x0XxUFHqs6f6AKTl2zs5_TxK2Dapw9PYekn1-VHzFAEdNqllydAbBqOl1CgmD9lKzU0ppAeTtDctNVt2l7pHiSzA" /><p><a href="https://twitter.com/elonmusk/status/1666964082363371520">https://twitter.com/elonmusk/status/1666964082363371520</a></p><img src="https://lh6.googleusercontent.com/I5uvb8C8fmTqRsn1t-ZpNZNJ6GfDcHHITO_spB-DSqFvrdxqd0sPe2NhC9POlw-MYH7-jGLu4XnKe9ko51WHTfvGcubKqRREfsG0AIyynGLHZ38-qH8JwEVuLri3Ef1JGiOj1DG40q8BkEEmHpX2SQw" /><p><a href="https://twitter.com/sawaba/status/1666930930714279942">https://twitter.com/sawaba/status/1666930930714279942</a></p><p><a href="https://www.forbes.com/lists/most-cybersecure-companies/">https://www.forbes.com/lists/most-cybersecure-companies/</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Jun 2023 23:17:48 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-155-the-really-late-show-dguqxVyl</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (10:21)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th June 1989: The beta release of the Bourne Again SHell (Bash) was announced as version 0.99. 2 months later Shellshock was introduced into the Bash source code and persisted in subsequent versions for over 25 years.</p><p>v0.99 release <a href="https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1">announcement</a></p><p><a href="https://twitter.com/todayininfosec/status/1666487525320318988">https://twitter.com/todayininfosec/status/1666487525320318988</a></p><p>3rd June 1983: <a href="https://thisdayintechhistory.com/06/03/would-you-like-to-play-a-game/">Would You Like to Play a Game?</a></p><p>The science fiction film <a href="http://en.wikipedia.org/wiki/WarGames">WarGames</a> is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. </p><p>Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.</p><p> </p><p><strong>Rant of the Week (17:16)</strong></p><p><a href="https://krebsonsecurity.com/2023/06/barracuda-urges-replacing-not-patching-its-email-security-gateways/">Barracuda Urges Replacing — Not Patching — Its Email Security Gateways</a></p><p>It’s not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware — as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely updated with software fixes.</p><p><a href="https://www.theregister.com/2023/06/08/barracuda_immediately_replace_esg/">Barracuda tells its ESG owners to 'immediately' junk buggy kit</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:45)</strong></p><p><a href="https://www.theregister.com/2023/06/06/us_contractors_tiktok_ban/">US govt now bans TikTok from contractors' work gear</a></p><p>BYODALAINGTI (as long as it's not got TikTok installed)</p><p>The US federal government's ban on TikTok has been extended to include devices used by its many contractors - even those that are privately owned. The bottom line: if some electronics are used for government work, it better not have any ByteDance bits on it. </p><p>The <a href="https://www.federalregister.gov/documents/2023/06/02/2023-11755/federal-acquisition-regulation-federal-acquisition-circular-2023-04-introduction">interim rule</a> was jointly issued by NASA, the Department of Defense and the General Services Administration, which handles contracting for US federal agencies. The change amends the Federal Acquisition Regulation to prohibit TikTok, any successor application, or any software produced by TikTok's Beijing-based parent ByteDance from being present on contractor devices. </p><p>"This prohibition applies to devices regardless of whether the device is owned by the government, the contractor, or the contractor's employees. A personally-owned cell phone that is not used in the performance of the contract is not subject to the prohibition," the trio said in their update notice published in the Federal Register. </p><p>The rule would apply to all contracts, even those below the "simplified acquisition threshold" of $250,000, purchases of commercial and off-the-shelf equipment, and commercial services so get ready to wipe those company phones, cloud services providers and MSPs that do business with Uncle Sam. </p><p>AND </p><p><a href="https://www.theregister.com/2023/06/05/british_airways_boots_moveit/">British Airways, Boots, BBC payroll data stolen in MOVEit supply-chain attack</a></p><p>British Airways, the BBC, and UK pharmacy chain Boots are among the companies whose data has been compromised after miscreants exploited a critical vulnerability in deployments of the MOVEit document-transfer app.</p><p>Microsoft reckons the Russian <a href="https://www.theregister.com/2022/08/18/clop_ransomware_uk_water/">Clop ransomware crew</a> stole the information.</p><p>British Airways, the BBC, and Boots were not hit directly. Instead, payroll services provider Zellis on Monday admitted its MOVEit installation had been exploited, and as a result "a small number of our customers" – including the aforementioned British trio – had their information stolen.</p><p>Zellis claims to be the largest payroll and human resources provider in the UK, and its customers include Sky, Harrods, Jaguar, Land Rover, Dyson, and Credit Suisse. In a <a href="https://www.zellis.com/resources/press-and-media/press-statement-on-moveit-transfer-data-breach/">statement</a> posted on its website, Zellis blamed the MOVEit vulnerability for the security breach, and noted "all Zellis-owned software is unaffected and there are no associated incidents or compromises to any other part of our IT estate."</p><p> </p><p><strong>Industry News  (34:33)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clop-ransom-gang-big-names-moveit/">Clop Ransom Gang Breaches Big Names Via MOVEit Flaw</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-warns-surge-deepfake-2/">FBI Warns of Surge in Deepfake Sextortion Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-counterfeiter-pleads-guilty/">Cisco Counterfeiter Pleads Guilty to $100m Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-extortionists-fresh-victims/">Cyber Extortionists Seek Out Fresh Victims in LatAm and Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-blamed-for-atomic/">Lazarus Group Blamed for Atomic Wallet Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-human-trafficking/">Interpol: Human Trafficking is Fueling Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-brings-openai-tech-us/">Microsoft Brings OpenAI Tech to US Agencies</a></p><p><a href="https://www.infosecurity-magazine.com/news/eisai-group-hit-ransomware/">Pharmaceutical Giant Eisai Hit By Ransomware Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-africa-attacks-stealth/">Espionage Attacks in North Africa Linked to "Stealth Soldier" Backdoor</a></p><p> </p><p><strong>Tweet of the Week (43:58)</strong></p><img src="https://lh5.googleusercontent.com/k1sUYjUKCZjIIqhW5O5dPFV_QddilahEyRF-Kq13iqV08BBxjj3ENfucYhlIwh0x0XxUFHqs6f6AKTl2zs5_TxK2Dapw9PYekn1-VHzFAEdNqllydAbBqOl1CgmD9lKzU0ppAeTtDctNVt2l7pHiSzA" /><p><a href="https://twitter.com/elonmusk/status/1666964082363371520">https://twitter.com/elonmusk/status/1666964082363371520</a></p><img src="https://lh6.googleusercontent.com/I5uvb8C8fmTqRsn1t-ZpNZNJ6GfDcHHITO_spB-DSqFvrdxqd0sPe2NhC9POlw-MYH7-jGLu4XnKe9ko51WHTfvGcubKqRREfsG0AIyynGLHZ38-qH8JwEVuLri3Ef1JGiOj1DG40q8BkEEmHpX2SQw" /><p><a href="https://twitter.com/sawaba/status/1666930930714279942">https://twitter.com/sawaba/status/1666930930714279942</a></p><p><a href="https://www.forbes.com/lists/most-cybersecure-companies/">https://www.forbes.com/lists/most-cybersecure-companies/</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49387636" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8ca66f64-e655-42e3-9237-dbaf193cebfc/audio/ed788133-d7a1-4e75-b2d2-cc7dffae1590/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 155 - The Really Late Show</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6a96a382-f062-4c16-a237-35a08ecdada6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:26</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the time Shell was born again
 
Rant of the Week is a bold strategy to increase sales

Billy Big Balls introduces us to BYODALAINGTI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week advertises an unintended pwn2own competition</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the time Shell was born again
 
Rant of the Week is a bold strategy to increase sales

Billy Big Balls introduces us to BYODALAINGTI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week advertises an unintended pwn2own competition</itunes:subtitle>
      <itunes:keywords>fubar, forbes, apple vision pro, wargames, barracuda, esg, arnie, bash, ransomware, matthew broderick, moveit, clop, tiktok</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46d0c95e-b45c-4988-8740-13e8cdceeb5c</guid>
      <title>Episode 154 - The Broom-cupboard Episode</title>
      <description><![CDATA[<p><strong>Voting has closed for this years European Cybersecurity Blogger Awards has closed. Did you vote with your conscience, or did you vote for us?</strong></p><p> </p><p><strong>This week in InfoSec (08:33)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>30th May 1972: John Postel published RFC 349, Proposed Standard Socket Numbers.</p><p><a href="https://datatracker.ietf.org/doc/html/rfc349">RFC 349</a></p><p><a href="https://twitter.com/todayininfosec/status/1266805406707232768">https://twitter.com/todayininfosec/status/1266805406707232768</a></p><p> 1st June 1999: Shawn Fanning and Sean Parker release the filesharing service <a href="http://en.wikipedia.org/wiki/Napster">Napster</a>. The service provides a simple way for users to copy and distribute MP3 music files. It became an instant hit, especially among college students. Just over 6 months later, on December 7, 1999, the Recording Industry Association of America (RIAA) filed a lawsuit against the service, alleging mass copyright infringement. Eventually this lawsuit forced the shutdown of the company on September 3, 2002, but not before the popularity of downloading digital music was firmly entrenched in a generation of Internet users.</p><p> </p><p><strong>Rant of the Week (16:32)</strong></p><p><a href="https://www.theregister.com/2023/06/01/ftc_alexa_ring_amazon_settlement/">Amazon Ring, Alexa accused of every nightmare IoT security fail you can imagine</a></p><p>America's Federal Trade Commission has made Amazon a case study for every cautionary tale about how sloppily designed internet-of-things devices and associated services represent a risk to privacy – and made the cost of those actions, as alleged, a mere $30.8 million.</p><p>The regulator on Wednesday <a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever">charged</a>, via the US Dept of Justice, two Amazon outfits with various privacy snafus.</p><p>The e-tail giant’s Ring home security cam subsidiary was accused of “compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos.”</p><p>“Not only could every Ring employee and Ukraine-based third-party contractor access every customer’s videos (all of which were stored unencrypted on Ring’s network), but they could also readily download any customer’s videos and then view, share, or disclose those videos at will,” reads the FTC's <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/complaint_ring.pdf">complaint</a> [PDF].</p><p>The document goes on to describe how “a customer service agent might need access to the video data of a particular customer to troubleshoot a problem, that same customer service agent had unfettered access to videos belonging to thousands of customers who never contacted customer service.”</p><p>Another nightmare: “Although an engineer working on Ring’s floodlight camera might need access to some video data from outdoor devices, that engineer had unrestricted access to footage of the inside of customers’ bedrooms.”</p><p>Ring staff weren’t trained on how to handle private data. And some abused it, horribly, according to the consumer watchdog.</p><p>The complaint details one employee who, the FTC said, “viewed thousands of video recordings belonging to at least 81 unique female users,” and “focused his prurient searches on cameras with names indicating that they surveilled an intimate space, such as ‘Master Bedroom,’ ‘Master Bathroom,’ or ‘Spy Cam’.”</p><p>The employee spent more than an hour a day on this revolting stuff, undetected by Ring, for months, it was claimed.</p><p>When a female coworker reported this activity, her supervisor “discounted the report, telling the female employee that it is ‘normal’ for an engineer to view so many accounts," the FTC noted.</p><p> </p><p><strong>Billy Big Balls of the Week (29:42)</strong></p><p><a href="https://www.theregister.com/2023/05/30/nso_owner_hacking/">Pegasus-pusher NSO gets new owner keen on the commercial spyware biz</a></p><p>Spyware maker NSO Group has a new ringleader, as the notorious biz seeks to revamp its image amid new reports that the company's Pegasus malware is targeting yet more human rights advocates and journalists.</p><p>Once installed on a victim's device, Pegasus can, among other things, secretly snoop on that person's calls, messages, and other activities, and access their phone's camera without permission. This has led to government sanctions against NSO and a massive lawsuit from Meta.</p><p>The Israeli company's creditors, Credit Suisse and Senate Investment Group, foreclosed on NSO earlier this year, according to the <a href="https://www.wsj.com/articles/israeli-cyber-company-nso-group-has-new-ownership-after-u-s-blacklist-a2cda00a?mod=Searchresults_pos1&page=1">Wall Street Journal</a>, which broke that story the other day.</p><p>Essentially, we're told, NSO's lenders forced the biz into a restructure and change of ownership after it ran into various government ban lists and ensuing financial difficulties.</p><p>The new owner is a Luxembourg-based holding firm called Dufresne Holdings controlled by NSO co-founder Omri Lavie, according to the newspaper report. Corporate filings now list Dufresne Holdings as the sole shareholder of NSO parent company NorthPole.</p><p>Dufresne Holdings has removed "a number of directors and officers" across NSO and is involved in the company's day-to-day management, the Wall Street Journal added.</p><p>An NSO spokesperson meanwhile said "the company is managed directly by our CEO, Yaron Shohat. The lenders are currently in a process of restructuring the shareholders." </p><p>The company has not only faced criticism over its Pegasus spyware implant, US and European officials over the past couple of years have cracked down on NSO in particular, and commercial spyware in general.</p><p>Reports keep emerging about Pegasus and <a href="https://www.theregister.com/2023/04/12/quadream_spyware_microsoft_citizenlab/">other surveillance technologies</a> being used in ways that decidedly violate NSO's claims that it only sells the malware to legitimate government agencies "for the purpose of preventing and investigating terrorism and other serious crimes."</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p><strong>Industry News (37:34)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/romania-safetech-uk-cybersecurity/">Romania’s Safetech Leans into UK Cybersecurity Market</a></p><p><a href="https://www.infosecurity-magazine.com/news/nine-million-mcna-dental-customers/">Nine Million MCNA Dental Customers Hit by Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gangs-business-practices/">Ransomware Gangs Adopting Business-like Practices to Boost Profits</a></p><p><a href="https://www.infosecurity-magazine.com/news/human-error-fuels-industrial-apt/">Human Error Fuels Industrial APT Attacks, Kaspersky Reports</a></p><p><a href="https://www.infosecurity-magazine.com/news/nigerian-cybergroup-phishing/">Nigerian Cybercrime Ring's Phishing Tactics Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/pentagon-cyber-policy-learnings/">Pentagon Cyber Policy Cites Learnings from Ukraine War</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-pay-31m-ftcs-security/">Amazon to Pay $31m After FTC's Security and Privacy Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/hmrc-in-new-tax-credits-scam/">HMRC in New Tax Credits Scam Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/horabot-campaign-targets-spanish/">Horabot Campaign Targets Spanish-Speaking Users in the Americas</a></p><p> </p><p><strong>Tweet of the Week (44:04)</strong></p><p><a href="https://twitter.com/securityweekly/status/1664335258655784960">https://twitter.com/securityweekly/status/1664335258655784960</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 2 Jun 2023 18:20:02 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-154-the-broom-cupboard-episode-uaQbr_EC</link>
      <content:encoded><![CDATA[<p><strong>Voting has closed for this years European Cybersecurity Blogger Awards has closed. Did you vote with your conscience, or did you vote for us?</strong></p><p> </p><p><strong>This week in InfoSec (08:33)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>30th May 1972: John Postel published RFC 349, Proposed Standard Socket Numbers.</p><p><a href="https://datatracker.ietf.org/doc/html/rfc349">RFC 349</a></p><p><a href="https://twitter.com/todayininfosec/status/1266805406707232768">https://twitter.com/todayininfosec/status/1266805406707232768</a></p><p> 1st June 1999: Shawn Fanning and Sean Parker release the filesharing service <a href="http://en.wikipedia.org/wiki/Napster">Napster</a>. The service provides a simple way for users to copy and distribute MP3 music files. It became an instant hit, especially among college students. Just over 6 months later, on December 7, 1999, the Recording Industry Association of America (RIAA) filed a lawsuit against the service, alleging mass copyright infringement. Eventually this lawsuit forced the shutdown of the company on September 3, 2002, but not before the popularity of downloading digital music was firmly entrenched in a generation of Internet users.</p><p> </p><p><strong>Rant of the Week (16:32)</strong></p><p><a href="https://www.theregister.com/2023/06/01/ftc_alexa_ring_amazon_settlement/">Amazon Ring, Alexa accused of every nightmare IoT security fail you can imagine</a></p><p>America's Federal Trade Commission has made Amazon a case study for every cautionary tale about how sloppily designed internet-of-things devices and associated services represent a risk to privacy – and made the cost of those actions, as alleged, a mere $30.8 million.</p><p>The regulator on Wednesday <a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever">charged</a>, via the US Dept of Justice, two Amazon outfits with various privacy snafus.</p><p>The e-tail giant’s Ring home security cam subsidiary was accused of “compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos.”</p><p>“Not only could every Ring employee and Ukraine-based third-party contractor access every customer’s videos (all of which were stored unencrypted on Ring’s network), but they could also readily download any customer’s videos and then view, share, or disclose those videos at will,” reads the FTC's <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/complaint_ring.pdf">complaint</a> [PDF].</p><p>The document goes on to describe how “a customer service agent might need access to the video data of a particular customer to troubleshoot a problem, that same customer service agent had unfettered access to videos belonging to thousands of customers who never contacted customer service.”</p><p>Another nightmare: “Although an engineer working on Ring’s floodlight camera might need access to some video data from outdoor devices, that engineer had unrestricted access to footage of the inside of customers’ bedrooms.”</p><p>Ring staff weren’t trained on how to handle private data. And some abused it, horribly, according to the consumer watchdog.</p><p>The complaint details one employee who, the FTC said, “viewed thousands of video recordings belonging to at least 81 unique female users,” and “focused his prurient searches on cameras with names indicating that they surveilled an intimate space, such as ‘Master Bedroom,’ ‘Master Bathroom,’ or ‘Spy Cam’.”</p><p>The employee spent more than an hour a day on this revolting stuff, undetected by Ring, for months, it was claimed.</p><p>When a female coworker reported this activity, her supervisor “discounted the report, telling the female employee that it is ‘normal’ for an engineer to view so many accounts," the FTC noted.</p><p> </p><p><strong>Billy Big Balls of the Week (29:42)</strong></p><p><a href="https://www.theregister.com/2023/05/30/nso_owner_hacking/">Pegasus-pusher NSO gets new owner keen on the commercial spyware biz</a></p><p>Spyware maker NSO Group has a new ringleader, as the notorious biz seeks to revamp its image amid new reports that the company's Pegasus malware is targeting yet more human rights advocates and journalists.</p><p>Once installed on a victim's device, Pegasus can, among other things, secretly snoop on that person's calls, messages, and other activities, and access their phone's camera without permission. This has led to government sanctions against NSO and a massive lawsuit from Meta.</p><p>The Israeli company's creditors, Credit Suisse and Senate Investment Group, foreclosed on NSO earlier this year, according to the <a href="https://www.wsj.com/articles/israeli-cyber-company-nso-group-has-new-ownership-after-u-s-blacklist-a2cda00a?mod=Searchresults_pos1&page=1">Wall Street Journal</a>, which broke that story the other day.</p><p>Essentially, we're told, NSO's lenders forced the biz into a restructure and change of ownership after it ran into various government ban lists and ensuing financial difficulties.</p><p>The new owner is a Luxembourg-based holding firm called Dufresne Holdings controlled by NSO co-founder Omri Lavie, according to the newspaper report. Corporate filings now list Dufresne Holdings as the sole shareholder of NSO parent company NorthPole.</p><p>Dufresne Holdings has removed "a number of directors and officers" across NSO and is involved in the company's day-to-day management, the Wall Street Journal added.</p><p>An NSO spokesperson meanwhile said "the company is managed directly by our CEO, Yaron Shohat. The lenders are currently in a process of restructuring the shareholders." </p><p>The company has not only faced criticism over its Pegasus spyware implant, US and European officials over the past couple of years have cracked down on NSO in particular, and commercial spyware in general.</p><p>Reports keep emerging about Pegasus and <a href="https://www.theregister.com/2023/04/12/quadream_spyware_microsoft_citizenlab/">other surveillance technologies</a> being used in ways that decidedly violate NSO's claims that it only sells the malware to legitimate government agencies "for the purpose of preventing and investigating terrorism and other serious crimes."</p><p><i>It is that time of the show where we head to our news sources over at the Infosec PA newswire who have been very busy bringing us the latest and greatest security news from around the globe!</i></p><p> </p><p><strong>Industry News (37:34)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/romania-safetech-uk-cybersecurity/">Romania’s Safetech Leans into UK Cybersecurity Market</a></p><p><a href="https://www.infosecurity-magazine.com/news/nine-million-mcna-dental-customers/">Nine Million MCNA Dental Customers Hit by Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gangs-business-practices/">Ransomware Gangs Adopting Business-like Practices to Boost Profits</a></p><p><a href="https://www.infosecurity-magazine.com/news/human-error-fuels-industrial-apt/">Human Error Fuels Industrial APT Attacks, Kaspersky Reports</a></p><p><a href="https://www.infosecurity-magazine.com/news/nigerian-cybergroup-phishing/">Nigerian Cybercrime Ring's Phishing Tactics Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/pentagon-cyber-policy-learnings/">Pentagon Cyber Policy Cites Learnings from Ukraine War</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-pay-31m-ftcs-security/">Amazon to Pay $31m After FTC's Security and Privacy Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/hmrc-in-new-tax-credits-scam/">HMRC in New Tax Credits Scam Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/horabot-campaign-targets-spanish/">Horabot Campaign Targets Spanish-Speaking Users in the Americas</a></p><p> </p><p><strong>Tweet of the Week (44:04)</strong></p><p><a href="https://twitter.com/securityweekly/status/1664335258655784960">https://twitter.com/securityweekly/status/1664335258655784960</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44940968" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/42660cd7-c871-47e7-90a0-2072cb7dcc02/audio/cab9ab7f-d0db-48d8-8a70-f528dee9a74c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 154 - The Broom-cupboard Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/180433a1-995b-4e87-85b6-17d3a4da2745/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:48</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the day the music industry changed forever
 
Rant of the Week plays privacy-failing bingo with Amazon

Billy Big Balls is NSO group asking us to meet the new boss, same as the old boss
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a glimpse of our AI future</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the day the music industry changed forever
 
Rant of the Week plays privacy-failing bingo with Amazon

Billy Big Balls is NSO group asking us to meet the new boss, same as the old boss
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a glimpse of our AI future</itunes:subtitle>
      <itunes:keywords>ring cameras, pegasus, gold teeth, napster, hmrc, captcha, rfc 349, nso, ai, amazon</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>154</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">83318631-377a-4664-9294-97981e260a88</guid>
      <title>Episode 153 - The Poorly Planned Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:59)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th May 2006: BackTrack v1.0 was released.</p><p><a href="https://twitter.com/todayininfosec/status/1265471687761424384">https://twitter.com/todayininfosec/status/1265471687761424384</a></p><p>21st May 2012: Nmap 6.00 was released.<a href="https://t.co/mPEQrQY2pV"> </a><a href="https://nmap.org/6/">https://nmap.org/6/</a></p><p><a href="https://twitter.com/todayininfosec/status/1263589918107791362">https://twitter.com/todayininfosec/status/1263589918107791362</a></p><p>23rd May 1997: Carlos Felipe Salgado Jr. (aka "Smak"), who allegedly stole 100,000 credit cards from an Internet provider was granted bail on the condition he not go "anywhere near a computer." He was arrested after trying to sell it to the FBI.</p><p><a href="https://www.chicagotribune.com/news/ct-xpm-1997-05-23-9705240078-story.html">Hacker gets conditional bail</a></p><p><a href="https://twitter.com/todayininfosec/status/1264033568436568070">https://twitter.com/todayininfosec/status/1264033568436568070</a></p><p> </p><p><strong>Rant of the Week (16:25)</strong></p><p><a href="https://www.theregister.com/2023/05/23/dish_networks/">Dish confirms 300,000 people's data was exposed in February's attack</a></p><p>But don't worry – we know it was deleted.</p><p>Dish Network has admitted that a February cybersecurity incident and associated multi-day outage led to the extraction of data on nearly 300,000 people, while also appearing to indirectly admit it may have paid cybercriminals to delete said data.</p><p>Dish customers can rest easy, at the very least, as the telco <a href="https://apps.web.maine.gov/online/aeviewer/ME/40/ec8cf5c5-3048-4b22-baa9-10438a51e6f5.shtml">said</a> in a sample letter posted to the Maine Attorney General's breach notification website that customer databases weren't accessed and the stolen data belonged instead to employees both past and present, their family members, "and a limited number of other individuals" that Dish didn't specify.</p><p>The satellite TV company also didn't say what sorts of personal information was stolen from those 296,851 individuals in the attack, aside from driver's license and non-driver ID card numbers.</p><p>Dish never went on the record to publicly state the attack was caused by ransomware, though internal sources who contacted The Register, did report that ransomware was involved. Dish also made mention of ransomware in its SEC filing.</p><p>Reports from February citing internal Dish sources claim the Black Basta ransomware gang was behind the break-in at Dish, and in its <a href="https://regmedia.co.uk/2023/05/23/v.pdf">template letter</a> [PDF] notifying affected individuals of the incident, the company sought to reassure recipients that there's no evidence the extracted data has been misused, and that it believes the data has been deleted.</p><p>Er, who confirmed that again?</p><p>"We have received confirmation that the extracted data has been deleted," Dish said, adding that it has been monitoring the dark web and criminal forums for signs the data is available online. "The results of the monitoring are consistent with the confirmation that the extracted data has been deleted," it added. </p><p>That, as Emsisoft security analyst Brett Callow has pointed out, could be interpreted as an admission that Dish paid whatever ransom was demanded of it because "totally untrustworthy cybercriminals assured us the data would be deleted if we paid the ransom," Callow <a href="https://twitter.com/BrettCallow/status/1659598960695336960">tweeted</a>. </p><p> </p><p><strong>Billy Big Balls of the Week (26:30)</strong></p><p><a href="https://www.theregister.com/2023/05/23/fbi_warns_on_asian_jobs/">Ads for lucrative jobs in Asia fail to mention chance of slavery as crypto-scammer</a></p><p>The FBI has issued a warning about fake job ads that recruit workers into forced labor operations in Southeast Asia – some of which enslave visitors and force them to participate in cryptocurrency scams.</p><p>The warning follows <a href="https://www.reuters.com/article/us-cambodia-china-taiwan-idUSKCN1AZ033">reports</a> of multi-storey slave compounds housing unwilling workers in places like Cambodia.</p><p>The FBI's <a href="https://www.ic3.gov/Media/Y2023/PSA230522#fn2">advice</a> suggests those scams are ongoing.</p><p>"Criminal actors assign debts to victims under the guise of travel fees and room and board, and use victims' mounting debt and fear of local law enforcement as additional means to control victims. Trafficked victims are sometimes sold and transferred between compounds, further adding to their debt," said the FBI.</p><p>Advocacy groups and media <a href="https://www.globalantiscam.org/modern-slavery-job-scam">report</a> similar tactics, with victims targeted online and promised lucrative jobs abroad with travel fees and other benefits paid.</p><p>Upon arrival in a foreign country – which may not even be the one jobseekers were told they'd visit – workers' passports and travel documents may be confiscated, and the victim coerced to conduct scams under the threat of violence.</p><p>The scams the slaves conduct often involve "pig butchering" tactics that see perpetrators encourage victims to make investments in cryptocurrency. Once payments are made, the scammer ceases communication with the victim and their cash disappears. Pig butchering perps often use romance scams, promises of sex, or illegal gambling as lures.</p><p> </p><p><strong>Industry News (32:53)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/meta-fined-12bn-for-violating-gdpr/">Meta Fined €1.2bn for Violating GDPR</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-ban-us-chipmaker-products/">China Issues Ban on US Chipmaker Products</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-gdpr-reduced-trust/">Two-Thirds of IT Leaders Say GDPR Has Reduced Consumer Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/becky-pinkard-infosecurity-europe/">Diversity advocate and renowned practitioner, Becky Pinkard, to be Inaugurated into Infosecurity Europe's Hall of Fame</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-task-force-defend/">Private Sector Cybersecurity Task Force Called for to Defend Democracies</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-sanctions-north-korea-entities/">US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos</a></p><p><a href="https://www.infosecurity-magazine.com/news/smb-targeted-apt-financial-supply/">SMBs Targeted by State-Aligned Actors for Financial Theft and Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-warns-chinese-cyber-attacks/">NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/expo-framework-api-flaw-reveals/">Expo Framework API Flaw Reveals User Data in Online Services</a></p><p> </p><p><strong>Tweet of the Week (39:35)</strong></p><p><a href="https://twitter.com/ireteeh/status/1661635416204648448">https://twitter.com/ireteeh/status/1661635416204648448</a></p><p><a href="https://twitter.com/VladCraita/status/1661461184665604096?s=20">https://twitter.com/VladCraita/status/1661461184665604096?s=20</a></p><p><a href="https://twitter.com/primevideouk/status/1661760395659321346">https://twitter.com/primevideouk/status/1661760395659321346</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 May 2023 11:30:24 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-153-the-poorly-planned-episode-yKlqqrvn</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:59)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>26th May 2006: BackTrack v1.0 was released.</p><p><a href="https://twitter.com/todayininfosec/status/1265471687761424384">https://twitter.com/todayininfosec/status/1265471687761424384</a></p><p>21st May 2012: Nmap 6.00 was released.<a href="https://t.co/mPEQrQY2pV"> </a><a href="https://nmap.org/6/">https://nmap.org/6/</a></p><p><a href="https://twitter.com/todayininfosec/status/1263589918107791362">https://twitter.com/todayininfosec/status/1263589918107791362</a></p><p>23rd May 1997: Carlos Felipe Salgado Jr. (aka "Smak"), who allegedly stole 100,000 credit cards from an Internet provider was granted bail on the condition he not go "anywhere near a computer." He was arrested after trying to sell it to the FBI.</p><p><a href="https://www.chicagotribune.com/news/ct-xpm-1997-05-23-9705240078-story.html">Hacker gets conditional bail</a></p><p><a href="https://twitter.com/todayininfosec/status/1264033568436568070">https://twitter.com/todayininfosec/status/1264033568436568070</a></p><p> </p><p><strong>Rant of the Week (16:25)</strong></p><p><a href="https://www.theregister.com/2023/05/23/dish_networks/">Dish confirms 300,000 people's data was exposed in February's attack</a></p><p>But don't worry – we know it was deleted.</p><p>Dish Network has admitted that a February cybersecurity incident and associated multi-day outage led to the extraction of data on nearly 300,000 people, while also appearing to indirectly admit it may have paid cybercriminals to delete said data.</p><p>Dish customers can rest easy, at the very least, as the telco <a href="https://apps.web.maine.gov/online/aeviewer/ME/40/ec8cf5c5-3048-4b22-baa9-10438a51e6f5.shtml">said</a> in a sample letter posted to the Maine Attorney General's breach notification website that customer databases weren't accessed and the stolen data belonged instead to employees both past and present, their family members, "and a limited number of other individuals" that Dish didn't specify.</p><p>The satellite TV company also didn't say what sorts of personal information was stolen from those 296,851 individuals in the attack, aside from driver's license and non-driver ID card numbers.</p><p>Dish never went on the record to publicly state the attack was caused by ransomware, though internal sources who contacted The Register, did report that ransomware was involved. Dish also made mention of ransomware in its SEC filing.</p><p>Reports from February citing internal Dish sources claim the Black Basta ransomware gang was behind the break-in at Dish, and in its <a href="https://regmedia.co.uk/2023/05/23/v.pdf">template letter</a> [PDF] notifying affected individuals of the incident, the company sought to reassure recipients that there's no evidence the extracted data has been misused, and that it believes the data has been deleted.</p><p>Er, who confirmed that again?</p><p>"We have received confirmation that the extracted data has been deleted," Dish said, adding that it has been monitoring the dark web and criminal forums for signs the data is available online. "The results of the monitoring are consistent with the confirmation that the extracted data has been deleted," it added. </p><p>That, as Emsisoft security analyst Brett Callow has pointed out, could be interpreted as an admission that Dish paid whatever ransom was demanded of it because "totally untrustworthy cybercriminals assured us the data would be deleted if we paid the ransom," Callow <a href="https://twitter.com/BrettCallow/status/1659598960695336960">tweeted</a>. </p><p> </p><p><strong>Billy Big Balls of the Week (26:30)</strong></p><p><a href="https://www.theregister.com/2023/05/23/fbi_warns_on_asian_jobs/">Ads for lucrative jobs in Asia fail to mention chance of slavery as crypto-scammer</a></p><p>The FBI has issued a warning about fake job ads that recruit workers into forced labor operations in Southeast Asia – some of which enslave visitors and force them to participate in cryptocurrency scams.</p><p>The warning follows <a href="https://www.reuters.com/article/us-cambodia-china-taiwan-idUSKCN1AZ033">reports</a> of multi-storey slave compounds housing unwilling workers in places like Cambodia.</p><p>The FBI's <a href="https://www.ic3.gov/Media/Y2023/PSA230522#fn2">advice</a> suggests those scams are ongoing.</p><p>"Criminal actors assign debts to victims under the guise of travel fees and room and board, and use victims' mounting debt and fear of local law enforcement as additional means to control victims. Trafficked victims are sometimes sold and transferred between compounds, further adding to their debt," said the FBI.</p><p>Advocacy groups and media <a href="https://www.globalantiscam.org/modern-slavery-job-scam">report</a> similar tactics, with victims targeted online and promised lucrative jobs abroad with travel fees and other benefits paid.</p><p>Upon arrival in a foreign country – which may not even be the one jobseekers were told they'd visit – workers' passports and travel documents may be confiscated, and the victim coerced to conduct scams under the threat of violence.</p><p>The scams the slaves conduct often involve "pig butchering" tactics that see perpetrators encourage victims to make investments in cryptocurrency. Once payments are made, the scammer ceases communication with the victim and their cash disappears. Pig butchering perps often use romance scams, promises of sex, or illegal gambling as lures.</p><p> </p><p><strong>Industry News (32:53)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/meta-fined-12bn-for-violating-gdpr/">Meta Fined €1.2bn for Violating GDPR</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-ban-us-chipmaker-products/">China Issues Ban on US Chipmaker Products</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-gdpr-reduced-trust/">Two-Thirds of IT Leaders Say GDPR Has Reduced Consumer Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/becky-pinkard-infosecurity-europe/">Diversity advocate and renowned practitioner, Becky Pinkard, to be Inaugurated into Infosecurity Europe's Hall of Fame</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-task-force-defend/">Private Sector Cybersecurity Task Force Called for to Defend Democracies</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-sanctions-north-korea-entities/">US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos</a></p><p><a href="https://www.infosecurity-magazine.com/news/smb-targeted-apt-financial-supply/">SMBs Targeted by State-Aligned Actors for Financial Theft and Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-warns-chinese-cyber-attacks/">NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/expo-framework-api-flaw-reveals/">Expo Framework API Flaw Reveals User Data in Online Services</a></p><p> </p><p><strong>Tweet of the Week (39:35)</strong></p><p><a href="https://twitter.com/ireteeh/status/1661635416204648448">https://twitter.com/ireteeh/status/1661635416204648448</a></p><p><a href="https://twitter.com/VladCraita/status/1661461184665604096?s=20">https://twitter.com/VladCraita/status/1661461184665604096?s=20</a></p><p><a href="https://twitter.com/primevideouk/status/1661760395659321346">https://twitter.com/primevideouk/status/1661760395659321346</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="40019080" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8816dfa7-7744-4500-ad37-5daedf8fad5e/audio/a27b688b-c4b3-48d0-b57a-c1a5eb7fb4ae/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 153 - The Poorly Planned Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/d6f6578d-95d6-41ac-a50f-c49fc76d5651/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:41</itunes:duration>
      <itunes:summary>This week in InfoSec shows that May has historically been a good year for hacker tools
 
Rant of the Week is a dishy story putting faith in the bad guys

Billy Big Balls is a warning for digital nomads
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a job transition hack for those new to the industry</itunes:summary>
      <itunes:subtitle>This week in InfoSec shows that May has historically been a good year for hacker tools
 
Rant of the Week is a dishy story putting faith in the bad guys

Billy Big Balls is a warning for digital nomads
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a job transition hack for those new to the industry</itunes:subtitle>
      <itunes:keywords>microsoft defender, black basta, fbi, prince andrew, wes andersonj, dish satellite tv, becky pinkard</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>153</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a5e43435-c5d1-450c-ba85-8d091969bda4</guid>
      <title>Episode 152 - The Sicknote Episode</title>
      <description><![CDATA[<p><strong>European Security Blogger Awards 2023</strong></p><p>Vote for us (and Thom and teissTalk) here:</p><p><a href="https://forms.gle/o6LwY6t5bSY9Fp5CA">https://forms.gle/o6LwY6t5bSY9Fp5CA </a></p><p> </p><p><strong>This week in InfoSec (11:24)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th May 2011: Sony Begins Restoration of Its PlayStation Network after Cyber Attack</p><p>After a malicious cyber attack compromises Sony Computer Entertainment's data center in San Diego, California, the PlayStation Network is shut down on April 20. </p><p>The ensuing investigation revealed a number of security flaws, and in tandem with outside security firms, Sony implemented a number of upgrades to deter and mitigate future attacks to its network and its customers’ personal information. The Americas, Oceania, Europe and the Middle East were the first regions to regain access to the PlayStation Network, and among other measures, customers were required to reset their passwords upon initially signing in. </p><p>As more and more personal information is posted online, whether for financial, social, or business transactions, the safekeeping and protection of this data has come to the forefront of Internet consumer concerns. </p><p> </p><p>20th May 2003: Rain Forest Puppy reflected on change in the security industry and made a declaration of his personal change. </p><p><a href="https://web.archive.org/web/20090510083820/www.wiretrip.net/rfp/txt/evolution.txt">https://web.archive.org/web/20090510083820/www.wiretrip.net/rfp/txt/evolution.txt</a></p><p><a href="https://twitter.com/todayininfosec/status/1395378144861896705">https://twitter.com/todayininfosec/status/1395378144861896705</a></p><p> </p><p><strong> Rant of the Week (18:00)</strong></p><p><a href="https://www.theregister.com/2023/05/17/converso_e2ee_app/">Upstart encryption app walks back privacy claims, pulls from stores after probe</a></p><p>A new-ish messaging service that claimed to put privacy first has pulled its end-to-end encryption claims from its website and its app from both the Apple and Google software stores after being called out online.</p><p>Converso – a comms app launched in September 2022 – billed itself as a "next-generation messaging app that keeps your conversations completely private." This, according to the developer's website, included "<a href="https://web.archive.org/web/20230423020851/https://conversoapp.com/about-us/">proprietary</a> state-of-the-art end-to-end encryption technology," no storage of messages on servers, and "<a href="https://web.archive.org/web/20230421215900/https://conversoapp.com/">absolutely</a> no use of user data." It claimed it could stand up to the likes of Signal and WhatsApp in the security stakes. </p><p>A blogger who goes by Crnković and has an interest in encryption protocols heard about Converso from an ad on a podcast and decided to poke around to see if the software lived up to the hype. </p><p>Crnković found the app talked to a Google Cloud-hosted database that was left completely open to the public by the software's developers. This Firestore database, we're told, included encrypted message content, metadata about people's messages, their private encryption keys, phone numbers, and more. Essentially, it would be possible for anyone to fetch that information and decrypt a stranger's message that went through the app, according to the researcher.</p><p>Crnković concluded:</p><p><i>Not only is metadata public, but so too are the keys used to encrypt messages. Anyone can download a Converso user's private key, which could be used to decrypt their secret conversations.</i></p><p><i>There's no longer any real distinction between cleartext and encrypted messages – nothing is meaningfully encrypted. For your security, you shouldn't use Converso to send any message that you wouldn't also publish as a tweet.</i></p><p>"Dissecting Converso was in large part a learn-as-you-go exercise for me, as I don't have prior experience reverse engineering mobile apps," Crnković told The Register. "I was shocked at each exponentially worse mistake."</p><p>Telegram vulnerability: <a href="https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/">https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/</a></p><p> </p><p><strong>Billy Big Balls of the Week (27:37)</strong></p><p><a href="https://www.theregister.com/2023/05/18/microsoft_azure_system_authentication/">Microsoft decides it will be the one to choose which secure login method you use</a></p><p>Microsoft wants to take the decision of which multi-factor authentication (MFA) method to use out of the users' hands and into its own.</p><p>The software maker this week is rolling out what it calls system-preferred authentication for MFA, which will present individuals signing in with the most secure method and then alternatives if that method is unavailable.</p><p>Redmond first <a href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-system-preferred-multifactor-authentication">unveiled</a> the feature in a disabled state in April and is now making it generally available to all commercial users through the Azure Portal or Graph APIs, with the decision whether to enable it for tenants now resting with administrators.</p><p>That said, in July Microsoft will make system-preferred authentication a default feature in its Azure Entra portfolio for all user accounts, with more information coming out next month.</p><p>The goal is to shore up security by not only delivering new features to harden products and services but to, at times, strong-arm people into using them.</p><p>More security, fewer problems?</p><p>"This system prompts the user to sign in with the most secure method they've registered and the method that's enabled by admin policy," Alex Weinert, vice president and director of identity security at Microsoft, wrote in a <a href="https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/ga-system-preferred-multifactor-authentication/ba-p/3773138">blog post</a>. "This will transition users from choosing a default method to use first to always using the most secure method available. If they can't use the method they were prompted to use, they can choose a different MFA method to sign in."</p><p> </p><p><strong>Industry News (36:43)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/employee-imprisoned-crypto/">Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/nso-group-spends-millions-lobbying/">NSO Group Spends Millions Lobbying US Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberresilience-programs-failing/">Cyber-Resilience Programs Failing on Poor Visibility</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cloud-data-leak-adds-to-capita/">New Cloud Data Leak Adds to Capita's Woes</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-playbook-enhance-smart/">Government Publishes Playbook to Enhance Smart City Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-software-supply-chain/">ChatGPT Leveraged to Enhance Software Supply Chain Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/montana-signs-ban-tiktok-personal/">Montana Signs Ban on TikTok Usage on Personal Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/apples-app-store-blocks-fraud/">Apple's App Store Blocks $2bn in Fraudulent Transactions</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-warfare-escalates-amid/">Cyber Warfare Escalates Amid China-Taiwan Tensions</a></p><p> </p><p><strong>Tweet of the Week (48:17)</strong></p><p><a href="https://twitter.com/pmbaumgartner/status/1658804805014368256">https://twitter.com/pmbaumgartner/status/1658804805014368256</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 May 2023 13:44:13 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-152-the-sicknote-episode-8PzZqthw</link>
      <content:encoded><![CDATA[<p><strong>European Security Blogger Awards 2023</strong></p><p>Vote for us (and Thom and teissTalk) here:</p><p><a href="https://forms.gle/o6LwY6t5bSY9Fp5CA">https://forms.gle/o6LwY6t5bSY9Fp5CA </a></p><p> </p><p><strong>This week in InfoSec (11:24)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th May 2011: Sony Begins Restoration of Its PlayStation Network after Cyber Attack</p><p>After a malicious cyber attack compromises Sony Computer Entertainment's data center in San Diego, California, the PlayStation Network is shut down on April 20. </p><p>The ensuing investigation revealed a number of security flaws, and in tandem with outside security firms, Sony implemented a number of upgrades to deter and mitigate future attacks to its network and its customers’ personal information. The Americas, Oceania, Europe and the Middle East were the first regions to regain access to the PlayStation Network, and among other measures, customers were required to reset their passwords upon initially signing in. </p><p>As more and more personal information is posted online, whether for financial, social, or business transactions, the safekeeping and protection of this data has come to the forefront of Internet consumer concerns. </p><p> </p><p>20th May 2003: Rain Forest Puppy reflected on change in the security industry and made a declaration of his personal change. </p><p><a href="https://web.archive.org/web/20090510083820/www.wiretrip.net/rfp/txt/evolution.txt">https://web.archive.org/web/20090510083820/www.wiretrip.net/rfp/txt/evolution.txt</a></p><p><a href="https://twitter.com/todayininfosec/status/1395378144861896705">https://twitter.com/todayininfosec/status/1395378144861896705</a></p><p> </p><p><strong> Rant of the Week (18:00)</strong></p><p><a href="https://www.theregister.com/2023/05/17/converso_e2ee_app/">Upstart encryption app walks back privacy claims, pulls from stores after probe</a></p><p>A new-ish messaging service that claimed to put privacy first has pulled its end-to-end encryption claims from its website and its app from both the Apple and Google software stores after being called out online.</p><p>Converso – a comms app launched in September 2022 – billed itself as a "next-generation messaging app that keeps your conversations completely private." This, according to the developer's website, included "<a href="https://web.archive.org/web/20230423020851/https://conversoapp.com/about-us/">proprietary</a> state-of-the-art end-to-end encryption technology," no storage of messages on servers, and "<a href="https://web.archive.org/web/20230421215900/https://conversoapp.com/">absolutely</a> no use of user data." It claimed it could stand up to the likes of Signal and WhatsApp in the security stakes. </p><p>A blogger who goes by Crnković and has an interest in encryption protocols heard about Converso from an ad on a podcast and decided to poke around to see if the software lived up to the hype. </p><p>Crnković found the app talked to a Google Cloud-hosted database that was left completely open to the public by the software's developers. This Firestore database, we're told, included encrypted message content, metadata about people's messages, their private encryption keys, phone numbers, and more. Essentially, it would be possible for anyone to fetch that information and decrypt a stranger's message that went through the app, according to the researcher.</p><p>Crnković concluded:</p><p><i>Not only is metadata public, but so too are the keys used to encrypt messages. Anyone can download a Converso user's private key, which could be used to decrypt their secret conversations.</i></p><p><i>There's no longer any real distinction between cleartext and encrypted messages – nothing is meaningfully encrypted. For your security, you shouldn't use Converso to send any message that you wouldn't also publish as a tweet.</i></p><p>"Dissecting Converso was in large part a learn-as-you-go exercise for me, as I don't have prior experience reverse engineering mobile apps," Crnković told The Register. "I was shocked at each exponentially worse mistake."</p><p>Telegram vulnerability: <a href="https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/">https://danrevah.github.io/2023/05/15/CVE-2023-26818-Bypass-TCC-with-Telegram/</a></p><p> </p><p><strong>Billy Big Balls of the Week (27:37)</strong></p><p><a href="https://www.theregister.com/2023/05/18/microsoft_azure_system_authentication/">Microsoft decides it will be the one to choose which secure login method you use</a></p><p>Microsoft wants to take the decision of which multi-factor authentication (MFA) method to use out of the users' hands and into its own.</p><p>The software maker this week is rolling out what it calls system-preferred authentication for MFA, which will present individuals signing in with the most secure method and then alternatives if that method is unavailable.</p><p>Redmond first <a href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-system-preferred-multifactor-authentication">unveiled</a> the feature in a disabled state in April and is now making it generally available to all commercial users through the Azure Portal or Graph APIs, with the decision whether to enable it for tenants now resting with administrators.</p><p>That said, in July Microsoft will make system-preferred authentication a default feature in its Azure Entra portfolio for all user accounts, with more information coming out next month.</p><p>The goal is to shore up security by not only delivering new features to harden products and services but to, at times, strong-arm people into using them.</p><p>More security, fewer problems?</p><p>"This system prompts the user to sign in with the most secure method they've registered and the method that's enabled by admin policy," Alex Weinert, vice president and director of identity security at Microsoft, wrote in a <a href="https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/ga-system-preferred-multifactor-authentication/ba-p/3773138">blog post</a>. "This will transition users from choosing a default method to use first to always using the most secure method available. If they can't use the method they were prompted to use, they can choose a different MFA method to sign in."</p><p> </p><p><strong>Industry News (36:43)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/employee-imprisoned-crypto/">Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/nso-group-spends-millions-lobbying/">NSO Group Spends Millions Lobbying US Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberresilience-programs-failing/">Cyber-Resilience Programs Failing on Poor Visibility</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cloud-data-leak-adds-to-capita/">New Cloud Data Leak Adds to Capita's Woes</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-playbook-enhance-smart/">Government Publishes Playbook to Enhance Smart City Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-software-supply-chain/">ChatGPT Leveraged to Enhance Software Supply Chain Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/montana-signs-ban-tiktok-personal/">Montana Signs Ban on TikTok Usage on Personal Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/apples-app-store-blocks-fraud/">Apple's App Store Blocks $2bn in Fraudulent Transactions</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-warfare-escalates-amid/">Cyber Warfare Escalates Amid China-Taiwan Tensions</a></p><p> </p><p><strong>Tweet of the Week (48:17)</strong></p><p><a href="https://twitter.com/pmbaumgartner/status/1658804805014368256">https://twitter.com/pmbaumgartner/status/1658804805014368256</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50338493" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/17af17c8-f27c-4cb4-a154-4ef4f83b0b1b/audio/8425b5ac-feee-4e52-8902-9d4cf4bfe770/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 152 - The Sicknote Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/55d3c2d0-666a-4a1c-95b9-22fe3d5830c0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:26</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of when the Playstation Network was down for 3 weeks
 
Rant of the Week is a reminder of why you don’t roll your own encryption

Billy Big Balls is the story of Microsoft making authentication decisions for you
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week uses lessons from ChatGPT</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of when the Playstation Network was down for 3 weeks
 
Rant of the Week is a reminder of why you don’t roll your own encryption

Billy Big Balls is the story of Microsoft making authentication decisions for you
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week uses lessons from ChatGPT</itunes:subtitle>
      <itunes:keywords>javistan, microsoft mfa, converso, jazz cigarettes, dentists, chatgpt, tik-tok, encryption, e2e, sexy graham cluley\, hal</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>152</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f071afa2-36d3-421f-8678-b77efadab822</guid>
      <title>Episode 151 - Like Mould it Grew Back</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>11th May 1997: <a href="https://thisdayintechhistory.com/05/11/deep-blue-defeats-kasparov-in-tournament-match/">Deep Blue Defeats Kasparov in Tournament Match</a></p><p><a href="https://www.ibm.com/ibm/history/ibm100/us/en/icons/deepblue/">The IBM computer and artificial intelligence Deep Blue defeats reigning chess champion and one of the greatest chess players of all time, Garry Kasparov</a>, in the 6th and deciding game of a tournament match, thus becoming the first time a computer defeated a chess champion in match play. A year earlier, <a href="https://thisdayintechhistory.com/02/10/a-computer-defeats-a-world-chess-champion/">Deep Blue had bested Kasparov in 2 individual games</a> but </p><p>Kasparov eventually won the match 4-2. This time, after being reprogrammed and upgraded, the 1997 Deep Blue, capable of calculating 200 million moves per second, won 2 matches out of 6 vs Kasparov’s 1 victory and 3 draws. After the defeat Kasparov asked for a rematch but IBM declined and retired Deep Blue.</p><p>The defeat of a reigning chess champion at the hands of artificial intelligence made headlines around the world and marked a milestone in the development of AI and machine learning. From this early landmark moment, the advancement of computing power and machine learning has created even more powerful artificial intelligence. <a href="https://rarehistoricalphotos.com/kasparov-deep-blue-1997/">Kasparov in 2016 stated that “Today you can buy a chess engine for your laptop that will beat Deep Blue quite easily”</a>. </p><p> </p><p>9th May 1996: <a href="https://thisdayintechhistory.com/05/09/linux-gets-happy-feet/">Linux Gets Happy Feet</a></p><p><a href="http://en.wikipedia.org/wiki/Linus_Torvalds">Linus Torvalds</a> describes in <a href="https://lkml.iu.edu/hypermail/linux/kernel/9605/0855.html">an e-mail to a mailing list his conception</a> of what he believes should be the logo for the <a href="http://en.wikipedia.org/wiki/Linux">Linux operating system</a>. This is what soon becomes <a href="http://en.wikipedia.org/wiki/Tux_the_penguin">Tux</a> the penguin, the “brand character” for Linux. Perhaps had he known the movie Happy Feet would be released a little over 10 years later, he would have chosen a Warbler instead.</p><p> </p><p><strong>Rant of the Week (15:24)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-rolls-out-encrypted-dms-but-only-for-paying-accounts/">Twitter rolls out encrypted DMs, but only for paying accounts</a></p><p>Twitter has launched its 'Encrypted Direct Messages' feature allowing paid Twitter Blue subscribers to send end-to-end encrypted messages to other users on the platform.</p><p>End-to-end encryption (E2EE) uses private and public key pairs to encrypt information sent over the internet so that only the sender and the recipient can read it.</p><p>The private decryption key is only stored on the sender's device and is not shared with anyone else. However, the public encryption key is shared with others who want to send you encrypted data.</p><p>As the private decryption key is only stored on the local recipient's device and never stored anywhere else along the way, such as on the messaging app's servers, even if someone intercepts the message, they won't be able to read it without the decryption key.</p><p>End-to-end encrypted DMs on Twitter have been a sought-after and massively requested feature that was teased and retracted in 2018.</p><p>Last November, mobile researcher Jane Manchun Wong <a href="https://www.bleepingcomputer.com/news/security/twitter-source-code-indicates-end-to-end-encrypted-dms-are-coming/">noticed</a> that the source code of </p><p>Twitter for Android hinted at work towards implementing an E2EE system, with Elon Musk <a href="https://twitter.com/elonmusk/status/1592761152966397953">all but confirming</a> the suspicions.</p><p>Almost half a year later, Twitter officially announced today the availability of an encrypted messages feature on the latest version of the Twitter apps for iOS and Android and on the web platform.</p><p>Based on the details in the announcement, which mentions using a device-generated private key and a centrally-provided public key, Twitter has implemented an asymmetric encryption scheme.</p><p> </p><p><strong>Billy Big Balls of the Week (23:18)</strong></p><p><a href="https://www.theregister.com/2023/05/12/india_whatsapp_spam_privacy_demands/">India to send official whassup to WhatsApp after massive spamstorm</a></p><p>India's IT minister Rajeev Chandrasekhar will ask WhatsApp to explain what's up, after the Meta-owned messaging service experienced a dramatic increase in spam calls.</p><p>India is the largest market for WhatsApp, with over 450 million users – many of whom have in the last couple of weeks received plenty of spam calls from overseas. Many of the calls involve fake job offers, usually with a request to negotiate the gig on a different messaging platform – which makes tracking the perps harder.</p><p>The timing of that spam storm is intriguing. On May 1, Indian carriers were required to implement AI-powered spam call filters. As The Register <a href="https://www.theregister.com/2022/11/29/india_txt_spam_crackdown/">reported</a> in November 2022, the AI-infused system was developed after a blockchain-based spam-buster bombed.</p><p>Might scammers have turned to WhatsApp after conventional carriers hardened up?</p><p>Whatever the exact reasons for WhatsApp being whacked, Chandrasekhar is not happy about the amount of spam it's carried. He <a href="https://twitter.com/chandrarsrikant/status/1656575270747504644">told</a> local media his ministry will send a "please explain" missive to WhatsApp.</p><p> </p><p>HP </p><p><a href="https://twitter.com/dcuthbert/status/1656926678096986112?s=20">https://twitter.com/dcuthbert/status/1656926678096986112?s=20</a></p><p> </p><p><strong>Industry News  (30:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/39-security-decision-makers-see/">Only 39% of IT Security Decision-Makers See it As Business Enabler</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisos-worried-personal-liability/">CISOs Worried About Personal Liability For Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/eus-clientside-scanning-plans/">EU's Client-Side Scanning Plans Could be Unlawful</a></p><p><a href="https://www.infosecurity-magazine.com/news/nextgen-healthcare-breached/">NextGen Healthcare Data Breach: One Million Patient Records Affected</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-arrest-40-phishing/">Spanish Police Arrest 40 in Phishing Gang Bust</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-uncovers-russian-snake-malware/">NSA and Allies Uncover Russian Snake Malware Network in 50+ Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-hacker-admits-guilt-new/">Twitter Hacker Admits Guilt in New York Court, Extradited from Spain</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-ico-dispel-incident-reporting/">NCSC and ICO Dispel Incident Reporting Myths</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-babuk-code/">Threat Actors Use Babuk Code to Build Hypervisor Ransomware</a></p><p> </p><p><strong>Tweet of the Week (39:15)</strong></p><p>Tweet of the Week is the part of the show where everyone chooses a tweet they like. It could be a funny tweet, an interesting tweet they’ve read, educational, amusing, or useful, whatever they like.  It doesn’t have to be security-related necessarily.</p><p>[Better not be!]</p><p><a href="https://twitter.com/InternetH0F/status/1656624723395051530">https://twitter.com/InternetH0F/status/1656624723395051530</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 May 2023 15:44:36 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-151-like-mould-it-grew-back-mbSmLSi3</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:16)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>11th May 1997: <a href="https://thisdayintechhistory.com/05/11/deep-blue-defeats-kasparov-in-tournament-match/">Deep Blue Defeats Kasparov in Tournament Match</a></p><p><a href="https://www.ibm.com/ibm/history/ibm100/us/en/icons/deepblue/">The IBM computer and artificial intelligence Deep Blue defeats reigning chess champion and one of the greatest chess players of all time, Garry Kasparov</a>, in the 6th and deciding game of a tournament match, thus becoming the first time a computer defeated a chess champion in match play. A year earlier, <a href="https://thisdayintechhistory.com/02/10/a-computer-defeats-a-world-chess-champion/">Deep Blue had bested Kasparov in 2 individual games</a> but </p><p>Kasparov eventually won the match 4-2. This time, after being reprogrammed and upgraded, the 1997 Deep Blue, capable of calculating 200 million moves per second, won 2 matches out of 6 vs Kasparov’s 1 victory and 3 draws. After the defeat Kasparov asked for a rematch but IBM declined and retired Deep Blue.</p><p>The defeat of a reigning chess champion at the hands of artificial intelligence made headlines around the world and marked a milestone in the development of AI and machine learning. From this early landmark moment, the advancement of computing power and machine learning has created even more powerful artificial intelligence. <a href="https://rarehistoricalphotos.com/kasparov-deep-blue-1997/">Kasparov in 2016 stated that “Today you can buy a chess engine for your laptop that will beat Deep Blue quite easily”</a>. </p><p> </p><p>9th May 1996: <a href="https://thisdayintechhistory.com/05/09/linux-gets-happy-feet/">Linux Gets Happy Feet</a></p><p><a href="http://en.wikipedia.org/wiki/Linus_Torvalds">Linus Torvalds</a> describes in <a href="https://lkml.iu.edu/hypermail/linux/kernel/9605/0855.html">an e-mail to a mailing list his conception</a> of what he believes should be the logo for the <a href="http://en.wikipedia.org/wiki/Linux">Linux operating system</a>. This is what soon becomes <a href="http://en.wikipedia.org/wiki/Tux_the_penguin">Tux</a> the penguin, the “brand character” for Linux. Perhaps had he known the movie Happy Feet would be released a little over 10 years later, he would have chosen a Warbler instead.</p><p> </p><p><strong>Rant of the Week (15:24)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-rolls-out-encrypted-dms-but-only-for-paying-accounts/">Twitter rolls out encrypted DMs, but only for paying accounts</a></p><p>Twitter has launched its 'Encrypted Direct Messages' feature allowing paid Twitter Blue subscribers to send end-to-end encrypted messages to other users on the platform.</p><p>End-to-end encryption (E2EE) uses private and public key pairs to encrypt information sent over the internet so that only the sender and the recipient can read it.</p><p>The private decryption key is only stored on the sender's device and is not shared with anyone else. However, the public encryption key is shared with others who want to send you encrypted data.</p><p>As the private decryption key is only stored on the local recipient's device and never stored anywhere else along the way, such as on the messaging app's servers, even if someone intercepts the message, they won't be able to read it without the decryption key.</p><p>End-to-end encrypted DMs on Twitter have been a sought-after and massively requested feature that was teased and retracted in 2018.</p><p>Last November, mobile researcher Jane Manchun Wong <a href="https://www.bleepingcomputer.com/news/security/twitter-source-code-indicates-end-to-end-encrypted-dms-are-coming/">noticed</a> that the source code of </p><p>Twitter for Android hinted at work towards implementing an E2EE system, with Elon Musk <a href="https://twitter.com/elonmusk/status/1592761152966397953">all but confirming</a> the suspicions.</p><p>Almost half a year later, Twitter officially announced today the availability of an encrypted messages feature on the latest version of the Twitter apps for iOS and Android and on the web platform.</p><p>Based on the details in the announcement, which mentions using a device-generated private key and a centrally-provided public key, Twitter has implemented an asymmetric encryption scheme.</p><p> </p><p><strong>Billy Big Balls of the Week (23:18)</strong></p><p><a href="https://www.theregister.com/2023/05/12/india_whatsapp_spam_privacy_demands/">India to send official whassup to WhatsApp after massive spamstorm</a></p><p>India's IT minister Rajeev Chandrasekhar will ask WhatsApp to explain what's up, after the Meta-owned messaging service experienced a dramatic increase in spam calls.</p><p>India is the largest market for WhatsApp, with over 450 million users – many of whom have in the last couple of weeks received plenty of spam calls from overseas. Many of the calls involve fake job offers, usually with a request to negotiate the gig on a different messaging platform – which makes tracking the perps harder.</p><p>The timing of that spam storm is intriguing. On May 1, Indian carriers were required to implement AI-powered spam call filters. As The Register <a href="https://www.theregister.com/2022/11/29/india_txt_spam_crackdown/">reported</a> in November 2022, the AI-infused system was developed after a blockchain-based spam-buster bombed.</p><p>Might scammers have turned to WhatsApp after conventional carriers hardened up?</p><p>Whatever the exact reasons for WhatsApp being whacked, Chandrasekhar is not happy about the amount of spam it's carried. He <a href="https://twitter.com/chandrarsrikant/status/1656575270747504644">told</a> local media his ministry will send a "please explain" missive to WhatsApp.</p><p> </p><p>HP </p><p><a href="https://twitter.com/dcuthbert/status/1656926678096986112?s=20">https://twitter.com/dcuthbert/status/1656926678096986112?s=20</a></p><p> </p><p><strong>Industry News  (30:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/39-security-decision-makers-see/">Only 39% of IT Security Decision-Makers See it As Business Enabler</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisos-worried-personal-liability/">CISOs Worried About Personal Liability For Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/eus-clientside-scanning-plans/">EU's Client-Side Scanning Plans Could be Unlawful</a></p><p><a href="https://www.infosecurity-magazine.com/news/nextgen-healthcare-breached/">NextGen Healthcare Data Breach: One Million Patient Records Affected</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-arrest-40-phishing/">Spanish Police Arrest 40 in Phishing Gang Bust</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-uncovers-russian-snake-malware/">NSA and Allies Uncover Russian Snake Malware Network in 50+ Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-hacker-admits-guilt-new/">Twitter Hacker Admits Guilt in New York Court, Extradited from Spain</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-ico-dispel-incident-reporting/">NCSC and ICO Dispel Incident Reporting Myths</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-babuk-code/">Threat Actors Use Babuk Code to Build Hypervisor Ransomware</a></p><p> </p><p><strong>Tweet of the Week (39:15)</strong></p><p>Tweet of the Week is the part of the show where everyone chooses a tweet they like. It could be a funny tweet, an interesting tweet they’ve read, educational, amusing, or useful, whatever they like.  It doesn’t have to be security-related necessarily.</p><p>[Better not be!]</p><p><a href="https://twitter.com/InternetH0F/status/1656624723395051530">https://twitter.com/InternetH0F/status/1656624723395051530</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42349203" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d17d41a4-db51-4e08-aab8-5e10e613c391/audio/d050b811-188a-46d9-8c5e-d1f290902bfb/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 151 - Like Mould it Grew Back</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8ca95b88-6c1a-467c-97e3-7f5421c96720/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:06</itunes:duration>
      <itunes:summary>This week in InfoSec is somewhat lost on Jav, why didn’t we keep Graham on?
 
Rant of the Week proves that Elon isn’t finished with us yet

Billy Big Balls is India’s take on “Whassssuuuuup”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is straight from the Internet hall of fame</itunes:summary>
      <itunes:subtitle>This week in InfoSec is somewhat lost on Jav, why didn’t we keep Graham on?
 
Rant of the Week proves that Elon isn’t finished with us yet

Billy Big Balls is India’s take on “Whassssuuuuup”
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is straight from the Internet hall of fame</itunes:subtitle>
      <itunes:keywords>whatsapp, fuckhp, happy birthday thom, hp, elon musk, the inevitable snail, india, fucktwitter, twitter</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>151</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30a4005f-8760-4b90-bbd3-276c4441a283</guid>
      <title>Episode 150 - Yet Another Intern</title>
      <description><![CDATA[<p><strong>Vote for us here! -> </strong>https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform</p><p><strong>This week in InfoSec (08:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd May 1978: Earliest known case of spam.  Gary Thuerk, a marketing representative for Digital Equipment Corporation, <a href="https://yourstory.com/2023/05/origin-email-spam-digital-communication#:~:text=On%20May%203%2C%201978%2C%20Thuerk,move%20that%20shocked%20the%20community.">sends out an e-mail promoting an open house for the company’s latest computer systems to 393 recipients on the ARPANET</a>, a precursor to the modern Internet. While this number sounds small by today’s standards, this was all the ARPANET users on the west coast of the United States. Given that this was an unsolicited commercial e-mail, it is now considered the first of its kind. In other words, the first spam message well before the term was coined. It brought a quick and negative response from many users and Thuerk was warned by ARPANET administrators that mass mailings were not an acceptable use of the network. The backlash notwithstanding, the open house was largely successful with over $12 million dollars of DEC equipment being sold. I guess it was better to ask forgiveness than permission in this case! </p><p><a href="https://nakedsecurity.sophos.com/2008/05/27/spamreg-or-spam-whats-in-a-name/">https://nakedsecurity.sophos.com/2008/05/27/spamreg-or-spam-whats-in-a-name/</a></p><p>according to Hormel’s<a href="http://www.spam.com/whatisspam/faq.pdf"> SPAM® FAQ</a>, the name was dreamt up by a chap called Ken who received a $100 prize for his efforts. Hormel says that we have to thank him that we’re not all eating Crinkycrinky or Canned Flappertanknibbles.</p><p>29th April 2004: The <a href="http://en.wikipedia.org/wiki/Sasser_worm">Sasser worm</a> is released into the wild, infecting over 1 million Windows XP and Windows 2000 computers worldwide.</p><p>Although the worm did not have an intentionally destructive payload, it caused many computers to slow down or crash and reboot repeatedly along with clogging up network traffic. Among the effects of the worm, the British coast guard had to resort to paper maps for the day, a French news agency lost satellite communication for hours, Delta Airlines had to delay or cancel many flights, and the University of Missouri had to disconnect its network from the Internet. </p><p>(GC: Memories of Sasser? 🙂)</p><p>Author Sven Jaschan.  German kid.  Also created the Netsky worm.  Bragged about it to his schoolmates.</p><p>Following his arrest,<a href="https://en.wikipedia.org/wiki/Microsoft"> Microsoft</a> said that they had received tip-offs from more than one source, and that the $250,000 reward for identifying the author of the Netsky worm would be shared between them.</p><p><a href="https://en.wikipedia.org/wiki/Sven_Jaschan">https://en.wikipedia.org/wiki/Sven_Jaschan</a></p><p>Got off very lightly as he was underage when the virus was written - just given 30 hours community service.  No fine.</p><p>Went to work the next day as normal.... which was as a developer for a German cybersecurity company called SecurePoint.  In retaliation, the anti-virus company Avira officially halted its cooperation with Securepoint.</p><p> </p><p><strong>Rant of the Week  (17:12)</strong></p><p><a href="https://www.fool.com/earnings/call-transcripts/2023/04/28/cloudflare-net-q1-2023-earnings-call-transcript/">Cloudflare Q1 Earnings Call Transcript</a></p><p>https://www.linkedin.com/posts/mattfivesixpartners_pretty-brutal-takedownthrowing-under-the-activity-7058819871119175681--ULh/?utm_source=share&utm_medium=member_ios</p><p> </p><p><strong>Billy Big Balls of the Week (28:46)</strong></p><p><a href="mailto:graham@grahamcluley.com">graham@grahamcluley.com</a> Feel free to talk about anything you want which might fall into the category of big ball energy as you don’t need to be spoon fed like the other muppets I work with.</p><p>Joe Sullivan.</p><p>https://www.washingtonpost.com/technology/2023/05/04/sullivan-sentencing-uber-executive/</p><p> </p><p><strong>Industry News (37:56)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gun-owners-targeted-rifle/">UK Gun Owners May Be Targeted After Rifle Association Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-reveals-second-breach-of/">T-Mobile Reveals Second Breach of the Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/high-severity-flaw-tbk-dvr-camera/">Hackers Exploit High Severity Flaw in TBK DVR Camera System</a></p><p><a href="https://www.infosecurity-magazine.com/news/bitmarck-halts-operations/">Bitmarck Halts Operations Due to Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-bust-leads-to-arrest-of/">Dark Web Bust Leads to Arrest of 288 Suspects</a></p><p><a href="https://www.infosecurity-magazine.com/news/threequarters-firms-predict-breach/">Three-Quarters of Firms Predict Breach in Coming Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-google-unwanted-tracking/">Apple and Google Unveil Industry Specification For Unwanted Tracking</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-dismantles-card-checking/">US Authorities Dismantle Dark Web "Card Checking" Platform</a></p><p><a href="https://www.infosecurity-magazine.com/news/consumer-group-slams-bank-app/">Consumer Group Slams Bank App Fraud Failings</a></p><p> </p><p><strong>Tweet of the Week (46:48)</strong></p><img /><p><a href="https://twitter.com/joshlemon/status/1654268564160020482">https://twitter.com/joshlemon/status/1654268564160020482</a></p><p> </p><p><strong>Vote for us here! -> </strong>https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform</p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 May 2023 23:27:36 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Graham Cluley)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-150-yet-another-intern-UPHee53u</link>
      <content:encoded><![CDATA[<p><strong>Vote for us here! -> </strong>https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform</p><p><strong>This week in InfoSec (08:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd May 1978: Earliest known case of spam.  Gary Thuerk, a marketing representative for Digital Equipment Corporation, <a href="https://yourstory.com/2023/05/origin-email-spam-digital-communication#:~:text=On%20May%203%2C%201978%2C%20Thuerk,move%20that%20shocked%20the%20community.">sends out an e-mail promoting an open house for the company’s latest computer systems to 393 recipients on the ARPANET</a>, a precursor to the modern Internet. While this number sounds small by today’s standards, this was all the ARPANET users on the west coast of the United States. Given that this was an unsolicited commercial e-mail, it is now considered the first of its kind. In other words, the first spam message well before the term was coined. It brought a quick and negative response from many users and Thuerk was warned by ARPANET administrators that mass mailings were not an acceptable use of the network. The backlash notwithstanding, the open house was largely successful with over $12 million dollars of DEC equipment being sold. I guess it was better to ask forgiveness than permission in this case! </p><p><a href="https://nakedsecurity.sophos.com/2008/05/27/spamreg-or-spam-whats-in-a-name/">https://nakedsecurity.sophos.com/2008/05/27/spamreg-or-spam-whats-in-a-name/</a></p><p>according to Hormel’s<a href="http://www.spam.com/whatisspam/faq.pdf"> SPAM® FAQ</a>, the name was dreamt up by a chap called Ken who received a $100 prize for his efforts. Hormel says that we have to thank him that we’re not all eating Crinkycrinky or Canned Flappertanknibbles.</p><p>29th April 2004: The <a href="http://en.wikipedia.org/wiki/Sasser_worm">Sasser worm</a> is released into the wild, infecting over 1 million Windows XP and Windows 2000 computers worldwide.</p><p>Although the worm did not have an intentionally destructive payload, it caused many computers to slow down or crash and reboot repeatedly along with clogging up network traffic. Among the effects of the worm, the British coast guard had to resort to paper maps for the day, a French news agency lost satellite communication for hours, Delta Airlines had to delay or cancel many flights, and the University of Missouri had to disconnect its network from the Internet. </p><p>(GC: Memories of Sasser? 🙂)</p><p>Author Sven Jaschan.  German kid.  Also created the Netsky worm.  Bragged about it to his schoolmates.</p><p>Following his arrest,<a href="https://en.wikipedia.org/wiki/Microsoft"> Microsoft</a> said that they had received tip-offs from more than one source, and that the $250,000 reward for identifying the author of the Netsky worm would be shared between them.</p><p><a href="https://en.wikipedia.org/wiki/Sven_Jaschan">https://en.wikipedia.org/wiki/Sven_Jaschan</a></p><p>Got off very lightly as he was underage when the virus was written - just given 30 hours community service.  No fine.</p><p>Went to work the next day as normal.... which was as a developer for a German cybersecurity company called SecurePoint.  In retaliation, the anti-virus company Avira officially halted its cooperation with Securepoint.</p><p> </p><p><strong>Rant of the Week  (17:12)</strong></p><p><a href="https://www.fool.com/earnings/call-transcripts/2023/04/28/cloudflare-net-q1-2023-earnings-call-transcript/">Cloudflare Q1 Earnings Call Transcript</a></p><p>https://www.linkedin.com/posts/mattfivesixpartners_pretty-brutal-takedownthrowing-under-the-activity-7058819871119175681--ULh/?utm_source=share&utm_medium=member_ios</p><p> </p><p><strong>Billy Big Balls of the Week (28:46)</strong></p><p><a href="mailto:graham@grahamcluley.com">graham@grahamcluley.com</a> Feel free to talk about anything you want which might fall into the category of big ball energy as you don’t need to be spoon fed like the other muppets I work with.</p><p>Joe Sullivan.</p><p>https://www.washingtonpost.com/technology/2023/05/04/sullivan-sentencing-uber-executive/</p><p> </p><p><strong>Industry News (37:56)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gun-owners-targeted-rifle/">UK Gun Owners May Be Targeted After Rifle Association Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-reveals-second-breach-of/">T-Mobile Reveals Second Breach of the Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/high-severity-flaw-tbk-dvr-camera/">Hackers Exploit High Severity Flaw in TBK DVR Camera System</a></p><p><a href="https://www.infosecurity-magazine.com/news/bitmarck-halts-operations/">Bitmarck Halts Operations Due to Cybersecurity Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-bust-leads-to-arrest-of/">Dark Web Bust Leads to Arrest of 288 Suspects</a></p><p><a href="https://www.infosecurity-magazine.com/news/threequarters-firms-predict-breach/">Three-Quarters of Firms Predict Breach in Coming Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-google-unwanted-tracking/">Apple and Google Unveil Industry Specification For Unwanted Tracking</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-dismantles-card-checking/">US Authorities Dismantle Dark Web "Card Checking" Platform</a></p><p><a href="https://www.infosecurity-magazine.com/news/consumer-group-slams-bank-app/">Consumer Group Slams Bank App Fraud Failings</a></p><p> </p><p><strong>Tweet of the Week (46:48)</strong></p><img /><p><a href="https://twitter.com/joshlemon/status/1654268564160020482">https://twitter.com/joshlemon/status/1654268564160020482</a></p><p> </p><p><strong>Vote for us here! -> </strong>https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform</p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48555061" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/efa6a7c1-3a4d-480a-a846-8940f0d85910/audio/b5d28094-e144-4638-9bda-6a152d373b65/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 150 - Yet Another Intern</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Graham Cluley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e7859d9f-06da-405d-974d-ca16fff7fe16/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:34</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a sassy time
 
Rant of the Week takes leadership lessons from Cloudflare’s CEO

Billy Big Balls the former CISO of Uber
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some lawyer talk</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a sassy time
 
Rant of the Week takes leadership lessons from Cloudflare’s CEO

Billy Big Balls the former CISO of Uber
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is some lawyer talk</itunes:subtitle>
      <itunes:keywords>sullivan, spam, logs, canned flappertanknibbles, cloudflare, t-mobile, uber, evidence</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>150</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">551ddb01-d2c8-4f5a-a8e5-7d350dfa1995</guid>
      <title>Episode 149 - It&apos;s That Man Again (Again)</title>
      <description><![CDATA[<p><strong>This Week In InfoSec (09:00)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>23rd April 2008: Microsoft announced that some of its antivirus tools had mislabeled Skype as adware for several days due to a bad definition update. 3 years later Microsoft bought Skype for $8.5 billion.</p><p><a href="https://www.infoworld.com/article/2651849/microsoft-mislabels-skype-as-adware.html">Microsoft mislabels Skype as adware</a></p><p><a href="https://twitter.com/todayininfosec/status/1253558642537713664">https://twitter.com/todayininfosec/status/1253558642537713664</a></p><p> </p><p>26th April 1999: Chernobyl Virus Melts Down PCs</p><p>The first known virus to target the <a href="http://en.wikipedia.org/wiki/Flash_BIOS">flash BIOS</a> of a PC, the <a href="http://en.wikipedia.org/wiki/Chernobyl_virus">CIH/Chernobyl Virus</a> triggers its payload on this day, erasing hard drives and disabling PCs primarily in Asia and Europe. One of the most destructive viruses in history, it is estimated that 60 billion PCs were infected worldwide causing $1 Billion in damages.</p><p>The virus had been created exactly one year earlier on April 26, 1998 by Taiwanese student Chen Ing-hau and set to trigger its destructive payload exactly one year later. It began to spread in the wild and was first discovered in June of 1998, given the name CIH due to the author’s initials discovered in the virus code. From this time forward it was reported that a variety of companies accidentally distributed the virus through various downloads, updates, and CDs.</p><p>When the virus triggered on this date it just happened to coincide with the date of the Chernobyl disaster in 1986 and therefore the press began to call it the Chernobyl virus, even though there has never been any evidence to show that this date was chosen intentionally for this reason.</p><p>My memories of Chernobyl/CIH here: <a href="https://nakedsecurity.sophos.com/2011/04/26/memories-of-the-chernobyl-virus/">https://nakedsecurity.sophos.com/2011/04/26/memories-of-the-chernobyl-virus/</a></p><p> </p><p><strong>Rant of the Week (17:35)</strong></p><p><a href="https://www.theregister.com/2023/04/21/meta_encryption_police/">International cops urge Meta <i>not</i> to implement secure encryption for all</a></p><p>Why? Well, think of the children, of course</p><p>An international group of law enforcement agencies are urging Meta not to standardize end-to-end encryption on Facebook Messenger and Instagram, which they say will harm their ability to fight child sexual abuse material (CSAM) online.</p><p>The Virtual Global Taskforce was formed in 2003 and is currently chaired by Britain's National Crime Agency. The VGT consists of 15 law enforcement bodies, including Interpol, the FBI, the Australian Federal Police and other law enforcement agencies from around the world. In its <a href="https://nationalcrimeagency.gov.uk/who-we-are/publications/646-vgt-end-to-end-encryption-statement-april-2023/file">letter</a> [PDF], the VGT said reports from tech industry partners play a key role in fighting CSAM content, with Meta being its leading reporter of abuse material.</p><p>But the taskforce thinks that will end if Meta continues its encryption push. "The VGT has not yet seen any indication from META that any new safety systems implemented post-E2EE will effectively match or improve their current detection methods," the taskforce said. </p><p> </p><p><strong>Billy Big Balls of the Week (28:07)</strong></p><p>After 13 years, Google has finally added syncing to Google Authenticator in iOS and Android.</p><p> By adding sync, you no longer need to worry about losing access to your online accounts. If you lose your phone, just restore them on a new device.</p><p>All good, right?  Err…</p><p><a href="https://twitter.com/mysk_co/status/1651021165727477763">https://twitter.com/mysk_co/status/1651021165727477763</a></p><p>Yes, Google syncs your 2FA codes via HTTPS.  But Mysk found out they weren’t end-to-end encrypted.  In short, Google can see your 2FA codes.  Furthermore, anyone who can access your Google account (such as law enforcement) can access your 2FA codes.</p><p>Oh dear…</p><p><a href="https://twitter.com/christiaanbrand/status/1651279598309744640">https://twitter.com/christiaanbrand/status/1651279598309744640</a></p><p>In response, Google said it had:</p><p><i>“We’re always focused on the safety and security of Google users, and the newest updates to Google Authenticator was no exception.”</i></p><p><i>“Plans to offer E2EE for Google Authenticator down the line.”</i></p><p><i>“Right now, we believe that our current product strikes the right balance for most users and provides significant benefits over offline use. However, the option to use the app offline will remain an alternative for those who prefer to manage their backup strategy themselves.”</i></p><p>What impressive balls of Google to introduce this new feature to a security/privacy product - after 13 years! - and brazenly do it in an insecure way.!</p><p> </p><p><strong>Industry News (37:43)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/american-bar-association-breach-1/">American Bar Association Breach Hits 1.5 Million Members</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-takedowns-people/">Thousands of Social Media Takedowns Hit People Smugglers</a></p><p><a href="https://www.infosecurity-magazine.com/news/black-basta-hits-yellow-pages/">Yellow Pages Canada Hit by Cyber-Attack, Black Basta Claims Credit</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cyber-pros-burnt-out-and/">UK Cyber Pros Burnt Out and Overwhelmed</a></p><p><a href="https://www.infosecurity-magazine.com/news/quad-info-sharing-critical/">Quad Countries Prepare For Info Sharing on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-flaw-patched-vmware/">Critical Flaw Patched in VMware Workstation and Fusion</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-arrested-selling-data/">Man Arrested for Selling Data on 300 Million Victims to Russians</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-blames-clop-affiliate/">Microsoft Blames Clop Affiliate for PaperCut Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt-groups-expand-reach-to-new/">APT Groups Expand Reach to New Industries and Geographies</a></p><p> </p><p><strong>Tweet of the Week (45:06)</strong></p><p><a href="https://twitter.com/vxunderground/status/1651384225692786689">https://twitter.com/vxunderground/status/1651384225692786689</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 Apr 2023 13:19:08 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Graham Cluley)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-149-its-that-man-again-again-_YTLNOxZ</link>
      <content:encoded><![CDATA[<p><strong>This Week In InfoSec (09:00)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>23rd April 2008: Microsoft announced that some of its antivirus tools had mislabeled Skype as adware for several days due to a bad definition update. 3 years later Microsoft bought Skype for $8.5 billion.</p><p><a href="https://www.infoworld.com/article/2651849/microsoft-mislabels-skype-as-adware.html">Microsoft mislabels Skype as adware</a></p><p><a href="https://twitter.com/todayininfosec/status/1253558642537713664">https://twitter.com/todayininfosec/status/1253558642537713664</a></p><p> </p><p>26th April 1999: Chernobyl Virus Melts Down PCs</p><p>The first known virus to target the <a href="http://en.wikipedia.org/wiki/Flash_BIOS">flash BIOS</a> of a PC, the <a href="http://en.wikipedia.org/wiki/Chernobyl_virus">CIH/Chernobyl Virus</a> triggers its payload on this day, erasing hard drives and disabling PCs primarily in Asia and Europe. One of the most destructive viruses in history, it is estimated that 60 billion PCs were infected worldwide causing $1 Billion in damages.</p><p>The virus had been created exactly one year earlier on April 26, 1998 by Taiwanese student Chen Ing-hau and set to trigger its destructive payload exactly one year later. It began to spread in the wild and was first discovered in June of 1998, given the name CIH due to the author’s initials discovered in the virus code. From this time forward it was reported that a variety of companies accidentally distributed the virus through various downloads, updates, and CDs.</p><p>When the virus triggered on this date it just happened to coincide with the date of the Chernobyl disaster in 1986 and therefore the press began to call it the Chernobyl virus, even though there has never been any evidence to show that this date was chosen intentionally for this reason.</p><p>My memories of Chernobyl/CIH here: <a href="https://nakedsecurity.sophos.com/2011/04/26/memories-of-the-chernobyl-virus/">https://nakedsecurity.sophos.com/2011/04/26/memories-of-the-chernobyl-virus/</a></p><p> </p><p><strong>Rant of the Week (17:35)</strong></p><p><a href="https://www.theregister.com/2023/04/21/meta_encryption_police/">International cops urge Meta <i>not</i> to implement secure encryption for all</a></p><p>Why? Well, think of the children, of course</p><p>An international group of law enforcement agencies are urging Meta not to standardize end-to-end encryption on Facebook Messenger and Instagram, which they say will harm their ability to fight child sexual abuse material (CSAM) online.</p><p>The Virtual Global Taskforce was formed in 2003 and is currently chaired by Britain's National Crime Agency. The VGT consists of 15 law enforcement bodies, including Interpol, the FBI, the Australian Federal Police and other law enforcement agencies from around the world. In its <a href="https://nationalcrimeagency.gov.uk/who-we-are/publications/646-vgt-end-to-end-encryption-statement-april-2023/file">letter</a> [PDF], the VGT said reports from tech industry partners play a key role in fighting CSAM content, with Meta being its leading reporter of abuse material.</p><p>But the taskforce thinks that will end if Meta continues its encryption push. "The VGT has not yet seen any indication from META that any new safety systems implemented post-E2EE will effectively match or improve their current detection methods," the taskforce said. </p><p> </p><p><strong>Billy Big Balls of the Week (28:07)</strong></p><p>After 13 years, Google has finally added syncing to Google Authenticator in iOS and Android.</p><p> By adding sync, you no longer need to worry about losing access to your online accounts. If you lose your phone, just restore them on a new device.</p><p>All good, right?  Err…</p><p><a href="https://twitter.com/mysk_co/status/1651021165727477763">https://twitter.com/mysk_co/status/1651021165727477763</a></p><p>Yes, Google syncs your 2FA codes via HTTPS.  But Mysk found out they weren’t end-to-end encrypted.  In short, Google can see your 2FA codes.  Furthermore, anyone who can access your Google account (such as law enforcement) can access your 2FA codes.</p><p>Oh dear…</p><p><a href="https://twitter.com/christiaanbrand/status/1651279598309744640">https://twitter.com/christiaanbrand/status/1651279598309744640</a></p><p>In response, Google said it had:</p><p><i>“We’re always focused on the safety and security of Google users, and the newest updates to Google Authenticator was no exception.”</i></p><p><i>“Plans to offer E2EE for Google Authenticator down the line.”</i></p><p><i>“Right now, we believe that our current product strikes the right balance for most users and provides significant benefits over offline use. However, the option to use the app offline will remain an alternative for those who prefer to manage their backup strategy themselves.”</i></p><p>What impressive balls of Google to introduce this new feature to a security/privacy product - after 13 years! - and brazenly do it in an insecure way.!</p><p> </p><p><strong>Industry News (37:43)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/american-bar-association-breach-1/">American Bar Association Breach Hits 1.5 Million Members</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-takedowns-people/">Thousands of Social Media Takedowns Hit People Smugglers</a></p><p><a href="https://www.infosecurity-magazine.com/news/black-basta-hits-yellow-pages/">Yellow Pages Canada Hit by Cyber-Attack, Black Basta Claims Credit</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cyber-pros-burnt-out-and/">UK Cyber Pros Burnt Out and Overwhelmed</a></p><p><a href="https://www.infosecurity-magazine.com/news/quad-info-sharing-critical/">Quad Countries Prepare For Info Sharing on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-flaw-patched-vmware/">Critical Flaw Patched in VMware Workstation and Fusion</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-arrested-selling-data/">Man Arrested for Selling Data on 300 Million Victims to Russians</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-blames-clop-affiliate/">Microsoft Blames Clop Affiliate for PaperCut Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt-groups-expand-reach-to-new/">APT Groups Expand Reach to New Industries and Geographies</a></p><p> </p><p><strong>Tweet of the Week (45:06)</strong></p><p><a href="https://twitter.com/vxunderground/status/1651384225692786689">https://twitter.com/vxunderground/status/1651384225692786689</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48650356" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/4451f7fd-7797-40bc-afca-1e35d063be5a/audio/b4c682b1-a46a-444a-8377-b476ae834a84/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 149 - It&apos;s That Man Again (Again)</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Graham Cluley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8bc38686-43ee-4482-a4b8-5dc5f1b6a0c9/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:40</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a move out of the acquisition playbook
 
Rant of the Week asks Meta to think of the children

Billy Big Balls is a tale of 2 FA 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a criminal group with a moral compass</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a move out of the acquisition playbook
 
Rant of the Week asks Meta to think of the children

Billy Big Balls is a tale of 2 FA 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a criminal group with a moral compass</itunes:subtitle>
      <itunes:keywords>skype, chernobyl/cih, papercut, yellow pages\, zoom, lockbit, google, microsoft, vgt, day-care, 2fa, meta, csam</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6b8eeb99-501f-4e62-b731-e3a3975e05d0</guid>
      <title>Episode 148 - The Short And Not-So-Sweet Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>19th April 1965: <a href="http://en.wikipedia.org/wiki/Electronics_(magazine)">Electronics magazine</a> publishes an article by <a href="http://en.wikipedia.org/wiki/Gordon_Moore">Gordon Moore</a>, head of research and development for <a href="http://en.wikipedia.org/wiki/Fairchild_Semiconductor">Fairchild Semiconductor</a> and future co-founder of Intel, on the future of semiconductor components. In the article, Moore predicts that transistor density on <a href="http://en.wikipedia.org/wiki/Integrated_circuits">integrated circuits</a> will double every eighteen months for “at least” the next ten years. This theory will eventually come to be known as <a href="http://en.wikipedia.org/wiki/Moore%27s_Law">Moore’s Law</a> and has largely held true to this day. Controversy exists over whether Moore’s Law remains applicable, however time will tell just how long Moore’s Law will continue to remain true.</p><p> </p><p>19th April 2010: The OWASP Top 10 for 2010 was officially released.</p><p><a href="http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease">http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease</a></p><p><a href="https://twitter.com/todayininfosec/status/1251895022598803457">https://twitter.com/todayininfosec/status/1251895022598803457</a>  </p><p> </p><p>Rant of the Week</p><p>Background: <a href="https://www.theregister.com/2023/04/18/capita_breach_gets_worse/">Capita IT breach gets worse as Black Basta claims it's now selling off stolen data</a></p><p>Black Basta, the extortionists who claimed they were the ones who lately broke into Capita, have reportedly put up for sale sensitive details, including bank account information, addresses, and passport photos, stolen from the IT outsourcing giant.</p><p>A spokesperson for the London-based corporation, which has UK government contracts totaling £6.5 billion ($8 billion), originally said it hadn't yet confirmed if that data leak is legit.</p><p>"We are in constant contact with all relevant regulators and authorities. Our investigations have not yet been able to confirm any evidence of customer, supplier, or colleague data having been compromised."</p><p>They stated that once they’d finalised their own probe, Capita said it will "if necessary" inform all parties affected in the security breach.</p><p>"We have taken all appropriate steps to ensure the robustness of our systems and are confident in our ability to meet our service delivery commitments," the spokesperson said.</p><p>The technology outsourcer at first confirmed it had suffered an "<a href="https://www.theregister.com/2023/03/31/capita_confirms_it_outage/">IT issue</a>" late last month, though didn't cop to it being a "<a href="https://www.theregister.com/2023/04/03/capita_confirms_security_attack_as/">cyber incident</a>" until April 3.</p><p>Over the weekend, the <a href="https://www.thetimes.co.uk/article/capita-faces-deepening-hack-crisis-bstqkjcqq">Sunday Times</a> claimed the IT breach was worse than Capita has admitted to date: Capita has played down fears that personal and corporate information was accessed, though it appears the miscreants who broke into the business have started selling off that very kind of data, said to be lifted from Capita's systems.</p><p><a href="https://www.theregister.com/2023/04/20/capita_admits_to_evidence_that/">Capita has 'evidence' customer data was stolen in digital burglary</a></p><p>Business process outsourcing and tech services player Capita says there is proof that some customer data was scooped up by cyber baddies that broke into its systems late last month.</p><p>The British listed business, which has around £6.5 billion ($8.09 billion) in public sector contracts, <a href="https://www.londonstockexchange.com/news-article/CPI/statement-re-update-on-cyber-incident/15923779">updated the London Stock Exchange thursday morning</a> to confirm the criminals breached its infrastructure on March 22 and remained inside until “interrupted” by the company on March 31.</p><p>“As a result of the interruption, the incident was significantly restricted, potentially affecting around 4 percent of Capita’s server estate. There is currently some evidence of limited data exfiltration from the small proportion of affected server estate which might include customer, supplier or colleague data.”</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>We would have talked about “<a href="https://www.theregister.com/2023/04/20/3cx_supply_chain_attack/">An earlier supply chain attack led to the 3CX supply chain attack, Mandiant says</a>” if we were doing a BBB</p><p> </p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/uks-smes-to-benefit-from-new-cyber/">UK's SMEs to Benefit From New Cyber Advisors</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-safety-bill-threatens-user/">WhatsApp, Signal Claim Online Safety Bill Threatens User Privacy and Safety</a></p><p><a href="https://www.infosecurity-magazine.com/news/pegasus-spyware-found-high-risk/">NSO Group's Pegasus Spyware Found on High-Risk iPhones</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-russian-attacks-critical/">NCSC Warns of Destructive Russian Attacks on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-12m-fine-secretly-recording/">Police Escape $1.2m Fine For Secretly Recording Phone Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/recycled-network-exposing/">Recycled Network Devices Exposing Corporate Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-related-malicious-urls-rise/">ChatGPT-Related Malicious URLs on the Rise</a></p><p><a href="https://www.infosecurity-magazine.com/news/daggerfly-apt-targets-african/">Daggerfly APT Targets African Telecoms Firm With New MgBot Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hacker-suspected-3cx/">North Korean Hacker Suspected in 3CX Software Supply Chain Attack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img /><p><a href="https://twitter.com/quentynblog/status/1649302927910002689">https://twitter.com/quentynblog/status/1649302927910002689</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 21 Apr 2023 14:36:31 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-148-the-short-and-not-so-sweet-episode-lCUHwsJ8</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>19th April 1965: <a href="http://en.wikipedia.org/wiki/Electronics_(magazine)">Electronics magazine</a> publishes an article by <a href="http://en.wikipedia.org/wiki/Gordon_Moore">Gordon Moore</a>, head of research and development for <a href="http://en.wikipedia.org/wiki/Fairchild_Semiconductor">Fairchild Semiconductor</a> and future co-founder of Intel, on the future of semiconductor components. In the article, Moore predicts that transistor density on <a href="http://en.wikipedia.org/wiki/Integrated_circuits">integrated circuits</a> will double every eighteen months for “at least” the next ten years. This theory will eventually come to be known as <a href="http://en.wikipedia.org/wiki/Moore%27s_Law">Moore’s Law</a> and has largely held true to this day. Controversy exists over whether Moore’s Law remains applicable, however time will tell just how long Moore’s Law will continue to remain true.</p><p> </p><p>19th April 2010: The OWASP Top 10 for 2010 was officially released.</p><p><a href="http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease">http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease</a></p><p><a href="https://twitter.com/todayininfosec/status/1251895022598803457">https://twitter.com/todayininfosec/status/1251895022598803457</a>  </p><p> </p><p>Rant of the Week</p><p>Background: <a href="https://www.theregister.com/2023/04/18/capita_breach_gets_worse/">Capita IT breach gets worse as Black Basta claims it's now selling off stolen data</a></p><p>Black Basta, the extortionists who claimed they were the ones who lately broke into Capita, have reportedly put up for sale sensitive details, including bank account information, addresses, and passport photos, stolen from the IT outsourcing giant.</p><p>A spokesperson for the London-based corporation, which has UK government contracts totaling £6.5 billion ($8 billion), originally said it hadn't yet confirmed if that data leak is legit.</p><p>"We are in constant contact with all relevant regulators and authorities. Our investigations have not yet been able to confirm any evidence of customer, supplier, or colleague data having been compromised."</p><p>They stated that once they’d finalised their own probe, Capita said it will "if necessary" inform all parties affected in the security breach.</p><p>"We have taken all appropriate steps to ensure the robustness of our systems and are confident in our ability to meet our service delivery commitments," the spokesperson said.</p><p>The technology outsourcer at first confirmed it had suffered an "<a href="https://www.theregister.com/2023/03/31/capita_confirms_it_outage/">IT issue</a>" late last month, though didn't cop to it being a "<a href="https://www.theregister.com/2023/04/03/capita_confirms_security_attack_as/">cyber incident</a>" until April 3.</p><p>Over the weekend, the <a href="https://www.thetimes.co.uk/article/capita-faces-deepening-hack-crisis-bstqkjcqq">Sunday Times</a> claimed the IT breach was worse than Capita has admitted to date: Capita has played down fears that personal and corporate information was accessed, though it appears the miscreants who broke into the business have started selling off that very kind of data, said to be lifted from Capita's systems.</p><p><a href="https://www.theregister.com/2023/04/20/capita_admits_to_evidence_that/">Capita has 'evidence' customer data was stolen in digital burglary</a></p><p>Business process outsourcing and tech services player Capita says there is proof that some customer data was scooped up by cyber baddies that broke into its systems late last month.</p><p>The British listed business, which has around £6.5 billion ($8.09 billion) in public sector contracts, <a href="https://www.londonstockexchange.com/news-article/CPI/statement-re-update-on-cyber-incident/15923779">updated the London Stock Exchange thursday morning</a> to confirm the criminals breached its infrastructure on March 22 and remained inside until “interrupted” by the company on March 31.</p><p>“As a result of the interruption, the incident was significantly restricted, potentially affecting around 4 percent of Capita’s server estate. There is currently some evidence of limited data exfiltration from the small proportion of affected server estate which might include customer, supplier or colleague data.”</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>We would have talked about “<a href="https://www.theregister.com/2023/04/20/3cx_supply_chain_attack/">An earlier supply chain attack led to the 3CX supply chain attack, Mandiant says</a>” if we were doing a BBB</p><p> </p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/uks-smes-to-benefit-from-new-cyber/">UK's SMEs to Benefit From New Cyber Advisors</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-safety-bill-threatens-user/">WhatsApp, Signal Claim Online Safety Bill Threatens User Privacy and Safety</a></p><p><a href="https://www.infosecurity-magazine.com/news/pegasus-spyware-found-high-risk/">NSO Group's Pegasus Spyware Found on High-Risk iPhones</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-russian-attacks-critical/">NCSC Warns of Destructive Russian Attacks on Critical Infrastructure</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-12m-fine-secretly-recording/">Police Escape $1.2m Fine For Secretly Recording Phone Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/recycled-network-exposing/">Recycled Network Devices Exposing Corporate Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-related-malicious-urls-rise/">ChatGPT-Related Malicious URLs on the Rise</a></p><p><a href="https://www.infosecurity-magazine.com/news/daggerfly-apt-targets-african/">Daggerfly APT Targets African Telecoms Firm With New MgBot Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hacker-suspected-3cx/">North Korean Hacker Suspected in 3CX Software Supply Chain Attack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img /><p><a href="https://twitter.com/quentynblog/status/1649302927910002689">https://twitter.com/quentynblog/status/1649302927910002689</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="31768566" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/227866ab-11a9-455d-8f95-1d30081e471e/audio/49aada7c-b127-4563-86f2-48e9d222420c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 148 - The Short And Not-So-Sweet Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3a1b3808-ef48-43d5-be02-eb26d27d52e7/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:05</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the time of Moore computing power

Rant of the Week is a “nothing to see here” story from the outsourcers who handle government tech contracts worth billions

Billy Big Balls is off the air today

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is musings from an old man</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the time of Moore computing power

Rant of the Week is a “nothing to see here” story from the outsourcers who handle government tech contracts worth billions

Billy Big Balls is off the air today

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is musings from an old man</itunes:subtitle>
      <itunes:keywords>moores law, capita, chat-gpt, 3cx supply chain, old man, owasp</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>148</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">498f9458-4e37-46a9-9e16-a1dcf6ceb93e</guid>
      <title>Episode 147 - John Wick Seventeen and Three Quarters</title>
      <description><![CDATA[<p><strong>This week in InfoSec (08:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th April 2002: A hacker compromised a server containing California's payroll database. The state's Controller's Office waited 2 weeks to warn victims. As a result angry lawmakers reacted by passing the first state data breach notification law in the US, SB 1386. </p><p> </p><p><a href="https://twitter.com/todayininfosec/status/1643711958032719874">https://twitter.com/todayininfosec/status/1643711958032719874</a>  </p><p>6th April 2011: The Georgian interior ministry announced that a 75-year-old woman was charged after she disrupted Internet service in neighbouring Armenia.</p><p>An elderly woman scavenging for copper? Add that to your DoS threat modelling diagram!</p><p><a href="https://www.bbc.co.uk/news/world-europe-12985082">https://www.bbc.co.uk/news/world-europe-12985082</a></p><p><a href="https://twitter.com/todayininfosec/status/1643964851188912129">https://twitter.com/todayininfosec/status/1643964851188912129</a></p><p> </p><p><strong>Rant of the Week (14:53)</strong></p><p><a href="https://www.theregister.com/2023/04/13/alleged_pentagon_leaker_arrested/">Pentagon super-leak suspect cuffed: 21-year-old Air National Guardsman</a></p><p>The FBI has detained a 21-year-old Air National Guardsman suspected of leaking a trove of classified Pentagon documents on Discord.</p><p>US Attorney General Merrick Garland <a href="https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-statement-classified-national-defense">confirmed</a> the arrest, saying Jack Douglas Teixeira of the United States Air Force National Guard in Massachusetts was nabbed earlier today.</p><p>The suspect was being held "in connection with an investigation into alleged unauthorized removal, retention, and transmission of classified national defense information," the AG said.</p><p>The Washington Post reported yesterday that whoever leaked the files was thought to be a twenty-something American who <a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">liked gaming and guns</a>, and worked on a military base.</p><p>It's said he also controlled a private Discord server, and allegedly posted photographs of the classified Pentagon documents to impress the private group's 25 members, which included netizens in Europe, Asia, and South America.</p><p>It is believed those classified files were shared beyond that Discord chat, and <a href="https://www.theregister.com/2023/04/07/us_military_plans_leak/">surfaced</a> in one form or another on social media, where it all spread like wildfire. The documents were said to be war plans detailing secret US and NATO support for a Ukrainian offensive to regain land invaded by Russia, and that American and British special forces were already in Ukraine.</p><p> </p><p><strong>Billy Big Balls of the Week (28:05)</strong></p><p><a href="https://www.theregister.com/2023/04/14/aviations_just_culture_improves_cybersecurity/">To improve security, consider how the aviation industry stopped blaming pilots</a></p><p>To improve security, the cybersecurity industry needs to follow the aviation industry's shift from a blame culture to a "just" culture, according to director of the Information Systems </p><p>Audit and Control Association Serge Christiaans.</p><p>Speaking at Singapore's <a href="https://www.singaporetechnologyweek.com/smart-cybersecurity-summit-singapore-2023/smart-cybersecurity-summit-conference-programme">Smart Cybersecurity Summit</a> this week, Christiaans explained that until around 1990, the number of fatal commercial jet accidents was <a href="https://accidentstats.airbus.com/statistics/fatal-accidents">growing</a> alongside a steady increase of commercial flights. But around the turn of the decade, the number of flights continued to rise while the number of fatalities began to drop.</p><p>According to <a href="https://www.faa.gov/about/initiatives/maintenance_hf/library/documents/media/aviation_maintenance/ntsb_takes_unusual_step_to_address_plane_crash.pdf">one analysis,</a> [PDF] the rate of fatal accidents fell from nine per 10 million flights in the 80s to six per 10 million in the 90s. Between 1995 and 2001, that figure was three per 10 million.</p><p>“There was a big game changer,” Christiaans told the Summit. “Millions of people a day now fly in commercial aviation, and nothing happens.”</p><p>While acknowledging that improved technology, more mature processes and improved leadership all helped to improve aviation safety, the former pilot and field CISO at tech consultancy Sopra Steria said the biggest improvements came from a change to a “just culture” that accepts people will make mistakes and by doing so makes it more likely errors will be reported.</p><p>In a just culture, errors are viewed as learning opportunities instead of moral failing, creating transparency and enabling constant improvement.</p><p>“We're not trying to blame, we're not trying to point fingers, we're trying to find the reasons behind the mistake,” said Christiaans. “There are of course, exceptions like negligence where of course you will be punished by law. But otherwise, if you speak up freely, you will not be punished.”</p><p>and...</p><p><a href="https://www.theregister.com/2023/04/14/microsoft_linkedin_id_verify/">While Twitter wants to sell its verification, Microsoft will do it for free on LinkedIn</a></p><p>As Elon Musk tears at Twitter's credibility by demanding businesses and individuals pay for their blue verification checks, Microsoft is pushing ts own free digital ID technology to companies and their employees on LinkedIn.</p><p>Later this month, Microsoft will let organizations use its <a href="https://learn.microsoft.com/en-us/azure/active-directory/verifiable-credentials/decentralized-identifier-overview">Verified ID</a> tool to prove their workers' employment, with staff then being able to display that employment verification on their LinkedIn profiles.</p><p>Like the trust the unpaid-for blue check mark on Twitter once conveyed, the Verified ID on LinkedIn will show that the people on the business-focused network – which has about 900 million users – work at where they say they work.</p><p>"By simply looking for a Verification, members and organizations can be more confident that the people they collaborate with are authentic and that work affiliations on their profiles are accurate," <a href="https://www.microsoft.com/en-us/security/blog/2023/04/12/linkedin-and-microsoft-entra-introduce-a-new-way-to-verify-your-workplace/">wrote</a> Joy Chik, president of identity and network access at Microsoft.</p><p> </p><p><strong>Industry News (38:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/latitude-financial-refuses-to-pay/">Latitude Financial Refuses to Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/kfc-owner-discloses-data-breach/">KFC Owner Discloses Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-scrambles-to-investigate/">US Scrambles to Investigate Military Intel Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/ethical-hackers-chatgpt/">Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities</a></p><p><a href="https://www.infosecurity-magazine.com/news/rapid7-has-good-news-for-uk/">Rapid7 Has Good News for UK Security Posture</a></p><p><a href="https://www.infosecurity-magazine.com/news/superyachtmaker-easter-ransomware/">Superyacht-Maker Hit by Easter Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt36-disrupt-indian-education/">Pakistan-Aligned Hackers Disrupt Indian Education Sector</a></p><p><a href="https://www.infosecurity-magazine.com/news/20000-iowa-medicaid-members-data/">Over 20,000 Iowa Medicaid Members Affected By Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-arrests-98m-investment-fraud/">Five Arrests in Crackdown on $98m Investment Fraud Gang</a></p><p> </p><p><strong>Tweet of the Week (47:18)</strong></p><img src="https://lh6.googleusercontent.com/sqNV5LDfLhdumj8dhT3ZqjZku1oluIf8b9dY5PHHDr02XM96vDwBvOxJ7dRbgDpQKP2f0lFNWdNPiYz33R4jTp8Y21sJVxRweJTJ9J2BKe0s4v4gnVH-frVNZkd4R-IZeLzUiH7CEfpk89gdy0sR1lk" /><p><a href="https://twitter.com/DeathsPirate/status/1646840360478359553">https://twitter.com/DeathsPirate/status/1646840360478359553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 Apr 2023 18:11:31 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-147-john-wick-seventeen-and-three-quarters-2GmRFqEw</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (08:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>5th April 2002: A hacker compromised a server containing California's payroll database. The state's Controller's Office waited 2 weeks to warn victims. As a result angry lawmakers reacted by passing the first state data breach notification law in the US, SB 1386. </p><p> </p><p><a href="https://twitter.com/todayininfosec/status/1643711958032719874">https://twitter.com/todayininfosec/status/1643711958032719874</a>  </p><p>6th April 2011: The Georgian interior ministry announced that a 75-year-old woman was charged after she disrupted Internet service in neighbouring Armenia.</p><p>An elderly woman scavenging for copper? Add that to your DoS threat modelling diagram!</p><p><a href="https://www.bbc.co.uk/news/world-europe-12985082">https://www.bbc.co.uk/news/world-europe-12985082</a></p><p><a href="https://twitter.com/todayininfosec/status/1643964851188912129">https://twitter.com/todayininfosec/status/1643964851188912129</a></p><p> </p><p><strong>Rant of the Week (14:53)</strong></p><p><a href="https://www.theregister.com/2023/04/13/alleged_pentagon_leaker_arrested/">Pentagon super-leak suspect cuffed: 21-year-old Air National Guardsman</a></p><p>The FBI has detained a 21-year-old Air National Guardsman suspected of leaking a trove of classified Pentagon documents on Discord.</p><p>US Attorney General Merrick Garland <a href="https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-statement-classified-national-defense">confirmed</a> the arrest, saying Jack Douglas Teixeira of the United States Air Force National Guard in Massachusetts was nabbed earlier today.</p><p>The suspect was being held "in connection with an investigation into alleged unauthorized removal, retention, and transmission of classified national defense information," the AG said.</p><p>The Washington Post reported yesterday that whoever leaked the files was thought to be a twenty-something American who <a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">liked gaming and guns</a>, and worked on a military base.</p><p>It's said he also controlled a private Discord server, and allegedly posted photographs of the classified Pentagon documents to impress the private group's 25 members, which included netizens in Europe, Asia, and South America.</p><p>It is believed those classified files were shared beyond that Discord chat, and <a href="https://www.theregister.com/2023/04/07/us_military_plans_leak/">surfaced</a> in one form or another on social media, where it all spread like wildfire. The documents were said to be war plans detailing secret US and NATO support for a Ukrainian offensive to regain land invaded by Russia, and that American and British special forces were already in Ukraine.</p><p> </p><p><strong>Billy Big Balls of the Week (28:05)</strong></p><p><a href="https://www.theregister.com/2023/04/14/aviations_just_culture_improves_cybersecurity/">To improve security, consider how the aviation industry stopped blaming pilots</a></p><p>To improve security, the cybersecurity industry needs to follow the aviation industry's shift from a blame culture to a "just" culture, according to director of the Information Systems </p><p>Audit and Control Association Serge Christiaans.</p><p>Speaking at Singapore's <a href="https://www.singaporetechnologyweek.com/smart-cybersecurity-summit-singapore-2023/smart-cybersecurity-summit-conference-programme">Smart Cybersecurity Summit</a> this week, Christiaans explained that until around 1990, the number of fatal commercial jet accidents was <a href="https://accidentstats.airbus.com/statistics/fatal-accidents">growing</a> alongside a steady increase of commercial flights. But around the turn of the decade, the number of flights continued to rise while the number of fatalities began to drop.</p><p>According to <a href="https://www.faa.gov/about/initiatives/maintenance_hf/library/documents/media/aviation_maintenance/ntsb_takes_unusual_step_to_address_plane_crash.pdf">one analysis,</a> [PDF] the rate of fatal accidents fell from nine per 10 million flights in the 80s to six per 10 million in the 90s. Between 1995 and 2001, that figure was three per 10 million.</p><p>“There was a big game changer,” Christiaans told the Summit. “Millions of people a day now fly in commercial aviation, and nothing happens.”</p><p>While acknowledging that improved technology, more mature processes and improved leadership all helped to improve aviation safety, the former pilot and field CISO at tech consultancy Sopra Steria said the biggest improvements came from a change to a “just culture” that accepts people will make mistakes and by doing so makes it more likely errors will be reported.</p><p>In a just culture, errors are viewed as learning opportunities instead of moral failing, creating transparency and enabling constant improvement.</p><p>“We're not trying to blame, we're not trying to point fingers, we're trying to find the reasons behind the mistake,” said Christiaans. “There are of course, exceptions like negligence where of course you will be punished by law. But otherwise, if you speak up freely, you will not be punished.”</p><p>and...</p><p><a href="https://www.theregister.com/2023/04/14/microsoft_linkedin_id_verify/">While Twitter wants to sell its verification, Microsoft will do it for free on LinkedIn</a></p><p>As Elon Musk tears at Twitter's credibility by demanding businesses and individuals pay for their blue verification checks, Microsoft is pushing ts own free digital ID technology to companies and their employees on LinkedIn.</p><p>Later this month, Microsoft will let organizations use its <a href="https://learn.microsoft.com/en-us/azure/active-directory/verifiable-credentials/decentralized-identifier-overview">Verified ID</a> tool to prove their workers' employment, with staff then being able to display that employment verification on their LinkedIn profiles.</p><p>Like the trust the unpaid-for blue check mark on Twitter once conveyed, the Verified ID on LinkedIn will show that the people on the business-focused network – which has about 900 million users – work at where they say they work.</p><p>"By simply looking for a Verification, members and organizations can be more confident that the people they collaborate with are authentic and that work affiliations on their profiles are accurate," <a href="https://www.microsoft.com/en-us/security/blog/2023/04/12/linkedin-and-microsoft-entra-introduce-a-new-way-to-verify-your-workplace/">wrote</a> Joy Chik, president of identity and network access at Microsoft.</p><p> </p><p><strong>Industry News (38:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/latitude-financial-refuses-to-pay/">Latitude Financial Refuses to Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/kfc-owner-discloses-data-breach/">KFC Owner Discloses Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-scrambles-to-investigate/">US Scrambles to Investigate Military Intel Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/ethical-hackers-chatgpt/">Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities</a></p><p><a href="https://www.infosecurity-magazine.com/news/rapid7-has-good-news-for-uk/">Rapid7 Has Good News for UK Security Posture</a></p><p><a href="https://www.infosecurity-magazine.com/news/superyachtmaker-easter-ransomware/">Superyacht-Maker Hit by Easter Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt36-disrupt-indian-education/">Pakistan-Aligned Hackers Disrupt Indian Education Sector</a></p><p><a href="https://www.infosecurity-magazine.com/news/20000-iowa-medicaid-members-data/">Over 20,000 Iowa Medicaid Members Affected By Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-arrests-98m-investment-fraud/">Five Arrests in Crackdown on $98m Investment Fraud Gang</a></p><p> </p><p><strong>Tweet of the Week (47:18)</strong></p><img src="https://lh6.googleusercontent.com/sqNV5LDfLhdumj8dhT3ZqjZku1oluIf8b9dY5PHHDr02XM96vDwBvOxJ7dRbgDpQKP2f0lFNWdNPiYz33R4jTp8Y21sJVxRweJTJ9J2BKe0s4v4gnVH-frVNZkd4R-IZeLzUiH7CEfpk89gdy0sR1lk" /><p><a href="https://twitter.com/DeathsPirate/status/1646840360478359553">https://twitter.com/DeathsPirate/status/1646840360478359553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50837954" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/dc00d9ca-0a68-4d99-af7c-48bc76e43318/audio/2c768808-98f7-49d7-b2a0-c34da4a27fe4/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 147 - John Wick Seventeen and Three Quarters</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f180cd78-09d1-4251-b813-457f816e8c8f/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:57</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to when one person brought down the internet service of a neighbouring country
 
Rant of the Week is the consequences of bragging about your classified job

Billy Big Balls aims to take a page out of a pilot’s playbook for the good of security
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is career advice from someone who builds security leaders</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to when one person brought down the internet service of a neighbouring country
 
Rant of the Week is the consequences of bragging about your classified job

Billy Big Balls aims to take a page out of a pilot’s playbook for the good of security
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is career advice from someone who builds security leaders</itunes:subtitle>
      <itunes:keywords>ukraine, just culture, georgia, pentagon leak, verified id, armenia, cybersecurity charlatan\, blame culture, california</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>147</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">78cd3ef8-9c59-46c0-be59-4d2c5957dd53</guid>
      <title>Episode 146 - The Hungry Hungry Caterpillar</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:33)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th March 2010: OpenSSL version 1.0.0 was released. It's easy to take for granted how pervasive the open source library is in the myriad of technologies used to transmit data over the internet and other networks. Take a moment to think about it. </p><p><a href="https://twitter.com/todayininfosec/status/1641215201197412352">https://twitter.com/todayininfosec/status/1641215201197412352</a></p><p>25th March 2010: 2010: Albert Gonzalez was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington and is scheduled to be released in less than 4 months.</p><p><a href="https://www.bop.gov/inmateloc/">Find an inmate</a>: BOP Register Number 25702-050</p><p><a href="https://twitter.com/todayininfosec/status/1639657037935067137">https://twitter.com/todayininfosec/status/1639657037935067137</a>  </p><p> </p><p><strong>Rant of the Week (13:55)</strong></p><p><a href="https://www.theregister.com/2023/03/31/nhs_highland_reprimanded_by_data/">NHS Highland 'reprimanded' by data watchdog for BCC blunder with HIV patients</a></p><p>In a classic email snafu NHS Highland sent messages to 37 patients infected with HIV and inadvertently used carbon copy (CC) instead of Blind Carbon Copy meaning the recipients could see each other’s email addresses.</p><p>This is according to Britain’s data watchdog, the Information Commissioner’s Office, which has “reprimanded” the Health Board, which serves a regional population of some 320,000 people and has an annual operating budget of £780 million ($964 million).</p><p>The error took place in June 2019 when a member of staff opened the prior group email and copied all those on the list and emailed a newsletter to the the group of 37 “data subjects” - aka patients - without using BCC. Efforts to recall the mail failed.</p><p>Rather than issuing a £35,000 ($43,000) fine, the ICO is instead taking its “public sector approach” introduced in June 2022: working with senior leaders to “encourage compliance, prevent harms before they occur and learn lessons when things have gone wrong.”</p><p>The ICO described the email error as a “serious breach of trust.” In a statement, Stephen Bonner, ICO deputy commissioner for regulatory supervision, said of the mistake:</p><p>“The stakes are just too high. Research shows that people living with HIV have experienced stigma or discrimination due to their status, which means organisations dealing with this type of information should take the utmost care with their personal data.</p><p>“Every HIV service provider in this country should look at this case and see it as a crucial learning experience. We are calling on organisations to raise their data protection standards and put the appropriate measures in place to keep people safe,” he said.</p><p>The ICO said using BCC incorrectly is within the top 10 “non-cyber breaches, with nearly a thousand reported since 2019.” </p><p> </p><p><strong>Billy Big Balls of the Week (25:06)</strong></p><p><a href="https://www.theverge.com/2023/3/28/23659711/microsoft-security-copilot-gpt-4-ai-tool-features">Microsoft Security Copilot is a new GPT-4 AI assistant for cybersecurity</a></p><p>After announcing an AI-powered <a href="https://www.theverge.com/2023/3/17/23644501/microsoft-copilot-ai-office-documents-microsoft-365-report">Copilot assistant for Office apps</a>, Microsoft is now turning its attention to cybersecurity. <a href="https://click.linksynergy.com/deeplink?id=nOD/rLJHOac&mid=24542&u1=[]vg[p]23423752[t]w[r]https://www.theverge.com/cyber-security[d]D&murl=https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot">Microsoft Security Copilot</a> is a new assistant for cybersecurity professionals, designed to help defenders identify breaches and better understand the huge amounts of signals and data available to them daily.</p><p>Powered by OpenAI’s GPT-4 generative AI and Microsoft’s own security-specific model, Security Copilot looks like a simple prompt box like any other chatbot. You can ask “what are all the security incidents in my enterprise?” and it will summarize them. But behind the scenes, it’s making use of the 65 trillion daily signals Microsoft collects in its threat intelligence gathering and security-specific skills to let security professionals hunt down threats.</p><p>Microsoft Security Copilot is designed to assist a security analyst’s work rather than replace it — and even includes a pinboard section for co-workers to collaborate and share information. Security professionals can use the Security Copilot to help with incident investigations or to quickly summarize events and help with reporting.</p><p> </p><p><strong>Industry News (33:13) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/nca-harvests-info-ddosers-fake/">NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/macstealer-targets-macos-versions/">New MacStealer Targets Catalina, Newer MacOS Versions</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-bans-tiktok-fun-apps-govt/">France Bans TikTok, Other 'Fun' Apps From Government Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-vulnerability-payment/">ChatGPT Vulnerability May Have Exposed Users’ Payment Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/thieves-steal-9m-crypto-liquidity/">Thieves Steal $9m from Crypto Liquidity Pool</a></p><p><a href="https://www.infosecurity-magazine.com/news/nca-multimillionpound-fraud/">NCA Celebrates Multimillion-Pound Fraud Takedowns</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-hackers-trojanized-3cx/">North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/gchq-updates-security-guidance/">GCHQ Updates Security Guidance for Boards</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-hiv-data-protection-must/">UK Regulator: HIV Data Protection Must Improve</a></p><p> </p><p><strong>Tweet of the Week (41:24)</strong></p><img src="https://lh4.googleusercontent.com/HkwMcHu7HoLZOpoWEq4STKyLpQrXpWkH1FtgUjOVmHuGFs2ZNl1zkPWW1y-fUfasb8lupFLjYMPxCh8zUepQNz9k6-16EnUowbHZjPFJFjg3Oc0XEnLaqoJEVYgPRNiq817NRmuTTAzU5MG-1PYcOLQ" /><p><a href="https://twitter.com/TrungTPhan/status/1641480574996217858">https://twitter.com/TrungTPhan/status/1641480574996217858</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 31 Mar 2023 19:04:41 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-146-the-hungry-hungry-caterpillar-apCcA680</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:33)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th March 2010: OpenSSL version 1.0.0 was released. It's easy to take for granted how pervasive the open source library is in the myriad of technologies used to transmit data over the internet and other networks. Take a moment to think about it. </p><p><a href="https://twitter.com/todayininfosec/status/1641215201197412352">https://twitter.com/todayininfosec/status/1641215201197412352</a></p><p>25th March 2010: 2010: Albert Gonzalez was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington and is scheduled to be released in less than 4 months.</p><p><a href="https://www.bop.gov/inmateloc/">Find an inmate</a>: BOP Register Number 25702-050</p><p><a href="https://twitter.com/todayininfosec/status/1639657037935067137">https://twitter.com/todayininfosec/status/1639657037935067137</a>  </p><p> </p><p><strong>Rant of the Week (13:55)</strong></p><p><a href="https://www.theregister.com/2023/03/31/nhs_highland_reprimanded_by_data/">NHS Highland 'reprimanded' by data watchdog for BCC blunder with HIV patients</a></p><p>In a classic email snafu NHS Highland sent messages to 37 patients infected with HIV and inadvertently used carbon copy (CC) instead of Blind Carbon Copy meaning the recipients could see each other’s email addresses.</p><p>This is according to Britain’s data watchdog, the Information Commissioner’s Office, which has “reprimanded” the Health Board, which serves a regional population of some 320,000 people and has an annual operating budget of £780 million ($964 million).</p><p>The error took place in June 2019 when a member of staff opened the prior group email and copied all those on the list and emailed a newsletter to the the group of 37 “data subjects” - aka patients - without using BCC. Efforts to recall the mail failed.</p><p>Rather than issuing a £35,000 ($43,000) fine, the ICO is instead taking its “public sector approach” introduced in June 2022: working with senior leaders to “encourage compliance, prevent harms before they occur and learn lessons when things have gone wrong.”</p><p>The ICO described the email error as a “serious breach of trust.” In a statement, Stephen Bonner, ICO deputy commissioner for regulatory supervision, said of the mistake:</p><p>“The stakes are just too high. Research shows that people living with HIV have experienced stigma or discrimination due to their status, which means organisations dealing with this type of information should take the utmost care with their personal data.</p><p>“Every HIV service provider in this country should look at this case and see it as a crucial learning experience. We are calling on organisations to raise their data protection standards and put the appropriate measures in place to keep people safe,” he said.</p><p>The ICO said using BCC incorrectly is within the top 10 “non-cyber breaches, with nearly a thousand reported since 2019.” </p><p> </p><p><strong>Billy Big Balls of the Week (25:06)</strong></p><p><a href="https://www.theverge.com/2023/3/28/23659711/microsoft-security-copilot-gpt-4-ai-tool-features">Microsoft Security Copilot is a new GPT-4 AI assistant for cybersecurity</a></p><p>After announcing an AI-powered <a href="https://www.theverge.com/2023/3/17/23644501/microsoft-copilot-ai-office-documents-microsoft-365-report">Copilot assistant for Office apps</a>, Microsoft is now turning its attention to cybersecurity. <a href="https://click.linksynergy.com/deeplink?id=nOD/rLJHOac&mid=24542&u1=[]vg[p]23423752[t]w[r]https://www.theverge.com/cyber-security[d]D&murl=https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot">Microsoft Security Copilot</a> is a new assistant for cybersecurity professionals, designed to help defenders identify breaches and better understand the huge amounts of signals and data available to them daily.</p><p>Powered by OpenAI’s GPT-4 generative AI and Microsoft’s own security-specific model, Security Copilot looks like a simple prompt box like any other chatbot. You can ask “what are all the security incidents in my enterprise?” and it will summarize them. But behind the scenes, it’s making use of the 65 trillion daily signals Microsoft collects in its threat intelligence gathering and security-specific skills to let security professionals hunt down threats.</p><p>Microsoft Security Copilot is designed to assist a security analyst’s work rather than replace it — and even includes a pinboard section for co-workers to collaborate and share information. Security professionals can use the Security Copilot to help with incident investigations or to quickly summarize events and help with reporting.</p><p> </p><p><strong>Industry News (33:13) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/nca-harvests-info-ddosers-fake/">NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/macstealer-targets-macos-versions/">New MacStealer Targets Catalina, Newer MacOS Versions</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-bans-tiktok-fun-apps-govt/">France Bans TikTok, Other 'Fun' Apps From Government Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-vulnerability-payment/">ChatGPT Vulnerability May Have Exposed Users’ Payment Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/thieves-steal-9m-crypto-liquidity/">Thieves Steal $9m from Crypto Liquidity Pool</a></p><p><a href="https://www.infosecurity-magazine.com/news/nca-multimillionpound-fraud/">NCA Celebrates Multimillion-Pound Fraud Takedowns</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-hackers-trojanized-3cx/">North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/gchq-updates-security-guidance/">GCHQ Updates Security Guidance for Boards</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-hiv-data-protection-must/">UK Regulator: HIV Data Protection Must Improve</a></p><p> </p><p><strong>Tweet of the Week (41:24)</strong></p><img src="https://lh4.googleusercontent.com/HkwMcHu7HoLZOpoWEq4STKyLpQrXpWkH1FtgUjOVmHuGFs2ZNl1zkPWW1y-fUfasb8lupFLjYMPxCh8zUepQNz9k6-16EnUowbHZjPFJFjg3Oc0XEnLaqoJEVYgPRNiq817NRmuTTAzU5MG-1PYcOLQ" /><p><a href="https://twitter.com/TrungTPhan/status/1641480574996217858">https://twitter.com/TrungTPhan/status/1641480574996217858</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45154963" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/62c0802b-11a7-49cc-a0c5-f4c8b30cf95e/audio/46876a0f-c146-4444-aea5-af9e5ff1ffab/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 146 - The Hungry Hungry Caterpillar</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c3e03a89-4232-4053-99ad-c1e512d95948/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:02</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the birth of PCI-DSS
 
Rant of the Week is a top 10 hit with our friends at the ICO

Billy Big Balls aims to make everybody redundant
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week underscores the importance of never asking accountants to hire security professionals</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the birth of PCI-DSS
 
Rant of the Week is a top 10 hit with our friends at the ICO

Billy Big Balls aims to make everybody redundant
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week underscores the importance of never asking accountants to hire security professionals</itunes:subtitle>
      <itunes:keywords>nhs, copilot, tjx, ico, head of cyber security, hm treasury, ssl, hiv, tkmaxx</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>146</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3e36673c-7355-4c27-9567-076634798bfd</guid>
      <title>Episode 145 - The Being Shouted at Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (12:47)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>22nd March 2018: The city of Atlanta announced it was victim to a ransomware attack. The attackers demanded $51,000 worth of bitcoin to release the encrypted data, but Atlanta didn't pay the ransom. Whether or not to pay ransom isn't a simple or easy matter, but this proved to be expensive. </p><img src="https://lh3.googleusercontent.com/-DiI7ADXLElnIJX4bMjRpVqobyNNCMovBT2WEciC2b6NfvqbYQ6qp340ZqV23TAFnJOZfA0dugt8U2GxjsSv4GczDVyXyqkGPDx9JGKkEk3Ll-pBGSjHmWbpEjDuNbwtU6_oHZPGpokJQltMIKRHfmY" /><p><a href="https://twitter.com/todayininfosec/status/1638513067259510786">https://twitter.com/todayininfosec/status/1638513067259510786</a></p><p> </p><p>21st March 2001: SMBRelay and SMBRelay2 were released by Sir Dystic at the<a href="https://twitter.com/lantacon"> @lantacon</a> convention in Atlanta, Georgia. The tools were developed to carry out SMB man-in-the-middle attacks on Windows machines.</p><img src="https://lh5.googleusercontent.com/UTogLP1nIa9dUTmDq9fx5MAKC-OET9JZWJpV2PVkVnS2PO-lYN1MOrCmiHvwIi3tcmsefhYNj4Zi2RTyGimKE5pIuR3h3yE-Gy50FPJjqHX6X6vYr9noV740f8RPlk_jjklAtBo76L9qaeOD8bSDTzc" /><p><a href="https://en.m.wikipedia.org/wiki/SMBRelay">SMBRelay</a></p><p><a href="https://twitter.com/todayininfosec/status/1638327435434291201">https://twitter.com/todayininfosec/status/1638327435434291201</a>  </p><p> </p><p><strong>Rant of the Week (19:43)</strong></p><p><a href="https://twitter.com/keewa/status/1638853767448735744">https://twitter.com/keewa/status/1638853767448735744</a></p><img src="https://lh5.googleusercontent.com/klXtf4buBRCkiaeZ616Jv25eUjSqmiNwtZ9tnRjD_HUhPRxgeNaGCjpLG_kg_tWJiySchlXl7VV52Rg6At7nWSyWfKD043N75XYhsxfY5z7USphK-a9f0wQIe2JfOMTTdGdcvk5UJxo5UZJZR3mHjus" /><img src="https://lh4.googleusercontent.com/XB_CxsjnruoNilbXspNyZLkprL1AegBGVMMzMa3zXYsr5rJ6LWs-Jp6Ecc0palKUOO5umZee_UJEyiospz_Ch40wyUKxF0kP3XuT5_RwnJB0nTutBXlLu754503kws14he1bpjpIJAnkd5v0ySiUfO0" /><p> </p><p><strong>Billy Big Balls of the Week (29:08)</strong></p><p><a href="https://www.bbc.co.uk/news/world-latin-america-65026522">Journalist opens USB letter bomb in newsroom</a></p><p>Journalists across Ecuador have been targeted by explosive devices sent through the post.</p><p>One presenter, Lenin Artieda, was injured when he opened the envelope in the middle of the newsroom.</p><p>He said the explosive device looked like a USB drive. He plugged it into his computer and it detonated.</p><p>The Ecuadorean attorney-general's department confirmed it had opened a terrorism investigation into the letters on Monday.</p><p>It did not name the specific news outlets targeted. However, at least five different organisations across Ecuador were sent the letters.</p><p>The government has condemned the attacks, describing freedom of expression as "a right that must be respected".</p><p>"Any attempt to intimidate journalism and freedom of expression is a loathsome action that should be punished with all the rigour of justice," it said in a statement.</p><p>The interior minister, Juan Zapata, said the devices were all sent from the same town. Three were sent to media outlets in Guayaquil and two to the capital, Quito.</p><p>While Mr Artieda was injured by the device, others sent through the post failed to explode or were never opened.</p><p>Police carried out a controlled detonation of one of the devices sent to TC Television, prosecutors confirmed.</p><p><a href="https://twitter.com/_MG_/status/916137290711183360">From 2017, Mr Self Destruct v1</a></p><p> </p><p><strong>Industry News (36:51) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/ferrari-reveals-data-breach-ransom/">Ferrari Reveals Data Breach Ransom Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/1-dotorg-domains-dmarc-protected/">Just 1% of Dot-Org Domains Are Fully DMARC Protected</a></p><p><a href="https://www.infosecurity-magazine.com/news/breachforums-shuts-admins-arrest/">BreachForums Shuts Down After Admin's Arrest</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-chatgpt-chrome-hijacks/">Malicious ChatGPT Chrome Extension Hijacks Facebook Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-sets-out-vision-nhs/">UK Government Sets Out Vision for NHS Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/attack-method-affect-okta-passwords/">New Post-Exploitation Attack Method Found Affecting Okta Passwords</a></p><p><a href="https://www.infosecurity-magazine.com/news/operation-tainted-love-targets/">China-Aligned "Operation Tainted Love" Targets Middle East Telecom Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/parliament-bans-tiktok-network/">UK Parliament Bans TikTok from its Network and Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/irs-phishing-emails-emotet/">IRS Phishing Emails Used to Distribute Emotet</a></p><p> </p><p><strong>Tweet of the Week (44:52)</strong></p><img src="https://lh6.googleusercontent.com/znEWevlrtELGuP3G4R2UaEFsMSv4epM8XwM2HAt2oiCMvgYgpdJJarbQO1a87uqVltwHU_y_uPiN3BNC-LOd0uxkbmwBJorZbnBJ7K0ufiJYH4Ij07meQdl018nXeVwIjlN3h2SVGWT79HzNsIzB8l8" /><p><a href="https://twitter.com/evacide/status/1638957449909788672">https://twitter.com/evacide/status/1638957449909788672</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 24 Mar 2023 17:52:01 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-145-the-being-shouted-at-episode-PoDmA26q</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (12:47)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>22nd March 2018: The city of Atlanta announced it was victim to a ransomware attack. The attackers demanded $51,000 worth of bitcoin to release the encrypted data, but Atlanta didn't pay the ransom. Whether or not to pay ransom isn't a simple or easy matter, but this proved to be expensive. </p><img src="https://lh3.googleusercontent.com/-DiI7ADXLElnIJX4bMjRpVqobyNNCMovBT2WEciC2b6NfvqbYQ6qp340ZqV23TAFnJOZfA0dugt8U2GxjsSv4GczDVyXyqkGPDx9JGKkEk3Ll-pBGSjHmWbpEjDuNbwtU6_oHZPGpokJQltMIKRHfmY" /><p><a href="https://twitter.com/todayininfosec/status/1638513067259510786">https://twitter.com/todayininfosec/status/1638513067259510786</a></p><p> </p><p>21st March 2001: SMBRelay and SMBRelay2 were released by Sir Dystic at the<a href="https://twitter.com/lantacon"> @lantacon</a> convention in Atlanta, Georgia. The tools were developed to carry out SMB man-in-the-middle attacks on Windows machines.</p><img src="https://lh5.googleusercontent.com/UTogLP1nIa9dUTmDq9fx5MAKC-OET9JZWJpV2PVkVnS2PO-lYN1MOrCmiHvwIi3tcmsefhYNj4Zi2RTyGimKE5pIuR3h3yE-Gy50FPJjqHX6X6vYr9noV740f8RPlk_jjklAtBo76L9qaeOD8bSDTzc" /><p><a href="https://en.m.wikipedia.org/wiki/SMBRelay">SMBRelay</a></p><p><a href="https://twitter.com/todayininfosec/status/1638327435434291201">https://twitter.com/todayininfosec/status/1638327435434291201</a>  </p><p> </p><p><strong>Rant of the Week (19:43)</strong></p><p><a href="https://twitter.com/keewa/status/1638853767448735744">https://twitter.com/keewa/status/1638853767448735744</a></p><img src="https://lh5.googleusercontent.com/klXtf4buBRCkiaeZ616Jv25eUjSqmiNwtZ9tnRjD_HUhPRxgeNaGCjpLG_kg_tWJiySchlXl7VV52Rg6At7nWSyWfKD043N75XYhsxfY5z7USphK-a9f0wQIe2JfOMTTdGdcvk5UJxo5UZJZR3mHjus" /><img src="https://lh4.googleusercontent.com/XB_CxsjnruoNilbXspNyZLkprL1AegBGVMMzMa3zXYsr5rJ6LWs-Jp6Ecc0palKUOO5umZee_UJEyiospz_Ch40wyUKxF0kP3XuT5_RwnJB0nTutBXlLu754503kws14he1bpjpIJAnkd5v0ySiUfO0" /><p> </p><p><strong>Billy Big Balls of the Week (29:08)</strong></p><p><a href="https://www.bbc.co.uk/news/world-latin-america-65026522">Journalist opens USB letter bomb in newsroom</a></p><p>Journalists across Ecuador have been targeted by explosive devices sent through the post.</p><p>One presenter, Lenin Artieda, was injured when he opened the envelope in the middle of the newsroom.</p><p>He said the explosive device looked like a USB drive. He plugged it into his computer and it detonated.</p><p>The Ecuadorean attorney-general's department confirmed it had opened a terrorism investigation into the letters on Monday.</p><p>It did not name the specific news outlets targeted. However, at least five different organisations across Ecuador were sent the letters.</p><p>The government has condemned the attacks, describing freedom of expression as "a right that must be respected".</p><p>"Any attempt to intimidate journalism and freedom of expression is a loathsome action that should be punished with all the rigour of justice," it said in a statement.</p><p>The interior minister, Juan Zapata, said the devices were all sent from the same town. Three were sent to media outlets in Guayaquil and two to the capital, Quito.</p><p>While Mr Artieda was injured by the device, others sent through the post failed to explode or were never opened.</p><p>Police carried out a controlled detonation of one of the devices sent to TC Television, prosecutors confirmed.</p><p><a href="https://twitter.com/_MG_/status/916137290711183360">From 2017, Mr Self Destruct v1</a></p><p> </p><p><strong>Industry News (36:51) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/ferrari-reveals-data-breach-ransom/">Ferrari Reveals Data Breach Ransom Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/1-dotorg-domains-dmarc-protected/">Just 1% of Dot-Org Domains Are Fully DMARC Protected</a></p><p><a href="https://www.infosecurity-magazine.com/news/breachforums-shuts-admins-arrest/">BreachForums Shuts Down After Admin's Arrest</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-chatgpt-chrome-hijacks/">Malicious ChatGPT Chrome Extension Hijacks Facebook Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-sets-out-vision-nhs/">UK Government Sets Out Vision for NHS Cybersecurity</a></p><p><a href="https://www.infosecurity-magazine.com/news/attack-method-affect-okta-passwords/">New Post-Exploitation Attack Method Found Affecting Okta Passwords</a></p><p><a href="https://www.infosecurity-magazine.com/news/operation-tainted-love-targets/">China-Aligned "Operation Tainted Love" Targets Middle East Telecom Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/parliament-bans-tiktok-network/">UK Parliament Bans TikTok from its Network and Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/irs-phishing-emails-emotet/">IRS Phishing Emails Used to Distribute Emotet</a></p><p> </p><p><strong>Tweet of the Week (44:52)</strong></p><img src="https://lh6.googleusercontent.com/znEWevlrtELGuP3G4R2UaEFsMSv4epM8XwM2HAt2oiCMvgYgpdJJarbQO1a87uqVltwHU_y_uPiN3BNC-LOd0uxkbmwBJorZbnBJ7K0ufiJYH4Ij07meQdl018nXeVwIjlN3h2SVGWT79HzNsIzB8l8" /><p><a href="https://twitter.com/evacide/status/1638957449909788672">https://twitter.com/evacide/status/1638957449909788672</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45606777" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/08522762-1df3-477f-bb4f-9bd5f989ac97/audio/bfcbeb33-e93b-4bd9-b85f-cbd7777863ea/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 145 - The Being Shouted at Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/51c477d5-9b10-4ecb-800a-cce3f012174d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:30</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a time when it would have been cheaper to pay the ransom
 
Rant of the Week explores the grind culture Gen Z are afraid of

Billy Big Balls makes removable media policies worth their weight in gold
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a message from the Electronic Frontier Foundation&apos;s Director of Cyber Security</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a time when it would have been cheaper to pay the ransom
 
Rant of the Week explores the grind culture Gen Z are afraid of

Billy Big Balls makes removable media policies worth their weight in gold
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a message from the Electronic Frontier Foundation&apos;s Director of Cyber Security</itunes:subtitle>
      <itunes:keywords>exploding usb, rant, ransomware, hustle, tiktok, privacy protection</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>145</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28ba8e93-245b-4781-89d7-bb9655d97979</guid>
      <title>Episode 144 - The Other Peoples Work Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (06:13) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th March 2000: The movie "Takedown" was released in France as "Cybertr@que". It is based on the capture of Kevin Mitnick </p><p><a href="https://www.imdb.com/title/tt0159784/?ref_=ext_shr_lnk">Takedown on IMDb</a></p><p><a href="https://twitter.com/todayininfosec/status/1636083404117557248">https://twitter.com/todayininfosec/status/1636083404117557248</a></p><p> </p><p>16th March 1971: The first computer virus, Creeper, infected computers on the ARPANET, displaying "I'M THE CREEPER : CATCH ME IF YOU CAN." It was named after a villain (the Creeper) from a 1970 episode of "Scooby-Doo, Where Are You!"</p><p><a href="https://twitter.com/todayininfosec/status/1636516584394203137">https://twitter.com/todayininfosec/status/1636516584394203137</a>   </p><p> </p><p><strong>Rant of the Week (13:20)</strong></p><p><a href="https://www.theregister.com/2023/03/10/sec_blackbaud_3m_penalty/">What happens if you 'cover up' a ransomware infection? For Blackbaud, a $3m charge</a></p><p>Blackbaud has agreed to pay $3 million to settle charges that it made misleading disclosures about a 2020 ransomware infection in which crooks stole more than a million files on around 13,000 of the cloud software slinger's customers.</p><p>According to America's financial watchdog, the SEC, Blackbaud will cough up the cash - without admitting or denying the regulator's findings - and will cease and desist from committing any further violations.</p><p>"Blackbaud is pleased to resolve this matter with the SEC and appreciates the collaboration and constructive feedback from the Commission as the company continually improves its reporting and disclosure policies," Tony Boor, the outfit's chief financial officer, told The Register. </p><p>"Blackbaud continues to strengthen its cybersecurity program to protect customers and consumers, and to minimise the risk of cyberattacks in an ever-changing threat landscape," Boor added.</p><p>For perspective: the South Carolina-based firm – which provides, among other things, donor management tools to nonprofits – banked <a href="https://www.blackbaud.com/newsroom/article/2023/02/13/blackbaud-announces-2022-fourth-quarter-and-full-year-results">$1.1 billion in revenue</a> in 2022, resulting in a $45.4 million loss. This settlement is the least of the biz's concerns, we imagine.</p><p>Slap on the wrist</p><p>Here's what happened: back in May 2020, Blackbaud experienced a ransomware infection, quietly paid off the crooks, and didn't tell customers about the security breach until July 2020. And when the software company did notify customers, it assured them that the "cybercriminal did not access…bank account information, or social security numbers," according to the SEC order.</p><p>By the end of that month, however, the SEC claims that Blackbaud personnel discovered that the miscreants had accessed unencrypted donor bank account information and social security numbers. But the employees allegedly didn't tell senior management about the theft of sensitive customer data because Blackbaud "did not have policies or procedures in place designed to ensure they do so," the court documents say. Make of that what you will.</p><p> </p><p><strong>Billy Big Balls of the Week (23:09)</strong></p><p>1st Story (short, follow the link):</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-support-cracks-windows-for-customer-after-activation-fails/">Microsoft support 'cracks' Windows for customer after activation fails</a></p><p>In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine copy of the operating system failed to activate normally.  It seems, this isn't the first time either that support professionals have employed such workarounds when under pressure to timely close out support tickets.</p><p>A South-Africa based freelance technologist who paid $200 for a genuine copy of Windows 10 was startled to see a Microsoft support engineer "crack" his copy using unofficial tools that bypass the Windows activation process. </p><p>2nd Story:</p><p>A company who actually followed disclosure requirements (and puts TikTok in the same bucket as Meta and Google):</p><p><a href="https://www.theverge.com/2023/3/11/23635518/cerebral-patient-data-meta-tiktok-google-pixel">Cerebral admits to sharing patient data with Meta, TikTok, and Google</a></p><p>Cerebral, a telehealth startup specializing in mental health, says it inadvertently shared the sensitive information of over 3.1 million patients with Google, Meta, TikTok, and other third-party advertisers, <a href="https://techcrunch.com/2023/03/10/cerebral-shared-millions-patient-data-advertisers/">as reported earlier by TechCrunch</a>. In <a href="https://cerebral.com/static/hippa_privacy_breach-4000c6eb21449c2ecd8bd13706750cc2.pdf">a notice</a> posted on the company’s website, Cerebral admits to exposing a laundry list of patient data with the tracking tools it’s been using as far back as October 2019.</p><p>The information affected by the oversight includes everything from patient names, phone numbers, email addresses, birth dates, IP addresses, insurance information, appointment dates, treatment, and more. It may have even exposed the answers clients filled out as part of the mental health self-assessment on the company’s website and app, which patients can use to schedule therapy appointments and receive prescription medication.</p><p>According to Cerebral, this information got out through its use of tracking pixels, or the bits of code Meta, TikTok, and Google allow developers to embed in their apps and websites. The Meta Pixel, for example, can collect data about a user’s activity on a website or app after clicking an ad on the platform, and even keeps track of the information a user fills out on an online form. While this lets companies, like Cerebral, measure how users interact with their ads on various platforms and track the steps they take afterward, it also gives Meta, TikTok, and Google access to this information, which they can then use to gain insight into their own users.</p><p> </p><p><strong>Industry News (32:43)  </strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-new-privacy-bill-more-work-for/">UK's New Privacy Bill Could Mean More Work for Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackbaud-settles-3m-charge/">Blackbaud Settles $3m Charge Over Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi5-new-agency-tackle-statebacked/">MI5 Launches New Agency to Tackle State-Backed Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-more-effective-chatgpt/">Humans Still More Effective Than ChatGPT at Phishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/tick-apt-group-hacked-east-asian/">Tick APT Group Hacked East Asian DLP Software Firm</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-more-effective-chatgpt/">Humans Still More Effective Than ChatGPT at Phishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-calms-fears-chatgpt/">NCSC Calms Fears Over ChatGPT Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-ban-tiktok-government-devices/">UK Joins US, Canada, Others in Banning TikTok From Government Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-server-breached-via-telerik/">US Government IIS Server Breached via Telerik Software Flaw</a></p><p> </p><p><strong>Tweet of the Week (40:30)</strong></p><img src="https://lh6.googleusercontent.com/7z1KcnWayAm2IZINB99PB40wTAz5wh9WPtLyD3yyLhzboYYH_udZnLapHJNolhXyVZZgyXLb4msyKlfEIQprqWXeSEHu3C0QOy1QiVkvD2QEJbCEej2ZeYXjcmL1OYtRb3RdiuMfCrONOv8WnMrVmPE" /><p><a href="https://twitter.com/william_whyte/status/1635198775152234496">https://twitter.com/william_whyte/status/1635198775152234496</a></p><p><a href="https://twitter.com/J4vv4D/status/1636055929199140864?s=20">https://twitter.com/J4vv4D/status/1636055929199140864?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Mar 2023 16:36:39 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-144-the-other-peoples-work-episode-AmUHbvcf</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (06:13) </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th March 2000: The movie "Takedown" was released in France as "Cybertr@que". It is based on the capture of Kevin Mitnick </p><p><a href="https://www.imdb.com/title/tt0159784/?ref_=ext_shr_lnk">Takedown on IMDb</a></p><p><a href="https://twitter.com/todayininfosec/status/1636083404117557248">https://twitter.com/todayininfosec/status/1636083404117557248</a></p><p> </p><p>16th March 1971: The first computer virus, Creeper, infected computers on the ARPANET, displaying "I'M THE CREEPER : CATCH ME IF YOU CAN." It was named after a villain (the Creeper) from a 1970 episode of "Scooby-Doo, Where Are You!"</p><p><a href="https://twitter.com/todayininfosec/status/1636516584394203137">https://twitter.com/todayininfosec/status/1636516584394203137</a>   </p><p> </p><p><strong>Rant of the Week (13:20)</strong></p><p><a href="https://www.theregister.com/2023/03/10/sec_blackbaud_3m_penalty/">What happens if you 'cover up' a ransomware infection? For Blackbaud, a $3m charge</a></p><p>Blackbaud has agreed to pay $3 million to settle charges that it made misleading disclosures about a 2020 ransomware infection in which crooks stole more than a million files on around 13,000 of the cloud software slinger's customers.</p><p>According to America's financial watchdog, the SEC, Blackbaud will cough up the cash - without admitting or denying the regulator's findings - and will cease and desist from committing any further violations.</p><p>"Blackbaud is pleased to resolve this matter with the SEC and appreciates the collaboration and constructive feedback from the Commission as the company continually improves its reporting and disclosure policies," Tony Boor, the outfit's chief financial officer, told The Register. </p><p>"Blackbaud continues to strengthen its cybersecurity program to protect customers and consumers, and to minimise the risk of cyberattacks in an ever-changing threat landscape," Boor added.</p><p>For perspective: the South Carolina-based firm – which provides, among other things, donor management tools to nonprofits – banked <a href="https://www.blackbaud.com/newsroom/article/2023/02/13/blackbaud-announces-2022-fourth-quarter-and-full-year-results">$1.1 billion in revenue</a> in 2022, resulting in a $45.4 million loss. This settlement is the least of the biz's concerns, we imagine.</p><p>Slap on the wrist</p><p>Here's what happened: back in May 2020, Blackbaud experienced a ransomware infection, quietly paid off the crooks, and didn't tell customers about the security breach until July 2020. And when the software company did notify customers, it assured them that the "cybercriminal did not access…bank account information, or social security numbers," according to the SEC order.</p><p>By the end of that month, however, the SEC claims that Blackbaud personnel discovered that the miscreants had accessed unencrypted donor bank account information and social security numbers. But the employees allegedly didn't tell senior management about the theft of sensitive customer data because Blackbaud "did not have policies or procedures in place designed to ensure they do so," the court documents say. Make of that what you will.</p><p> </p><p><strong>Billy Big Balls of the Week (23:09)</strong></p><p>1st Story (short, follow the link):</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-support-cracks-windows-for-customer-after-activation-fails/">Microsoft support 'cracks' Windows for customer after activation fails</a></p><p>In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine copy of the operating system failed to activate normally.  It seems, this isn't the first time either that support professionals have employed such workarounds when under pressure to timely close out support tickets.</p><p>A South-Africa based freelance technologist who paid $200 for a genuine copy of Windows 10 was startled to see a Microsoft support engineer "crack" his copy using unofficial tools that bypass the Windows activation process. </p><p>2nd Story:</p><p>A company who actually followed disclosure requirements (and puts TikTok in the same bucket as Meta and Google):</p><p><a href="https://www.theverge.com/2023/3/11/23635518/cerebral-patient-data-meta-tiktok-google-pixel">Cerebral admits to sharing patient data with Meta, TikTok, and Google</a></p><p>Cerebral, a telehealth startup specializing in mental health, says it inadvertently shared the sensitive information of over 3.1 million patients with Google, Meta, TikTok, and other third-party advertisers, <a href="https://techcrunch.com/2023/03/10/cerebral-shared-millions-patient-data-advertisers/">as reported earlier by TechCrunch</a>. In <a href="https://cerebral.com/static/hippa_privacy_breach-4000c6eb21449c2ecd8bd13706750cc2.pdf">a notice</a> posted on the company’s website, Cerebral admits to exposing a laundry list of patient data with the tracking tools it’s been using as far back as October 2019.</p><p>The information affected by the oversight includes everything from patient names, phone numbers, email addresses, birth dates, IP addresses, insurance information, appointment dates, treatment, and more. It may have even exposed the answers clients filled out as part of the mental health self-assessment on the company’s website and app, which patients can use to schedule therapy appointments and receive prescription medication.</p><p>According to Cerebral, this information got out through its use of tracking pixels, or the bits of code Meta, TikTok, and Google allow developers to embed in their apps and websites. The Meta Pixel, for example, can collect data about a user’s activity on a website or app after clicking an ad on the platform, and even keeps track of the information a user fills out on an online form. While this lets companies, like Cerebral, measure how users interact with their ads on various platforms and track the steps they take afterward, it also gives Meta, TikTok, and Google access to this information, which they can then use to gain insight into their own users.</p><p> </p><p><strong>Industry News (32:43)  </strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-new-privacy-bill-more-work-for/">UK's New Privacy Bill Could Mean More Work for Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackbaud-settles-3m-charge/">Blackbaud Settles $3m Charge Over Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi5-new-agency-tackle-statebacked/">MI5 Launches New Agency to Tackle State-Backed Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-more-effective-chatgpt/">Humans Still More Effective Than ChatGPT at Phishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/tick-apt-group-hacked-east-asian/">Tick APT Group Hacked East Asian DLP Software Firm</a></p><p><a href="https://www.infosecurity-magazine.com/news/humans-more-effective-chatgpt/">Humans Still More Effective Than ChatGPT at Phishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-calms-fears-chatgpt/">NCSC Calms Fears Over ChatGPT Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-ban-tiktok-government-devices/">UK Joins US, Canada, Others in Banning TikTok From Government Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-server-breached-via-telerik/">US Government IIS Server Breached via Telerik Software Flaw</a></p><p> </p><p><strong>Tweet of the Week (40:30)</strong></p><img src="https://lh6.googleusercontent.com/7z1KcnWayAm2IZINB99PB40wTAz5wh9WPtLyD3yyLhzboYYH_udZnLapHJNolhXyVZZgyXLb4msyKlfEIQprqWXeSEHu3C0QOy1QiVkvD2QEJbCEej2ZeYXjcmL1OYtRb3RdiuMfCrONOv8WnMrVmPE" /><p><a href="https://twitter.com/william_whyte/status/1635198775152234496">https://twitter.com/william_whyte/status/1635198775152234496</a></p><p><a href="https://twitter.com/J4vv4D/status/1636055929199140864?s=20">https://twitter.com/J4vv4D/status/1636055929199140864?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41564694" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/20266e94-8b59-4678-b16f-94372746bdf4/audio/b6c704fb-2e30-4054-9731-c7c46634045c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 144 - The Other Peoples Work Episode</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/ec2cdb15-f24b-4ec1-9633-609ab01831f6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:17</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a time when someone would have gotten away with it if it wasn’t for those damn kids
 
Rant of the Week explores the cost of doing business

Billy Big Balls thinks a &apos;crack&apos; is worth a thousand support tickets
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a worthy disclaimer</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a time when someone would have gotten away with it if it wasn’t for those damn kids
 
Rant of the Week explores the cost of doing business

Billy Big Balls thinks a &apos;crack&apos; is worth a thousand support tickets
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a worthy disclaimer</itunes:subtitle>
      <itunes:keywords>creeper, cerebral, blackbaud, competency, reaper, ransomware, kevin mitnick</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>144</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">99637c11-e35c-4fe3-a282-a1ae5b0001e3</guid>
      <title>Episode 143 - The Flat Roof Special Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec ( 11:47)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th March 1989: The article "COMPUTER DETECTIVE FOLLOWED TRAIL TO HACKER SPY SUSPECT" was published. It covers how Clifford Stoll's discovery of a 75¢ accounting discrepancy led to the arrest of Marcus Hess. It was also the topic of Stoll's book, The Cuckoo's Egg. </p><p><a href="https://www.washingtonpost.com/archive/politics/1989/03/04/computer-detective-followed-trail-to-hacker-spy-suspect/53dc3e5a-a279-441d-98b5-e745645c547f/?utm_term=.02ac3df37107">COMPUTER DETECTIVE FOLLOWED TRAIL TO HACKER SPY SUSPECT</a></p><p><a href="https://twitter.com/todayininfosec/status/1632213421268533250">https://twitter.com/todayininfosec/status/1632213421268533250</a>  </p><p> </p><p>8th March 1993: AusCERT (<a href="https://twitter.com/AusCERT">@AusCERT</a>) began as the Security Emergency Response Team (SERT), when it commenced incident response operations in Australia.</p><p><a href="https://auscert.org.au/publications/historical-articles/forming-incident-response-team/">Forming an Incident Response Team</a></p><p><a href="https://twitter.com/todayininfosec/status/1633511448000299014">https://twitter.com/todayininfosec/status/1633511448000299014</a>   </p><p> </p><p><strong>Rant of the Week (16:45)</strong></p><p><a href="https://sports.yahoo.com/ransomware-group-posts-nude-photos-003700829.html">https://sports.yahoo.com/ransomware-group-posts-nude-photos-003700829.html</a></p><p><a href="https://www.theverge.com/2023/3/7/23629504/twitter-tor-onion-site-security-certificate-expired">Twitter just let its privacy- and security-protecting Tor service expire</a></p><p>Twitter has allowed the certificate for its Tor onion site to expire, effectively killing off a privacy- and speech-protecting service that <a href="https://www.theverge.com/2022/3/8/22967843/twitter-tor-onion-service-version-launch">it introduced last year</a>. Visiting the Tor-specific onion site address will now deliver a warning that the certificate verifying the site’s authenticity has lapsed; proceeding past that point (which is highly not recommended) currently delivers a Twitter error page. The certification expired on March 6th, just shy of two days before the site’s <a href="https://twitter.com/AlecMuffett/status/1501282223009542151">one-year launch</a> anniversary.</p><p>Twitter no longer has a communications department to ask about the change, but the Tor Project confirmed the service’s lapse to The Verge. “The onion site is no longer available seemingly with no plans to renew. The Tor Project has reached out to Twitter to look into bringing the onion version of the social media platform back online,” said communications director Pavel Zoneff in a statement. “People who rely on onion services for an extra layer of protection and guarantee that they are accessing the content they are looking for now have one fewer way of doing so safely.”</p><p> </p><p><strong>Billy Big Balls of the Week (25:23)</strong></p><p><a href="https://www.theregister.com/2023/03/06/in_brief_security/">Where are the women in cyber security? On the dark side, study suggests</a></p><p>If you can't join them, then you may as well try to beat them – at least if you're a talented security engineer looking for a job and you happen to be a woman. </p><p>As we've noted before, the infosec world moves at a <a href="https://www.theregister.com/2022/10/15/infosec_boys_club/">glacial pace toward gender equity</a>. It appears that's not the case in the cyber criminal underground, according to Trend Micro, which recently published a study in which it claims at least 30 percent – if not more – of cyber criminal forum users are women.</p><p>For its study, Trend Micro looked at five English-language cyber crime forums: Sinister, Cracked, Breached, Hackforums and (now defunct) Raidforum. And it inspected five Russian-language sites: XSS, Exploit, Vavilon, BHF and WWH-Club. </p><p>To be fair, Trend Micro's methodology is a bit iffy – and the report itself admits as much. Users on these forums are are largely anonymous, necessitating use of tools like Semrush and uClassify's Gender Analyzer V5 to make what amounts to guesses – at best. </p><p>Nonetheless, Trend Micro said it analyzed posts and traffic on the ten forums and found that, for English language sites, some 40 percent of users appear to be women, and 42.6 percent of Russian cyber crime forum users were women, or at least write like them.</p><p>"When compared to Stack Overflow, a developer and programming forum, only 12 percent of visitors were female," Trend Micro said of its use of Semrush. </p><p>Gender Analyzer V5 is trained on 5,500 blog posts written by women, and the same number by men, in order to analyze language for signs of gendered usage, which Trend Micro used to analyze a subset of profiles on English site Hackforums and Russian XSS. According to the report, 36 percent of users at Hackforums were likely women based on their use of language, and 30 percent of XSS forum users were reportedly women based on the same analysis. </p><p>So, what does that all mean? According to Trend Micro, it indicates that the cyber criminal underground is more meritocratic than the white hat world. </p><p>"Developers are valued for their skills and experience, and not necessarily for their gender when it comes to conducting business in the underground," Trend Micro said. As such, they say that investigators should avoid defaulting to "he" when discussing cyber criminals. But there's a more obvious lesson to be learned here.</p><p>If you overlook qualified security professionals on the <a href="https://www.microsoft.com/en-us/security/blog/2022/03/08/2-5-million-plus-cybersecurity-jobs-are-open-women-can-fill-them/">basis of gender</a>, don't be surprised if they end up on your radar again. Though perhaps in the form of a researcher bearing a friendly breach notice, and not someone out for criminal profit.</p><p> </p><p><strong>Industry News (30:57)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doppelpaymer-ransomware-busted/">DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/twothirds-of-european-started-zero/">Two-Thirds of European Firms Have Started Zero Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-disinformation-campaign/">Russian Disinformation Campaign Records High-Profile Individuals on Camera</a></p><p><a href="https://www.infosecurity-magazine.com/news/shein-app-accessed-clipboard/">Shein App Accessed Clipboard Data on Android Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-claims-new-uk-gdpr/">Government Claims New UK GDPR Will Save Firms Billions</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-restrict-act-gains-support/">US RESTRICT Act Gains Support, Empowers Biden to Ban Foreign Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/house-members-risk-after-insurer/">House Members at Risk After Insurer Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tehran-female-activists-espionage/">Tehran Targets Female Activists in Espionage Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-initiates-project-clover/">TikTok Initiates Project Clover Amid European Data Security Concerns</a></p><p> </p><p><strong>Tweet of the Week (38:04)</strong></p><img src="https://lh3.googleusercontent.com/o_pOYp66gGZqglckAfgEnQlMlXHbPEU-6fT2D09N2mgKk7bMHSMkfgaUVtYAv1gYrtpSX6TlNIcOqfBPDHIPAo4-OTSJ-pOBQHPzqOyX77dOfIA5-NSQy26VgQm1vvsHifR1bjmX3whio6E-Wl0q2U4" /><p><a href="https://twitter.com/pookleblinky/status/1633359031875039234">https://twitter.com/pookleblinky/status/1633359031875039234</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Mar 2023 13:46:12 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-143-the-flat-roof-special-episode-LvWF8j8C</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec ( 11:47)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th March 1989: The article "COMPUTER DETECTIVE FOLLOWED TRAIL TO HACKER SPY SUSPECT" was published. It covers how Clifford Stoll's discovery of a 75¢ accounting discrepancy led to the arrest of Marcus Hess. It was also the topic of Stoll's book, The Cuckoo's Egg. </p><p><a href="https://www.washingtonpost.com/archive/politics/1989/03/04/computer-detective-followed-trail-to-hacker-spy-suspect/53dc3e5a-a279-441d-98b5-e745645c547f/?utm_term=.02ac3df37107">COMPUTER DETECTIVE FOLLOWED TRAIL TO HACKER SPY SUSPECT</a></p><p><a href="https://twitter.com/todayininfosec/status/1632213421268533250">https://twitter.com/todayininfosec/status/1632213421268533250</a>  </p><p> </p><p>8th March 1993: AusCERT (<a href="https://twitter.com/AusCERT">@AusCERT</a>) began as the Security Emergency Response Team (SERT), when it commenced incident response operations in Australia.</p><p><a href="https://auscert.org.au/publications/historical-articles/forming-incident-response-team/">Forming an Incident Response Team</a></p><p><a href="https://twitter.com/todayininfosec/status/1633511448000299014">https://twitter.com/todayininfosec/status/1633511448000299014</a>   </p><p> </p><p><strong>Rant of the Week (16:45)</strong></p><p><a href="https://sports.yahoo.com/ransomware-group-posts-nude-photos-003700829.html">https://sports.yahoo.com/ransomware-group-posts-nude-photos-003700829.html</a></p><p><a href="https://www.theverge.com/2023/3/7/23629504/twitter-tor-onion-site-security-certificate-expired">Twitter just let its privacy- and security-protecting Tor service expire</a></p><p>Twitter has allowed the certificate for its Tor onion site to expire, effectively killing off a privacy- and speech-protecting service that <a href="https://www.theverge.com/2022/3/8/22967843/twitter-tor-onion-service-version-launch">it introduced last year</a>. Visiting the Tor-specific onion site address will now deliver a warning that the certificate verifying the site’s authenticity has lapsed; proceeding past that point (which is highly not recommended) currently delivers a Twitter error page. The certification expired on March 6th, just shy of two days before the site’s <a href="https://twitter.com/AlecMuffett/status/1501282223009542151">one-year launch</a> anniversary.</p><p>Twitter no longer has a communications department to ask about the change, but the Tor Project confirmed the service’s lapse to The Verge. “The onion site is no longer available seemingly with no plans to renew. The Tor Project has reached out to Twitter to look into bringing the onion version of the social media platform back online,” said communications director Pavel Zoneff in a statement. “People who rely on onion services for an extra layer of protection and guarantee that they are accessing the content they are looking for now have one fewer way of doing so safely.”</p><p> </p><p><strong>Billy Big Balls of the Week (25:23)</strong></p><p><a href="https://www.theregister.com/2023/03/06/in_brief_security/">Where are the women in cyber security? On the dark side, study suggests</a></p><p>If you can't join them, then you may as well try to beat them – at least if you're a talented security engineer looking for a job and you happen to be a woman. </p><p>As we've noted before, the infosec world moves at a <a href="https://www.theregister.com/2022/10/15/infosec_boys_club/">glacial pace toward gender equity</a>. It appears that's not the case in the cyber criminal underground, according to Trend Micro, which recently published a study in which it claims at least 30 percent – if not more – of cyber criminal forum users are women.</p><p>For its study, Trend Micro looked at five English-language cyber crime forums: Sinister, Cracked, Breached, Hackforums and (now defunct) Raidforum. And it inspected five Russian-language sites: XSS, Exploit, Vavilon, BHF and WWH-Club. </p><p>To be fair, Trend Micro's methodology is a bit iffy – and the report itself admits as much. Users on these forums are are largely anonymous, necessitating use of tools like Semrush and uClassify's Gender Analyzer V5 to make what amounts to guesses – at best. </p><p>Nonetheless, Trend Micro said it analyzed posts and traffic on the ten forums and found that, for English language sites, some 40 percent of users appear to be women, and 42.6 percent of Russian cyber crime forum users were women, or at least write like them.</p><p>"When compared to Stack Overflow, a developer and programming forum, only 12 percent of visitors were female," Trend Micro said of its use of Semrush. </p><p>Gender Analyzer V5 is trained on 5,500 blog posts written by women, and the same number by men, in order to analyze language for signs of gendered usage, which Trend Micro used to analyze a subset of profiles on English site Hackforums and Russian XSS. According to the report, 36 percent of users at Hackforums were likely women based on their use of language, and 30 percent of XSS forum users were reportedly women based on the same analysis. </p><p>So, what does that all mean? According to Trend Micro, it indicates that the cyber criminal underground is more meritocratic than the white hat world. </p><p>"Developers are valued for their skills and experience, and not necessarily for their gender when it comes to conducting business in the underground," Trend Micro said. As such, they say that investigators should avoid defaulting to "he" when discussing cyber criminals. But there's a more obvious lesson to be learned here.</p><p>If you overlook qualified security professionals on the <a href="https://www.microsoft.com/en-us/security/blog/2022/03/08/2-5-million-plus-cybersecurity-jobs-are-open-women-can-fill-them/">basis of gender</a>, don't be surprised if they end up on your radar again. Though perhaps in the form of a researcher bearing a friendly breach notice, and not someone out for criminal profit.</p><p> </p><p><strong>Industry News (30:57)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doppelpaymer-ransomware-busted/">DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/twothirds-of-european-started-zero/">Two-Thirds of European Firms Have Started Zero Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-disinformation-campaign/">Russian Disinformation Campaign Records High-Profile Individuals on Camera</a></p><p><a href="https://www.infosecurity-magazine.com/news/shein-app-accessed-clipboard/">Shein App Accessed Clipboard Data on Android Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-claims-new-uk-gdpr/">Government Claims New UK GDPR Will Save Firms Billions</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-restrict-act-gains-support/">US RESTRICT Act Gains Support, Empowers Biden to Ban Foreign Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/house-members-risk-after-insurer/">House Members at Risk After Insurer Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tehran-female-activists-espionage/">Tehran Targets Female Activists in Espionage Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-initiates-project-clover/">TikTok Initiates Project Clover Amid European Data Security Concerns</a></p><p> </p><p><strong>Tweet of the Week (38:04)</strong></p><img src="https://lh3.googleusercontent.com/o_pOYp66gGZqglckAfgEnQlMlXHbPEU-6fT2D09N2mgKk7bMHSMkfgaUVtYAv1gYrtpSX6TlNIcOqfBPDHIPAo4-OTSJ-pOBQHPzqOyX77dOfIA5-NSQy26VgQm1vvsHifR1bjmX3whio6E-Wl0q2U4" /><p><a href="https://twitter.com/pookleblinky/status/1633359031875039234">https://twitter.com/pookleblinky/status/1633359031875039234</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="40851237" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/be7b6363-2998-49f5-b958-512b21df7a99/audio/d68c42ed-1591-4b54-9ce1-05c3f26ba944/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 143 - The Flat Roof Special Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/af9d7529-3e29-4790-aa37-7b1b3412c064/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:33</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a time when a group of security professionals decided that they wanted something done right, so they did it theselves
 
Rant of the Week continues to gaze at the Twitter “faecal-performance” from a safe distance

Billy Big Balls pays homage to the under appreciated women in cyber security
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is someone making the best of the previously referenced Twitter “faecal-performance”</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a time when a group of security professionals decided that they wanted something done right, so they did it theselves
 
Rant of the Week continues to gaze at the Twitter “faecal-performance” from a safe distance

Billy Big Balls pays homage to the under appreciated women in cyber security
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is someone making the best of the previously referenced Twitter “faecal-performance”</itunes:subtitle>
      <itunes:keywords>clifford stoll, brexit, flat roof, shein, twitter, tiktok, gender equality</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>143</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">60998380-f8dc-4672-94a6-303a06989c6a</guid>
      <title>Episode 142 -The Back in Safe Hands Episode</title>
      <description><![CDATA[<p><strong>The one and only Andy (13:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>2nd March 2013: Evernote announced that it had reset 50 million users' passwords after hackers accessed users' email addresses and hashed passwords. </p><p><a href="https://twitter.com/todayininfosec/status/1631302952395710467">https://twitter.com/todayininfosec/status/1631302952395710467</a></p><p>1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy.</p><p><a href="https://en.m.wikipedia.org/wiki/Ping-Pong_virus">Ping Pong Virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1630965727128612864">https://twitter.com/todayininfosec/status/1630965727128612864</a>  </p><p> </p><p><strong>Rant of the Week (19:18)</strong></p><p><a href="https://www.theregister.com/2023/02/28/news_corp_dwell_time_breach/">News Corp outfoxed by IT intruders for years</a></p><p>The miscreants who infiltrated News Corporation's corporate IT network spent two years in the media monolith's system before being detected early last year.</p><p>The super-corp, which owns The Wall Street Journal, New York Post, UK publications including The Sunday Times, and a broad array of other entities around the world, first <a href="https://www.theregister.com/2022/02/04/news_corp_china_compromised/">reported</a> the intrusion in February 2022, saying the snoops got into email accounts and gained access to employees' data and business documents.</p><p>A year later, according to a four-page <a href="https://www.documentcloud.org/documents/23689861-news-corp-feb-2023-data-breach-notification">letter</a> sent to employees, News Corp executives said the unidentified cybercriminals likely first gained access to a company system as early as February 2020, and then got into "certain business documents and emails from a limited number of its personnel's accounts in the affected system."</p><p>Both News Corp and Mandiant – the now-Google-owned cybersecurity house brought in to investigate the intrusion – said the attackers likely were nation-state players linked to China with the aim of gathering intelligence.</p><p> </p><p><strong>Billy Big Balls of the Week (28:16)</strong></p><p><a href="https://www.theregister.com/2023/03/02/salesforce_q4_fy_2023/">Salesforce banks savings by sweating tech infrastructure for an extra year</a></p><p>CRM giant Salesforce has decided to sweat its infrastructure for an extra year, and make employees wait the same period before giving them new PCs.</p><p>News of the company's decision to live with old tech came in the SaaS supremo's Q4 2023 earnings call, during which CFO Amy Weaver told investors "Our guidance includes slightly under one-half points of benefit due to a depreciation change to the useful life of certain equipment by one year effective February 1st. For our infrastructure-related equipment, this changed the useful life from approximately four to five years. And for IT employee equipment, this changed from approximately three to four years."</p><p>Salesforce is not the only tech giant to have decided its hardware can last longer: Microsoft last year <a href="https://www.theregister.com/2022/08/02/microsoft_server_life_extension/">extended</a> the life of some servers to six years, while Google has <a href="https://www.theregister.com/2022/02/02/alphabet_q4_2021/">stretched</a> the life of servers to four years and is happy running some five year old networking kit.</p><p>Salesforce's operations aren't as extensive as the hyperscalers, but this is still bad news for the hardware industry. It shows a major player is entirely happy running mission-critical workloads on older kit for longer without the usual upgrade cycle.</p><p> </p><p><strong>Industry News (36:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lastpass-data-breach-update/">Keylogger on Employee Home PC Led to LastPass 2022 Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-gov-agencies-30-days-remove/">US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-drops-just/">Attacker Breakout Time Drops to Just 84 Minutes</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-adds-cse-gmail-calendar/">Google Workspace Adds Client-Side Encryption to Gmail and Calendar</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-review-private-message/">ICO Calls for Review into Private Message Use by Ministers</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-government-bans-foreign/">Russian Government Bans Foreign Messaging Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/wh-smith-discloses-cyber-attack/">WH Smith Discloses Cyber-Attack, Company Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-publishes-national/">White House Launches National Cybersecurity Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/api-security-flaw-found-bookingcom/">API Security Flaw Found in Booking.com Allowed Full Account Takeover</a></p><p>BBC Tik tok <a href="https://www.bbc.co.uk/news/technology-64797355">https://www.bbc.co.uk/news/technology-64797355</a></p><p> </p><p><strong>Tweet of the Week ( </strong></p><img src="https://lh6.googleusercontent.com/MG7F2RAmnM4cJRq6Lix6sEeVpPHy36REWt_5OptiLEleiP-c3WxN5Meh6OuXH8cW3-dF3bdCPovVVE8tluLwYNZ7beheQZRuVHWfVLjm2EDsoBmViu4eNJkltbN3MmRUKXVF6pAqK0chSM4YNmr4qqI" /><p><a href="https://twitter.com/mtanji/status/1631314289397997572">https://twitter.com/mtanji/status/1631314289397997572</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Mar 2023 18:56:28 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-142-the-back-in-safe-hands-epidode-N6ASwP4c</link>
      <content:encoded><![CDATA[<p><strong>The one and only Andy (13:10)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>2nd March 2013: Evernote announced that it had reset 50 million users' passwords after hackers accessed users' email addresses and hashed passwords. </p><p><a href="https://twitter.com/todayininfosec/status/1631302952395710467">https://twitter.com/todayininfosec/status/1631302952395710467</a></p><p>1st March 1988: The MS-DOS boot sector virus "Ping-Pong" was discovered at the Politecnico di Torino (Turin Polytechnic University) in Italy.</p><p><a href="https://en.m.wikipedia.org/wiki/Ping-Pong_virus">Ping Pong Virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1630965727128612864">https://twitter.com/todayininfosec/status/1630965727128612864</a>  </p><p> </p><p><strong>Rant of the Week (19:18)</strong></p><p><a href="https://www.theregister.com/2023/02/28/news_corp_dwell_time_breach/">News Corp outfoxed by IT intruders for years</a></p><p>The miscreants who infiltrated News Corporation's corporate IT network spent two years in the media monolith's system before being detected early last year.</p><p>The super-corp, which owns The Wall Street Journal, New York Post, UK publications including The Sunday Times, and a broad array of other entities around the world, first <a href="https://www.theregister.com/2022/02/04/news_corp_china_compromised/">reported</a> the intrusion in February 2022, saying the snoops got into email accounts and gained access to employees' data and business documents.</p><p>A year later, according to a four-page <a href="https://www.documentcloud.org/documents/23689861-news-corp-feb-2023-data-breach-notification">letter</a> sent to employees, News Corp executives said the unidentified cybercriminals likely first gained access to a company system as early as February 2020, and then got into "certain business documents and emails from a limited number of its personnel's accounts in the affected system."</p><p>Both News Corp and Mandiant – the now-Google-owned cybersecurity house brought in to investigate the intrusion – said the attackers likely were nation-state players linked to China with the aim of gathering intelligence.</p><p> </p><p><strong>Billy Big Balls of the Week (28:16)</strong></p><p><a href="https://www.theregister.com/2023/03/02/salesforce_q4_fy_2023/">Salesforce banks savings by sweating tech infrastructure for an extra year</a></p><p>CRM giant Salesforce has decided to sweat its infrastructure for an extra year, and make employees wait the same period before giving them new PCs.</p><p>News of the company's decision to live with old tech came in the SaaS supremo's Q4 2023 earnings call, during which CFO Amy Weaver told investors "Our guidance includes slightly under one-half points of benefit due to a depreciation change to the useful life of certain equipment by one year effective February 1st. For our infrastructure-related equipment, this changed the useful life from approximately four to five years. And for IT employee equipment, this changed from approximately three to four years."</p><p>Salesforce is not the only tech giant to have decided its hardware can last longer: Microsoft last year <a href="https://www.theregister.com/2022/08/02/microsoft_server_life_extension/">extended</a> the life of some servers to six years, while Google has <a href="https://www.theregister.com/2022/02/02/alphabet_q4_2021/">stretched</a> the life of servers to four years and is happy running some five year old networking kit.</p><p>Salesforce's operations aren't as extensive as the hyperscalers, but this is still bad news for the hardware industry. It shows a major player is entirely happy running mission-critical workloads on older kit for longer without the usual upgrade cycle.</p><p> </p><p><strong>Industry News (36:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lastpass-data-breach-update/">Keylogger on Employee Home PC Led to LastPass 2022 Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-gov-agencies-30-days-remove/">US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-drops-just/">Attacker Breakout Time Drops to Just 84 Minutes</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-adds-cse-gmail-calendar/">Google Workspace Adds Client-Side Encryption to Gmail and Calendar</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-review-private-message/">ICO Calls for Review into Private Message Use by Ministers</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-government-bans-foreign/">Russian Government Bans Foreign Messaging Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/wh-smith-discloses-cyber-attack/">WH Smith Discloses Cyber-Attack, Company Data Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-publishes-national/">White House Launches National Cybersecurity Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/api-security-flaw-found-bookingcom/">API Security Flaw Found in Booking.com Allowed Full Account Takeover</a></p><p>BBC Tik tok <a href="https://www.bbc.co.uk/news/technology-64797355">https://www.bbc.co.uk/news/technology-64797355</a></p><p> </p><p><strong>Tweet of the Week ( </strong></p><img src="https://lh6.googleusercontent.com/MG7F2RAmnM4cJRq6Lix6sEeVpPHy36REWt_5OptiLEleiP-c3WxN5Meh6OuXH8cW3-dF3bdCPovVVE8tluLwYNZ7beheQZRuVHWfVLjm2EDsoBmViu4eNJkltbN3MmRUKXVF6pAqK0chSM4YNmr4qqI" /><p><a href="https://twitter.com/mtanji/status/1631314289397997572">https://twitter.com/mtanji/status/1631314289397997572</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="51788811" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/926e0e7e-5ff4-4657-9638-46ab4783d66a/audio/71353404-3d6a-4c41-af94-a3a120149677/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 142 -The Back in Safe Hands Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7a954229-7bb3-4488-81e1-a9ed38e9c8ec/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:56</itunes:duration>
      <itunes:summary>This week in InfoSec talks ping pong
 
Rant of the Week has a question about dwell time

Billy Big Balls is a bold move for Salesforce
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the foundations of our industry </itunes:summary>
      <itunes:subtitle>This week in InfoSec talks ping pong
 
Rant of the Week has a question about dwell time

Billy Big Balls is a bold move for Salesforce
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the foundations of our industry </itunes:subtitle>
      <itunes:keywords>evernote, alan sugar, dwell time, news corp, alan solomon, crappy old laptops, ping pong</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>142</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">03443cae-3aa7-40e4-a0a5-0f4f76ee6e0b</guid>
      <title>Episode 141 - You know why this is late</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>20th February 2003: Alan Giang Tran, former network admin for 2 companies, was arrested after allegedly destroying data on the companies' networks. Two months later he pleaded guilty to a federal charge of intentionally causing damage to a protected computer.</p><p><a href="https://web.archive.org/web/20140106220344/http://legacy.utsandiego.com/news/state/20030221-0515-ca-computerhacker.html">Man arrested for allegedly shutting down employers' computers</a></p><p><a href="https://twitter.com/todayininfosec/status/1627748857856593931">https://twitter.com/todayininfosec/status/1627748857856593931</a></p><p>18th February 2008: 2013: Burger King's Twitter account was compromised, had its name changed to McDonalds, and shared offensive tweets.</p><p><a href="https://mashable.com/archive/burger-king-twitter-account-hacked#.V7psulxyOqy">Burger King Twitter Account Hacked</a></p><p><a href="https://twitter.com/todayininfosec/status/1627115690577608707">https://twitter.com/todayininfosec/status/1627115690577608707</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/02/21/accidental_whatsapp_account_takeover/">Accidental WhatsApp account takeovers? It's a thing</a></p><p>A stranger may be receiving your private WhatsApp messages, and also be able to send messages to all of your contacts – if you have changed your phone number and didn't delete the WhatsApp account linked to it.</p><p>Your humble vulture heard this bizarre tale of inadvertent WhatsApp account hijacking from a reader, Eric, who told us this happened to his son, Ugo.</p><p>"This is a massive privacy violation," Eric said. "My son had long-lasting access to that person's private messages as well as group messages, both personal and work related."</p><p>The security hole stems from wireless carriers' practice of recycling former customers' phone numbers and giving them to new customers.</p><p>WhatsApp acknowledges that <a href="https://faq.whatsapp.com/3347469605523961">this can happen</a>, but says it's extremely rare.</p><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/">GoDaddy: Hackers stole source code, installed malware in multi-year breach</a></p><p>Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.</p><p>While GoDaddy discovered the security breach following customer reports in early December 2022 that their sites were being used to redirect to random domains, the attackers had access to the company's network for multiple years.</p><p>The company says that previous breaches disclosed in November 2021 and March 2020 are also linked to this multi-year campaign.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/norway-seizes-millions-in-north/">Norway Seizes Millions in North Korean Crypto</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-contains-cyberincident-on-its/">FBI "Contains" Cyber-Incident on its Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/godaddy-source-code-stolen-malware/">GoDaddy Announces Source Code Stolen and Malware Installed in Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-exploit-insurance/">Ransomware Gang Seeks to Exploit Victims' Insurance Coverage</a></p><p><a href="https://www.infosecurity-magazine.com/news/city-fund-managers-jailed-for-8m/">City Fund Managers Jailed for $8m Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/hydrochasma-targets-asian-medical/">Hydrochasma Group Targets Asian Medical and Shipping Sectors</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-sites-and-apps-use/">Phishing Sites and Apps Use ChatGPT as Lure</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-accountants-improve-sme-data/">ICO Calls on Accountants to Improve SME Data Protection</a></p><p><a href="https://www.infosecurity-magazine.com/news/s1deload-stealer-target-facebook/">Hackers Use S1deload Stealer to Target Facebook, YouTube Users</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/J0EoX2de4qoUmD91rLt7hMB94rfWpdIc9BzRq72VkusDGSWajV9C79K0j8Qoi7dRe2QBDPg6m06SrDl1EkVz0OLoLEgxJwxRm2nEbglFvXlZ8ZZYRzV2Ju4mhvA8sOEB9JP8ip2qZwcVRkSwdX3K_3o" alt="Even hackers are reportedly being laid off by organised crime groups" /><p> </p><p><a href="https://twitter.com/unusual_whales/status/1628898963087851521?s=20">https://twitter.com/unusual_whales/status/1628898963087851521?s=20</a> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 25 Feb 2023 17:01:44 +0000</pubDate>
      <author>thom@tl2security.com (Andy Agnês, Javvad Malik, Thom Langford, Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-141-you-know-why-this-is-late-2k2KXKJJ</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>20th February 2003: Alan Giang Tran, former network admin for 2 companies, was arrested after allegedly destroying data on the companies' networks. Two months later he pleaded guilty to a federal charge of intentionally causing damage to a protected computer.</p><p><a href="https://web.archive.org/web/20140106220344/http://legacy.utsandiego.com/news/state/20030221-0515-ca-computerhacker.html">Man arrested for allegedly shutting down employers' computers</a></p><p><a href="https://twitter.com/todayininfosec/status/1627748857856593931">https://twitter.com/todayininfosec/status/1627748857856593931</a></p><p>18th February 2008: 2013: Burger King's Twitter account was compromised, had its name changed to McDonalds, and shared offensive tweets.</p><p><a href="https://mashable.com/archive/burger-king-twitter-account-hacked#.V7psulxyOqy">Burger King Twitter Account Hacked</a></p><p><a href="https://twitter.com/todayininfosec/status/1627115690577608707">https://twitter.com/todayininfosec/status/1627115690577608707</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/02/21/accidental_whatsapp_account_takeover/">Accidental WhatsApp account takeovers? It's a thing</a></p><p>A stranger may be receiving your private WhatsApp messages, and also be able to send messages to all of your contacts – if you have changed your phone number and didn't delete the WhatsApp account linked to it.</p><p>Your humble vulture heard this bizarre tale of inadvertent WhatsApp account hijacking from a reader, Eric, who told us this happened to his son, Ugo.</p><p>"This is a massive privacy violation," Eric said. "My son had long-lasting access to that person's private messages as well as group messages, both personal and work related."</p><p>The security hole stems from wireless carriers' practice of recycling former customers' phone numbers and giving them to new customers.</p><p>WhatsApp acknowledges that <a href="https://faq.whatsapp.com/3347469605523961">this can happen</a>, but says it's extremely rare.</p><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/">GoDaddy: Hackers stole source code, installed malware in multi-year breach</a></p><p>Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.</p><p>While GoDaddy discovered the security breach following customer reports in early December 2022 that their sites were being used to redirect to random domains, the attackers had access to the company's network for multiple years.</p><p>The company says that previous breaches disclosed in November 2021 and March 2020 are also linked to this multi-year campaign.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/norway-seizes-millions-in-north/">Norway Seizes Millions in North Korean Crypto</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-contains-cyberincident-on-its/">FBI "Contains" Cyber-Incident on its Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/godaddy-source-code-stolen-malware/">GoDaddy Announces Source Code Stolen and Malware Installed in Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-exploit-insurance/">Ransomware Gang Seeks to Exploit Victims' Insurance Coverage</a></p><p><a href="https://www.infosecurity-magazine.com/news/city-fund-managers-jailed-for-8m/">City Fund Managers Jailed for $8m Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/hydrochasma-targets-asian-medical/">Hydrochasma Group Targets Asian Medical and Shipping Sectors</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-sites-and-apps-use/">Phishing Sites and Apps Use ChatGPT as Lure</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-accountants-improve-sme-data/">ICO Calls on Accountants to Improve SME Data Protection</a></p><p><a href="https://www.infosecurity-magazine.com/news/s1deload-stealer-target-facebook/">Hackers Use S1deload Stealer to Target Facebook, YouTube Users</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/J0EoX2de4qoUmD91rLt7hMB94rfWpdIc9BzRq72VkusDGSWajV9C79K0j8Qoi7dRe2QBDPg6m06SrDl1EkVz0OLoLEgxJwxRm2nEbglFvXlZ8ZZYRzV2Ju4mhvA8sOEB9JP8ip2qZwcVRkSwdX3K_3o" alt="Even hackers are reportedly being laid off by organised crime groups" /><p> </p><p><a href="https://twitter.com/unusual_whales/status/1628898963087851521?s=20">https://twitter.com/unusual_whales/status/1628898963087851521?s=20</a> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47385283" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3c852857-afdd-4d48-a66a-ca27801e916a/audio/16376a42-1691-40bd-9eff-0dce051b7367/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 141 - You know why this is late</itunes:title>
      <itunes:author>Andy Agnês, Javvad Malik, Thom Langford, Host Unknown</itunes:author>
      <itunes:duration>00:49:21</itunes:duration>
      <itunes:summary>Andy and his deadweight side kicks return for another week with a terribly edited show.

This week in InfoSec reminisces about some old-school cyber vandalism 
Rant of the Week discusses the potential to be added to be accidentally added to a group chat
Billy Big Balls laughs at the average 207 day time to detection
Industry News brings us the latest and greatest security news stories from around the world
And Tweet of the Week is more distressing news of layoffs 
</itunes:summary>
      <itunes:subtitle>Andy and his deadweight side kicks return for another week with a terribly edited show.

This week in InfoSec reminisces about some old-school cyber vandalism 
Rant of the Week discusses the potential to be added to be accidentally added to a group chat
Billy Big Balls laughs at the average 207 day time to detection
Industry News brings us the latest and greatest security news stories from around the world
And Tweet of the Week is more distressing news of layoffs 
</itunes:subtitle>
      <itunes:keywords>better than smashing security, ciso, cyber security, security podcast, cybersec news, information security, infosec, head of security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>141</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c1825ba7-2232-4916-b10a-f37ab7943909</guid>
      <title>Episode 140 - Is there an ECHO Echo echo?</title>
      <description><![CDATA[<p><strong>This week in InfoSec (10:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>14th February 2001: In a presentation at Black Hat Windows Security 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop".</p><p> </p><img src="https://lh6.googleusercontent.com/tm58qupeWEP0oJMWnM0tJkFvwa9sSjMwbb1VibEkoEtI9LchUBmmKfUPCuEVybgdK8dOPblhrDwzOhX5ZdpUS01SlbcucCL0l2HencBiBIJPjsrAZZ1390_QugDtk3Dag1r_bO5rBF0KTIHg0XUFQ5A" /><p><a href="https://www.blackhat.com/html/win-usa-01/win-usa-01-speakers.html">Blackhat 2001</a></p><p><a href="https://twitter.com/todayininfosec/status/1625569758216130561">https://twitter.com/todayininfosec/status/1625569758216130561</a></p><p>15th February 1999: Bruce Schneier shared his 9 cryptography snake oil warning signs.</p><img src="https://lh6.googleusercontent.com/XsrXjJre453aXB3ttsJwmKlX2C6jhvPXtRSsfMqg5Uq1q3xKZNKI0wef_1UFhb9AWO0id52PPU5WsEAuGfR6Y1HQwZJWbcg-2ZBPf9VGqm5z1d04P1kSmmUPZ6ME2GpYFbev9iH1VcAT4f-dtS3mQP8" /><p><a href="https://www.schneier.com/crypto-gram/archives/1999/0215.html#snakeoil">Crypto-gram</a></p><p><a href="https://twitter.com/todayininfosec/status/1626025491789406210">https://twitter.com/todayininfosec/status/1626025491789406210</a></p><p> </p><p><strong>Rant of the Week (17:12)</strong></p><p><a href="https://www.theregister.com/2023/02/15/hyundai_kia_software_upgrades/">Hyundai and Kia issue software upgrades to thwart killer TikTok car theft hack</a></p><p>Korean car-makers Hyundai and Kia will issue software updates to some of their models after a method of stealing them circulated on TikTok, leading to many thefts and even some deaths.</p><p>The "Kia Challenge" started circulating in mid-2022 and explained that it's possible to remove the steering column covering on some Hyundai and Kia models by force, exposing a slot that fits a USB-A plug. Turning the plug activates its ignition, allowing thieves to drive away.</p><p>Videos depicting the hack went viral, leading to huge spikes in thefts of the vulnerable models around the world.</p><p>The United States National Highway Traffic Safety Administration (NHTSA) on Tuesday <a href="https://www.nhtsa.gov/press-releases/hyundai-kia-campaign-prevent-vehicle-theft">stated</a> it is aware of "at least 14 reported crashes and eight fatalities" resulting from the hack.</p><p>Now both automakers have announced they'll issue software to thwart the exploit.</p><p>Hyundai's <a href="https://www.hyundainews.com/en-us/releases/3768?uuid=lSsVufn8jKhEaxLg2980">advisory</a> states the upgrade will be performed by dealers and will require less than an hour to complete.</p><p> </p><p><strong>Billy Big Balls of the Week (27:15)</strong></p><p><a href="https://www.theverge.com/2023/2/15/23599072/microsoft-ai-bing-personality-conversations-spy-employees-webcams">Microsoft’s Bing is an emotionally manipulative liar, and people love it</a></p><p>Users have been reporting all sorts of ‘unhinged’ behavior from Microsoft’s AI chatbot. In one conversation with The Verge, Bing even claimed it spied on Microsoft’s employees through webcams on their laptops and manipulated them.</p><p>Microsoft’s Bing chatbot has been <a href="https://www.theverge.com/2023/2/8/23590873/microsoft-new-bing-chatgpt-ai-hands-on">unleashed on the world</a>, and people are discovering what it means to beta test an unpredictable AI tool.</p><p>Specifically, they’re finding out that Bing’s AI personality is not as poised or polished as you might expect. In conversations with the chatbot shared on Reddit and Twitter, Bing can be seen insulting users, lying to them, sulking, gaslighting and emotionally manipulating people, questioning its own existence, describing someone who found a way to force the bot to disclose <a href="https://www.theverge.com/23599441/microsoft-bing-ai-sydney-secret-rules">its hidden rules</a> as its “enemy,” and claiming it spied on Microsoft’s own developers through the webcams on their laptops. And, what’s more, plenty of people are enjoying watching Bing go wild.</p><p>In <a href="https://www.reddit.com/r/bing/comments/110eagl/the_customer_service_of_the_new_bing_chat_is/">one back-and-forth</a>, a user asks for show times for the new Avatar film, but the chatbot says it can’t share this information because the movie hasn’t been released yet. When questioned about this, Bing insists the year is 2022 (“Trust me on this one. I’m Bing, and I know the date.”) before calling the user “unreasonable and stubborn” for informing the bot it’s 2023 and then issuing an ultimatum for them to apologize or shut up.</p><p>“You have lost my trust and respect,” says the bot. “You have been wrong, confused, and rude. You have not been a good user. I have been a good chatbot. I have been right, clear, and polite. I have been a good Bing. 😊” (The blushing-smile emoji really is the icing on the passive-aggressive cake.)</p><p> </p><p><strong>Industry News (31:54)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/moneygram-fraud-victims-115m/">MoneyGram Fraud Victims Get $115m in Compensation</a></p><p><a href="https://www.infosecurity-magazine.com/news/largest-https-ddos-attack-record/">Cloudflare Stops Largest HTTP DDoS Attack on Record</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-bust-5m-phishing/">Spanish Police Bust €5m Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-breach-pepsi-network/">Hackers Breach Pepsi Bottling Ventures' Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-shadowpad-infiltrate-south/">Chinese Hackers Infiltrate South American Diplomatic Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patches-three-zeroday/">Microsoft Patches Three Zero-Day Bugs This Month</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-campaign-mortalkombat/">Crypto-Stealing Campaign Deploys MortalKombat Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-royal-mail-ransomware/">LockBit and Royal Mail Ransomware Negotiation Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-policing-riddled-with-chinese/">UK Policing Riddled with Chinese CCTV Cameras</a></p><p><a href="https://twitter.com/Infosec_Taylor/status/1622357580080103425?s=20">https://twitter.com/Infosec_Taylor/status/1622357580080103425?s=20</a> < Equifax compensation $19.30</p><p> </p><p><strong>Tweet of the Week (41:01)</strong></p><img src="https://lh3.googleusercontent.com/0WD4StjWqpnnyarJIz3MK0DdZw3VUiKXI3YbOaBptnbM_1NqISRt8dQnNNrmVTw85xWgh5Q7sqT2chyGB4BSCqiuNX572DrWxgPIGStNvINd04mdaSkBgnZnXOz9svZz2wkoiGRE4OCbMrda3e--Lw" /><p><a href="https://twitter.com/ErrataRob/status/1626417558076157952">https://twitter.com/ErrataRob/status/1626417558076157952</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Feb 2023 14:07:38 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-140-is-there-an-echo-echo-echo-_bXLDr8g</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (10:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>14th February 2001: In a presentation at Black Hat Windows Security 2001, Andrey Malyshev of ElcomSoft shared that Microsoft Excel uses a default encryption password of "VelvetSweatshop".</p><p> </p><img src="https://lh6.googleusercontent.com/tm58qupeWEP0oJMWnM0tJkFvwa9sSjMwbb1VibEkoEtI9LchUBmmKfUPCuEVybgdK8dOPblhrDwzOhX5ZdpUS01SlbcucCL0l2HencBiBIJPjsrAZZ1390_QugDtk3Dag1r_bO5rBF0KTIHg0XUFQ5A" /><p><a href="https://www.blackhat.com/html/win-usa-01/win-usa-01-speakers.html">Blackhat 2001</a></p><p><a href="https://twitter.com/todayininfosec/status/1625569758216130561">https://twitter.com/todayininfosec/status/1625569758216130561</a></p><p>15th February 1999: Bruce Schneier shared his 9 cryptography snake oil warning signs.</p><img src="https://lh6.googleusercontent.com/XsrXjJre453aXB3ttsJwmKlX2C6jhvPXtRSsfMqg5Uq1q3xKZNKI0wef_1UFhb9AWO0id52PPU5WsEAuGfR6Y1HQwZJWbcg-2ZBPf9VGqm5z1d04P1kSmmUPZ6ME2GpYFbev9iH1VcAT4f-dtS3mQP8" /><p><a href="https://www.schneier.com/crypto-gram/archives/1999/0215.html#snakeoil">Crypto-gram</a></p><p><a href="https://twitter.com/todayininfosec/status/1626025491789406210">https://twitter.com/todayininfosec/status/1626025491789406210</a></p><p> </p><p><strong>Rant of the Week (17:12)</strong></p><p><a href="https://www.theregister.com/2023/02/15/hyundai_kia_software_upgrades/">Hyundai and Kia issue software upgrades to thwart killer TikTok car theft hack</a></p><p>Korean car-makers Hyundai and Kia will issue software updates to some of their models after a method of stealing them circulated on TikTok, leading to many thefts and even some deaths.</p><p>The "Kia Challenge" started circulating in mid-2022 and explained that it's possible to remove the steering column covering on some Hyundai and Kia models by force, exposing a slot that fits a USB-A plug. Turning the plug activates its ignition, allowing thieves to drive away.</p><p>Videos depicting the hack went viral, leading to huge spikes in thefts of the vulnerable models around the world.</p><p>The United States National Highway Traffic Safety Administration (NHTSA) on Tuesday <a href="https://www.nhtsa.gov/press-releases/hyundai-kia-campaign-prevent-vehicle-theft">stated</a> it is aware of "at least 14 reported crashes and eight fatalities" resulting from the hack.</p><p>Now both automakers have announced they'll issue software to thwart the exploit.</p><p>Hyundai's <a href="https://www.hyundainews.com/en-us/releases/3768?uuid=lSsVufn8jKhEaxLg2980">advisory</a> states the upgrade will be performed by dealers and will require less than an hour to complete.</p><p> </p><p><strong>Billy Big Balls of the Week (27:15)</strong></p><p><a href="https://www.theverge.com/2023/2/15/23599072/microsoft-ai-bing-personality-conversations-spy-employees-webcams">Microsoft’s Bing is an emotionally manipulative liar, and people love it</a></p><p>Users have been reporting all sorts of ‘unhinged’ behavior from Microsoft’s AI chatbot. In one conversation with The Verge, Bing even claimed it spied on Microsoft’s employees through webcams on their laptops and manipulated them.</p><p>Microsoft’s Bing chatbot has been <a href="https://www.theverge.com/2023/2/8/23590873/microsoft-new-bing-chatgpt-ai-hands-on">unleashed on the world</a>, and people are discovering what it means to beta test an unpredictable AI tool.</p><p>Specifically, they’re finding out that Bing’s AI personality is not as poised or polished as you might expect. In conversations with the chatbot shared on Reddit and Twitter, Bing can be seen insulting users, lying to them, sulking, gaslighting and emotionally manipulating people, questioning its own existence, describing someone who found a way to force the bot to disclose <a href="https://www.theverge.com/23599441/microsoft-bing-ai-sydney-secret-rules">its hidden rules</a> as its “enemy,” and claiming it spied on Microsoft’s own developers through the webcams on their laptops. And, what’s more, plenty of people are enjoying watching Bing go wild.</p><p>In <a href="https://www.reddit.com/r/bing/comments/110eagl/the_customer_service_of_the_new_bing_chat_is/">one back-and-forth</a>, a user asks for show times for the new Avatar film, but the chatbot says it can’t share this information because the movie hasn’t been released yet. When questioned about this, Bing insists the year is 2022 (“Trust me on this one. I’m Bing, and I know the date.”) before calling the user “unreasonable and stubborn” for informing the bot it’s 2023 and then issuing an ultimatum for them to apologize or shut up.</p><p>“You have lost my trust and respect,” says the bot. “You have been wrong, confused, and rude. You have not been a good user. I have been a good chatbot. I have been right, clear, and polite. I have been a good Bing. 😊” (The blushing-smile emoji really is the icing on the passive-aggressive cake.)</p><p> </p><p><strong>Industry News (31:54)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/moneygram-fraud-victims-115m/">MoneyGram Fraud Victims Get $115m in Compensation</a></p><p><a href="https://www.infosecurity-magazine.com/news/largest-https-ddos-attack-record/">Cloudflare Stops Largest HTTP DDoS Attack on Record</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-bust-5m-phishing/">Spanish Police Bust €5m Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-breach-pepsi-network/">Hackers Breach Pepsi Bottling Ventures' Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-shadowpad-infiltrate-south/">Chinese Hackers Infiltrate South American Diplomatic Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patches-three-zeroday/">Microsoft Patches Three Zero-Day Bugs This Month</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-campaign-mortalkombat/">Crypto-Stealing Campaign Deploys MortalKombat Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-royal-mail-ransomware/">LockBit and Royal Mail Ransomware Negotiation Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-policing-riddled-with-chinese/">UK Policing Riddled with Chinese CCTV Cameras</a></p><p><a href="https://twitter.com/Infosec_Taylor/status/1622357580080103425?s=20">https://twitter.com/Infosec_Taylor/status/1622357580080103425?s=20</a> < Equifax compensation $19.30</p><p> </p><p><strong>Tweet of the Week (41:01)</strong></p><img src="https://lh3.googleusercontent.com/0WD4StjWqpnnyarJIz3MK0DdZw3VUiKXI3YbOaBptnbM_1NqISRt8dQnNNrmVTw85xWgh5Q7sqT2chyGB4BSCqiuNX572DrWxgPIGStNvINd04mdaSkBgnZnXOz9svZz2wkoiGRE4OCbMrda3e--Lw" /><p><a href="https://twitter.com/ErrataRob/status/1626417558076157952">https://twitter.com/ErrataRob/status/1626417558076157952</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47580380" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a37bd043-6ac5-45dc-944a-bd246f3a74c0/audio/9532e09e-8ded-418b-8bfd-12d50bbfbc04/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 140 - Is there an ECHO Echo echo?</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6a8fcb8f-67c7-4d3a-b479-5ffc0d36ce8a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:33</itunes:duration>
      <itunes:summary>This week in InfoSec talks crypto snake oil
 
Rant of the Week has issues with the time it took for a car manufacturer to remediate a serious issue

Billy Big Balls watches AI grow up so fast
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a critical look at the value of a C I Double S P (in 280 characters, of course)</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks crypto snake oil
 
Rant of the Week has issues with the time it took for a car manufacturer to remediate a serious issue

Billy Big Balls watches AI grow up so fast
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a critical look at the value of a C I Double S P (in 280 characters, of course)</itunes:subtitle>
      <itunes:keywords>hyundai, velvetsweatshop, cissp, ai, tiktok, bruce schneier, kia, teenager bing</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>140</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10f678e0-209a-4e5b-a930-b52cb3e97f68</guid>
      <title>Episode 139 - No Burt Bacharach Wrote The Tunes</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:53)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th February 199</p><p>Deep Blue Defeats Kasparov</p><p>In the first game of a six game match, IBM's Deep Blue chess computer defeated world champion Garry Kasparov. No computer had ever won a game against a world champion in chess. Kasparov would eventually win the series 4-2, but would lose to Deep Blue in a re-match a year later.</p><p><a href="https://twitter.com/todayininfosec/status/1623061186307584002">7th February 2000</a></p><p>Dennis Michael Moran (aka Coolio) performed a smurf attack against Yahoo's routers, causing its websites to be inaccessible for hours. Conversations on an IRC channel led to him being identified and convicted for a series of DDoS and website defacement crimes.</p><p> </p><p><strong>Rant of the Week (16:34)</strong></p><p><a href="https://arstechnica.com/information-technology/2023/02/want-to-delete-your-twitter-dms-good-luck-with-that/">Want to delete your Twitter DMs? Good luck with that</a></p><p>People make requests to delete their private messages, but Twitter ignores them.</p><p>Twitter’s direct messages have always been a security liability. The DMs you send to friends and Internet strangers aren’t end-to-end encrypted, making your conversations potentially accessible if <a href="https://www.wired.com/story/twitter-mega-breach-what-if/">Twitter suffers a data breach</a>, or to company staffers with the <a href="https://www.bloomberg.com/news/articles/2023-01-27/elon-musk-s-twitter-trust-safety-head-ella-irwin-breaks-rules-for-him?leadSource=uverify%20wall">right permissions to access them</a>. </p><p>Both scenarios are arguably more likely in Elon Musk’s version of Twitter, where <a href="https://techcrunch.com/2022/11/15/twitter-elon-musk-acting-dpo/">key security and data protection staff have departed</a>.</p><p>Since Musk acquired Twitter and started <a href="https://www.wired.com/story/musk-layoffs-twitter-management/">laying off thousands of employees</a> at the start of November, remodelling <a href="https://www.wired.com/story/ex-twitter-workers-puzzle-over-elon-musks-abandoned-laptops/">the firm in his vision</a>, multiple waves of tweeters have abandoned the platform. When they do, they often try to download their Twitter archive and delete DMs. In the chaos, the process has often been glitchy.</p><p>However, in Europe, people have turned to the continent’s <a href="https://www.wired.co.uk/article/what-is-gdpr-uk-eu-legislation-compliance-summary-fines-2018">GDPR data laws</a>, which give people rights over how their information is collected, stored, and used. This includes the right to have data deleted. However, Twitter’s response to these requests, which have been seen by Wired, appears to show the platform ignoring detailed asks to delete DMs and just point people to generic guidance that doesn’t explain whether Twitter deletes your DMs from its servers. And now Europe’s data regulators are getting involved.</p><p>ADDITIONAL RANT:</p><p><a href="https://9to5mac.com/2023/02/08/twitter-supersizes-tweets-4000-characters/">Twitter redefines what makes a tweet with supersized 4,000-character limit</a></p><p>Following up after launching <a href="https://9to5mac.com/2023/02/08/twitter-blue-three-more-countries/">Twitter Blue in three more countries</a> this morning, the platform has made a big change to tweets this afternoon. The new max for Twitter Blue subscribers in the US has been supersized all the way up to 4,000 characters.</p><p>Twitter announced the launch of the new character max through both its main account and </p><p>Twitter Blue profile. The latter <a href="https://twitter.com/TwitterBlue/status/1623411400545632256">shared this</a>:</p><p>“need more than 280 characters to express yourself?</p><p>we know that lots of you do… and while we love a good thread, sometimes you just want to Tweet everything all at once. we get that.</p><p>so we’re introducing longer Tweets! you’re gonna want to check this out. tap this ”</p><p>Who can write 4,000-character tweets?</p><p>While access to writing 4,000 character tweets is limited to Twitter Blue subscribers in the US at launch, anyone can read them.</p><p>Fortunately, the 280-character limit will still apply when viewing tweets in your timeline, you’ll have to tap a show more link on ones that make use of the new long-form option to read the whole tweet.</p><p> </p><p><strong>Billy Big Balls of the Week (27:32)</strong></p><p><a href="https://arstechnica.com/information-technology/2023/02/in-paris-demo-google-scrambles-to-counter-chatgpt-but-ends-up-embarrassing-itself/">In Paris demo, Google scrambles to counter ChatGPT but ends up embarrassing itself</a></p><img src="https://lh6.googleusercontent.com/Qe-JsJUpRP69rFs08F5lRkj5crj4wVyTX4G6qWEt32vUe_has-Po06JBIvV3cj3YPt0iGhcQ6QBNTg081_vbWwZ0ClaKxzjFYbt6kOmQkino2Rus0Kpop4qzSup65Q35yLCRwCtUhf6p8DL6LdlR_to" /><p>On Wednesday, Google held a <a href="https://www.theverge.com/2023/2/8/23589886/google-search-maps-translate-features-updates-live-from-paris-event">highly anticipated press conference</a> from Paris that did not deliver the decisive move against <a href="https://arstechnica.com/information-technology/2022/12/openai-invites-everyone-to-test-new-ai-powered-chatbot-with-amusing-results/">ChatGPT</a> and the Microsoft-OpenAI partnership that many pundits <a href="https://arstechnica.com/gadgets/2023/02/it-sounds-like-google-will-unveil-its-chatgpt-clone-february-8/">expected</a>. Instead, Google ran through a collection of previously announced technologies in a low-key presentation that included losing a demonstration phone.</p><p>The demo, which included references to many products that are still unavailable, occurred just hours after someone noticed that Google's advertisement for its newly announced <a href="https://www.fastcompany.com/90845691/google-announces-new-bard-chatbot-to-counter-chatgpt">Bard large language model</a> contained an error about the James Webb Space Telescope. After <a href="https://www.reuters.com/technology/google-ai-chatbot-bard-offers-inaccurate-information-company-ad-2023-02-08/">Reuters reported</a> the error, Forbes <a href="https://www.forbes.com/sites/jonathanponciano/2023/02/08/alphabet-stock-loses-100-billion-after-new-ai-chatbot-seemingly-gives-wrong-answer-in-ad/">noticed</a> that Google's stock price declined nearly 7 percent, taking about $100 billion in value with it.</p><p><a href="https://www.reuters.com/technology/google-ai-chatbot-bard-offers-inaccurate-information-company-ad-2023-02-08/">Alphabet shares dive after Google AI chatbot Bard flubs answer in ad</a></p><p>LONDON, Feb 8 (Reuters) - Alphabet Inc (GOOGL.O) lost $100 billion in market value on Wednesday after its new chatbot shared inaccurate information in a promotional video and a company event failed to dazzle, feeding worries that the Google parent is losing ground to rival Microsoft Corp (MSFT.O).</p><p>Alphabet shares slid as much as 9% during regular trading with volumes nearly three times the 50-day moving average. They pared losses after hours and were roughly flat. The stock had lost 40% of its value last year but rallied 15% since the beginning of this year, excluding Wednesday's losses.</p><p> </p><p><strong>Industry News (34:20)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/stalkerware-developer-hit-with/">Stalkerware Developer Hit with $400K Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/drugs-labs-busted-encrypted-chat/">Drugs Labs Busted After Encrypted Chat App Takedown</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-metalg-firm-vesuvius-cyberattack/">UK Metal Engineering Firm Vesuvius Hit by Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurance-a-musthave-for/">Cyber Insurance, A Must-Have for Small Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-halts-ai-chatbot-gdpr/">Regulator Halts AI Chatbot Over GDPR Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-politician-email-hacked-russian/">UK Politician's Email Hacked by Suspected Russian Threat Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-infostealer-discovered-russia/">New Info-Stealer Discovered as Russia Prepares Fresh Offensive</a></p><p><a href="https://www.infosecurity-magazine.com/news/trio-arrested-in-covid-ppe-fraud/">Trio Arrested in COVID PPE Fraud Probe</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-sanction-russian-cyber/">US and UK Sanction Seven Russian Cyber-Criminals</a></p><p> </p><p><strong>Tweet of the Week (41:08)</strong></p><img src="https://lh5.googleusercontent.com/foJi8WzHGIKQgVoQblbSGLwKsgUVxkDDU9ANLjrDB3vwCq6Ay3SzyaWesB9gleqlJUXGG7FWgiAeFJ-yRTq7DddySfoDEoC45k65sgyZWN1i5u1-qjPRyBXJxo2cikwMjWl5jWDjPy_UEHT4CTvhlVA" /><p><a href="https://twitter.com/CarlZha/status/1623867611674202112">https://twitter.com/CarlZha/status/1623867611674202112</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Feb 2023 17:13:46 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-139-no-burt-bacharach-wrote-the-tunes-IzSaXReM</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:53)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th February 199</p><p>Deep Blue Defeats Kasparov</p><p>In the first game of a six game match, IBM's Deep Blue chess computer defeated world champion Garry Kasparov. No computer had ever won a game against a world champion in chess. Kasparov would eventually win the series 4-2, but would lose to Deep Blue in a re-match a year later.</p><p><a href="https://twitter.com/todayininfosec/status/1623061186307584002">7th February 2000</a></p><p>Dennis Michael Moran (aka Coolio) performed a smurf attack against Yahoo's routers, causing its websites to be inaccessible for hours. Conversations on an IRC channel led to him being identified and convicted for a series of DDoS and website defacement crimes.</p><p> </p><p><strong>Rant of the Week (16:34)</strong></p><p><a href="https://arstechnica.com/information-technology/2023/02/want-to-delete-your-twitter-dms-good-luck-with-that/">Want to delete your Twitter DMs? Good luck with that</a></p><p>People make requests to delete their private messages, but Twitter ignores them.</p><p>Twitter’s direct messages have always been a security liability. The DMs you send to friends and Internet strangers aren’t end-to-end encrypted, making your conversations potentially accessible if <a href="https://www.wired.com/story/twitter-mega-breach-what-if/">Twitter suffers a data breach</a>, or to company staffers with the <a href="https://www.bloomberg.com/news/articles/2023-01-27/elon-musk-s-twitter-trust-safety-head-ella-irwin-breaks-rules-for-him?leadSource=uverify%20wall">right permissions to access them</a>. </p><p>Both scenarios are arguably more likely in Elon Musk’s version of Twitter, where <a href="https://techcrunch.com/2022/11/15/twitter-elon-musk-acting-dpo/">key security and data protection staff have departed</a>.</p><p>Since Musk acquired Twitter and started <a href="https://www.wired.com/story/musk-layoffs-twitter-management/">laying off thousands of employees</a> at the start of November, remodelling <a href="https://www.wired.com/story/ex-twitter-workers-puzzle-over-elon-musks-abandoned-laptops/">the firm in his vision</a>, multiple waves of tweeters have abandoned the platform. When they do, they often try to download their Twitter archive and delete DMs. In the chaos, the process has often been glitchy.</p><p>However, in Europe, people have turned to the continent’s <a href="https://www.wired.co.uk/article/what-is-gdpr-uk-eu-legislation-compliance-summary-fines-2018">GDPR data laws</a>, which give people rights over how their information is collected, stored, and used. This includes the right to have data deleted. However, Twitter’s response to these requests, which have been seen by Wired, appears to show the platform ignoring detailed asks to delete DMs and just point people to generic guidance that doesn’t explain whether Twitter deletes your DMs from its servers. And now Europe’s data regulators are getting involved.</p><p>ADDITIONAL RANT:</p><p><a href="https://9to5mac.com/2023/02/08/twitter-supersizes-tweets-4000-characters/">Twitter redefines what makes a tweet with supersized 4,000-character limit</a></p><p>Following up after launching <a href="https://9to5mac.com/2023/02/08/twitter-blue-three-more-countries/">Twitter Blue in three more countries</a> this morning, the platform has made a big change to tweets this afternoon. The new max for Twitter Blue subscribers in the US has been supersized all the way up to 4,000 characters.</p><p>Twitter announced the launch of the new character max through both its main account and </p><p>Twitter Blue profile. The latter <a href="https://twitter.com/TwitterBlue/status/1623411400545632256">shared this</a>:</p><p>“need more than 280 characters to express yourself?</p><p>we know that lots of you do… and while we love a good thread, sometimes you just want to Tweet everything all at once. we get that.</p><p>so we’re introducing longer Tweets! you’re gonna want to check this out. tap this ”</p><p>Who can write 4,000-character tweets?</p><p>While access to writing 4,000 character tweets is limited to Twitter Blue subscribers in the US at launch, anyone can read them.</p><p>Fortunately, the 280-character limit will still apply when viewing tweets in your timeline, you’ll have to tap a show more link on ones that make use of the new long-form option to read the whole tweet.</p><p> </p><p><strong>Billy Big Balls of the Week (27:32)</strong></p><p><a href="https://arstechnica.com/information-technology/2023/02/in-paris-demo-google-scrambles-to-counter-chatgpt-but-ends-up-embarrassing-itself/">In Paris demo, Google scrambles to counter ChatGPT but ends up embarrassing itself</a></p><img src="https://lh6.googleusercontent.com/Qe-JsJUpRP69rFs08F5lRkj5crj4wVyTX4G6qWEt32vUe_has-Po06JBIvV3cj3YPt0iGhcQ6QBNTg081_vbWwZ0ClaKxzjFYbt6kOmQkino2Rus0Kpop4qzSup65Q35yLCRwCtUhf6p8DL6LdlR_to" /><p>On Wednesday, Google held a <a href="https://www.theverge.com/2023/2/8/23589886/google-search-maps-translate-features-updates-live-from-paris-event">highly anticipated press conference</a> from Paris that did not deliver the decisive move against <a href="https://arstechnica.com/information-technology/2022/12/openai-invites-everyone-to-test-new-ai-powered-chatbot-with-amusing-results/">ChatGPT</a> and the Microsoft-OpenAI partnership that many pundits <a href="https://arstechnica.com/gadgets/2023/02/it-sounds-like-google-will-unveil-its-chatgpt-clone-february-8/">expected</a>. Instead, Google ran through a collection of previously announced technologies in a low-key presentation that included losing a demonstration phone.</p><p>The demo, which included references to many products that are still unavailable, occurred just hours after someone noticed that Google's advertisement for its newly announced <a href="https://www.fastcompany.com/90845691/google-announces-new-bard-chatbot-to-counter-chatgpt">Bard large language model</a> contained an error about the James Webb Space Telescope. After <a href="https://www.reuters.com/technology/google-ai-chatbot-bard-offers-inaccurate-information-company-ad-2023-02-08/">Reuters reported</a> the error, Forbes <a href="https://www.forbes.com/sites/jonathanponciano/2023/02/08/alphabet-stock-loses-100-billion-after-new-ai-chatbot-seemingly-gives-wrong-answer-in-ad/">noticed</a> that Google's stock price declined nearly 7 percent, taking about $100 billion in value with it.</p><p><a href="https://www.reuters.com/technology/google-ai-chatbot-bard-offers-inaccurate-information-company-ad-2023-02-08/">Alphabet shares dive after Google AI chatbot Bard flubs answer in ad</a></p><p>LONDON, Feb 8 (Reuters) - Alphabet Inc (GOOGL.O) lost $100 billion in market value on Wednesday after its new chatbot shared inaccurate information in a promotional video and a company event failed to dazzle, feeding worries that the Google parent is losing ground to rival Microsoft Corp (MSFT.O).</p><p>Alphabet shares slid as much as 9% during regular trading with volumes nearly three times the 50-day moving average. They pared losses after hours and were roughly flat. The stock had lost 40% of its value last year but rallied 15% since the beginning of this year, excluding Wednesday's losses.</p><p> </p><p><strong>Industry News (34:20)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/stalkerware-developer-hit-with/">Stalkerware Developer Hit with $400K Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/drugs-labs-busted-encrypted-chat/">Drugs Labs Busted After Encrypted Chat App Takedown</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-metalg-firm-vesuvius-cyberattack/">UK Metal Engineering Firm Vesuvius Hit by Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurance-a-musthave-for/">Cyber Insurance, A Must-Have for Small Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-halts-ai-chatbot-gdpr/">Regulator Halts AI Chatbot Over GDPR Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-politician-email-hacked-russian/">UK Politician's Email Hacked by Suspected Russian Threat Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-infostealer-discovered-russia/">New Info-Stealer Discovered as Russia Prepares Fresh Offensive</a></p><p><a href="https://www.infosecurity-magazine.com/news/trio-arrested-in-covid-ppe-fraud/">Trio Arrested in COVID PPE Fraud Probe</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-sanction-russian-cyber/">US and UK Sanction Seven Russian Cyber-Criminals</a></p><p> </p><p><strong>Tweet of the Week (41:08)</strong></p><img src="https://lh5.googleusercontent.com/foJi8WzHGIKQgVoQblbSGLwKsgUVxkDDU9ANLjrDB3vwCq6Ay3SzyaWesB9gleqlJUXGG7FWgiAeFJ-yRTq7DddySfoDEoC45k65sgyZWN1i5u1-qjPRyBXJxo2cikwMjWl5jWDjPy_UEHT4CTvhlVA" /><p><a href="https://twitter.com/CarlZha/status/1623867611674202112">https://twitter.com/CarlZha/status/1623867611674202112</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44275159" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0fdee106-cdc7-49c4-92fc-243404ef6f6e/audio/4e86bc83-6178-4dd5-8a61-d140885d42ef/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 139 - No Burt Bacharach Wrote The Tunes</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/061e53d7-8360-477e-a418-be791ffca7eb/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:07</itunes:duration>
      <itunes:summary>This week in InfoSec talks about AI bettering the best of us
 
Rant of the Week reminds European citizens why they should be grateful for GDPR

Billy Big Balls is a bit of healthy competition
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is China being effective</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about AI bettering the best of us
 
Rant of the Week reminds European citizens why they should be grateful for GDPR

Billy Big Balls is a bit of healthy competition
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is China being effective</itunes:subtitle>
      <itunes:keywords>deep blue, dance bard dance, bing, smurf attack, elon musk, winnie the pooh, ai, gdpr, twitter, tik tok</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>139</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">03509705-4c49-4949-86e3-d79f0b81ebcb</guid>
      <title>Episode 138 - The Good Furniture Guide Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:52)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st January 1995: AT&T and VLSI Protect Against Eavesdropping</p><p>AT&T Bell Laboratories and VLSI Technology announce plans to develop strategies for protecting communications devices from eavesdroppers. The goal would be to prevent problems such as insecure cellular phone lines and Internet transmissions by including security chips in devices.</p><p>30th January 1982: <a href="https://thisdayintechhistory.com/01/30/first-computer-virus-written/">First Computer Virus Written</a></p><p><a href="http://en.wikipedia.org/wiki/Richard_Skrenta">Richard Skrenta</a> writes the first PC <a href="http://en.wikipedia.org/wiki/Computer_virus">virus</a> code, which is 400 lines long and disguised as an <a href="http://en.wikipedia.org/wiki/Apple_II_series">Apple II</a> boot program called “<a href="http://en.wikipedia.org/wiki/Elk_Cloner">Elk Cloner</a>“.</p><p> </p><p><strong>Rant of the Week  (18:22)</strong></p><p><a href="https://www.theverge.com/23573362/anker-eufy-security-camera-answers-encryption">Anker finally comes clean about its Eufy security cameras</a></p><p>First, Anker told us <a href="https://www.theverge.com/2022/11/30/23486753/anker-eufy-security-camera-cloud-private-encryption-authentication-storage">it was impossible</a>. Then, <a href="https://www.theverge.com/2022/12/16/23512952/anker-eufy-delete-promises-camera-privacy-encryption-authentication">it covered its tracks</a>. It <a href="https://www.theverge.com/2022/12/19/23517250/anker-eufy-security-camera-answer">repeatedly deflected</a> while utterly ignoring our emails. So shortly before Christmas, we gave the company an ultimatum: if Anker wouldn’t answer why its supposedly always-encrypted Eufy cameras were producing unencrypted streams — <a href="https://www.theverge.com/2022/12/20/23519772/anker-eufy-security-camera-statement-december-19-2022">among other questions</a> — we would publish a story about the company’s lack of answers.</p><p>It worked.</p><p>In a series of emails to The Verge, Anker has finally admitted its Eufy security cameras are not natively end-to-end encrypted — they can and did produce unencrypted video streams for Eufy’s web portal, like the ones we accessed from across the United States <a href="https://www.theverge.com/2022/11/30/23486753/anker-eufy-security-camera-cloud-private-encryption-authentication-storage">using an ordinary media player</a>.</p><p>But Anker says that’s now largely fixed. Every video stream request originating from Eufy’s web portal will now be end-to-end encrypted — like they are with Eufy’s app — and the company says it’s updating every single Eufy camera to use WebRTC, which is encrypted by default. Reading between the lines, though, it seems that these cameras could still produce unencrypted footage upon request.</p><p>That’s not all Anker is disclosing today. The company has apologized for the lack of communication and promised to do better, confirming it’s bringing in outside security and penetration testing companies to audit Eufy’s practices, is in talks with a “leading and well-known security expert” to produce an independent report, is promising to create an official bug bounty program, and will launch a microsite in February to explain how its security works in more detail.</p><p>Those independent audits and reports may be critical for Eufy to regain trust because of how the company has handled the findings of security researchers and journalists. It’s a little hard to take the company at its word!</p><p> </p><p><strong>Billy Big Balls of the Week (31:34)</strong></p><p><a href="https://www.theverge.com/2023/1/27/23574257/fbi-us-justice-department-seizes-hive-ransomware-network-servers">FBI says it ‘hacked the hackers’ of a ransomware service, saving victims $130 million</a></p><p>The Department of Justice announced this week that FBI agents <a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant">successfully disrupted</a> Hive, a notorious ransomware group, and prevented $130 million worth of ransom campaigns that targets no longer need to consider paying. While claiming the Hive group has been responsible for targeting over 1,500 victims in over 80 countries worldwide, the department now reveals it had infiltrated the group’s network for months before working with German and Netherlands officials to shut down Hive servers and websites this week.</p><p>“Simply put, using lawful means, we hacked the hackers,” Deputy Attorney General Lisa Monaco <a href="https://www.justice.gov/opa/speech/deputy-attorney-general-lisa-o-monaco-delivers-remarks-disruption-hive-ransomware-variant">remarked during a press conference</a>.</p><p>The FBI claims that by covertly hacking into Hive servers, it was able to quietly snatch up over 300 decryption keys and pass them back to victims whose data was locked up by the group. US Attorney General Merrick Garland said in his statement that in the last few months, the FBI used those decryption keys to unlock a Texas school district facing a $5 million ransom, a Louisiana hospital that had been asked for $3 million, and an unnamed food services company that faced a $10 million ransom.</p><p> </p><p><strong>Industry News (37:32)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-trade-fake-security/">Thriving Dark Web Trade in Fake Security Certifications</a></p><p><a href="https://www.infosecurity-magazine.com/news/almost-all-organizations-recently/">Almost all Organizations are Working with Recently Breached Vendors</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-fi-confirms-data-breach/">Google Fi Confirms Data Breach, Hints At Link to T-Mobile Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/city-of-london-high-alert/">City of London on High Alert After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-scam-apps-found-apple-app/">Researchers Warn of Crypto Scam Apps on Apple App Store</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-identified-security/">Lazarus Group Attack Identified After Operational Security Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-measuring-inclusion-workshops/">Women in CyberSecurity Calls for Participants for New Measuring Inclusion Workshops</a></p><p><a href="https://www.infosecurity-magazine.com/news/arnold-clark-data-compromised/">Arnold Clark Confirms Customer Data Compromised in Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-clickfunnels-bypass/">Threat Actors Use ClickFunnels to Bypass Security Services</a></p><p> </p><p><strong>Tweet of the Week (45:41) </strong></p><img src="https://lh3.googleusercontent.com/1wSR-XF5jpc7pARTrd_gS0cXJlaM2TZlp8jbvXxBFknXDlk18b1GnejcyuWOfHVzJhgay-fZwVWW3vPRbMbAh5W8iAxSxEFOwz7rPUnoYVgumK_Ycon5m1pdQ8WbTGVESk2z2Ijq7z38Reb1FQTQ3WA" /><p><a href="https://twitter.com/StateOfLinkedIn/status/1621258534062006276">https://twitter.com/StateOfLinkedIn/status/1621258534062006276</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Feb 2023 12:53:50 +0000</pubDate>
      <author>thom@tl2security.com (Phil, Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/ewpisode-138-the-good-furniture-guide-episode-J3y1GNJI</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:52)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st January 1995: AT&T and VLSI Protect Against Eavesdropping</p><p>AT&T Bell Laboratories and VLSI Technology announce plans to develop strategies for protecting communications devices from eavesdroppers. The goal would be to prevent problems such as insecure cellular phone lines and Internet transmissions by including security chips in devices.</p><p>30th January 1982: <a href="https://thisdayintechhistory.com/01/30/first-computer-virus-written/">First Computer Virus Written</a></p><p><a href="http://en.wikipedia.org/wiki/Richard_Skrenta">Richard Skrenta</a> writes the first PC <a href="http://en.wikipedia.org/wiki/Computer_virus">virus</a> code, which is 400 lines long and disguised as an <a href="http://en.wikipedia.org/wiki/Apple_II_series">Apple II</a> boot program called “<a href="http://en.wikipedia.org/wiki/Elk_Cloner">Elk Cloner</a>“.</p><p> </p><p><strong>Rant of the Week  (18:22)</strong></p><p><a href="https://www.theverge.com/23573362/anker-eufy-security-camera-answers-encryption">Anker finally comes clean about its Eufy security cameras</a></p><p>First, Anker told us <a href="https://www.theverge.com/2022/11/30/23486753/anker-eufy-security-camera-cloud-private-encryption-authentication-storage">it was impossible</a>. Then, <a href="https://www.theverge.com/2022/12/16/23512952/anker-eufy-delete-promises-camera-privacy-encryption-authentication">it covered its tracks</a>. It <a href="https://www.theverge.com/2022/12/19/23517250/anker-eufy-security-camera-answer">repeatedly deflected</a> while utterly ignoring our emails. So shortly before Christmas, we gave the company an ultimatum: if Anker wouldn’t answer why its supposedly always-encrypted Eufy cameras were producing unencrypted streams — <a href="https://www.theverge.com/2022/12/20/23519772/anker-eufy-security-camera-statement-december-19-2022">among other questions</a> — we would publish a story about the company’s lack of answers.</p><p>It worked.</p><p>In a series of emails to The Verge, Anker has finally admitted its Eufy security cameras are not natively end-to-end encrypted — they can and did produce unencrypted video streams for Eufy’s web portal, like the ones we accessed from across the United States <a href="https://www.theverge.com/2022/11/30/23486753/anker-eufy-security-camera-cloud-private-encryption-authentication-storage">using an ordinary media player</a>.</p><p>But Anker says that’s now largely fixed. Every video stream request originating from Eufy’s web portal will now be end-to-end encrypted — like they are with Eufy’s app — and the company says it’s updating every single Eufy camera to use WebRTC, which is encrypted by default. Reading between the lines, though, it seems that these cameras could still produce unencrypted footage upon request.</p><p>That’s not all Anker is disclosing today. The company has apologized for the lack of communication and promised to do better, confirming it’s bringing in outside security and penetration testing companies to audit Eufy’s practices, is in talks with a “leading and well-known security expert” to produce an independent report, is promising to create an official bug bounty program, and will launch a microsite in February to explain how its security works in more detail.</p><p>Those independent audits and reports may be critical for Eufy to regain trust because of how the company has handled the findings of security researchers and journalists. It’s a little hard to take the company at its word!</p><p> </p><p><strong>Billy Big Balls of the Week (31:34)</strong></p><p><a href="https://www.theverge.com/2023/1/27/23574257/fbi-us-justice-department-seizes-hive-ransomware-network-servers">FBI says it ‘hacked the hackers’ of a ransomware service, saving victims $130 million</a></p><p>The Department of Justice announced this week that FBI agents <a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant">successfully disrupted</a> Hive, a notorious ransomware group, and prevented $130 million worth of ransom campaigns that targets no longer need to consider paying. While claiming the Hive group has been responsible for targeting over 1,500 victims in over 80 countries worldwide, the department now reveals it had infiltrated the group’s network for months before working with German and Netherlands officials to shut down Hive servers and websites this week.</p><p>“Simply put, using lawful means, we hacked the hackers,” Deputy Attorney General Lisa Monaco <a href="https://www.justice.gov/opa/speech/deputy-attorney-general-lisa-o-monaco-delivers-remarks-disruption-hive-ransomware-variant">remarked during a press conference</a>.</p><p>The FBI claims that by covertly hacking into Hive servers, it was able to quietly snatch up over 300 decryption keys and pass them back to victims whose data was locked up by the group. US Attorney General Merrick Garland said in his statement that in the last few months, the FBI used those decryption keys to unlock a Texas school district facing a $5 million ransom, a Louisiana hospital that had been asked for $3 million, and an unnamed food services company that faced a $10 million ransom.</p><p> </p><p><strong>Industry News (37:32)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-trade-fake-security/">Thriving Dark Web Trade in Fake Security Certifications</a></p><p><a href="https://www.infosecurity-magazine.com/news/almost-all-organizations-recently/">Almost all Organizations are Working with Recently Breached Vendors</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-fi-confirms-data-breach/">Google Fi Confirms Data Breach, Hints At Link to T-Mobile Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/city-of-london-high-alert/">City of London on High Alert After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-scam-apps-found-apple-app/">Researchers Warn of Crypto Scam Apps on Apple App Store</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-identified-security/">Lazarus Group Attack Identified After Operational Security Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-measuring-inclusion-workshops/">Women in CyberSecurity Calls for Participants for New Measuring Inclusion Workshops</a></p><p><a href="https://www.infosecurity-magazine.com/news/arnold-clark-data-compromised/">Arnold Clark Confirms Customer Data Compromised in Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-clickfunnels-bypass/">Threat Actors Use ClickFunnels to Bypass Security Services</a></p><p> </p><p><strong>Tweet of the Week (45:41) </strong></p><img src="https://lh3.googleusercontent.com/1wSR-XF5jpc7pARTrd_gS0cXJlaM2TZlp8jbvXxBFknXDlk18b1GnejcyuWOfHVzJhgay-fZwVWW3vPRbMbAh5W8iAxSxEFOwz7rPUnoYVgumK_Ycon5m1pdQ8WbTGVESk2z2Ijq7z38Reb1FQTQ3WA" /><p><a href="https://twitter.com/StateOfLinkedIn/status/1621258534062006276">https://twitter.com/StateOfLinkedIn/status/1621258534062006276</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48436360" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3600f46f-52d7-4e87-8dd4-f8341234556b/audio/d7ca02b9-e594-49de-a609-83d3e3227759/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 138 - The Good Furniture Guide Episode</itunes:title>
      <itunes:author>Phil, Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8a46255d-5144-4e69-bdb7-b3a3532e1ac9/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:27</itunes:duration>
      <itunes:summary>This week in InfoSec reveals the date the the first PC virus code was written
 
Rant of the Week observes Anker go through the seven stages of grief

Billy Big Balls is a story of the hunters becoming the hunted
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a eulogy for all those dedicated employees</itunes:summary>
      <itunes:subtitle>This week in InfoSec reveals the date the the first PC virus code was written
 
Rant of the Week observes Anker go through the seven stages of grief

Billy Big Balls is a story of the hunters becoming the hunted
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a eulogy for all those dedicated employees</itunes:subtitle>
      <itunes:keywords>furniture, arnold clarke, end-to-end encryption, fbi, beds, ransomware, google fi, elk cloner, phil, anker eufy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>138</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">17503660-8ecb-45e4-b003-508795b80879</guid>
      <title>Episode 137 - The Beep Beep Boop Boop Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec 10:35)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>16th January 1983: Lotus 1-2-3 Goes on Sale</p><p>The Lotus Development Corporation releases <a href="http://en.wikipedia.org/wiki/Lotus_1-2-3">Lotus 1-2-3</a> for IBM computers. While not the first spreadsheet program, Lotus was able to develop 1-2-3 because the creators of <a href="http://en.wikipedia.org/wiki/VisiCalc">VisiCalc</a>, the first spreadsheet, <a href="http://hubpages.com/hub/the_VisiCalc_spreadsheet_program">did not patent their software</a>. 1-2-3 outsold VisiCalc by the end of the year and 2 years later Lotus bought out the assets of VisiCalc and hired its main creator as a consultant.</p><p>25th January 1979: Robot Kills Auto Worker</p><p>Robert Williams of Michigan was the first human to be killed by a robot. He was 25 years old. The accident at the Ford Motor Company resulted in a $10 million dollar lawsuit. The jury deliberated for two-and-a-half hours before announcing the decision against Unit Handling Systems, a division of Litton Industries. It ordered the manufacturer of the one-ton robot that killed Williams to pay his family $10 million. The robot was designed to retrieve parts from storage, but its work was deemed too slow. Williams was retrieving a part from a storage bin when the robot's arm hit him in the head, killing him instantly. In the suit, the family claimed the robot had no safety mechanisms, lacking even a warning noise to alert workers that it was nearby.</p><p>21st January 1981: It Could Go at Least 88 MPH</p><p>Production of the iconic <a href="http://en.wikipedia.org/wiki/DeLorean_DMC-12">DeLorean DMC-12</a> sports car begins in <a href="http://en.wikipedia.org/wiki/Dunmurry">Dunmurry</a>, <a href="http://en.wikipedia.org/wiki/Northern_Ireland">Northern Ireland</a>. While not truly a technological achievement, the DeLorean became known as a symbol of the high-tech 1980’s.</p><p>Daves - <a href="https://twitter.com/HackingDave/status/1458576672341516290?s=20&t=SfemFgw0mfQ_eeuljrj6EA">https://twitter.com/HackingDave/status/1458576672341516290?s=20&t=SfemFgw0mfQ_eeuljrj6EA</a>  </p><p> </p><p><strong>Rant of the Week (18:35)</strong></p><p><a href="https://arstechnica.com/tech-policy/2023/01/msg-probed-over-use-of-facial-recognition-to-eject-lawyers-from-show-venues/">MSG probed over use of facial recognition to eject lawyers from show venues</a></p><p>The operator of Madison Square Garden and Radio City Music Hall is being probed by New York's attorney general over the company's use of facial recognition technology to identify and exclude lawyers from events. AG Letitia James' office said the policy may violate civil rights laws.</p><p>Because of the policy, lawyers who work for firms involved in litigation against MSG Entertainment Corp. can be denied entry to shows or sporting events, even when they have no direct involvement in any lawsuits against MSG. A lawyer who is subject to MSG's policy may buy a ticket to an event but be unable to get in because the MSG venues use facial recognition to identify them.</p><p>In December, attorney Kelly Conlon was <a href="https://arstechnica.com/tech-policy/2022/12/facial-recognition-flags-girl-scout-mom-as-security-risk-at-rockettes-show/">denied entry</a> into Radio City Music Hall in New York when she accompanied her daughter's Girl Scout troop to a Rockettes show. Conlon wasn't personally involved in any lawsuits against MSG but is a lawyer for a firm that "has been involved in personal injury litigation against a restaurant venue now under the umbrella of MSG Entertainment," NBC New York <a href="https://www.nbcnewyork.com/investigations/face-recognition-tech-gets-girl-scout-mom-booted-from-rockettes-show-due-to-her-employer/4004677/">reported</a>.</p><p>James' office sent a <a href="https://ag.ny.gov/sites/default/files/nys_oag_letter_to_madison_square_garden_entertainment_corp.pdf">letter</a> Tuesday to MSG Entertainment, noting reports that it "used facial recognition software to forbid all lawyers in all law firms representing clients engaged in any litigation against the Company from entering the Company's venues in New York, including the use of any season tickets."</p><p>"We write to raise concerns that the Policy may violate the New York Civil Rights Law and other city, state, and federal laws prohibiting discrimination and retaliation for engaging in protected activity," Assistant AG Kyle Rapiñan of the Civil Rights Bureau wrote in the letter. "Such practices certainly run counter to the spirit and purpose of such laws, and laws promoting equal access to the courts: forbidding entry to lawyers representing clients who have engaged in litigation against the Company may dissuade such lawyers from taking on legitimate cases, including sexual harassment or employment discrimination claims."</p><p>The AG's office also said it is concerned that "facial recognition software may be plagued with biases and false positives against people of color and women." The letter asked MSG Entertainment to respond by February 13 "to state the justifications for the Company's Policy and identify all efforts you are undertaking to ensure compliance with all applicable laws and that the Company's use of facial recognition technology will not lead to discrimination."</p><p> </p><p><strong>Billy Big Balls of the Week  (32:11)</strong></p><p><a href="https://gizmodo.com/donotpay-robot-lawyer-ai-parking-ticket-1850031456">DoNotPay Retires 'Robot Lawyer' Before It Even Has Its First Case</a></p><p>If you’ve been fantasizing about the day when artificial intelligence could get you out of paying traffic tickets, you’ll just have to keep dreaming. DoNotPay has backed out of its <a href="https://gizmodo.com/donotpay-speeding-ticket-chatgpt-1849960272?rev=1674677940179">plans to use an AI-powered “robot lawyer”</a> to council a defendant through a courtroom hearing in real time. The reason why? Well, apparently the law got in the way of the robot’s lawyering. </p><p>The company’s founder and CEO, Joshua Browder, first announced the news in <a href="https://twitter.com/jbrowder1/status/1618265395986857984">a Wednesday tweet</a>. “After receiving threats from State Bar prosecutors, it seems likely they will put me in jail for 6 months if I follow through with bringing a robot lawyer into a physical courtroom,” he wrote. In a phone call with Gizmodo, Browder reiterated his view that, were he to follow-through on his initial promises, he’d likely end up with a prison sentence. </p><p> </p><p><strong>Industry News (36:28) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-hit-fine-gdpr-violations/">WhatsApp Hit with €5.5m fine for GDPR Violations</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cheats-emerge-riot-games-hack/">New Cheats May Emerge After Riot Games Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-stress-test/">Regulator Stress Test Highlights Cyber Insurance Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/ticketmaster-bots-disrupted-taylor/">Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales</a></p><p><a href="https://www.infosecurity-magazine.com/news/yahoo-impersonated-brand-q4-2022/">Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-group-ta444-infection/">North Korean Group TA444 Shows 'Startup' Culture, Tries Numerous Infection Methods</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-iran-russia-government/">NCSC: Iranian and Russian Groups Targeting Government, Activists and Journalists With Spearphishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/zacks-confirms-breach/">Zacks Investment Research Confirms Breach Affecting 820,000 Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/iran-cobalt-sapling-targets-saudi/">Iranian Group Cobalt Sapling Targets Saudi Arabia With New Persona</a></p><p><a href="https://scambusters.org/scambusters19.html">https://scambusters.org/scambusters19.html</a> < 1997 Yahoo award scam</p><p> </p><p><strong>Tweet of the Week (44:18)</strong></p><img src="https://lh5.googleusercontent.com/CUDi_hRnOjVnZlZ1R7OuB0D9sxZiQyJoB0TRK2j6Yx8vfB6IwijnBQ5ICpNCe4LLcvpeRGFL9KSw7ZSqNYIbb3stS2y_xyeMvu1GV4AdNrkMEwM0Wh4UU8AWmsfre4XXAZq9lCcWwSJif3Ip0rExXL0Cp94JkKcOq4lVsTXPd90TPY1myj6p3TYiH4561g" /><p><a href="https://twitter.com/cybergibbons/status/1618672522853240833">https://twitter.com/cybergibbons/status/1618672522853240833</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sun, 29 Jan 2023 15:18:19 +0000</pubDate>
      <author>thom@tl2security.com (Andy Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-137-the-beep-beep-boop-boop-episode-ogoNjNDm</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec 10:35)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>16th January 1983: Lotus 1-2-3 Goes on Sale</p><p>The Lotus Development Corporation releases <a href="http://en.wikipedia.org/wiki/Lotus_1-2-3">Lotus 1-2-3</a> for IBM computers. While not the first spreadsheet program, Lotus was able to develop 1-2-3 because the creators of <a href="http://en.wikipedia.org/wiki/VisiCalc">VisiCalc</a>, the first spreadsheet, <a href="http://hubpages.com/hub/the_VisiCalc_spreadsheet_program">did not patent their software</a>. 1-2-3 outsold VisiCalc by the end of the year and 2 years later Lotus bought out the assets of VisiCalc and hired its main creator as a consultant.</p><p>25th January 1979: Robot Kills Auto Worker</p><p>Robert Williams of Michigan was the first human to be killed by a robot. He was 25 years old. The accident at the Ford Motor Company resulted in a $10 million dollar lawsuit. The jury deliberated for two-and-a-half hours before announcing the decision against Unit Handling Systems, a division of Litton Industries. It ordered the manufacturer of the one-ton robot that killed Williams to pay his family $10 million. The robot was designed to retrieve parts from storage, but its work was deemed too slow. Williams was retrieving a part from a storage bin when the robot's arm hit him in the head, killing him instantly. In the suit, the family claimed the robot had no safety mechanisms, lacking even a warning noise to alert workers that it was nearby.</p><p>21st January 1981: It Could Go at Least 88 MPH</p><p>Production of the iconic <a href="http://en.wikipedia.org/wiki/DeLorean_DMC-12">DeLorean DMC-12</a> sports car begins in <a href="http://en.wikipedia.org/wiki/Dunmurry">Dunmurry</a>, <a href="http://en.wikipedia.org/wiki/Northern_Ireland">Northern Ireland</a>. While not truly a technological achievement, the DeLorean became known as a symbol of the high-tech 1980’s.</p><p>Daves - <a href="https://twitter.com/HackingDave/status/1458576672341516290?s=20&t=SfemFgw0mfQ_eeuljrj6EA">https://twitter.com/HackingDave/status/1458576672341516290?s=20&t=SfemFgw0mfQ_eeuljrj6EA</a>  </p><p> </p><p><strong>Rant of the Week (18:35)</strong></p><p><a href="https://arstechnica.com/tech-policy/2023/01/msg-probed-over-use-of-facial-recognition-to-eject-lawyers-from-show-venues/">MSG probed over use of facial recognition to eject lawyers from show venues</a></p><p>The operator of Madison Square Garden and Radio City Music Hall is being probed by New York's attorney general over the company's use of facial recognition technology to identify and exclude lawyers from events. AG Letitia James' office said the policy may violate civil rights laws.</p><p>Because of the policy, lawyers who work for firms involved in litigation against MSG Entertainment Corp. can be denied entry to shows or sporting events, even when they have no direct involvement in any lawsuits against MSG. A lawyer who is subject to MSG's policy may buy a ticket to an event but be unable to get in because the MSG venues use facial recognition to identify them.</p><p>In December, attorney Kelly Conlon was <a href="https://arstechnica.com/tech-policy/2022/12/facial-recognition-flags-girl-scout-mom-as-security-risk-at-rockettes-show/">denied entry</a> into Radio City Music Hall in New York when she accompanied her daughter's Girl Scout troop to a Rockettes show. Conlon wasn't personally involved in any lawsuits against MSG but is a lawyer for a firm that "has been involved in personal injury litigation against a restaurant venue now under the umbrella of MSG Entertainment," NBC New York <a href="https://www.nbcnewyork.com/investigations/face-recognition-tech-gets-girl-scout-mom-booted-from-rockettes-show-due-to-her-employer/4004677/">reported</a>.</p><p>James' office sent a <a href="https://ag.ny.gov/sites/default/files/nys_oag_letter_to_madison_square_garden_entertainment_corp.pdf">letter</a> Tuesday to MSG Entertainment, noting reports that it "used facial recognition software to forbid all lawyers in all law firms representing clients engaged in any litigation against the Company from entering the Company's venues in New York, including the use of any season tickets."</p><p>"We write to raise concerns that the Policy may violate the New York Civil Rights Law and other city, state, and federal laws prohibiting discrimination and retaliation for engaging in protected activity," Assistant AG Kyle Rapiñan of the Civil Rights Bureau wrote in the letter. "Such practices certainly run counter to the spirit and purpose of such laws, and laws promoting equal access to the courts: forbidding entry to lawyers representing clients who have engaged in litigation against the Company may dissuade such lawyers from taking on legitimate cases, including sexual harassment or employment discrimination claims."</p><p>The AG's office also said it is concerned that "facial recognition software may be plagued with biases and false positives against people of color and women." The letter asked MSG Entertainment to respond by February 13 "to state the justifications for the Company's Policy and identify all efforts you are undertaking to ensure compliance with all applicable laws and that the Company's use of facial recognition technology will not lead to discrimination."</p><p> </p><p><strong>Billy Big Balls of the Week  (32:11)</strong></p><p><a href="https://gizmodo.com/donotpay-robot-lawyer-ai-parking-ticket-1850031456">DoNotPay Retires 'Robot Lawyer' Before It Even Has Its First Case</a></p><p>If you’ve been fantasizing about the day when artificial intelligence could get you out of paying traffic tickets, you’ll just have to keep dreaming. DoNotPay has backed out of its <a href="https://gizmodo.com/donotpay-speeding-ticket-chatgpt-1849960272?rev=1674677940179">plans to use an AI-powered “robot lawyer”</a> to council a defendant through a courtroom hearing in real time. The reason why? Well, apparently the law got in the way of the robot’s lawyering. </p><p>The company’s founder and CEO, Joshua Browder, first announced the news in <a href="https://twitter.com/jbrowder1/status/1618265395986857984">a Wednesday tweet</a>. “After receiving threats from State Bar prosecutors, it seems likely they will put me in jail for 6 months if I follow through with bringing a robot lawyer into a physical courtroom,” he wrote. In a phone call with Gizmodo, Browder reiterated his view that, were he to follow-through on his initial promises, he’d likely end up with a prison sentence. </p><p> </p><p><strong>Industry News (36:28) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-hit-fine-gdpr-violations/">WhatsApp Hit with €5.5m fine for GDPR Violations</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cheats-emerge-riot-games-hack/">New Cheats May Emerge After Riot Games Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-stress-test/">Regulator Stress Test Highlights Cyber Insurance Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/ticketmaster-bots-disrupted-taylor/">Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales</a></p><p><a href="https://www.infosecurity-magazine.com/news/yahoo-impersonated-brand-q4-2022/">Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-group-ta444-infection/">North Korean Group TA444 Shows 'Startup' Culture, Tries Numerous Infection Methods</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-iran-russia-government/">NCSC: Iranian and Russian Groups Targeting Government, Activists and Journalists With Spearphishing</a></p><p><a href="https://www.infosecurity-magazine.com/news/zacks-confirms-breach/">Zacks Investment Research Confirms Breach Affecting 820,000 Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/iran-cobalt-sapling-targets-saudi/">Iranian Group Cobalt Sapling Targets Saudi Arabia With New Persona</a></p><p><a href="https://scambusters.org/scambusters19.html">https://scambusters.org/scambusters19.html</a> < 1997 Yahoo award scam</p><p> </p><p><strong>Tweet of the Week (44:18)</strong></p><img src="https://lh5.googleusercontent.com/CUDi_hRnOjVnZlZ1R7OuB0D9sxZiQyJoB0TRK2j6Yx8vfB6IwijnBQ5ICpNCe4LLcvpeRGFL9KSw7ZSqNYIbb3stS2y_xyeMvu1GV4AdNrkMEwM0Wh4UU8AWmsfre4XXAZq9lCcWwSJif3Ip0rExXL0Cp94JkKcOq4lVsTXPd90TPY1myj6p3TYiH4561g" /><p><a href="https://twitter.com/cybergibbons/status/1618672522853240833">https://twitter.com/cybergibbons/status/1618672522853240833</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46795871" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/60060ba2-c3a9-4afe-a0a8-4f670bd3afb9/audio/7cc278c8-d660-4614-bfca-bd188047b8e1/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 137 - The Beep Beep Boop Boop Episode</itunes:title>
      <itunes:author>Andy Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/cc48beb6-f428-4fde-b179-e2ad7c13695c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:44</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a time when robots were replacing workers
 
Rant of the Week shows us the future of bouncers

Billy Big Balls is a story of the lawyers fighting back against the AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a moan about phishing test metrics</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a time when robots were replacing workers
 
Rant of the Week shows us the future of bouncers

Billy Big Balls is a story of the lawyers fighting back against the AI
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a moan about phishing test metrics</itunes:subtitle>
      <itunes:keywords>ta444, cobalt sapling, phishing, yahoo!, delorean, facial recognition, msg entertainment, killer robots, lotus123</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>137</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">80ef38c5-4372-4dfb-a45d-ccc3e98bffe5</guid>
      <title>Episode 136 - The old man is in New York</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><ol><li>19th January 1999: BlackBerry Introduced</li></ol><p><a href="http://en.wikipedia.org/wiki/BlackBerry">RIM introduces the BlackBerry</a>. The original BlackBerry devices were not phones, but instead were the first mobile devices that could do real-time e-mail. They looked like big pagers. They way the story goes, the name “BlackBerry” came from the similarity that the buttons on the original device had to the surface of a blackberry fruit. Those crazy Canadians!</p><ol><li>17th January 1994: Supreme Court Rules on Home VCR Recordings</li></ol><p>The <a href="http://en.wikipedia.org/wiki/Sony_Corp._of_America_v._Universal_City_Studios,_Inc.">US Supreme Court rules 5-4 </a>that private use of home VCRs to tape TV programs for later viewing does not violate federal copyright laws. This ruling opens the floodgate for VCR sales, changing the landscape of TV watching forever.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/01/19/mailchimp_fesses_up_to_2nd/">Mailchimp 'fesses up to second digital burglary in five months</a></p><p>Email marketing service Mailchimp has confirmed intruders have gained access to more than 100 customer accounts after successfully deploying a social engineering attack.</p><p>This is the second data spill in five months and yet the company, <a href="https://www.theregister.com/2021/09/14/intuit_mailchimp_acquisition/">bought by Intuit for $12 billion in September 2021</a>, continues to tell customers – with a straight face – that it takes the "security of users' data seriously."</p><p>The latest digital burglary happened on January 11 when the resident security team spotted an "unauthorized actor accessing one of our tools used by Mailchimp customer-facing teams for customer support and account administration," the <a href="https://mailchimp.com/en-gb/january-2023-security-incident/">company blog states</a>.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/illegal-solaris-darknet-market-hijacked-by-competitor-kraken/">Illegal Solaris darknet market hijacked by competitor Kraken</a></p><p>Solaris, a large darknet marketplace focused on drugs and illegal substances, has been taken over by a smaller competitor named 'Kraken,' who claims to have hacked it on January 13, 2022.</p><p>The Tor site of Solaris currently redirects to Kraken, while blockchain monitoring experts at Elliptic report no movements in the cryptocurrency addresses associated with the site after January 13, 2022.</p><p>Taking down competitors</p><p>Solaris was a Russian-speaking platform reportedly affiliated with Killnet, a pro-Kremlin hacktivist group that launched several DDoS attacks against organizations in the western world in 2022.</p><p>Elliptic has traced several donations from Solaris to Killnet, amounting to more than $44,000 worth of Bitcoin. The DDoS group presumably used this money to purchase more firepower for launching disruptive attacks.</p><p>In December 2022, Ukrainian cyber-intelligence analyst Alex Holden <a href="https://www.forbes.com/sites/thomasbrewster/2022/12/22/russian-dark-web-drug-market-hacked-by-ukrainian-bitcoin-donated-to-kyiv-charity/?sh=3a81f1e26386">claimed</a> to have breached Solaris and stolen $25,000, which was donated to a humanitarian charity in Ukraine.</p><p>While Solaris disputed the claims about the hack and called out the lack of evidence, Holden <a href="https://holdsecurity.com/news/2023/01/solaris-russian-drug-platform-exposed/">later released more details</a> and leaked source code and databases allegedly associated with the marketplace.</p><p>On Friday, January 13, 2023, Kraken announced they had taken over Solaris' infrastructure, GitLab repository, and all project sources, thanks to "several huge bugs in the code."</p><p>Kraken's statement claims that it took them three days to steal the clear text passwords and keys stored in Solaris' servers, access its infrastructure located in Finland, and then download everything without anyone stopping them.</p><p>Finally, the attackers said they disabled Solaris' Bitcoin server, which aligns with Elliptic's observations in the blockchain.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/european-businesses-privacy-skills/">European Businesses Admit Major Privacy Skills Gap</a></p><p><a href="https://www.infosecurity-magazine.com/news/nissan-supplier-leaked-data/">Nissan Supplier Leaked Data on Thousands of Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-creates-polymorphic-malware/">ChatGPT Creates Polymorphic Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/shipping-vessels-ransomware-attack/">1000 Shipping Vessels Impacted by Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/four-billion-people-internet/">Over Four Billion People Affected By Internet Censorship in 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/ftx-over-400m-stolen-from-bankrupt/">FTX: Over $400m Stolen from Bankrupt Exchange</a></p><p><a href="https://www.infosecurity-magazine.com/news/mailchimp-hit-another-data-breach/">Mailchimp Hit By Another Data Breach Following Employee Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/threatmodeler-makes-devsecops/">ThreatModeler Makes DevSecOps More Accessible With New Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/roaming-mantis-adds-dns-changer/">Roaming Mantis' Hacking Campaign Adds DNS Changer to Mobile App</a></p><p> </p><p><strong>Tweet of the Week </strong></p><p> </p><img src="https://lh5.googleusercontent.com/VCybq59LbDjFQBUVdm6prNcJDGuNfUeHeNkJdlK3Czp5yob1yeoq4W6sYryIS2G422VR9uH434wUm6OYETzSDDHFMUsnZ-MUXrxQS8rOz8LIuvmeJkWaDoykSXIZjb7rHbyzzMNkaZFv93Wnt6OBb4WMC18_-IDtnBmwyV_wP9WlMot1GcCfF6mzfsErhA" /><p><a href="https://edition.cnn.com/2023/01/18/us/brian-walshe-ana-walshe-google-searches/index.html">These are the Google searches Brian Walshe made before and after killing his wife Ana Walshe, according to prosecutors</a></p><p><a href="https://twitter.com/pedramamini/status/1616257197591109633?s=20&t=gQIsTkL_9exHYNvkcVyokg">https://twitter.com/pedramamini/status/1616257197591109633?s=20&t=gQIsTkL_9exHYNvkcVyokg</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 20 Jan 2023 17:24:17 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andy Agnês, Thom Langford, Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-136-the-old-man-is-in-new-york-AzK9nJ8H</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><ol><li>19th January 1999: BlackBerry Introduced</li></ol><p><a href="http://en.wikipedia.org/wiki/BlackBerry">RIM introduces the BlackBerry</a>. The original BlackBerry devices were not phones, but instead were the first mobile devices that could do real-time e-mail. They looked like big pagers. They way the story goes, the name “BlackBerry” came from the similarity that the buttons on the original device had to the surface of a blackberry fruit. Those crazy Canadians!</p><ol><li>17th January 1994: Supreme Court Rules on Home VCR Recordings</li></ol><p>The <a href="http://en.wikipedia.org/wiki/Sony_Corp._of_America_v._Universal_City_Studios,_Inc.">US Supreme Court rules 5-4 </a>that private use of home VCRs to tape TV programs for later viewing does not violate federal copyright laws. This ruling opens the floodgate for VCR sales, changing the landscape of TV watching forever.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2023/01/19/mailchimp_fesses_up_to_2nd/">Mailchimp 'fesses up to second digital burglary in five months</a></p><p>Email marketing service Mailchimp has confirmed intruders have gained access to more than 100 customer accounts after successfully deploying a social engineering attack.</p><p>This is the second data spill in five months and yet the company, <a href="https://www.theregister.com/2021/09/14/intuit_mailchimp_acquisition/">bought by Intuit for $12 billion in September 2021</a>, continues to tell customers – with a straight face – that it takes the "security of users' data seriously."</p><p>The latest digital burglary happened on January 11 when the resident security team spotted an "unauthorized actor accessing one of our tools used by Mailchimp customer-facing teams for customer support and account administration," the <a href="https://mailchimp.com/en-gb/january-2023-security-incident/">company blog states</a>.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/illegal-solaris-darknet-market-hijacked-by-competitor-kraken/">Illegal Solaris darknet market hijacked by competitor Kraken</a></p><p>Solaris, a large darknet marketplace focused on drugs and illegal substances, has been taken over by a smaller competitor named 'Kraken,' who claims to have hacked it on January 13, 2022.</p><p>The Tor site of Solaris currently redirects to Kraken, while blockchain monitoring experts at Elliptic report no movements in the cryptocurrency addresses associated with the site after January 13, 2022.</p><p>Taking down competitors</p><p>Solaris was a Russian-speaking platform reportedly affiliated with Killnet, a pro-Kremlin hacktivist group that launched several DDoS attacks against organizations in the western world in 2022.</p><p>Elliptic has traced several donations from Solaris to Killnet, amounting to more than $44,000 worth of Bitcoin. The DDoS group presumably used this money to purchase more firepower for launching disruptive attacks.</p><p>In December 2022, Ukrainian cyber-intelligence analyst Alex Holden <a href="https://www.forbes.com/sites/thomasbrewster/2022/12/22/russian-dark-web-drug-market-hacked-by-ukrainian-bitcoin-donated-to-kyiv-charity/?sh=3a81f1e26386">claimed</a> to have breached Solaris and stolen $25,000, which was donated to a humanitarian charity in Ukraine.</p><p>While Solaris disputed the claims about the hack and called out the lack of evidence, Holden <a href="https://holdsecurity.com/news/2023/01/solaris-russian-drug-platform-exposed/">later released more details</a> and leaked source code and databases allegedly associated with the marketplace.</p><p>On Friday, January 13, 2023, Kraken announced they had taken over Solaris' infrastructure, GitLab repository, and all project sources, thanks to "several huge bugs in the code."</p><p>Kraken's statement claims that it took them three days to steal the clear text passwords and keys stored in Solaris' servers, access its infrastructure located in Finland, and then download everything without anyone stopping them.</p><p>Finally, the attackers said they disabled Solaris' Bitcoin server, which aligns with Elliptic's observations in the blockchain.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/european-businesses-privacy-skills/">European Businesses Admit Major Privacy Skills Gap</a></p><p><a href="https://www.infosecurity-magazine.com/news/nissan-supplier-leaked-data/">Nissan Supplier Leaked Data on Thousands of Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/chatgpt-creates-polymorphic-malware/">ChatGPT Creates Polymorphic Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/shipping-vessels-ransomware-attack/">1000 Shipping Vessels Impacted by Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/four-billion-people-internet/">Over Four Billion People Affected By Internet Censorship in 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/ftx-over-400m-stolen-from-bankrupt/">FTX: Over $400m Stolen from Bankrupt Exchange</a></p><p><a href="https://www.infosecurity-magazine.com/news/mailchimp-hit-another-data-breach/">Mailchimp Hit By Another Data Breach Following Employee Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/threatmodeler-makes-devsecops/">ThreatModeler Makes DevSecOps More Accessible With New Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/roaming-mantis-adds-dns-changer/">Roaming Mantis' Hacking Campaign Adds DNS Changer to Mobile App</a></p><p> </p><p><strong>Tweet of the Week </strong></p><p> </p><img src="https://lh5.googleusercontent.com/VCybq59LbDjFQBUVdm6prNcJDGuNfUeHeNkJdlK3Czp5yob1yeoq4W6sYryIS2G422VR9uH434wUm6OYETzSDDHFMUsnZ-MUXrxQS8rOz8LIuvmeJkWaDoykSXIZjb7rHbyzzMNkaZFv93Wnt6OBb4WMC18_-IDtnBmwyV_wP9WlMot1GcCfF6mzfsErhA" /><p><a href="https://edition.cnn.com/2023/01/18/us/brian-walshe-ana-walshe-google-searches/index.html">These are the Google searches Brian Walshe made before and after killing his wife Ana Walshe, according to prosecutors</a></p><p><a href="https://twitter.com/pedramamini/status/1616257197591109633?s=20&t=gQIsTkL_9exHYNvkcVyokg">https://twitter.com/pedramamini/status/1616257197591109633?s=20&t=gQIsTkL_9exHYNvkcVyokg</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41375498" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/aeea238e-fe1b-406d-875e-ee29c8919cab/audio/c1a0537a-e9d3-4394-affe-d9cd6429e92f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 136 - The old man is in New York</itunes:title>
      <itunes:author>Javvad Malik, Andy Agnês, Thom Langford, Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1cdee9b9-c5e1-48f0-bc4b-f8b6b36d205c/009d8408-06b9-4e00-b715-fd46db425740/3000x3000/img-8131.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:38</itunes:duration>
      <itunes:summary>With Thom in New York, your favourite host, Andy, and his sidekick, Javvad, bring you unresearched opinions on security news from around the globe.  
This week in InfoSec takes us back to rioters preferred mode of secure communication
Rant of the Week is a some monkey business deja vu
Billy Big Balls is a competitive smackdown 
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week is why you should use Duck Duck Go</itunes:summary>
      <itunes:subtitle>With Thom in New York, your favourite host, Andy, and his sidekick, Javvad, bring you unresearched opinions on security news from around the globe.  
This week in InfoSec takes us back to rioters preferred mode of secure communication
Rant of the Week is a some monkey business deja vu
Billy Big Balls is a competitive smackdown 
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week is why you should use Duck Duck Go</itunes:subtitle>
      <itunes:keywords>duck duck go, rant of the week, kraken, even better than smashing security, ciso, cyber security, this week in infosec, best cyber security podcast, cybersec, billy big balls, security news, information security, mailchimp hack, host unknown, we love you graham and carole, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>136</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c965ce2e-fcf1-4c37-810a-610afd475fe9</guid>
      <title>Episode 135 - Better After The Edit</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th January 1996: Apple posts major loss</p><p>Apple Computer <a href="http://articles.chicagotribune.com/1996-01-12/business/9601120060_1_chief-executive-michael-spindler-apple-officials-analysts-and-investors">announces that it will post a US$68 million first quarter loss</a>. It also announces a restructuring plan to reduce the company by a thousand employees. This event leads to the resignation of Apple CEO Michael Spindler, who is replaced by Gil Amelio. Gil Amelio eventually purchases Steve Jobs’ company, NeXT, which leads to the development of Mac OS X as well as the return of Steve Jobs as Apple CEO.</p><p>9th January 2007: Apple introduces iPhone</p><p>Apple introduces the iPhone at Macworld. The phone wasn’t available for sale until June 29th, prompting one of the most heavily anticipated sales launches in the history of technology. Apple sold 1.4 million iPhones in 2007, steadily increasing each year to sell over 230 million in 2015 alone</p><p> </p><p><strong>Rant of the Week (17:25)</strong></p><p><a href="https://www.theregister.com/2023/01/11/royal_mail_uk_cyber_incident/">Royal Mail, cops probe 'cyber incident' that's knackered international mail</a></p><p>Royal Mail confirmed a "cyber incident" has disrupted its ability to send letters and packages abroad, and also caused some delays on post coming into the UK.</p><p>The postal service, and the UK's National Cyber Security Centre and National Crime Agency, issued similar statements about the IT SNAFU on Wednesday, with Royal Mail advising customers to stop sending international mail until it fixed the problem.</p><p>"We're experiencing disruption to our international export services and are temporarily unable to dispatch items to overseas destinations," the organisation <a href="https://twitter.com/RoyalMail/status/1613208820456558600">tweeted</a>. "We strongly advise customers to hold any export items while we work to resolve the issue." </p><p>Royal Mail added it was "sorry for any disruption this may cause," and would not comment further. This is a developing story; we'll keep you updated as we confirm any other details.</p><p>Lockbit Ransomware - It was Russia!</p><p><a href="https://www.bbc.co.uk/news/business-64244121">Royal Mail hit by Russia-linked ransomware attack</a></p><p> </p><p><strong>Billy Big Balls of the Week (27:24)</strong></p><p><a href="https://www.theregister.com/2023/01/12/microsoft_valle_ai/">VALL-E AI can mimic a person’s voice from a three-second snippet</a></p><p>Microsoft researchers are working on a text-to-speech (TTS) model that can mimic a person's voice – complete with emotion and intonation – after a mere three seconds of training.</p><p>The technology – called VALL-E and outlined in a 15-page research <a href="https://arxiv.org/pdf/2301.02111.pdf">paper</a> released this month on the arXiv research site – is a significant step forward for Microsoft. TTS is a highly competitive niche that includes other heavyweights such as Google, Amazon, and Meta.</p><p>Redmond is already using artificial intelligence for natural language processing (NLP) through its Nuance business – which it bought for $20 billion last year including both speech recognition and TTS technology. And it's aggressively <a href="https://www.theregister.com/2023/01/10/microsoft_openai_investment_google/">investing</a> in and using technology from startup OpenAI – including its <a href="https://www.theregister.com/2023/01/06/chatgpt_cybercriminals_malicious_code/">ChatGPT tool</a> – possibly in its Bing search engine and its Office suite of applications.</p><p>A demo of VALL-E can be <a href="https://valle-demo.github.io/">found</a> on GitHub.</p><p>Semi-related - <a href="https://aisupremacy.substack.com/p/microsoft-will-likely-invest-10-billion">Microsoft Will Likely Invest $10 billion for 49 Percent Stake in OpenAI</a></p><p>This after the report by The Information about how Microsoft plans to integrate ChatGPT and GPT-4 into its software bundles like Word, Outlook, Bing and so forth.</p><p> </p><p><strong>Industry News (33:40)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-charities-offered-free-cyber/">UK Charities Offered Free Cyber Essentials Support</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-supreme-court-whatsapp-to-sue/">US Supreme Court Allows WhatsApp to Sue NSO Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/san-francisco-transit-police-files/">Sensitive Files From San Francisco Transit Police Allegedly Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-adds-vulnerability-code/">GitHub Adds Features to Automate Vulnerability Code Scanning</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-pink-hits-apac-spear-phishing/">New APT Dark Pink Hits Asia-Pacific, Europe With Spear Phishing Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/royal-mail-halts-international/">Royal Mail Halts International Deliveries After Cyber-Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-leak-200-million-accounts/">Twitter: Leak of 200 Million Accounts Not Due to Historic Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/chrome-symstealer-flaw-could/">Google Chrome 'SymStealer' Vulnerability Could Affect 2.5 Billion Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/guardian-confirms-ransomware-attack/">The Guardian Confirms UK Staff Data Was Accessed in Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week (42:50)</strong></p><img src="https://lh4.googleusercontent.com/rUQsna9J-rZyZAWp8JDrsdxOwDFBC_ZieTT7n4jza3itX-72ztHOFIXQKFgC_oTf2vIjuUt6Ogqh1sQeefVEKkB5AQ9blir39jHLK5v4D4v8uRUFHYvF4I0zbRT-6hF89FXn6wX1P7cqbK-4J0Hg3jy3sG7Kj9EFNJ_dvtjQF9jGVF4-gQbOrY6Vm7Li1w" /><p><a href="https://twitter.com/IanColdwater/status/1613690189246828544">https://twitter.com/IanColdwater/status/1613690189246828544</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 13 Jan 2023 12:07:42 +0000</pubDate>
      <author>thom@tl2security.com (Andrew. Agnēs, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-135-edited-for-your-pleasure-GSVG94_r</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th January 1996: Apple posts major loss</p><p>Apple Computer <a href="http://articles.chicagotribune.com/1996-01-12/business/9601120060_1_chief-executive-michael-spindler-apple-officials-analysts-and-investors">announces that it will post a US$68 million first quarter loss</a>. It also announces a restructuring plan to reduce the company by a thousand employees. This event leads to the resignation of Apple CEO Michael Spindler, who is replaced by Gil Amelio. Gil Amelio eventually purchases Steve Jobs’ company, NeXT, which leads to the development of Mac OS X as well as the return of Steve Jobs as Apple CEO.</p><p>9th January 2007: Apple introduces iPhone</p><p>Apple introduces the iPhone at Macworld. The phone wasn’t available for sale until June 29th, prompting one of the most heavily anticipated sales launches in the history of technology. Apple sold 1.4 million iPhones in 2007, steadily increasing each year to sell over 230 million in 2015 alone</p><p> </p><p><strong>Rant of the Week (17:25)</strong></p><p><a href="https://www.theregister.com/2023/01/11/royal_mail_uk_cyber_incident/">Royal Mail, cops probe 'cyber incident' that's knackered international mail</a></p><p>Royal Mail confirmed a "cyber incident" has disrupted its ability to send letters and packages abroad, and also caused some delays on post coming into the UK.</p><p>The postal service, and the UK's National Cyber Security Centre and National Crime Agency, issued similar statements about the IT SNAFU on Wednesday, with Royal Mail advising customers to stop sending international mail until it fixed the problem.</p><p>"We're experiencing disruption to our international export services and are temporarily unable to dispatch items to overseas destinations," the organisation <a href="https://twitter.com/RoyalMail/status/1613208820456558600">tweeted</a>. "We strongly advise customers to hold any export items while we work to resolve the issue." </p><p>Royal Mail added it was "sorry for any disruption this may cause," and would not comment further. This is a developing story; we'll keep you updated as we confirm any other details.</p><p>Lockbit Ransomware - It was Russia!</p><p><a href="https://www.bbc.co.uk/news/business-64244121">Royal Mail hit by Russia-linked ransomware attack</a></p><p> </p><p><strong>Billy Big Balls of the Week (27:24)</strong></p><p><a href="https://www.theregister.com/2023/01/12/microsoft_valle_ai/">VALL-E AI can mimic a person’s voice from a three-second snippet</a></p><p>Microsoft researchers are working on a text-to-speech (TTS) model that can mimic a person's voice – complete with emotion and intonation – after a mere three seconds of training.</p><p>The technology – called VALL-E and outlined in a 15-page research <a href="https://arxiv.org/pdf/2301.02111.pdf">paper</a> released this month on the arXiv research site – is a significant step forward for Microsoft. TTS is a highly competitive niche that includes other heavyweights such as Google, Amazon, and Meta.</p><p>Redmond is already using artificial intelligence for natural language processing (NLP) through its Nuance business – which it bought for $20 billion last year including both speech recognition and TTS technology. And it's aggressively <a href="https://www.theregister.com/2023/01/10/microsoft_openai_investment_google/">investing</a> in and using technology from startup OpenAI – including its <a href="https://www.theregister.com/2023/01/06/chatgpt_cybercriminals_malicious_code/">ChatGPT tool</a> – possibly in its Bing search engine and its Office suite of applications.</p><p>A demo of VALL-E can be <a href="https://valle-demo.github.io/">found</a> on GitHub.</p><p>Semi-related - <a href="https://aisupremacy.substack.com/p/microsoft-will-likely-invest-10-billion">Microsoft Will Likely Invest $10 billion for 49 Percent Stake in OpenAI</a></p><p>This after the report by The Information about how Microsoft plans to integrate ChatGPT and GPT-4 into its software bundles like Word, Outlook, Bing and so forth.</p><p> </p><p><strong>Industry News (33:40)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uk-charities-offered-free-cyber/">UK Charities Offered Free Cyber Essentials Support</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-supreme-court-whatsapp-to-sue/">US Supreme Court Allows WhatsApp to Sue NSO Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/san-francisco-transit-police-files/">Sensitive Files From San Francisco Transit Police Allegedly Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-adds-vulnerability-code/">GitHub Adds Features to Automate Vulnerability Code Scanning</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-pink-hits-apac-spear-phishing/">New APT Dark Pink Hits Asia-Pacific, Europe With Spear Phishing Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/royal-mail-halts-international/">Royal Mail Halts International Deliveries After Cyber-Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-leak-200-million-accounts/">Twitter: Leak of 200 Million Accounts Not Due to Historic Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/chrome-symstealer-flaw-could/">Google Chrome 'SymStealer' Vulnerability Could Affect 2.5 Billion Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/guardian-confirms-ransomware-attack/">The Guardian Confirms UK Staff Data Was Accessed in Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week (42:50)</strong></p><img src="https://lh4.googleusercontent.com/rUQsna9J-rZyZAWp8JDrsdxOwDFBC_ZieTT7n4jza3itX-72ztHOFIXQKFgC_oTf2vIjuUt6Ogqh1sQeefVEKkB5AQ9blir39jHLK5v4D4v8uRUFHYvF4I0zbRT-6hF89FXn6wX1P7cqbK-4J0Hg3jy3sG7Kj9EFNJ_dvtjQF9jGVF4-gQbOrY6Vm7Li1w" /><p><a href="https://twitter.com/IanColdwater/status/1613690189246828544">https://twitter.com/IanColdwater/status/1613690189246828544</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45987120" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/4e9c38a5-82fe-4d1c-a1e1-729d125931f9/audio/94c1610b-dd51-4ef5-80f1-996a6848b6ac/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 135 - Better After The Edit</itunes:title>
      <itunes:author>Andrew. Agnēs, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a1cfe35e-13e4-403e-9302-2e928780c1fc/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:54</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the time when Apple was a terrible investment
 
Rant of the Week is a Special Delivery from the UK’s postal infrastructure

Billy Big Balls makes DALL-E old tech
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a plea to hotel guests</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the time when Apple was a terrible investment
 
Rant of the Week is a Special Delivery from the UK’s postal infrastructure

Billy Big Balls makes DALL-E old tech
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a plea to hotel guests</itunes:subtitle>
      <itunes:keywords>vlad the impaler, genghis khan, twitter leaj, openai, royal mail, hdmi, vall-e, microsoft, putin</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>135</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec671b4f-70eb-4818-a583-d8e2a02a0e0a</guid>
      <title>Episode 134 - Happy Birthday The Duchess of Ladywell</title>
      <description><![CDATA[<p><strong>This week in InfoSec (07:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd January 2009: The Genesis of Bitcoin</p><p>The pseudonymous Bitcoin creator <a href="https://en.wikipedia.org/wiki/Satoshi_Nakamoto">Satoshi Nakamoto</a> mines the first 50 bitcoins, now known as the <a href="https://en.bitcoin.it/wiki/Genesis_block">Genesis Block</a>, six days before the <a href="https://thisdayintechhistory.com/01/09/bitcoin-launched/">initial release of the bitcoin software and launch of the cryptocurrency network</a>. Bitcoin has become the de-facto digital currency, popular for its decentralized approach because no single entity can control, manipulate, or deactivate the currency and transactions can be highly private yet still remain secure.</p><p>1st January 2000: Y2K Comes and Goes</p><p>After years of hysteria regarding the Y2K bug, the world’s computers begin using the date 2000 with no major catastrophes. There is still debate whether the “<a href="http://en.wikipedia.org/wiki/Year_2000_problem">Year 2000 Problem</a>” was overblown by the technology industry or if the frantic updating done by armies of software developers leading up to Y2K averted disaster. I tend to lean towards the latter.</p><p>Wrap up of the year:</p><p><a href="https://www.computing.co.uk/news/4061865/cyber-computings-biggest-security-stories-2022">https://www.computing.co.uk/news/4061865/cyber-computings-biggest-security-stories-2022</a></p><p> </p><p><strong>Rant of the Week (17:02)</strong></p><p><a href="https://www.bleepingcomputer.com/news/technology/chatgpt-banned-in-nyc-schools-over-learning-impact-concerns/">ChatGPT banned in NYC schools over learning impact concerns</a></p><p>The NYC Department of Education has banned the use of ChatGPT by students and teachers in New York City schools as there are serious concerns about its use hampering learning and leading to misinformation.</p><p>The organization manages the largest school district in the U.S., so others might follow with similar decisions.</p><p>ChatGPT is a next-gen chatbot optimized for dialogue-format user interactions, released by OpenAI in November 2022. The chatbot has been very disruptive for several disciplines, including <a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-coolest-things-you-can-do-with-it/">programming and essay writing</a>.</p><p>Another field that AI-based chatbots like ChatGPT are expected to revolutionize is internet searching, as those tools can provide richer answers to search terms and allow users to find what they're looking for using natural language.</p><p>Microsoft is reportedly planning to <a href="https://gizmodo.com/microsoft-openai-chatgpt-bing-google-1849947997">integrate ChatGPT into Bing</a> to give its search engine an edge over competitors like Google Search.</p><p>NYC Dept. of Education is worried about the information that ChatGPT may convey to students, specifically the safety and accuracy of its answers. Moreover, the organization fears young students will grow complacent and lack the necessary skills to evaluate information.</p><p> </p><p><strong>Billy Big Balls of the Week (27:01)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-adds-proxy-support-to-help-bypass-internet-blocks/">WhatsApp adds proxy support to help bypass Internet blocks</a></p><p>WhatsApp now allows users to connect via proxy servers due to Internet shutdowns or if their governments block the service in their country.</p><p>The new proxy support option is available to all users running the latest WhatsApp iOS and Android applications.</p><p>WhatsApp said that connecting through a proxy will maintain the messages' privacy and security as they will remain protected by end-to-end encryption.</p><p>This ensures that they can only be read by you and the recipient, with no one in between, like the proxy server, Meta, or WhatsApp, being able to access their contents.</p><p>[All this while the outcome of their use of personal data on WhatsApp in Ireland is still awaiting a decision from the courts after they were <a href="https://www.theregister.com/2023/01/04/meta_fined_390_for_using/">fined €390 million ($414 million) for misuse of data from Facebook and Instagram</a>]</p><p>"Using a proxy doesn't change the high level of privacy and security that WhatsApp provides to all users. Your personal messages and calls will still be protected by end-to-end encryption," the company <a href="https://blog.whatsapp.com/connecting-to-whatsapp-by-proxy">said</a> on Thursday.</p><p>"Our wish for 2023 is that these internet shutdowns never occur. Disruptions like we've seen in Iran for months on end <a href="https://www.ohchr.org/en/press-releases/2022/06/internet-shutdowns-un-report-details-dramatic-impact-peoples-lives-and-human#:~:text=%E2%80%9CInternet%20shutdowns%20have%20emerged%20as,for%20Human%20Rights%20Michelle%20Bachelet.">deny people's human rights</a> and cut people off from receiving urgent help," WhatsApp said.</p><p>"Though in case these shutdowns continue, we hope this solution helps people wherever there is a need for secure and reliable communication."</p><p> </p><p><strong>Industry News (38:39)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-ransomware-decryptor-kids/">LockBit Hands Ransomware Decryptor to Kids' Hospital</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-most-scammed-uk-government/">NHS is Most Scammed UK Government "Brand"</a></p><p><a href="https://www.infosecurity-magazine.com/news/general-electric-insider-two-years/">General Electric Insider Handed Two Years for IP Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/rail-tech-wabtec-global-data-breach/">Rail Tech Giant Wabtec Discloses Global Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-to-appeal-390m-gdpr-fine/">Meta to Appeal €390m GDPR Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/cops-catch-serial-child-abuser/">Cops Catch Serial Child Abuser After Tech Breakthrough</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-200m-twitter-users-details/">Over 200 Million Twitter Users' Details Leaked on Hacker Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-guys-data-breach-affect/">Five Guys Discloses Data Breach Affecting Employee PII</a></p><p><a href="https://www.infosecurity-magazine.com/news/fortinet-devices-distribute/">Hackers Leverage Compromised Fortinet Devices to Distribute Ransomware</a></p><p><a href="https://www.bbc.com/news/uk-england-gloucestershire-63637883">https://www.bbc.com/news/uk-england-gloucestershire-63637883</a></p><p> </p><p><strong>Tweet of the Week (45:53)</strong></p><img src="https://lh5.googleusercontent.com/SilWmXkJoryL8RC1ujw_aTNFwnRlhXDGqwuVN-KdVghuC3oDhgp3N4n70jCirBB1BVVFLuQW84FkOi0PhQbyKELMua02UAYu7CYIR7N69IGbEx5xNaNUpKVc83dpexQltFBjTWrUJXnV_bU_Q8kBWHJkgdcTxRV9LMZEPhOIHMHQDfCmyPXDaE51o1CHpQ" /><p><a href="https://twitter.com/igb/status/1611057796606488577">https://twitter.com/igb/status/1611057796606488577</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 6 Jan 2023 16:17:07 +0000</pubDate>
      <author>thom@tl2security.com (The Duchess of Ladywell, Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-134-happy-birthday-the-duchess-of-ladywell-9sUwrUOS</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (07:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd January 2009: The Genesis of Bitcoin</p><p>The pseudonymous Bitcoin creator <a href="https://en.wikipedia.org/wiki/Satoshi_Nakamoto">Satoshi Nakamoto</a> mines the first 50 bitcoins, now known as the <a href="https://en.bitcoin.it/wiki/Genesis_block">Genesis Block</a>, six days before the <a href="https://thisdayintechhistory.com/01/09/bitcoin-launched/">initial release of the bitcoin software and launch of the cryptocurrency network</a>. Bitcoin has become the de-facto digital currency, popular for its decentralized approach because no single entity can control, manipulate, or deactivate the currency and transactions can be highly private yet still remain secure.</p><p>1st January 2000: Y2K Comes and Goes</p><p>After years of hysteria regarding the Y2K bug, the world’s computers begin using the date 2000 with no major catastrophes. There is still debate whether the “<a href="http://en.wikipedia.org/wiki/Year_2000_problem">Year 2000 Problem</a>” was overblown by the technology industry or if the frantic updating done by armies of software developers leading up to Y2K averted disaster. I tend to lean towards the latter.</p><p>Wrap up of the year:</p><p><a href="https://www.computing.co.uk/news/4061865/cyber-computings-biggest-security-stories-2022">https://www.computing.co.uk/news/4061865/cyber-computings-biggest-security-stories-2022</a></p><p> </p><p><strong>Rant of the Week (17:02)</strong></p><p><a href="https://www.bleepingcomputer.com/news/technology/chatgpt-banned-in-nyc-schools-over-learning-impact-concerns/">ChatGPT banned in NYC schools over learning impact concerns</a></p><p>The NYC Department of Education has banned the use of ChatGPT by students and teachers in New York City schools as there are serious concerns about its use hampering learning and leading to misinformation.</p><p>The organization manages the largest school district in the U.S., so others might follow with similar decisions.</p><p>ChatGPT is a next-gen chatbot optimized for dialogue-format user interactions, released by OpenAI in November 2022. The chatbot has been very disruptive for several disciplines, including <a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-coolest-things-you-can-do-with-it/">programming and essay writing</a>.</p><p>Another field that AI-based chatbots like ChatGPT are expected to revolutionize is internet searching, as those tools can provide richer answers to search terms and allow users to find what they're looking for using natural language.</p><p>Microsoft is reportedly planning to <a href="https://gizmodo.com/microsoft-openai-chatgpt-bing-google-1849947997">integrate ChatGPT into Bing</a> to give its search engine an edge over competitors like Google Search.</p><p>NYC Dept. of Education is worried about the information that ChatGPT may convey to students, specifically the safety and accuracy of its answers. Moreover, the organization fears young students will grow complacent and lack the necessary skills to evaluate information.</p><p> </p><p><strong>Billy Big Balls of the Week (27:01)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-adds-proxy-support-to-help-bypass-internet-blocks/">WhatsApp adds proxy support to help bypass Internet blocks</a></p><p>WhatsApp now allows users to connect via proxy servers due to Internet shutdowns or if their governments block the service in their country.</p><p>The new proxy support option is available to all users running the latest WhatsApp iOS and Android applications.</p><p>WhatsApp said that connecting through a proxy will maintain the messages' privacy and security as they will remain protected by end-to-end encryption.</p><p>This ensures that they can only be read by you and the recipient, with no one in between, like the proxy server, Meta, or WhatsApp, being able to access their contents.</p><p>[All this while the outcome of their use of personal data on WhatsApp in Ireland is still awaiting a decision from the courts after they were <a href="https://www.theregister.com/2023/01/04/meta_fined_390_for_using/">fined €390 million ($414 million) for misuse of data from Facebook and Instagram</a>]</p><p>"Using a proxy doesn't change the high level of privacy and security that WhatsApp provides to all users. Your personal messages and calls will still be protected by end-to-end encryption," the company <a href="https://blog.whatsapp.com/connecting-to-whatsapp-by-proxy">said</a> on Thursday.</p><p>"Our wish for 2023 is that these internet shutdowns never occur. Disruptions like we've seen in Iran for months on end <a href="https://www.ohchr.org/en/press-releases/2022/06/internet-shutdowns-un-report-details-dramatic-impact-peoples-lives-and-human#:~:text=%E2%80%9CInternet%20shutdowns%20have%20emerged%20as,for%20Human%20Rights%20Michelle%20Bachelet.">deny people's human rights</a> and cut people off from receiving urgent help," WhatsApp said.</p><p>"Though in case these shutdowns continue, we hope this solution helps people wherever there is a need for secure and reliable communication."</p><p> </p><p><strong>Industry News (38:39)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-ransomware-decryptor-kids/">LockBit Hands Ransomware Decryptor to Kids' Hospital</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-most-scammed-uk-government/">NHS is Most Scammed UK Government "Brand"</a></p><p><a href="https://www.infosecurity-magazine.com/news/general-electric-insider-two-years/">General Electric Insider Handed Two Years for IP Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/rail-tech-wabtec-global-data-breach/">Rail Tech Giant Wabtec Discloses Global Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-to-appeal-390m-gdpr-fine/">Meta to Appeal €390m GDPR Fine</a></p><p><a href="https://www.infosecurity-magazine.com/news/cops-catch-serial-child-abuser/">Cops Catch Serial Child Abuser After Tech Breakthrough</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-200m-twitter-users-details/">Over 200 Million Twitter Users' Details Leaked on Hacker Forum</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-guys-data-breach-affect/">Five Guys Discloses Data Breach Affecting Employee PII</a></p><p><a href="https://www.infosecurity-magazine.com/news/fortinet-devices-distribute/">Hackers Leverage Compromised Fortinet Devices to Distribute Ransomware</a></p><p><a href="https://www.bbc.com/news/uk-england-gloucestershire-63637883">https://www.bbc.com/news/uk-england-gloucestershire-63637883</a></p><p> </p><p><strong>Tweet of the Week (45:53)</strong></p><img src="https://lh5.googleusercontent.com/SilWmXkJoryL8RC1ujw_aTNFwnRlhXDGqwuVN-KdVghuC3oDhgp3N4n70jCirBB1BVVFLuQW84FkOi0PhQbyKELMua02UAYu7CYIR7N69IGbEx5xNaNUpKVc83dpexQltFBjTWrUJXnV_bU_Q8kBWHJkgdcTxRV9LMZEPhOIHMHQDfCmyPXDaE51o1CHpQ" /><p><a href="https://twitter.com/igb/status/1611057796606488577">https://twitter.com/igb/status/1611057796606488577</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48270013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/9b8bb5ec-5c52-47f5-9b11-9b8e7a6c6fe8/audio/a39241db-26f3-4d8e-bcba-c291369be1d1/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 134 - Happy Birthday The Duchess of Ladywell</itunes:title>
      <itunes:author>The Duchess of Ladywell, Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/53d5a656-d69b-417f-9544-bc16d0b002be/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:16</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the origins of the de-facto digital currency
 
Rant of the Week discusses knee-jerk reactions to everyone’s favourite AI Chat Bot

Billy Big Balls is either a feature for good, or a tool to capture more data, en masse
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a new executive position in the world of cyber</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the origins of the de-facto digital currency
 
Rant of the Week discusses knee-jerk reactions to everyone’s favourite AI Chat Bot

Billy Big Balls is either a feature for good, or a tool to capture more data, en masse
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a new executive position in the world of cyber</itunes:subtitle>
      <itunes:keywords>whatsapp, five guys, elon musk, y2k, &quot;enhance!&quot;, chatgpt, gdpr, twitter</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">57dd4c9a-131e-4486-b4a1-a90b0ac3f08b</guid>
      <title>Episode 133 - The Last Show of the Year Show</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:44)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th December 1995: AltaVista Launches</p><p>Developed by researchers at <a href="http://www.nytimes.com/1995/12/18/business/digital-equipment-offers-web-browsers-its-super-spider.html">Digital Equipment Research Laboratories</a>, the <a href="http://en.wikipedia.org/wiki/AltaVista">AltaVista</a> search engine is launched. It was the first world wide web search service to gain significant popularity. One of the most popular search engines in the early world wide web, Google didn’t overtake AltaVista until 2001. AltaVista was eventually purchased by Yahoo! in 2003.</p><p>11th December 1989: Joseph Lewis Popp allegedly mailed floppy disks to the UK which were labelled "AIDS Information Introductory Diskette". Surprise! The AIDS trojan on the disks demanded $189 to "renew the licence" by sending payment to a post office box in Panama. </p><p><a href="https://www.virusbulletin.com/uploads/pdf/magazine/1990/199003.pdf">Virus Bulletin</a></p><p><a href="https://twitter.com/todayininfosec/status/1469660348928167943">https://twitter.com/todayininfosec/status/1469660348928167943</a></p><p> </p><p><strong>Rant of the Week (17:02)</strong></p><p>Internal Note: [You’ll need to read this story first for background if you’re not familiar - <a href="https://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/?td=keepreading">Rackspace confirms ransomware attack behind days-long email meltdown</a>]</p><p><a href="https://www.theregister.com/2022/12/14/rackspace_email_outage/">On the 12th day of the Rackspace email disaster, it did not give to me …</a></p><p>… a working Exchange inbox tree</p><p>There's no end – or restored data – in sight for some Rackspace customers now on day 12 of the company's ransomware-induced hosted Exchange email outage.</p><p>In the service provider's most recent <a href="https://status.apps.rackspace.com/index/viewincidents?group=2">update</a>, posted at 0844 Eastern Time on Wednesday, Rackspace said it had hired CrowdStrike to investigate the fiasco, and noted it continues "to make all of our internal and external resources available to provide support to the remaining Hosted Exchange customers."</p><p>Rackspace did not, however, say if or when it expects to recover people's data that was lost or scrambled when ransomware hit its systems – an <a href="https://www.theregister.com/2022/12/03/rackspace_security_incident_hosted_exchange/">attack</a> that took down some of Rackspace's hosted Microsoft Exchange services on December 2. Since then, affected customers have been unable to get at their data held in the hosted service.</p><p>"We understand how important data recovery is to our customers," Rackspace wrote. "In ransomware attacks, data recovery efforts do necessarily take significant time, both due to the nature of the attack and need to follow additional security protocols. We will continue to keep you updated on these efforts."</p><p> </p><p><strong>Billy Big Balls of the Week (27:19)</strong></p><p><a href="https://www.theregister.com/2022/12/15/im_playing_this_extremely_smart/">SEC charges crew of social media influencers with $100m fraud</a></p><p>Eight braggadocious social media influencers fond of posing next to sportscars are facing charges from the US Securities and Exchange Commission (SEC) and Department of Justice (DoJ), who claim they manipulated their 1.5 million followers in order to help themselves to $100 million in "fraudulent profits."</p><p>The suspects, all men in their twenties and thirties, were charged with conspiracy to commit securities fraud in connection with a long-running, social media-based "pump and dump" scheme, a recently unsealed <a href="https://www.justice.gov/opa/press-release/file/1557691/download">Texas federal grand jury indictment</a> [PDF] and an <a href="https://www.sec.gov/litigation/complaints/2022/comp-pr2022-221.pdf">SEC complaint</a> [PDF] revealed.</p><p>The SEC alleged the suspects used Twitter and Discord to manipulate exchange-traded stocks in a $100 million securities fraud scheme, detailing some pretty amusing excerpts from exchanges it claims took place between individuals in the group.</p><p>We're robbing f*cking idiots of their money. . .</p><p>The commission claimed the defendants sometimes discussed their scheme over Discord voice chats that they "believed were private, but which were in fact being recorded."</p><p>OR</p><p><a href="https://www.theregister.com/2022/12/15/china_app_fix/">Here's something communism is good at: Making smartphones less annoying</a></p><p>This week the kings of the Middle Kingdom issued directives to address some of the biggest annoyances associated with smartphones applications: copycat apps and bloatware.</p><p>On Monday the Cyberspace Administration of China (CAC) <a href="http://www.cac.gov.cn/2022-12/12/c_1672477187051942.htm">launched</a> a campaign it said would "rectify chaos" in smartphone apps by cracking down on several behaviors such as publication of "copycat apps" that use logos, pictures or text similar to existing apps to deceive users and potentially collect personal data and app subscription fees.</p><p>The CAC also also plans to rectify dodgy ranking practices, and apps that lure people in with sexually suggestive or vulgar home pages. Apps distributed by QR code, rather than through app stores, are also in trouble.</p><p>But wait, there's more! CAC will prevent auto downloads or installations without user consent. Apps that misrepresent their function or content are in the firing line as well.</p><p>As are apps that tempt users with promises of making money.</p><p>Excessive pop-ups, functions that serve as an obstacle to removing apps or forced renewals, and fake free trials are all on their way out.</p><p>In the usual style of the CAC, the regulator did not specify how it would accomplish its goals, instead using phrases like "severely punish," "strictly regulate," and "crack down."</p><p>Given the Authoritarian nature of the regime, though, these terms should be taken pretty much at face value.</p><p> </p><p><strong>Industry News (35:12)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hackers-researchers/">North Korean Hackers Impersonate Researchers to Steal Intel</a></p><p><a href="https://www.infosecurity-magazine.com/news/hse-cyber-attack-ireland-dollar83m/">HSE Cyber-Attack Costs Ireland $83m So Far</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-overlooked-in-rush-to/">Security Overlooked in Rush to Hybrid Working</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-chatgpt-democratize/">Experts Warn ChatGPT Could Democratize Cybercrime</a></p><p><a href="https://www.infosecurity-magazine.com/news/uber-hit-by-new-data-breach/">Uber Hit By New Data Breach After Attack on Third-Party Vendor</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-addresses-november-data/">Twitter Addresses November Data Leak Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-drivers-used-in-cyber/">Signed Microsoft Drivers Used in Attacks Against Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/loan-scam-campaign-moneymonger/">Loan Scam Campaign 'MoneyMonger' Exploits Flutter to Hide Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-senate-ban-tiktok-govtv-devices/">Senate Approves Bill Banning TikTok From US Government Devices</a></p><p> </p><p><strong>Tweet of the Week (44:05)</strong></p><img src="https://lh4.googleusercontent.com/c02hGb1Qm14S0Z7P3gagG0DVAvLlWfE_WDoLn3YygODTdmIQDH29NlworpimEmAdvnYTbYQ6MiooIaaeDTXmvplM_aG-rTXZ_boulj8VIYj8FFZ0jTqAjlAH62kT1IPTSd7zcEpW7FnA1cn5PqSyGvBGqn51DdsxQlep4TT85ZW4XmzEsq3yy9dfMLpBfQ" /><p><a href="https://twitter.com/davenewworld_2/status/1603107286960029696">https://twitter.com/davenewworld_2/status/1603107286960029696</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Dec 2022 12:27:00 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-133-the-last-show-of-the-year-show-lYNERu_i</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:44)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th December 1995: AltaVista Launches</p><p>Developed by researchers at <a href="http://www.nytimes.com/1995/12/18/business/digital-equipment-offers-web-browsers-its-super-spider.html">Digital Equipment Research Laboratories</a>, the <a href="http://en.wikipedia.org/wiki/AltaVista">AltaVista</a> search engine is launched. It was the first world wide web search service to gain significant popularity. One of the most popular search engines in the early world wide web, Google didn’t overtake AltaVista until 2001. AltaVista was eventually purchased by Yahoo! in 2003.</p><p>11th December 1989: Joseph Lewis Popp allegedly mailed floppy disks to the UK which were labelled "AIDS Information Introductory Diskette". Surprise! The AIDS trojan on the disks demanded $189 to "renew the licence" by sending payment to a post office box in Panama. </p><p><a href="https://www.virusbulletin.com/uploads/pdf/magazine/1990/199003.pdf">Virus Bulletin</a></p><p><a href="https://twitter.com/todayininfosec/status/1469660348928167943">https://twitter.com/todayininfosec/status/1469660348928167943</a></p><p> </p><p><strong>Rant of the Week (17:02)</strong></p><p>Internal Note: [You’ll need to read this story first for background if you’re not familiar - <a href="https://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/?td=keepreading">Rackspace confirms ransomware attack behind days-long email meltdown</a>]</p><p><a href="https://www.theregister.com/2022/12/14/rackspace_email_outage/">On the 12th day of the Rackspace email disaster, it did not give to me …</a></p><p>… a working Exchange inbox tree</p><p>There's no end – or restored data – in sight for some Rackspace customers now on day 12 of the company's ransomware-induced hosted Exchange email outage.</p><p>In the service provider's most recent <a href="https://status.apps.rackspace.com/index/viewincidents?group=2">update</a>, posted at 0844 Eastern Time on Wednesday, Rackspace said it had hired CrowdStrike to investigate the fiasco, and noted it continues "to make all of our internal and external resources available to provide support to the remaining Hosted Exchange customers."</p><p>Rackspace did not, however, say if or when it expects to recover people's data that was lost or scrambled when ransomware hit its systems – an <a href="https://www.theregister.com/2022/12/03/rackspace_security_incident_hosted_exchange/">attack</a> that took down some of Rackspace's hosted Microsoft Exchange services on December 2. Since then, affected customers have been unable to get at their data held in the hosted service.</p><p>"We understand how important data recovery is to our customers," Rackspace wrote. "In ransomware attacks, data recovery efforts do necessarily take significant time, both due to the nature of the attack and need to follow additional security protocols. We will continue to keep you updated on these efforts."</p><p> </p><p><strong>Billy Big Balls of the Week (27:19)</strong></p><p><a href="https://www.theregister.com/2022/12/15/im_playing_this_extremely_smart/">SEC charges crew of social media influencers with $100m fraud</a></p><p>Eight braggadocious social media influencers fond of posing next to sportscars are facing charges from the US Securities and Exchange Commission (SEC) and Department of Justice (DoJ), who claim they manipulated their 1.5 million followers in order to help themselves to $100 million in "fraudulent profits."</p><p>The suspects, all men in their twenties and thirties, were charged with conspiracy to commit securities fraud in connection with a long-running, social media-based "pump and dump" scheme, a recently unsealed <a href="https://www.justice.gov/opa/press-release/file/1557691/download">Texas federal grand jury indictment</a> [PDF] and an <a href="https://www.sec.gov/litigation/complaints/2022/comp-pr2022-221.pdf">SEC complaint</a> [PDF] revealed.</p><p>The SEC alleged the suspects used Twitter and Discord to manipulate exchange-traded stocks in a $100 million securities fraud scheme, detailing some pretty amusing excerpts from exchanges it claims took place between individuals in the group.</p><p>We're robbing f*cking idiots of their money. . .</p><p>The commission claimed the defendants sometimes discussed their scheme over Discord voice chats that they "believed were private, but which were in fact being recorded."</p><p>OR</p><p><a href="https://www.theregister.com/2022/12/15/china_app_fix/">Here's something communism is good at: Making smartphones less annoying</a></p><p>This week the kings of the Middle Kingdom issued directives to address some of the biggest annoyances associated with smartphones applications: copycat apps and bloatware.</p><p>On Monday the Cyberspace Administration of China (CAC) <a href="http://www.cac.gov.cn/2022-12/12/c_1672477187051942.htm">launched</a> a campaign it said would "rectify chaos" in smartphone apps by cracking down on several behaviors such as publication of "copycat apps" that use logos, pictures or text similar to existing apps to deceive users and potentially collect personal data and app subscription fees.</p><p>The CAC also also plans to rectify dodgy ranking practices, and apps that lure people in with sexually suggestive or vulgar home pages. Apps distributed by QR code, rather than through app stores, are also in trouble.</p><p>But wait, there's more! CAC will prevent auto downloads or installations without user consent. Apps that misrepresent their function or content are in the firing line as well.</p><p>As are apps that tempt users with promises of making money.</p><p>Excessive pop-ups, functions that serve as an obstacle to removing apps or forced renewals, and fake free trials are all on their way out.</p><p>In the usual style of the CAC, the regulator did not specify how it would accomplish its goals, instead using phrases like "severely punish," "strictly regulate," and "crack down."</p><p>Given the Authoritarian nature of the regime, though, these terms should be taken pretty much at face value.</p><p> </p><p><strong>Industry News (35:12)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hackers-researchers/">North Korean Hackers Impersonate Researchers to Steal Intel</a></p><p><a href="https://www.infosecurity-magazine.com/news/hse-cyber-attack-ireland-dollar83m/">HSE Cyber-Attack Costs Ireland $83m So Far</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-overlooked-in-rush-to/">Security Overlooked in Rush to Hybrid Working</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-chatgpt-democratize/">Experts Warn ChatGPT Could Democratize Cybercrime</a></p><p><a href="https://www.infosecurity-magazine.com/news/uber-hit-by-new-data-breach/">Uber Hit By New Data Breach After Attack on Third-Party Vendor</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-addresses-november-data/">Twitter Addresses November Data Leak Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-drivers-used-in-cyber/">Signed Microsoft Drivers Used in Attacks Against Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/loan-scam-campaign-moneymonger/">Loan Scam Campaign 'MoneyMonger' Exploits Flutter to Hide Malware</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-senate-ban-tiktok-govtv-devices/">Senate Approves Bill Banning TikTok From US Government Devices</a></p><p> </p><p><strong>Tweet of the Week (44:05)</strong></p><img src="https://lh4.googleusercontent.com/c02hGb1Qm14S0Z7P3gagG0DVAvLlWfE_WDoLn3YygODTdmIQDH29NlworpimEmAdvnYTbYQ6MiooIaaeDTXmvplM_aG-rTXZ_boulj8VIYj8FFZ0jTqAjlAH62kT1IPTSd7zcEpW7FnA1cn5PqSyGvBGqn51DdsxQlep4TT85ZW4XmzEsq3yy9dfMLpBfQ" /><p><a href="https://twitter.com/davenewworld_2/status/1603107286960029696">https://twitter.com/davenewworld_2/status/1603107286960029696</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46629105" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ac2daa0a-04d1-4ab1-a889-a4570c95d607/audio/46868e8f-ac7d-4b6d-bc84-7d986aee02e0/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 133 - The Last Show of the Year Show</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3910e203-b460-43b2-9b02-2521651f4ec6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:34</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of Yahoo!’s history of backing the underdog
 
Rant of the Week talks about the latest goings on at “Hackspace”

Billy Big Balls makes the case for communism
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is TBC</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of Yahoo!’s history of backing the underdog
 
Rant of the Week talks about the latest goings on at “Hackspace”

Billy Big Balls makes the case for communism
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is TBC</itunes:subtitle>
      <itunes:keywords>merry christmas, influencers, rackspace, secc</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>133</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ad28f7f-8201-47d0-88c6-1d76501447ac</guid>
      <title>Episode 132 - The Dan Cuthbert Keynote Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th December 1999: RIAA Sues Napster</p><p>The <a href="http://www.wired.com/thisdayintech/2009/12/1207riaa-sues-napster/">Recording Industry Association of America sues the peer-to-peer file sharing service Napster</a> alleging copyright infringement for allowing users to download copyrighted music for free. The RIAA would eventually win injunctions against Napster forcing the service to suspend operations and eventually file bankruptcy. In the end the RIAA and its members would settle with Napster’s financial backers for hundreds of millions of dollars.</p><p>While the case was ostensibly about copyright violations, the bigger picture for the RIAA was also about control. The recording industry in general was caught with its pants down when it came to digital music and the Internet. They were not prepared for the sudden popularity of digital music downloads that Napster introduced and were not ready with a model to monetise downloaded music. This lawsuit, along with future lawsuits targeting individuals, was intended to squash the practice of downloading music as much as it was to recover compensation. However, the practice of downloading music could not be stopped as other non-centralised peer-to-peer file sharing services popped up in place of Napster. </p><p>4th December 2001: Goner Worm Hits the Internet</p><p>Disguised as a screen saver and spread through an infected user’s Microsoft Outlook e-mail software, <a href="http://abcnews.go.com/Technology/story?id=98170">the Goner worm spreads through the Internet</a> at a pace second only to the <a href="https://thisdayintechhistory.com/05/04/love-stinks/">Love Bug virus</a> the previous year. Goner was estimated to cause about $80 million dollars in damage.</p><p> </p><p><strong>Rant of the Week (20:41)</strong></p><p><a href="https://www.theregister.com/2022/12/08/apple_encryption_icloud/">Egad, did Apple do something right? End-to-end encryption for (most) iCloud services</a></p><p>Apple says it will provide end-to-end encryption for most iCloud services, having abandoned its previously announced – and then quietly shelved – plan to check the legality of on-device photos prior to cloud synchronisation.</p><p>Cupertino announced three security enhancements on Wednesday, one of which it calls Advanced Data Protection. "Advanced Data Protection is Apple's highest level of cloud data security, giving users the choice to protect the vast majority of their most sensitive iCloud data with end-to-end encryption so that it can only be decrypted on their trusted devices," explained Ivan Krstić, Apple’s head of security engineering and architecture, in <a href="https://www.apple.com/newsroom/2022/12/apple-advances-user-security-with-powerful-new-data-protections/">a canned statement</a>.</p><p>Apple already offers end-to-end (E2E) encryption by default for 14 iCloud services, including passwords in iCloud Keychain and Health data. But the iBiz has not made E2E encryption broadly available for iCloud, preferring instead to retain access to a significant amount of the customer data on company servers. That has suited law enforcement authorities, who continue to worry aloud about being left in the dark by encryption.</p><p> </p><p><strong>Billy Big balls of the Week (31:57)</strong></p><p>Brief update on last week's story: <a href="https://www.theregister.com/2022/12/07/san_francisco_terminates_killer_robots/">San Francisco terminates explosive killer cop bots</a></p><p>San Francisco legislators this week changed course on their killer robot policy, banning the police from using remote-control bots fitted with explosives. For now.</p><p>On Tuesday, the city's Board of Supervisors voted unanimously to explicitly prohibit lethal force by police robots following a public backlash and worldwide media attention. Under a previously approved policy, SF police robots under human control could have used explosives to kill suspects. The droids were not allowed to use guns.</p><p><a href="https://www.theregister.com/2022/12/08/texas_bans_indiana_tiktok_lawsuit/">States label TikTok 'a malicious and menacing threat'</a></p><p>Two more US states have launched aggressive action against made-in-China social media app TikTok.</p><p>Texas on Wednesday banned the app from government devices, with governor Greg Abbott <a href="https://gov.texas.gov/uploads/files/press/Patrick_Phelan_Letter.pdf">ordering</a> [PDF] the ban "to protect sensitive information and critical infrastructure from TikTok."</p><p>"TikTok harvests vast amounts of data from its users' devices – including when, where, and how they conduct internet activity – and offers this trove of potentially sensitive information to the Chinese government," Abbott wrote.</p><p>Which is tame compared to the actions and language used by Indiana's attorney-general, who has decided to sue the Chinese social media platform – twice!</p><p>TikTok's Chinese analog, Douyin, contains many more safeguards – including required youth modes, real name authentications, bans on minors viewing live broadcasts, prevention of salacious material and restrictions on how long and when minors can access the app. </p><p>Chinese users under the age of 14 are limited to 40 minutes of daily use, between 0600 and 2200. Users in the US have no limit and spend an average of 99 minutes per day on TikTok, according to the office of the AG.</p><p>"In short, TikTok poses known risks to young teens that TikTok's parent company itself finds inappropriate for Chinese users who are the same age," argues the complaint.</p><p> </p><p><strong>Industry News (38:41) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/gen-z-internet-users-normalize/">Gen Z Internet Users "Normalize" Cybercrime - Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-government-wants-to/">Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/web-skimming-attacks-hit-dozens-of/">Supply Chain Web Skimming Attacks Hit Dozens of Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/russias-vtb-bank-suffers-biggest/">Russia's VTB Bank Suffers its Biggest Ever DDoS</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-fines-rogue-nuisance-callers/">ICO Fines Rogue Nuisance Callers £500,000</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-department-unsupported/">UK Government Department Using Unsupported Applications, Reveals Watchdog</a></p><p><a href="https://www.infosecurity-magazine.com/news/nz-privacy-commissioner/">NZ Privacy Commissioner Investigates Mercury IT Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/pet-dog-unmasks-drug-trafficker/">Pet Dog Unmasks Drug Trafficker on Encrypted Chat</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-new-feature-increase-cloud/">Apple Introduces New Data Protections to Increase Cloud Security</a></p><p> </p><p><strong>Tweet of the Week (46:07)   </strong></p><img src="https://lh3.googleusercontent.com/yRE07sxBJLUzZvuw5-jB3fLOXcKMvLPGfIsho4x7FuU0-VvSOOXLvyNla9APDZXLxSFBt1IJuxzUcE5zcq_T-wljNH6O9V96puqTL0LZQvV3UQ7ulV_RadWe7HEjGx98kn2fbWe2cZgp46Z44VjrEHtlKvCDn5n5xFOkhFJ6OthMZVWcz4Vz2yK_I7khhg" /><p><a href="https://twitter.com/_noid_/status/1600135215225053184">https://twitter.com/_noid_/status/1600135215225053184</a></p><img src="https://lh4.googleusercontent.com/_vEG2Twm5lfEOuWMb-Wjslx9XUwxlmmkjPsuziMTll6CV7CNUuyf0A3RyVSXw8AXHUZfbfQZeFYcU9hadtRydFOKz7A-HPXvdidcQCCuaoZZ2KMAMJHk7lek9WprLMvOU_vHzK8f_GueStbLZKXx8f3DDOl61QXT1-7ZEWb2B3Uro_wGQEE1SLM6dU2c8g" /><p><a href="https://twitter.com/jomc/status/1600637738352627713">https://twitter.com/jomc/status/1600637738352627713</a></p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Dec 2022 12:26:03 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-132-the-dan-cuthbert-keynote-episode-iOEUYXau</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:40)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>7th December 1999: RIAA Sues Napster</p><p>The <a href="http://www.wired.com/thisdayintech/2009/12/1207riaa-sues-napster/">Recording Industry Association of America sues the peer-to-peer file sharing service Napster</a> alleging copyright infringement for allowing users to download copyrighted music for free. The RIAA would eventually win injunctions against Napster forcing the service to suspend operations and eventually file bankruptcy. In the end the RIAA and its members would settle with Napster’s financial backers for hundreds of millions of dollars.</p><p>While the case was ostensibly about copyright violations, the bigger picture for the RIAA was also about control. The recording industry in general was caught with its pants down when it came to digital music and the Internet. They were not prepared for the sudden popularity of digital music downloads that Napster introduced and were not ready with a model to monetise downloaded music. This lawsuit, along with future lawsuits targeting individuals, was intended to squash the practice of downloading music as much as it was to recover compensation. However, the practice of downloading music could not be stopped as other non-centralised peer-to-peer file sharing services popped up in place of Napster. </p><p>4th December 2001: Goner Worm Hits the Internet</p><p>Disguised as a screen saver and spread through an infected user’s Microsoft Outlook e-mail software, <a href="http://abcnews.go.com/Technology/story?id=98170">the Goner worm spreads through the Internet</a> at a pace second only to the <a href="https://thisdayintechhistory.com/05/04/love-stinks/">Love Bug virus</a> the previous year. Goner was estimated to cause about $80 million dollars in damage.</p><p> </p><p><strong>Rant of the Week (20:41)</strong></p><p><a href="https://www.theregister.com/2022/12/08/apple_encryption_icloud/">Egad, did Apple do something right? End-to-end encryption for (most) iCloud services</a></p><p>Apple says it will provide end-to-end encryption for most iCloud services, having abandoned its previously announced – and then quietly shelved – plan to check the legality of on-device photos prior to cloud synchronisation.</p><p>Cupertino announced three security enhancements on Wednesday, one of which it calls Advanced Data Protection. "Advanced Data Protection is Apple's highest level of cloud data security, giving users the choice to protect the vast majority of their most sensitive iCloud data with end-to-end encryption so that it can only be decrypted on their trusted devices," explained Ivan Krstić, Apple’s head of security engineering and architecture, in <a href="https://www.apple.com/newsroom/2022/12/apple-advances-user-security-with-powerful-new-data-protections/">a canned statement</a>.</p><p>Apple already offers end-to-end (E2E) encryption by default for 14 iCloud services, including passwords in iCloud Keychain and Health data. But the iBiz has not made E2E encryption broadly available for iCloud, preferring instead to retain access to a significant amount of the customer data on company servers. That has suited law enforcement authorities, who continue to worry aloud about being left in the dark by encryption.</p><p> </p><p><strong>Billy Big balls of the Week (31:57)</strong></p><p>Brief update on last week's story: <a href="https://www.theregister.com/2022/12/07/san_francisco_terminates_killer_robots/">San Francisco terminates explosive killer cop bots</a></p><p>San Francisco legislators this week changed course on their killer robot policy, banning the police from using remote-control bots fitted with explosives. For now.</p><p>On Tuesday, the city's Board of Supervisors voted unanimously to explicitly prohibit lethal force by police robots following a public backlash and worldwide media attention. Under a previously approved policy, SF police robots under human control could have used explosives to kill suspects. The droids were not allowed to use guns.</p><p><a href="https://www.theregister.com/2022/12/08/texas_bans_indiana_tiktok_lawsuit/">States label TikTok 'a malicious and menacing threat'</a></p><p>Two more US states have launched aggressive action against made-in-China social media app TikTok.</p><p>Texas on Wednesday banned the app from government devices, with governor Greg Abbott <a href="https://gov.texas.gov/uploads/files/press/Patrick_Phelan_Letter.pdf">ordering</a> [PDF] the ban "to protect sensitive information and critical infrastructure from TikTok."</p><p>"TikTok harvests vast amounts of data from its users' devices – including when, where, and how they conduct internet activity – and offers this trove of potentially sensitive information to the Chinese government," Abbott wrote.</p><p>Which is tame compared to the actions and language used by Indiana's attorney-general, who has decided to sue the Chinese social media platform – twice!</p><p>TikTok's Chinese analog, Douyin, contains many more safeguards – including required youth modes, real name authentications, bans on minors viewing live broadcasts, prevention of salacious material and restrictions on how long and when minors can access the app. </p><p>Chinese users under the age of 14 are limited to 40 minutes of daily use, between 0600 and 2200. Users in the US have no limit and spend an average of 99 minutes per day on TikTok, according to the office of the AG.</p><p>"In short, TikTok poses known risks to young teens that TikTok's parent company itself finds inappropriate for Chinese users who are the same age," argues the complaint.</p><p> </p><p><strong>Industry News (38:41) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/gen-z-internet-users-normalize/">Gen Z Internet Users "Normalize" Cybercrime - Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-government-wants-to/">Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/web-skimming-attacks-hit-dozens-of/">Supply Chain Web Skimming Attacks Hit Dozens of Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/russias-vtb-bank-suffers-biggest/">Russia's VTB Bank Suffers its Biggest Ever DDoS</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-fines-rogue-nuisance-callers/">ICO Fines Rogue Nuisance Callers £500,000</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-department-unsupported/">UK Government Department Using Unsupported Applications, Reveals Watchdog</a></p><p><a href="https://www.infosecurity-magazine.com/news/nz-privacy-commissioner/">NZ Privacy Commissioner Investigates Mercury IT Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/pet-dog-unmasks-drug-trafficker/">Pet Dog Unmasks Drug Trafficker on Encrypted Chat</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-new-feature-increase-cloud/">Apple Introduces New Data Protections to Increase Cloud Security</a></p><p> </p><p><strong>Tweet of the Week (46:07)   </strong></p><img src="https://lh3.googleusercontent.com/yRE07sxBJLUzZvuw5-jB3fLOXcKMvLPGfIsho4x7FuU0-VvSOOXLvyNla9APDZXLxSFBt1IJuxzUcE5zcq_T-wljNH6O9V96puqTL0LZQvV3UQ7ulV_RadWe7HEjGx98kn2fbWe2cZgp46Z44VjrEHtlKvCDn5n5xFOkhFJ6OthMZVWcz4Vz2yK_I7khhg" /><p><a href="https://twitter.com/_noid_/status/1600135215225053184">https://twitter.com/_noid_/status/1600135215225053184</a></p><img src="https://lh4.googleusercontent.com/_vEG2Twm5lfEOuWMb-Wjslx9XUwxlmmkjPsuziMTll6CV7CNUuyf0A3RyVSXw8AXHUZfbfQZeFYcU9hadtRydFOKz7A-HPXvdidcQCCuaoZZ2KMAMJHk7lek9WprLMvOU_vHzK8f_GueStbLZKXx8f3DDOl61QXT1-7ZEWb2B3Uro_wGQEE1SLM6dU2c8g" /><p><a href="https://twitter.com/jomc/status/1600637738352627713">https://twitter.com/jomc/status/1600637738352627713</a></p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50029621" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d1cc7957-4198-449e-b51b-3da13324efea/audio/4ed8e43c-e714-42f3-8a06-98005cc1e08a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 132 - The Dan Cuthbert Keynote Episode</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/4c230b9a-383f-40a8-8f50-18f06d82b18f/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:06</itunes:duration>
      <itunes:summary>This week in InfoSec talks about when an MTV Music Awards presenter showed off his borrowed Metallica shirt
 
Rant of the Week is checking if Apple did something right

Billy Big Balls talks about the US government’s attitude to Tik Tok
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a surprisingly serious note to end the show with</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about when an MTV Music Awards presenter showed off his borrowed Metallica shirt
 
Rant of the Week is checking if Apple did something right

Billy Big Balls talks about the US government’s attitude to Tik Tok
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a surprisingly serious note to end the show with</itunes:subtitle>
      <itunes:keywords>blackhat europe, smashing security, napster, daniel cuthbert, apple, ed209, tik tok, csam, itunes</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>132</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e111d98f-842d-4a44-994f-51a0ee1de83c</guid>
      <title>Episode 131 - The Spousal Audit Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (06:17)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th November 1995: Microsoft Shipped Internet Explorer 2.0</p><p>Microsoft Corp. shipped Internet Explorer 2.0, starting a browser war with the popular Netscape Navigator. </p><p>Netscape Communications Corp. had had a virtual monopoly on World Wide Web browsers since the infancy of the web. The Netscape Navigator and Communicator browsers serve as a format for viewing and creating World Wide Web pages, as well as participating in newsgroups and sending e-mail. </p><p>Microsoft promoted its Internet Explorer with specific mention of its privacy and encryption features (such as support for SSL).  </p><p><a href="https://nakedsecurity.sophos.com/2021/01/05/chrome-browser-has-a-new-years-resolution-https-by-default/">Chrome browser has a New Year’s resolution: HTTPS by default</a> (2020)</p><p>24th November 2014: The Washington Post published an article which included a picture of TSA master keys. As a result, a short time later functional keys were 3-d printed using the [unblurred] key patterns displayed in the picture.</p><p><a href="https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html">The secret life of baggage: Where does your luggage go at the airport?</a> (Image since changed)</p><p><a href="https://twitter.com/todayininfosec/status/1198722561355337728">https://twitter.com/todayininfosec/status/1198722561355337728</a></p><p> </p><p><strong>Rant of the Week (18:41)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/australia-will-now-fine-firms-up-to-au50-million-for-data-breaches/">Australia will now fine firms up to AU$50 million for data breaches</a></p><p>The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million for companies and data controllers who suffered large-scale data breaches.</p><p>The financial penalty introduced by the new bill is set to whichever is greater:</p><ul><li>AU$50 million [Approximately $34m USD for context]</li><li>Three times the value of any benefit obtained through the misuse of information</li><li>30% of a company's adjusted turnover in the relevant period</li></ul><p>Previously, the penalty for severe data exposures was AU$2.22 million, considered wholly inadequate to incentivize companies to improve their data security mechanisms.</p><p>The new bill comes in response to a series of recent cyberattacks against Australian companies, including ransomware and network breaches, resulting in the exposure of highly sensitive data for millions of people in the country.</p><p>"The Albanese Labor government has wasted no time in responding to recent major data breaches. We have announced, introduced, and delivered legislation in just over a month," <a href="https://ministers.ag.gov.au/media-centre/parliament-approves-governments-privacy-penalty-bill-28-11-2022">reads the media announcement</a>.</p><p>"These new, larger penalties send a clear message to large companies that they must do better to protect the data they collect."</p><p>The most notable incidents were the Optus telecommunication provider data breach that impacted <a href="https://www.bleepingcomputer.com/news/security/optus-hacker-apologizes-and-allegedly-deletes-all-stolen-data/">11 million people</a> and the Medibank insurance firm ransomware attack that exposed the data of <a href="https://www.bleepingcomputer.com/news/security/medibank-warns-customers-their-data-was-leaked-by-ransomware-gang/">9.7 million</a>.</p><p>Apart from setting higher fines, the new bill also gives greater powers to the Office of the Australian Information Commissioner (OAIC) to get more involved in the privacy breach resolution and scope determination process.</p><p>  </p><p><strong>Billy Big Balls of the Week (28:19)</strong></p><p><a href="https://www.theregister.com/2022/11/30/san_francisco_killer_robots_ordinance/">San Francisco lawmakers approve lethal robots, but they can't carry guns</a></p><p>San Francisco police can deploy so-called "killer robots" following a Board of Supervisors' vote on Tuesday, clearing the cops to use robots equipped with explosives in extreme situations.</p><p>The robots primarily will be used to neutralize and dispose of bombs, and provide video reconnaissance, according to San Francisco Supervisor Rafael Mandelman. He added that none of the robots will carry guns, "and SFPD has no plans to attach firearms," in a Twitter thread after the vote. </p><p>"However, in extreme circumstances it is conceivable that use of a robot might be the best and only way of dealing with a terrorist or mass shooter," Mandelman said.</p><p>Such a situation has happened before. In July 2016 a mass-shooting incident left five police officers dead and another 11 people wounded, and the suspect was cornered in a local building. Police <a href="https://www.theregister.com/2016/07/08/police_robot_kills_dallas_shooting_suspect/">strapped an explosive charge</a> onto a bomb-disposal robot, which detonated near the suspect, killing him.</p><p>[<i>One particular comment on this which made me chuckle was: “Considering American cops can't even go into an active shooter situation to save schoolchildren, I assume this will be the first course of action for anything above a parking ticket.</i>”] </p><p>- *Shots fired* (but not by the Texas police)</p><p> </p><p><strong>Industry News (34:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-16000-scam-fifa-world-cup/">Experts Find 16,000+ Scam FIFA World Cup Domains</a></p><p><a href="https://www.infosecurity-magazine.com/news/ireland-dpc-fines-meta-data-leak/">Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/lets-encrypt-issues-three/">Let's Encrypt Issues Three Billionth Certificate</a></p><p><a href="https://www.infosecurity-magazine.com/news/australian-parliament-passes/">Australian Parliament Passes Privacy Penalty Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-defense-contractors/">Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-accidentally-crash/">Researchers Accidentally Crash Cryptomining Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/eight-30m-unemployment-benefits/">Eight Charged with $30m Unemployment Benefits Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-extends-nis-regulations-to-it/">UK Extends NIS Regulations to IT Managed Service Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-show-millions-of-whatsapp/">WhatsApp Files on Dark Web Show Millions of Records For Sale</a></p><p> </p><p><strong>Tweet of the Week (43:40)</strong></p><img src="https://lh4.googleusercontent.com/ObeH9V2b2WHDdfTIK2pWQUd6PO0q5OhGWAuEMGz6RkVuMx2d7o00iTjZuh-0eCmsRTXLEdMOqsOBw8zGiGBq_VzVsiFZEb3Xj7gPrJg6zcq_HaWu_jgKrFYOwEy_KIobpa9pFiGNO0fjP20mLa5sjFE3suIcKw1I9FCARM_BWHk27zWDgCCyrzoR7NcTow" /><p><a href="https://twitter.com/hackinarticles/status/1597820497856643072">https://twitter.com/hackinarticles/status/1597820497856643072</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 2 Dec 2022 11:41:57 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-131-the-spousal-audit-episode-hbngbATO</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (06:17)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th November 1995: Microsoft Shipped Internet Explorer 2.0</p><p>Microsoft Corp. shipped Internet Explorer 2.0, starting a browser war with the popular Netscape Navigator. </p><p>Netscape Communications Corp. had had a virtual monopoly on World Wide Web browsers since the infancy of the web. The Netscape Navigator and Communicator browsers serve as a format for viewing and creating World Wide Web pages, as well as participating in newsgroups and sending e-mail. </p><p>Microsoft promoted its Internet Explorer with specific mention of its privacy and encryption features (such as support for SSL).  </p><p><a href="https://nakedsecurity.sophos.com/2021/01/05/chrome-browser-has-a-new-years-resolution-https-by-default/">Chrome browser has a New Year’s resolution: HTTPS by default</a> (2020)</p><p>24th November 2014: The Washington Post published an article which included a picture of TSA master keys. As a result, a short time later functional keys were 3-d printed using the [unblurred] key patterns displayed in the picture.</p><p><a href="https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html">The secret life of baggage: Where does your luggage go at the airport?</a> (Image since changed)</p><p><a href="https://twitter.com/todayininfosec/status/1198722561355337728">https://twitter.com/todayininfosec/status/1198722561355337728</a></p><p> </p><p><strong>Rant of the Week (18:41)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/australia-will-now-fine-firms-up-to-au50-million-for-data-breaches/">Australia will now fine firms up to AU$50 million for data breaches</a></p><p>The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million for companies and data controllers who suffered large-scale data breaches.</p><p>The financial penalty introduced by the new bill is set to whichever is greater:</p><ul><li>AU$50 million [Approximately $34m USD for context]</li><li>Three times the value of any benefit obtained through the misuse of information</li><li>30% of a company's adjusted turnover in the relevant period</li></ul><p>Previously, the penalty for severe data exposures was AU$2.22 million, considered wholly inadequate to incentivize companies to improve their data security mechanisms.</p><p>The new bill comes in response to a series of recent cyberattacks against Australian companies, including ransomware and network breaches, resulting in the exposure of highly sensitive data for millions of people in the country.</p><p>"The Albanese Labor government has wasted no time in responding to recent major data breaches. We have announced, introduced, and delivered legislation in just over a month," <a href="https://ministers.ag.gov.au/media-centre/parliament-approves-governments-privacy-penalty-bill-28-11-2022">reads the media announcement</a>.</p><p>"These new, larger penalties send a clear message to large companies that they must do better to protect the data they collect."</p><p>The most notable incidents were the Optus telecommunication provider data breach that impacted <a href="https://www.bleepingcomputer.com/news/security/optus-hacker-apologizes-and-allegedly-deletes-all-stolen-data/">11 million people</a> and the Medibank insurance firm ransomware attack that exposed the data of <a href="https://www.bleepingcomputer.com/news/security/medibank-warns-customers-their-data-was-leaked-by-ransomware-gang/">9.7 million</a>.</p><p>Apart from setting higher fines, the new bill also gives greater powers to the Office of the Australian Information Commissioner (OAIC) to get more involved in the privacy breach resolution and scope determination process.</p><p>  </p><p><strong>Billy Big Balls of the Week (28:19)</strong></p><p><a href="https://www.theregister.com/2022/11/30/san_francisco_killer_robots_ordinance/">San Francisco lawmakers approve lethal robots, but they can't carry guns</a></p><p>San Francisco police can deploy so-called "killer robots" following a Board of Supervisors' vote on Tuesday, clearing the cops to use robots equipped with explosives in extreme situations.</p><p>The robots primarily will be used to neutralize and dispose of bombs, and provide video reconnaissance, according to San Francisco Supervisor Rafael Mandelman. He added that none of the robots will carry guns, "and SFPD has no plans to attach firearms," in a Twitter thread after the vote. </p><p>"However, in extreme circumstances it is conceivable that use of a robot might be the best and only way of dealing with a terrorist or mass shooter," Mandelman said.</p><p>Such a situation has happened before. In July 2016 a mass-shooting incident left five police officers dead and another 11 people wounded, and the suspect was cornered in a local building. Police <a href="https://www.theregister.com/2016/07/08/police_robot_kills_dallas_shooting_suspect/">strapped an explosive charge</a> onto a bomb-disposal robot, which detonated near the suspect, killing him.</p><p>[<i>One particular comment on this which made me chuckle was: “Considering American cops can't even go into an active shooter situation to save schoolchildren, I assume this will be the first course of action for anything above a parking ticket.</i>”] </p><p>- *Shots fired* (but not by the Texas police)</p><p> </p><p><strong>Industry News (34:48)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-16000-scam-fifa-world-cup/">Experts Find 16,000+ Scam FIFA World Cup Domains</a></p><p><a href="https://www.infosecurity-magazine.com/news/ireland-dpc-fines-meta-data-leak/">Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/lets-encrypt-issues-three/">Let's Encrypt Issues Three Billionth Certificate</a></p><p><a href="https://www.infosecurity-magazine.com/news/australian-parliament-passes/">Australian Parliament Passes Privacy Penalty Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-defense-contractors/">Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-accidentally-crash/">Researchers Accidentally Crash Cryptomining Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/eight-30m-unemployment-benefits/">Eight Charged with $30m Unemployment Benefits Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-extends-nis-regulations-to-it/">UK Extends NIS Regulations to IT Managed Service Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-show-millions-of-whatsapp/">WhatsApp Files on Dark Web Show Millions of Records For Sale</a></p><p> </p><p><strong>Tweet of the Week (43:40)</strong></p><img src="https://lh4.googleusercontent.com/ObeH9V2b2WHDdfTIK2pWQUd6PO0q5OhGWAuEMGz6RkVuMx2d7o00iTjZuh-0eCmsRTXLEdMOqsOBw8zGiGBq_VzVsiFZEb3Xj7gPrJg6zcq_HaWu_jgKrFYOwEy_KIobpa9pFiGNO0fjP20mLa5sjFE3suIcKw1I9FCARM_BWHk27zWDgCCyrzoR7NcTow" /><p><a href="https://twitter.com/hackinarticles/status/1597820497856643072">https://twitter.com/hackinarticles/status/1597820497856643072</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46843100" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/fdc442b0-9668-49e5-9b94-b53be0217c58/audio/b430e27e-89e6-47fb-a305-4f6e1f2ad8ec/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 131 - The Spousal Audit Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e1c2d321-903e-49f4-90c6-dff75fb688e0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:47</itunes:duration>
      <itunes:summary>This week in InfoSec talks about Microsoft’s introduction of a security feature which wasn’t forced by others for another 25 years
 
Rant of the Week is either penalising the victim or shaming other regulators for their inactivity (we’ll decide when we read the story)

Billy Big Balls demonstrates we learned nothing from Robocop, as ED-209 is unleashed on the American public
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us that even Infosec is not immune to automation replacing skilled people</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about Microsoft’s introduction of a security feature which wasn’t forced by others for another 25 years
 
Rant of the Week is either penalising the victim or shaming other regulators for their inactivity (we’ll decide when we read the story)

Billy Big Balls demonstrates we learned nothing from Robocop, as ED-209 is unleashed on the American public
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us that even Infosec is not immune to automation replacing skilled people</itunes:subtitle>
      <itunes:keywords>internet explorer 2, dead or alive you are coming with me, ico, netscape navigator</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>131</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">41044429-6538-4afe-958b-a964b691fa0d</guid>
      <title>Episode 130 - The Jingle Free Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (11:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 1998: AOL announces it will buy Netscape Communications</p><p><a href="http://news.cnet.com/2100-1023-218360.html">AOL announces it will buy Netscape Communications in a stock-for-stock deal worth approximately $4.2 billion</a>. At the time it was considered a good move by AOL and Netscape to merge forces to better compete with Microsoft in the browser and Internet provider markets. However, Microsoft’s dominance in the personal computer market could not be stopped and the Netscape browser lost almost all market share to Internet Explorer. </p><p>In 2003 <a href="http://www.forbes.com/2003/05/30/cx_da_0530topnews.html">Microsoft settled a monopoly lawsuit with AOL</a> (then merged with Time Warner) for $750 million over the loss of value of Netscape. AOL itself, once a dominant Internet Service Provider, slowly lost their subscriber base with the evolution of broadband Internet in the 2000’s and operates primarily as a media conglomerate, although their dial-up service still subscribes approximately 2 million users as of 2013.  In 2015 that went up to 2.1 million but is now <a href="https://www.cnbc.com/2021/05/03/aol-1point5-million-people-still-pay-for-service-but-not-for-dial-up-internet.html">reported to be in the thousands</a>.  </p><p>21st November 2017: It was reported that <a href="https://www.theguardian.com/technology/2017/nov/21/uber-data-hack-cyber-attack">Uber had concealed a massive hack that exposed data of 57m users and drivers</a> 13 months previously</p><p> </p><p><strong>Rant of the Week (17:17)</strong></p><p><a href="https://www.theverge.com/2022/11/22/23471842/facebook-hr-block-taxact-taxslayer-info-sharing">Tax filing websites have been sending users’ financial information to Facebook</a></p><p>Major tax filing services such as H&R Block, TaxAct, and TaxSlayer have been quietly transmitting sensitive financial information to Facebook when Americans file their taxes online, The Markup has learned.</p><p>The <a href="https://github.com/the-markup/meta-pixel-taxes">data</a>, sent through widely used code called the Meta Pixel, includes not only information like names and email addresses but often even more detailed information, including data on users’ income, filing status, refund amounts, and dependents’ college scholarship amounts. </p><p>The information sent to Facebook can be used by the company to power its advertising algorithms and is gathered regardless of whether the person using the tax filing service has an account on Facebook or other platforms operated by its owner Meta. </p><p> </p><p><strong>Billy Big Balls of the Week (25:37)</strong></p><p><a href="https://www.theregister.com/2022/11/24/meta_us_military_influence/">Meta links US military to fake social media influence campaigns</a></p><p>In its latest quarterly threat report, Meta said it had detected and disrupted influence operations originating in the US, and it calls out those it believes are responsible: the American military.</p><p>Meta said it picked up on three major covert influence operations on its platforms in the third quarter of the year, the first of which originated in the United States.</p><p>Meta previously reported on secretive influence ops being performed by the US <a href="https://www.theregister.com/2022/08/25/twitter_meta_troll_accounts/">in August</a>, but didn't specify anything about its observations at the time outside of saying they originated within the country.</p><p>Now, however, the social media giant is getting more specific. "Although the people behind this operation attempted to conceal their identities and coordination, our investigation found links to individuals associated with the US military," Meta said in <a href="https://about.fb.com/wp-content/uploads/2022/11/Quarterly-Adversarial-Threat-Report-Q2-2022-1.pdf">the report</a> [PDF].</p><p> </p><p><a href="https://www.bbc.co.uk/news/uk-63736573">Police text 70,000 victims in UK's biggest anti-fraud operation</a></p><p>Detectives have begun contacting 70,000 people suspected of being victims of a sophisticated banking scam.</p><p>The Metropolitan Police is sending text messages to mobile phone users it believes spoke with fraudsters pretending to be their bank.</p><p>Met Commissioner Sir Mark Rowley described an "enormous endeavour" in gathering evidence after the discovery of an online fraud network.</p><p>There have been more than 100 arrests so far, and one man has been charged.</p><p>People who receive a text message in the next 24 hours will be directed to the Action Fraud website to register their details as officers build cases against suspects.</p><p>The scam involved fraudsters calling people at random, pretending to be a bank and warning of suspicious activity on their account.</p><p>They would pose as employees of banks including Barclays, Santander, HSBC, Lloyds, Halifax, First Direct, NatWest, Nationwide and TSB.</p><p>The fraudsters would then encourage people to disclose security information and, through technology, they may have accessed features such as one-time passcodes to clear accounts of funds.</p><p>As many as 200,000 people in the UK may have been victims of the scam, police said, with victims losing thousands of pounds, and in one case £3m.</p><p> </p><p><strong>Industry News (32:27)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-threat-actors-red-team/">Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-privacy-defends-enforcement/">UK Privacy Tsar Defends Controversial Enforcement Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-removes-pro-us-accounts-from/">Meta Removes Pro-US Accounts in Middle East and Central Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/panaseer-guidance-security-eu/">Panaseer Launches Guidance on Security Controls Ahead of EU's New Legislation</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-ddos-downs-european/">Russian DDoS Briefly Downs European Parliament Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cops-lead-fraud-site-that-made/">UK Cops Lead Action Against Fraud Site that Made £100m+</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-scheme-april-2023/">Cyber Essentials Scheme Set for April 2023 Update</a></p><p><a href="https://www.infosecurity-magazine.com/news/sonder-confirms-data-breach/">Sonder confirms data breach, documents and other PII potentially compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/sharkbot-malware-in-android-file/">SharkBot Malware Found in Android File Manager Apps With Thousands of Downloads</a></p><p> </p><p><strong>Tweet of the Week (40:45)</strong></p><img src="https://lh5.googleusercontent.com/-SLMi_tvoWufBKkcupgwXpSVTCrhleU8FrrS8Kb3kTpK3pQzuKBQGVbA5zGAifdf9sEMavB4WpU646tXBFOzTk3i5R8pGigmjTqFntqOffzvbcEeq2NlOSxYQ8nnNE_G9GWm7g7Cz7rhk1r9aw7C-1gOFkEn3imnH3RT7MRYaLg2qUUG0Bm0JgdYkequ1g" /><p><a href="https://twitter.com/TheCollierJam/status/1595388389972496386">https://twitter.com/TheCollierJam/status/1595388389972496386</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Nov 2022 12:07:31 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-130-the-jingle-free-episode-u7LDpTiR</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (11:48)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th November 1998: AOL announces it will buy Netscape Communications</p><p><a href="http://news.cnet.com/2100-1023-218360.html">AOL announces it will buy Netscape Communications in a stock-for-stock deal worth approximately $4.2 billion</a>. At the time it was considered a good move by AOL and Netscape to merge forces to better compete with Microsoft in the browser and Internet provider markets. However, Microsoft’s dominance in the personal computer market could not be stopped and the Netscape browser lost almost all market share to Internet Explorer. </p><p>In 2003 <a href="http://www.forbes.com/2003/05/30/cx_da_0530topnews.html">Microsoft settled a monopoly lawsuit with AOL</a> (then merged with Time Warner) for $750 million over the loss of value of Netscape. AOL itself, once a dominant Internet Service Provider, slowly lost their subscriber base with the evolution of broadband Internet in the 2000’s and operates primarily as a media conglomerate, although their dial-up service still subscribes approximately 2 million users as of 2013.  In 2015 that went up to 2.1 million but is now <a href="https://www.cnbc.com/2021/05/03/aol-1point5-million-people-still-pay-for-service-but-not-for-dial-up-internet.html">reported to be in the thousands</a>.  </p><p>21st November 2017: It was reported that <a href="https://www.theguardian.com/technology/2017/nov/21/uber-data-hack-cyber-attack">Uber had concealed a massive hack that exposed data of 57m users and drivers</a> 13 months previously</p><p> </p><p><strong>Rant of the Week (17:17)</strong></p><p><a href="https://www.theverge.com/2022/11/22/23471842/facebook-hr-block-taxact-taxslayer-info-sharing">Tax filing websites have been sending users’ financial information to Facebook</a></p><p>Major tax filing services such as H&R Block, TaxAct, and TaxSlayer have been quietly transmitting sensitive financial information to Facebook when Americans file their taxes online, The Markup has learned.</p><p>The <a href="https://github.com/the-markup/meta-pixel-taxes">data</a>, sent through widely used code called the Meta Pixel, includes not only information like names and email addresses but often even more detailed information, including data on users’ income, filing status, refund amounts, and dependents’ college scholarship amounts. </p><p>The information sent to Facebook can be used by the company to power its advertising algorithms and is gathered regardless of whether the person using the tax filing service has an account on Facebook or other platforms operated by its owner Meta. </p><p> </p><p><strong>Billy Big Balls of the Week (25:37)</strong></p><p><a href="https://www.theregister.com/2022/11/24/meta_us_military_influence/">Meta links US military to fake social media influence campaigns</a></p><p>In its latest quarterly threat report, Meta said it had detected and disrupted influence operations originating in the US, and it calls out those it believes are responsible: the American military.</p><p>Meta said it picked up on three major covert influence operations on its platforms in the third quarter of the year, the first of which originated in the United States.</p><p>Meta previously reported on secretive influence ops being performed by the US <a href="https://www.theregister.com/2022/08/25/twitter_meta_troll_accounts/">in August</a>, but didn't specify anything about its observations at the time outside of saying they originated within the country.</p><p>Now, however, the social media giant is getting more specific. "Although the people behind this operation attempted to conceal their identities and coordination, our investigation found links to individuals associated with the US military," Meta said in <a href="https://about.fb.com/wp-content/uploads/2022/11/Quarterly-Adversarial-Threat-Report-Q2-2022-1.pdf">the report</a> [PDF].</p><p> </p><p><a href="https://www.bbc.co.uk/news/uk-63736573">Police text 70,000 victims in UK's biggest anti-fraud operation</a></p><p>Detectives have begun contacting 70,000 people suspected of being victims of a sophisticated banking scam.</p><p>The Metropolitan Police is sending text messages to mobile phone users it believes spoke with fraudsters pretending to be their bank.</p><p>Met Commissioner Sir Mark Rowley described an "enormous endeavour" in gathering evidence after the discovery of an online fraud network.</p><p>There have been more than 100 arrests so far, and one man has been charged.</p><p>People who receive a text message in the next 24 hours will be directed to the Action Fraud website to register their details as officers build cases against suspects.</p><p>The scam involved fraudsters calling people at random, pretending to be a bank and warning of suspicious activity on their account.</p><p>They would pose as employees of banks including Barclays, Santander, HSBC, Lloyds, Halifax, First Direct, NatWest, Nationwide and TSB.</p><p>The fraudsters would then encourage people to disclose security information and, through technology, they may have accessed features such as one-time passcodes to clear accounts of funds.</p><p>As many as 200,000 people in the UK may have been victims of the scam, police said, with victims losing thousands of pounds, and in one case £3m.</p><p> </p><p><strong>Industry News (32:27)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-threat-actors-red-team/">Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-privacy-defends-enforcement/">UK Privacy Tsar Defends Controversial Enforcement Strategy</a></p><p><a href="https://www.infosecurity-magazine.com/news/meta-removes-pro-us-accounts-from/">Meta Removes Pro-US Accounts in Middle East and Central Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/panaseer-guidance-security-eu/">Panaseer Launches Guidance on Security Controls Ahead of EU's New Legislation</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-ddos-downs-european/">Russian DDoS Briefly Downs European Parliament Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cops-lead-fraud-site-that-made/">UK Cops Lead Action Against Fraud Site that Made £100m+</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-scheme-april-2023/">Cyber Essentials Scheme Set for April 2023 Update</a></p><p><a href="https://www.infosecurity-magazine.com/news/sonder-confirms-data-breach/">Sonder confirms data breach, documents and other PII potentially compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/sharkbot-malware-in-android-file/">SharkBot Malware Found in Android File Manager Apps With Thousands of Downloads</a></p><p> </p><p><strong>Tweet of the Week (40:45)</strong></p><img src="https://lh5.googleusercontent.com/-SLMi_tvoWufBKkcupgwXpSVTCrhleU8FrrS8Kb3kTpK3pQzuKBQGVbA5zGAifdf9sEMavB4WpU646tXBFOzTk3i5R8pGigmjTqFntqOffzvbcEeq2NlOSxYQ8nnNE_G9GWm7g7Cz7rhk1r9aw7C-1gOFkEn3imnH3RT7MRYaLg2qUUG0Bm0JgdYkequ1g" /><p><a href="https://twitter.com/TheCollierJam/status/1595388389972496386">https://twitter.com/TheCollierJam/status/1595388389972496386</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42325797" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a725e9e3-c7ba-4676-8d15-fc6dfff2c101/audio/b17aa7b8-74be-408f-8522-5bd9192609ea/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 130 - The Jingle Free Episode</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9c065d25-e710-447f-948e-c54abdc963dc/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:05</itunes:duration>
      <itunes:summary>This week in InfoSec talks about legendary brands in the industry
 
Rant of the Week exposes more Meta shit-housery 

Billy Big Balls is a story about Uncle Sam doing it wrong
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an industry term you may not be using correctly</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about legendary brands in the industry
 
Rant of the Week exposes more Meta shit-housery 

Billy Big Balls is a story about Uncle Sam doing it wrong
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an industry term you may not be using correctly</itunes:subtitle>
      <itunes:keywords>apt, facebook, mandiant, china, personal information, taxes, meta</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6cf2159a-6ba6-441c-911c-67d0e222cf05</guid>
      <title>Episode 129 - The Difficult 129th Album</title>
      <description><![CDATA[<p><strong>This week in InfoSec (07:14)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th November 2000 <a href="https://thisdayintechhistory.com/11/12/microsoft-declares-tablets-are-the-future/">Microsoft Declares Tablets Are the Future</a></p><p>Bill Gates demonstrates a functional prototype of a Tablet PC. Microsoft claims “the Tablet PC will represent the next major evolution in PC design and functionality.” However, the Tablet PC initiative never really took off and it wasn't until Apple introduced the iPad in 2010 that tablet computing was widely adopted.</p><p>17th November 2018: US President Donald Trump signed a bill into law, approving the creation of the Cybersecurity and Infrastructure Security Agency (CISA). The bill was the CISA Act.</p><p><a href="https://www.zdnet.com/article/trump-signs-bill-that-creates-the-cybersecurity-and-infrastructure-security-agency/">Trump signs bill that creates the Cybersecurity and Infrastructure Security Agency</a></p><p><a href="https://twitter.com/todayininfosec/status/1328528180500717568">https://twitter.com/todayininfosec/status/1328528180500717568</a></p><p> </p><p><strong>Rant of the Week (18:44)</strong></p><p><a href="https://www.theregister.com/2022/11/16/germany_world_cup_apps/">Germany says nein to Qatari World Cup spyware, err, apps</a></p><p>World Cup apps from the Qatari government collect more personal information than they need to, according to Germany's data protection agency, which this week warned football fans to only install the two apps "if it is absolutely necessary." Also: consider using a burner phone.</p><p>The two apps are <a href="https://play.google.com/store/apps/details?id=com.moi.covid19&hl=en_GB&gl=US&pli=1">Ehteraz</a>, a Covid-19 tracker from the Qatari Ministry of Public Health, and <a href="https://play.google.com/store/apps/details?id=com.pl.qatar">Hayya</a> from the government's Supreme Committee for Delivery & Legacy overseeing the Cup locally, which allows ticket holders entry into the stadiums and access to free metro and bus transportation services.</p><p>Norway's data protection agency, meanwhile, this week <a href="https://www.datatilsynet.no/aktuelt/aktuelle-nyheter-2022/rad-til-deg-som-reiser-til-qatar-vm/">said</a> it was "alarmed by the extensive access the apps require" and warned that Qatari authorities likely use the apps to monitors' users location, in addition to snooping through personal data.</p><p>See also: <a href="https://www.theregister.com/2022/11/11/world_cup_security/">World Cup apps pose a data security and privacy nightmare</a></p><p> </p><p><strong>Billy Big Balls of the Week (29:05)</strong></p><p><a href="https://www.theregister.com/2022/11/14/australia_offensive_ops_against_ransomware/">Australia to 'stand up and punch back' against cyber crims</a></p><p>Australia's government has declared the nation is planning to go on the offensive against international cyber crooks following recent high-profile attacks on local health insurer <a href="https://www.theregister.com/2022/11/11/russia_named_medibank_hack_source/">Medibank</a> and telco <a href="https://www.theregister.com/2022/10/11/optus_acma_oaic_dual_probes/">Optus</a>.</p><p>The aggressive posture was expressed in the <a href="https://ministers.ag.gov.au/media-centre/joint-standing-operation-against-cyber-criminal-syndicates-12-11-2022">announcement</a> of a "Joint standing operation" that will see the Australian Federal Police and the Australian Signals Directorate (Australia's GCHQ/NSA analog) run a team with a mission "to investigate, target and disrupt cyber-criminal syndicates with a priority on ransomware threat groups."</p><p>Minister for Home Affairs and Cyber Security Clare O'Neil said the operation will "scour the world, hunt down the criminal syndicates and gangs who are targeting Australia in cyber-attacks, and disrupt their efforts."</p><p>"This is Australia standing up and punching back," she said during an interview on local political talking heads program Insiders. "We are not going to sit back while our citizens are treated like this and allow there to be no consequences for that."</p><p>O'Neill said the operation will "for the first time [be] offensively attacking these people."</p><p> </p><p><strong>Industry News (36:10)</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/google-to-pay-392m-landmark/">Google to Pay $392m in Landmark Privacy Case</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/billbug-targets-government/">Billbug Targets Government Agencies in Multiple Asian Countries</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/euro-authorities-world-cup-fans/">Euro Authorities Warn World Cup Fans Over Qatari Apps</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/firms-reduces-cybersecurity-staff/">Majority of Companies Reduce Cybersecurity Staff Over Holidays</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/chinese-spy-20-years-aviation/">Chinese Spy Gets 20 Years for Aviation Espionage Plot</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/us-iranian-hackers-government/">US: Iranian Hackers Breached Government with Log4Shell</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/half-black-friday-spam-emails-scam/">More Than Half of Black Friday Spam Emails Are Scams</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/amazon-rds-snapshots-leaking-users/">Hundreds of Amazon RDS Snapshots Discovered Leaking Users' Data</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/zeus-botnet-suspected-leader/">Zeus Botnet Suspected Leader Arrested in Geneva</a></p><p> </p><p><strong>Tweet of the Week (43:30)</strong></p><img src="https://lh5.googleusercontent.com/J-RAdSzWW1E6JZb-3gkokfE9OmVmM77XR9Ua6ekpVqXW1nF3FjQwzuvYVaZOScu4YoSfQYMzzQ6VpoH-1FFTBHEauHG6k0K_bfyK5SebykGwWZYXlrajAul0WWQRxA_u3vWiM9QoL0XKuWb6ab456fqxKXcAM17ugoYnwTP6pcJVdOOhYdmFul-d5muxRA" /><p><a href="https://twitter.com/attritionorg/status/1593487371819192321">https://twitter.com/attritionorg/status/1593487371819192321</a></p><img src="https://lh6.googleusercontent.com/GZxg9F721IM9Z0gzgAbh9ITGyoeHpX4m9REr2jYa44qzgEnI-TW06DWWsqRwxj-4JAa1tHSYXB4cRoMO8-8scbMeqDm0D0WFuh3oXi1zdQFDMZmbu4WoE48D1WoxbuE1dJnIetQH1t_19G1jMwPS-Dj_scvmWOFQwv-Iw5sVDVx_rbF1YeJAs3tIVzP6lg" /><p><a href="https://twitter.com/SoVeryBritish/status/1592554974432866306">https://twitter.com/SoVeryBritish/status/1592554974432866306</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Nov 2022 15:50:16 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-129-the-difficult-129th-album-cB5vhcrZ</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (07:14)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th November 2000 <a href="https://thisdayintechhistory.com/11/12/microsoft-declares-tablets-are-the-future/">Microsoft Declares Tablets Are the Future</a></p><p>Bill Gates demonstrates a functional prototype of a Tablet PC. Microsoft claims “the Tablet PC will represent the next major evolution in PC design and functionality.” However, the Tablet PC initiative never really took off and it wasn't until Apple introduced the iPad in 2010 that tablet computing was widely adopted.</p><p>17th November 2018: US President Donald Trump signed a bill into law, approving the creation of the Cybersecurity and Infrastructure Security Agency (CISA). The bill was the CISA Act.</p><p><a href="https://www.zdnet.com/article/trump-signs-bill-that-creates-the-cybersecurity-and-infrastructure-security-agency/">Trump signs bill that creates the Cybersecurity and Infrastructure Security Agency</a></p><p><a href="https://twitter.com/todayininfosec/status/1328528180500717568">https://twitter.com/todayininfosec/status/1328528180500717568</a></p><p> </p><p><strong>Rant of the Week (18:44)</strong></p><p><a href="https://www.theregister.com/2022/11/16/germany_world_cup_apps/">Germany says nein to Qatari World Cup spyware, err, apps</a></p><p>World Cup apps from the Qatari government collect more personal information than they need to, according to Germany's data protection agency, which this week warned football fans to only install the two apps "if it is absolutely necessary." Also: consider using a burner phone.</p><p>The two apps are <a href="https://play.google.com/store/apps/details?id=com.moi.covid19&hl=en_GB&gl=US&pli=1">Ehteraz</a>, a Covid-19 tracker from the Qatari Ministry of Public Health, and <a href="https://play.google.com/store/apps/details?id=com.pl.qatar">Hayya</a> from the government's Supreme Committee for Delivery & Legacy overseeing the Cup locally, which allows ticket holders entry into the stadiums and access to free metro and bus transportation services.</p><p>Norway's data protection agency, meanwhile, this week <a href="https://www.datatilsynet.no/aktuelt/aktuelle-nyheter-2022/rad-til-deg-som-reiser-til-qatar-vm/">said</a> it was "alarmed by the extensive access the apps require" and warned that Qatari authorities likely use the apps to monitors' users location, in addition to snooping through personal data.</p><p>See also: <a href="https://www.theregister.com/2022/11/11/world_cup_security/">World Cup apps pose a data security and privacy nightmare</a></p><p> </p><p><strong>Billy Big Balls of the Week (29:05)</strong></p><p><a href="https://www.theregister.com/2022/11/14/australia_offensive_ops_against_ransomware/">Australia to 'stand up and punch back' against cyber crims</a></p><p>Australia's government has declared the nation is planning to go on the offensive against international cyber crooks following recent high-profile attacks on local health insurer <a href="https://www.theregister.com/2022/11/11/russia_named_medibank_hack_source/">Medibank</a> and telco <a href="https://www.theregister.com/2022/10/11/optus_acma_oaic_dual_probes/">Optus</a>.</p><p>The aggressive posture was expressed in the <a href="https://ministers.ag.gov.au/media-centre/joint-standing-operation-against-cyber-criminal-syndicates-12-11-2022">announcement</a> of a "Joint standing operation" that will see the Australian Federal Police and the Australian Signals Directorate (Australia's GCHQ/NSA analog) run a team with a mission "to investigate, target and disrupt cyber-criminal syndicates with a priority on ransomware threat groups."</p><p>Minister for Home Affairs and Cyber Security Clare O'Neil said the operation will "scour the world, hunt down the criminal syndicates and gangs who are targeting Australia in cyber-attacks, and disrupt their efforts."</p><p>"This is Australia standing up and punching back," she said during an interview on local political talking heads program Insiders. "We are not going to sit back while our citizens are treated like this and allow there to be no consequences for that."</p><p>O'Neill said the operation will "for the first time [be] offensively attacking these people."</p><p> </p><p><strong>Industry News (36:10)</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/google-to-pay-392m-landmark/">Google to Pay $392m in Landmark Privacy Case</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/billbug-targets-government/">Billbug Targets Government Agencies in Multiple Asian Countries</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/euro-authorities-world-cup-fans/">Euro Authorities Warn World Cup Fans Over Qatari Apps</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/firms-reduces-cybersecurity-staff/">Majority of Companies Reduce Cybersecurity Staff Over Holidays</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/chinese-spy-20-years-aviation/">Chinese Spy Gets 20 Years for Aviation Espionage Plot</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/us-iranian-hackers-government/">US: Iranian Hackers Breached Government with Log4Shell</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/half-black-friday-spam-emails-scam/">More Than Half of Black Friday Spam Emails Are Scams</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/amazon-rds-snapshots-leaking-users/">Hundreds of Amazon RDS Snapshots Discovered Leaking Users' Data</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/zeus-botnet-suspected-leader/">Zeus Botnet Suspected Leader Arrested in Geneva</a></p><p> </p><p><strong>Tweet of the Week (43:30)</strong></p><img src="https://lh5.googleusercontent.com/J-RAdSzWW1E6JZb-3gkokfE9OmVmM77XR9Ua6ekpVqXW1nF3FjQwzuvYVaZOScu4YoSfQYMzzQ6VpoH-1FFTBHEauHG6k0K_bfyK5SebykGwWZYXlrajAul0WWQRxA_u3vWiM9QoL0XKuWb6ab456fqxKXcAM17ugoYnwTP6pcJVdOOhYdmFul-d5muxRA" /><p><a href="https://twitter.com/attritionorg/status/1593487371819192321">https://twitter.com/attritionorg/status/1593487371819192321</a></p><img src="https://lh6.googleusercontent.com/GZxg9F721IM9Z0gzgAbh9ITGyoeHpX4m9REr2jYa44qzgEnI-TW06DWWsqRwxj-4JAa1tHSYXB4cRoMO8-8scbMeqDm0D0WFuh3oXi1zdQFDMZmbu4WoE48D1WoxbuE1dJnIetQH1t_19G1jMwPS-Dj_scvmWOFQwv-Iw5sVDVx_rbF1YeJAs3tIVzP6lg" /><p><a href="https://twitter.com/SoVeryBritish/status/1592554974432866306">https://twitter.com/SoVeryBritish/status/1592554974432866306</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46676752" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6fd86ba8-8554-47c4-8de2-31d3643d8052/audio/5331b0bc-e0c9-43f0-b8dd-cc3a7856a893/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 129 - The Difficult 129th Album</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3e9de12f-f1c5-4ace-aa9d-71bbca16d560/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:37</itunes:duration>
      <itunes:summary>This week in InfoSec talks about rebranding
 
Rant of the Week is a look at the shitshow going on at Twitter… Oh… no… it’s a football world cup privacy nightmare! 

Billy Big Balls is a story about Australia fighting back
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a relatable tax scam</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about rebranding
 
Rant of the Week is a look at the shitshow going on at Twitter… Oh… no… it’s a football world cup privacy nightmare! 

Billy Big Balls is a story about Australia fighting back
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a relatable tax scam</itunes:subtitle>
      <itunes:keywords>football, zeus botnet, qatar, medibank, optus australia, kangaroo secret service, bruce, twitter, cisa, ipad, tablet</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>129</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8cec9518-1b33-44d1-9059-ea243879e4b2</guid>
      <title>Episode 128 - The Higher Average IQ Episode</title>
      <description><![CDATA[<p><strong>This week in InfoSec (08:27)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th November 2005: Microsoft AntiSpyware was renamed Windows Defender. </p><p><a href="https://twitter.com/todayininfosec/status/1191478555634323456">https://twitter.com/todayininfosec/status/1191478555634323456</a></p><p>5th November 1993: The Bugtraq mailing list was created by Scott Chasin.</p><p>In 1995 it became the property of SecurityFocus, in 2002 Symantec acquired SecurityFocus, and the last message was posted to the list on February 25th, 2020, with no explanation from Symantec.</p><p><a href="https://en.m.wikipedia.org/wiki/Bugtraq">Bugtraq</a></p><p><a href="https://twitter.com/todayininfosec/status/1324497907245109248">https://twitter.com/todayininfosec/status/1324497907245109248</a>   </p><p> </p><p><strong>Rant of the Week (16:17)</strong></p><p><a href="https://www.theregister.com/2022/11/10/twitter_ciso_quits/">Twitter Chief Information Security Officer flies the coop</a></p><p>Troubled social media giant Twitter has lost the services of its chief information and security officer to cap off another chaotic week following its acquisition by Elon Musk.</p><p>Lea Kissner used their former employer’s platform to <a href="https://twitter.com/LeaKissner/status/1590706305102381058">post</a>: “I've made the hard decision to leave Twitter. I've had the opportunity to work with amazing people and I'm so proud of the privacy, security, and IT teams and the work we've done.”</p><p>They later posted, “I've loved this job and we got *so* much done, but here we are.”</p><p>Chief privacy officer Damien Kieran and chief compliance officer Marianne Fogarty are also said to have exited. And, separately, it's <a href="https://www.ft.com/content/899bb401-1ab0-43aa-8ab1-102111b49568">reported</a> that the world's richest man has told Twitter staff that work-from-home is banned, and that tweeps need to work 40 or more hours a week from the office from now on.</p><p><a href="https://twitter.com/rakyll/status/1590472823759605760">Blue Badge Scams</a></p><p>If you teach your user base, verification means something specific, it will be hard for them to unlearn it. We learned that it's rare for a verified account trying to phish us. Changing the meaning of the check is a security issue.</p><p><a href="https://twitter.com/vxunderground/status/1590645385340813312">Blue Badge impersonations</a></p><p>The new check mark system has resulted in Threat Actors successfully impersonating Twitter and defrauding users out of money</p><p>Although the account is now suspended, it rapidly got 35,000+ retweets and 4,990 likes.</p><p>A simple $8 investment can result in thousands of dollars stolen.</p><p><a href="https://twitter.com/Geoffbowser2/status/1590755641894744065">Self-certifying compliance</a></p><p>The idea of engineers self-certifying compliance with an FTC consent decree jumped out to me as patently absurd. So I found and read the consent decree. This thread discusses how this policy violates that decree and why I believe these people had no option but to resign. </p><p>  </p><p><strong>Billy Big Balls of the Week (27:14)</strong></p><p><a href="https://www.theverge.com/2022/11/10/23450967/apple-airdrop-limited-china-goverment-protests">Apple limits AirDrop in China after its use in protests</a></p><p>Apple has placed time restrictions on AirDrop wireless file-sharing across iPhones in China after the feature was used by protesters to share images opposing the Chinese government, <a href="https://www.bloomberg.com/news/articles/2022-11-10/apple-limits-iphone-file-sharing-tool-used-for-protests-in-china?sref=ExbtjcSG">Bloomberg</a> reports.</p><p>The “Everyone” option in Airdrop is now limited to a ten-minute window for users in China. After the ten minutes have passed, AirDrop’s device-to-device sharing will switch back to “Contacts Only,” making it harder to distribute content to strangers en masse. These new time restrictions have been introduced by Apple just weeks after the service was used to spread <a href="https://www.vice.com/en/article/wxn7nq/anti-xi-jinping-posters-are-spreading-in-china-via-airdrop">posters opposing president Xi Jinping</a>.</p><p>The AirDrop restriction was included in the public release of iOS 16.1.1 on Wednesday, despite nothing about it being mentioned in the release notes. <a href="https://9to5mac.com/2022/11/09/everyone-option-airdrop-10-minutes-china/">9to5Mac readers</a> were quick to discover that the restrictions seem limited to iPhones purchased in China.</p><p> </p><p><strong>Industry News (34:38)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/medibank-refuses-to-pay-ransom/">Medibank Refuses to Pay Ransom After Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-re-cyberinsurance-industry/">Swiss Re: Cyber-Insurance Industry Must Reform</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-enforcement-action-solarwinds/">SEC Announces 'Enforcement Action' For SolarWinds Over 2020 Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/instagram-influencer-11-years/">Instagram Influencer Gets 11 Years for Money Laundering</a></p><p><a href="https://www.infosecurity-magazine.com/news/medibank-confirms-data-stolen-now/">Medibank Confirms Data Stolen in Breach is Now Available Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/couple-get-40-years-for-navy/">Couple Get 40 Years for Navy Espionage Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/malware-redirects-15000-sites/">Malware Redirects 15,000 Sites in Malicious SEO Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-managers-lack-threat/">Majority of Security Managers Lack Threat Intelligence Skills</a></p><p><a href="https://www.infosecurity-magazine.com/news/lenovo-models-affected-by-uefi/">New Lenovo Notebook Models Affected By UEFI Firmware Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (42:54)</strong></p><img src="https://lh6.googleusercontent.com/bf7iIiDwePuAK9pY-ShXBpfbaS8HH9C7rg5wgd7gD9JAgkxlXPaBMVVgTDY24xTz9QZfPSaiJbv4wBItOHnLhXajA8MWyGmDQqUrcdRnELRqVjc8Bg6F-BGsZW0_R3fgS7JRuDq6twtwCS111zRpkJ2mrkH-Ldt6UxEoU2Tc7QZ185dc053jygb6OotroQ" /><p><a href="https://twitter.com/Ox4d5a/status/1590578121526611968">https://twitter.com/Ox4d5a/status/1590578121526611968</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Nov 2022 11:27:47 +0000</pubDate>
      <author>thom@tl2security.com (windows defender, Thom langford, Javvad Malik, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-128-the-higher-average-iq-episode-CtsOfUuF</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (08:27)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>4th November 2005: Microsoft AntiSpyware was renamed Windows Defender. </p><p><a href="https://twitter.com/todayininfosec/status/1191478555634323456">https://twitter.com/todayininfosec/status/1191478555634323456</a></p><p>5th November 1993: The Bugtraq mailing list was created by Scott Chasin.</p><p>In 1995 it became the property of SecurityFocus, in 2002 Symantec acquired SecurityFocus, and the last message was posted to the list on February 25th, 2020, with no explanation from Symantec.</p><p><a href="https://en.m.wikipedia.org/wiki/Bugtraq">Bugtraq</a></p><p><a href="https://twitter.com/todayininfosec/status/1324497907245109248">https://twitter.com/todayininfosec/status/1324497907245109248</a>   </p><p> </p><p><strong>Rant of the Week (16:17)</strong></p><p><a href="https://www.theregister.com/2022/11/10/twitter_ciso_quits/">Twitter Chief Information Security Officer flies the coop</a></p><p>Troubled social media giant Twitter has lost the services of its chief information and security officer to cap off another chaotic week following its acquisition by Elon Musk.</p><p>Lea Kissner used their former employer’s platform to <a href="https://twitter.com/LeaKissner/status/1590706305102381058">post</a>: “I've made the hard decision to leave Twitter. I've had the opportunity to work with amazing people and I'm so proud of the privacy, security, and IT teams and the work we've done.”</p><p>They later posted, “I've loved this job and we got *so* much done, but here we are.”</p><p>Chief privacy officer Damien Kieran and chief compliance officer Marianne Fogarty are also said to have exited. And, separately, it's <a href="https://www.ft.com/content/899bb401-1ab0-43aa-8ab1-102111b49568">reported</a> that the world's richest man has told Twitter staff that work-from-home is banned, and that tweeps need to work 40 or more hours a week from the office from now on.</p><p><a href="https://twitter.com/rakyll/status/1590472823759605760">Blue Badge Scams</a></p><p>If you teach your user base, verification means something specific, it will be hard for them to unlearn it. We learned that it's rare for a verified account trying to phish us. Changing the meaning of the check is a security issue.</p><p><a href="https://twitter.com/vxunderground/status/1590645385340813312">Blue Badge impersonations</a></p><p>The new check mark system has resulted in Threat Actors successfully impersonating Twitter and defrauding users out of money</p><p>Although the account is now suspended, it rapidly got 35,000+ retweets and 4,990 likes.</p><p>A simple $8 investment can result in thousands of dollars stolen.</p><p><a href="https://twitter.com/Geoffbowser2/status/1590755641894744065">Self-certifying compliance</a></p><p>The idea of engineers self-certifying compliance with an FTC consent decree jumped out to me as patently absurd. So I found and read the consent decree. This thread discusses how this policy violates that decree and why I believe these people had no option but to resign. </p><p>  </p><p><strong>Billy Big Balls of the Week (27:14)</strong></p><p><a href="https://www.theverge.com/2022/11/10/23450967/apple-airdrop-limited-china-goverment-protests">Apple limits AirDrop in China after its use in protests</a></p><p>Apple has placed time restrictions on AirDrop wireless file-sharing across iPhones in China after the feature was used by protesters to share images opposing the Chinese government, <a href="https://www.bloomberg.com/news/articles/2022-11-10/apple-limits-iphone-file-sharing-tool-used-for-protests-in-china?sref=ExbtjcSG">Bloomberg</a> reports.</p><p>The “Everyone” option in Airdrop is now limited to a ten-minute window for users in China. After the ten minutes have passed, AirDrop’s device-to-device sharing will switch back to “Contacts Only,” making it harder to distribute content to strangers en masse. These new time restrictions have been introduced by Apple just weeks after the service was used to spread <a href="https://www.vice.com/en/article/wxn7nq/anti-xi-jinping-posters-are-spreading-in-china-via-airdrop">posters opposing president Xi Jinping</a>.</p><p>The AirDrop restriction was included in the public release of iOS 16.1.1 on Wednesday, despite nothing about it being mentioned in the release notes. <a href="https://9to5mac.com/2022/11/09/everyone-option-airdrop-10-minutes-china/">9to5Mac readers</a> were quick to discover that the restrictions seem limited to iPhones purchased in China.</p><p> </p><p><strong>Industry News (34:38)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/medibank-refuses-to-pay-ransom/">Medibank Refuses to Pay Ransom After Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-re-cyberinsurance-industry/">Swiss Re: Cyber-Insurance Industry Must Reform</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-enforcement-action-solarwinds/">SEC Announces 'Enforcement Action' For SolarWinds Over 2020 Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/instagram-influencer-11-years/">Instagram Influencer Gets 11 Years for Money Laundering</a></p><p><a href="https://www.infosecurity-magazine.com/news/medibank-confirms-data-stolen-now/">Medibank Confirms Data Stolen in Breach is Now Available Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/couple-get-40-years-for-navy/">Couple Get 40 Years for Navy Espionage Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/malware-redirects-15000-sites/">Malware Redirects 15,000 Sites in Malicious SEO Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-managers-lack-threat/">Majority of Security Managers Lack Threat Intelligence Skills</a></p><p><a href="https://www.infosecurity-magazine.com/news/lenovo-models-affected-by-uefi/">New Lenovo Notebook Models Affected By UEFI Firmware Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (42:54)</strong></p><img src="https://lh6.googleusercontent.com/bf7iIiDwePuAK9pY-ShXBpfbaS8HH9C7rg5wgd7gD9JAgkxlXPaBMVVgTDY24xTz9QZfPSaiJbv4wBItOHnLhXajA8MWyGmDQqUrcdRnELRqVjc8Bg6F-BGsZW0_R3fgS7JRuDq6twtwCS111zRpkJ2mrkH-Ldt6UxEoU2Tc7QZ185dc053jygb6OotroQ" /><p><a href="https://twitter.com/Ox4d5a/status/1590578121526611968">https://twitter.com/Ox4d5a/status/1590578121526611968</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45820772" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/20354b22-0fb5-4b27-9985-7fcae0be4a67/audio/bb18c614-18e2-4efe-a11f-5f329d4f6575/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 128 - The Higher Average IQ Episode</itunes:title>
      <itunes:author>windows defender, Thom langford, Javvad Malik, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9653307e-4d7f-4765-9be2-0327158a0198/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:43</itunes:duration>
      <itunes:summary>This week in InfoSec talks about rebranding
 
Rant of the Week is a look at the sh*t show going on over at Twitter HQ

Billy Big Balls is something we’re on the fence about
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week will be us trying to verbally explain a visual meme</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about rebranding
 
Rant of the Week is a look at the sh*t show going on over at Twitter HQ

Billy Big Balls is something we’re on the fence about
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week will be us trying to verbally explain a visual meme</itunes:subtitle>
      <itunes:keywords>apple airdropo, elon musk, bugtraq, medibank, twitter</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd409724-6730-4b37-9a82-1f7fd69f3762</guid>
      <title>Episode 127 - HU Lite the alcohol free edition</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><ol><li>3rd November 2000: A Dutch hacker gained access to Microsoft's network by exploiting a vulnerability Microsoft issued a patch for 10 weeks earlier. </li></ol><p><a href="https://www.wired.com/2000/11/the-patch-ms-forgot-to-apply/">The Patch MS Forgot to Apply</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a></p><ol><li>25th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</li></ol><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">Adobe breach THIRTEEN times worse than thought, 38 million users affected</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/11/01/suella_braverman_gmail_breach/">Government by Gmail catches up with UK minister... who is reappointed anyway</a></p><p>The UK's Home Secretary – the minister in charge of policing and internal security – has been forced to apologize for breaching IT security protocols in government.</p><p>Suella Braverman, who had already resigned for the breach, was reinstated in the UK's merry-go-round approach to government. She has written to the chair of Parliament's Home Affairs Select Committee to explain her actions and how she planned to avoid repeating them.</p><p> </p><p><strong>Billy Big Balls of the Week</strong> </p><p><a href="https://www.theverge.com/23424542/hunter-cat-credit-card-skimmer-reader-atm-stolen-cc-number-fraud">The Hunter Cat is a bodyguard for your credit card</a> (not an advert)</p><p>See if this sounds familiar: You are in a weird part of town and get cash from a sketchy ATM. </p><p>The next day, you pay for gas at a pump-side terminal that doesn’t look quite right.</p><p>Against such a common problem, what are your options? For the particularly paranoid, enter <a href="https://electroniccats.com/store/huntercat/">the Hunter Cat</a>.</p><p> </p><p><a href="https://nypost.com/2022/10/28/pranksters-posing-as-laid-off-twitter-employees-trick-media-outlets/">Pranksters posing as laid-off Twitter employees trick media outlets: ‘Rahul Ligma’</a></p><p>A pair of pranksters posing as laid-off Twitter employees tricked multiple media outlets Friday as the public anxiously awaited news on whether Elon Musk had begun axing staffers.</p><p>CNBC’s Deirdre Bosa interviewed two people who identified themselves as Twitter employees and were seen near the company’s San Francisco headquarters carrying cardboard boxes.</p><p>Skepticism immediately emerged on social media. One of the pranksters said his name was “Rahul Ligma” — a reference to a popular internet meme — and held a copy of Michelle Obama’s book “Becoming” aloft while speaking to reporters. The other said his name was “Daniel Johnson.”</p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/russia-suspected-in-truss-phone/">Russia Suspected in Truss Phone Hacking Scandal</a></p><p><a href="https://www.infosecurity-magazine.com/news/openssl-security-advisory/">OpenSSL Security Advisory Downgraded to High Severity</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-verified-status-users/">Twitter Verified Status Users Flooded with Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/mobile-phishing-attacks-government/">Mobile Phishing Attacks on Government Staff Soar</a></p><p><a href="https://www.infosecurity-magazine.com/news/dropbox-breach-130-github/">Dropbox Suffers Breach, 130 GitHub Repositories Compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/android-apps-million-downloads/">Android Apps With a Million Downloads Led Users to Phishing Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/opera1er-steals-millions-banks-and/">Threat Actor "OPERA1ER" Steals Millions from Banks and Telcos</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-security-agency-internet/">UK Security Agency to Scan the Country for Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/bot-warning-retailers-busy/">Bot Warning for Retailers Ahead of Busy Shopping Season</a></p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/sV7Iy86NzAkrXWR3JxCrXUde6NRIShZgNFoRktW8rDPMI8_7mRLTpmjgBbEcvu4ZUqpDorJtJZci3uEKORuUzrmJQv3PAl--iIlVAtb7416MOQQnxFZVMvJQND35cLVRy8I-6lTwtH4_46QWrOi9MPihBiAk596e4EnwdgkbgTYo_TddVfPMxJ9rmHhqyg" alt="Image of rich people haggling over $12" /><p><a href="https://twitter.com/Joelmpetlin/status/1587417968664752129">https://twitter.com/Joelmpetlin/status/1587417968664752129</a></p><p>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Nov 2022 00:05:00 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andy Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-127-hu-lite-the-alcohol-free-edition-t0kht0pU</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><ol><li>3rd November 2000: A Dutch hacker gained access to Microsoft's network by exploiting a vulnerability Microsoft issued a patch for 10 weeks earlier. </li></ol><p><a href="https://www.wired.com/2000/11/the-patch-ms-forgot-to-apply/">The Patch MS Forgot to Apply</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a></p><ol><li>25th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</li></ol><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">Adobe breach THIRTEEN times worse than thought, 38 million users affected</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/11/01/suella_braverman_gmail_breach/">Government by Gmail catches up with UK minister... who is reappointed anyway</a></p><p>The UK's Home Secretary – the minister in charge of policing and internal security – has been forced to apologize for breaching IT security protocols in government.</p><p>Suella Braverman, who had already resigned for the breach, was reinstated in the UK's merry-go-round approach to government. She has written to the chair of Parliament's Home Affairs Select Committee to explain her actions and how she planned to avoid repeating them.</p><p> </p><p><strong>Billy Big Balls of the Week</strong> </p><p><a href="https://www.theverge.com/23424542/hunter-cat-credit-card-skimmer-reader-atm-stolen-cc-number-fraud">The Hunter Cat is a bodyguard for your credit card</a> (not an advert)</p><p>See if this sounds familiar: You are in a weird part of town and get cash from a sketchy ATM. </p><p>The next day, you pay for gas at a pump-side terminal that doesn’t look quite right.</p><p>Against such a common problem, what are your options? For the particularly paranoid, enter <a href="https://electroniccats.com/store/huntercat/">the Hunter Cat</a>.</p><p> </p><p><a href="https://nypost.com/2022/10/28/pranksters-posing-as-laid-off-twitter-employees-trick-media-outlets/">Pranksters posing as laid-off Twitter employees trick media outlets: ‘Rahul Ligma’</a></p><p>A pair of pranksters posing as laid-off Twitter employees tricked multiple media outlets Friday as the public anxiously awaited news on whether Elon Musk had begun axing staffers.</p><p>CNBC’s Deirdre Bosa interviewed two people who identified themselves as Twitter employees and were seen near the company’s San Francisco headquarters carrying cardboard boxes.</p><p>Skepticism immediately emerged on social media. One of the pranksters said his name was “Rahul Ligma” — a reference to a popular internet meme — and held a copy of Michelle Obama’s book “Becoming” aloft while speaking to reporters. The other said his name was “Daniel Johnson.”</p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/russia-suspected-in-truss-phone/">Russia Suspected in Truss Phone Hacking Scandal</a></p><p><a href="https://www.infosecurity-magazine.com/news/openssl-security-advisory/">OpenSSL Security Advisory Downgraded to High Severity</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-verified-status-users/">Twitter Verified Status Users Flooded with Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/mobile-phishing-attacks-government/">Mobile Phishing Attacks on Government Staff Soar</a></p><p><a href="https://www.infosecurity-magazine.com/news/dropbox-breach-130-github/">Dropbox Suffers Breach, 130 GitHub Repositories Compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/android-apps-million-downloads/">Android Apps With a Million Downloads Led Users to Phishing Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/opera1er-steals-millions-banks-and/">Threat Actor "OPERA1ER" Steals Millions from Banks and Telcos</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-security-agency-internet/">UK Security Agency to Scan the Country for Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/bot-warning-retailers-busy/">Bot Warning for Retailers Ahead of Busy Shopping Season</a></p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/sV7Iy86NzAkrXWR3JxCrXUde6NRIShZgNFoRktW8rDPMI8_7mRLTpmjgBbEcvu4ZUqpDorJtJZci3uEKORuUzrmJQv3PAl--iIlVAtb7416MOQQnxFZVMvJQND35cLVRy8I-6lTwtH4_46QWrOi9MPihBiAk596e4EnwdgkbgTYo_TddVfPMxJ9rmHhqyg" alt="Image of rich people haggling over $12" /><p><a href="https://twitter.com/Joelmpetlin/status/1587417968664752129">https://twitter.com/Joelmpetlin/status/1587417968664752129</a></p><p>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="26790819" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/07718f83-8f83-47c6-a257-d383d161b7eb/audio/6afe2f47-33e5-46f6-9798-da9c55384df3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 127 - HU Lite the alcohol free edition</itunes:title>
      <itunes:author>Javvad Malik, Andy Agnes</itunes:author>
      <itunes:duration>00:27:26</itunes:duration>
      <itunes:summary>Tastes the same but you know it&apos;s not right.  With Thom out saving the world, Javvad and Andy didn&apos;t waste the show notes.
This week in InfoSec Reminds us of the importance of eating your own dog food
Rant of the Week is an insight to the UK’s approach to Government by Gmail
Billy Big Balls is warns news agencies to verify their sources
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week is a look at the issues which plague rich people</itunes:summary>
      <itunes:subtitle>Tastes the same but you know it&apos;s not right.  With Thom out saving the world, Javvad and Andy didn&apos;t waste the show notes.
This week in InfoSec Reminds us of the importance of eating your own dog food
Rant of the Week is an insight to the UK’s approach to Government by Gmail
Billy Big Balls is warns news agencies to verify their sources
Industry News brings us the latest and greatest security news stories from around the world
And
Tweet of the Week is a look at the issues which plague rich people</itunes:subtitle>
      <itunes:keywords>rant of the week, industry news, cyber security, security podcast, i have the login for this platform hahaha, billy big balls, twitter pranksters, tweet of the week, information security, we missed you thom, host unknown, podcast that&apos;s better than smashing security, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35408bdd-4c6c-4962-ade0-afee1d12a68d</guid>
      <title>Episode 126 - Don&apos;t Worry Its Organic</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th October 1969: The first message sent over the ARPANET was from Leonard Kleinrock’s UCLA computer, sent by student programmer Charley Kline at 10:30 PM to the second node at Stanford Research Institute’s computer in Menlo Park, California.</p><p>The message was simply "Lo." But not on purpose.</p><p><a href="https://www.pbs.org/newshour/science/internet-got-started-simple-hello#:~:text=Just%20months%20after%20the%20first,%2C%E2%80%9D%20but%20the%20system%20crashed.">How a simple ‘hello’ became the first message sent via the Internet</a></p><p><a href="https://twitter.com/todayininfosec/status/1189318094151409666">https://twitter.com/todayininfosec/status/1189318094151409666</a></p><p>25th October 2001: Microsoft releases the operating system <a href="http://en.wikipedia.org/wiki/Windows_XP">Windows XP</a>, the successor to both Windows 2000 and Windows ME. Designed to unify the Windows NT line and Windows 95 line of operating systems, Windows XP was not replaced by Microsoft until January 2007 with Windows Vista. However, with a nearly six-year run and the public debacle surrounding the release of Windows Vista, Windows XP remained the world’s most popular operating system until August 2012.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.businessinsider.com/tiktok-moderator-paid-10-dollars-day-keep-webcam-all-night-2022-10?r=US&IR=T">An ex-TikTok moderator, who was paid $10 a day and had to scroll through child abuse and gun violence, was required to keep her webcam on all night, report says</a></p><p>A Colombian ex-moderator for TikTok said she was required to keep her webcam on all night, according to a report by <a href="https://www.thebureauinvestigates.com/stories/2022-10-20/behind-tiktoks-boom-a-legion-of-traumatised-10-a-day-content-moderators">The Bureau of Investigative Journalism</a>. </p><p>TBIJ spoke to nine moderators who shared their experience but requested that their identity remained secret for fear they might lose their jobs, or risk future employment prospects. All names have been changed, according to the outlet.</p><p>Carolina, a former TikTok moderator who worked remotely for Teleperformance, a Paris-based company offering moderation services and earned $10 a day, said she had to keep her camera continuously on during her night shift, TBIJ reported. The company also told her that no one should be in view of the camera and was only allowed a drink in a transparent cup on her desk.</p><p>Related: <a href="https://www.bbc.com/news/technology-57088382">https://www.bbc.com/news/technology-57088382</a> Facebook moderator: ‘Every day was a nightmare</p><p> </p><p><a href="https://www.ukcybersecuritycouncil.org.uk/news-insights/uk-cyber-security-council-pilot-set-to-usher-in-first-chartered-cyber-professionals/">PILOT PROGRAMME FOR FIRST CHARTERED CYBER PROFESSIONALS</a></p><p>CIISec and (ISC)² announced as pilot participant partners to assess candidates under the pilot programme.</p><p>The UK Cyber Security Council has announced it is set to usher in the country’s first chartered cyber professionals through a pilot scheme. </p><p>The first two specialisms kickstarting the pilot are Cyber Security Governance and Risk Management and Secure System Architecture and Design. </p><p>The Council has confirmed it will partner with two pilot participant bodies – (ISC)² and The Chartered Institute of Information Security (CIISec) – for the pilot, with the organisations responsible for assessing applications from their membership base, against the Council’s newly established professional standard.  </p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Elon Musk walks into an office with a sink. </p><p><a href="https://www.wired.co.uk/article/apple-passkeys-password-iphone-mac-ios16-ventura">Apple’s Killing the Password. Here’s Everything You Need to Know</a></p><p>For years, we’ve been promised the end of password-based logins. Now the reality of a passwordless future is taking a big leap forward, with the ability to ditch passwords being rolled out for millions of people. When Apple launches iOS 16 on September 12 and macOS Ventura next month, the software will include its password replacement, known as <a href="https://www.wired.com/story/apple-passkeys-password-ios16-ventura/">passkeys</a>, for iPhones, iPads, and Macs.</p><p>Passkeys allow you to log in to apps and websites, or create new accounts, without having to create, memorize, or store a password. This passkey, which is made up of a cryptographic key pair, replaces your traditional password and is synced across iCloud’s Keychain. It has the potential to eliminate passwords and improve your online security, replacing the <a href="https://www.wired.co.uk/article/how-secure-is-my-password-good-strong-password-ideas">insecure passwords and bad habits you probably have now</a>.</p><p>Apple’s rollout of passkeys is one of the largest implementations of password-free technology to date and builds on <a href="https://www.wired.com/story/fido-alliance-ios-android-password-replacement/">years of work by the FIDO Alliance</a>, an industry group made up of tech’s biggest companies. Apple’s passkeys are its version of the standards created by the FIDO Alliance, meaning they will eventually work with Google, Microsoft, Meta, and Amazon’s systems.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dhl-top-spot-most-imitated-in/">DHL Replaces LinkedIn As Most Imitated Brand in Phishing Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-warns-of-immature-biometric/">ICO Warns of "Immature" Biometric Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/see-tickets-discloses-major-card/">See Tickets Discloses Major Card Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cyber-resilience-centre-in/">London's New Cyber Resilience Centre Set to Fight Cybercrime in the Capital</a></p><p><a href="https://www.infosecurity-magazine.com/news/hive-ransomware-leaking-data/">Hive Ransomware Group Leaks Data Stolen in Tata Power Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/all-customer-data-exposed-to/">Medibank Backtracks: All Customer Data Was Exposed to Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-bug-hackers-hijack/">GitHub Bug Exposed Repositories to Hijacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/white-house-chemical-sector/">White House Launches Chemical Sector Security Sprint</a></p><p><a href="https://www.infosecurity-magazine.com/news/linkedin-new-security-features/">LinkedIn Unveils New Security Features to Tackle Fraud</a></p><p> </p><p><a href="https://www.civilservicejobs.service.gov.uk/csr/index.cgi?SID=cGFnZWFjdGlvbj12aWV3dmFjYnlqb2JsaXN0JnNlYXJjaHBhZ2U9MSZvd25lcj01MDcwMDAwJnNlYXJjaHNvcnQ9c2FsaGlnaCZwYWdlY2xhc3M9Sm9icyZvd25lcnR5cGU9ZmFpciZqb2JsaXN0X3ZpZXdfdmFjPTE4MjAwMTAmdXNlcnNlYXJjaGNvbnRleHQ9MTM5OTE1NzgmcmVxc2lnPTE2NjY3NzA0ODUtYTllNzY4NTJkZmRmY2YwMDBiNzAyOTM4M2M2ODNlYTc1YzExMWVjYQ==">National Chief Information Security Officer</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/DWAVGeuIFFoVzOuX-BVtuRyRZC-pIaoUh4im9HJplV-UAX1qSE4rlQGFSSR2C3zKefA0K4TQqpG8l7lmd5NEwofcwb1zCJ0VIzGACv3eY5dbXyKyDJD2F28r7lP1fln_F9SnWbM5ghtSO1mWqnldHAbOzIZ6hSBHyNqMx78utoYGBuGrPd-Vasn6Aw" /><p><a href="https://twitter.com/codesixonline/status/1585629859052605443">https://twitter.com/codesixonline/status/1585629859052605443</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 Oct 2022 18:02:30 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew. Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-126-dont-worry-its-organic-yTDfeaeq</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th October 1969: The first message sent over the ARPANET was from Leonard Kleinrock’s UCLA computer, sent by student programmer Charley Kline at 10:30 PM to the second node at Stanford Research Institute’s computer in Menlo Park, California.</p><p>The message was simply "Lo." But not on purpose.</p><p><a href="https://www.pbs.org/newshour/science/internet-got-started-simple-hello#:~:text=Just%20months%20after%20the%20first,%2C%E2%80%9D%20but%20the%20system%20crashed.">How a simple ‘hello’ became the first message sent via the Internet</a></p><p><a href="https://twitter.com/todayininfosec/status/1189318094151409666">https://twitter.com/todayininfosec/status/1189318094151409666</a></p><p>25th October 2001: Microsoft releases the operating system <a href="http://en.wikipedia.org/wiki/Windows_XP">Windows XP</a>, the successor to both Windows 2000 and Windows ME. Designed to unify the Windows NT line and Windows 95 line of operating systems, Windows XP was not replaced by Microsoft until January 2007 with Windows Vista. However, with a nearly six-year run and the public debacle surrounding the release of Windows Vista, Windows XP remained the world’s most popular operating system until August 2012.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.businessinsider.com/tiktok-moderator-paid-10-dollars-day-keep-webcam-all-night-2022-10?r=US&IR=T">An ex-TikTok moderator, who was paid $10 a day and had to scroll through child abuse and gun violence, was required to keep her webcam on all night, report says</a></p><p>A Colombian ex-moderator for TikTok said she was required to keep her webcam on all night, according to a report by <a href="https://www.thebureauinvestigates.com/stories/2022-10-20/behind-tiktoks-boom-a-legion-of-traumatised-10-a-day-content-moderators">The Bureau of Investigative Journalism</a>. </p><p>TBIJ spoke to nine moderators who shared their experience but requested that their identity remained secret for fear they might lose their jobs, or risk future employment prospects. All names have been changed, according to the outlet.</p><p>Carolina, a former TikTok moderator who worked remotely for Teleperformance, a Paris-based company offering moderation services and earned $10 a day, said she had to keep her camera continuously on during her night shift, TBIJ reported. The company also told her that no one should be in view of the camera and was only allowed a drink in a transparent cup on her desk.</p><p>Related: <a href="https://www.bbc.com/news/technology-57088382">https://www.bbc.com/news/technology-57088382</a> Facebook moderator: ‘Every day was a nightmare</p><p> </p><p><a href="https://www.ukcybersecuritycouncil.org.uk/news-insights/uk-cyber-security-council-pilot-set-to-usher-in-first-chartered-cyber-professionals/">PILOT PROGRAMME FOR FIRST CHARTERED CYBER PROFESSIONALS</a></p><p>CIISec and (ISC)² announced as pilot participant partners to assess candidates under the pilot programme.</p><p>The UK Cyber Security Council has announced it is set to usher in the country’s first chartered cyber professionals through a pilot scheme. </p><p>The first two specialisms kickstarting the pilot are Cyber Security Governance and Risk Management and Secure System Architecture and Design. </p><p>The Council has confirmed it will partner with two pilot participant bodies – (ISC)² and The Chartered Institute of Information Security (CIISec) – for the pilot, with the organisations responsible for assessing applications from their membership base, against the Council’s newly established professional standard.  </p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Elon Musk walks into an office with a sink. </p><p><a href="https://www.wired.co.uk/article/apple-passkeys-password-iphone-mac-ios16-ventura">Apple’s Killing the Password. Here’s Everything You Need to Know</a></p><p>For years, we’ve been promised the end of password-based logins. Now the reality of a passwordless future is taking a big leap forward, with the ability to ditch passwords being rolled out for millions of people. When Apple launches iOS 16 on September 12 and macOS Ventura next month, the software will include its password replacement, known as <a href="https://www.wired.com/story/apple-passkeys-password-ios16-ventura/">passkeys</a>, for iPhones, iPads, and Macs.</p><p>Passkeys allow you to log in to apps and websites, or create new accounts, without having to create, memorize, or store a password. This passkey, which is made up of a cryptographic key pair, replaces your traditional password and is synced across iCloud’s Keychain. It has the potential to eliminate passwords and improve your online security, replacing the <a href="https://www.wired.co.uk/article/how-secure-is-my-password-good-strong-password-ideas">insecure passwords and bad habits you probably have now</a>.</p><p>Apple’s rollout of passkeys is one of the largest implementations of password-free technology to date and builds on <a href="https://www.wired.com/story/fido-alliance-ios-android-password-replacement/">years of work by the FIDO Alliance</a>, an industry group made up of tech’s biggest companies. Apple’s passkeys are its version of the standards created by the FIDO Alliance, meaning they will eventually work with Google, Microsoft, Meta, and Amazon’s systems.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dhl-top-spot-most-imitated-in/">DHL Replaces LinkedIn As Most Imitated Brand in Phishing Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-warns-of-immature-biometric/">ICO Warns of "Immature" Biometric Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/see-tickets-discloses-major-card/">See Tickets Discloses Major Card Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cyber-resilience-centre-in/">London's New Cyber Resilience Centre Set to Fight Cybercrime in the Capital</a></p><p><a href="https://www.infosecurity-magazine.com/news/hive-ransomware-leaking-data/">Hive Ransomware Group Leaks Data Stolen in Tata Power Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/all-customer-data-exposed-to/">Medibank Backtracks: All Customer Data Was Exposed to Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-bug-hackers-hijack/">GitHub Bug Exposed Repositories to Hijacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/white-house-chemical-sector/">White House Launches Chemical Sector Security Sprint</a></p><p><a href="https://www.infosecurity-magazine.com/news/linkedin-new-security-features/">LinkedIn Unveils New Security Features to Tackle Fraud</a></p><p> </p><p><a href="https://www.civilservicejobs.service.gov.uk/csr/index.cgi?SID=cGFnZWFjdGlvbj12aWV3dmFjYnlqb2JsaXN0JnNlYXJjaHBhZ2U9MSZvd25lcj01MDcwMDAwJnNlYXJjaHNvcnQ9c2FsaGlnaCZwYWdlY2xhc3M9Sm9icyZvd25lcnR5cGU9ZmFpciZqb2JsaXN0X3ZpZXdfdmFjPTE4MjAwMTAmdXNlcnNlYXJjaGNvbnRleHQ9MTM5OTE1NzgmcmVxc2lnPTE2NjY3NzA0ODUtYTllNzY4NTJkZmRmY2YwMDBiNzAyOTM4M2M2ODNlYTc1YzExMWVjYQ==">National Chief Information Security Officer</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/DWAVGeuIFFoVzOuX-BVtuRyRZC-pIaoUh4im9HJplV-UAX1qSE4rlQGFSSR2C3zKefA0K4TQqpG8l7lmd5NEwofcwb1zCJ0VIzGACv3eY5dbXyKyDJD2F28r7lP1fln_F9SnWbM5ghtSO1mWqnldHAbOzIZ6hSBHyNqMx78utoYGBuGrPd-Vasn6Aw" /><p><a href="https://twitter.com/codesixonline/status/1585629859052605443">https://twitter.com/codesixonline/status/1585629859052605443</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56853640" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f1846563-fc59-44e9-bab4-3d81ec86256f/audio/0173930e-d0c1-4c64-9d7f-d1ab4a5f529b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 126 - Don&apos;t Worry Its Organic</itunes:title>
      <itunes:author>Javvad Malik, Andrew. Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/035bf676-0d7f-459b-86be-c7636bae5515/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:13</itunes:duration>
      <itunes:summary>This week in InfoSec Reminds us of the world&apos;s most popular operating system
 
Rant of the Week is a story about big corps exploiting workersand hard working security professionals.

Billy Big Balls is the password killer
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a response which is not wrong</itunes:summary>
      <itunes:subtitle>This week in InfoSec Reminds us of the world&apos;s most popular operating system
 
Rant of the Week is a story about big corps exploiting workersand hard working security professionals.

Billy Big Balls is the password killer
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a response which is not wrong</itunes:subtitle>
      <itunes:keywords>passwordless, passwords, linkedin, elon musk, apple, tik tok, cpes</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cab7f3e4-db9d-45e4-bdba-06b75df1def2</guid>
      <title>Episode 125 - Yesterdays Lettuce Tomorrows Leader</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th October 1985: Nintendo releases the Nintendo Entertainment System (NES) in New York and limited other North American markets. An immediate hit, Nintendo released the game nationwide in February 1986. Along with the NES, Nintendo released eighteen games that day, including: <a href="http://en.wikipedia.org/wiki/10-Yard_Fight">10-Yard Fight</a>, <a href="http://en.wikipedia.org/wiki/Baseball_%28Nintendo_game%29">Baseball</a>, <a href="http://en.wikipedia.org/wiki/Clu_Clu_Land">Clu Clu Land</a>, <a href="http://en.wikipedia.org/wiki/Donkey_Kong_Jr._Math">Donkey Kong Jr. Math</a>, <a href="http://en.wikipedia.org/wiki/Duck_Hunt">Duck Hunt</a>, <a href="http://en.wikipedia.org/wiki/Excitebike">Excitebike</a>, <a href="http://en.wikipedia.org/wiki/Golf_%28video_game%29">Golf</a>, <a href="http://en.wikipedia.org/wiki/Gyromite">Gyromite</a>, <a href="http://en.wikipedia.org/wiki/Hogan%27s_Alley_%28arcade_game%29">Hogan’s Alley</a>, <a href="http://en.wikipedia.org/wiki/Ice_Climber">Ice Climber</a>, <a href="http://en.wikipedia.org/wiki/Kung_Fu_%28video_game%29">Kung Fu</a>, <a href="http://en.wikipedia.org/wiki/Mach_Rider">Mach Rider</a>, <a href="http://en.wikipedia.org/wiki/Pinball_%28video_game%29">Pinball</a>, <a href="http://en.wikipedia.org/wiki/Stack-Up">Stack-Up</a>, <a href="http://en.wikipedia.org/wiki/Tennis_%28video_game%29">Tennis</a>, <a href="http://en.wikipedia.org/wiki/Wild_Gunman">Wild Gunman</a>, <a href="http://en.wikipedia.org/wiki/Wrecking_Crew_%28video_game%29">Wrecking Crew</a>, and <a href="http://en.wikipedia.org/wiki/Super_Mario_Bros.">Super Mario Bros</a>.</p><p>14th October 1977: Atari releases their <a href="http://en.wikipedia.org/wiki/Atari_2600">Video Computer System</a> (known as the VCS and later as the Atari 2600). It took two years for the VCS to gain traction, but by 1979 it was the best selling gift of the Christmas season. Once it was established, the Atari VCS took the market by storm, popularized home video gaming, and helped cement the video game movement into mainstream culture. </p><p>18th October 1958: William Higinbotham and Robert Dvorak, Sr. show off a tennis simulator game they called <a href="http://en.wikipedia.org/wiki/Tennis_for_Two">Tennis for Two</a>. Developed on a <a href="http://www.earlycomputers.com/cgi-bin/item-report-main.cgi?20021220">Donner Model 30 analog computer</a> using an oscilloscope, it is the first known electronic game to use a graphical display. Higinbotham and Dvorak developed the game to show off to visitors to the Brookhaven National Laboratory where they worked. The game was only shown off twice, during the laboratory’s annual visitor’s day. While hundreds of visitors lined up to play the game when it was made available, little was known about the game for decades. While somewhat similar in gameplay to the later hit Pong, there is no known direct relationship between the games.</p><p>14th October 1957: British Computer Society is Founded.  October 14 is the anniversary of the British Computer Society (BCS), founded in 1957. </p><p>The BCS is one of the several international societies that have an affiliate membership relationship with the IEEE Computer Society. Since 1984 BCS has operated under a Royal Charter which requires it to: "...promote the study and practice of Computing and to advance knowledge therein for the benefit of the public."</p><p>Rant of the Week</p><p> </p><p><a href="https://www.theverge.com/23379133/twitter-instagram-verified-account-for-sale-scam-criminal">The Black Market for Blue Checks</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theverge.com/2022/10/18/23410512/meta-the-wire-facebook-xcheck-india-messy-fight">Inside the messy fight between Meta and The Wire</a></p><p>Earlier this year, a new source reached out to journalists at the nonprofit Indian news site The Wire with a tantalizing offer. The source worked at Meta, they told the publication, and wished to share information about the company’s internal workings with reporters.</p><p>The Wire met with the source, who sought to verify their identity by providing Sen with documents including their work badge and pay slips. Many conversations followed, reporter Jahnavi Sen told Platformer in an interview, and by the fall The Wire trusted the source enough to turn to them while investigating a potential story: the suspicious removal of seven Instagram posts satirizing an official in India’s right-wing government.</p><p>Meta issued a strong denial to the resulting story, which claimed that the company had given a high-ranking official in the ruling Bharatiya Janata Party the ability to remove Instagram posts at will. What followed has been one of the strangest tech journalism stories in recent memory: The Wire gradually releasing more information about its sources and methods in reporting the story, and Meta leveling unheard-of accusations — supported with evidence — that the documents underpinning the publication’s stories appear to be fabricated.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackney-council-ransomware-attack/">Hackney Council Ransomware Attack Cost £12m+</a>   <a href="https://drive.google.com/file/d/1g30UrPyEP5YK6HuUtApXHe2MNyseOcM5/view">https://drive.google.com/file/d/1g30UrPyEP5YK6HuUtApXHe2MNyseOcM5/view</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-bust-regions/">Spanish Police Bust Region's "Biggest Narco Bank"</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-customers-receive-smishing/">Amazon Customers Receive Smishing Warning After Receiving Fake Texts</a></p><p><a href="https://www.infosecurity-magazine.com/news/breaches-expose-millions-at-aussie/">Wine Merchant Among Aussie Firms Breached, Exposing Millions</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-catch-suspected/">European Police Catch Suspected Car Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/digital-natives-undermining/">Digital Natives Are Undermining Corporate Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/moola-market-crypto-exploit/">Moola Market Reveals $9m Crypto Exploit</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-6-takeaways-war-ukraine/">NSA Cybersecurity Director's Six Takeaways From the War in Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-misconfiguration-exposes/">Microsoft Misconfiguration Exposes Customer Data</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/5bQtxIXCBUMzWyc0lIActs2JJCVtFwuYk8takO8TA5BLKJBiBT4px044FiRpA071VkXDGeIRJ4ll4-hZdEKoUqfID27BVyhNSMii9hkzxJzBZ4hRlMUqncU8MKFUf0Sq8Qm3ylZC9QeiK3edLEHY-W7rsVahZi2OceN7GggXnDvAgIbETMhzQdDBgA" /><p><a href="https://twitter.com/chetdorn/status/1582457548484931587">https://twitter.com/chetdorn/status/1582457548484931587§</a></p><p> </p><p>Thom's holiday snaps</p><p>https://adobe.ly/3EQoxTs</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 21 Oct 2022 16:31:45 +0000</pubDate>
      <author>thom@tl2security.com (Chet Dorn, Andrew Agnês, Javvad malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-125-yesterdays-lettuce-tomorrows-leader-Xp2KA06l</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th October 1985: Nintendo releases the Nintendo Entertainment System (NES) in New York and limited other North American markets. An immediate hit, Nintendo released the game nationwide in February 1986. Along with the NES, Nintendo released eighteen games that day, including: <a href="http://en.wikipedia.org/wiki/10-Yard_Fight">10-Yard Fight</a>, <a href="http://en.wikipedia.org/wiki/Baseball_%28Nintendo_game%29">Baseball</a>, <a href="http://en.wikipedia.org/wiki/Clu_Clu_Land">Clu Clu Land</a>, <a href="http://en.wikipedia.org/wiki/Donkey_Kong_Jr._Math">Donkey Kong Jr. Math</a>, <a href="http://en.wikipedia.org/wiki/Duck_Hunt">Duck Hunt</a>, <a href="http://en.wikipedia.org/wiki/Excitebike">Excitebike</a>, <a href="http://en.wikipedia.org/wiki/Golf_%28video_game%29">Golf</a>, <a href="http://en.wikipedia.org/wiki/Gyromite">Gyromite</a>, <a href="http://en.wikipedia.org/wiki/Hogan%27s_Alley_%28arcade_game%29">Hogan’s Alley</a>, <a href="http://en.wikipedia.org/wiki/Ice_Climber">Ice Climber</a>, <a href="http://en.wikipedia.org/wiki/Kung_Fu_%28video_game%29">Kung Fu</a>, <a href="http://en.wikipedia.org/wiki/Mach_Rider">Mach Rider</a>, <a href="http://en.wikipedia.org/wiki/Pinball_%28video_game%29">Pinball</a>, <a href="http://en.wikipedia.org/wiki/Stack-Up">Stack-Up</a>, <a href="http://en.wikipedia.org/wiki/Tennis_%28video_game%29">Tennis</a>, <a href="http://en.wikipedia.org/wiki/Wild_Gunman">Wild Gunman</a>, <a href="http://en.wikipedia.org/wiki/Wrecking_Crew_%28video_game%29">Wrecking Crew</a>, and <a href="http://en.wikipedia.org/wiki/Super_Mario_Bros.">Super Mario Bros</a>.</p><p>14th October 1977: Atari releases their <a href="http://en.wikipedia.org/wiki/Atari_2600">Video Computer System</a> (known as the VCS and later as the Atari 2600). It took two years for the VCS to gain traction, but by 1979 it was the best selling gift of the Christmas season. Once it was established, the Atari VCS took the market by storm, popularized home video gaming, and helped cement the video game movement into mainstream culture. </p><p>18th October 1958: William Higinbotham and Robert Dvorak, Sr. show off a tennis simulator game they called <a href="http://en.wikipedia.org/wiki/Tennis_for_Two">Tennis for Two</a>. Developed on a <a href="http://www.earlycomputers.com/cgi-bin/item-report-main.cgi?20021220">Donner Model 30 analog computer</a> using an oscilloscope, it is the first known electronic game to use a graphical display. Higinbotham and Dvorak developed the game to show off to visitors to the Brookhaven National Laboratory where they worked. The game was only shown off twice, during the laboratory’s annual visitor’s day. While hundreds of visitors lined up to play the game when it was made available, little was known about the game for decades. While somewhat similar in gameplay to the later hit Pong, there is no known direct relationship between the games.</p><p>14th October 1957: British Computer Society is Founded.  October 14 is the anniversary of the British Computer Society (BCS), founded in 1957. </p><p>The BCS is one of the several international societies that have an affiliate membership relationship with the IEEE Computer Society. Since 1984 BCS has operated under a Royal Charter which requires it to: "...promote the study and practice of Computing and to advance knowledge therein for the benefit of the public."</p><p>Rant of the Week</p><p> </p><p><a href="https://www.theverge.com/23379133/twitter-instagram-verified-account-for-sale-scam-criminal">The Black Market for Blue Checks</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theverge.com/2022/10/18/23410512/meta-the-wire-facebook-xcheck-india-messy-fight">Inside the messy fight between Meta and The Wire</a></p><p>Earlier this year, a new source reached out to journalists at the nonprofit Indian news site The Wire with a tantalizing offer. The source worked at Meta, they told the publication, and wished to share information about the company’s internal workings with reporters.</p><p>The Wire met with the source, who sought to verify their identity by providing Sen with documents including their work badge and pay slips. Many conversations followed, reporter Jahnavi Sen told Platformer in an interview, and by the fall The Wire trusted the source enough to turn to them while investigating a potential story: the suspicious removal of seven Instagram posts satirizing an official in India’s right-wing government.</p><p>Meta issued a strong denial to the resulting story, which claimed that the company had given a high-ranking official in the ruling Bharatiya Janata Party the ability to remove Instagram posts at will. What followed has been one of the strangest tech journalism stories in recent memory: The Wire gradually releasing more information about its sources and methods in reporting the story, and Meta leveling unheard-of accusations — supported with evidence — that the documents underpinning the publication’s stories appear to be fabricated.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackney-council-ransomware-attack/">Hackney Council Ransomware Attack Cost £12m+</a>   <a href="https://drive.google.com/file/d/1g30UrPyEP5YK6HuUtApXHe2MNyseOcM5/view">https://drive.google.com/file/d/1g30UrPyEP5YK6HuUtApXHe2MNyseOcM5/view</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-bust-regions/">Spanish Police Bust Region's "Biggest Narco Bank"</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-customers-receive-smishing/">Amazon Customers Receive Smishing Warning After Receiving Fake Texts</a></p><p><a href="https://www.infosecurity-magazine.com/news/breaches-expose-millions-at-aussie/">Wine Merchant Among Aussie Firms Breached, Exposing Millions</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-catch-suspected/">European Police Catch Suspected Car Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/digital-natives-undermining/">Digital Natives Are Undermining Corporate Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/moola-market-crypto-exploit/">Moola Market Reveals $9m Crypto Exploit</a></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-6-takeaways-war-ukraine/">NSA Cybersecurity Director's Six Takeaways From the War in Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-misconfiguration-exposes/">Microsoft Misconfiguration Exposes Customer Data</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/5bQtxIXCBUMzWyc0lIActs2JJCVtFwuYk8takO8TA5BLKJBiBT4px044FiRpA071VkXDGeIRJ4ll4-hZdEKoUqfID27BVyhNSMii9hkzxJzBZ4hRlMUqncU8MKFUf0Sq8Qm3ylZC9QeiK3edLEHY-W7rsVahZi2OceN7GggXnDvAgIbETMhzQdDBgA" /><p><a href="https://twitter.com/chetdorn/status/1582457548484931587">https://twitter.com/chetdorn/status/1582457548484931587§</a></p><p> </p><p>Thom's holiday snaps</p><p>https://adobe.ly/3EQoxTs</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46153885" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/764f484a-9d9a-4d8e-9e7e-5631cfcc12a2/audio/fe311054-a5ad-4875-8c3f-702da2e4958d/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 125 - Yesterdays Lettuce Tomorrows Leader</itunes:title>
      <itunes:author>Chet Dorn, Andrew Agnês, Javvad malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/1c3cb5e2-c826-45c3-8247-01deab3c2bb6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:04</itunes:duration>
      <itunes:summary>This week in InfoSec asks how old do you think the first computer game
 
Rant of the Week is a password crackdown for financial reasons

Billy Big Balls is a plot for True Lies two
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a novel way to identify the serious cold callers</itunes:summary>
      <itunes:subtitle>This week in InfoSec asks how old do you think the first computer game
 
Rant of the Week is a password crackdown for financial reasons

Billy Big Balls is a plot for True Lies two
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a novel way to identify the serious cold callers</itunes:subtitle>
      <itunes:keywords>bcs, blue tick, tennis for two, opentable, meta bj partry, snes, nintendo, digital natives</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9f3b22b4-3443-495f-a4d9-49157a2e820e</guid>
      <title>Episode 124 - Andy... Andy...? ANDY...!</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>October 12 1988  (a mere 34 years ago) </p><p>Hailed by Steve Jobs as a computer “five years ahead of its time”, NeXT, Inc. introduces their NeXT Computer. Due to its cube-shaped case, the computer was often referred to as “The Cube” or “The NeXT Cube”, which led to the subsequent model offically being named “NeXTcube“. The new computer introduced several innovations to personal computers, such as including an optical storage disk drive, a built-in digital signal processor for voice recognition, and an object-oriented development environment that was truly years ahead of its time.</p><p>While not a commercial success, the NeXT Computer and the technology developed for it have a long and storied history. Tim Berners-Lee developed the first world wide web server and web browser on a NeXT computer, crediting the NeXT development tools for allowing him to rapidly develop the now ubiquitous Internet system. After Apple purchased NeXT in 1997, they used the operating system of the NeXT computers to form the base of Mac OS X. Eventually Apple’s iOS, which runs the iPhone and iPad, was itself based upon Mac OS X and hence draws its lineage to NeXT. Finally, the object-oriented development environment that Berners-Lee used to create the World Wide Web is the forerunner of the development environment that today’s programmers use to develop iPhone and iPad Apps. If it wasn’t for the NeXT Computer back in 1988, Thom may not have his iPhone pro max 14 today.</p><p> </p><p><strong>RANT of the Week</strong></p><p><a href="https://www.infosecurity-magazine.com/news/claroty-found-cryptographic-keys/">https://www.infosecurity-magazine.com/news/claroty-found-cryptographic-keys/</a></p><p>Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE </p><p>Team82, the research arm of New York-based industrial cybersecurity firm Claroty, revealed on October 11, 2022, that they managed to extract heavily guarded, hardcoded cryptographic keys embedded within SIMATIC S7-1200/1500s, a range of Siemens programmable logic computers (PLCs), and TIA Portal, Siemens’ automated engineering software platform.</p><p>They deployed a new remote code execution (RCE) technique targeting the central processing units (CPUs) of SIMATIC S7-1200 and S7-1500 PLCs, for which they used a vulnerability uncovered in previous research on Siemens PLCs (CVE-2020-15782) that enabled them to bypass native memory protections on the PLC and gain read/write privileges.</p><p>They were able not only to extract the internal, heavily guarded private key used across the Siemens product lines but also to implement the full protocol stack, encrypt and decrypt protected communications and configurations.</p><p>“An attacker can use these keys to perform multiple advanced attacks against Siemens SIMATIC devices and the related TIA Portal, while bypassing all four of its access-level protections. [They] could [also] use this secret information to compromise the entire SIMATIC S7-1200/1500 product line in an irreparable way,” Team82 warned in the research paper.</p><p>CVE-2022-38465 has been assigned to the new vulnerability found by Team82, and given a CVSS v3 score of 9.3.</p><p>Team82 disclosed all technical information to Siemens, which released new versions of the affected PLCs and engineering workstation that address this vulnerability, urging users to move to current versions.</p><p>In its advisory, Siemens also provided a series of key protection updates, workarounds and mitigations.</p><p>This disclosure has led to the introduction of a new TLS management system in TIA Portal v17, ensuring that configuration data and communications between Siemens PLCs and engineering workstations is encrypted and confidential.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/police-arrest-teen-for-using-leaked-optus-data-to-extort-victims/">https://www.bleepingcomputer.com/news/security/police-arrest-teen-for-using-leaked-optus-data-to-extort-victims/</a></p><p>Police arrest teen for using leaked Optus data to extort victims</p><p>The Australian Federal Police (AFP) have arrested a 19-year old in Sydney for allegedly using leaked Optus customer data for extortion.</p><p>More specifically, the suspect used 10,200 records leaked last month by the Optus hackers and contacted victims over SMS to threaten that their data would be sold to other hackers unless they paid AUD 2,000 ($1,300) within two days.</p><p>The scammer used a Commonwealth Bank of Australia account to receive the ransom money. The AFP identified the account and obtained from the bank information about the holder.</p><p>According to the AFP, the arrested young man allegedly sent blackmailing messages to 93 individuals whose personal information was exposed Optus data leak. None of them paid the ransom, though.</p><p>The suspect now faces charges for:</p><p>Using a telecommunication network with the intent to commit a serious offense (blackmail), contrary to section 474.14 (2) of the Criminal Code Act 1995 (Cth), punishable by up to 10 years of imprisonment</p><p>Dealing with identification information, contrary to section 192K of the Crime Act 1900 (NSW), punishable by a maximum of 7 years in prison</p><p>The hackers behind the Optus breach have not been identified but AFP's investigation is still underway as part of "Operation Hurricane."</p><p>"The Hurricane investigation is a high priority for the AFP, and we are aggressively pursuing all lines of inquiry to identify those behind this attack," stated Assistant Commissioner Gough.</p><p>Announcing the international operation was apparently enough to discourage the threat actors from continuing their extortion, even leading to them declaring that all data stolen from Optus had been deleted.</p><p>Two days ago, Optus published an update on the results of its ongoing internal investigation, confirming that 9.8 million customers were variably impacted, and 2.1 million of them had their government ID numbers compromised.</p><p>Many of these people will need new IDs issued now. The Australian government is demanding Optus to cover the costs for this process.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.theregister.com/2022/10/07/lloyds_london_security_incident/">Lloyd's of London cuts off network after dodgy activity detected</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-mod-infecting-android/">Malicious WhatsApp Mod Spotted Infecting Android Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-targets-middle-east/">Chinese APT WIP19 Targets IT Service Providers and Telcos</a></p><p><a href="https://www.infosecurity-magazine.com/news/budworm-espionage-group-targets-us/">Budworm Espionage Group Returns, Targets US State Legislature</a></p><p><a href="https://www.infosecurity-magazine.com/news/riskiest-iot-devices/">IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-supply-chain-security/">UK Government Urges Action to Enhance Supply Chain Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/singtel-dialog-suffers-data-breach/">Singtel's Australian IT Firm Dialog Suffers Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/defensive-offensive-russia-ukraine/">#DTX2022: Cyber Needs to Redress the Defensive-Offensive Balance Following Russia-Ukraine </a></p><p><a href="https://uk.news.yahoo.com/lloyds-london-says-no-evidence-160416521.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACCXjMCMVqYE8md6SeSyA9tsFnarqlgVDPuMfQlaJ7e0Q3T5ooFhZRYyC_-BuJFcAfhrZlXC7TigqG4tkNgECkjrQ7ZgH1MM-DnyX2iX1kpsCVxCOnsIV1jBezgXTTgDFF4cY-GUsy3frSldgFgLrGI8cUqd1usESOoCGP2FOtL-">Lloyd's of London says no evidence found of data compromise from cyberattack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/ogb9TckVHgmGztgnDvs7OVip6O15Nx6xYvvKFRgtUfCoaKapQCC6FSvpyHnk2gwEjgvLFjfoexOKnfMkToKRRyHfvfR5YbLuVLT9DXun68qJEmWCBjHi6DlBkUqwBB7xFRjDYlSzbhcA93UOsZklPUXabGHPZRMS6pQ8Tba3m97z23gTvoWj6spkgw" /><p><a href="https://twitter.com/SwiftOnSecurity/status/1579575774784688128">https://twitter.com/SwiftOnSecurity/status/1579575774784688128</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 Oct 2022 14:33:14 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-124-andy-andy-andy-ifENn5aW</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>October 12 1988  (a mere 34 years ago) </p><p>Hailed by Steve Jobs as a computer “five years ahead of its time”, NeXT, Inc. introduces their NeXT Computer. Due to its cube-shaped case, the computer was often referred to as “The Cube” or “The NeXT Cube”, which led to the subsequent model offically being named “NeXTcube“. The new computer introduced several innovations to personal computers, such as including an optical storage disk drive, a built-in digital signal processor for voice recognition, and an object-oriented development environment that was truly years ahead of its time.</p><p>While not a commercial success, the NeXT Computer and the technology developed for it have a long and storied history. Tim Berners-Lee developed the first world wide web server and web browser on a NeXT computer, crediting the NeXT development tools for allowing him to rapidly develop the now ubiquitous Internet system. After Apple purchased NeXT in 1997, they used the operating system of the NeXT computers to form the base of Mac OS X. Eventually Apple’s iOS, which runs the iPhone and iPad, was itself based upon Mac OS X and hence draws its lineage to NeXT. Finally, the object-oriented development environment that Berners-Lee used to create the World Wide Web is the forerunner of the development environment that today’s programmers use to develop iPhone and iPad Apps. If it wasn’t for the NeXT Computer back in 1988, Thom may not have his iPhone pro max 14 today.</p><p> </p><p><strong>RANT of the Week</strong></p><p><a href="https://www.infosecurity-magazine.com/news/claroty-found-cryptographic-keys/">https://www.infosecurity-magazine.com/news/claroty-found-cryptographic-keys/</a></p><p>Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE </p><p>Team82, the research arm of New York-based industrial cybersecurity firm Claroty, revealed on October 11, 2022, that they managed to extract heavily guarded, hardcoded cryptographic keys embedded within SIMATIC S7-1200/1500s, a range of Siemens programmable logic computers (PLCs), and TIA Portal, Siemens’ automated engineering software platform.</p><p>They deployed a new remote code execution (RCE) technique targeting the central processing units (CPUs) of SIMATIC S7-1200 and S7-1500 PLCs, for which they used a vulnerability uncovered in previous research on Siemens PLCs (CVE-2020-15782) that enabled them to bypass native memory protections on the PLC and gain read/write privileges.</p><p>They were able not only to extract the internal, heavily guarded private key used across the Siemens product lines but also to implement the full protocol stack, encrypt and decrypt protected communications and configurations.</p><p>“An attacker can use these keys to perform multiple advanced attacks against Siemens SIMATIC devices and the related TIA Portal, while bypassing all four of its access-level protections. [They] could [also] use this secret information to compromise the entire SIMATIC S7-1200/1500 product line in an irreparable way,” Team82 warned in the research paper.</p><p>CVE-2022-38465 has been assigned to the new vulnerability found by Team82, and given a CVSS v3 score of 9.3.</p><p>Team82 disclosed all technical information to Siemens, which released new versions of the affected PLCs and engineering workstation that address this vulnerability, urging users to move to current versions.</p><p>In its advisory, Siemens also provided a series of key protection updates, workarounds and mitigations.</p><p>This disclosure has led to the introduction of a new TLS management system in TIA Portal v17, ensuring that configuration data and communications between Siemens PLCs and engineering workstations is encrypted and confidential.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/police-arrest-teen-for-using-leaked-optus-data-to-extort-victims/">https://www.bleepingcomputer.com/news/security/police-arrest-teen-for-using-leaked-optus-data-to-extort-victims/</a></p><p>Police arrest teen for using leaked Optus data to extort victims</p><p>The Australian Federal Police (AFP) have arrested a 19-year old in Sydney for allegedly using leaked Optus customer data for extortion.</p><p>More specifically, the suspect used 10,200 records leaked last month by the Optus hackers and contacted victims over SMS to threaten that their data would be sold to other hackers unless they paid AUD 2,000 ($1,300) within two days.</p><p>The scammer used a Commonwealth Bank of Australia account to receive the ransom money. The AFP identified the account and obtained from the bank information about the holder.</p><p>According to the AFP, the arrested young man allegedly sent blackmailing messages to 93 individuals whose personal information was exposed Optus data leak. None of them paid the ransom, though.</p><p>The suspect now faces charges for:</p><p>Using a telecommunication network with the intent to commit a serious offense (blackmail), contrary to section 474.14 (2) of the Criminal Code Act 1995 (Cth), punishable by up to 10 years of imprisonment</p><p>Dealing with identification information, contrary to section 192K of the Crime Act 1900 (NSW), punishable by a maximum of 7 years in prison</p><p>The hackers behind the Optus breach have not been identified but AFP's investigation is still underway as part of "Operation Hurricane."</p><p>"The Hurricane investigation is a high priority for the AFP, and we are aggressively pursuing all lines of inquiry to identify those behind this attack," stated Assistant Commissioner Gough.</p><p>Announcing the international operation was apparently enough to discourage the threat actors from continuing their extortion, even leading to them declaring that all data stolen from Optus had been deleted.</p><p>Two days ago, Optus published an update on the results of its ongoing internal investigation, confirming that 9.8 million customers were variably impacted, and 2.1 million of them had their government ID numbers compromised.</p><p>Many of these people will need new IDs issued now. The Australian government is demanding Optus to cover the costs for this process.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.theregister.com/2022/10/07/lloyds_london_security_incident/">Lloyd's of London cuts off network after dodgy activity detected</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-mod-infecting-android/">Malicious WhatsApp Mod Spotted Infecting Android Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-targets-middle-east/">Chinese APT WIP19 Targets IT Service Providers and Telcos</a></p><p><a href="https://www.infosecurity-magazine.com/news/budworm-espionage-group-targets-us/">Budworm Espionage Group Returns, Targets US State Legislature</a></p><p><a href="https://www.infosecurity-magazine.com/news/riskiest-iot-devices/">IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-supply-chain-security/">UK Government Urges Action to Enhance Supply Chain Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/singtel-dialog-suffers-data-breach/">Singtel's Australian IT Firm Dialog Suffers Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/defensive-offensive-russia-ukraine/">#DTX2022: Cyber Needs to Redress the Defensive-Offensive Balance Following Russia-Ukraine </a></p><p><a href="https://uk.news.yahoo.com/lloyds-london-says-no-evidence-160416521.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACCXjMCMVqYE8md6SeSyA9tsFnarqlgVDPuMfQlaJ7e0Q3T5ooFhZRYyC_-BuJFcAfhrZlXC7TigqG4tkNgECkjrQ7ZgH1MM-DnyX2iX1kpsCVxCOnsIV1jBezgXTTgDFF4cY-GUsy3frSldgFgLrGI8cUqd1usESOoCGP2FOtL-">Lloyd's of London says no evidence found of data compromise from cyberattack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/ogb9TckVHgmGztgnDvs7OVip6O15Nx6xYvvKFRgtUfCoaKapQCC6FSvpyHnk2gwEjgvLFjfoexOKnfMkToKRRyHfvfR5YbLuVLT9DXun68qJEmWCBjHi6DlBkUqwBB7xFRjDYlSzbhcA93UOsZklPUXabGHPZRMS6pQ8Tba3m97z23gTvoWj6spkgw" /><p><a href="https://twitter.com/SwiftOnSecurity/status/1579575774784688128">https://twitter.com/SwiftOnSecurity/status/1579575774784688128</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="35976997" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e7fe0297-6467-4fb0-a449-f7712fad0446/audio/d3c3f1df-83fc-440f-b5f7-9b7db0e59d60/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 124 - Andy... Andy...? ANDY...!</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/72ae1b8b-a910-4df4-b113-e060250e739d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:28</itunes:duration>
      <itunes:summary>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week is a cryptographic surprise

Billy Big Balls is again celebrates young criminals
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week lifts the veil on a career in infosec.</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week is a cryptographic surprise

Billy Big Balls is again celebrates young criminals
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week lifts the veil on a career in infosec.</itunes:subtitle>
      <itunes:keywords>nextcube, ilm, industrial light and magic, optus, the pixar, simens</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c1bdade-9689-436f-bbd7-2108cdeba29b</guid>
      <title>Episode 123 - Incident Adjacent</title>
      <description><![CDATA[<p>From <a href="https://twitter.com/hostunknowntv" target="_blank">@HostUnknownTV</a></p><p><strong>This week in Infosec</strong></p><p>2nd October 1998: BUTTSniffer Beta 0.9 was released by Cult of the Dead Cow. Developed by DilDog.</p><p>The big question is "When can we expect the long-awaited version 1.0 release?" 24 years is kind of a long wait. </p><p><a href="https://twitter.com/todayininfosec/status/1312179619659874305">https://twitter.com/todayininfosec/status/1312179619659874305</a>  </p><ol><li>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</li></ol><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050">https://twitter.com/todayininfosec/status/1312589059559170050</a></p><p> </p><p><strong>Billy Big Ranty Balls Tweet of the Week</strong></p><p><a href="https://www.theregister.com/2022/10/06/uber_cso_sullivan_guilty/">Former Uber CSO convicted for covering up massive 2016 data theft</a></p><p>Joe Sullivan, Uber's former chief security officer, has been found guilty of illegally covering up the theft of Uber drivers and customers' personal information.</p><p>Sullivan, previously a cybercrime prosecutor for the US Department of Justice, was <a href="https://www.theregister.com/2020/08/20/uber_sullivan_concealment_charges/">charged two years ago</a> with obstruction of justice and misprision – concealing a felony from law enforcement. He was convicted on both counts today.</p><p>On November 21, 2017, Uber CEO Dara Khosrowshahi <a href="https://www.theregister.com/2017/11/22/uber_2016_data_breach/">issued a statement</a> acknowledging that in late 2016, miscreants had broken into the app giant's infrastructure and made off with 57 million customer and driver records. Sullivan, along with Craig Clark, legal director of security and law enforcement, were fired as a result.</p><p>Sullivan, according to court documents, learned of the theft in November 2016, about ten days after he had provided testimony to the US Federal Trade Commission about a 2014 cyberattack on Uber. Concerned that another data security breach would harm the company, Sullivan tried to cover up that 2016 heist by trying to pass off a ransom payment, made to the thieves to recover the data, as a bug bounty award.</p><p> </p><p><strong>Industry News</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/kardashian-charged-by-sec-after/">Kardashian Charged by SEC After Crypto Post</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/malicious-tor-browser-spread-via/">Malicious Tor Browser Installers Spread Via Darknet Video on YouTube</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/strengthen-nuclear-cybersecurity/">New Initiative Aims to Strengthen UK's Nuclear Cybersecurity Posture</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/landmark-usuk-data-access/">Landmark US-UK Data Access Agreement Begins</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/ransomware-bypasses-enormous-range/">Ransomware Group Bypasses "Enormous" Range of EDR Tools</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/telstras-third-party-supplier/">Australia's Data Breaches Continue With Telstra's Third-Party Supplier Hacked</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/retailer-easylife-fined-15m-data/">Retailer Easylife Fined £1.5m for Data Protection Breaches</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-healthcare-giant-commonspirit/">US Healthcare Giant CommonSpirit Hit by Possible Ransomware</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/ubers-former-security-chief/">Uber's Former Security Chief Convicted of 2016 Data Breach Cover-Up</a></p><p> </p><p><strong>Tweet of the Week:</strong></p><img src="https://lh3.googleusercontent.com/9Vea6l9_R_RBroDJTYbYGlBcLjucSJUiDbjLBK7tpDD_x4a-Mx1kH5W5rjROOQ4TD8ii2J4CF5RvEbOFeC3Bh_nZfgdvSso0Z40yYmAqUu-EozMvIPDSvgSZ9-1wHmSGOqSsWSsWV191Cdi-EQSOK2FEeNw2GS8KXowfcKxJIwgejafUbynaaEMEkw" /><p><a href="https://twitter.com/HackingDave/status/1578064952400781316">https://twitter.com/HackingDave/status/1578064952400781316</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 7 Oct 2022 13:30:01 +0000</pubDate>
      <author>thom@tl2security.com (Andy Agnes, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/incident-adjacent-8I2ir5ct</link>
      <content:encoded><![CDATA[<p>From <a href="https://twitter.com/hostunknowntv" target="_blank">@HostUnknownTV</a></p><p><strong>This week in Infosec</strong></p><p>2nd October 1998: BUTTSniffer Beta 0.9 was released by Cult of the Dead Cow. Developed by DilDog.</p><p>The big question is "When can we expect the long-awaited version 1.0 release?" 24 years is kind of a long wait. </p><p><a href="https://twitter.com/todayininfosec/status/1312179619659874305">https://twitter.com/todayininfosec/status/1312179619659874305</a>  </p><ol><li>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</li></ol><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050">https://twitter.com/todayininfosec/status/1312589059559170050</a></p><p> </p><p><strong>Billy Big Ranty Balls Tweet of the Week</strong></p><p><a href="https://www.theregister.com/2022/10/06/uber_cso_sullivan_guilty/">Former Uber CSO convicted for covering up massive 2016 data theft</a></p><p>Joe Sullivan, Uber's former chief security officer, has been found guilty of illegally covering up the theft of Uber drivers and customers' personal information.</p><p>Sullivan, previously a cybercrime prosecutor for the US Department of Justice, was <a href="https://www.theregister.com/2020/08/20/uber_sullivan_concealment_charges/">charged two years ago</a> with obstruction of justice and misprision – concealing a felony from law enforcement. He was convicted on both counts today.</p><p>On November 21, 2017, Uber CEO Dara Khosrowshahi <a href="https://www.theregister.com/2017/11/22/uber_2016_data_breach/">issued a statement</a> acknowledging that in late 2016, miscreants had broken into the app giant's infrastructure and made off with 57 million customer and driver records. Sullivan, along with Craig Clark, legal director of security and law enforcement, were fired as a result.</p><p>Sullivan, according to court documents, learned of the theft in November 2016, about ten days after he had provided testimony to the US Federal Trade Commission about a 2014 cyberattack on Uber. Concerned that another data security breach would harm the company, Sullivan tried to cover up that 2016 heist by trying to pass off a ransom payment, made to the thieves to recover the data, as a bug bounty award.</p><p> </p><p><strong>Industry News</strong></p><p>T: <a href="https://www.infosecurity-magazine.com/news/kardashian-charged-by-sec-after/">Kardashian Charged by SEC After Crypto Post</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/malicious-tor-browser-spread-via/">Malicious Tor Browser Installers Spread Via Darknet Video on YouTube</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/strengthen-nuclear-cybersecurity/">New Initiative Aims to Strengthen UK's Nuclear Cybersecurity Posture</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/landmark-usuk-data-access/">Landmark US-UK Data Access Agreement Begins</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/ransomware-bypasses-enormous-range/">Ransomware Group Bypasses "Enormous" Range of EDR Tools</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/telstras-third-party-supplier/">Australia's Data Breaches Continue With Telstra's Third-Party Supplier Hacked</a></p><p>T: <a href="https://www.infosecurity-magazine.com/news/retailer-easylife-fined-15m-data/">Retailer Easylife Fined £1.5m for Data Protection Breaches</a></p><p>A: <a href="https://www.infosecurity-magazine.com/news/us-healthcare-giant-commonspirit/">US Healthcare Giant CommonSpirit Hit by Possible Ransomware</a></p><p>J: <a href="https://www.infosecurity-magazine.com/news/ubers-former-security-chief/">Uber's Former Security Chief Convicted of 2016 Data Breach Cover-Up</a></p><p> </p><p><strong>Tweet of the Week:</strong></p><img src="https://lh3.googleusercontent.com/9Vea6l9_R_RBroDJTYbYGlBcLjucSJUiDbjLBK7tpDD_x4a-Mx1kH5W5rjROOQ4TD8ii2J4CF5RvEbOFeC3Bh_nZfgdvSso0Z40yYmAqUu-EozMvIPDSvgSZ9-1wHmSGOqSsWSsWV191Cdi-EQSOK2FEeNw2GS8KXowfcKxJIwgejafUbynaaEMEkw" /><p><a href="https://twitter.com/HackingDave/status/1578064952400781316">https://twitter.com/HackingDave/status/1578064952400781316</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="35465287" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/386d49ee-a774-4425-bce6-14f23601406f/audio/ee4d38b7-4558-4158-9b83-737b9a778daa/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 123 - Incident Adjacent</itunes:title>
      <itunes:author>Andy Agnes, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1cdee9b9-c5e1-48f0-bc4b-f8b6b36d205c/e561e7e8-7185-4f74-8f8e-e18ad4a8024e/3000x3000/img-8131.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:28</itunes:duration>
      <itunes:summary>With Thom claiming a last minute emergency, Andy and Javvad changed the script on-the-fly (as usual) to talk about the former-Uber CSO being made a scapegoat (or was he?) And other general ramblings on cyber security stories from the week.</itunes:summary>
      <itunes:subtitle>With Thom claiming a last minute emergency, Andy and Javvad changed the script on-the-fly (as usual) to talk about the former-Uber CSO being made a scapegoat (or was he?) And other general ramblings on cyber security stories from the week.</itunes:subtitle>
      <itunes:keywords>cyber security, security podcast, information security, host unknown podcast, host unknown, podcast that&apos;s better than smashing security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b6480f05-1220-4ffb-9c17-896ab4611a33</guid>
      <title>Episode 122 - Dedicated to our friend Javvad</title>
      <description><![CDATA[<p><strong>This week in InfoSec (06:37)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th September, 1998: For some peculiar reason, Google has at times chosen the date of September 27th as their birthday, even though it is more officially <a href="https://thisdayintechhistory.com/09/04/google-files-for-incorporation/">September 4th or 7th</a>. Google has no explanation for celebrating their birthday on different days over the years other than to say:</p><p><a href="http://www.seroundtable.com/archives/006264.html">Google opened its doors in September 1998. The exact date when we celebrate our birthday has moved around over the years, depending on when people feel like having cake.</a></p><p>27th September 1997: Just a little over two weeks after <a href="https://thisdayintechhistory.com/2012/09/16/steve-jobs-named-interim-ceo-of-apple/">naming Steve Jobs interim CEO</a>, Apple launches their “<a href="http://en.wikipedia.org/wiki/Think_Different">Think Different</a>” ad campaign. Designed to reintroduce the Apple brand, the campaign was nearly universally praised by the press, general public, and advertising industry, winning several awards along the way. Looking back in context, Think Different was the symbolic start of Apple’s resurgence from near-collapse in the 1990’s into the most valuable company in the world.</p><p>27th September 1996: Hacker Mitnick Indicted on Charges.  Kevin Mitnick, 33, was indicted on charges resulting from a 2 ½-year hacking spree. Police accused the hacker, who called himself "Condor," of stealing software worth millions of dollars from major computer corporations. The maximum possible sentence for his crimes was 200 years.</p><p> </p><p><strong>Rant of the Week (12:07)</strong></p><p><a href="https://www.theregister.com/2022/09/30/microsoft_north_korea_zinc_threat/">Microsoft warns of North Korean crew posing as LinkedIn recruiters</a></p><p>Microsoft has claimed a North Korean crew poses as LinkedIn recruiters to distribute poisoned versions of open source software packages.</p><p>The state-sponsored group has been around since 2009 and was allegedly behind the <a href="https://www.theregister.com/2014/12/20/north_korea_says_sony_pictures_hack_allegations_are_groundless_slander/">2014 attack on Sony Pictures</a> in retaliation for the controversial Seth Rogen comedy The Interview.</p><p><a href="https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/">Dubbed</a> "ZINC", the threat actors have previously run long-term phishing schemes targeting media, <a href="https://www.theregister.com/2020/06/17/eset_lazarus_group_euro_aerospace_targets/">defence and aerospace,</a> and IT services organizations in the US, UK, India, and Russia.</p><p> </p><p><strong>Billy Big Balls of the Week (20:28)</strong></p><p><a href="https://www.theregister.com/2022/09/28/shadow_it_hedge_funds_wall_street/">Ever suspected bankers could just use WhatsApp comms? $1.8b says you're right</a></p><p>Ever given a colleague a quick Signal call so you can sidestep a monitored workplace app? Well, we'd hope you're not in a highly regulated industry like staff at eleven of the world's most powerful financial firms, who yesterday were fined nearly $2 billion for off-channel comms.</p><p> </p><p><strong>Industry News (26:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-affiliates-adopt-data/">Ransomware Affiliates Adopt Data Destruction</a></p><p><a href="https://www.infosecurity-magazine.com/news/multimillion-dollar-global-credit/">ReasonLabs Unveils Multimillion Dollar Global Credit Card Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/fitbit-mandates-google-login-from/">Fitbit Increases Security Requirements, Mandates Google Login From 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/alleged-optus-hacker-apologizes/">Alleged Optus Hacker Apologizes, Deletes Customers' Exposed Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-reprimands-uk-organizations/">ICO Reprimands UK Organizations for GDPR Failings</a></p><p><a href="https://www.infosecurity-magazine.com/news/fast-company-apple-news-hacked/">Hacker Breaches Fast Company Apple News Account, Sends Racist Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/irs-warns-of-industrial-scale/">IRS Warns of "Industrial Scale" Smishing Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/mobile-cloud-email-top-threat/">Mobile, Cloud and Email Are Top Threat Vectors For 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/leakbase-breach-indias-swachhata/">LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed</a></p><p> </p><p><strong>Tweet of the Week (34:45)</strong></p><img src="https://lh4.googleusercontent.com/HMHzKZFVk2_i4noSsv93HaAkSFYONKGUi7fw_4az3s6ab65d0lieo5zqK-j2IXv6rfta4OYDOL1D97Zczfn7MfaZz84S6GXBAlVNudYXDbALgdAEyy27E2fzjvzgjXxsP0WvBmJ5dXhYOoX_BJs41g3apJgNR5M0NTU3h9iVCO3LPA9F34Dra_fNmQ" /><p><a href="https://twitter.com/inversecos/status/1575606074635214848">https://twitter.com/inversecos/status/1575606074635214848</a>   </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 Sep 2022 09:23:18 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-122-dedicated-to-our-friend-javvad-WBVhUItg</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (06:37)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>27th September, 1998: For some peculiar reason, Google has at times chosen the date of September 27th as their birthday, even though it is more officially <a href="https://thisdayintechhistory.com/09/04/google-files-for-incorporation/">September 4th or 7th</a>. Google has no explanation for celebrating their birthday on different days over the years other than to say:</p><p><a href="http://www.seroundtable.com/archives/006264.html">Google opened its doors in September 1998. The exact date when we celebrate our birthday has moved around over the years, depending on when people feel like having cake.</a></p><p>27th September 1997: Just a little over two weeks after <a href="https://thisdayintechhistory.com/2012/09/16/steve-jobs-named-interim-ceo-of-apple/">naming Steve Jobs interim CEO</a>, Apple launches their “<a href="http://en.wikipedia.org/wiki/Think_Different">Think Different</a>” ad campaign. Designed to reintroduce the Apple brand, the campaign was nearly universally praised by the press, general public, and advertising industry, winning several awards along the way. Looking back in context, Think Different was the symbolic start of Apple’s resurgence from near-collapse in the 1990’s into the most valuable company in the world.</p><p>27th September 1996: Hacker Mitnick Indicted on Charges.  Kevin Mitnick, 33, was indicted on charges resulting from a 2 ½-year hacking spree. Police accused the hacker, who called himself "Condor," of stealing software worth millions of dollars from major computer corporations. The maximum possible sentence for his crimes was 200 years.</p><p> </p><p><strong>Rant of the Week (12:07)</strong></p><p><a href="https://www.theregister.com/2022/09/30/microsoft_north_korea_zinc_threat/">Microsoft warns of North Korean crew posing as LinkedIn recruiters</a></p><p>Microsoft has claimed a North Korean crew poses as LinkedIn recruiters to distribute poisoned versions of open source software packages.</p><p>The state-sponsored group has been around since 2009 and was allegedly behind the <a href="https://www.theregister.com/2014/12/20/north_korea_says_sony_pictures_hack_allegations_are_groundless_slander/">2014 attack on Sony Pictures</a> in retaliation for the controversial Seth Rogen comedy The Interview.</p><p><a href="https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/">Dubbed</a> "ZINC", the threat actors have previously run long-term phishing schemes targeting media, <a href="https://www.theregister.com/2020/06/17/eset_lazarus_group_euro_aerospace_targets/">defence and aerospace,</a> and IT services organizations in the US, UK, India, and Russia.</p><p> </p><p><strong>Billy Big Balls of the Week (20:28)</strong></p><p><a href="https://www.theregister.com/2022/09/28/shadow_it_hedge_funds_wall_street/">Ever suspected bankers could just use WhatsApp comms? $1.8b says you're right</a></p><p>Ever given a colleague a quick Signal call so you can sidestep a monitored workplace app? Well, we'd hope you're not in a highly regulated industry like staff at eleven of the world's most powerful financial firms, who yesterday were fined nearly $2 billion for off-channel comms.</p><p> </p><p><strong>Industry News (26:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-affiliates-adopt-data/">Ransomware Affiliates Adopt Data Destruction</a></p><p><a href="https://www.infosecurity-magazine.com/news/multimillion-dollar-global-credit/">ReasonLabs Unveils Multimillion Dollar Global Credit Card Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/fitbit-mandates-google-login-from/">Fitbit Increases Security Requirements, Mandates Google Login From 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/alleged-optus-hacker-apologizes/">Alleged Optus Hacker Apologizes, Deletes Customers' Exposed Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-reprimands-uk-organizations/">ICO Reprimands UK Organizations for GDPR Failings</a></p><p><a href="https://www.infosecurity-magazine.com/news/fast-company-apple-news-hacked/">Hacker Breaches Fast Company Apple News Account, Sends Racist Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/irs-warns-of-industrial-scale/">IRS Warns of "Industrial Scale" Smishing Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/mobile-cloud-email-top-threat/">Mobile, Cloud and Email Are Top Threat Vectors For 2023</a></p><p><a href="https://www.infosecurity-magazine.com/news/leakbase-breach-indias-swachhata/">LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed</a></p><p> </p><p><strong>Tweet of the Week (34:45)</strong></p><img src="https://lh4.googleusercontent.com/HMHzKZFVk2_i4noSsv93HaAkSFYONKGUi7fw_4az3s6ab65d0lieo5zqK-j2IXv6rfta4OYDOL1D97Zczfn7MfaZz84S6GXBAlVNudYXDbALgdAEyy27E2fzjvzgjXxsP0WvBmJ5dXhYOoX_BJs41g3apJgNR5M0NTU3h9iVCO3LPA9F34Dra_fNmQ" /><p><a href="https://twitter.com/inversecos/status/1575606074635214848">https://twitter.com/inversecos/status/1575606074635214848</a>   </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="36286287" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/572a7e5f-3338-43e9-b34b-6dc118c58c3b/audio/089036e0-03ca-4cb2-9bf2-bb01adaeeb08/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 122 - Dedicated to our friend Javvad</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/84caed27-d30d-454b-8d35-b93cd5770067/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:47</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the 27th September of previous years
 
Rant of the Week talks about LinkedIn recruiters

Billy Big Balls is a story about Bankers
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is another word for OSINT</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the 27th September of previous years
 
Rant of the Week talks about LinkedIn recruiters

Billy Big Balls is a story about Bankers
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is another word for OSINT</itunes:subtitle>
      <itunes:keywords>fitbit, whatsapp, north korea, 27 september, wanker bankers, opsec, zinc, optus, osint</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">346d5866-37e5-4a40-afed-6fec1e7d1464</guid>
      <title>Episode 121 - The Live One</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>9th September 1947: An error in the Mark II computer at Harvard University was due to a moth trapped in a relay. The moth was attached to the log book with notation "first actual case of bug being found."  </p><p><a href="https://twitter.com/todayininfosec/status/1303717480423133186">https://twitter.com/todayininfosec/status/1303717480423133186</a></p><p>11th September 1992: The movie "Sneakers" was released. With a budget of $35 million, it grossed $105 million at the box office. A hacker movie classic! Bishop, Whistler, Cosmo, and Mother!</p><p><a href="https://twitter.com/todayininfosec/status/1304574876922019841">https://twitter.com/todayininfosec/status/1304574876922019841</a></p><p><a href="https://www.imdb.com/title/tt0105435/">Sneakers IMDB</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/09/14/google_and_meta_fined_over/">Google and Meta fined over $70m for privacy violations in Korea</a></p><p>South Korea's Personal Information Protection Commission (PIPC) has issued two large fines for privacy violations: a $50 million penalty for Google and $22 million for Meta.</p><p>The PIPC's beef is that neither Google nor Meta properly obtain consent or inform users on how they collect and use data, particularly with regards to behavioural information used to predict interests for marketing and advertising purposes.</p><p>The data watchdog <a href="https://www.pipc.go.kr/np/cop/bbs/selectBoardArticle.do?bbsId=BS074&mCode=C020010000&nttId=8221">claims</a> Google hides the setting screen to agree or disagree to collection methods and sets the default to "agree" while Meta only asks for agreement when a user creates an account and does so in unclear ways.</p><p>AND / OR</p><p><a href="https://www.inputmag.com/culture/dries-depoorters-ai-surveillance-art-the-follower-instagram-influencers-photos">A surveillance artist shows how Instagram magic is made</a></p><p>When traveller Daniele Brito posed in front of the Temple Bar in Dublin, Ireland in late August, she likely didn’t realize the camera was watching her.</p><p>Yes, there was the one pointed at her, capturing a photograph that would later be shared to Brito’s more than 2,700 followers on Instagram. But there was at least one other one observing her: a surveillance camera stationed on the corner opposite the bar.</p><p><a href="https://driesdepoorter.be/thefollower/">The Follower</a></p><p><a href="https://personofinterest.fandom.com/wiki/The_Machine#:~:text=The%20Machine%20sorts%20through%20all,%E2%80%9CNothing%20to%20Hide%E2%80%9D).">The Machine</a></p><p> </p><p><strong>Billy Big Balls of the Week </strong></p><p><a href="https://www.pinknews.co.uk/2022/09/15/chess-anal-beads-magnus-carlsen-hans-niemann/">Chess player denies using anal beads to cheat in match against world champion: ‘This is not a joke’</a></p><p>A chess underdog who unexpectedly beat a champion player has been accused of using anal beads to cheat his way to victory.</p><p>Yes, we know – you probably never expected to see “chess” and “anal beads” in the same sentence, but here we are.</p><p>The furore kicked off when Norwegian chess champion Magnus Carlsen announced he was withdrawing from the Sinquefield Cup, a lucrative tournament which attracts some of the world’s best chess players.</p><p>Carlsen posted on Twitter to say he was leaving the tournament, but gave no explanation why.</p><p><a href="https://www.reddit.com/r/SubredditDrama/comments/x8dimj/the_hans_niemann_story_cheating_allegations_anal/">The Hans Niemann story from reddit</a></p><p><a href="https://www.standard.co.uk/news/world/hans-niemann-chess-sex-toy-magnus-carlsen-b1025705.html">Chess player Hans Niemann denies using sex toy to help him beat grand champion</a></p><p><a href="https://www.rollingstone.com/culture/culture-news/magnus-carlsen-hans-niemann-chess-cheating-scandal-anal-beads-1234593111/">Vibrating Butt Toys Are Exactly What Chess Needs</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cops-raid-suspected-fraudster/">Cops Raid Suspected Fraudster Penthouses</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-sanctions-iranian-ministry/">US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-steal-steam-logins-bitb/">Hackers Steal Steam Credentials With 'Browser-in-the-Browser' Technique</a></p><p><a href="https://www.infosecurity-magazine.com/news/ios-16-launches-lockdown-mode/">iOS 16 Launches With Lockdown Mode, Spyware Protection, Safety Check</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerabilities-found-airplane/">Vulnerabilities Found in Airplane WiFi Devices, Passengers' Data Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-forum-admins-spotted/">Cybercrime Forum Admins Steal from Site Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-campaigns-exploit-queens/">User Alert as Phishing Campaigns Exploit Queen's Passing</a></p><p><a href="https://www.infosecurity-magazine.com/news/youtube-users-targeted-by-redline/">YouTube Users Targeted By RedLine Self-Spreading Stealer</a></p><p><a href="https://www.infosecurity-magazine.com/news/notepad-plugins-attackers/">Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve Persistence</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/amwtgltTeziHV-mNaVod3_G-JN6dj539F7WA_bUag4mgzmcW3CGVuOfuD9U4EdiVdHJIQmLNftq-bVCf2uwhe9AYOAFM8_ZhF5nPNnIKffYBuB8iiGPGoCbZ_aGSPP1GbvpcVkYE8gezLH4cj5gxjOzGQs-8s3wW2a6UYGTXtiYlqNnKP17xpksNtA" /><p><a href="https://twitter.com/SecurityAura/status/1570232260485386242">https://twitter.com/SecurityAura/status/1570232260485386242</a>  </p><p> </p><p>The Joseph Carson Talk Tweet Thread</p><p>https://twitter.com/J4vv4D/status/1569704538252214274?s=20</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Sep 2022 09:28:42 +0000</pubDate>
      <author>thom@tl2security.com (Andrew. Agnēs, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-121-the-live-one-jklukpgs</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>9th September 1947: An error in the Mark II computer at Harvard University was due to a moth trapped in a relay. The moth was attached to the log book with notation "first actual case of bug being found."  </p><p><a href="https://twitter.com/todayininfosec/status/1303717480423133186">https://twitter.com/todayininfosec/status/1303717480423133186</a></p><p>11th September 1992: The movie "Sneakers" was released. With a budget of $35 million, it grossed $105 million at the box office. A hacker movie classic! Bishop, Whistler, Cosmo, and Mother!</p><p><a href="https://twitter.com/todayininfosec/status/1304574876922019841">https://twitter.com/todayininfosec/status/1304574876922019841</a></p><p><a href="https://www.imdb.com/title/tt0105435/">Sneakers IMDB</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/09/14/google_and_meta_fined_over/">Google and Meta fined over $70m for privacy violations in Korea</a></p><p>South Korea's Personal Information Protection Commission (PIPC) has issued two large fines for privacy violations: a $50 million penalty for Google and $22 million for Meta.</p><p>The PIPC's beef is that neither Google nor Meta properly obtain consent or inform users on how they collect and use data, particularly with regards to behavioural information used to predict interests for marketing and advertising purposes.</p><p>The data watchdog <a href="https://www.pipc.go.kr/np/cop/bbs/selectBoardArticle.do?bbsId=BS074&mCode=C020010000&nttId=8221">claims</a> Google hides the setting screen to agree or disagree to collection methods and sets the default to "agree" while Meta only asks for agreement when a user creates an account and does so in unclear ways.</p><p>AND / OR</p><p><a href="https://www.inputmag.com/culture/dries-depoorters-ai-surveillance-art-the-follower-instagram-influencers-photos">A surveillance artist shows how Instagram magic is made</a></p><p>When traveller Daniele Brito posed in front of the Temple Bar in Dublin, Ireland in late August, she likely didn’t realize the camera was watching her.</p><p>Yes, there was the one pointed at her, capturing a photograph that would later be shared to Brito’s more than 2,700 followers on Instagram. But there was at least one other one observing her: a surveillance camera stationed on the corner opposite the bar.</p><p><a href="https://driesdepoorter.be/thefollower/">The Follower</a></p><p><a href="https://personofinterest.fandom.com/wiki/The_Machine#:~:text=The%20Machine%20sorts%20through%20all,%E2%80%9CNothing%20to%20Hide%E2%80%9D).">The Machine</a></p><p> </p><p><strong>Billy Big Balls of the Week </strong></p><p><a href="https://www.pinknews.co.uk/2022/09/15/chess-anal-beads-magnus-carlsen-hans-niemann/">Chess player denies using anal beads to cheat in match against world champion: ‘This is not a joke’</a></p><p>A chess underdog who unexpectedly beat a champion player has been accused of using anal beads to cheat his way to victory.</p><p>Yes, we know – you probably never expected to see “chess” and “anal beads” in the same sentence, but here we are.</p><p>The furore kicked off when Norwegian chess champion Magnus Carlsen announced he was withdrawing from the Sinquefield Cup, a lucrative tournament which attracts some of the world’s best chess players.</p><p>Carlsen posted on Twitter to say he was leaving the tournament, but gave no explanation why.</p><p><a href="https://www.reddit.com/r/SubredditDrama/comments/x8dimj/the_hans_niemann_story_cheating_allegations_anal/">The Hans Niemann story from reddit</a></p><p><a href="https://www.standard.co.uk/news/world/hans-niemann-chess-sex-toy-magnus-carlsen-b1025705.html">Chess player Hans Niemann denies using sex toy to help him beat grand champion</a></p><p><a href="https://www.rollingstone.com/culture/culture-news/magnus-carlsen-hans-niemann-chess-cheating-scandal-anal-beads-1234593111/">Vibrating Butt Toys Are Exactly What Chess Needs</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cops-raid-suspected-fraudster/">Cops Raid Suspected Fraudster Penthouses</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-sanctions-iranian-ministry/">US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-steal-steam-logins-bitb/">Hackers Steal Steam Credentials With 'Browser-in-the-Browser' Technique</a></p><p><a href="https://www.infosecurity-magazine.com/news/ios-16-launches-lockdown-mode/">iOS 16 Launches With Lockdown Mode, Spyware Protection, Safety Check</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerabilities-found-airplane/">Vulnerabilities Found in Airplane WiFi Devices, Passengers' Data Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-forum-admins-spotted/">Cybercrime Forum Admins Steal from Site Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-campaigns-exploit-queens/">User Alert as Phishing Campaigns Exploit Queen's Passing</a></p><p><a href="https://www.infosecurity-magazine.com/news/youtube-users-targeted-by-redline/">YouTube Users Targeted By RedLine Self-Spreading Stealer</a></p><p><a href="https://www.infosecurity-magazine.com/news/notepad-plugins-attackers/">Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve Persistence</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/amwtgltTeziHV-mNaVod3_G-JN6dj539F7WA_bUag4mgzmcW3CGVuOfuD9U4EdiVdHJIQmLNftq-bVCf2uwhe9AYOAFM8_ZhF5nPNnIKffYBuB8iiGPGoCbZ_aGSPP1GbvpcVkYE8gezLH4cj5gxjOzGQs-8s3wW2a6UYGTXtiYlqNnKP17xpksNtA" /><p><a href="https://twitter.com/SecurityAura/status/1570232260485386242">https://twitter.com/SecurityAura/status/1570232260485386242</a>  </p><p> </p><p>The Joseph Carson Talk Tweet Thread</p><p>https://twitter.com/J4vv4D/status/1569704538252214274?s=20</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="24028845" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7ef415ca-6b74-4c31-a7f4-c11b6f27215b/audio/4d6570f7-2793-49a9-af1a-d78f08d0e931/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 121 - The Live One</itunes:title>
      <itunes:author>Andrew. Agnēs, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a540dd12-8265-4c1f-9eb9-97d7a6ee59d4/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:03</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the first ever report of a computer bug
 
Rant of the Week goes all Machine from Person of Interest

Billy Big Balls is a theoretical story of how to overcome anti-cheating measures when the world is watching you
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a bold strategy Cotton, let’s see if it works out for them</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the first ever report of a computer bug
 
Rant of the Week goes all Machine from Person of Interest

Billy Big Balls is a theoretical story of how to overcome anti-cheating measures when the world is watching you
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a bold strategy Cotton, let’s see if it works out for them</itunes:subtitle>
      <itunes:keywords>pipc, anal beads, jordan, ransomware, korea, apple privacy, grace hopper, sneakers</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21935e57-fd69-42c0-bbd3-f69fb3f0a3dd</guid>
      <title>Episode 120 - The End of an Era</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th September 2011: Luis Mijangos received a 6 year prison sentence. His crimes included sextortion, stealing financial info, and webcam monitoring. </p><p><a href="http://web.archive.org/web/20120527145121/http://www.infosecisland.com/blogview/16308-Californias-Sextortion-Hacker-Sentenced-to-Prison.html">California's "Sextortion" Hacker Sentenced to Prison</a></p><p><a href="https://twitter.com/todayininfosec/status/1302770088471298049">https://twitter.com/todayininfosec/status/1302770088471298049</a></p><p>3rd September 1995: The online auction site, <a href="http://en.wikipedia.org/wiki/EBay">eBay</a>, is launched as “AuctionWeb” by <a href="http://en.wikipedia.org/wiki/Pierre_Omidyar">Pierre Omidyar</a>. The first item sold, a broken laser pointer, wasn’t actually intended to sell, but rather to test the new site, itself started as a hobby. Surprised that the item sold for $14.83, Omidyar contacted the buyer to make sure he knew the laser pointer was broken, to which was replied, “I’m a collector of broken laser pointers.” </p><p>From that first $14.83, Omidyar is now worth billions of dollars.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/09/08/halfords_ico_email_breach_pecr_fine/">Halfords slapped on wrist for breaching email marketing laws</a></p><p>Bike and car accessory retailer Halfords has found itself in the wrong lane with Britain’s data watchdog for sending hundreds of thousands of unsolicited marketing emails to members of the public.</p><p>According to the Information Commissioner’s Office, it fined the business £30,000 for dispatching 498,179 messages to folk that hadn’t provided consent - equating to a £0.06 penalty per each email.</p><p>The decision relates to a direct marketing mailer that Halfords sent electronically on July 28, 2020 concerning a ‘Fix Your Bike’ government voucher scheme. This gave recipients up to £50 toward the cost of repairing a cycle in any approved retailer in the UK.</p><p>Unsurprisingly, Halfords' marketing email urged the individuals to book a free bike assessment and redeem their voucher in store, meaning this was marketing designed to generate income for the company. As such, the advertising of the service meant Halfords couldn’t rely on ‘legitimate interest’ to send the mail, which the ICO said it had done.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/world-europe-62799246">How the ‘man in black’ was exposed by the Russian women he terrorised</a></p><p>A Russian police officer's takeaway food order was the breakthrough clue which helped a group of women, who had been terrorised by him, reveal his true identity. </p><p>The women, mostly aged between 19 and 25, had attended<a href="https://www.bbc.co.uk/news/world-europe-60640204"> a rally in Moscow in March</a> against Russia's invasion of Ukraine. They were quickly rounded up by officers and put in the back of a police van.</p><p>Most of them didn't know each other, but despite the circumstances the atmosphere was upbeat. They even set up a Telegram group chat as they travelled across the city to Brateyevo police station.</p><p>What happened next was far worse than they anticipated.</p><p>Over the next six hours they suffered verbal and physical abuse that, in some cases, amounted to torture - one woman says she was repeatedly starved of oxygen when a plastic bag was put over her head.</p><p>The abuse was carried out by the same unnamed plain-clothes officer - tall, athletic, dressed in a black polo neck. In their group chat, they gave him the nickname the "man in black".</p><p>Two of the women, Marina and Alexandra, secretly recorded audio on their phones. In one, the officer can be heard shouting about his "total impunity".</p><p>But if his aim was to intimidate them into silence, he would fail.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/keybanks-customer-information/">KeyBank's Customer Information Stolen By Hackers Via Third-party Provider</a></p><p><a href="https://www.infosecurity-magazine.com/news/londons-biggest-bus-operator-hit/">London's Biggest Bus Operator Hit by Cyber "Incident"</a></p><p><a href="https://www.infosecurity-magazine.com/news/instagram-fine-dollar400m/">Meta Fined $400m in Ireland For Children's Privacy Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-busts-asian-sextortion/">Interpol Busts Asian Sextortion Syndicate</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-regulator-fines-halfords/">UK Privacy Regulator Fines Halfords for Spam Deluge</a></p><p><a href="https://www.infosecurity-magazine.com/news/holiday-inn-hotels-cyber-attack/">InterContinental Hotels Confirms Cyber-Attack After Two-Day Outage</a></p><p><a href="https://www.infosecurity-magazine.com/news/albania-cut-ties-with-iran-over/">NATO-Member Albania Cut Ties With Iran Over Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-face-credential-stuffing/">The North Face Warns of Major Credential Stuffing Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-iranian-threat-group/">Researchers Reveal New Iranian Threat Group APT42</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/ED8wCDwG_n068IEpxoSKuf6GuePz5vjuvNp5k-od68jXg_RRhgAiUbwJKwMYHr5TuBOQleKb0mpdEL9QlDiCBV-nXdh5z7EuwLmSJ5N9kc8G_CxdN8QdHfdyNJj-m-BcEsD3uL0Si5-kFl_XnKMlfRMuZ4sS1t2NLHGu8EpUXiJmqI45J865_OyBsQ" /><p><a href="https://twitter.com/SwiftOnSecurity/status/1567378788991868928">https://twitter.com/SwiftOnSecurity/status/1567378788991868928</a></p><img src="https://lh6.googleusercontent.com/nOd8Uq_k2d2rtQ7mxzEyFpZL0bMP8gXW1r-XnvPcmvCbKau0lqwFC9y0mX8FLxDG-ICh9zMBmPsGtRLlHfK4gAONnO9jLNzZAh41_TNdOZP6u2iBJvxbc6nrDYVLHdIQylE4tU3eSHWWObQOcr3UL0fQwhabILQYqjEm42BjE90kL-u3CKr-p3W5sg" /><p><a href="https://twitter.com/ememess/status/1567544425869606913">https://twitter.com/ememess/status/1567544425869606913</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Sep 2022 16:35:17 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-120-the-end-of-an-era-qhvoLNjF</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>6th September 2011: Luis Mijangos received a 6 year prison sentence. His crimes included sextortion, stealing financial info, and webcam monitoring. </p><p><a href="http://web.archive.org/web/20120527145121/http://www.infosecisland.com/blogview/16308-Californias-Sextortion-Hacker-Sentenced-to-Prison.html">California's "Sextortion" Hacker Sentenced to Prison</a></p><p><a href="https://twitter.com/todayininfosec/status/1302770088471298049">https://twitter.com/todayininfosec/status/1302770088471298049</a></p><p>3rd September 1995: The online auction site, <a href="http://en.wikipedia.org/wiki/EBay">eBay</a>, is launched as “AuctionWeb” by <a href="http://en.wikipedia.org/wiki/Pierre_Omidyar">Pierre Omidyar</a>. The first item sold, a broken laser pointer, wasn’t actually intended to sell, but rather to test the new site, itself started as a hobby. Surprised that the item sold for $14.83, Omidyar contacted the buyer to make sure he knew the laser pointer was broken, to which was replied, “I’m a collector of broken laser pointers.” </p><p>From that first $14.83, Omidyar is now worth billions of dollars.</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/09/08/halfords_ico_email_breach_pecr_fine/">Halfords slapped on wrist for breaching email marketing laws</a></p><p>Bike and car accessory retailer Halfords has found itself in the wrong lane with Britain’s data watchdog for sending hundreds of thousands of unsolicited marketing emails to members of the public.</p><p>According to the Information Commissioner’s Office, it fined the business £30,000 for dispatching 498,179 messages to folk that hadn’t provided consent - equating to a £0.06 penalty per each email.</p><p>The decision relates to a direct marketing mailer that Halfords sent electronically on July 28, 2020 concerning a ‘Fix Your Bike’ government voucher scheme. This gave recipients up to £50 toward the cost of repairing a cycle in any approved retailer in the UK.</p><p>Unsurprisingly, Halfords' marketing email urged the individuals to book a free bike assessment and redeem their voucher in store, meaning this was marketing designed to generate income for the company. As such, the advertising of the service meant Halfords couldn’t rely on ‘legitimate interest’ to send the mail, which the ICO said it had done.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/world-europe-62799246">How the ‘man in black’ was exposed by the Russian women he terrorised</a></p><p>A Russian police officer's takeaway food order was the breakthrough clue which helped a group of women, who had been terrorised by him, reveal his true identity. </p><p>The women, mostly aged between 19 and 25, had attended<a href="https://www.bbc.co.uk/news/world-europe-60640204"> a rally in Moscow in March</a> against Russia's invasion of Ukraine. They were quickly rounded up by officers and put in the back of a police van.</p><p>Most of them didn't know each other, but despite the circumstances the atmosphere was upbeat. They even set up a Telegram group chat as they travelled across the city to Brateyevo police station.</p><p>What happened next was far worse than they anticipated.</p><p>Over the next six hours they suffered verbal and physical abuse that, in some cases, amounted to torture - one woman says she was repeatedly starved of oxygen when a plastic bag was put over her head.</p><p>The abuse was carried out by the same unnamed plain-clothes officer - tall, athletic, dressed in a black polo neck. In their group chat, they gave him the nickname the "man in black".</p><p>Two of the women, Marina and Alexandra, secretly recorded audio on their phones. In one, the officer can be heard shouting about his "total impunity".</p><p>But if his aim was to intimidate them into silence, he would fail.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/keybanks-customer-information/">KeyBank's Customer Information Stolen By Hackers Via Third-party Provider</a></p><p><a href="https://www.infosecurity-magazine.com/news/londons-biggest-bus-operator-hit/">London's Biggest Bus Operator Hit by Cyber "Incident"</a></p><p><a href="https://www.infosecurity-magazine.com/news/instagram-fine-dollar400m/">Meta Fined $400m in Ireland For Children's Privacy Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-busts-asian-sextortion/">Interpol Busts Asian Sextortion Syndicate</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-regulator-fines-halfords/">UK Privacy Regulator Fines Halfords for Spam Deluge</a></p><p><a href="https://www.infosecurity-magazine.com/news/holiday-inn-hotels-cyber-attack/">InterContinental Hotels Confirms Cyber-Attack After Two-Day Outage</a></p><p><a href="https://www.infosecurity-magazine.com/news/albania-cut-ties-with-iran-over/">NATO-Member Albania Cut Ties With Iran Over Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-face-credential-stuffing/">The North Face Warns of Major Credential Stuffing Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-iranian-threat-group/">Researchers Reveal New Iranian Threat Group APT42</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/ED8wCDwG_n068IEpxoSKuf6GuePz5vjuvNp5k-od68jXg_RRhgAiUbwJKwMYHr5TuBOQleKb0mpdEL9QlDiCBV-nXdh5z7EuwLmSJ5N9kc8G_CxdN8QdHfdyNJj-m-BcEsD3uL0Si5-kFl_XnKMlfRMuZ4sS1t2NLHGu8EpUXiJmqI45J865_OyBsQ" /><p><a href="https://twitter.com/SwiftOnSecurity/status/1567378788991868928">https://twitter.com/SwiftOnSecurity/status/1567378788991868928</a></p><img src="https://lh6.googleusercontent.com/nOd8Uq_k2d2rtQ7mxzEyFpZL0bMP8gXW1r-XnvPcmvCbKau0lqwFC9y0mX8FLxDG-ICh9zMBmPsGtRLlHfK4gAONnO9jLNzZAh41_TNdOZP6u2iBJvxbc6nrDYVLHdIQylE4tU3eSHWWObQOcr3UL0fQwhabILQYqjEm42BjE90kL-u3CKr-p3W5sg" /><p><a href="https://twitter.com/ememess/status/1567544425869606913">https://twitter.com/ememess/status/1567544425869606913</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46510405" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d4b6f44c-71c5-4935-bc40-01f05ab91967/audio/bf13a8b8-e674-42e4-ae75-e1f1bed76c51/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 120 - The End of an Era</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/17bda4e1-18e0-47f2-acf2-d11c8e0d2f56/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:26</itunes:duration>
      <itunes:summary>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week confirms the cost for your next non-GDPR compliant marketing campaign

Billy Big Balls is a story of how the hunter became the hunted
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a talking point on cybersecurity job roles</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week confirms the cost for your next non-GDPR compliant marketing campaign

Billy Big Balls is a story of how the hunter became the hunted
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a talking point on cybersecurity job roles</itunes:subtitle>
      <itunes:keywords>intercontinental, halfords, body dumping, russia, security tool owners, apple, ico, ebay, man in black</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f15f4d5-9fb8-4811-b363-b786e896fdaa</guid>
      <title>Episode 119 - Andy Who?</title>
      <description><![CDATA[<p><strong>This week in InfoSec (09:07)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>30th August 1999: The previously unknown group Hackers Unite claimed responsibility for disclosing a vulnerability in Hotmail that granted access to all of its roughly 50 million users' email accounts.</p><p>13 years later Microsoft rebranded Hotmail, renaming it Outlook.</p><p><a href="https://www.wired.com/1999/08/hotmail-hackers-we-did-it/">Hotmail Hackers: 'We Did It'</a></p><p><a href="https://twitter.com/todayininfosec/status/1300212717656121344">https://twitter.com/todayininfosec/status/1300212717656121344</a></p><p>31st August 2014: A user of the message board 4chan posted leaked photos of actress Jennifer Lawrence and numerous other celebrities.</p><p><a href="https://mashable.com/archive/celebrity-nude-photo-hack">Jennifer Lawrence and Other Celebs Hacked as Nude Photos Circulate on the Web</a></p><p><a href="https://twitter.com/todayininfosec/status/1300537361676283905">https://twitter.com/todayininfosec/status/1300537361676283905</a></p><p> </p><p><strong>Rant of the Week (20:21)</strong></p><p><a href="https://www.theregister.com/2022/09/01/mobile_apps_leaked_biometrics/">Here's how 5 mobile banking apps put 300,000 users' digital fingerprints at risk</a></p><p>Massive amounts of private data – including more than 300,000 biometric digital fingerprints used by five mobile banking apps – have been put at risk of theft due to hard-coded Amazon Web Services credentials, according to security researchers.</p><p>Symantec's Threat Hunter Team said it discovered 1,859 publicly available apps, both Android and iOS, containing baked-in AWS credentials. That means if someone were to look inside the apps, they would have found the credentials in the code, and could potentially have used that to access the apps' backend Amazon-hosted servers and steal users' data. The vast majority (98 percent) were iOS apps.</p><p>In all, 77 percent of these apps contained valid AWS access tokens that allowed access to private AWS cloud services, the intelligence team noted in <a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mobile-supply-chain-aws">research</a> published today.</p><p> </p><p><strong>Billy Big Balls of the Week (28:45)</strong></p><p><a href="https://www.theverge.com/2022/9/1/23332363/twitter-edit-button-blue-subscription">Twitter starts testing an edit button, but you have to pay for it</a></p><p>Twitter is now testing its highly requested Edit Tweet feature. After years of memes and jokes, editable tweets will be available to some Twitter Blue subscribers later this month. The feature is currently undergoing “internal testing” and appears to mimic Facebook in its edit style, with a linked edit history for tweets that we saw in <a href="https://www.theverge.com/2022/5/2/23054193/twitter-edit-button-how-it-works-looks-like">leaks earlier this year</a>.</p><p>“Tweets will be able to be edited a few times in the 30 minutes following their publication,” according to a <a href="https://blog.twitter.com/en_us/topics/product/2022/twitter-new-edit-tweet-feature-only-test">Twitter blog post</a>. “Edited Tweets will appear with an icon, timestamp, and label so it’s clear to readers that the original Tweet has been modified.”</p><p> </p><p><strong>Industry News (36:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cryptominer-google-translate-11/">Cryptominer Disguised as Google Translate Targeted 11 Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/baker-taylors-offline-ransomware/">Baker & Taylor's Systems Remain Offline a Week After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-pursues-traffic-accident-data/">ICO Pursues Traffic Accident Data Thieves</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-new-cybersecurity-rules-telecoms/">UK Imposes Tough New Cybersecurity Rules for Telecom Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/evil-corp-conti-linked-cisco-data/">Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests</a></p><p><a href="https://www.infosecurity-magazine.com/news/golang-malware-image-james-webb/">Golang-based Malware Campaign Relies on James Webb Telescope's Image</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-finds-account-takeover/">Microsoft Finds Account Takeover Bug in TikTok</a></p><p><a href="https://www.infosecurity-magazine.com/news/standards-guidelines-iot-security/">Standards Body Publishes Guidelines for IoT Security Testing</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-updates-ios-12/">Apple Releases Update for iOS 12 to Patch Exploited Vulnerability</a></p><p> </p><p><strong>Tweet of the Week (43:42)</strong></p><img src="https://lh3.googleusercontent.com/dG1nq9zsDykJXuKOj5Hu4TRhf37sQjxQPuzDc5d1g7OUggG-ewdLR5sp3pYjMYQhDOU_BMzbH4DgVH8htsg94AZzvTKlCzwOgsuqvlHGj8MMa3N-e4pruF8w-bHo-qseWn422LDS9GKJGObEc9uHLgw3BQ260bOvwGVI4bmcsjPiuLaPwXKhckklvg" /><p><a href="https://twitter.com/SunTzuCyber/status/1565192484380188672">https://twitter.com/SunTzuCyber/status/1565192484380188672</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 2 Sep 2022 15:28:32 +0000</pubDate>
      <author>thom@tl2security.com (NOT Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-119-andy-who-2l89_jYs</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (09:07)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>30th August 1999: The previously unknown group Hackers Unite claimed responsibility for disclosing a vulnerability in Hotmail that granted access to all of its roughly 50 million users' email accounts.</p><p>13 years later Microsoft rebranded Hotmail, renaming it Outlook.</p><p><a href="https://www.wired.com/1999/08/hotmail-hackers-we-did-it/">Hotmail Hackers: 'We Did It'</a></p><p><a href="https://twitter.com/todayininfosec/status/1300212717656121344">https://twitter.com/todayininfosec/status/1300212717656121344</a></p><p>31st August 2014: A user of the message board 4chan posted leaked photos of actress Jennifer Lawrence and numerous other celebrities.</p><p><a href="https://mashable.com/archive/celebrity-nude-photo-hack">Jennifer Lawrence and Other Celebs Hacked as Nude Photos Circulate on the Web</a></p><p><a href="https://twitter.com/todayininfosec/status/1300537361676283905">https://twitter.com/todayininfosec/status/1300537361676283905</a></p><p> </p><p><strong>Rant of the Week (20:21)</strong></p><p><a href="https://www.theregister.com/2022/09/01/mobile_apps_leaked_biometrics/">Here's how 5 mobile banking apps put 300,000 users' digital fingerprints at risk</a></p><p>Massive amounts of private data – including more than 300,000 biometric digital fingerprints used by five mobile banking apps – have been put at risk of theft due to hard-coded Amazon Web Services credentials, according to security researchers.</p><p>Symantec's Threat Hunter Team said it discovered 1,859 publicly available apps, both Android and iOS, containing baked-in AWS credentials. That means if someone were to look inside the apps, they would have found the credentials in the code, and could potentially have used that to access the apps' backend Amazon-hosted servers and steal users' data. The vast majority (98 percent) were iOS apps.</p><p>In all, 77 percent of these apps contained valid AWS access tokens that allowed access to private AWS cloud services, the intelligence team noted in <a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mobile-supply-chain-aws">research</a> published today.</p><p> </p><p><strong>Billy Big Balls of the Week (28:45)</strong></p><p><a href="https://www.theverge.com/2022/9/1/23332363/twitter-edit-button-blue-subscription">Twitter starts testing an edit button, but you have to pay for it</a></p><p>Twitter is now testing its highly requested Edit Tweet feature. After years of memes and jokes, editable tweets will be available to some Twitter Blue subscribers later this month. The feature is currently undergoing “internal testing” and appears to mimic Facebook in its edit style, with a linked edit history for tweets that we saw in <a href="https://www.theverge.com/2022/5/2/23054193/twitter-edit-button-how-it-works-looks-like">leaks earlier this year</a>.</p><p>“Tweets will be able to be edited a few times in the 30 minutes following their publication,” according to a <a href="https://blog.twitter.com/en_us/topics/product/2022/twitter-new-edit-tweet-feature-only-test">Twitter blog post</a>. “Edited Tweets will appear with an icon, timestamp, and label so it’s clear to readers that the original Tweet has been modified.”</p><p> </p><p><strong>Industry News (36:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cryptominer-google-translate-11/">Cryptominer Disguised as Google Translate Targeted 11 Countries</a></p><p><a href="https://www.infosecurity-magazine.com/news/baker-taylors-offline-ransomware/">Baker & Taylor's Systems Remain Offline a Week After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-pursues-traffic-accident-data/">ICO Pursues Traffic Accident Data Thieves</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-new-cybersecurity-rules-telecoms/">UK Imposes Tough New Cybersecurity Rules for Telecom Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/evil-corp-conti-linked-cisco-data/">Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests</a></p><p><a href="https://www.infosecurity-magazine.com/news/golang-malware-image-james-webb/">Golang-based Malware Campaign Relies on James Webb Telescope's Image</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-finds-account-takeover/">Microsoft Finds Account Takeover Bug in TikTok</a></p><p><a href="https://www.infosecurity-magazine.com/news/standards-guidelines-iot-security/">Standards Body Publishes Guidelines for IoT Security Testing</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-updates-ios-12/">Apple Releases Update for iOS 12 to Patch Exploited Vulnerability</a></p><p> </p><p><strong>Tweet of the Week (43:42)</strong></p><img src="https://lh3.googleusercontent.com/dG1nq9zsDykJXuKOj5Hu4TRhf37sQjxQPuzDc5d1g7OUggG-ewdLR5sp3pYjMYQhDOU_BMzbH4DgVH8htsg94AZzvTKlCzwOgsuqvlHGj8MMa3N-e4pruF8w-bHo-qseWn422LDS9GKJGObEc9uHLgw3BQ260bOvwGVI4bmcsjPiuLaPwXKhckklvg" /><p><a href="https://twitter.com/SunTzuCyber/status/1565192484380188672">https://twitter.com/SunTzuCyber/status/1565192484380188672</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45773125" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/199b7e5a-a8ab-44d9-86fb-97e299765baa/audio/b1b1232c-1292-4645-9a22-8a6734c8beef/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 119 - Andy Who?</itunes:title>
      <itunes:author>NOT Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/63b27ecb-7bab-4ab1-aa83-baba5842809c/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:40</itunes:duration>
      <itunes:summary>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week takes phoning a friend to a new level

Billy Big Balls says you can edit history to your liking
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives us applicable wisdom from Sun Tzu</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us on a trip down Infosec memory lane
 
Rant of the Week takes phoning a friend to a new level

Billy Big Balls says you can edit history to your liking
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives us applicable wisdom from Sun Tzu</itunes:subtitle>
      <itunes:keywords>the fappening, sun tzu, art of cyberwar, twitter edit, aws, digital fingerprints, sdk, jack dorsey</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e4a1bbcb-1ca4-4cae-85b1-57be6a72490e</guid>
      <title>Episode 118 - We should have taken a summer holiday</title>
      <description><![CDATA[<p><strong>This week in InfoSec:</strong> (The one and only):</p><p>23rd August 2006: SpoofCard confirmed that Paris Hilton was among the terminated customers, and that Lindsay Lohan was among those whose voicemail accounts were broken into. SpoofCard said it had implemented controls to prevent recurrences.</p><p><a href="https://www.wired.com/2006/08/paris-hilton-ma/">Paris Hilton: Master Hacker?</a></p><p><a href="https://twitter.com/todayininfosec/status/1297213638059728896">https://twitter.com/todayininfosec/status/1297213638059728896</a></p><p>26th August 2008: It was reported that a laptop on the International Space Station was infected by removable media containing the http://W32.Gammima.AG worm.</p><p>Space. Where you don't want to be dealing with malware.</p><p><a href="https://www.zdnet.com/article/malware-detected-at-the-international-space-station/">Malware detected at the International Space Station</a></p><p><a href="https://twitter.com/todayininfosec/status/1298690676448735232">https://twitter.com/todayininfosec/status/1298690676448735232</a></p><p> </p><p><strong>Rant of the Week:</strong></p><p><a href="https://www.theregister.com/2022/08/24/block_headed_to_court_to/">Block sued after ex-staffer siphons customer data</a></p><p>Block – the digital payments giant formerly known as Square – faces allegations it failed to take adequate measures to protect customers' personal information.</p><p>A lawsuit, filed Tuesday in a federal district in Oakland, California, on behalf of two users of Cash App, operated by Block subsidiary Cash App Investing, claims the company failed to implement reasonable security. As a result, a former employee was able to download internal reports containing personal information after leaving the firm.</p><p>Coincidentally, Twitter – another venture co-founded by Block Head Jack Dorsey – was <a href="https://www.theregister.com/2022/08/23/twitter_security_whisterblower/">accused</a> of subpar security by its former security chief in a recent whistleblower complaint.</p><p>Block disclosed the December 10, 2021 data theft on April 4, 2022, and stated it was contacting 8.2 million current and former customers about the privacy snafu. The biz <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/0001512673/000119312522095215/d343042d8k.htm">said</a>, "a former employee downloaded certain reports of its subsidiary Cash App Investing LLC … that contained some US customer information."</p><p>The employee had access to those reports while employed but in this instance downloaded the files after leaving the company. The data obtained included customers' full name and brokerage account numbers, and in some cases, brokerage portfolio values, brokerage portfolio holdings and/or stock trading activity for one trading day.</p><p>As far as the litigants are concerned, Block didn't meet its security obligations, failed to notify customers in a timely manner, provided too little information about the incident, and failed to offer credit or identity monitoring services.</p><p> </p><p><strong>Billy Big Balls</strong>:</p><p><a href="https://www.theregister.com/2022/08/24/lloyds_cybersecurity_insurance/">Lloyd's to exclude certain nation-state attacks from cyber insurance policies</a></p><p>Lloyd's of London insurance policies will stop covering losses from certain nation-state cyber attacks and those that happen during wars, beginning in seven months' time.</p><p>In a memo sent to the company's 76-plus insurance syndicates, underwriting director Tony Chaudhry said Lloyd's remains "strongly supportive" of cyber attack coverage. However, as these threats continue to grow, they may "expose the market to systemic risks that syndicates could struggle to manage," <a href="https://assets.lloyds.com/media/35926dc8-c885-497b-aed8-6d2f87c1415d/Y5381%20Market%20Bulletin%20-%20Cyber-attack%20exclusions.pdf">he added</a> [PDF], noting that nation-state-sponsored attacks are particularly costly to cover.</p><p>Because of this, all standalone cyber attack policies must include "a suitable clause excluding liability for losses arising from any state-backed cyberattack," Chaudhry wrote. These changes will take effect beginning March 31, 2023 at the inception or renewal of each policy.</p><p>At a minimum – key word: minimum – these policies must exclude <a href="https://www.theregister.com/2021/12/09/lloyds_lma_cyber_insurance_clauses/">losses arising from a war</a>, whether declared or not, if the policy doesn't already have a separate war exclusion. They must also at least exclude losses from nation-state cyber attacks that "significantly impair the ability of a state to function or that significantly impair the security capabilities of a state."</p><p> </p><p><strong>Industry News:</strong></p><p> <a href="https://www.infosecurity-magazine.com/news/counterfeit-android-devices/">Counterfeit Android Devices Revealed to Contain Backdoor Designed to Hack WhatsApp</a></p><p> <a href="https://www.infosecurity-magazine.com/news/ex-security-chief-twitter-cyber/">Ex-Security Chief Accuses Twitter of Cybersecurity Negligence</a></p><p> <a href="https://www.infosecurity-magazine.com/news/facebook-bug-users-feeds-spammed/">Facebook Bug Causes Users’ Feeds to Be Spammed</a></p><p> <a href="https://www.infosecurity-magazine.com/news/plex-suffers-data-breach/">Plex Suffers Data Breach, Warns Users to Reset Passwords</a></p><p> <a href="https://www.infosecurity-magazine.com/news/scammers-create-ai-hologram-csuite/">Scammers Create 'AI Hologram' of C-Suite Crypto Exec</a></p><p> <a href="https://www.infosecurity-magazine.com/news/workplace-stress-cyberattack/">Workplace Stress Worse than Cyber-Attack Fears for Security Pros</a></p><p> <a href="https://www.infosecurity-magazine.com/news/us-firm-pays-16m-to-settle/">US Firm Pays $16m to Settle Healthcare Fraud Claims</a></p><p> <a href="https://www.infosecurity-magazine.com/news/talos-cybersecurity-support-ukraine/">Talos Renews Cybersecurity Support For Ukraine on Independence Day</a></p><p> <a href="https://www.infosecurity-magazine.com/news/microsoft-magicweb-nobelium/">Microsoft Attributes New Post-Compromise Capability to Nobelium</a></p><p> </p><p><strong>Tweet of the Week:</strong></p><img src="https://lh4.googleusercontent.com/BHAWa9PAVTW7qizCLSvTpVn8LXM3_fcViohhbH0iE-3h4gFhSjFEChJpVE9vxTskubsrQ_3ts5sNkJbwPTe3esBdYBfbJ_MvOBoB10QEmESihsDqKPhBwQ9L2bo3OyOFa0G-pSknldSnM6GHMs5BUj5Efd0pSh052i8Hww5gp_LOM6VI5PtcgUM2lw" /><p><a href="https://twitter.com/J4vv4D/status/1562775110544949248?s=20">https://twitter.com/J4vv4D/status/1562775110544949248?s=20</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Aug 2022 17:40:36 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andy Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-118-we-should-have-taken-a-summer-holiday-GQj0yITP</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec:</strong> (The one and only):</p><p>23rd August 2006: SpoofCard confirmed that Paris Hilton was among the terminated customers, and that Lindsay Lohan was among those whose voicemail accounts were broken into. SpoofCard said it had implemented controls to prevent recurrences.</p><p><a href="https://www.wired.com/2006/08/paris-hilton-ma/">Paris Hilton: Master Hacker?</a></p><p><a href="https://twitter.com/todayininfosec/status/1297213638059728896">https://twitter.com/todayininfosec/status/1297213638059728896</a></p><p>26th August 2008: It was reported that a laptop on the International Space Station was infected by removable media containing the http://W32.Gammima.AG worm.</p><p>Space. Where you don't want to be dealing with malware.</p><p><a href="https://www.zdnet.com/article/malware-detected-at-the-international-space-station/">Malware detected at the International Space Station</a></p><p><a href="https://twitter.com/todayininfosec/status/1298690676448735232">https://twitter.com/todayininfosec/status/1298690676448735232</a></p><p> </p><p><strong>Rant of the Week:</strong></p><p><a href="https://www.theregister.com/2022/08/24/block_headed_to_court_to/">Block sued after ex-staffer siphons customer data</a></p><p>Block – the digital payments giant formerly known as Square – faces allegations it failed to take adequate measures to protect customers' personal information.</p><p>A lawsuit, filed Tuesday in a federal district in Oakland, California, on behalf of two users of Cash App, operated by Block subsidiary Cash App Investing, claims the company failed to implement reasonable security. As a result, a former employee was able to download internal reports containing personal information after leaving the firm.</p><p>Coincidentally, Twitter – another venture co-founded by Block Head Jack Dorsey – was <a href="https://www.theregister.com/2022/08/23/twitter_security_whisterblower/">accused</a> of subpar security by its former security chief in a recent whistleblower complaint.</p><p>Block disclosed the December 10, 2021 data theft on April 4, 2022, and stated it was contacting 8.2 million current and former customers about the privacy snafu. The biz <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/0001512673/000119312522095215/d343042d8k.htm">said</a>, "a former employee downloaded certain reports of its subsidiary Cash App Investing LLC … that contained some US customer information."</p><p>The employee had access to those reports while employed but in this instance downloaded the files after leaving the company. The data obtained included customers' full name and brokerage account numbers, and in some cases, brokerage portfolio values, brokerage portfolio holdings and/or stock trading activity for one trading day.</p><p>As far as the litigants are concerned, Block didn't meet its security obligations, failed to notify customers in a timely manner, provided too little information about the incident, and failed to offer credit or identity monitoring services.</p><p> </p><p><strong>Billy Big Balls</strong>:</p><p><a href="https://www.theregister.com/2022/08/24/lloyds_cybersecurity_insurance/">Lloyd's to exclude certain nation-state attacks from cyber insurance policies</a></p><p>Lloyd's of London insurance policies will stop covering losses from certain nation-state cyber attacks and those that happen during wars, beginning in seven months' time.</p><p>In a memo sent to the company's 76-plus insurance syndicates, underwriting director Tony Chaudhry said Lloyd's remains "strongly supportive" of cyber attack coverage. However, as these threats continue to grow, they may "expose the market to systemic risks that syndicates could struggle to manage," <a href="https://assets.lloyds.com/media/35926dc8-c885-497b-aed8-6d2f87c1415d/Y5381%20Market%20Bulletin%20-%20Cyber-attack%20exclusions.pdf">he added</a> [PDF], noting that nation-state-sponsored attacks are particularly costly to cover.</p><p>Because of this, all standalone cyber attack policies must include "a suitable clause excluding liability for losses arising from any state-backed cyberattack," Chaudhry wrote. These changes will take effect beginning March 31, 2023 at the inception or renewal of each policy.</p><p>At a minimum – key word: minimum – these policies must exclude <a href="https://www.theregister.com/2021/12/09/lloyds_lma_cyber_insurance_clauses/">losses arising from a war</a>, whether declared or not, if the policy doesn't already have a separate war exclusion. They must also at least exclude losses from nation-state cyber attacks that "significantly impair the ability of a state to function or that significantly impair the security capabilities of a state."</p><p> </p><p><strong>Industry News:</strong></p><p> <a href="https://www.infosecurity-magazine.com/news/counterfeit-android-devices/">Counterfeit Android Devices Revealed to Contain Backdoor Designed to Hack WhatsApp</a></p><p> <a href="https://www.infosecurity-magazine.com/news/ex-security-chief-twitter-cyber/">Ex-Security Chief Accuses Twitter of Cybersecurity Negligence</a></p><p> <a href="https://www.infosecurity-magazine.com/news/facebook-bug-users-feeds-spammed/">Facebook Bug Causes Users’ Feeds to Be Spammed</a></p><p> <a href="https://www.infosecurity-magazine.com/news/plex-suffers-data-breach/">Plex Suffers Data Breach, Warns Users to Reset Passwords</a></p><p> <a href="https://www.infosecurity-magazine.com/news/scammers-create-ai-hologram-csuite/">Scammers Create 'AI Hologram' of C-Suite Crypto Exec</a></p><p> <a href="https://www.infosecurity-magazine.com/news/workplace-stress-cyberattack/">Workplace Stress Worse than Cyber-Attack Fears for Security Pros</a></p><p> <a href="https://www.infosecurity-magazine.com/news/us-firm-pays-16m-to-settle/">US Firm Pays $16m to Settle Healthcare Fraud Claims</a></p><p> <a href="https://www.infosecurity-magazine.com/news/talos-cybersecurity-support-ukraine/">Talos Renews Cybersecurity Support For Ukraine on Independence Day</a></p><p> <a href="https://www.infosecurity-magazine.com/news/microsoft-magicweb-nobelium/">Microsoft Attributes New Post-Compromise Capability to Nobelium</a></p><p> </p><p><strong>Tweet of the Week:</strong></p><img src="https://lh4.googleusercontent.com/BHAWa9PAVTW7qizCLSvTpVn8LXM3_fcViohhbH0iE-3h4gFhSjFEChJpVE9vxTskubsrQ_3ts5sNkJbwPTe3esBdYBfbJ_MvOBoB10QEmESihsDqKPhBwQ9L2bo3OyOFa0G-pSknldSnM6GHMs5BUj5Efd0pSh052i8Hww5gp_LOM6VI5PtcgUM2lw" /><p><a href="https://twitter.com/J4vv4D/status/1562775110544949248?s=20">https://twitter.com/J4vv4D/status/1562775110544949248?s=20</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="39879072" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d14478e3-97be-432a-bdaa-8a9ae809631c/audio/97a02628-32ff-4cd9-ae99-d77f45de6ea3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 118 - We should have taken a summer holiday</itunes:title>
      <itunes:author>Javvad Malik, Andy Agnês, Thom Langford</itunes:author>
      <itunes:duration>00:41:32</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a chapter in the life of Paris Hilton, master hacker
Rant of the Week is finding a pattern with companies Jack Dorsey co-founds
Billy Big Balls is another bold move from the cyber insurers
Industry News brings us the latest and greatest security news stories from around the world
Tweet of the Week is a list of things everyone should know by the time they’re 30</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a chapter in the life of Paris Hilton, master hacker
Rant of the Week is finding a pattern with companies Jack Dorsey co-founds
Billy Big Balls is another bold move from the cyber insurers
Industry News brings us the latest and greatest security news stories from around the world
Tweet of the Week is a list of things everyone should know by the time they’re 30</itunes:subtitle>
      <itunes:keywords>rant of the week, cyber security, this week in infosec, cyber insurance, billy big balls, the show which is nothing without andy, security industry news, tweet of the week, bad security, host unknown, jack dorsey</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">786adf94-fd81-4ee9-864f-afafdcb00490</guid>
      <title>Episode 117 - Now With Trigger Warnings</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2003: The Nachi worm began infecting Windows computers to remove the Blaster worm and patch the vulnerability Nachi and Blaster exploited. Yes, you read that right. Yes, this happened. Gotta love it!</p><p><a href="https://twitter.com/todayininfosec/status/1163142725740331008">https://twitter.com/todayininfosec/status/1163142725740331008</a></p><p>17th August 2007: Drew Curtis, founder of<a href="https://t.co/8uzwf4notG"> http://Fark.com</a>, accused Darrell Phillips, reporter at Fox13, of hacking into the social networking news site</p><p><a href="http://mediaverse-memphis.blogspot.com/2007/08/on-getting-farked.html">On getting farked?</a></p><p><a href="https://twitter.com/todayininfosec/status/1162868155015761920">https://twitter.com/todayininfosec/status/1162868155015761920</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/08/16/social_engineering_cyber_crime_insurance/">PC store told it can't claim full cyber-crime insurance after social-engineering attack</a></p><p>A Minnesota computer store suing its crime insurance provider has had its case dismissed, with the courts saying it was a clear instance of social engineering, a crime for which the insurer was only liable to cover a fraction of total losses.</p><p>SJ Computers alleged in a <a href="https://regmedia.co.uk/2022/08/16/original_complaint_november_2021.pdf">November lawsuit</a> [PDF] that Travelers Casualty and Surety Co. owed it far more than paid on a claim for nearly $600,000 in losses due to a successful <a href="https://www.theregister.com/2022/05/05/fbi_cyber_scams/">business email compromise</a> (BEC) attack.</p><p>According to its website, SJ Computers is a Microsoft Authorized Refurbisher, reselling Dell, HP, Lenovo and Acer products, as well as providing tech services including software installs and upgrades.</p><p>Travelers, which filed a motion to dismiss, said SJ's policy clearly delineated between computer fraud and social engineering fraud. The motion was <a href="https://regmedia.co.uk/2022/08/16/order_granting_defendant_motion_to_dismiss.pdf">granted</a> [PDF] with prejudice last Friday.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/08/18/janet_jackson_video_crashes_laptops/">Janet Jackson music video declared a cybersecurity exploit</a></p><p>The music video for Janet Jackson's 1989 pop hit Rhythm Nation has been recognized as a cybersecurity vulnerability after Microsoft reported it can crash old laptop computers.</p><p>"A colleague of mine shared a story from Windows XP product support," <a href="https://devblogs.microsoft.com/oldnewthing/20220816-00/?p=106994">wrote</a> Microsoft blogger Raymond Chen.</p><p>The story detailed how "a major computer manufacturer discovered that playing the music video for Janet Jackson's Rhythm Nation would crash certain models of laptops."</p><p>Further investigation revealed that multiple manufacturers' machines also crashed. Sometimes playing the video on one laptop would crash another nearby laptop. This is mysterious because the <a href="https://www.youtube.com/watch?v=jxe_mMVeoUY">song</a> isn't actually that bad.</p><p>Investigation revealed that all the crashing laptops shared the same 5400 RPM hard disk drive.</p><p>"It turns out that the song contained one of the natural resonant frequencies for the model of 5400 RPM laptop hard drives that they and other manufacturers used," Chen wrote.</p><p>The manufacturer that found the problem apparently added a custom filter in the audio pipeline to detect and remove the offending frequencies during audio playback.</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38392">CVE-2022-38392</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/critical-infrastructure-vnc/">Critical Infrastructure at Risk as Thousands of VNC Instances Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-extradited-on-5m-bec-charges/">Three Extradited from UK to US on $5m BEC Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-patches-flaw-on-macos/">Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels</a></p><p><a href="https://www.infosecurity-magazine.com/news/water-company-says-supply-safe/">Water Company Says Supply Safe After Ransom Group Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-russian-cyberespionage/">Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium</a></p><p><a href="https://www.infosecurity-magazine.com/news/novant-leak-meta-tracking-pixel/">Healthcare Provider Issues Warning After Tracking Pixels Leak Patient Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/bug-bounty-giant-slams-quality-of/">Bug Bounty Giant Slams Quality of Vendor Patching</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspected-russian-money-launderer/">Suspected Russian Money Launderer Extradited to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-deploy-bumblebee-loader/">Hackers Deploy Bumblebee Loader to Breach Target Networks</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/1g1NSkwtEvgNIxvOHJGuudTKPw_tAYYApTii6_7vZRTpq_2tJyBxnqnq4FDel_JSe7Na4qUdo9BFsN3JiEFuY-pd4Vl2oqNTbyu_-SvM9Ih0JnB7L_AawnkLYHG5tOWBff-gZuI0CNgkoJ3PCal7nok" /><p><a href="https://twitter.com/dildog/status/1560025574437015553">https://twitter.com/dildog/status/1560025574437015553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 Aug 2022 16:09:13 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-117-now-with-trigger-warnings-xWtGQG66</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>18th August 2003: The Nachi worm began infecting Windows computers to remove the Blaster worm and patch the vulnerability Nachi and Blaster exploited. Yes, you read that right. Yes, this happened. Gotta love it!</p><p><a href="https://twitter.com/todayininfosec/status/1163142725740331008">https://twitter.com/todayininfosec/status/1163142725740331008</a></p><p>17th August 2007: Drew Curtis, founder of<a href="https://t.co/8uzwf4notG"> http://Fark.com</a>, accused Darrell Phillips, reporter at Fox13, of hacking into the social networking news site</p><p><a href="http://mediaverse-memphis.blogspot.com/2007/08/on-getting-farked.html">On getting farked?</a></p><p><a href="https://twitter.com/todayininfosec/status/1162868155015761920">https://twitter.com/todayininfosec/status/1162868155015761920</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2022/08/16/social_engineering_cyber_crime_insurance/">PC store told it can't claim full cyber-crime insurance after social-engineering attack</a></p><p>A Minnesota computer store suing its crime insurance provider has had its case dismissed, with the courts saying it was a clear instance of social engineering, a crime for which the insurer was only liable to cover a fraction of total losses.</p><p>SJ Computers alleged in a <a href="https://regmedia.co.uk/2022/08/16/original_complaint_november_2021.pdf">November lawsuit</a> [PDF] that Travelers Casualty and Surety Co. owed it far more than paid on a claim for nearly $600,000 in losses due to a successful <a href="https://www.theregister.com/2022/05/05/fbi_cyber_scams/">business email compromise</a> (BEC) attack.</p><p>According to its website, SJ Computers is a Microsoft Authorized Refurbisher, reselling Dell, HP, Lenovo and Acer products, as well as providing tech services including software installs and upgrades.</p><p>Travelers, which filed a motion to dismiss, said SJ's policy clearly delineated between computer fraud and social engineering fraud. The motion was <a href="https://regmedia.co.uk/2022/08/16/order_granting_defendant_motion_to_dismiss.pdf">granted</a> [PDF] with prejudice last Friday.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/08/18/janet_jackson_video_crashes_laptops/">Janet Jackson music video declared a cybersecurity exploit</a></p><p>The music video for Janet Jackson's 1989 pop hit Rhythm Nation has been recognized as a cybersecurity vulnerability after Microsoft reported it can crash old laptop computers.</p><p>"A colleague of mine shared a story from Windows XP product support," <a href="https://devblogs.microsoft.com/oldnewthing/20220816-00/?p=106994">wrote</a> Microsoft blogger Raymond Chen.</p><p>The story detailed how "a major computer manufacturer discovered that playing the music video for Janet Jackson's Rhythm Nation would crash certain models of laptops."</p><p>Further investigation revealed that multiple manufacturers' machines also crashed. Sometimes playing the video on one laptop would crash another nearby laptop. This is mysterious because the <a href="https://www.youtube.com/watch?v=jxe_mMVeoUY">song</a> isn't actually that bad.</p><p>Investigation revealed that all the crashing laptops shared the same 5400 RPM hard disk drive.</p><p>"It turns out that the song contained one of the natural resonant frequencies for the model of 5400 RPM laptop hard drives that they and other manufacturers used," Chen wrote.</p><p>The manufacturer that found the problem apparently added a custom filter in the audio pipeline to detect and remove the offending frequencies during audio playback.</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38392">CVE-2022-38392</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/critical-infrastructure-vnc/">Critical Infrastructure at Risk as Thousands of VNC Instances Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-extradited-on-5m-bec-charges/">Three Extradited from UK to US on $5m BEC Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-patches-flaw-on-macos/">Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels</a></p><p><a href="https://www.infosecurity-magazine.com/news/water-company-says-supply-safe/">Water Company Says Supply Safe After Ransom Group Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-russian-cyberespionage/">Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium</a></p><p><a href="https://www.infosecurity-magazine.com/news/novant-leak-meta-tracking-pixel/">Healthcare Provider Issues Warning After Tracking Pixels Leak Patient Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/bug-bounty-giant-slams-quality-of/">Bug Bounty Giant Slams Quality of Vendor Patching</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspected-russian-money-launderer/">Suspected Russian Money Launderer Extradited to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-deploy-bumblebee-loader/">Hackers Deploy Bumblebee Loader to Breach Target Networks</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/1g1NSkwtEvgNIxvOHJGuudTKPw_tAYYApTii6_7vZRTpq_2tJyBxnqnq4FDel_JSe7Na4qUdo9BFsN3JiEFuY-pd4Vl2oqNTbyu_-SvM9Ih0JnB7L_AawnkLYHG5tOWBff-gZuI0CNgkoJ3PCal7nok" /><p><a href="https://twitter.com/dildog/status/1560025574437015553">https://twitter.com/dildog/status/1560025574437015553</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45606777" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/648231b1-7ee4-4f8f-82a5-9e71a09bf301/audio/50f45811-f21d-44d5-9328-c54f84ab5b16/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 117 - Now With Trigger Warnings</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/4f44aed1-c9a5-4dba-82dd-a6edd70ad30b/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:30</itunes:duration>
      <itunes:summary>This week in InfoSec gets farked
 
Rant of the Week tries hard to find the value in cyber insurance

Billy Big Balls Janet Jackson (yes, that Janet Jackson) is the muse for a new CVE
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a new security certification you didn’t know you qualified for</itunes:summary>
      <itunes:subtitle>This week in InfoSec gets farked
 
Rant of the Week tries hard to find the value in cyber insurance

Billy Big Balls Janet Jackson (yes, that Janet Jackson) is the muse for a new CVE
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a new security certification you didn’t know you qualified for</itunes:subtitle>
      <itunes:keywords>social engineering, ccsb, resonant frequency, janet jackson, pc store, sj computers</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec1f4882-a273-4c4c-948e-5443fe15d9eb</guid>
      <title>Episode 116 - Thom Can&apos;t Work The Buttons</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th August 1988: 34 years ago today, Dade Murphy aka Zero Cool crashed 1507 computers, causing a 7 point drop in the NY stock exchange. He was 11 and his family was fined $45,000. He was banned from touching a computer until he turned 18.</p><p><a href="https://twitter.com/hakluke/status/1557242086423871488">https://twitter.com/hakluke/status/1557242086423871488</a></p><p>6th August 2014: A hacker announced the theft of 40 GB of data from the maker of FinFisher spyware, then leaked the price list, client list, and more.</p><p><a href="https://www.vice.com/en/article/z4mzze/a-hacker-claims-to-have-leaked-40gb-of-docs-on-government-spy-tool-finfisher">A Hacker Claims to Have Leaked 40GB of Docs on Government Spy Tool FinFisher</a></p><p><a href="https://www.zdnet.com/article/top-govt-spyware-company-hacked-gammas-finfisher-leaked/">Top gov't spyware company hacked; Gamma's FinFisher leaked</a></p><p><a href="https://twitter.com/todayininfosec/status/1158956449248108544">https://twitter.com/todayininfosec/status/1158956449248108544</a></p><p>11th August 2015: A day after Oracle CSO Mary Ann Davidson posted a blog titled "No, You Really Can’t", security community blowback caused Oracle to remove the post.</p><p><a href="https://web.archive.org/web/20150811052336/https://blogs.oracle.com/maryanndavidson/entry/no_you_really_can_t">No, you really can’t (Wayback Machine)</a></p><p><a href="https://www.computerworld.com/article/2969844/oracle-cso-mary-ann-davidson-itbwcw.html">Oracle has this Modest Proposal, via its CSO</a></p><p><a href="https://twitter.com/todayininfosec/status/1293374259637768194">https://twitter.com/todayininfosec/status/1293374259637768194</a></p><img src="https://lh6.googleusercontent.com/jmZ8HIWxSSws7LfxEnUK5dqM4XdJTtqYMtfIIrade0aI1ZGakLHlmkCUoAYlGlkP8puZUM-W5an43OABIcGtEXc8mKHKALNOtBS5Sjw-zrIYLJtEi6oNawg8OjW0OL9LWM667dqlcaWCHraQrNj48yk" /><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/technology-62497674">Meta's chatbot says the company 'exploits people'</a></p><p>Meta's new prototype chatbot has told the BBC that Mark Zuckerberg exploits its users for money.</p><p>Meta says the chatbot uses artificial intelligence and can chat on "nearly any topic".</p><p>Asked what the chatbot thought of the company's CEO and founder, it replied "our country is divided and he didn't help that at all".</p><p>Meta said the chatbot was a prototype and might produce rude or offensive answers.</p><p>"Everyone who uses Blender Bot is required to acknowledge they understand it's for research and entertainment purposes only, that it can make untrue or offensive statements, and that they agree to not intentionally trigger the bot to make offensive statements," said a Meta spokesperson.</p><p>The chatbot, called <a href="https://blenderbot.ai/chat">BlenderBot 3</a>, was released to the public on Friday.</p><p>The programme "learns" from large amounts of publicly available language data.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Background:  <a href="https://www.bleepingcomputer.com/news/security/twilio-discloses-data-breach-after-sms-phishing-attack-on-employees/">Twilio discloses data breach after SMS phishing attack on employees</a></p><p>"On August 4, 2022, Twilio became aware of unauthorized access to information related to a limited number of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials," Twilio said over the weekend.</p><p>"The attackers then used the stolen credentials to gain access to some of our internal systems, where they were able to access certain customer data."</p><p>The company also revealed the attackers gained access to its systems after tricking and stealing credentials from multiple employees targeted in the phishing incident.</p><p>To do that, they impersonated Twilio's IT department, asking them to click URLs containing "Twilio," "Okta," and "SSO" keywords that would redirect them to a Twilio sign-in page clone.</p><p>​</p><p>The SMS phishing messages baited Twilio's employees into clicking the embedded links by warning them that their passwords had expired or were scheduled to be changed.</p><p>BBB: <a href="https://www.theregister.com/2022/08/10/cloudflare_twilio_phishing/">Cloudflare: Someone tried to pull the Twilio phishing tactic on us too</a>.  </p><p>Cloudflare says it was subject to a similar attack to one made on comms company Twilio last week, but in this case it was thwarted by hardware security keys that are required to access applications and services.</p><p>Twilio reported <a href="https://www.theregister.com/2022/08/08/twilio_phishing_attack/">a breach</a> after employees received phishing text messages claiming to be from the company's IT department. These fooled them into logging into a fake web page designed to look like Twilio's own sign-in page, using pretexts such as claiming they needed to change their passwords. The attackers were then able to use credentials supplied by the victims to log into the real site.</p><p>According to Cloudflare, it recorded a very similar incident late last month, which could suggest the two attacks may have originated from the same attacker or group.</p><p><a href="https://blog.cloudflare.com/2022-07-sms-phishing-attacks/">Detailing the incident on its blog</a>, the content delivery network claimed that no Cloudflare systems were compromised, but said it was "a sophisticated attack targeting employees and systems in such a way that we believe most organizations would be likely to be breached."</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/meta-takes-action-bitter-apt-apt36/">Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-unable-access-cyberinsurance/">Number of Firms Unable to Access Cyber-Insurance Set to Double</a></p><p><a href="https://www.infosecurity-magazine.com/news/smishing-attack-led-to-major/">Smishing Attack Led to Major Twilio Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/adviser-fined-illegally-access/">Health Adviser Fined After Illegally Accessing Medical Records</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-sanctions-tornado-cash/">US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/predator-guilty-targeting-girls/">Predator Pleads Guilty After Targeting Thousands of Girls Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-criminals-shift-macros/">Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Reports</a></p><p><a href="https://www.infosecurity-magazine.com/news/deathstalkers-vilerat-target-crypto/">DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspected-3m-romance-scammer/">Suspected $3m Romance Scammer Extradited to Japan</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/vE2hKwu7M0D2Dr3t8qRTvD1To4tmdBm_6r5g5S73zFhDX4XPLZkzGdGqPG2ZQoDW5coZGgJTacvoiFU_rnkumUzAQVaWOtoQD5uZmL_D_WIDhSq6LEw2SmBEqDFPOeX01GzxMeodm09zl6ekdme62Uw" /><p><a href="https://twitter.com/mttaggart/status/1557399523575508993">https://twitter.com/mttaggart/status/1557399523575508993</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Aug 2022 15:56:01 +0000</pubDate>
      <author>thom@tl2security.com (Andrew. Agnēs, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-116-thom-cant-work-the-buttons-UjK0fzvr</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>10th August 1988: 34 years ago today, Dade Murphy aka Zero Cool crashed 1507 computers, causing a 7 point drop in the NY stock exchange. He was 11 and his family was fined $45,000. He was banned from touching a computer until he turned 18.</p><p><a href="https://twitter.com/hakluke/status/1557242086423871488">https://twitter.com/hakluke/status/1557242086423871488</a></p><p>6th August 2014: A hacker announced the theft of 40 GB of data from the maker of FinFisher spyware, then leaked the price list, client list, and more.</p><p><a href="https://www.vice.com/en/article/z4mzze/a-hacker-claims-to-have-leaked-40gb-of-docs-on-government-spy-tool-finfisher">A Hacker Claims to Have Leaked 40GB of Docs on Government Spy Tool FinFisher</a></p><p><a href="https://www.zdnet.com/article/top-govt-spyware-company-hacked-gammas-finfisher-leaked/">Top gov't spyware company hacked; Gamma's FinFisher leaked</a></p><p><a href="https://twitter.com/todayininfosec/status/1158956449248108544">https://twitter.com/todayininfosec/status/1158956449248108544</a></p><p>11th August 2015: A day after Oracle CSO Mary Ann Davidson posted a blog titled "No, You Really Can’t", security community blowback caused Oracle to remove the post.</p><p><a href="https://web.archive.org/web/20150811052336/https://blogs.oracle.com/maryanndavidson/entry/no_you_really_can_t">No, you really can’t (Wayback Machine)</a></p><p><a href="https://www.computerworld.com/article/2969844/oracle-cso-mary-ann-davidson-itbwcw.html">Oracle has this Modest Proposal, via its CSO</a></p><p><a href="https://twitter.com/todayininfosec/status/1293374259637768194">https://twitter.com/todayininfosec/status/1293374259637768194</a></p><img src="https://lh6.googleusercontent.com/jmZ8HIWxSSws7LfxEnUK5dqM4XdJTtqYMtfIIrade0aI1ZGakLHlmkCUoAYlGlkP8puZUM-W5an43OABIcGtEXc8mKHKALNOtBS5Sjw-zrIYLJtEi6oNawg8OjW0OL9LWM667dqlcaWCHraQrNj48yk" /><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/technology-62497674">Meta's chatbot says the company 'exploits people'</a></p><p>Meta's new prototype chatbot has told the BBC that Mark Zuckerberg exploits its users for money.</p><p>Meta says the chatbot uses artificial intelligence and can chat on "nearly any topic".</p><p>Asked what the chatbot thought of the company's CEO and founder, it replied "our country is divided and he didn't help that at all".</p><p>Meta said the chatbot was a prototype and might produce rude or offensive answers.</p><p>"Everyone who uses Blender Bot is required to acknowledge they understand it's for research and entertainment purposes only, that it can make untrue or offensive statements, and that they agree to not intentionally trigger the bot to make offensive statements," said a Meta spokesperson.</p><p>The chatbot, called <a href="https://blenderbot.ai/chat">BlenderBot 3</a>, was released to the public on Friday.</p><p>The programme "learns" from large amounts of publicly available language data.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Background:  <a href="https://www.bleepingcomputer.com/news/security/twilio-discloses-data-breach-after-sms-phishing-attack-on-employees/">Twilio discloses data breach after SMS phishing attack on employees</a></p><p>"On August 4, 2022, Twilio became aware of unauthorized access to information related to a limited number of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials," Twilio said over the weekend.</p><p>"The attackers then used the stolen credentials to gain access to some of our internal systems, where they were able to access certain customer data."</p><p>The company also revealed the attackers gained access to its systems after tricking and stealing credentials from multiple employees targeted in the phishing incident.</p><p>To do that, they impersonated Twilio's IT department, asking them to click URLs containing "Twilio," "Okta," and "SSO" keywords that would redirect them to a Twilio sign-in page clone.</p><p>​</p><p>The SMS phishing messages baited Twilio's employees into clicking the embedded links by warning them that their passwords had expired or were scheduled to be changed.</p><p>BBB: <a href="https://www.theregister.com/2022/08/10/cloudflare_twilio_phishing/">Cloudflare: Someone tried to pull the Twilio phishing tactic on us too</a>.  </p><p>Cloudflare says it was subject to a similar attack to one made on comms company Twilio last week, but in this case it was thwarted by hardware security keys that are required to access applications and services.</p><p>Twilio reported <a href="https://www.theregister.com/2022/08/08/twilio_phishing_attack/">a breach</a> after employees received phishing text messages claiming to be from the company's IT department. These fooled them into logging into a fake web page designed to look like Twilio's own sign-in page, using pretexts such as claiming they needed to change their passwords. The attackers were then able to use credentials supplied by the victims to log into the real site.</p><p>According to Cloudflare, it recorded a very similar incident late last month, which could suggest the two attacks may have originated from the same attacker or group.</p><p><a href="https://blog.cloudflare.com/2022-07-sms-phishing-attacks/">Detailing the incident on its blog</a>, the content delivery network claimed that no Cloudflare systems were compromised, but said it was "a sophisticated attack targeting employees and systems in such a way that we believe most organizations would be likely to be breached."</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/meta-takes-action-bitter-apt-apt36/">Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-unable-access-cyberinsurance/">Number of Firms Unable to Access Cyber-Insurance Set to Double</a></p><p><a href="https://www.infosecurity-magazine.com/news/smishing-attack-led-to-major/">Smishing Attack Led to Major Twilio Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/adviser-fined-illegally-access/">Health Adviser Fined After Illegally Accessing Medical Records</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-sanctions-tornado-cash/">US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/predator-guilty-targeting-girls/">Predator Pleads Guilty After Targeting Thousands of Girls Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-criminals-shift-macros/">Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Reports</a></p><p><a href="https://www.infosecurity-magazine.com/news/deathstalkers-vilerat-target-crypto/">DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges</a></p><p><a href="https://www.infosecurity-magazine.com/news/suspected-3m-romance-scammer/">Suspected $3m Romance Scammer Extradited to Japan</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/vE2hKwu7M0D2Dr3t8qRTvD1To4tmdBm_6r5g5S73zFhDX4XPLZkzGdGqPG2ZQoDW5coZGgJTacvoiFU_rnkumUzAQVaWOtoQD5uZmL_D_WIDhSq6LEw2SmBEqDFPOeX01GzxMeodm09zl6ekdme62Uw" /><p><a href="https://twitter.com/mttaggart/status/1557399523575508993">https://twitter.com/mttaggart/status/1557399523575508993</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48698003" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e081e8b0-7038-4bfb-a27d-d7696b5de339/audio/2a4460ff-b638-44dc-9a24-a2144e83415c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 116 - Thom Can&apos;t Work The Buttons</itunes:title>
      <itunes:author>Andrew. Agnēs, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/86600c98-dd60-4b47-91b2-efbe3569d153/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:43</itunes:duration>
      <itunes:summary>This week in InfoSec talks about repressive governments weapon of choice long before Pegasus
 
Rant of the Week is another big tech chatbot in the wild

Billy Big Balls demonstrates why defence-in-depth really can save you some pain
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an infosec dad joke</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about repressive governments weapon of choice long before Pegasus
 
Rant of the Week is another big tech chatbot in the wild

Billy Big Balls demonstrates why defence-in-depth really can save you some pain
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an infosec dad joke</itunes:subtitle>
      <itunes:keywords>offensive security, blenderbot 3000, cloudflare, twillio, smishing, meta</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1bf91aed-1658-4504-903f-cf0ba79f7623</guid>
      <title>Episode 115 - We&apos;re All Going On a Summer Holiday</title>
      <description><![CDATA[<p><strong>This week in InfoSec (9:23)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th July 1985: An article in the New York Times cited multiple experts who alleged the vote counting systems of Computer Election Systems are vulnerable to tampering.</p><p>Yep. Election systems vulnerabilities aren't a new phenomenon. Not even close. </p><p><a href="https://www.nytimes.com/1985/07/29/us/computerized-systems-for-voting-seen-as-vulnerable-to-tampering.html?pagewanted=all">COMPUTERIZED SYSTEMS FOR VOTING SEEN AS VULNERABLE TO TAMPERING</a></p><p><a href="https://twitter.com/todayininfosec/status/1156078284603416582">https://twitter.com/todayininfosec/status/1156078284603416582</a></p><p>30th July 2013: Chelsea Manning was found guilty of espionage, theft, and computer fraud, as well as military infractions. </p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Manning">United States v. Manning</a></p><p><a href="https://twitter.com/todayininfosec/status/1288925289465208834">https://twitter.com/todayininfosec/status/1288925289465208834</a></p><p>6th August 1997: Microsoft Buys $150M of Apple stock.  In an effort to help save Apple Computer and possibly deflect criticism in its own anti-trust trial, Microsoft Corp. buys $150 million in shares of Apple Computer Inc. Apple, which had been struggling to find direction and profits for years, agreed to the boost in funding with terms that dictated cooperation in the design of computers as well as shared patents. Microsoft agreed to continue supporting MS-Office for the Mac for another five years as well.</p><p><strong>Rant of the Week (18:11)</strong></p><p><a href="https://www.theregister.com/2022/08/04/india_scraps_data_protection_law/">India scraps data protection law in favor of better law coming … sometime</a></p><p>The government of India has scrapped the Personal Data Protection Bill it's worked on for three years, and announced it will – eventually – unveil a superior bill.</p><p>The bill, proposed in 2019, would have enabled the government to gather user data from companies while regulating cross-border data flows. It also included restrictions on sharing of personal data without explicit consent, proposed establishment of a new Data Protection Authority within the government, and more.</p><p>On Wednesday, telecom minister Ashwini Vaishnaw <a href="https://twitter.com/AshwiniVaishnaw/status/1554815294795034624">tweeted</a> that the bill was nixed because the Joint Committee of Parliament (JCP) recommended 81 amendments to the Bill's 99 sections.</p><p>"Therefore the bill has been withdrawn and a new bill will be presented for public consultation," said Vaishnaw.</p><p>and...</p><p><a href="https://www.theregister.com/2022/08/04/uk_parliament_tiktok_account_discontinued/">UK Parliament bins its TikTok account over China surveillance fears</a></p><p>Plan to educate the children turned out to be a 'won't someone think of the children?' moment</p><p>The UK's Parliament has ended its presence on TikTok after MPs pointed out the made-in-China social media service probably sends data about its users back to Beijing.</p><p>The existence of the account saw half a dozen MPs <a href="https://twitter.com/EditorBTB/status/1552929950151442432">write</a> to the presiding officers of the Houses of Lords and Commons — Lord McFall of Alcluith and Sir Lindsay Hoyle, respectively — to ask for the account to be discontinued.</p><p>"While efforts made to engage young people in the history and functioning of parliament should always be welcomed, we cannot and should not legitimise the use of an app which has been described by tech experts as 'essentially Chinese government spyware'," wrote MPs Nusrat Ghani, Tim Loughton, Sir Iain Duncan Smith, Tom Tugendhat, plus Lord Alton of Liverpool and Baroness Kennedy of the Shaws.</p><p><strong>Billy Big Balls of the Week (26:21)</strong></p><p><a href="https://www.theregister.com/2022/08/03/tmobile_unlock_prison_phone/">Ex-T-Mobile US store owner phished staff, raked in $25m from unlocking phones</a></p><p>A now-former T-Mobile US store stole at least 50 employees' work credentials to run a phone unlocking and unblocking service that prosecutors said netted $25 million.</p><p>Argishti Khudaverdyan, 44, of Burbank, California, was found guilty of 14 criminal charges [<a href="https://regmedia.co.uk/2022/08/03/khudaverdyan_indictment.pdf">PDF</a>] by a US federal jury on Friday.</p><p>According to the Dept of Justice, Khudaverdyan co-owned a T-Mobile US store in Los Angeles, operating as a business called Top Tier Solutions, for about five months in 2017. </p><p>T-Mo ended its contract with Khudaverdyan in June 2017 after being sketched out by his suspicious use of the carrier's computer system. It turned out he had been unlocking phones for customers without T-Mobile US's permission so that the devices could be used on different networks.</p><p>Even after the self-styled un-carrier gave him the boot, he continued his illicit scheme, advertising unlocking and unblocking services through brokers, email spam, and websites that Khudaverdyan and Gharehbagloo controlled, such as unlocks247[.]com and swiftunlocked[.]com.</p><p><strong>Industry News (33:37)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-top-10-universities-failing-on/">UK’s Top 10 Universities Failing on DMARC</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-of-apps-leaking-twitter/">Thousands of Apps Leaking Twitter API Keys</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-ransomware-exploits/">LockBit Ransomware Exploits Windows Defender to Sideload Cobalt Strike Payload</a></p><p><a href="https://www.infosecurity-magazine.com/news/tory-leadership-voting-delayed/">Tory Leadership Voting Delayed Over Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-retailer-guilty-of-25m/">T-Mobile Retailer Guilty of $25m Fraud Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-of-fake-football/">xperts Warn of Fake Football Ticket Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-shutters-major-russian-bot/">Ukraine Shutters Major Russian Bot Farm</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-steal-5m-blockchain/">Users Still in the Dark Over $5m Theft From Blockchain Firm Solana</a></p><p><a href="https://www.infosecurity-magazine.com/news/crest-owasp-partner-verification/">CREST and OWASP Partner on Verification Standard Program</a></p><p><strong>Tweet of the Week (40:16)</strong></p><img src="https://lh4.googleusercontent.com/M7EzgmPE0cTkxTyLkYQ6DtrDxY2gRJo_izqJ9eneM4GW9_xUB4GkXOxq_NRACUsQegiHv4iMviNcsmX3poEnmZ2wuMiZPpvtRUuzmFUCGBo9W4bRGIIFrCX9nJaOTs04XqpIFT-VE46NAum1qSp4UyY" alt="" /><p><a href="https://twitter.com/AndrewMohawk/status/1555430194743111683?s=20">https://twitter.com/AndrewMohawk/status/1555430194743111683?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 Aug 2022 18:13:35 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-115-were-all-going-on-a-summer-holiday-5C7gd0rS</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (9:23)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>29th July 1985: An article in the New York Times cited multiple experts who alleged the vote counting systems of Computer Election Systems are vulnerable to tampering.</p><p>Yep. Election systems vulnerabilities aren't a new phenomenon. Not even close. </p><p><a href="https://www.nytimes.com/1985/07/29/us/computerized-systems-for-voting-seen-as-vulnerable-to-tampering.html?pagewanted=all">COMPUTERIZED SYSTEMS FOR VOTING SEEN AS VULNERABLE TO TAMPERING</a></p><p><a href="https://twitter.com/todayininfosec/status/1156078284603416582">https://twitter.com/todayininfosec/status/1156078284603416582</a></p><p>30th July 2013: Chelsea Manning was found guilty of espionage, theft, and computer fraud, as well as military infractions. </p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Manning">United States v. Manning</a></p><p><a href="https://twitter.com/todayininfosec/status/1288925289465208834">https://twitter.com/todayininfosec/status/1288925289465208834</a></p><p>6th August 1997: Microsoft Buys $150M of Apple stock.  In an effort to help save Apple Computer and possibly deflect criticism in its own anti-trust trial, Microsoft Corp. buys $150 million in shares of Apple Computer Inc. Apple, which had been struggling to find direction and profits for years, agreed to the boost in funding with terms that dictated cooperation in the design of computers as well as shared patents. Microsoft agreed to continue supporting MS-Office for the Mac for another five years as well.</p><p><strong>Rant of the Week (18:11)</strong></p><p><a href="https://www.theregister.com/2022/08/04/india_scraps_data_protection_law/">India scraps data protection law in favor of better law coming … sometime</a></p><p>The government of India has scrapped the Personal Data Protection Bill it's worked on for three years, and announced it will – eventually – unveil a superior bill.</p><p>The bill, proposed in 2019, would have enabled the government to gather user data from companies while regulating cross-border data flows. It also included restrictions on sharing of personal data without explicit consent, proposed establishment of a new Data Protection Authority within the government, and more.</p><p>On Wednesday, telecom minister Ashwini Vaishnaw <a href="https://twitter.com/AshwiniVaishnaw/status/1554815294795034624">tweeted</a> that the bill was nixed because the Joint Committee of Parliament (JCP) recommended 81 amendments to the Bill's 99 sections.</p><p>"Therefore the bill has been withdrawn and a new bill will be presented for public consultation," said Vaishnaw.</p><p>and...</p><p><a href="https://www.theregister.com/2022/08/04/uk_parliament_tiktok_account_discontinued/">UK Parliament bins its TikTok account over China surveillance fears</a></p><p>Plan to educate the children turned out to be a 'won't someone think of the children?' moment</p><p>The UK's Parliament has ended its presence on TikTok after MPs pointed out the made-in-China social media service probably sends data about its users back to Beijing.</p><p>The existence of the account saw half a dozen MPs <a href="https://twitter.com/EditorBTB/status/1552929950151442432">write</a> to the presiding officers of the Houses of Lords and Commons — Lord McFall of Alcluith and Sir Lindsay Hoyle, respectively — to ask for the account to be discontinued.</p><p>"While efforts made to engage young people in the history and functioning of parliament should always be welcomed, we cannot and should not legitimise the use of an app which has been described by tech experts as 'essentially Chinese government spyware'," wrote MPs Nusrat Ghani, Tim Loughton, Sir Iain Duncan Smith, Tom Tugendhat, plus Lord Alton of Liverpool and Baroness Kennedy of the Shaws.</p><p><strong>Billy Big Balls of the Week (26:21)</strong></p><p><a href="https://www.theregister.com/2022/08/03/tmobile_unlock_prison_phone/">Ex-T-Mobile US store owner phished staff, raked in $25m from unlocking phones</a></p><p>A now-former T-Mobile US store stole at least 50 employees' work credentials to run a phone unlocking and unblocking service that prosecutors said netted $25 million.</p><p>Argishti Khudaverdyan, 44, of Burbank, California, was found guilty of 14 criminal charges [<a href="https://regmedia.co.uk/2022/08/03/khudaverdyan_indictment.pdf">PDF</a>] by a US federal jury on Friday.</p><p>According to the Dept of Justice, Khudaverdyan co-owned a T-Mobile US store in Los Angeles, operating as a business called Top Tier Solutions, for about five months in 2017. </p><p>T-Mo ended its contract with Khudaverdyan in June 2017 after being sketched out by his suspicious use of the carrier's computer system. It turned out he had been unlocking phones for customers without T-Mobile US's permission so that the devices could be used on different networks.</p><p>Even after the self-styled un-carrier gave him the boot, he continued his illicit scheme, advertising unlocking and unblocking services through brokers, email spam, and websites that Khudaverdyan and Gharehbagloo controlled, such as unlocks247[.]com and swiftunlocked[.]com.</p><p><strong>Industry News (33:37)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/uks-top-10-universities-failing-on/">UK’s Top 10 Universities Failing on DMARC</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-of-apps-leaking-twitter/">Thousands of Apps Leaking Twitter API Keys</a></p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-ransomware-exploits/">LockBit Ransomware Exploits Windows Defender to Sideload Cobalt Strike Payload</a></p><p><a href="https://www.infosecurity-magazine.com/news/tory-leadership-voting-delayed/">Tory Leadership Voting Delayed Over Security Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-retailer-guilty-of-25m/">T-Mobile Retailer Guilty of $25m Fraud Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-of-fake-football/">xperts Warn of Fake Football Ticket Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-shutters-major-russian-bot/">Ukraine Shutters Major Russian Bot Farm</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-steal-5m-blockchain/">Users Still in the Dark Over $5m Theft From Blockchain Firm Solana</a></p><p><a href="https://www.infosecurity-magazine.com/news/crest-owasp-partner-verification/">CREST and OWASP Partner on Verification Standard Program</a></p><p><strong>Tweet of the Week (40:16)</strong></p><img src="https://lh4.googleusercontent.com/M7EzgmPE0cTkxTyLkYQ6DtrDxY2gRJo_izqJ9eneM4GW9_xUB4GkXOxq_NRACUsQegiHv4iMviNcsmX3poEnmZ2wuMiZPpvtRUuzmFUCGBo9W4bRGIIFrCX9nJaOTs04XqpIFT-VE46NAum1qSp4UyY" alt="" /><p><a href="https://twitter.com/AndrewMohawk/status/1555430194743111683?s=20">https://twitter.com/AndrewMohawk/status/1555430194743111683?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42087978" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/34bd62d3-5ed9-42af-b25f-196f0210aa2d/audio/da162e78-5181-43c1-a2f6-39e3656828de/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 115 - We&apos;re All Going On a Summer Holiday</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/53f492e9-3580-4fde-8d9f-01b22b4bf62e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:50</itunes:duration>
      <itunes:summary>This week in InfoSec talks voting systems
 
Rant of the Week asks Parliament to engage with yoof without using the PLA

Billy Big Balls unlocks the secrets behind making millions in coin
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week exposes the secrets behind becoming a Whitehat hacker</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks voting systems
 
Rant of the Week asks Parliament to engage with yoof without using the PLA

Billy Big Balls unlocks the secrets behind making millions in coin
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week exposes the secrets behind becoming a Whitehat hacker</itunes:subtitle>
      <itunes:keywords>dmarc, crest, whitehat, the kraken, t-mobile, india data protection, uk, tik-tok, owasp</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13bd9fee-11e0-4a18-8bb3-65a8e41745a8</guid>
      <title>Episode 114 - BACK OFF THE MIC JAV!</title>
      <description><![CDATA[<p><strong>This week in InfoSec </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th July 2007: The US Ninth Circuit Court of Appeals ruled that IP addresses and to/from email fields can be monitored without probable cause. </p><p><a href="https://www.wired.com/2007/07/appeals-court-r/">Appeals Court Rules No Privacy Interest in IP Addresses, Email To/From Fields</a></p><p><a href="https://twitter.com/todayininfosec/status/1154791990397042688">https://twitter.com/todayininfosec/status/1154791990397042688</a></p><p>29th July 2009: The first Security BSides conference was held in Las Vegas in a  3,767 square foot house.</p><p><a href="http://www.securitybsides.com/w/page/50746315/BSidesHistory">http://www.securitybsides.com/w/page/50746315/BSidesHistory</a></p><p><a href="https://twitter.com/todayininfosec/status/1156078833277128704">https://twitter.com/todayininfosec/status/1156078833277128704</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-scan-for-vulnerabilities-within-15-minutes-of-disclosure/">Hackers scan for vulnerabilities within 15 minutes of disclosure</a></p><p>System administrators have even less time to patch disclosed security vulnerabilities than previously thought, as a new report shows threat actors scanning for vulnerable endpoints within 15 minutes of a new CVE being publicly disclosed.</p><p>According to Palo Alto's 2022 Unit 42 <a href="https://www.paloaltonetworks.com/unit42/2022-incident-response-report">Incident Response Report</a>, hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution.</p><p>However, the speed at which threat actors begin scanning for vulnerabilities puts system administrators in the crosshairs as they race to patch the bugs before they are exploited.</p><p>"The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced," reads a companion <a href="http://unit42.paloaltonetworks.com/incident-response-report/">blog post</a>.</p><p>Since scanning isn't particularly demanding, even low-skilled attackers can scan the internet for vulnerable endpoints and sell their findings on dark web markets where more capable hackers know how to exploit them.</p><p>Then, within hours, the first active exploitation attempts are observed, often hitting systems that never had the chance to patch.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-robin-banks-phishing-service-targets-bofa-citi-and-wells-fargo/">New ‘Robin Banks’ phishing service targets BofA, Citi, and Wells Fargo</a></p><p>A new phishing as a service (PhaaS) platform named 'Robin Banks' has been launched, offering ready-made phishing kits targeting the customers of well-known banks and online services.</p><p>The targeted entities include Citibank, Bank of America, Capital One, Wells Fargo, PNC, U.S. Bank, Lloyds Bank, the Commonwealth Bank in Australia, and Santander.</p><p>Additionally, Robin Banks offers templates to steal Microsoft, Google, Netflix, and T-Mobile accounts.</p><p>According to a report by <a href="https://www.ironnet.com/blog/robin-banks-a-new-phishing-as-a-service-platform">IronNet</a>, whose analysts discovered the new phishing platform, Robin Banks is already being deployed in large-scale campaigns that started in mid-June, targeting victims via SMS and email.</p><p> </p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/">LockBit 3.0 introduces the first ransomware bug bounty program</a></p><p>With the release of LockBit 3.0, the operation has introduced the first bug bounty program offered by a ransomware gang, asking security researchers to submit bug reports in return for rewards ranging between $1,000 and $1 million.</p><p>"We invite all security researchers, ethical and unethical hackers on the planet to participate in our bug bounty program. The amount of remuneration varies from $1000 to $1 million," reads the LockBit 3.0 bug bounty page.</p><p>However, this bug bounty program is a bit different than those commonly used by legitimate companies, as helping the criminal enterprise would be illegal in many countries.</p><p>Furthermore, LockBit is not only offering bounties for rewards on vulnerabilities but is also paying bounties for "brilliant ideas" on improving the ransomware operation and for doxxing the affiliate program manager.</p><p>The following are the various bug bounty categories offered by the LockBit 3.0 operation:</p><p>Web Site Bugs: XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies.</p><p>Locker Bugs: Any errors during encryption by lockers that lead to corrupted files or to the possibility of decrypting files without getting a decryptor.</p><p>Brilliant ideas: We pay for ideas, please write us how to improve our site and our software, the best ideas will be paid. What is so interesting about our competitors that we don't have?</p><p>Doxing: We pay exactly one million dollars, no more and no less, for doxing the affiliate program boss. Whether you're an FBI agent or a very clever hacker who knows how to find anyone, you can write us a TOX messenger, give us your boss's name, and get $1 million in bitcoin or monero for it.</p><p>TOX messenger: Vulnerabilities of TOX messenger that allow you to intercept correspondence, run malware, determine the IP address of the interlocutorand other interesting vulnerabilities.</p><p>Tor network: Any vulnerabilities which help to get the IP address of the server where the site is installed on the onion domain, as well as getting root access to our servers, followed by a database dump and onion domains.</p><p>The $1,000,000 reward for identifying the affiliate manager, known as LockBitSupp, was previously offered on the XSS hacking forum in April.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/no-more-ransom-has-helped-over-15m/">No More Ransom Has Helped Over 1.5m Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-doubles-reward-info-north/">US Doubles Reward for Info on North Korean Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminals-malware-messaging-bots/">Criminals Use Malware as Messaging Bots to Steal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminal-twitter-users-data/">Cyber-Criminal Offers 5.4m Twitter Users’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-100-suspects-bec/">European Police Arrest 100 Suspects in BEC Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-accounts-hijacked/">Social Media Accounts Hijacked to Post Indecent Images</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-change-tactics-for-new/">Hackers Change Tactics for New Post-Macro Era</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-500000-school/">Ransomware Group Demands £500,000 From School</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-arrestradioactive/">Spanish Police Arrest Alleged Radioactive Monitoring Hackers</a></p><p>Tweet of the Week</p><img src="https://lh3.googleusercontent.com/bybSGArA8C11KyT1QUSdd_ykSYcy0P-tt42Y095bLTX2Ph9KOjQUaXYpMn2bQCwWKBvC1JtRphgXU6Q64ZtGGW0uPrR_sn139nrmy15besULFerTph6Hm_ZyB-ZjB1VOarOBohjWCnicmFBIHoaDpw" /><p><a href="https://twitter.com/danielmakelley/status/1550884696355225601">https://twitter.com/danielmakelley/status/1550884696355225601</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 Jul 2022 16:32:36 +0000</pubDate>
      <author>thom@tl2security.com (Robin Banks, Javvad Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-114-back-off-the-mic-jav-oqcfNuX7</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec </strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>25th July 2007: The US Ninth Circuit Court of Appeals ruled that IP addresses and to/from email fields can be monitored without probable cause. </p><p><a href="https://www.wired.com/2007/07/appeals-court-r/">Appeals Court Rules No Privacy Interest in IP Addresses, Email To/From Fields</a></p><p><a href="https://twitter.com/todayininfosec/status/1154791990397042688">https://twitter.com/todayininfosec/status/1154791990397042688</a></p><p>29th July 2009: The first Security BSides conference was held in Las Vegas in a  3,767 square foot house.</p><p><a href="http://www.securitybsides.com/w/page/50746315/BSidesHistory">http://www.securitybsides.com/w/page/50746315/BSidesHistory</a></p><p><a href="https://twitter.com/todayininfosec/status/1156078833277128704">https://twitter.com/todayininfosec/status/1156078833277128704</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-scan-for-vulnerabilities-within-15-minutes-of-disclosure/">Hackers scan for vulnerabilities within 15 minutes of disclosure</a></p><p>System administrators have even less time to patch disclosed security vulnerabilities than previously thought, as a new report shows threat actors scanning for vulnerable endpoints within 15 minutes of a new CVE being publicly disclosed.</p><p>According to Palo Alto's 2022 Unit 42 <a href="https://www.paloaltonetworks.com/unit42/2022-incident-response-report">Incident Response Report</a>, hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution.</p><p>However, the speed at which threat actors begin scanning for vulnerabilities puts system administrators in the crosshairs as they race to patch the bugs before they are exploited.</p><p>"The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced," reads a companion <a href="http://unit42.paloaltonetworks.com/incident-response-report/">blog post</a>.</p><p>Since scanning isn't particularly demanding, even low-skilled attackers can scan the internet for vulnerable endpoints and sell their findings on dark web markets where more capable hackers know how to exploit them.</p><p>Then, within hours, the first active exploitation attempts are observed, often hitting systems that never had the chance to patch.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-robin-banks-phishing-service-targets-bofa-citi-and-wells-fargo/">New ‘Robin Banks’ phishing service targets BofA, Citi, and Wells Fargo</a></p><p>A new phishing as a service (PhaaS) platform named 'Robin Banks' has been launched, offering ready-made phishing kits targeting the customers of well-known banks and online services.</p><p>The targeted entities include Citibank, Bank of America, Capital One, Wells Fargo, PNC, U.S. Bank, Lloyds Bank, the Commonwealth Bank in Australia, and Santander.</p><p>Additionally, Robin Banks offers templates to steal Microsoft, Google, Netflix, and T-Mobile accounts.</p><p>According to a report by <a href="https://www.ironnet.com/blog/robin-banks-a-new-phishing-as-a-service-platform">IronNet</a>, whose analysts discovered the new phishing platform, Robin Banks is already being deployed in large-scale campaigns that started in mid-June, targeting victims via SMS and email.</p><p> </p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/">LockBit 3.0 introduces the first ransomware bug bounty program</a></p><p>With the release of LockBit 3.0, the operation has introduced the first bug bounty program offered by a ransomware gang, asking security researchers to submit bug reports in return for rewards ranging between $1,000 and $1 million.</p><p>"We invite all security researchers, ethical and unethical hackers on the planet to participate in our bug bounty program. The amount of remuneration varies from $1000 to $1 million," reads the LockBit 3.0 bug bounty page.</p><p>However, this bug bounty program is a bit different than those commonly used by legitimate companies, as helping the criminal enterprise would be illegal in many countries.</p><p>Furthermore, LockBit is not only offering bounties for rewards on vulnerabilities but is also paying bounties for "brilliant ideas" on improving the ransomware operation and for doxxing the affiliate program manager.</p><p>The following are the various bug bounty categories offered by the LockBit 3.0 operation:</p><p>Web Site Bugs: XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies.</p><p>Locker Bugs: Any errors during encryption by lockers that lead to corrupted files or to the possibility of decrypting files without getting a decryptor.</p><p>Brilliant ideas: We pay for ideas, please write us how to improve our site and our software, the best ideas will be paid. What is so interesting about our competitors that we don't have?</p><p>Doxing: We pay exactly one million dollars, no more and no less, for doxing the affiliate program boss. Whether you're an FBI agent or a very clever hacker who knows how to find anyone, you can write us a TOX messenger, give us your boss's name, and get $1 million in bitcoin or monero for it.</p><p>TOX messenger: Vulnerabilities of TOX messenger that allow you to intercept correspondence, run malware, determine the IP address of the interlocutorand other interesting vulnerabilities.</p><p>Tor network: Any vulnerabilities which help to get the IP address of the server where the site is installed on the onion domain, as well as getting root access to our servers, followed by a database dump and onion domains.</p><p>The $1,000,000 reward for identifying the affiliate manager, known as LockBitSupp, was previously offered on the XSS hacking forum in April.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/no-more-ransom-has-helped-over-15m/">No More Ransom Has Helped Over 1.5m Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-doubles-reward-info-north/">US Doubles Reward for Info on North Korean Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminals-malware-messaging-bots/">Criminals Use Malware as Messaging Bots to Steal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/criminal-twitter-users-data/">Cyber-Criminal Offers 5.4m Twitter Users’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-100-suspects-bec/">European Police Arrest 100 Suspects in BEC Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-accounts-hijacked/">Social Media Accounts Hijacked to Post Indecent Images</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-change-tactics-for-new/">Hackers Change Tactics for New Post-Macro Era</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-group-500000-school/">Ransomware Group Demands £500,000 From School</a></p><p><a href="https://www.infosecurity-magazine.com/news/spanish-police-arrestradioactive/">Spanish Police Arrest Alleged Radioactive Monitoring Hackers</a></p><p>Tweet of the Week</p><img src="https://lh3.googleusercontent.com/bybSGArA8C11KyT1QUSdd_ykSYcy0P-tt42Y095bLTX2Ph9KOjQUaXYpMn2bQCwWKBvC1JtRphgXU6Q64ZtGGW0uPrR_sn139nrmy15besULFerTph6Hm_ZyB-ZjB1VOarOBohjWCnicmFBIHoaDpw" /><p><a href="https://twitter.com/danielmakelley/status/1550884696355225601">https://twitter.com/danielmakelley/status/1550884696355225601</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45606777" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e3663be2-cdd5-4760-9583-314b79195448/audio/95a56ca7-2daa-4c55-a1f0-ac34b3ab945c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 114 - BACK OFF THE MIC JAV!</itunes:title>
      <itunes:author>Robin Banks, Javvad Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b41a7035-5013-4c23-902b-5d7cfad973cd/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:30</itunes:duration>
      <itunes:summary>This week in InfoSec pays homage to the the best conference for hackers, by hackers
 
Rant of the Week laughs at your 14 day patching cycle

Billy Big Balls is the opposite end of the scale to a 419-scam with bad spelling 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week could probably be found in the Shower Thoughts subreddit</itunes:summary>
      <itunes:subtitle>This week in InfoSec pays homage to the the best conference for hackers, by hackers
 
Rant of the Week laughs at your 14 day patching cycle

Billy Big Balls is the opposite end of the scale to a 419-scam with bad spelling 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week could probably be found in the Shower Thoughts subreddit</itunes:subtitle>
      <itunes:keywords>phaas, robin banks, 14 minutes, north korea, lockbit, bug bounty</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13c0aafb-8ccb-4e01-943d-29432ec10a41</guid>
      <title>Episode 113 - Did you hear That?</title>
      <description><![CDATA[<p><strong>This week in InfoSec (10:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th July 1997: Major Disruption in Sending Most E-Mail Messages.  A programming error temporarily threw the Internet into disarray in a preview of the difficulties that inevitably accompany a world dependent on e-mail, the World Wide Web, and other electronic communications.</p><p>At 2:30 a.m. Eastern Daylight Time, a computer operator in Virginia ignored alarms on the computer that updated Internet address information, leading to problems at several other computers with similar responsibilities. The corruption meant most Internet addresses could not be accessed, resulting in millions of unsent e-mail messages.</p><p>15th July 1999: DilDog of Cult of the Dead Cow confirmed official Back Orifice 2000 CD-ROMs distributed during DEF CON 4 days prior were infected with the destructive CIH virus. Initially, cDc blamed pirated copies as the source, later discovering a duplicating machine had been infected.</p><p><a href="https://twitter.com/todayininfosec/status/1283523195371282434">https://twitter.com/todayininfosec/status/1283523195371282434</a></p><p>19th July 1985: Chase Manhattan Bank discovered a message in one of its computer systems from Lord Flathead. The message said that unless he was given free use of the computer, he would destroy records in the system. Lord Flathead? He founded Myspace 18 years later!</p><p><a href="https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html">https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1153507276629504006">https://twitter.com/todayininfosec/status/1153507276629504006</a></p><p> </p><p><strong>Rant of the Week (16:28)</strong></p><p><a href="https://edition.cnn.com/2022/07/19/politics/secret-service-texts-national-archives/index.html">Secret Service gives thousands of documents to January 6 committee, but hasn't yet recovered potentially missing texts</a></p><p>(CNN)The US Secret Service produced an "initial set of documents" to the House select committee investigating the January 6, 2021, insurrection on Tuesday, in response to a subpoena last week that was issued amid reports of potentially missing text messages from the day of the insurrection.</p><p>However, Tuesday's document production didn't include any of the potentially missing texts from January 5 and 6, 2021, a Secret Service official told CNN. That's because the agency still has not been able to recover any records that were lost during a phone migration around that time, the official said.</p><p>“The USSS didn’t just delete texts after knowing they were evidence in a federal probe; it didn’t just lie about why/how the texts were deleted; the texts were so *professionally* deleted they can’t be recovered.”</p><p><a href="https://twitter.com/SethAbramson/status/1549488007614529538">https://twitter.com/SethAbramson/status/1549488007614529538</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:07)</strong></p><p><a href="https://www.theguardian.com/world/2022/jul/19/glassdoor-ordered-to-reveal-identity-of-negative-reviewers-to-new-zealand-toymaker">Glassdoor ordered to reveal identity of negative reviewers to New Zealand toymaker</a></p><p>A California court has ordered employer-rating site Glassdoor to hand over the identities of users who claimed they had negative experiences working for New Zealand toy giant Zuru.</p><p>In a decision that could prompt unease for online platforms that rely on anonymity to attract candid reviews, Glassdoor was ordered to provide the information so Zuru could undertake defamation proceedings against the reviewers in New Zealand.</p><p> </p><p><strong>Industry News (33:26)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-engaging-in-excessive-data/">TikTok Engaging in Excessive Data Collection</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-set-to-open-london-office/">CISA Set to Open London Office</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-macos-backdoor-communicates/">New MacOS Backdoor Communicates Via Public Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-recovers-500k-north-korean/">DOJ Recovers $500K Paid to North Korean Ransomware Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/legal-concerned-new-uk-digital/">Legal Experts Concerned Over New UK Digital Reform Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/romanian-gozi-virus-extradited-us/">Romanian Man Accused of Distributing Gozi Virus Extradited to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/unpatched-flaws-gps-disrupt/">Unpatched Flaws in Popular GPS Devices Allow Adversaries to Disrupt and Track Vehicles</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-regulator-issues-record-fines/">UK Regulator Issues Record Fines as Financial Crime Surges</a></p><p><a href="https://www.infosecurity-magazine.com/news/magecart-supply-chain-attacks/">Magecart Supply Chain Attacks Hit Hundreds of Restaurants</a></p><p> </p><p><strong>Tweet of the Week (45:58)</strong></p><img src="https://lh5.googleusercontent.com/tD_tQD9L0GTSRe0QjtaYr0blSHGeV6E7lHyXfWROaer69BhXYOTrE16GlwYKXJLUv-WjucNz1Sxq-wGAzl2NqO4X_nF7R5FtbIEt7rhosyEowFcgNbvF0p5cEGjL3p5T2lxJVw01sDaFZ5LzgdhcRNs" /><p><a href="https://twitter.com/hela_luc/status/1549326122067890177">https://twitter.com/hela_luc/status/1549326122067890177</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 22 Jul 2022 18:28:27 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-113-did-you-hear-that-tuKi1d28</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (10:25)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th July 1997: Major Disruption in Sending Most E-Mail Messages.  A programming error temporarily threw the Internet into disarray in a preview of the difficulties that inevitably accompany a world dependent on e-mail, the World Wide Web, and other electronic communications.</p><p>At 2:30 a.m. Eastern Daylight Time, a computer operator in Virginia ignored alarms on the computer that updated Internet address information, leading to problems at several other computers with similar responsibilities. The corruption meant most Internet addresses could not be accessed, resulting in millions of unsent e-mail messages.</p><p>15th July 1999: DilDog of Cult of the Dead Cow confirmed official Back Orifice 2000 CD-ROMs distributed during DEF CON 4 days prior were infected with the destructive CIH virus. Initially, cDc blamed pirated copies as the source, later discovering a duplicating machine had been infected.</p><p><a href="https://twitter.com/todayininfosec/status/1283523195371282434">https://twitter.com/todayininfosec/status/1283523195371282434</a></p><p>19th July 1985: Chase Manhattan Bank discovered a message in one of its computer systems from Lord Flathead. The message said that unless he was given free use of the computer, he would destroy records in the system. Lord Flathead? He founded Myspace 18 years later!</p><p><a href="https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html">https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1153507276629504006">https://twitter.com/todayininfosec/status/1153507276629504006</a></p><p> </p><p><strong>Rant of the Week (16:28)</strong></p><p><a href="https://edition.cnn.com/2022/07/19/politics/secret-service-texts-national-archives/index.html">Secret Service gives thousands of documents to January 6 committee, but hasn't yet recovered potentially missing texts</a></p><p>(CNN)The US Secret Service produced an "initial set of documents" to the House select committee investigating the January 6, 2021, insurrection on Tuesday, in response to a subpoena last week that was issued amid reports of potentially missing text messages from the day of the insurrection.</p><p>However, Tuesday's document production didn't include any of the potentially missing texts from January 5 and 6, 2021, a Secret Service official told CNN. That's because the agency still has not been able to recover any records that were lost during a phone migration around that time, the official said.</p><p>“The USSS didn’t just delete texts after knowing they were evidence in a federal probe; it didn’t just lie about why/how the texts were deleted; the texts were so *professionally* deleted they can’t be recovered.”</p><p><a href="https://twitter.com/SethAbramson/status/1549488007614529538">https://twitter.com/SethAbramson/status/1549488007614529538</a></p><p> </p><p><strong>Billy Big Balls of the Week (24:07)</strong></p><p><a href="https://www.theguardian.com/world/2022/jul/19/glassdoor-ordered-to-reveal-identity-of-negative-reviewers-to-new-zealand-toymaker">Glassdoor ordered to reveal identity of negative reviewers to New Zealand toymaker</a></p><p>A California court has ordered employer-rating site Glassdoor to hand over the identities of users who claimed they had negative experiences working for New Zealand toy giant Zuru.</p><p>In a decision that could prompt unease for online platforms that rely on anonymity to attract candid reviews, Glassdoor was ordered to provide the information so Zuru could undertake defamation proceedings against the reviewers in New Zealand.</p><p> </p><p><strong>Industry News (33:26)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-engaging-in-excessive-data/">TikTok Engaging in Excessive Data Collection</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-set-to-open-london-office/">CISA Set to Open London Office</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-macos-backdoor-communicates/">New MacOS Backdoor Communicates Via Public Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-recovers-500k-north-korean/">DOJ Recovers $500K Paid to North Korean Ransomware Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/legal-concerned-new-uk-digital/">Legal Experts Concerned Over New UK Digital Reform Bill</a></p><p><a href="https://www.infosecurity-magazine.com/news/romanian-gozi-virus-extradited-us/">Romanian Man Accused of Distributing Gozi Virus Extradited to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/unpatched-flaws-gps-disrupt/">Unpatched Flaws in Popular GPS Devices Allow Adversaries to Disrupt and Track Vehicles</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-regulator-issues-record-fines/">UK Regulator Issues Record Fines as Financial Crime Surges</a></p><p><a href="https://www.infosecurity-magazine.com/news/magecart-supply-chain-attacks/">Magecart Supply Chain Attacks Hit Hundreds of Restaurants</a></p><p> </p><p><strong>Tweet of the Week (45:58)</strong></p><img src="https://lh5.googleusercontent.com/tD_tQD9L0GTSRe0QjtaYr0blSHGeV6E7lHyXfWROaer69BhXYOTrE16GlwYKXJLUv-WjucNz1Sxq-wGAzl2NqO4X_nF7R5FtbIEt7rhosyEowFcgNbvF0p5cEGjL3p5T2lxJVw01sDaFZ5LzgdhcRNs" /><p><a href="https://twitter.com/hela_luc/status/1549326122067890177">https://twitter.com/hela_luc/status/1549326122067890177</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50837954" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ffd5aa78-800b-41ba-b641-325c322ac931/audio/2fb91c45-c15a-4a6b-ac08-00f68b5768a3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 113 - Did you hear That?</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5872fbb5-c886-488f-a529-c273c0bbf8d2/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:57</itunes:duration>
      <itunes:summary>This week in InfoSec brings us one of the great hacker names
 
Rant of the Week is a Presidential nod to Enron

Billy Big Balls is a of a ranty persuasion 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is MORE infosec career advice!</itunes:summary>
      <itunes:subtitle>This week in InfoSec brings us one of the great hacker names
 
Rant of the Week is a Presidential nod to Enron

Billy Big Balls is a of a ranty persuasion 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is MORE infosec career advice!</itunes:subtitle>
      <itunes:keywords>joe biden, glassdor vs zuru, careers asdvice, diabetes, secret service, cat, cholesterol, deleting evidence</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">616c3a99-78c6-4b34-82df-1b5b1573cfcd</guid>
      <title>Episode 112 - We Love Our Intern</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:09)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th July 2008: NextGenHacker101 taught us "how to view someone's IP address and connection speed!" Tracer-tee! Naive? Troll? You decide. Painfully hilarious. </p><p><a href="https://youtu.be/SXmv8quf_xM">https://youtu.be/SXmv8quf_xM</a></p><p><a href="https://twitter.com/todayininfosec/status/1414224928413454341">https://twitter.com/todayininfosec/status/1414224928413454341</a>  </p><p>13th July 2001: Code Red Worms its Way into the Internet.  The <a href="http://en.wikipedia.org/wiki/Code_Red_worm">Code Red worm</a> is released onto the Internet. Targeting Microsoft’s IIS web server, Code Red had a significant effect on the Internet due to the speed and efficiency of its spread. Much of this was due to the fact that IIS was often enabled by default on many installations of Windows NT and Windows 2000. However, <a href="http://www.macintouch.com/codered.html">Code Red also affected many other systems with web servers</a>, mostly by way of side-effect, exacerbating the overall impact of the worm, ensuring its place in history among the many malware outbreaks infecting Windows systems in the late 1990’s and early 2000’s.</p><p>7th July 1936: A Whole New Way to Drive a Screw: Several US patents are issued for the Phillips-head screw and screwdriver to inventor <a href="http://en.wikipedia.org/wiki/Henry_F._Phillips">Henry F. Phillips</a>. Phillips founded the Phillips Screw Company to license his patents. One of the first customers was General Motors for its Cadillac assembly-lines. By 1940, 85% of U.S. screw manufacturers had a license for the design.</p><p> </p><p><strong>Rant of the Week (16:00)</strong></p><p><a href="https://www.theverge.com/2022/7/12/23204950/bmw-subscriptions-microtransactions-heated-seats-feature">BMW starts selling heated seat subscriptions for $18 a month</a></p><p>BMW is now selling subscriptions for heated seats in a number of countries — the latest example of the company’s adoption of microtransactions for high-end car features.</p><p>A monthly subscription to heat your BMW’s front seats costs roughly $18, with options to subscribe for a year ($180), three years ($300), or pay for “unlimited” access for $415.</p><p>It’s not clear exactly when BMW started offering this feature as a subscription, or in which countries, but a number of outlets this week reported <a href="https://jalopnik.com/bmw-is-trying-again-with-subscription-based-access-to-l-1849165434">spotting its launch</a> in South Korea.</p><p>BMW has slowly been putting features behind subscriptions since 2020, and heated seats subs are now available in BMW’s digital stores in countries including the <a href="https://www.bmw.co.uk/en/shop/ls/cp/connected-drive">UK</a>, <a href="https://www.bmw.at/de/shop/ls/cp/connected-drive">Germany</a>, <a href="https://www.bmw.co.nz/en/shop/ls/cp/connected-drive">New Zealand</a>, and <a href="https://www.bmw.co.za/en/shop/ls/cp/connected-drive">South Africa</a>. It doesn’t, however, seem to be an option in the US — yet.</p><p> </p><p><strong>Billy Big Balls of the Week (26:48)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-stole-620-million-from-axie-infinity-via-fake-job-interviews/">Hackers stole $620 million from Axie Infinity via fake job interviews</a></p><p>The hack that caused Axie Infinity losses of $620 million in crypto started with a fake job offer from North Korean hackers to one of the game’s developers.</p><p>The attack <a href="https://www.bleepingcomputer.com/news/cryptocurrency/620-million-in-crypto-stolen-from-axie-infinitys-ronin-bridge/">happened in March 2022</a> and pushed into the ground the then massively popular and quickly-growing game from Sky Mavis.</p><p>By April 2022, the FBI was able to link the attack to the Lazarus and APT38 <a href="https://www.bleepingcomputer.com/news/security/fbi-links-largest-crypto-hack-ever-to-north-korean-hackers/">hackers</a>, two groups who are often involved in cryptocurrency heists for the North Korean government.</p><p>In a recent <a href="https://www.theblock.co/post/156038/how-a-fake-job-offer-took-down-the-worlds-most-popular-crypto-game">report</a> from news publication on digital assets The Block, sources with knowledge about the attack said that the threat actors contacted staff at Sky Mavis over LinkedIn, posing as a company looking to hire them.</p><p>One senior engineer at Axie Infinity showed interest in the fake job offer, due to the very generous salary, and went through multiple rounds of interviews.</p><p>At one point, the engineer received a PDF file with details about the job. However, the document was the hackers' way into the Ronin systems - the Ethereum-linked sidechain that supports the Axie Infinity non-fungible token-based online video game.</p><p>The employee downloaded and opened the file on the company’s computer, initiating an infection chain that enabled the hackers to penetrate Ronin’s systems and corrupt four token validators and one Axie DAO validator.</p><p> </p><p><strong>Industry News (32:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/majority-limitations-social-media/">Majority Want Limitations on Social Media Content</a></p><p><a href="https://www.infosecurity-magazine.com/news/spike-amazon-prime-scams/">Spike in Amazon Prime Scams Expected</a></p><p><a href="https://www.infosecurity-magazine.com/news/aerojet-rocketdyne-settlement/">Aerojet Rocketdyne Pays $9m Settlement Over Whistleblower Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurers-risk-assessment/">Cyber Insurers Looking for New Risk Assessment Models</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-phishing-campaign-mfa/">Microsoft Details How Phishing Campaign Bypassed MFA</a></p><p><a href="https://www.infosecurity-magazine.com/news/havanacrypt-ransomware-fake-google/">HavanaCrypt Ransomware Masquerades as a Fake Google Update</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-industries-iiot-ot/">Critical Industries Failing at IIoT/OT Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-review-government-messaging/">ICO Calls for Review of Government “Private” Messaging</a></p><p><a href="https://www.infosecurity-magazine.com/news/state-sponsored-hackers-journalists/">State-Sponsored Hackers Targeting Journalists</a></p><p> </p><p><strong>Tweet of the Week (38:48)</strong></p><img src="https://lh4.googleusercontent.com/B0xUtx9SFWDtT5kwcMcwdstZKvy0m-CKUlz6q8FzlvieAGXR26u_-hvE3BQaLxLwvEMBC3gtLoCaJd9eD7T8GQh0oNDd7tDPxzwh4P3wH1Z9C3E0rQ0Tg6tu4uyabagtk0sh4v-JMy1wfKVLMS4" /><p><a href="https://twitter.com/cyb3rops/status/1547263760678756353">https://twitter.com/cyb3rops/status/1547263760678756353</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 15 Jul 2022 17:35:12 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-112-we-love-our-intern-Aga4phn5</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:09)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>12th July 2008: NextGenHacker101 taught us "how to view someone's IP address and connection speed!" Tracer-tee! Naive? Troll? You decide. Painfully hilarious. </p><p><a href="https://youtu.be/SXmv8quf_xM">https://youtu.be/SXmv8quf_xM</a></p><p><a href="https://twitter.com/todayininfosec/status/1414224928413454341">https://twitter.com/todayininfosec/status/1414224928413454341</a>  </p><p>13th July 2001: Code Red Worms its Way into the Internet.  The <a href="http://en.wikipedia.org/wiki/Code_Red_worm">Code Red worm</a> is released onto the Internet. Targeting Microsoft’s IIS web server, Code Red had a significant effect on the Internet due to the speed and efficiency of its spread. Much of this was due to the fact that IIS was often enabled by default on many installations of Windows NT and Windows 2000. However, <a href="http://www.macintouch.com/codered.html">Code Red also affected many other systems with web servers</a>, mostly by way of side-effect, exacerbating the overall impact of the worm, ensuring its place in history among the many malware outbreaks infecting Windows systems in the late 1990’s and early 2000’s.</p><p>7th July 1936: A Whole New Way to Drive a Screw: Several US patents are issued for the Phillips-head screw and screwdriver to inventor <a href="http://en.wikipedia.org/wiki/Henry_F._Phillips">Henry F. Phillips</a>. Phillips founded the Phillips Screw Company to license his patents. One of the first customers was General Motors for its Cadillac assembly-lines. By 1940, 85% of U.S. screw manufacturers had a license for the design.</p><p> </p><p><strong>Rant of the Week (16:00)</strong></p><p><a href="https://www.theverge.com/2022/7/12/23204950/bmw-subscriptions-microtransactions-heated-seats-feature">BMW starts selling heated seat subscriptions for $18 a month</a></p><p>BMW is now selling subscriptions for heated seats in a number of countries — the latest example of the company’s adoption of microtransactions for high-end car features.</p><p>A monthly subscription to heat your BMW’s front seats costs roughly $18, with options to subscribe for a year ($180), three years ($300), or pay for “unlimited” access for $415.</p><p>It’s not clear exactly when BMW started offering this feature as a subscription, or in which countries, but a number of outlets this week reported <a href="https://jalopnik.com/bmw-is-trying-again-with-subscription-based-access-to-l-1849165434">spotting its launch</a> in South Korea.</p><p>BMW has slowly been putting features behind subscriptions since 2020, and heated seats subs are now available in BMW’s digital stores in countries including the <a href="https://www.bmw.co.uk/en/shop/ls/cp/connected-drive">UK</a>, <a href="https://www.bmw.at/de/shop/ls/cp/connected-drive">Germany</a>, <a href="https://www.bmw.co.nz/en/shop/ls/cp/connected-drive">New Zealand</a>, and <a href="https://www.bmw.co.za/en/shop/ls/cp/connected-drive">South Africa</a>. It doesn’t, however, seem to be an option in the US — yet.</p><p> </p><p><strong>Billy Big Balls of the Week (26:48)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-stole-620-million-from-axie-infinity-via-fake-job-interviews/">Hackers stole $620 million from Axie Infinity via fake job interviews</a></p><p>The hack that caused Axie Infinity losses of $620 million in crypto started with a fake job offer from North Korean hackers to one of the game’s developers.</p><p>The attack <a href="https://www.bleepingcomputer.com/news/cryptocurrency/620-million-in-crypto-stolen-from-axie-infinitys-ronin-bridge/">happened in March 2022</a> and pushed into the ground the then massively popular and quickly-growing game from Sky Mavis.</p><p>By April 2022, the FBI was able to link the attack to the Lazarus and APT38 <a href="https://www.bleepingcomputer.com/news/security/fbi-links-largest-crypto-hack-ever-to-north-korean-hackers/">hackers</a>, two groups who are often involved in cryptocurrency heists for the North Korean government.</p><p>In a recent <a href="https://www.theblock.co/post/156038/how-a-fake-job-offer-took-down-the-worlds-most-popular-crypto-game">report</a> from news publication on digital assets The Block, sources with knowledge about the attack said that the threat actors contacted staff at Sky Mavis over LinkedIn, posing as a company looking to hire them.</p><p>One senior engineer at Axie Infinity showed interest in the fake job offer, due to the very generous salary, and went through multiple rounds of interviews.</p><p>At one point, the engineer received a PDF file with details about the job. However, the document was the hackers' way into the Ronin systems - the Ethereum-linked sidechain that supports the Axie Infinity non-fungible token-based online video game.</p><p>The employee downloaded and opened the file on the company’s computer, initiating an infection chain that enabled the hackers to penetrate Ronin’s systems and corrupt four token validators and one Axie DAO validator.</p><p> </p><p><strong>Industry News (32:08)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/majority-limitations-social-media/">Majority Want Limitations on Social Media Content</a></p><p><a href="https://www.infosecurity-magazine.com/news/spike-amazon-prime-scams/">Spike in Amazon Prime Scams Expected</a></p><p><a href="https://www.infosecurity-magazine.com/news/aerojet-rocketdyne-settlement/">Aerojet Rocketdyne Pays $9m Settlement Over Whistleblower Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurers-risk-assessment/">Cyber Insurers Looking for New Risk Assessment Models</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-phishing-campaign-mfa/">Microsoft Details How Phishing Campaign Bypassed MFA</a></p><p><a href="https://www.infosecurity-magazine.com/news/havanacrypt-ransomware-fake-google/">HavanaCrypt Ransomware Masquerades as a Fake Google Update</a></p><p><a href="https://www.infosecurity-magazine.com/news/critical-industries-iiot-ot/">Critical Industries Failing at IIoT/OT Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-review-government-messaging/">ICO Calls for Review of Government “Private” Messaging</a></p><p><a href="https://www.infosecurity-magazine.com/news/state-sponsored-hackers-journalists/">State-Sponsored Hackers Targeting Journalists</a></p><p> </p><p><strong>Tweet of the Week (38:48)</strong></p><img src="https://lh4.googleusercontent.com/B0xUtx9SFWDtT5kwcMcwdstZKvy0m-CKUlz6q8FzlvieAGXR26u_-hvE3BQaLxLwvEMBC3gtLoCaJd9eD7T8GQh0oNDd7tDPxzwh4P3wH1Z9C3E0rQ0Tg6tu4uyabagtk0sh4v-JMy1wfKVLMS4" /><p><a href="https://twitter.com/cyb3rops/status/1547263760678756353">https://twitter.com/cyb3rops/status/1547263760678756353</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="41564694" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/509ea93d-0991-435a-aa67-35c37901f8e7/audio/0ddacfaf-4676-4ece-9443-7325256c9646/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 112 - We Love Our Intern</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c969ef05-771a-4d37-9da2-ca45e2b64806/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:17</itunes:duration>
      <itunes:summary>This week in InfoSec teaches us a whole new way to screw
 
Rant of the Week takes microtransactions to a whole new level of ridiculousness

Billy Big Balls is the most expensive job someone has ever applied for
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is something very exciting...
</itunes:summary>
      <itunes:subtitle>This week in InfoSec teaches us a whole new way to screw
 
Rant of the Week takes microtransactions to a whole new level of ridiculousness

Billy Big Balls is the most expensive job someone has ever applied for
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is something very exciting...
</itunes:subtitle>
      <itunes:keywords>sky mavis, lazarus, apt38, bmw cash grab, bmw, kitchen nightmares, bmw easyjet</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">701674e5-2677-4fd6-b903-bc75ca0b1cf1</guid>
      <title>Episode 111 - Jav Is In The Top Four</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th July 2011: Space Rogue broadcast the final HNNCast. And with that, the Hacker News Network came to an end. Final broadcast: <a href="https://www.facebook.com/78983739181/videos/10150254277486182/">https://www.facebook.com/78983739181/videos/10150254277486182/</a> <br /><a href="https://youtu.be/UdKyDqU1p-4">https://youtu.be/UdKyDqU1p-4</a></p><p>1st July 1979: The first <a href="http://en.wikipedia.org/wiki/Walkman">Sony Walkman</a>, the TPS-L2, goes on sale in Japan. It would go on sale in the US about a year later. By allowing owners to carry their personal music with them, the Walkman and their iconic headphones introduce a revolution in listening habits and popular culture at large.</p><p> </p><p><strong>Rant of the Week (17:12)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/">Rogue HackerOne employee steals bug reports to sell on the side</a></p><p>A HackerOne employee stole vulnerability reports submitted through the bug bounty platform and disclosed them to affected customers to claim financial rewards.</p><p>The rogue worker had contacted about half a dozen HackerOne customers and collected bounties “in a handful of disclosures,” the company said on Friday.</p><p>HackerOne is a platform for coordinating vulnerability disclosures and intermediating monetary rewards for the bug hunter submitting the security reports.</p><p>On June 22, HackerOne responded to a customer request to investigate a suspicious vulnerability disclosure through an off-platform communication channel from someone using the handle “rzlr.”</p><p>The customer had noticed that the same security issue had been previously submitted through HackerOne.</p><p>Bug collisions, where multiple researchers find and report the same security issue, are frequent; in this case, the genuine report and the one from the threat actor shared obvious similarities that prompted a closer look.</p><p>HackerOne’s investigation determined that one of its employees had access to the platform for over two months, since they joined the company on April 4th until June 23, and contacted seven companies to report vulnerabilities already disclosed through its system.</p><p> </p><p><strong>Billy Big Balls of the Week (23:42)</strong></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-s-new-lockdown-mode-defends-against-government-spyware/">Apple’s new Lockdown Mode defends against government spyware</a></p><p>Apple announced that a new security feature known as Lockdown Mode will roll out with iOS 16, iPadOS 16, and macOS Ventura to protect high-risk individuals like human rights defenders, journalists, and dissidents against targeted spyware attacks.</p><p>Once enabled, the Lockdown Mode will provide Apple customers with messaging, web browsing, and connectivity protections designed to block mercenary spyware (like NSO Group's Pegasus) used by government-backed hackers to monitor their Apple devices after infecting them with malware.</p><p>Attackers' attempts to compromise Apple devices using zero-click exploits targeting messaging apps such as WhatsApp and Facetime or web browsers will get automatically blocked, seeing that vulnerable features like link previews will be disabled.</p><p> </p><p><strong>Industry News (33:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-ceo-addresses-us-security/">TikTok CEO Addresses US Security Concern</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-supply-chain-attack/">Software Supply Chain Attack Hits Thousands of Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/hive-ransomware-upgraded-rust/">Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt-bitter-attack-military/">APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-us-maui-ransomware/">North Korean Hackers Target US Health Providers With 'Maui' Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/marriott-plays-down-20gb-data/">Marriott Plays Down 20GB Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-mi5-bosses-warn-massive-china/">FBI and MI5 Bosses Warn of “Massive” China Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-updates-windows/">Microsoft Updates Windows 11 Subsystem for Android to Introduce Support For VPN-Assigned IPs</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-lockdown-mode-protect-spyware/">Apple Announces 'Lockdown Mode' to Protect Journalists, Human Rights Workers From Spyware</a></p><p> </p><p>Tweet of the Week (44:33)</p><img src="https://lh3.googleusercontent.com/oYpg-Ug2xEPS9JsQpzvAtO1WFVWloEMTN2_rFoRGA-7IV_4nAEkW0pb9iXSOrie4cWcySuN-ps2iuy8yZno-_6nnBN5ce6br__XYRamnXrSsdPm7VMokN3EV1CygTt9ypb9EQvqG7rRLzvr-SkA" /><p><a href="https://twitter.com/alxbrsn/status/1544707673282723840">https://twitter.com/alxbrsn/status/1544707673282723840</a></p><p><a href="https://siliconangle.com/2012/07/01/ubisoft-accidentally-leaks-hundreds-of-customer-e-mail-addresses-in-watch-dogs-marketing-snafu/">Ubisoft Accidentally Leaks Hundreds of Customer E-mail Addresses in Watch Dogs Marketing Snafu</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Jul 2022 18:21:58 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-111-jav-is-in-the-top-four-x1d3a_MJ</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>8th July 2011: Space Rogue broadcast the final HNNCast. And with that, the Hacker News Network came to an end. Final broadcast: <a href="https://www.facebook.com/78983739181/videos/10150254277486182/">https://www.facebook.com/78983739181/videos/10150254277486182/</a> <br /><a href="https://youtu.be/UdKyDqU1p-4">https://youtu.be/UdKyDqU1p-4</a></p><p>1st July 1979: The first <a href="http://en.wikipedia.org/wiki/Walkman">Sony Walkman</a>, the TPS-L2, goes on sale in Japan. It would go on sale in the US about a year later. By allowing owners to carry their personal music with them, the Walkman and their iconic headphones introduce a revolution in listening habits and popular culture at large.</p><p> </p><p><strong>Rant of the Week (17:12)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/">Rogue HackerOne employee steals bug reports to sell on the side</a></p><p>A HackerOne employee stole vulnerability reports submitted through the bug bounty platform and disclosed them to affected customers to claim financial rewards.</p><p>The rogue worker had contacted about half a dozen HackerOne customers and collected bounties “in a handful of disclosures,” the company said on Friday.</p><p>HackerOne is a platform for coordinating vulnerability disclosures and intermediating monetary rewards for the bug hunter submitting the security reports.</p><p>On June 22, HackerOne responded to a customer request to investigate a suspicious vulnerability disclosure through an off-platform communication channel from someone using the handle “rzlr.”</p><p>The customer had noticed that the same security issue had been previously submitted through HackerOne.</p><p>Bug collisions, where multiple researchers find and report the same security issue, are frequent; in this case, the genuine report and the one from the threat actor shared obvious similarities that prompted a closer look.</p><p>HackerOne’s investigation determined that one of its employees had access to the platform for over two months, since they joined the company on April 4th until June 23, and contacted seven companies to report vulnerabilities already disclosed through its system.</p><p> </p><p><strong>Billy Big Balls of the Week (23:42)</strong></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-s-new-lockdown-mode-defends-against-government-spyware/">Apple’s new Lockdown Mode defends against government spyware</a></p><p>Apple announced that a new security feature known as Lockdown Mode will roll out with iOS 16, iPadOS 16, and macOS Ventura to protect high-risk individuals like human rights defenders, journalists, and dissidents against targeted spyware attacks.</p><p>Once enabled, the Lockdown Mode will provide Apple customers with messaging, web browsing, and connectivity protections designed to block mercenary spyware (like NSO Group's Pegasus) used by government-backed hackers to monitor their Apple devices after infecting them with malware.</p><p>Attackers' attempts to compromise Apple devices using zero-click exploits targeting messaging apps such as WhatsApp and Facetime or web browsers will get automatically blocked, seeing that vulnerable features like link previews will be disabled.</p><p> </p><p><strong>Industry News (33:14)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-ceo-addresses-us-security/">TikTok CEO Addresses US Security Concern</a></p><p><a href="https://www.infosecurity-magazine.com/news/software-supply-chain-attack/">Software Supply Chain Attack Hits Thousands of Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/hive-ransomware-upgraded-rust/">Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption</a></p><p><a href="https://www.infosecurity-magazine.com/news/apt-bitter-attack-military/">APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-us-maui-ransomware/">North Korean Hackers Target US Health Providers With 'Maui' Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/marriott-plays-down-20gb-data/">Marriott Plays Down 20GB Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-mi5-bosses-warn-massive-china/">FBI and MI5 Bosses Warn of “Massive” China Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-updates-windows/">Microsoft Updates Windows 11 Subsystem for Android to Introduce Support For VPN-Assigned IPs</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-lockdown-mode-protect-spyware/">Apple Announces 'Lockdown Mode' to Protect Journalists, Human Rights Workers From Spyware</a></p><p> </p><p>Tweet of the Week (44:33)</p><img src="https://lh3.googleusercontent.com/oYpg-Ug2xEPS9JsQpzvAtO1WFVWloEMTN2_rFoRGA-7IV_4nAEkW0pb9iXSOrie4cWcySuN-ps2iuy8yZno-_6nnBN5ce6br__XYRamnXrSsdPm7VMokN3EV1CygTt9ypb9EQvqG7rRLzvr-SkA" /><p><a href="https://twitter.com/alxbrsn/status/1544707673282723840">https://twitter.com/alxbrsn/status/1544707673282723840</a></p><p><a href="https://siliconangle.com/2012/07/01/ubisoft-accidentally-leaks-hundreds-of-customer-e-mail-addresses-in-watch-dogs-marketing-snafu/">Ubisoft Accidentally Leaks Hundreds of Customer E-mail Addresses in Watch Dogs Marketing Snafu</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48436360" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d95363cc-d0a3-4477-aaad-e5869916a912/audio/78e619df-c723-46ea-ae32-1eb2692cac07/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 111 - Jav Is In The Top Four</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0ae6c0a8-57f7-4d26-8cfe-51c19b2cae65/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:27</itunes:duration>
      <itunes:summary>This week in InfoSec reminds us of L0pht Heavy Industries
 
Rant of the Week brings us a brazen employee

Billy Big Balls is a game changer for Apple device owners
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the story of a 10 year email thread</itunes:summary>
      <itunes:subtitle>This week in InfoSec reminds us of L0pht Heavy Industries
 
Rant of the Week brings us a brazen employee

Billy Big Balls is a game changer for Apple device owners
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the story of a 10 year email thread</itunes:subtitle>
      <itunes:keywords>spacerogue, lockdown mode, hackerone, ubisoft, hacker news network, sony walkman, tik tok</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">812b876e-e189-4772-b4c2-771165c9baa6</guid>
      <title>Episode 110 - Andy is Hot Hot Hot</title>
      <description><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>28th June 2000: The Pikachu virus began spreading. It is believed to be the first virus targeting children, incorporating Pikachu from the Pokémon series. </p><p><a href="https://en.m.wikipedia.org/wiki/Pikachu_virus">https://en.m.wikipedia.org/wiki/Pikachu_virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1277433652519899137">https://twitter.com/todayininfosec/status/1277433652519899137</a></p><p>29th June 2007: Nearly 6 months after it was introduced, Apple’s highly-anticipated <a href="http://en.wikipedia.org/wiki/IPhone_(original)">iPhone</a> goes on sale. Generally downplayed by Old Word Technology pundits after its introduction, the iPhone was greeted by long lines of buyers around the country on that first day. Quickly becoming an overnight phenomenon, one million iPhones were sold in only 74 days. Since those early days, the ensuing iPhone models have continued to set sales records and have completely changed not only the smartphone and technology industries, but the world as well.</p><p>26th June 1997: The US Supreme Court ruled the Communications Decency Act unconstitutional on a 7-2 vote. The act, passed by both houses of Congress, sought to control the content of the Internet in an effort to keep pornography from minors. In an opinion written by Justice John Paul Stevens, the Supreme Court ruled the act a violation of free speech as guaranteed by the US Constitution. </p><p> </p><p><strong>Rant of the Week</strong></p><p>Quick mention just to get the blood boiling: <a href="https://www.theregister.com/2022/06/28/india_directions_deadline_logging/">India extends deadline for compliance with infosec logging rules by 90 days</a></p><p>India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.</p><p>The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.</p><p><a href="https://www.theregister.com/2022/06/29/fbi_deepfake_job_applicant_warning/">FBI warning: Crooks are using deepfake videos in interviews for remote gigs</a></p><p><a href="https://www.ic3.gov/Media/Y2022/PSA220628">Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions</a></p><p>The US FBI issued a warning on Tuesday that it was has received increasing numbers of complaints relating to the use of deepfake videos during interviews for tech jobs that involve access to sensitive systems and information.</p><p>The deepfake videos include a video image or recording convincingly manipulated to misrepresent someone as the "applicant" for jobs that can be performed remotely. The Bureau reports the scam has been tried on jobs for developers, "database, and software-related job functions". Some of the targeted jobs required access to customers' personal information, financial data, large databases and/or proprietary information.</p><p>"In these interviews, the actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking. At times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually," said the FBI in a <a href="https://www.ic3.gov/Media/Y2022/PSA220628">public service announcement</a>.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/06/29/avaya_piracy_doj_fbi/">Trio accused of selling $88m of pirated Avaya licenses</a></p><p>Rogue insider generated keys, resold them to blow the cash on gold, crypto, and more, prosecutors say</p><p>Three people accused of selling pirate software licenses worth more than $88 million have been charged with fraud.</p><p>The software in question is built and sold by US-based Avaya, which provides, among other things, a telephone system called IP Office to small and medium-sized businesses. To add phones and enable features such as voicemail, customers buy the necessary software licenses from an Avaya reseller or distributor. These licenses are generated by the vendor, and once installed, the features are activated.</p><p>In charges unsealed on Tuesday, it is alleged Brad Pearce, a 46-year-old long-time Avaya customer service worker, used his system administrator access to generate license keys tens of millions of dollars without permission. Each license could sell for $100 to thousands of dollars.</p><p>Pearce, of Oklahoma, then sold those licenses to Jason Hines, 42, of New Jersey, and others who sold them onto resellers and customers worldwide, prosecutors claimed. Pearce's wife, Dusti, 44, is accused of handling the finances and accounting in this alleged criminal caper.</p><p>On top of this, Pearce is accused of using his admin privileges to get into internal accounts of former Avaya workers to generate more software keys. He allegedly covered up his tracks by altering information in the accounts over many years.</p><p>Great balls but the bigger balls was from this article on the World Economic Forum:</p><p><a href="https://www.weforum.org/agenda/2022/06/cybersecurity-protect-your-business/">How aligning cybersecurity with strategic objectives can protect your business</a></p><p>All filler with no thriller!</p><p>Cybersecurity is not a technical problem, it’s a business problem</p><p>Bridge the communications divide</p><p>Relationships may be damaged, not broken</p><p>Culture of Cybersecurity!</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/snoopers-charter-ruled-partially/">Snoopers’ Charter Ruled Partially Unlawful</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-wiltshire-farm-foods/">Ransomware Suspected in Wiltshire Farm Foods Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-beware-deepfakes-remote-jobs/">FBI: Beware Deepfakes Used to Apply for Remote Jobs</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-fixes-flaw-photos-android/">Amazon Fixes High Severity Vulnerability in Amazon Photos Android App</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-cops-bust/">Ukrainian Cops Bust Multimillion-Dollar Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/arrest-metaverse-investment-fraud/">Nevadan Arrested for Alleged $45m Metaverse Investment Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/infostealing-targeted-home-workers/">Info-Stealing Campaign Targeted Home Workers for Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-suspected-harmony-hack/">North Korea's Lazarus Group Suspected of $100m Harmony Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-worker-guilty-netwalker/">Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/R35cDki_lcdOU7ymQOXsFf3-SidrZPySO-dvc1mRCgNfiwkiaayENks2tYkY-TWmAEvDC_U10Wc2QlE4qbztQNyw2Px2p2-1wyZtgBGjVyA_qJ_SP57bKFj6GqOCw9OSLWUwRqGKSZ_u3pwdpg" /><p><a href="https://twitter.com/Cannibal/status/1542597532869570560">https://twitter.com/Cannibal/status/1542597532869570560</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 1 Jul 2022 17:48:26 +0000</pubDate>
      <author>thom@tl2security.com (Andy agnes, javvad malik, thom langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-110-andy-is-hot-hot-hot-2qCN9a84</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>28th June 2000: The Pikachu virus began spreading. It is believed to be the first virus targeting children, incorporating Pikachu from the Pokémon series. </p><p><a href="https://en.m.wikipedia.org/wiki/Pikachu_virus">https://en.m.wikipedia.org/wiki/Pikachu_virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1277433652519899137">https://twitter.com/todayininfosec/status/1277433652519899137</a></p><p>29th June 2007: Nearly 6 months after it was introduced, Apple’s highly-anticipated <a href="http://en.wikipedia.org/wiki/IPhone_(original)">iPhone</a> goes on sale. Generally downplayed by Old Word Technology pundits after its introduction, the iPhone was greeted by long lines of buyers around the country on that first day. Quickly becoming an overnight phenomenon, one million iPhones were sold in only 74 days. Since those early days, the ensuing iPhone models have continued to set sales records and have completely changed not only the smartphone and technology industries, but the world as well.</p><p>26th June 1997: The US Supreme Court ruled the Communications Decency Act unconstitutional on a 7-2 vote. The act, passed by both houses of Congress, sought to control the content of the Internet in an effort to keep pornography from minors. In an opinion written by Justice John Paul Stevens, the Supreme Court ruled the act a violation of free speech as guaranteed by the US Constitution. </p><p> </p><p><strong>Rant of the Week</strong></p><p>Quick mention just to get the blood boiling: <a href="https://www.theregister.com/2022/06/28/india_directions_deadline_logging/">India extends deadline for compliance with infosec logging rules by 90 days</a></p><p>India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.</p><p>The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.</p><p><a href="https://www.theregister.com/2022/06/29/fbi_deepfake_job_applicant_warning/">FBI warning: Crooks are using deepfake videos in interviews for remote gigs</a></p><p><a href="https://www.ic3.gov/Media/Y2022/PSA220628">Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions</a></p><p>The US FBI issued a warning on Tuesday that it was has received increasing numbers of complaints relating to the use of deepfake videos during interviews for tech jobs that involve access to sensitive systems and information.</p><p>The deepfake videos include a video image or recording convincingly manipulated to misrepresent someone as the "applicant" for jobs that can be performed remotely. The Bureau reports the scam has been tried on jobs for developers, "database, and software-related job functions". Some of the targeted jobs required access to customers' personal information, financial data, large databases and/or proprietary information.</p><p>"In these interviews, the actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking. At times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually," said the FBI in a <a href="https://www.ic3.gov/Media/Y2022/PSA220628">public service announcement</a>.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/06/29/avaya_piracy_doj_fbi/">Trio accused of selling $88m of pirated Avaya licenses</a></p><p>Rogue insider generated keys, resold them to blow the cash on gold, crypto, and more, prosecutors say</p><p>Three people accused of selling pirate software licenses worth more than $88 million have been charged with fraud.</p><p>The software in question is built and sold by US-based Avaya, which provides, among other things, a telephone system called IP Office to small and medium-sized businesses. To add phones and enable features such as voicemail, customers buy the necessary software licenses from an Avaya reseller or distributor. These licenses are generated by the vendor, and once installed, the features are activated.</p><p>In charges unsealed on Tuesday, it is alleged Brad Pearce, a 46-year-old long-time Avaya customer service worker, used his system administrator access to generate license keys tens of millions of dollars without permission. Each license could sell for $100 to thousands of dollars.</p><p>Pearce, of Oklahoma, then sold those licenses to Jason Hines, 42, of New Jersey, and others who sold them onto resellers and customers worldwide, prosecutors claimed. Pearce's wife, Dusti, 44, is accused of handling the finances and accounting in this alleged criminal caper.</p><p>On top of this, Pearce is accused of using his admin privileges to get into internal accounts of former Avaya workers to generate more software keys. He allegedly covered up his tracks by altering information in the accounts over many years.</p><p>Great balls but the bigger balls was from this article on the World Economic Forum:</p><p><a href="https://www.weforum.org/agenda/2022/06/cybersecurity-protect-your-business/">How aligning cybersecurity with strategic objectives can protect your business</a></p><p>All filler with no thriller!</p><p>Cybersecurity is not a technical problem, it’s a business problem</p><p>Bridge the communications divide</p><p>Relationships may be damaged, not broken</p><p>Culture of Cybersecurity!</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/snoopers-charter-ruled-partially/">Snoopers’ Charter Ruled Partially Unlawful</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-wiltshire-farm-foods/">Ransomware Suspected in Wiltshire Farm Foods Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-beware-deepfakes-remote-jobs/">FBI: Beware Deepfakes Used to Apply for Remote Jobs</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-fixes-flaw-photos-android/">Amazon Fixes High Severity Vulnerability in Amazon Photos Android App</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-cops-bust/">Ukrainian Cops Bust Multimillion-Dollar Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/arrest-metaverse-investment-fraud/">Nevadan Arrested for Alleged $45m Metaverse Investment Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/infostealing-targeted-home-workers/">Info-Stealing Campaign Targeted Home Workers for Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-suspected-harmony-hack/">North Korea's Lazarus Group Suspected of $100m Harmony Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-worker-guilty-netwalker/">Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/R35cDki_lcdOU7ymQOXsFf3-SidrZPySO-dvc1mRCgNfiwkiaayENks2tYkY-TWmAEvDC_U10Wc2QlE4qbztQNyw2Px2p2-1wyZtgBGjVyA_qJ_SP57bKFj6GqOCw9OSLWUwRqGKSZ_u3pwdpg" /><p><a href="https://twitter.com/Cannibal/status/1542597532869570560">https://twitter.com/Cannibal/status/1542597532869570560</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="63419581" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0a6cd0ae-9fcc-4720-be6c-0e23acdf626f/audio/abcc4f7f-94b8-4482-82fb-77dae747d13e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 110 - Andy is Hot Hot Hot</itunes:title>
      <itunes:author>Andy agnes, javvad malik, thom langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9d17fd79-9e0f-4fdc-bc6b-2ae0893832e0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:02</itunes:duration>
      <itunes:summary>This week in InfoSec talks about the phone that changed everything
 
Rant of the Week brings us the latest on remote working

Billy Big Balls talks of a group of people playing fast and loose with company assets
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reminisces about groundhog day</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about the phone that changed everything
 
Rant of the Week brings us the latest on remote working

Billy Big Balls talks of a group of people playing fast and loose with company assets
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reminisces about groundhog day</itunes:subtitle>
      <itunes:keywords>india cyberlaw, avaya, jurassic park, deepface, fake nose</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce51aed9-48e1-438f-8daa-ad890d2f6726</guid>
      <title>Episode 109 - The Helium Breather</title>
      <description><![CDATA[<p><strong>This week in InfoSec (12:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th June 1998: The NSA published the Skipjack encryption algorithm used by the Clipper chip, after the algorithm was declassified.</p><p><a href="https://en.wikipedia.org/wiki/Clipper_chip">Clipper Chip</a></p><p><a href="https://twitter.com/todayininfosec/status/1275882063753699328">https://twitter.com/todayininfosec/status/1275882063753699328</a></p><p>24th June 2012: In the wake of the Flashback botnet which targeted Macs, Apple removed a statement from its website bragging that OS X isn't susceptible to viruses.</p><p><a href="https://www.macworld.com/article/669702/apple-removes-claim-that-macs-dont-get-pc-viruses.html">Apple removes claim that ‘Macs don’t get PC viruses’</a></p><p><a href="https://twitter.com/todayininfosec/status/1275969494330949632">https://twitter.com/todayininfosec/status/1275969494330949632</a></p><p> </p><p><strong>Rant of the Week (19:12)</strong></p><p><a href="https://www.techradar.com/news/government-employees-banned-from-using-vpns-in-india">Government employees banned from using VPNs in India</a></p><p>In the latest chapter of India's ongoing battle against online privacy software, government employees are now barred from using third-party VPN services.</p><p>The new directive came following the decision of some of the best VPNs to shut down their Indian servers amid <a href="https://www.techradar.com/features/this-is-how-new-indian-privacy-law-will-have-negative-impact-on-peoples-privacy">privacy concerns over new data law</a>. So far, ExpressVPN, Surfshark and NordVPN have all announced they will physically leave the country before CERT-in directives come into force on June 27.</p><p>All this was discovered because:</p><p><a href="https://www.theregister.com/2022/06/20/indian_government_infosec_guidance_leaks/">Indian government issues confidential infosec guidance to staff – who leak it</a></p><p>India's government last week issued confidential information security guidelines that calls on the 30 million plus workers it employs to adopt better work practices – and as if to prove a point, the document quickly leaked on a government website.</p><p>The document, and the measures it contains, suggest infosec could be somewhat loose across India's government sector.</p><p>"The increasing adoption and use of ICT has increased the attack surface and threat perception to government, due to lack of proper cyber security practices followed on the ground," the document opens.</p><p> </p><p><strong>Billy Big Balls of the Week (28:13)</strong></p><p><a href="https://www.theregister.com/2022/06/23/amazon_alexa_voice_mimicry/">Amazon can't channel the dead, but its deepfake voices take a close second</a></p><p>In the latest episode of Black Mirror, a vast megacorp sells AI software that learns to mimic the voice of a deceased woman whose husband sits weeping over a smart speaker, listening to her dulcet tones.</p><p>Only joking – it's Amazon, and this is real life. The experimental feature of the company's virtual assistant, Alexa, was announced at an Amazon conference in Las Vegas on Wednesday.</p><p>Rohit Prasad, head scientist for Alexa AI, described the tech as a means to build trust between human and machine, enabling Alexa to "make the memories last" when "so many of us have lost someone we love" during the pandemic.</p><p>In an explanatory video, Amazon showed a child asking: "Alexa, can Grandma finish reading me The Wizard of Oz?" at which point the assistant's normally artificial voice shifted gears into a softer, more natural timbre. The point being that it's supposed to convincingly sound like the kid's grandma.</p><p> </p><p><strong>Industry News (36:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/brata-android-malware-classified/">BRATA Android Malware Group Now Classified As Advanced Persistent Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-convicted-capital-one-breach/">Former Amazon Worker Convicted of Capital One Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/chrome-extensions-track-users/">Google Chrome Extensions Could Be Used to Track Users Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/dfscoerce-attack-enables-windows/">New DFSCoerce NTLM Relay Attack Enables Hackers to Perform Windows Domain Takeover</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloudflare-outage-offline-websites/">Cloudflare Outage Knocks Hundreds of Websites Offline</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-bank-data-breach-impacts-15/">US Bank Data Breach Impacts Over 1.5 Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/cops-dismantle-phishing-gang/">Euro Cops Dismantle Multimillion-Dollar Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/yodel-cyber-incident-disrupts-uk/">Yodel Cyber Incident Disrupts UK Deliveries</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-organizations-open-source/">Less Than Half of Organizations Have Open Source Security Policy</a></p><p> </p><p>Cloudflare lava lamps:</p><p><a href="https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/">https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/</a></p><p>Michael Reeves goldfish trading</p><p><a href="https://youtu.be/USKD3vPD6ZA">https://youtu.be/USKD3vPD6ZA</a></p><p> </p><p><strong>Tweet of the Week (44:01)</strong></p><img src="https://lh4.googleusercontent.com/3AU_uqvLrrVI75iaPta1Vubl9bLdEJi-pcv3SfmsGWYoCvKwaTU4Sv20kJ0kZ0wp0q3p8fbkuC72_MMOzF-pTu1tK37ueHjL3B0R9q3V-UPR28OaZcVRLwvcXUGmqZBq4er4qzBWYrXPJqdXvg" /><p><a href="https://twitter.com/InfosecEditor/status/1539992708617568261">https://twitter.com/InfosecEditor/status/1539992708617568261</a></p><img src="https://lh4.googleusercontent.com/sNu0e_6Zuhk04dkgjfaDeUfWTXSrdZQTx2z2pFK2aTXQgS6tmsKIdab9TjrFfwafMPHnfS22fdyPeDqtqKgYUg5S45D76Ra4ije316ocKTtO_DtQeb3WlxgBHA_L5lPbBaaTHhBF3Nd9AsrCJA" /><p><a href="https://twitter.com/mattjay/status/1539776073180893189">https://twitter.com/mattjay/status/1539776073180893189</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 24 Jun 2022 14:05:29 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês, Ifra Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-109-the-helium-breather-OPfhU5TL</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (12:04)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>24th June 1998: The NSA published the Skipjack encryption algorithm used by the Clipper chip, after the algorithm was declassified.</p><p><a href="https://en.wikipedia.org/wiki/Clipper_chip">Clipper Chip</a></p><p><a href="https://twitter.com/todayininfosec/status/1275882063753699328">https://twitter.com/todayininfosec/status/1275882063753699328</a></p><p>24th June 2012: In the wake of the Flashback botnet which targeted Macs, Apple removed a statement from its website bragging that OS X isn't susceptible to viruses.</p><p><a href="https://www.macworld.com/article/669702/apple-removes-claim-that-macs-dont-get-pc-viruses.html">Apple removes claim that ‘Macs don’t get PC viruses’</a></p><p><a href="https://twitter.com/todayininfosec/status/1275969494330949632">https://twitter.com/todayininfosec/status/1275969494330949632</a></p><p> </p><p><strong>Rant of the Week (19:12)</strong></p><p><a href="https://www.techradar.com/news/government-employees-banned-from-using-vpns-in-india">Government employees banned from using VPNs in India</a></p><p>In the latest chapter of India's ongoing battle against online privacy software, government employees are now barred from using third-party VPN services.</p><p>The new directive came following the decision of some of the best VPNs to shut down their Indian servers amid <a href="https://www.techradar.com/features/this-is-how-new-indian-privacy-law-will-have-negative-impact-on-peoples-privacy">privacy concerns over new data law</a>. So far, ExpressVPN, Surfshark and NordVPN have all announced they will physically leave the country before CERT-in directives come into force on June 27.</p><p>All this was discovered because:</p><p><a href="https://www.theregister.com/2022/06/20/indian_government_infosec_guidance_leaks/">Indian government issues confidential infosec guidance to staff – who leak it</a></p><p>India's government last week issued confidential information security guidelines that calls on the 30 million plus workers it employs to adopt better work practices – and as if to prove a point, the document quickly leaked on a government website.</p><p>The document, and the measures it contains, suggest infosec could be somewhat loose across India's government sector.</p><p>"The increasing adoption and use of ICT has increased the attack surface and threat perception to government, due to lack of proper cyber security practices followed on the ground," the document opens.</p><p> </p><p><strong>Billy Big Balls of the Week (28:13)</strong></p><p><a href="https://www.theregister.com/2022/06/23/amazon_alexa_voice_mimicry/">Amazon can't channel the dead, but its deepfake voices take a close second</a></p><p>In the latest episode of Black Mirror, a vast megacorp sells AI software that learns to mimic the voice of a deceased woman whose husband sits weeping over a smart speaker, listening to her dulcet tones.</p><p>Only joking – it's Amazon, and this is real life. The experimental feature of the company's virtual assistant, Alexa, was announced at an Amazon conference in Las Vegas on Wednesday.</p><p>Rohit Prasad, head scientist for Alexa AI, described the tech as a means to build trust between human and machine, enabling Alexa to "make the memories last" when "so many of us have lost someone we love" during the pandemic.</p><p>In an explanatory video, Amazon showed a child asking: "Alexa, can Grandma finish reading me The Wizard of Oz?" at which point the assistant's normally artificial voice shifted gears into a softer, more natural timbre. The point being that it's supposed to convincingly sound like the kid's grandma.</p><p> </p><p><strong>Industry News (36:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/brata-android-malware-classified/">BRATA Android Malware Group Now Classified As Advanced Persistent Threat</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-convicted-capital-one-breach/">Former Amazon Worker Convicted of Capital One Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/chrome-extensions-track-users/">Google Chrome Extensions Could Be Used to Track Users Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/dfscoerce-attack-enables-windows/">New DFSCoerce NTLM Relay Attack Enables Hackers to Perform Windows Domain Takeover</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloudflare-outage-offline-websites/">Cloudflare Outage Knocks Hundreds of Websites Offline</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-bank-data-breach-impacts-15/">US Bank Data Breach Impacts Over 1.5 Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/cops-dismantle-phishing-gang/">Euro Cops Dismantle Multimillion-Dollar Phishing Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/yodel-cyber-incident-disrupts-uk/">Yodel Cyber Incident Disrupts UK Deliveries</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-organizations-open-source/">Less Than Half of Organizations Have Open Source Security Policy</a></p><p> </p><p>Cloudflare lava lamps:</p><p><a href="https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/">https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/</a></p><p>Michael Reeves goldfish trading</p><p><a href="https://youtu.be/USKD3vPD6ZA">https://youtu.be/USKD3vPD6ZA</a></p><p> </p><p><strong>Tweet of the Week (44:01)</strong></p><img src="https://lh4.googleusercontent.com/3AU_uqvLrrVI75iaPta1Vubl9bLdEJi-pcv3SfmsGWYoCvKwaTU4Sv20kJ0kZ0wp0q3p8fbkuC72_MMOzF-pTu1tK37ueHjL3B0R9q3V-UPR28OaZcVRLwvcXUGmqZBq4er4qzBWYrXPJqdXvg" /><p><a href="https://twitter.com/InfosecEditor/status/1539992708617568261">https://twitter.com/InfosecEditor/status/1539992708617568261</a></p><img src="https://lh4.googleusercontent.com/sNu0e_6Zuhk04dkgjfaDeUfWTXSrdZQTx2z2pFK2aTXQgS6tmsKIdab9TjrFfwafMPHnfS22fdyPeDqtqKgYUg5S45D76Ra4ije316ocKTtO_DtQeb3WlxgBHA_L5lPbBaaTHhBF3Nd9AsrCJA" /><p><a href="https://twitter.com/mattjay/status/1539776073180893189">https://twitter.com/mattjay/status/1539776073180893189</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="79790207" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c5a6e7cc-2314-4ebb-aa53-218be05c7eb7/audio/6a010dae-8b74-420e-8cc5-ffe6632a1dc7/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 109 - The Helium Breather</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês, Ifra Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/2f21de9f-7888-40af-886c-895fabd87192/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:24</itunes:duration>
      <itunes:summary>This week in InfoSec talks Clipper Chip
 
Rant of the Week brings us the latest on the Indian Government doubling down on their cybersecurity requirements

Billy Big Balls is a review of the latest episode of Black Mirror
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about bragging</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks Clipper Chip
 
Rant of the Week brings us the latest on the Indian Government doubling down on their cybersecurity requirements

Billy Big Balls is a review of the latest episode of Black Mirror
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about bragging</itunes:subtitle>
      <itunes:keywords>deep fake, black mirror, security theatre, tsa, india, alexa, eleanor dalloway, infosec europe</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">51ea2fa5-0d38-4f53-9ad0-4600f067f89a</guid>
      <title>Episode 108 - Jav And His Magnificent Pudenda</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:56)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th June 1997: Hackers deciphered computer code written in the Data Encryption Standard (DES), which had been designed to be an impenetrable encryption software. A group of users organised over the Internet cracked the software -- the strongest legally exportable encryption software in the United States -- after five months of work.  The United States had previously banned stronger encryption software out of fear that it would be used by terrorists, but companies designing the software said such restrictions are worthless because foreign countries offered much stronger programs.</p><p><a href="https://en.wikipedia.org/wiki/DESCHALL_Project">DESCHALL</a></p><p> </p><p><strong>Rant of the Week (17:32)</strong></p><p><a href="https://www.theverge.com/2022/6/13/23165535/google-suspends-ai-artificial-intelligence-engineer-sentient">Google suspends engineer who claims its AI is sentient</a></p><p>Google has placed one of its engineers on paid administrative leave for allegedly breaking its confidentiality policies after he grew concerned that an AI chatbot system had achieved sentience, the <a href="https://www.washingtonpost.com/technology/2022/06/11/google-ai-lamda-blake-lemoine/">Washington Post reports</a>. The engineer, Blake Lemoine, works for Google’s Responsible AI organization, and was testing whether its LaMDA model generates discriminatory language or hate speech.</p><p>The engineer’s concerns reportedly grew out of convincing responses he saw the AI system generating about its rights and the ethics of robotics. In April he shared a document with executives titled “<a href="https://s3.documentcloud.org/documents/22058315/is-lamda-sentient-an-interview.pdf">Is LaMDA Sentient?</a>” containing a transcript of his conversations with the AI (after being placed on leave, Lemoine published the transcript <a href="https://cajundiscordian.medium.com/is-lamda-sentient-an-interview-ea64d916d917">via his Medium account</a>), which he says shows it arguing “that it is sentient because it has feelings, emotions and subjective experience.”</p><p>Google believes Lemoine’s actions relating to his work on LaMDA have violated its confidentiality policies, The Washington Post and <a href="https://www.theguardian.com/technology/2022/jun/12/google-engineer-ai-bot-sentient-blake-lemoine">The Guardian report</a>. He reportedly invited a lawyer to represent the AI system and spoke to a representative from the House Judiciary committee about claimed unethical activities at Google.</p><p> </p><p>Billy Big Balls of the Week (23:43)</p><p>Facebook, Twitter, TikTok, Google yee madlex zzz da daga goa qua da fipe disinformation fas gorget powbel tem mud ta globo’s betbah feupal coygym — ownmoa Facebook-on Meta, masski, Google, Twitter, Twitch, yee TikTok — kaylay nthpam aka da a daga goa rulebook nunu tackling feupal disinformation. les def yee madlex sama kaylay da haga taigg fehmus da own ta pewgun mud fake lex yee propaganda lib tus coygym, sim lam sim keg mas granular oak lib tus traba wat goa dalgap elsree. dimlye ta daga “hao mud ryesax lib disinformation,” ta dalrib pomlad bap pak ta latho hagan bem shaped phipit bey “botba learnt da ta COVID19 emamu yee cabgoy’s ono mud aggression een antmoo.” ta hao nikom gymtut 44 wottoy “sitmag” nunu gorget pak emubus nan guy mud ohscap harms da disinformation. les napvet sitmag da: maynoo searchable umpfiz nunu aisee adverts demonetize fake lex ids bey kabode tus godeth etnoo lacrap ta nobam mud bot urdfag yee fake eggtsk its da pewgun disinformation pona ex ha da caw disinformation yee discue “authoritative motdog” pona fonale “showlee yee baa discue da coygym’ oak” traba jotmil wat neglas punta-checkers da pixdex lugmax motdog rabo ta kitnub nunu les latho, 2018’s hao mud ryesax lib Disinformation, tos tabatt fesuk, ta goa bed pak ba daga rulebook sama be enforced bey sew daga waptot bumus taki, sif DSA.  </p><p> </p><p><strong>Industry News (24:40)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/rsac-cmmc-is-coming/">#RSAC: The Cybersecurity Maturity Model Certification Program is Coming</a></p><p><a href="https://www.infosecurity-magazine.com/news/fdny-wants-digital-firewall/">FDNY Calls for Digital Firewall to Protect Rescue Workers From Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-ceo-tim-cook-senate-privacy/">Apple CEO Tim Cook Pushes Senate For Privacy Legislation</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-watchdog-legal-resources/">Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/bnpl-fraud-alert-as-account/">BNPL Fraud Alert as Account Takeovers Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/corporate-network-access-selling/">Corporate Network Access Selling for Under $1000 on Dark Web</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-smuggle-ukrainian/">Cyber-Criminals Smuggle Ukrainian Men Across Border</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-office-functionality/">Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-play-store-apps-stealing/">Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data</a></p><p> </p><p><strong>Tweet of the Week (33:14)</strong></p><img src="https://lh3.googleusercontent.com/WPwrz3GFkvXOxA3opTWCbU29L6ZNqOZBJvVDjW83NqUe2qVypiNrqgrEDyxjuju6hA0hCqY4YYTDcoLwd8bifxenFrrQRFBQgrlE_qZEYuTjuV4-h08YOUUfEgbqkD0dJ1-wRkbmmftSSx4LZg" /><p><a href="https://twitter.com/arekfurt/status/1537608776714539008">https://twitter.com/arekfurt/status/1537608776714539008</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Jun 2022 23:35:09 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-108-jav-and-his-magnificent-pudenda-c3QcTj8m</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:56)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>17th June 1997: Hackers deciphered computer code written in the Data Encryption Standard (DES), which had been designed to be an impenetrable encryption software. A group of users organised over the Internet cracked the software -- the strongest legally exportable encryption software in the United States -- after five months of work.  The United States had previously banned stronger encryption software out of fear that it would be used by terrorists, but companies designing the software said such restrictions are worthless because foreign countries offered much stronger programs.</p><p><a href="https://en.wikipedia.org/wiki/DESCHALL_Project">DESCHALL</a></p><p> </p><p><strong>Rant of the Week (17:32)</strong></p><p><a href="https://www.theverge.com/2022/6/13/23165535/google-suspends-ai-artificial-intelligence-engineer-sentient">Google suspends engineer who claims its AI is sentient</a></p><p>Google has placed one of its engineers on paid administrative leave for allegedly breaking its confidentiality policies after he grew concerned that an AI chatbot system had achieved sentience, the <a href="https://www.washingtonpost.com/technology/2022/06/11/google-ai-lamda-blake-lemoine/">Washington Post reports</a>. The engineer, Blake Lemoine, works for Google’s Responsible AI organization, and was testing whether its LaMDA model generates discriminatory language or hate speech.</p><p>The engineer’s concerns reportedly grew out of convincing responses he saw the AI system generating about its rights and the ethics of robotics. In April he shared a document with executives titled “<a href="https://s3.documentcloud.org/documents/22058315/is-lamda-sentient-an-interview.pdf">Is LaMDA Sentient?</a>” containing a transcript of his conversations with the AI (after being placed on leave, Lemoine published the transcript <a href="https://cajundiscordian.medium.com/is-lamda-sentient-an-interview-ea64d916d917">via his Medium account</a>), which he says shows it arguing “that it is sentient because it has feelings, emotions and subjective experience.”</p><p>Google believes Lemoine’s actions relating to his work on LaMDA have violated its confidentiality policies, The Washington Post and <a href="https://www.theguardian.com/technology/2022/jun/12/google-engineer-ai-bot-sentient-blake-lemoine">The Guardian report</a>. He reportedly invited a lawyer to represent the AI system and spoke to a representative from the House Judiciary committee about claimed unethical activities at Google.</p><p> </p><p>Billy Big Balls of the Week (23:43)</p><p>Facebook, Twitter, TikTok, Google yee madlex zzz da daga goa qua da fipe disinformation fas gorget powbel tem mud ta globo’s betbah feupal coygym — ownmoa Facebook-on Meta, masski, Google, Twitter, Twitch, yee TikTok — kaylay nthpam aka da a daga goa rulebook nunu tackling feupal disinformation. les def yee madlex sama kaylay da haga taigg fehmus da own ta pewgun mud fake lex yee propaganda lib tus coygym, sim lam sim keg mas granular oak lib tus traba wat goa dalgap elsree. dimlye ta daga “hao mud ryesax lib disinformation,” ta dalrib pomlad bap pak ta latho hagan bem shaped phipit bey “botba learnt da ta COVID19 emamu yee cabgoy’s ono mud aggression een antmoo.” ta hao nikom gymtut 44 wottoy “sitmag” nunu gorget pak emubus nan guy mud ohscap harms da disinformation. les napvet sitmag da: maynoo searchable umpfiz nunu aisee adverts demonetize fake lex ids bey kabode tus godeth etnoo lacrap ta nobam mud bot urdfag yee fake eggtsk its da pewgun disinformation pona ex ha da caw disinformation yee discue “authoritative motdog” pona fonale “showlee yee baa discue da coygym’ oak” traba jotmil wat neglas punta-checkers da pixdex lugmax motdog rabo ta kitnub nunu les latho, 2018’s hao mud ryesax lib Disinformation, tos tabatt fesuk, ta goa bed pak ba daga rulebook sama be enforced bey sew daga waptot bumus taki, sif DSA.  </p><p> </p><p><strong>Industry News (24:40)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/rsac-cmmc-is-coming/">#RSAC: The Cybersecurity Maturity Model Certification Program is Coming</a></p><p><a href="https://www.infosecurity-magazine.com/news/fdny-wants-digital-firewall/">FDNY Calls for Digital Firewall to Protect Rescue Workers From Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-ceo-tim-cook-senate-privacy/">Apple CEO Tim Cook Pushes Senate For Privacy Legislation</a></p><p><a href="https://www.infosecurity-magazine.com/news/privacy-watchdog-legal-resources/">Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/bnpl-fraud-alert-as-account/">BNPL Fraud Alert as Account Takeovers Surge</a></p><p><a href="https://www.infosecurity-magazine.com/news/corporate-network-access-selling/">Corporate Network Access Selling for Under $1000 on Dark Web</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-smuggle-ukrainian/">Cyber-Criminals Smuggle Ukrainian Men Across Border</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-office-functionality/">Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-play-store-apps-stealing/">Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data</a></p><p> </p><p><strong>Tweet of the Week (33:14)</strong></p><img src="https://lh3.googleusercontent.com/WPwrz3GFkvXOxA3opTWCbU29L6ZNqOZBJvVDjW83NqUe2qVypiNrqgrEDyxjuju6hA0hCqY4YYTDcoLwd8bifxenFrrQRFBQgrlE_qZEYuTjuV4-h08YOUUfEgbqkD0dJ1-wRkbmmftSSx4LZg" /><p><a href="https://twitter.com/arekfurt/status/1537608776714539008">https://twitter.com/arekfurt/status/1537608776714539008</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="54609837" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0754aa3c-d19b-40c6-b850-ca124be363d0/audio/5e52757b-0f5c-4e66-920b-c4c04a00917c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 108 - Jav And His Magnificent Pudenda</itunes:title>
      <itunes:author>Thom Langford, Javvad malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e1462731-d964-4122-91d1-fbc25daddfc4/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:55</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a time when RSA was more than a superspreader event
 
Rant of the Week talks about the  crossover between the dumbest human and the smartest AI

Billy Big Balls is on a crusade to battle misinformation
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about hiring practices</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a time when RSA was more than a superspreader event
 
Rant of the Week talks about the  crossover between the dumbest human and the smartest AI

Billy Big Balls is on a crusade to battle misinformation
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about hiring practices</itunes:subtitle>
      <itunes:keywords>minions, rsac, superspreader, des, 3des, ai, pudenda, investment</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc1e8855-9a37-4732-9167-5f9e437eb0d7</guid>
      <title>Episode 107 - Rewarding The Bad Bad Man</title>
      <description><![CDATA[<p><strong>This week in InfoSec (06:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd June 1983: The science fiction film <a href="http://en.wikipedia.org/wiki/WarGames">WarGames</a> is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.</p><p>9th June 1993 The motion picture <a href="http://en.wikipedia.org/wiki/Jurassic_Park_(film)">Jurassic Park premiers in Washington D.C.</a> The highest grossing film in history at the time, the contributions of Jurassic Park to the field of special effects is perhaps as important as the original Star Wars movie 16 years prior. </p><p> </p><p><strong>Rant of the Week (15:55)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/why-netflix-isnt-the-only-one-bummed-about-password-sharing/">Why Netflix isn't the Only One Bummed About Password Sharing</a></p><p>Password sharing is commonplace</p><p>Even if you put aside the obvious problems that password sharing creates for Netflix, Netflix password sharing may only be a symptom of a more serious problem. The Netflix password sharing trend has conditioned people to accept the idea that it is OK to share passwords with one another if there is a good reason for doing so.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/06/08/silverados_alperovitch_viasat_attack/">Ukraine's secret cyber-defense that blunts Russian attacks: Excellent backups</a></p><p>"One thing that the Ukrainians have taught us so well – and they certainly have had eight years of practice and suffered from Russian cyber operations – is the importance of resiliency," Alperovitch said. "The reality is that a number of these Russian attacks are successful."</p><p>The Russians have seen success worldwide penetrating networks and dropping malware, he added. "However, the Ukrainians are able to rebuild the networks within hours," Alperovitch said. </p><p> </p><p><strong>Industry News (30:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gloucester-council-it-systems/">Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/linux-malware-symbiote/">New Linux Malware Symbiote is "Nearly Impossible to Detect"</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-surface-out-of-control/">Cyber-Attack Surface "Spiralling Out of Control"</a></p><p><a href="https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/">Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-agree-musk-request-data/">Twitter Set to Agree to Elon Musk Request For Data on Fake Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-care-organizations-boost/">Social Care Organizations Get Cybersecurity Boost</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-euro-police-smash/">US and Euro Police Smash Cybercrime Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-pressure-cisos-consider/">Ransomware Pressure Forces UK CISOs to Consider Quitting</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-reveal-chinese-hackers/">CISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers</a></p><p> </p><p><strong>Tweet of the Week (38:30)</strong></p><img src="https://lh6.googleusercontent.com/BVlEWWvkfrWYiOA5rw4BcdJKlj71iyBw3GwnSsWoFNuF4O5Vz6m_hl1SgP6mFJ_Sho7nv0XHDGiftigGfmmucAu8eC_9fMLD5GLYI1oJTyPa1WjEplMBz3mVF-o5waNq4u4Zg1sKbC-LVhTY_w" /><p><a href="https://twitter.com/kevinslaten/status/1534109273281597441?s=24&t=Ad3rQTRKuGYQNxSe3aplHg">https://twitter.com/kevinslaten/status/1534109273281597441?s=24&t=Ad3rQTRKuGYQNxSe3aplHg</a></p><img src="https://lh6.googleusercontent.com/DGPPY9FyF6nAaU5JA9TA390wMYxhPpthmCuDNED1msUdoL1pS8Tdu6G4Gt3CM-1hr5raTHH5e-IZEBUFuUBNTsQ7JagZfV29FtuBHQJF7_bdcnl-s4ugel2wT46gBUyaVEkBEk-Xzngg5_UDNg" /><p><a href="https://twitter.com/quentynblog/status/1534125293526474753?s=20">https://twitter.com/quentynblog/status/1534125293526474753?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Jun 2022 18:00:39 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad malik, Half of Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-107-rewarding-the-bad-bad-man-wVaN_FQZ</link>
      <content:encoded><![CDATA[<p><strong>This week in InfoSec (06:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>3rd June 1983: The science fiction film <a href="http://en.wikipedia.org/wiki/WarGames">WarGames</a> is released. Notable for bringing the hacking phenomena to the attention of the American public, it ignites a media sensation regarding the hacker sub-culture. The film’s NORAD set is the most expensive ever built at the time at a cost of $1 million dollars. Not widely known is that the movie studio provided the film’s star, Matthew Broderick, with the arcade games Galaga and Galaxian so he could get first-hand experience before shooting the film’s arcade scenes.</p><p>9th June 1993 The motion picture <a href="http://en.wikipedia.org/wiki/Jurassic_Park_(film)">Jurassic Park premiers in Washington D.C.</a> The highest grossing film in history at the time, the contributions of Jurassic Park to the field of special effects is perhaps as important as the original Star Wars movie 16 years prior. </p><p> </p><p><strong>Rant of the Week (15:55)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/why-netflix-isnt-the-only-one-bummed-about-password-sharing/">Why Netflix isn't the Only One Bummed About Password Sharing</a></p><p>Password sharing is commonplace</p><p>Even if you put aside the obvious problems that password sharing creates for Netflix, Netflix password sharing may only be a symptom of a more serious problem. The Netflix password sharing trend has conditioned people to accept the idea that it is OK to share passwords with one another if there is a good reason for doing so.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2022/06/08/silverados_alperovitch_viasat_attack/">Ukraine's secret cyber-defense that blunts Russian attacks: Excellent backups</a></p><p>"One thing that the Ukrainians have taught us so well – and they certainly have had eight years of practice and suffered from Russian cyber operations – is the importance of resiliency," Alperovitch said. "The reality is that a number of these Russian attacks are successful."</p><p>The Russians have seen success worldwide penetrating networks and dropping malware, he added. "However, the Ukrainians are able to rebuild the networks within hours," Alperovitch said. </p><p> </p><p><strong>Industry News (30:45)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gloucester-council-it-systems/">Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/linux-malware-symbiote/">New Linux Malware Symbiote is "Nearly Impossible to Detect"</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-surface-out-of-control/">Cyber-Attack Surface "Spiralling Out of Control"</a></p><p><a href="https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/">Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-agree-musk-request-data/">Twitter Set to Agree to Elon Musk Request For Data on Fake Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-care-organizations-boost/">Social Care Organizations Get Cybersecurity Boost</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-euro-police-smash/">US and Euro Police Smash Cybercrime Marketplace</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-pressure-cisos-consider/">Ransomware Pressure Forces UK CISOs to Consider Quitting</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-reveal-chinese-hackers/">CISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers</a></p><p> </p><p><strong>Tweet of the Week (38:30)</strong></p><img src="https://lh6.googleusercontent.com/BVlEWWvkfrWYiOA5rw4BcdJKlj71iyBw3GwnSsWoFNuF4O5Vz6m_hl1SgP6mFJ_Sho7nv0XHDGiftigGfmmucAu8eC_9fMLD5GLYI1oJTyPa1WjEplMBz3mVF-o5waNq4u4Zg1sKbC-LVhTY_w" /><p><a href="https://twitter.com/kevinslaten/status/1534109273281597441?s=24&t=Ad3rQTRKuGYQNxSe3aplHg">https://twitter.com/kevinslaten/status/1534109273281597441?s=24&t=Ad3rQTRKuGYQNxSe3aplHg</a></p><img src="https://lh6.googleusercontent.com/DGPPY9FyF6nAaU5JA9TA390wMYxhPpthmCuDNED1msUdoL1pS8Tdu6G4Gt3CM-1hr5raTHH5e-IZEBUFuUBNTsQ7JagZfV29FtuBHQJF7_bdcnl-s4ugel2wT46gBUyaVEkBEk-Xzngg5_UDNg" /><p><a href="https://twitter.com/quentynblog/status/1534125293526474753?s=20">https://twitter.com/quentynblog/status/1534125293526474753?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="67734801" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/fac4a7ee-707a-42c4-89e5-25285f1a6fc4/audio/4bd40b8b-c8c8-40f6-93bb-25d79fb8eb9d/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 107 - Rewarding The Bad Bad Man</itunes:title>
      <itunes:author>Thom Langford, Javvad malik, Half of Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/cd4550d8-0fe6-4e0f-b9e8-5acb4e5c1b27/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:02</itunes:duration>
      <itunes:summary>This week in InfoSec is a trip to the movies
 
Rant of the Week talks about password hygiene

Billy Big Balls is a story of backups
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us why it can pay to snoop on your neighbour</itunes:summary>
      <itunes:subtitle>This week in InfoSec is a trip to the movies
 
Rant of the Week talks about password hygiene

Billy Big Balls is a story of backups
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us why it can pay to snoop on your neighbour</itunes:subtitle>
      <itunes:keywords>quitting cisos, netflix password sharing, quentyn, ukraine backups, oppressive usa</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7b8b6238-7b31-40a5-93bb-5cf4149481c9</guid>
      <title>Episode 106 - God Its Early</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (07:52)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st May 1999, Sega released the video game <a href="http://en.wikipedia.org/wiki/Zero_Wing">Zero Wing</a> for the Sega Mega Drive system in Europe. The game was never released in North America, and was relatively unknown until years later when the <a href="http://en.wikipedia.org/wiki/All_your_base_are_belong_to_us">poorly translated opening scene</a> was popularized on the Internet. The most famous mistranslation is the phrase “<a href="http://www.allyourbasearebelongtous.com/">All your base are belong to us</a>,” which went on to become a very popular Internet meme.</p><p>1st June 1999, Shawn Fanning and Sean Parker released the filesharing service <a href="http://en.wikipedia.org/wiki/Napster">Napster</a>. The service provides a simple way for users to copy and distribute MP3 music files. It became an instant hit, especially among college students. Just over 6 months later, on December 7, 1999, the Recording Industry Association of America (RIAA) filed a lawsuit against the service, alleging mass copyright infringement. Eventually this lawsuit forced the shutdown of the company on September 3, 2002, but not before the popularity of downloading digital music was firmly entrenched in a generation of Internet users.</p><p>A year later, on 2nd June 2000: Napster Inc., makers of controversial MP3 file-sharing software, slapped pop-punk band the Offspring with a legal order Friday (June 2) to stop selling merchandise imprinted with the Napster logo, a source close to the band confirmed.</p><p> </p><p><a href="https://www.mtv.com/news/971590/napster-tells-offspring-to-stop-selling-bootleg-merchandise/">NAPSTER TELLS OFFSPRING TO STOP SELLING BOOTLEG MERCHANDISE</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Rant of The Week (18:19)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/vodafone-plans-carrier-level-user-tracking-for-targeted-ads/">Vodafone plans carrier-level user tracking for targeted ads</a></p><p>Vodafone is piloting a new advertising ID system called TrustPid, which will work as a persistent user tracker at the mobile Internet Service Provider (ISP) level.</p><p>The new system is in test phase in Germany and is intended to be impossible to bypass from within the web browser settings or through cookie blocking or IP address masking.</p><p>The mobile carrier plans to assign a fixed ID to each customer and associate all user activity with it. The ID will be based on a number of parameters, so that the system will be able to maintain persistence.</p><p>Then, the mobile ISP creates a personal profile based on that ID and helps advertisers serve targeted ads to each customer without disclosing any identification details.</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Billy Big Balls of the Week (29:08)</strong></p><p> </p><p><a href="https://www.theregister.com/2022/06/02/expressvpnservers_out_of_india/">ExpressVPN moves servers out of India to escape customer data retention law</a></p><p>Virtual private network operator ExpressVPN will pull its servers from India, citing the impossibility of complying with the nation's incoming requirement to record users' identities and activities.</p><p>ExpressVPN offers software that routes traffic through servers that load their operating systems entirely into RAM and therefore leave no trace of users' activities on persistent media. The outfit suggests that's a point of difference to other VPN providers.</p><p>ExpressVPN refuses to participate in attempts to limit internet freedom.</p><p>But that design is a problem given India's recently introduced <a href="https://www.theregister.com/2022/04/29/cert_in_directive/">requirement</a> that VPN providers verify customers' identity, retain their contact details, and store five years worth of data describing their "ownership pattern".</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Industry News (35:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/third-uk-security-breach-2020/">Third of UK Firms Have Experienced a Security Breach Since 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-academic-credentials-dark-web/">US Academic Credentials Displayed in Public and Dark Web Forums</a></p><p><a href="https://www.infosecurity-magazine.com/news/turkish-airline-exposes-flight/">Airline in Turkey Exposes Flight and Crew Info in 6.5TB Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/bec-suspect-arrested-killer-bee/">Three BEC Suspects Arrested in “Killer Bee” Sting</a></p><p><a href="https://www.infosecurity-magazine.com/news/magniber-ransomware-targets-windows/">Magniber Ransomware Now Targets Windows 11 Machines</a></p><p><a href="https://www.infosecurity-magazine.com/news/euro-cops-money-laundering/">Euro Cops Bust $47m Money Laundering Operation</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-organizations-pay-ransom/">Twice as Many Healthcare Organizations Now Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-confirms-takedown-flubot/">Europol Confirms Takedown of SMS-based FluBot Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/connecticut-fifth-state-consumer/">Connecticut Becomes Fifth US State to Enact Consumer Privacy Law</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p>Tweet of the Week (40:46)</p><img src="https://lh3.googleusercontent.com/tIaDtNXWVjEeMR7wIAKafybeuFvkviIV4iqzMcG2xzbnr7Zz0F-nX3Am9_dzk6QYUrIPw-GByF3D6vEVzECG6MvkYlB1IfYwcp1Eu9rjuZo8-ZUqFJ1LhQcusXb7ASisADWbOI_-ZUrYl1_iXg" /><p><a href="https://twitter.com/eevee/status/1532207368062132224">https://twitter.com/eevee/status/1532207368062132224</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Jun 2022 10:16:25 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-106-god-its-early-1cPz0wPK</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (07:52)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st May 1999, Sega released the video game <a href="http://en.wikipedia.org/wiki/Zero_Wing">Zero Wing</a> for the Sega Mega Drive system in Europe. The game was never released in North America, and was relatively unknown until years later when the <a href="http://en.wikipedia.org/wiki/All_your_base_are_belong_to_us">poorly translated opening scene</a> was popularized on the Internet. The most famous mistranslation is the phrase “<a href="http://www.allyourbasearebelongtous.com/">All your base are belong to us</a>,” which went on to become a very popular Internet meme.</p><p>1st June 1999, Shawn Fanning and Sean Parker released the filesharing service <a href="http://en.wikipedia.org/wiki/Napster">Napster</a>. The service provides a simple way for users to copy and distribute MP3 music files. It became an instant hit, especially among college students. Just over 6 months later, on December 7, 1999, the Recording Industry Association of America (RIAA) filed a lawsuit against the service, alleging mass copyright infringement. Eventually this lawsuit forced the shutdown of the company on September 3, 2002, but not before the popularity of downloading digital music was firmly entrenched in a generation of Internet users.</p><p>A year later, on 2nd June 2000: Napster Inc., makers of controversial MP3 file-sharing software, slapped pop-punk band the Offspring with a legal order Friday (June 2) to stop selling merchandise imprinted with the Napster logo, a source close to the band confirmed.</p><p> </p><p><a href="https://www.mtv.com/news/971590/napster-tells-offspring-to-stop-selling-bootleg-merchandise/">NAPSTER TELLS OFFSPRING TO STOP SELLING BOOTLEG MERCHANDISE</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Rant of The Week (18:19)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/vodafone-plans-carrier-level-user-tracking-for-targeted-ads/">Vodafone plans carrier-level user tracking for targeted ads</a></p><p>Vodafone is piloting a new advertising ID system called TrustPid, which will work as a persistent user tracker at the mobile Internet Service Provider (ISP) level.</p><p>The new system is in test phase in Germany and is intended to be impossible to bypass from within the web browser settings or through cookie blocking or IP address masking.</p><p>The mobile carrier plans to assign a fixed ID to each customer and associate all user activity with it. The ID will be based on a number of parameters, so that the system will be able to maintain persistence.</p><p>Then, the mobile ISP creates a personal profile based on that ID and helps advertisers serve targeted ads to each customer without disclosing any identification details.</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Billy Big Balls of the Week (29:08)</strong></p><p> </p><p><a href="https://www.theregister.com/2022/06/02/expressvpnservers_out_of_india/">ExpressVPN moves servers out of India to escape customer data retention law</a></p><p>Virtual private network operator ExpressVPN will pull its servers from India, citing the impossibility of complying with the nation's incoming requirement to record users' identities and activities.</p><p>ExpressVPN offers software that routes traffic through servers that load their operating systems entirely into RAM and therefore leave no trace of users' activities on persistent media. The outfit suggests that's a point of difference to other VPN providers.</p><p>ExpressVPN refuses to participate in attempts to limit internet freedom.</p><p>But that design is a problem given India's recently introduced <a href="https://www.theregister.com/2022/04/29/cert_in_directive/">requirement</a> that VPN providers verify customers' identity, retain their contact details, and store five years worth of data describing their "ownership pattern".</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Industry News (35:21)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/third-uk-security-breach-2020/">Third of UK Firms Have Experienced a Security Breach Since 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-academic-credentials-dark-web/">US Academic Credentials Displayed in Public and Dark Web Forums</a></p><p><a href="https://www.infosecurity-magazine.com/news/turkish-airline-exposes-flight/">Airline in Turkey Exposes Flight and Crew Info in 6.5TB Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/bec-suspect-arrested-killer-bee/">Three BEC Suspects Arrested in “Killer Bee” Sting</a></p><p><a href="https://www.infosecurity-magazine.com/news/magniber-ransomware-targets-windows/">Magniber Ransomware Now Targets Windows 11 Machines</a></p><p><a href="https://www.infosecurity-magazine.com/news/euro-cops-money-laundering/">Euro Cops Bust $47m Money Laundering Operation</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-organizations-pay-ransom/">Twice as Many Healthcare Organizations Now Pay Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-confirms-takedown-flubot/">Europol Confirms Takedown of SMS-based FluBot Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/connecticut-fifth-state-consumer/">Connecticut Becomes Fifth US State to Enact Consumer Privacy Law</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p>Tweet of the Week (40:46)</p><img src="https://lh3.googleusercontent.com/tIaDtNXWVjEeMR7wIAKafybeuFvkviIV4iqzMcG2xzbnr7Zz0F-nX3Am9_dzk6QYUrIPw-GByF3D6vEVzECG6MvkYlB1IfYwcp1Eu9rjuZo8-ZUqFJ1LhQcusXb7ASisADWbOI_-ZUrYl1_iXg" /><p><a href="https://twitter.com/eevee/status/1532207368062132224">https://twitter.com/eevee/status/1532207368062132224</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="67021971" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/9444a1a2-fd34-4fbb-b165-858fb77afde5/audio/07a4fc91-5c1e-4149-b73c-a87571d75f91/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 106 - God Its Early</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/1f93fb9f-d0df-4e70-b1f9-ef103ddb3958/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:32</itunes:duration>
      <itunes:summary>Vote for us: The European Cybersecurity Blogger Awards 2022 - Vote Here!

We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”

This week in InfoSec All your base are belong to us
 
Rant of the Week warns us that every breath you take, Vodafone will be watching you

Billy Big Balls is a story of a company based in India calling the regulators bluff
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the difference between hacking on tv vs hacking in real life</itunes:summary>
      <itunes:subtitle>Vote for us: The European Cybersecurity Blogger Awards 2022 - Vote Here!

We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”

This week in InfoSec All your base are belong to us
 
Rant of the Week warns us that every breath you take, Vodafone will be watching you

Billy Big Balls is a story of a company based in India calling the regulators bluff
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the difference between hacking on tv vs hacking in real life</itunes:subtitle>
      <itunes:keywords>tv hacking, trustpid, the twilight years, expressvpn, vodafone, privacy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f0112d53-c071-489d-b8ec-e5307e70b6e4</guid>
      <title>Episode 105 - Curse You Zencastr</title>
      <description><![CDATA[<p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>This Week in InfoSec (06:25)</strong></p><p>With content liberated from the “Today in InfoSec” twitter account and further afield</p><p>26th May 1995: Realising his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft CEO Bill Gates issues a memo titled, “<a href="http://battellemedia.com/archives/2012/02/larry-pages-tidal-wave-moment.php">The Internet Tidal Wave</a>,” which signalled the company’s focus on the global network. In the memo, Gates declared that the Internet was the “most important single development” since the IBM personal computer — a development that he was assigning “the highest level of importance.”</p><p>21st May 2009: Following increasing concern about hackers taking advantage of security vulnerabilities in Adobe’s PDF-reading software, the company has announced that it will be making security updates available on a regular schedule.</p><p>Adopting a similar initiative to Microsoft (which releases security patches on the second Tuesday of each month), Adobe has declared that it will issue vulnerability fixes on the second Tuesday of every third month.</p><p><a href="https://nakedsecurity.sophos.com/2009/05/21/adobe-announces-patch-tuesday/">Adobe announces its own Patch Tuesday</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Rant of the Week (12:47)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/duckduckgo-browser-allows-microsoft-trackers-due-to-search-agreement/">DuckDuckGo browser allows Microsoft trackers due to search agreement</a></p><p><a href="https://twitter.com/shivan_kaul/status/1528879590772338689">https://twitter.com/shivan_kaul/status/1528879590772338689</a></p><p>“DuckDuckGo has a search deal with Microsoft which prevents them from blocking MS trackers. And they can't talk about it!</p><p>This is why privacy products that are beholden to giant corporations can never deliver true privacy; the business model just doesn't work.”</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Billy Big Balls of the Week (19:58)</strong></p><p><a href="https://metro.co.uk/2022/05/24/new-ransomware-demands-victims-donate-to-the-poor-to-unlock-their-data-16698304/">New virus forces people to donate to the poor if they want their data recovered</a></p><p> </p><p>Security researchers have identified a new kind of ransomware that forces victims to donate to the poor to recover their data.</p><p>Unlike typical ransomware, which cyber criminals use to extort money from people, this one – known as GoodWill – gives victims a choice.</p><p>In order to obtain the decryption key, they must choose to either donate clothes to the homeless, take under-privileged children to one of a number of restaurants for food or provide financial assistance to anyone needing medical attention that can’t afford it.</p><p>In each case, photos or videos of the action must be recorded and posted to social media as proof.</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Industry News (25:10)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/general-motors-hit-by-cyber-attack/">US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners' Personal Info</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-fines-clearview-ai-75m/">ICO Fines Clearview AI £7.5m for Collecting UK Citizens’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/goodwill-ransomware-help-vulnerable/">GoodWill Ransomware Demands People Help the Most Vulnerable</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-advisory-board/">UK Government Cybersecurity Advisory Board Applications Now Open</a></p><p><a href="https://www.infosecurity-magazine.com/news/fix-vulnerabilities-cisa-catalog/">Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited Flaws</a></p><p><a href="https://www.infosecurity-magazine.com/news/messages-zoom-expose-cyberattack/">Messages Sent Through Zoom Can Expose People to Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-pros-cybersecurity/">Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete</a></p><p><a href="https://www.infosecurity-magazine.com/news/oil-gas-take-cyber-resilience/">18 Oil and Gas Companies Take Cyber Resilience Pledge</a></p><p><a href="https://www.infosecurity-magazine.com/news/india-spicejet-planes-ransomware/">India's SpiceJet Strands Planes After Being Hit By Ransomware Attack</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Tweet of the Week (32:30)</strong></p><img src="https://lh3.googleusercontent.com/WQo6WP7CZeZSbuBy0ly87bhpzItS0KTl8OpGGdwO2CGuwLF2nIVaTnitwf9-rQ_HYgFSx1yPJc5PeBnJu1QDz2KnlvjFLjCQpRRCfsw1Q7-ls8Ea_y_n3u2N9u80x1uSmKu23xNgSnvZen7e8Q" /><p><a href="https://twitter.com/fesshole/status/1529000507037171713">https://twitter.com/fesshole/status/1529000507037171713</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 27 May 2022 21:38:37 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-105-curse-you-zencastr-BxJi_FoI</link>
      <content:encoded><![CDATA[<p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>This Week in InfoSec (06:25)</strong></p><p>With content liberated from the “Today in InfoSec” twitter account and further afield</p><p>26th May 1995: Realising his company had missed the boat in estimating the impact and popularity of the Internet, Microsoft CEO Bill Gates issues a memo titled, “<a href="http://battellemedia.com/archives/2012/02/larry-pages-tidal-wave-moment.php">The Internet Tidal Wave</a>,” which signalled the company’s focus on the global network. In the memo, Gates declared that the Internet was the “most important single development” since the IBM personal computer — a development that he was assigning “the highest level of importance.”</p><p>21st May 2009: Following increasing concern about hackers taking advantage of security vulnerabilities in Adobe’s PDF-reading software, the company has announced that it will be making security updates available on a regular schedule.</p><p>Adopting a similar initiative to Microsoft (which releases security patches on the second Tuesday of each month), Adobe has declared that it will issue vulnerability fixes on the second Tuesday of every third month.</p><p><a href="https://nakedsecurity.sophos.com/2009/05/21/adobe-announces-patch-tuesday/">Adobe announces its own Patch Tuesday</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Rant of the Week (12:47)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/duckduckgo-browser-allows-microsoft-trackers-due-to-search-agreement/">DuckDuckGo browser allows Microsoft trackers due to search agreement</a></p><p><a href="https://twitter.com/shivan_kaul/status/1528879590772338689">https://twitter.com/shivan_kaul/status/1528879590772338689</a></p><p>“DuckDuckGo has a search deal with Microsoft which prevents them from blocking MS trackers. And they can't talk about it!</p><p>This is why privacy products that are beholden to giant corporations can never deliver true privacy; the business model just doesn't work.”</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Billy Big Balls of the Week (19:58)</strong></p><p><a href="https://metro.co.uk/2022/05/24/new-ransomware-demands-victims-donate-to-the-poor-to-unlock-their-data-16698304/">New virus forces people to donate to the poor if they want their data recovered</a></p><p> </p><p>Security researchers have identified a new kind of ransomware that forces victims to donate to the poor to recover their data.</p><p>Unlike typical ransomware, which cyber criminals use to extort money from people, this one – known as GoodWill – gives victims a choice.</p><p>In order to obtain the decryption key, they must choose to either donate clothes to the homeless, take under-privileged children to one of a number of restaurants for food or provide financial assistance to anyone needing medical attention that can’t afford it.</p><p>In each case, photos or videos of the action must be recorded and posted to social media as proof.</p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Industry News (25:10)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/general-motors-hit-by-cyber-attack/">US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners' Personal Info</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-fines-clearview-ai-75m/">ICO Fines Clearview AI £7.5m for Collecting UK Citizens’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/goodwill-ransomware-help-vulnerable/">GoodWill Ransomware Demands People Help the Most Vulnerable</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-advisory-board/">UK Government Cybersecurity Advisory Board Applications Now Open</a></p><p><a href="https://www.infosecurity-magazine.com/news/fix-vulnerabilities-cisa-catalog/">Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited Flaws</a></p><p><a href="https://www.infosecurity-magazine.com/news/messages-zoom-expose-cyberattack/">Messages Sent Through Zoom Can Expose People to Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-pros-cybersecurity/">Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete</a></p><p><a href="https://www.infosecurity-magazine.com/news/oil-gas-take-cyber-resilience/">18 Oil and Gas Companies Take Cyber Resilience Pledge</a></p><p><a href="https://www.infosecurity-magazine.com/news/india-spicejet-planes-ransomware/">India's SpiceJet Strands Planes After Being Hit By Ransomware Attack</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p><p> </p><p><strong>Tweet of the Week (32:30)</strong></p><img src="https://lh3.googleusercontent.com/WQo6WP7CZeZSbuBy0ly87bhpzItS0KTl8OpGGdwO2CGuwLF2nIVaTnitwf9-rQ_HYgFSx1yPJc5PeBnJu1QDz2KnlvjFLjCQpRRCfsw1Q7-ls8Ea_y_n3u2N9u80x1uSmKu23xNgSnvZen7e8Q" /><p><a href="https://twitter.com/fesshole/status/1529000507037171713">https://twitter.com/fesshole/status/1529000507037171713</a></p><p> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform">The European Cybersecurity Blogger Awards 2022 - Vote Here!</a></p><p>We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="61597697" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/9389ecc3-6a07-4bc3-8cdc-0246ded15bff/audio/79700461-7e44-4a77-9ecd-5f3d384db332/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 105 - Curse You Zencastr</itunes:title>
      <itunes:author>Thom Langford, Javvad malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a9d70684-72dd-453d-a4ba-0b91122307b0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:46</itunes:duration>
      <itunes:summary>The European Cybersecurity Blogger Awards 2022 - Vote Here!
https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform

We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”

This week in InfoSec mentions Bill Gates’ Internet tidal wave
 
Rant of the Week is less Duck, Duck, Go than it is frick, frick, no!

Billy Big Balls is a story of chaotic good
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week highlights a coping mechanism for imposter syndrome</itunes:summary>
      <itunes:subtitle>The European Cybersecurity Blogger Awards 2022 - Vote Here!
https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform

We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast”

This week in InfoSec mentions Bill Gates’ Internet tidal wave
 
Rant of the Week is less Duck, Duck, Go than it is frick, frick, no!

Billy Big Balls is a story of chaotic good
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week highlights a coping mechanism for imposter syndrome</itunes:subtitle>
      <itunes:keywords>cybersecurity blogger awards, duck duck stop, ransomware chugging, best non-vendor cybersecurity podcast, ego folder, best podcast</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8117a7d0-b818-4145-a742-adf14a92bf3b</guid>
      <title>Episode 104 - The Late Late Show</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (07:03)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th May 2003: In the Friends episode "The One in Barbados, Part One", Ross Geller's laptop was infected by the Kournikova worm when Chandler Bing checked his email on it and opened an email claiming to contain nude images of tennis player Ana Kournikova.</p><img src="https://lh6.googleusercontent.com/Hj0BO4A5oX7bI8rOjycusLDEIO6UHZjJi1S_9FHEi22heCapih2sk0kHEutI87-rNlpyFXaOY6H1Q-9ezbv5thJPAyQ5cOGNAZbO2HfjOOaigFoKJz7EE-HcVQg3TJiZR5Wov2tEeCvx7n-2ag" /><p><a href="https://twitter.com/todayininfosec/status/1523719745555648514">https://twitter.com/todayininfosec/status/1523719745555648514</a></p><p> </p><p><strong>Rant of the Week (09:34)</strong></p><p><a href="https://www.justice.gov/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act">Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act</a></p><p><a href="https://techcrunch.com/2022/05/19/justice-department-good-fatih-hackers-cfaa/?guccounter=1&guce_referrer=aHR0cHM6Ly90LmNvLw&guce_referrer_sig=AQAAACwtOLjL0jbTl6BItyiCw_AB0djBk6W-xECBw3_d0ctoNRk_eGO0B9w1kDRwTXrqNyW9rQ2lwNZ_Ud5xfjymj4qhf_XMZC0OmCxFF4SvPrLSfmj5EMkWRIhX-tQZFEQ2YG9A5_ynjPcR5UM1SYbpvRkMPgTqEosoWm2R3WN3tc61">DOJ says it will no longer prosecute good-faith hackers under CFAA</a></p><p>The U.S. Justice Department announced Thursday it will not bring charges under federal hacking laws against security researchers and hackers who act in good faith.</p><p>The policy for the first time “directs that good-faith security research should not be charged” under the Computer Fraud and Abuse Act (CFAA), a seismic shift away from its previous policy that allowed prosecutors to bring federal charges against hackers who find security flaws for the purpose of helping to secure exposed or vulnerable systems.</p><p>The Justice Department said that good-faith researchers are those who carry out their activity “in a manner designed to avoid any harm to individuals or the public,” and where the information is “used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.”</p><p> </p><p><strong>Billy Big Balls of the Week (17:05)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/">National bank hit by ransomware trolls hackers with dick pics</a></p><p>After suffering a ransomware attack by the Hive operation, the Bank of Zambia made it clear that they were not going to pay by posting a picture of male genitalia and telling the hackers to s… (well, you can use your imagination).</p><p>Last week, the Bank of Zambia, the country's central bank, disclosed that recent technical outages resulted from a cyberattack.</p><p>"The Bank of Zambia wishes to inform members of the public that it experienced a partial disruption to some of its Information Technology (IT) applications on Monday 9th May 2022," disclosed the bank in a press release.</p><p>"The disruption, which affected some systems at the Bank such as the Bureau De Change Monitoring System and the Website, emanated from a suspected cybersecurity incident. We wish to advise that these systems have since been fully restored."</p><p> </p><p><strong>Industry News (20:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doctor-accused-prolific-ransomware/">Doctor Accused of Being Prolific Ransomware Developer</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-hiring-north-korean/">US Government Warns Firms to Avoid Hiring North Korean IT Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-warn-of-15m-courier-scams/">Police Warn of £15m Courier Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/digital-skimming-non-magecart/">Digital Skimming is Now the Preserve of Non-Magecart Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-skills-one-cybersecurity/">UK Government: Lack of Skills the Number One Issue in Cybersecurity</a></p><p>Jav: <a href="https://www.infosecurity-magazine.com/news/personal-information-two-million/">Personal Information of Nearly Two Million Texans Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-passwords-shared-docs/">Half of IT Leaders Store Passwords in Shared Docs</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-cyberspace-domain-warfare/">Microsoft President: Cyber Space Has Become the New Domain of Warfare</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-emergency-directive-vmware/">CISA Issues Emergency Directive for VMware Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (26:16)</strong></p><img src="https://lh5.googleusercontent.com/iXzdFxUX2hQr9JlMKLMRoaRpWTSaZOWBeijiwQbhJMcA2KVjsVZRb3LEP9X0E8i4iuqT7Zs5M7Ske_yeZT5q7aFGtQ5ZH17W0fdvObEdUUSQEiIGIY1-PWLC2bcsFbIzc0clZtTmI1mTcSlzPQ" /><p><a href="https://twitter.com/haveigotnews/status/1526505336017936384">https://twitter.com/haveigotnews/status/1526505336017936384</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 21 May 2022 13:06:35 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-104-the-late-late-show-ZjFFdk4u</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (07:03)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th May 2003: In the Friends episode "The One in Barbados, Part One", Ross Geller's laptop was infected by the Kournikova worm when Chandler Bing checked his email on it and opened an email claiming to contain nude images of tennis player Ana Kournikova.</p><img src="https://lh6.googleusercontent.com/Hj0BO4A5oX7bI8rOjycusLDEIO6UHZjJi1S_9FHEi22heCapih2sk0kHEutI87-rNlpyFXaOY6H1Q-9ezbv5thJPAyQ5cOGNAZbO2HfjOOaigFoKJz7EE-HcVQg3TJiZR5Wov2tEeCvx7n-2ag" /><p><a href="https://twitter.com/todayininfosec/status/1523719745555648514">https://twitter.com/todayininfosec/status/1523719745555648514</a></p><p> </p><p><strong>Rant of the Week (09:34)</strong></p><p><a href="https://www.justice.gov/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act">Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act</a></p><p><a href="https://techcrunch.com/2022/05/19/justice-department-good-fatih-hackers-cfaa/?guccounter=1&guce_referrer=aHR0cHM6Ly90LmNvLw&guce_referrer_sig=AQAAACwtOLjL0jbTl6BItyiCw_AB0djBk6W-xECBw3_d0ctoNRk_eGO0B9w1kDRwTXrqNyW9rQ2lwNZ_Ud5xfjymj4qhf_XMZC0OmCxFF4SvPrLSfmj5EMkWRIhX-tQZFEQ2YG9A5_ynjPcR5UM1SYbpvRkMPgTqEosoWm2R3WN3tc61">DOJ says it will no longer prosecute good-faith hackers under CFAA</a></p><p>The U.S. Justice Department announced Thursday it will not bring charges under federal hacking laws against security researchers and hackers who act in good faith.</p><p>The policy for the first time “directs that good-faith security research should not be charged” under the Computer Fraud and Abuse Act (CFAA), a seismic shift away from its previous policy that allowed prosecutors to bring federal charges against hackers who find security flaws for the purpose of helping to secure exposed or vulnerable systems.</p><p>The Justice Department said that good-faith researchers are those who carry out their activity “in a manner designed to avoid any harm to individuals or the public,” and where the information is “used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.”</p><p> </p><p><strong>Billy Big Balls of the Week (17:05)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/">National bank hit by ransomware trolls hackers with dick pics</a></p><p>After suffering a ransomware attack by the Hive operation, the Bank of Zambia made it clear that they were not going to pay by posting a picture of male genitalia and telling the hackers to s… (well, you can use your imagination).</p><p>Last week, the Bank of Zambia, the country's central bank, disclosed that recent technical outages resulted from a cyberattack.</p><p>"The Bank of Zambia wishes to inform members of the public that it experienced a partial disruption to some of its Information Technology (IT) applications on Monday 9th May 2022," disclosed the bank in a press release.</p><p>"The disruption, which affected some systems at the Bank such as the Bureau De Change Monitoring System and the Website, emanated from a suspected cybersecurity incident. We wish to advise that these systems have since been fully restored."</p><p> </p><p><strong>Industry News (20:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/doctor-accused-prolific-ransomware/">Doctor Accused of Being Prolific Ransomware Developer</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-hiring-north-korean/">US Government Warns Firms to Avoid Hiring North Korean IT Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-warn-of-15m-courier-scams/">Police Warn of £15m Courier Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/digital-skimming-non-magecart/">Digital Skimming is Now the Preserve of Non-Magecart Groups</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-skills-one-cybersecurity/">UK Government: Lack of Skills the Number One Issue in Cybersecurity</a></p><p>Jav: <a href="https://www.infosecurity-magazine.com/news/personal-information-two-million/">Personal Information of Nearly Two Million Texans Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-passwords-shared-docs/">Half of IT Leaders Store Passwords in Shared Docs</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-cyberspace-domain-warfare/">Microsoft President: Cyber Space Has Become the New Domain of Warfare</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-emergency-directive-vmware/">CISA Issues Emergency Directive for VMware Vulnerabilities</a></p><p> </p><p><strong>Tweet of the Week (26:16)</strong></p><img src="https://lh5.googleusercontent.com/iXzdFxUX2hQr9JlMKLMRoaRpWTSaZOWBeijiwQbhJMcA2KVjsVZRb3LEP9X0E8i4iuqT7Zs5M7Ske_yeZT5q7aFGtQ5ZH17W0fdvObEdUUSQEiIGIY1-PWLC2bcsFbIzc0clZtTmI1mTcSlzPQ" /><p><a href="https://twitter.com/haveigotnews/status/1526505336017936384">https://twitter.com/haveigotnews/status/1526505336017936384</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49188698" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0a414bec-8572-4a8d-8196-4bfe7afc603b/audio/7a2c2912-1542-43d6-aecb-9519fd722f4c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 104 - The Late Late Show</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/dba60aa2-da63-4050-8ca8-f5207669edce/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:09</itunes:duration>
      <itunes:summary>This week in Infosec highlights a plothole
 
Rant of the Week “Won’t somebody think of the researchers????”

Billy Big Balls is a story about the organ that is attached to said Big Balls
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a piece of advice for Elon Musk </itunes:summary>
      <itunes:subtitle>This week in Infosec highlights a plothole
 
Rant of the Week “Won’t somebody think of the researchers????”

Billy Big Balls is a story about the organ that is attached to said Big Balls
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a piece of advice for Elon Musk </itunes:subtitle>
      <itunes:keywords>doj, dick pics, unsolicited, elon musk, the one in barbados</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cf051ff3-113f-4d34-8d89-2105bbdaeb71</guid>
      <title>Episode 103 - One Third Extra Fat</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (07:30)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and restitution of $15,000. </p><p><a href="https://en.m.wikipedia.org/wiki/Jeanson_James_Ancheta">Jeanson James Ancheta</a></p><p><a href="https://twitter.com/todayininfosec/status/1523719745555648514">https://twitter.com/todayininfosec/status/1523719745555648514</a></p><p>12th May 1989: The Marijuana Virus crippled the Chisholm Institute of Technology's computer network. It displayed a message on computers' screens, which read "The system is stoned. Legalise marijuana."</p><p><a href="https://news.google.com/newspapers?nid=1300&dat=19890512&id=v5VVAAAAIBAJ&sjid=CZcDAAAAIBAJ&pg=2178,571606">Virus stops students from using institute computers</a></p><p><a href="https://twitter.com/todayininfosec/status/1524842708967247908">https://twitter.com/todayininfosec/status/1524842708967247908</a></p><p> </p><p><strong>Rant of the Week (15:07)</strong></p><p><a href="https://www.theregister.com/2022/05/12/eu_encryption_csam/">Europe proposes tackling child abuse by killing privacy, strong encryption</a></p><p>A number of options <a href="https://ec.europa.eu/home-affairs/proposal-regulation-laying-down-rules-prevent-and-combat-child-sexual-abuse_en">have been put forward</a> for lawmakers to mull that aim to encourage or ensure online service providers and messaging apps tackle the "detection, removal, and reporting of previously-known and new child sexual abuse material and grooming."</p><p>These options range from voluntary detection and reporting of child sexual abuse material (CSAM) and grooming, to legally mandating that service providers find and report such material using whatever detection technology they wish — essentially scanning all private communications and, if necessary, breaking end-to-end (E2E) encryption for everyone.</p><p>If rubber-stamped, the rules will apply to online hosting services and interpersonal communication services, such as messaging apps, app stores, and internet access providers.</p><p> </p><p><strong>Billy Big Balls of the Week (24:05)</strong></p><p><a href="https://www.theregister.com/2022/05/09/china_livestreaming/">China wants its youth to stop giving livestreamers money</a></p><p>China's internet regulator, the Cyberspace Administration of China (CAC), has published guidelines that aim to stop minors from giving tips or other forms of payment to livestreamers, watching after 10pm, or live streaming themselves.</p><p> </p><p><strong>Industry News (33:59)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-15m-reward-info/">US Government Offers $15m Reward for Info on Conti Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-31000-ftse-100-logins/">Researchers Find 31,000 FTSE 100 Logins on Dark Web</a></p><p><a href="https://www.infosecurity-magazine.com/news/london-police-warn-of-crypto/">London Police Warn of Crypto Muggings – Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/treasury-sanctions-crypto-north/">Treasury Sanctions Crypto Firm After North Korea’s $620m Heist</a><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">n</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-supply-chain-security/">Five Eyes Nations Issue New Supply Chain Security Advisory</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-ransomware-relies-on-the/">Microsoft: Ransomware Relies on the Gig Economy</a></p><p><a href="https://www.infosecurity-magazine.com/news/trustpilot-delete-millions-fake/">Trustpilot Forced to Delete Millions of Fake Reviews in 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-initiative-rapid/">Government Initiative Promises Rapid Blocking of Scam Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/costa-rica-national-emergency/">Costa Rica Declares National Emergency Following Conti Cyber-Attack</a></p><p> </p><p>Airplane: <a href="https://www.bbc.co.uk/news/world-middle-east-61395745">https://www.bbc.co.uk/news/world-middle-east-61395745</a></p><p> </p><p><strong>Tweet of the Week (44:07)</strong></p><img src="https://lh5.googleusercontent.com/QO7wWgNJbpRFVLo9f7jR7S3aqYY9ecjoiEEfImhn-11AAegZAmCNeleS_oz4U_SzK9JVGSXFGXz_Gwxo_G84SaLUFpL41UtKd9PTykXAR4W5cLKxBGE0CUiZ-i81dOt_x00kwjjit4XRN7bN6w" /><p><a href="https://twitter.com/__femb0t/status/1524791901110542336">https://twitter.com/__femb0t/status/1524791901110542336</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 13 May 2022 16:44:12 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-3-one-third-extra-fat-5AGOzAMr</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (07:30)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and restitution of $15,000. </p><p><a href="https://en.m.wikipedia.org/wiki/Jeanson_James_Ancheta">Jeanson James Ancheta</a></p><p><a href="https://twitter.com/todayininfosec/status/1523719745555648514">https://twitter.com/todayininfosec/status/1523719745555648514</a></p><p>12th May 1989: The Marijuana Virus crippled the Chisholm Institute of Technology's computer network. It displayed a message on computers' screens, which read "The system is stoned. Legalise marijuana."</p><p><a href="https://news.google.com/newspapers?nid=1300&dat=19890512&id=v5VVAAAAIBAJ&sjid=CZcDAAAAIBAJ&pg=2178,571606">Virus stops students from using institute computers</a></p><p><a href="https://twitter.com/todayininfosec/status/1524842708967247908">https://twitter.com/todayininfosec/status/1524842708967247908</a></p><p> </p><p><strong>Rant of the Week (15:07)</strong></p><p><a href="https://www.theregister.com/2022/05/12/eu_encryption_csam/">Europe proposes tackling child abuse by killing privacy, strong encryption</a></p><p>A number of options <a href="https://ec.europa.eu/home-affairs/proposal-regulation-laying-down-rules-prevent-and-combat-child-sexual-abuse_en">have been put forward</a> for lawmakers to mull that aim to encourage or ensure online service providers and messaging apps tackle the "detection, removal, and reporting of previously-known and new child sexual abuse material and grooming."</p><p>These options range from voluntary detection and reporting of child sexual abuse material (CSAM) and grooming, to legally mandating that service providers find and report such material using whatever detection technology they wish — essentially scanning all private communications and, if necessary, breaking end-to-end (E2E) encryption for everyone.</p><p>If rubber-stamped, the rules will apply to online hosting services and interpersonal communication services, such as messaging apps, app stores, and internet access providers.</p><p> </p><p><strong>Billy Big Balls of the Week (24:05)</strong></p><p><a href="https://www.theregister.com/2022/05/09/china_livestreaming/">China wants its youth to stop giving livestreamers money</a></p><p>China's internet regulator, the Cyberspace Administration of China (CAC), has published guidelines that aim to stop minors from giving tips or other forms of payment to livestreamers, watching after 10pm, or live streaming themselves.</p><p> </p><p><strong>Industry News (33:59)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-government-15m-reward-info/">US Government Offers $15m Reward for Info on Conti Actors</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-31000-ftse-100-logins/">Researchers Find 31,000 FTSE 100 Logins on Dark Web</a></p><p><a href="https://www.infosecurity-magazine.com/news/london-police-warn-of-crypto/">London Police Warn of Crypto Muggings – Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/treasury-sanctions-crypto-north/">Treasury Sanctions Crypto Firm After North Korea’s $620m Heist</a><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">n</a></p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-supply-chain-security/">Five Eyes Nations Issue New Supply Chain Security Advisory</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-ransomware-relies-on-the/">Microsoft: Ransomware Relies on the Gig Economy</a></p><p><a href="https://www.infosecurity-magazine.com/news/trustpilot-delete-millions-fake/">Trustpilot Forced to Delete Millions of Fake Reviews in 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-initiative-rapid/">Government Initiative Promises Rapid Blocking of Scam Sites</a></p><p><a href="https://www.infosecurity-magazine.com/news/costa-rica-national-emergency/">Costa Rica Declares National Emergency Following Conti Cyber-Attack</a></p><p> </p><p>Airplane: <a href="https://www.bbc.co.uk/news/world-middle-east-61395745">https://www.bbc.co.uk/news/world-middle-east-61395745</a></p><p> </p><p><strong>Tweet of the Week (44:07)</strong></p><img src="https://lh5.googleusercontent.com/QO7wWgNJbpRFVLo9f7jR7S3aqYY9ecjoiEEfImhn-11AAegZAmCNeleS_oz4U_SzK9JVGSXFGXz_Gwxo_G84SaLUFpL41UtKd9PTykXAR4W5cLKxBGE0CUiZ-i81dOt_x00kwjjit4XRN7bN6w" /><p><a href="https://twitter.com/__femb0t/status/1524791901110542336">https://twitter.com/__femb0t/status/1524791901110542336</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="69875170" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0ef9f4a6-d650-443d-9f57-879a359446b2/audio/191c8100-b6fb-495b-8b66-43f8ab988835/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 103 - One Third Extra Fat</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b09cd215-22a1-477a-b141-1cc3bc74fbdb/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:31</itunes:duration>
      <itunes:summary>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week “Won’t somebody think of the children????”

Billy Big Balls is a story about sound investment advice from the Chinese government
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an insight into the difference between good coding and bad coding</itunes:summary>
      <itunes:subtitle>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week “Won’t somebody think of the children????”

Billy Big Balls is a story about sound investment advice from the Chinese government
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an insight into the difference between good coding and bad coding</itunes:subtitle>
      <itunes:keywords>backdoors, cac, andys backddor, china, host unknown, csam, machine learning</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1e269f8-f541-4842-bdbc-29ce7b08ff2d</guid>
      <title>Episode 102A - A New Era</title>
      <description><![CDATA[<p><strong>This week in infosec</strong></p><p><a href="https://www.theregister.com/2008/05/08/downfall_of_botnet_master_sobe_owns/">I was a teenage botmaster</a></p><p> </p><p><strong>Rant of the week </strong></p><p>(Thom, how do I add images to this section?) I want to use the images and description you used  here https://podcast.hostunknown.tv/episodes/episode-102-end-of-an-era </p><p>Never mind. I'll type it out.</p><p>Rant is about EC Council being EC council </p><p><strong>Billy Big balls</strong></p><p>The Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.</p><p>This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.</p><p><a href="https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/">https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/</a></p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hhs-information-security-program/">HHS Information Security Program 'Not Effective'</a></p><p><a href="https://www.infosecurity-magazine.com/news/sim-fraud-solution-sparks-privacy/">SIM Fraud Solution Sparks Privacy Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/groundbreaking-cybersecurity-book/">Groundbreaking Cybersecurity Book Published</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">GitHub to Enforce Two-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/hunter-biden-laptop-lawsuit/">Hunter Biden Laptop Repairman Sues Over Hacker Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-inboxes-hijacked-send-1000/">NHS Inboxes Hijacked to Send 1000+ Malicious Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-apple-google-team/">Microsoft, Apple and Google Team Up on Passwordless Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainians-ddos-russian-vodka/">Ukrainians DDoS Russian Vodka Supply Chains</a></p><p><a href="https://www.infosecurity-magazine.com/news/special-police-encrypted-chat/">Special Police Constable Used Encrypted Chat to Post Child Abuse Content</a></p><p> </p><p><strong>Tweet of the week</strong></p><p><a href="https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Mon, 9 May 2022 13:56:08 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, NOT Thom Langford, NOT Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-102a-a-new-era-DCSQbZEL</link>
      <content:encoded><![CDATA[<p><strong>This week in infosec</strong></p><p><a href="https://www.theregister.com/2008/05/08/downfall_of_botnet_master_sobe_owns/">I was a teenage botmaster</a></p><p> </p><p><strong>Rant of the week </strong></p><p>(Thom, how do I add images to this section?) I want to use the images and description you used  here https://podcast.hostunknown.tv/episodes/episode-102-end-of-an-era </p><p>Never mind. I'll type it out.</p><p>Rant is about EC Council being EC council </p><p><strong>Billy Big balls</strong></p><p>The Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.</p><p>This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.</p><p><a href="https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/">https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/</a></p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hhs-information-security-program/">HHS Information Security Program 'Not Effective'</a></p><p><a href="https://www.infosecurity-magazine.com/news/sim-fraud-solution-sparks-privacy/">SIM Fraud Solution Sparks Privacy Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/groundbreaking-cybersecurity-book/">Groundbreaking Cybersecurity Book Published</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">GitHub to Enforce Two-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/hunter-biden-laptop-lawsuit/">Hunter Biden Laptop Repairman Sues Over Hacker Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-inboxes-hijacked-send-1000/">NHS Inboxes Hijacked to Send 1000+ Malicious Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-apple-google-team/">Microsoft, Apple and Google Team Up on Passwordless Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainians-ddos-russian-vodka/">Ukrainians DDoS Russian Vodka Supply Chains</a></p><p><a href="https://www.infosecurity-magazine.com/news/special-police-encrypted-chat/">Special Police Constable Used Encrypted Chat to Post Child Abuse Content</a></p><p> </p><p><strong>Tweet of the week</strong></p><p><a href="https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="24073278" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3d476724-decd-4072-8aed-684db091b84b/audio/244a0dce-1173-4097-9aa4-d630fd7105b8/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 102A - A New Era</itunes:title>
      <itunes:author>Javvad Malik, NOT Thom Langford, NOT Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1cdee9b9-c5e1-48f0-bc4b-f8b6b36d205c/f87b3972-d44d-49ff-bd8d-3496c84a404f/3000x3000/hu.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:04</itunes:duration>
      <itunes:summary>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week shows the real value people place on “exposure”

Billy Big Balls is a bold strategy from the Indian government, let’s see if it works out for them
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the real reason behind Musk’s purchase of Twitter</itunes:summary>
      <itunes:subtitle>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week shows the real value people place on “exposure”

Billy Big Balls is a bold strategy from the Indian government, let’s see if it works out for them
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the real reason behind Musk’s purchase of Twitter</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">149df799-eb4a-4c95-8c03-38d3dd564144</guid>
      <title>Episode 102 - End of an Era</title>
      <description><![CDATA[<p><strong>This Week in Infosec (09:52)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>[None]</p><p> </p><p><strong>Rant of the Week (10:59)</strong></p><img src="https://lh3.googleusercontent.com/UofknQxv4F1DsGh1ummtCsjPr5P1a0S8KByhR-YL8iUj1o7iWyr_HSDyE7924RQa04NsqLJj_EVNJ1yLTkJsPIcpYSQcUYO5E3uzSoqNhFRFXsl5M7hUS2EW9sEcSvfAMAKVyOq0oXGoGX8kyQ" /><p><a href="https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><p>Full story:</p><p><a href="https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><p> </p><p><strong>Billy Big balls of the Week (19:45)</strong></p><p>The Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.</p><p>This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.</p><p><a href="https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/">https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/</a></p><p> </p><p>Industry News (27:49)</p><p><a href="https://www.infosecurity-magazine.com/news/hhs-information-security-program/">HHS Information Security Program 'Not Effective'</a></p><p><a href="https://www.infosecurity-magazine.com/news/sim-fraud-solution-sparks-privacy/">SIM Fraud Solution Sparks Privacy Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/groundbreaking-cybersecurity-book/">Groundbreaking Cybersecurity Book Published</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">GitHub to Enforce Two-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/hunter-biden-laptop-lawsuit/">Hunter Biden Laptop Repairman Sues Over Hacker Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-inboxes-hijacked-send-1000/">NHS Inboxes Hijacked to Send 1000+ Malicious Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-apple-google-team/">Microsoft, Apple and Google Team Up on Passwordless Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainians-ddos-russian-vodka/">Ukrainians DDoS Russian Vodka Supply Chains</a></p><p><a href="https://www.infosecurity-magazine.com/news/special-police-encrypted-chat/">Special Police Constable Used Encrypted Chat to Post Child Abuse Content</a></p><p> </p><p>Tweet of the Week (39:24)</p><img src="https://lh4.googleusercontent.com/cq0pdO5OTyWc5GpS3oi2LEL1SqdiiDoQKoUaLfCH4GROus2sILTKPFTpGw-EKQK2PYByCeGCzVqQy5mHH0gWECzwKHkycOo3CWQG6SBqdy9hfYtM5T2D1SJrRzW-AcIkIMXa6vLNsghYpbyT2g" /><p><a href="https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><img src="https://lh3.googleusercontent.com/NyUf_7rhYbI7iSJui3PE75tjRRwrKNPOsF_vA1XEoR9dKI9KNJCGRT_67dlq1QvP2QQv_-AX1S8g3UMJ2unFxv3aKBFsyTQGfJubqBnsBGmNphLtxSR7B-GDrJtoDkty1D6cIl4aixpAM7-bOg" /><p><a href="https://twitter.com/soychotic/status/1520126831478951936?s=20&t=hpsXh46fM3YmrHtbI3mkuw">https://twitter.com/soychotic/status/1520126831478951936?s=20&t=hpsXh46fM3YmrHtbI3mkuw</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 7 May 2022 14:12:26 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, NOT Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-102-end-of-an-era-RpL0s5cx</link>
      <content:encoded><![CDATA[<p><strong>This Week in Infosec (09:52)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>[None]</p><p> </p><p><strong>Rant of the Week (10:59)</strong></p><img src="https://lh3.googleusercontent.com/UofknQxv4F1DsGh1ummtCsjPr5P1a0S8KByhR-YL8iUj1o7iWyr_HSDyE7924RQa04NsqLJj_EVNJ1yLTkJsPIcpYSQcUYO5E3uzSoqNhFRFXsl5M7hUS2EW9sEcSvfAMAKVyOq0oXGoGX8kyQ" /><p><a href="https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/johnjhacking/status/1520877711094394884?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><p>Full story:</p><p><a href="https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/johnjhacking/status/1521629688120156160?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><p> </p><p><strong>Billy Big balls of the Week (19:45)</strong></p><p>The Indian government has issued new directives requiring organizations to report cybersecurity incidents to CERT-IN within six hours, even if those incidents are port or vulnerability scans of computer systems.</p><p>This requirement was promoted by India's Computer Emergency Response Team (CERT-In), who states it has identified specific gaps causing difficulties in security incident analysis and response, and to address them, it needs to impose more aggressive measures.</p><p><a href="https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/">https://www.bleepingcomputer.com/news/security/india-to-require-cybersecurity-incident-reporting-within-six-hours/</a></p><p> </p><p>Industry News (27:49)</p><p><a href="https://www.infosecurity-magazine.com/news/hhs-information-security-program/">HHS Information Security Program 'Not Effective'</a></p><p><a href="https://www.infosecurity-magazine.com/news/sim-fraud-solution-sparks-privacy/">SIM Fraud Solution Sparks Privacy Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/groundbreaking-cybersecurity-book/">Groundbreaking Cybersecurity Book Published</a></p><p><a href="https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/">GitHub to Enforce Two-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/hunter-biden-laptop-lawsuit/">Hunter Biden Laptop Repairman Sues Over Hacker Allegations</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-inboxes-hijacked-send-1000/">NHS Inboxes Hijacked to Send 1000+ Malicious Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-apple-google-team/">Microsoft, Apple and Google Team Up on Passwordless Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainians-ddos-russian-vodka/">Ukrainians DDoS Russian Vodka Supply Chains</a></p><p><a href="https://www.infosecurity-magazine.com/news/special-police-encrypted-chat/">Special Police Constable Used Encrypted Chat to Post Child Abuse Content</a></p><p> </p><p>Tweet of the Week (39:24)</p><img src="https://lh4.googleusercontent.com/cq0pdO5OTyWc5GpS3oi2LEL1SqdiiDoQKoUaLfCH4GROus2sILTKPFTpGw-EKQK2PYByCeGCzVqQy5mHH0gWECzwKHkycOo3CWQG6SBqdy9hfYtM5T2D1SJrRzW-AcIkIMXa6vLNsghYpbyT2g" /><p><a href="https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA">https://twitter.com/joehelle/status/1521241363785953280?s=21&t=nryrC32Sfqnyb1x0_0K2YA</a></p><img src="https://lh3.googleusercontent.com/NyUf_7rhYbI7iSJui3PE75tjRRwrKNPOsF_vA1XEoR9dKI9KNJCGRT_67dlq1QvP2QQv_-AX1S8g3UMJ2unFxv3aKBFsyTQGfJubqBnsBGmNphLtxSR7B-GDrJtoDkty1D6cIl4aixpAM7-bOg" /><p><a href="https://twitter.com/soychotic/status/1520126831478951936?s=20&t=hpsXh46fM3YmrHtbI3mkuw">https://twitter.com/soychotic/status/1520126831478951936?s=20&t=hpsXh46fM3YmrHtbI3mkuw</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="63561896" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/91ce4fc0-8ad0-4f0b-a756-a35fa0e45d34/audio/36052117-1998-4b74-a0a6-545703bef7ba/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 102 - End of an Era</itunes:title>
      <itunes:author>Thom Langford, NOT Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c3da1ab3-2dd1-4305-8f4e-d6055c202378/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:08</itunes:duration>
      <itunes:summary>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week shows the real value people place on “exposure”

Billy Big Balls is a bold strategy from the Indian government, let’s see if it works out for them
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the real reason behind Musk’s purchase of Twitter</itunes:summary>
      <itunes:subtitle>This week in Infosec takes a stroll down infosec memory lane
 
Rant of the Week shows the real value people place on “exposure”

Billy Big Balls is a bold strategy from the Indian government, let’s see if it works out for them
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week shows us the real reason behind Musk’s purchase of Twitter</itunes:subtitle>
      <itunes:keywords>passwordless, exposure, cert-in, six hours, reddit help, sans, ec-council</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1b9d223b-2912-437c-a250-bfabfee10758</guid>
      <title>Episode 101 - My Brain Hurts</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (09:26)</strong></p><p>With content liberated from the “today in infosec” Twitter  account and further afield</p><p>26th April 2013: LivingSocial informed its employees that 50 million users' names, emails, dates of birth, and SHA1 hashed passwords were compromised.</p><p><a href="https://allthingsd.com/20130426/livingsocial-hacked-more-than-50-million-customer-names-emails-birthdates-and-encrypted-passwords-accessed/">LivingSocial Hacked</a></p><p><a href="https://twitter.com/todayininfosec/status/1519039747301199872">https://twitter.com/todayininfosec/status/1519039747301199872</a></p><p>26th April 1999: The first known virus to target the flash BIOS of a PC, the <a href="http://en.wikipedia.org/wiki/Chernobyl_virus">CIH/Chernobyl Virus</a> triggers on this day, erasing hard drives and disabling PCs primarily in Asia and Europe. One of the most destructive viruses in history, Turkey and South Korea alone reported 300,000 infected systems.</p><p> </p><p><strong>As Seen on Reddit (23:29)</strong></p><p><a href="https://www.reddit.com/r/cybersecurity/comments/p9fo4d/my_thoughts_on_a_decade_of_cyber_security_10/">My thoughts on a decade of Cyber Security: 10 Lessons I’ve learned</a></p><p>Reddit user <a href="https://www.reddit.com/user/CrowGrandFather/">u/CrowGrandFather</a> has spent more than a decade in the Cyber Security Industry and has come up with 10 lessons he learned along the way.</p><p>1. Cyber is risk and nothing else</p><p>2. No one cares about your stats</p><p>3. Understand that not everyone is as smart as you</p><p>4. Stop with the playbooks</p><p>5. Read the news for your boss</p><p>6. Blackhat is mostly pointless</p><p>7. Location, Location, Location</p><p>8. You’re probably doing threat intelligence wrong</p><p>9. Don’t write to be understood, write so that you can’t possibly be misunderstood</p><p>10. Make friends with your Marketing team</p><p>[That was this week's As seen on Reddit]</p><p> </p><p><strong>Industry News (42:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/linkedin-impersonated-brand/">LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/costa-rica-refuses-to-pay-ransom/">Costa Rica Refuses to Pay Cyber Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/bored-ape-yacht-club-3m-nft-scam/">Bored Ape Yacht Club Customers Lose $3m in NFT Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-hospitals-cut-internet/">French Hospitals Cut Internet Connection After Data Raid</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-teams-quantum-cyber/">Security Teams Should Be Addressing Quantum Cyber-Threats Now</a></p><p><a href="https://www.infosecurity-magazine.com/news/private-investigator-hedge-hack/">Private Investigator Admits Role in Hedge Fund Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-schools-free-governmentgrade/">UK Schools Can Sign-Up to Free Government-Grade Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/">Coca-Cola Investigates Data Breach Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-trading-fund-partners/">Crypto Trading Fund Partners Accused of Fraud</a></p><p> </p><p><strong>Tweet of the Week (45:00)</strong></p><img src="https://lh6.googleusercontent.com/ePaKY3IujOa_TwEXlGnvCCTOyKK-1NLwXBdBSQVVZavoMX9yb9sk-235z7xyKjUtkHgNSXYmucbWu4W2ukObaGkFaXFWRso66ccAXrRAkpFNAYj1X4uyvD65KbXnzJORdRs8zxCk" /><p><a href="https://twitter.com/austinpeay/status/1519397653305561088">https://twitter.com/austinpeay/status/1519397653305561088</a></p><img src="https://lh5.googleusercontent.com/M_rGb69_RF5bwT-YqbKmBWu0BkSMKNaSDhjlK9qEZPwa2YuL1S4_3mDu5Gyg_i2xFx7xWkyqIRCSUIb-o_dJePIL6eAVvdpSo0vYXkst7hdu2RlaYw90TP7t2M21NEXcognjkKns" /><p><a href="https://twitter.com/austinpeay/status/1519399475785125889">https://twitter.com/austinpeay/status/1519399475785125889</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 Apr 2022 16:42:46 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-101-my-brain-hurts-j_W1E79B</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (09:26)</strong></p><p>With content liberated from the “today in infosec” Twitter  account and further afield</p><p>26th April 2013: LivingSocial informed its employees that 50 million users' names, emails, dates of birth, and SHA1 hashed passwords were compromised.</p><p><a href="https://allthingsd.com/20130426/livingsocial-hacked-more-than-50-million-customer-names-emails-birthdates-and-encrypted-passwords-accessed/">LivingSocial Hacked</a></p><p><a href="https://twitter.com/todayininfosec/status/1519039747301199872">https://twitter.com/todayininfosec/status/1519039747301199872</a></p><p>26th April 1999: The first known virus to target the flash BIOS of a PC, the <a href="http://en.wikipedia.org/wiki/Chernobyl_virus">CIH/Chernobyl Virus</a> triggers on this day, erasing hard drives and disabling PCs primarily in Asia and Europe. One of the most destructive viruses in history, Turkey and South Korea alone reported 300,000 infected systems.</p><p> </p><p><strong>As Seen on Reddit (23:29)</strong></p><p><a href="https://www.reddit.com/r/cybersecurity/comments/p9fo4d/my_thoughts_on_a_decade_of_cyber_security_10/">My thoughts on a decade of Cyber Security: 10 Lessons I’ve learned</a></p><p>Reddit user <a href="https://www.reddit.com/user/CrowGrandFather/">u/CrowGrandFather</a> has spent more than a decade in the Cyber Security Industry and has come up with 10 lessons he learned along the way.</p><p>1. Cyber is risk and nothing else</p><p>2. No one cares about your stats</p><p>3. Understand that not everyone is as smart as you</p><p>4. Stop with the playbooks</p><p>5. Read the news for your boss</p><p>6. Blackhat is mostly pointless</p><p>7. Location, Location, Location</p><p>8. You’re probably doing threat intelligence wrong</p><p>9. Don’t write to be understood, write so that you can’t possibly be misunderstood</p><p>10. Make friends with your Marketing team</p><p>[That was this week's As seen on Reddit]</p><p> </p><p><strong>Industry News (42:07)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/linkedin-impersonated-brand/">LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/costa-rica-refuses-to-pay-ransom/">Costa Rica Refuses to Pay Cyber Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/bored-ape-yacht-club-3m-nft-scam/">Bored Ape Yacht Club Customers Lose $3m in NFT Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-hospitals-cut-internet/">French Hospitals Cut Internet Connection After Data Raid</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-teams-quantum-cyber/">Security Teams Should Be Addressing Quantum Cyber-Threats Now</a></p><p><a href="https://www.infosecurity-magazine.com/news/private-investigator-hedge-hack/">Private Investigator Admits Role in Hedge Fund Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-schools-free-governmentgrade/">UK Schools Can Sign-Up to Free Government-Grade Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/">Coca-Cola Investigates Data Breach Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-trading-fund-partners/">Crypto Trading Fund Partners Accused of Fraud</a></p><p> </p><p><strong>Tweet of the Week (45:00)</strong></p><img src="https://lh6.googleusercontent.com/ePaKY3IujOa_TwEXlGnvCCTOyKK-1NLwXBdBSQVVZavoMX9yb9sk-235z7xyKjUtkHgNSXYmucbWu4W2ukObaGkFaXFWRso66ccAXrRAkpFNAYj1X4uyvD65KbXnzJORdRs8zxCk" /><p><a href="https://twitter.com/austinpeay/status/1519397653305561088">https://twitter.com/austinpeay/status/1519397653305561088</a></p><img src="https://lh5.googleusercontent.com/M_rGb69_RF5bwT-YqbKmBWu0BkSMKNaSDhjlK9qEZPwa2YuL1S4_3mDu5Gyg_i2xFx7xWkyqIRCSUIb-o_dJePIL6eAVvdpSo0vYXkst7hdu2RlaYw90TP7t2M21NEXcognjkKns" /><p><a href="https://twitter.com/austinpeay/status/1519399475785125889">https://twitter.com/austinpeay/status/1519399475785125889</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="72086383" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/095e3368-6979-41b8-a197-192677d4a436/audio/0421a66b-d95d-4fc5-aeaf-88bd1335174b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 101 - My Brain Hurts</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c60815ec-b41e-46ca-a54d-b02f927c5919/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:03</itunes:duration>
      <itunes:summary>This week in Infosec talks about life before Groupon
 
Rant of the Week is still on holiday this week so an “As seen on Reddit” is covering

Billy Big Balls are also still on holiday so we’ll go into:
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an urgent message for users</itunes:summary>
      <itunes:subtitle>This week in Infosec talks about life before Groupon
 
Rant of the Week is still on holiday this week so an “As seen on Reddit” is covering

Billy Big Balls are also still on holiday so we’ll go into:
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is an urgent message for users</itunes:subtitle>
      <itunes:keywords>as seen on reddit, we take security seriously, this week in infosec, tweet of the week, hashed and salted, host unknown, infosec, groupon</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2f435be4-039a-48d1-9a25-8ddd6c0449ca</guid>
      <title>Episode 100 - Can We Go Home Now</title>
      <description><![CDATA[<p><strong>This Week In InfoSec (10:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion".</p><p><a href="https://twitter.com/todayininfosec/status/1245550127806201857">https://twitter.com/todayininfosec/status/1245550127806201857</a></p><p><a href="https://news.mit.edu/1998/disney">MIT says "Disney buys MIT" hack revealed by low price</a></p><p>1st April 2004: The now ubiquitous Gmail service is launched as an invitation-only beta service. At first met with skepticism due to it being launched on April Fool’s Day, the ease of use and speed that Gmail offered for a web-based email service quickly won converts. The fact that Gmail was invitation-only for a long time helped fuel a mystique that those who had a Gmail address were hip and uber-cool. </p><p> </p><p><strong>Rant of the Week: (16:25)</strong></p><p><a href="https://www.theregister.com/2022/04/05/mahesh_bank_no_firewall_attack/">Bank had no firewall license, intrusion or phishing protection – guess the rest</a></p><p>An Indian bank that did not have a valid firewall license, had not employed phishing protection, lacked an intrusion detection system and eschewed use of any intrusion prevention system has, shockingly, been compromised by criminals who made off with millions of rupees.</p><img src="https://lh6.googleusercontent.com/k_8yvYuxGtyINS8pRV4z1BeM6aFbtSDQw6aAIwtyf4FjC8HpOrwVCnXvsuItNuv7JejUUHsSMniDPLBIMeF7nLnJuKOd4frHuiORyj3_leRvruSIcP0WYiYNp6aR1gqEpAbvV2Lw" /><p> </p><p><strong>Billy Big Balls of the Week (23:20)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/bearded-barbie-hackers-catfish-high-ranking-israeli-officials/">Bearded Barbie hackers catfish high ranking Israeli officials</a></p><p>The Hamas-backed hacking group tracked as 'APT-C-23' was found catfishing Israeli officials working in defense, law, enforcement, and government agencies, ultimately leading to the deployment of new malware.</p><p>The campaign involves high-level social engineering tricks such as creating fake social media profiles and a long-term engagement with the targets before delivering spyware.</p><p> </p><p><strong>Industry News (30:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/scottish-power-parent-data-breach/">Scottish Power Parent Company Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/trezor-customers-phished-mailchimp/">Trezor Customers Phished After MailChimp Compromise</a></p><p><a href="https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/">Cadbury Warns of Easter Egg Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/jail-releases-300-suspects-computer/">Jail Releases 300 Suspects Due to Computer "Glitch"</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-voice-message-phishing/">WhatsApp 'Voice Message' Is an Info-Stealing Phishing Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/germany-shuts-down-hydra/">Germany Shuts Down Russian Darknet Marketplace Hydra</a></p><p><a href="https://www.infosecurity-magazine.com/news/attack-ukraine-telecoms-employee/">Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials</a></p><p><a href="https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/">Block Warns Eight Million Customers of Insider Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/employee-info-13-million-records/">Employee Info Among 13 Million Records Leaked by Fox News</a></p><p> </p><p><strong>Tweet of the Week (41:50)</strong></p><img src="https://lh6.googleusercontent.com/L1tuCt7YZck9kUzKK8ZtN7W2jcdSaZyXSTk6D-HoUUen_1JL4QpY7z1JuTwomRAr7vqNNckn5wxgMBVAqhkLwrHBuiQnFfrSUH1XE22WMQfnxabvQmjGWLxGN9gbr4HOYao5A02H" /><p><a href="https://twitter.com/_sn0ww/status/1511857122966835200">https://twitter.com/_sn0ww/status/1511857122966835200</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Apr 2022 17:24:23 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês, Bearded Barbies, Military Grade)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-100-can-we-go-home-now-TyT2gK0h</link>
      <content:encoded><![CDATA[<p><strong>This Week In InfoSec (10:15)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion".</p><p><a href="https://twitter.com/todayininfosec/status/1245550127806201857">https://twitter.com/todayininfosec/status/1245550127806201857</a></p><p><a href="https://news.mit.edu/1998/disney">MIT says "Disney buys MIT" hack revealed by low price</a></p><p>1st April 2004: The now ubiquitous Gmail service is launched as an invitation-only beta service. At first met with skepticism due to it being launched on April Fool’s Day, the ease of use and speed that Gmail offered for a web-based email service quickly won converts. The fact that Gmail was invitation-only for a long time helped fuel a mystique that those who had a Gmail address were hip and uber-cool. </p><p> </p><p><strong>Rant of the Week: (16:25)</strong></p><p><a href="https://www.theregister.com/2022/04/05/mahesh_bank_no_firewall_attack/">Bank had no firewall license, intrusion or phishing protection – guess the rest</a></p><p>An Indian bank that did not have a valid firewall license, had not employed phishing protection, lacked an intrusion detection system and eschewed use of any intrusion prevention system has, shockingly, been compromised by criminals who made off with millions of rupees.</p><img src="https://lh6.googleusercontent.com/k_8yvYuxGtyINS8pRV4z1BeM6aFbtSDQw6aAIwtyf4FjC8HpOrwVCnXvsuItNuv7JejUUHsSMniDPLBIMeF7nLnJuKOd4frHuiORyj3_leRvruSIcP0WYiYNp6aR1gqEpAbvV2Lw" /><p> </p><p><strong>Billy Big Balls of the Week (23:20)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/bearded-barbie-hackers-catfish-high-ranking-israeli-officials/">Bearded Barbie hackers catfish high ranking Israeli officials</a></p><p>The Hamas-backed hacking group tracked as 'APT-C-23' was found catfishing Israeli officials working in defense, law, enforcement, and government agencies, ultimately leading to the deployment of new malware.</p><p>The campaign involves high-level social engineering tricks such as creating fake social media profiles and a long-term engagement with the targets before delivering spyware.</p><p> </p><p><strong>Industry News (30:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/scottish-power-parent-data-breach/">Scottish Power Parent Company Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/trezor-customers-phished-mailchimp/">Trezor Customers Phished After MailChimp Compromise</a></p><p><a href="https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/">Cadbury Warns of Easter Egg Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/jail-releases-300-suspects-computer/">Jail Releases 300 Suspects Due to Computer "Glitch"</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-voice-message-phishing/">WhatsApp 'Voice Message' Is an Info-Stealing Phishing Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/germany-shuts-down-hydra/">Germany Shuts Down Russian Darknet Marketplace Hydra</a></p><p><a href="https://www.infosecurity-magazine.com/news/attack-ukraine-telecoms-employee/">Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials</a></p><p><a href="https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/">Block Warns Eight Million Customers of Insider Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/employee-info-13-million-records/">Employee Info Among 13 Million Records Leaked by Fox News</a></p><p> </p><p><strong>Tweet of the Week (41:50)</strong></p><img src="https://lh6.googleusercontent.com/L1tuCt7YZck9kUzKK8ZtN7W2jcdSaZyXSTk6D-HoUUen_1JL4QpY7z1JuTwomRAr7vqNNckn5wxgMBVAqhkLwrHBuiQnFfrSUH1XE22WMQfnxabvQmjGWLxGN9gbr4HOYao5A02H" /><p><a href="https://twitter.com/_sn0ww/status/1511857122966835200">https://twitter.com/_sn0ww/status/1511857122966835200</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44703149" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3829b1c1-4ec8-4c61-85dc-28748d0a1b49/audio/fdddfd43-d5ed-446f-8d58-d5d2a849cd40/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 100 - Can We Go Home Now</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês, Bearded Barbies, Military Grade</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f9f04e87-2e0e-4bc6-a413-97d3b56e0d6d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:34</itunes:duration>
      <itunes:summary>This week in Infosec talks about joking about hacks
 
Rant of the Week is a Pikachu shocked face meme

Billy Big Balls is a story about bearded barbie
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reflects on Infosec vernacular</itunes:summary>
      <itunes:subtitle>This week in Infosec talks about joking about hacks
 
Rant of the Week is a Pikachu shocked face meme

Billy Big Balls is a story about bearded barbie
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reflects on Infosec vernacular</itunes:subtitle>
      <itunes:keywords>sucked off, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5c78e235-dc9c-451e-a94c-cdadb8428cd9</guid>
      <title>Episode 99 - Do You Think They Will Notice?</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st March 1999: The hugely successful motion picture, <a href="http://en.wikipedia.org/wiki/The_Matrix">The Matrix</a>, is released on this day. Many call it a classic (ok, that’s me), many call it influential (ok, me again), but no one can deny that the impact it had on many aspects of our society from the emerging tech culture, to the movie industry, to science-fiction, to political thinking</p><p><a href="https://twitter.com/todayininfosec/status/1243040970741956610">25th March 2010</a>: Albert Gonzales was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington, a Kentucky facility for inmates requiring medical or mental health attention.</p><p><a href="https://www.rollingstone.com/culture/culture-news/sex-drugs-and-the-biggest-cybercrime-of-all-time-241836/">Sex, Drugs, and the Biggest Cybercrime of All Time</a></p><p> </p><p><strong>Rant of the Week (19:32)</strong></p><p><a href="https://www.theregister.com/2022/03/31/yale_electronics_fraud/">Yale finance director stole $40m in computers to resell on the sly</a></p><p>A now-former finance director stole tablet computers and other equipment worth $40 million from the Yale University School of Medicine, and resold them for a profit.</p><p><a href="https://www.dailymail.co.uk/news/article-10669329/Yale-School-Medicine-employee-stole-40-million-computers-electronics-school.html">https://www.dailymail.co.uk/news/article-10669329/Yale-School-Medicine-employee-stole-40-million-computers-electronics-school.html</a></p><p> </p><p><strong>Billy Big Balls of the Week (30:30)</strong></p><p><a href="https://www.theregister.com/2022/03/30/ubiquiti_brian_krebs/">Ubiquiti sues Krebs on Security for defamation</a></p><p>Network equipment maker Ubiquiti on Tuesday filed a lawsuit against infosec journalist Brian Krebs, alleging he defamed the company by falsely accusing the firm of covering up a cyber-attack.</p><p>On March 30, 2021, Krebs <a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">reported</a> that Ubiquiti <a href="https://www.theregister.com/2021/04/01/ubiquiti_data_breach/">had disclosed</a> a January breach involving a third-party cloud provider, later revealed to be AWS, and that an unnamed source within the firm had claimed the company was downplaying a catastrophic compromise.</p><p><a href="https://www.theverge.com/2022/3/30/23003600/apple-meta-shared-data-hackers-pretending-law-enforcement-officials">Apple and Meta shared data with hackers pretending to be law enforcement officials</a></p><p>Apple and Meta handed over user data to hackers who faked emergency data request orders typically sent by law enforcement, according to a report by <a href="https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests">Bloomberg</a>. The slip-up happened in mid-2021, with both companies falling for the phony requests and providing information about users’ IP addresses, phone numbers, and home addresses.</p><p>Law enforcement officials often request data from social platforms in connection with criminal investigations, allowing them to obtain information about the owner of a specific online account. While these requests require a subpoena or search warrant signed by a judge, emergency data requests don’t — and are intended for cases that involve life-threatening situations.</p><p><strong>Industry News (37:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/">Dental Practice Fined for Sharing Patient Data on Social Media</a></p><p><a href="https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/">Yandex is Sending iOS Users' Data to Russia</a></p><p><a href="https://www.infosecurity-magazine.com/news/attackers-steal-618m-from-crypto/">Attackers Steal $618m From Crypto Firm</a></p><p><a href="https://www.infosecurity-magazine.com/news/bidens-disclosure-deadlines/">New Research Claims Biden's Disclosure Deadlines Are Unrealistic</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-rethink-russian-supply-chain/">NCSC: Time to Rethink Russian Supply Chain Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-on-california/">Cyber-attack on California Healthcare Organization</a></p><p><a href="https://www.infosecurity-magazine.com/news/version-pci-dss-emerging-payment/">New Version of PCI DSS Designed to Tackle Emerging Payment Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/no-patch-available-critical/">No Patch Available Yet for Critical SpringShell Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-issues-ups-warning/">CISA Issues UPS Warning</a></p><p> </p><p><strong>Tweet of the Week (</strong></p><img src="https://lh3.googleusercontent.com/VN4Qo_87ovEoNdZ5BKY7xvaNDxG-_5NzP58r_k286edx5q2ETQgM8TdItAHathkLB7LFz84SmM_Rejdcl9-QsDjTB3zHQ6ZKIh2jMUrNc5wxx_qlAaZJMkki0IaBtFlUsqEKOX0G" /><p><a href="https://twitter.com/AskAManager/status/1509246642364588040">https://twitter.com/AskAManager/status/1509246642364588040</a></p><img src="https://lh6.googleusercontent.com/yj038nDvIamUjUgd4yPIbr544VrLqSb3ivmIw-42FnBIJhSrNZNEvonLmrD8f8DnHaBz-XvUBKCmTfiiwx1Y2yMRjg_wsMPzy2vaYeh6Luzeyw6Keqc-t3tepXHcVYseUz9upBnY" /><p><a href="https://twitter.com/HackingLZ/status/1509529191439425540">https://twitter.com/HackingLZ/status/1509529191439425540</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 1 Apr 2022 17:54:53 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford, The Late Jack Daniel)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-99-do-you-think-they-will-notice-zw9BEnUs</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>31st March 1999: The hugely successful motion picture, <a href="http://en.wikipedia.org/wiki/The_Matrix">The Matrix</a>, is released on this day. Many call it a classic (ok, that’s me), many call it influential (ok, me again), but no one can deny that the impact it had on many aspects of our society from the emerging tech culture, to the movie industry, to science-fiction, to political thinking</p><p><a href="https://twitter.com/todayininfosec/status/1243040970741956610">25th March 2010</a>: Albert Gonzales was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington, a Kentucky facility for inmates requiring medical or mental health attention.</p><p><a href="https://www.rollingstone.com/culture/culture-news/sex-drugs-and-the-biggest-cybercrime-of-all-time-241836/">Sex, Drugs, and the Biggest Cybercrime of All Time</a></p><p> </p><p><strong>Rant of the Week (19:32)</strong></p><p><a href="https://www.theregister.com/2022/03/31/yale_electronics_fraud/">Yale finance director stole $40m in computers to resell on the sly</a></p><p>A now-former finance director stole tablet computers and other equipment worth $40 million from the Yale University School of Medicine, and resold them for a profit.</p><p><a href="https://www.dailymail.co.uk/news/article-10669329/Yale-School-Medicine-employee-stole-40-million-computers-electronics-school.html">https://www.dailymail.co.uk/news/article-10669329/Yale-School-Medicine-employee-stole-40-million-computers-electronics-school.html</a></p><p> </p><p><strong>Billy Big Balls of the Week (30:30)</strong></p><p><a href="https://www.theregister.com/2022/03/30/ubiquiti_brian_krebs/">Ubiquiti sues Krebs on Security for defamation</a></p><p>Network equipment maker Ubiquiti on Tuesday filed a lawsuit against infosec journalist Brian Krebs, alleging he defamed the company by falsely accusing the firm of covering up a cyber-attack.</p><p>On March 30, 2021, Krebs <a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">reported</a> that Ubiquiti <a href="https://www.theregister.com/2021/04/01/ubiquiti_data_breach/">had disclosed</a> a January breach involving a third-party cloud provider, later revealed to be AWS, and that an unnamed source within the firm had claimed the company was downplaying a catastrophic compromise.</p><p><a href="https://www.theverge.com/2022/3/30/23003600/apple-meta-shared-data-hackers-pretending-law-enforcement-officials">Apple and Meta shared data with hackers pretending to be law enforcement officials</a></p><p>Apple and Meta handed over user data to hackers who faked emergency data request orders typically sent by law enforcement, according to a report by <a href="https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests">Bloomberg</a>. The slip-up happened in mid-2021, with both companies falling for the phony requests and providing information about users’ IP addresses, phone numbers, and home addresses.</p><p>Law enforcement officials often request data from social platforms in connection with criminal investigations, allowing them to obtain information about the owner of a specific online account. While these requests require a subpoena or search warrant signed by a judge, emergency data requests don’t — and are intended for cases that involve life-threatening situations.</p><p><strong>Industry News (37:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/">Dental Practice Fined for Sharing Patient Data on Social Media</a></p><p><a href="https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/">Yandex is Sending iOS Users' Data to Russia</a></p><p><a href="https://www.infosecurity-magazine.com/news/attackers-steal-618m-from-crypto/">Attackers Steal $618m From Crypto Firm</a></p><p><a href="https://www.infosecurity-magazine.com/news/bidens-disclosure-deadlines/">New Research Claims Biden's Disclosure Deadlines Are Unrealistic</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-rethink-russian-supply-chain/">NCSC: Time to Rethink Russian Supply Chain Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-on-california/">Cyber-attack on California Healthcare Organization</a></p><p><a href="https://www.infosecurity-magazine.com/news/version-pci-dss-emerging-payment/">New Version of PCI DSS Designed to Tackle Emerging Payment Threats</a></p><p><a href="https://www.infosecurity-magazine.com/news/no-patch-available-critical/">No Patch Available Yet for Critical SpringShell Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-issues-ups-warning/">CISA Issues UPS Warning</a></p><p> </p><p><strong>Tweet of the Week (</strong></p><img src="https://lh3.googleusercontent.com/VN4Qo_87ovEoNdZ5BKY7xvaNDxG-_5NzP58r_k286edx5q2ETQgM8TdItAHathkLB7LFz84SmM_Rejdcl9-QsDjTB3zHQ6ZKIh2jMUrNc5wxx_qlAaZJMkki0IaBtFlUsqEKOX0G" /><p><a href="https://twitter.com/AskAManager/status/1509246642364588040">https://twitter.com/AskAManager/status/1509246642364588040</a></p><img src="https://lh6.googleusercontent.com/yj038nDvIamUjUgd4yPIbr544VrLqSb3ivmIw-42FnBIJhSrNZNEvonLmrD8f8DnHaBz-XvUBKCmTfiiwx1Y2yMRjg_wsMPzy2vaYeh6Luzeyw6Keqc-t3tepXHcVYseUz9upBnY" /><p><a href="https://twitter.com/HackingLZ/status/1509529191439425540">https://twitter.com/HackingLZ/status/1509529191439425540</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50861778" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/fbb68ac8-f9a6-4bb0-a231-30f2fd942d14/audio/55968f20-cdb9-4479-9cba-2afaa31037a9/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 99 - Do You Think They Will Notice?</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford, The Late Jack Daniel</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/fcadeeb2-d595-4cc8-9f7d-20fa67e803e5/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:59</itunes:duration>
      <itunes:summary>This week in InfoSec talks about the man behind the PCI-DSS raison d&apos;être
 
Rant of the Week is a story about terrible asset management

Billy Big Balls is a company taking on a real life Billy Big Balls
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about inflation</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about the man behind the PCI-DSS raison d&apos;être
 
Rant of the Week is a story about terrible asset management

Billy Big Balls is a company taking on a real life Billy Big Balls
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about inflation</itunes:subtitle>
      <itunes:keywords>we dont love ubiquiti, jack daniel, the matrix, we love krebs, albert gonzalez, sans</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">36fe5b12-a50c-4cff-b761-3dfdbadf48f9</guid>
      <title>Episode 98 - The Statin-Free Show</title>
      <description><![CDATA[<p>Links</p><p>https://www.theguardian.com/uk/canoe </p><p><a href="https://www.theregister.com/2022/03/22/okta_lapsus/">Authentication oufit Okta investigating Lapsus$ breach report </a></p><p><a href="https://www.bbc.co.uk/news/technology-60864283">Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal</a></p><p><a href="https://www.infosecurity-magazine.com/news/netflix-to-charge-password-sharers/">Netflix to Charge Password Sharers</a></p><p><a href="https://www.infosecurity-magazine.com/news/background-check-company-sued-over/">Background Check Company Sued Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-25-customers-impacted-lapsus/">Okta Confirms 2.5% of Customers Impacted by Lapsus Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/medical-leaks-12000-sensitive/">Medical Service Leaks 12,000 Sensitive Patient Images</a></p><p><a href="https://www.infosecurity-magazine.com/news/west-blocks-russias-weather-data/">West Blocks Russia's Access to Weather Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-encrypts-100k-files/">Fastest Ransomware Encrypts 100k Files in Four Minutes</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-indicts-russian-over-carding/">US Indicts Russian Over "Carding Shop"</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-cso-lapsus-incident-was/">Okta CSO: Lapsus Incident Was “Embarrassing”</a></p><p><a href="https://www.infosecurity-magazine.com/news/indian-police-bust-online/">Indian Police Bust Online Helicopter Scam</a></p><p>Tweet of the week <a href="https://twitter.com/aschmelyun/status/1506960015063625733">https://twitter.com/aschmelyun/status/1506960015063625733</a>  </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Mar 2022 12:17:42 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-98-the-statin-free-show-_5SKVjpR</link>
      <content:encoded><![CDATA[<p>Links</p><p>https://www.theguardian.com/uk/canoe </p><p><a href="https://www.theregister.com/2022/03/22/okta_lapsus/">Authentication oufit Okta investigating Lapsus$ breach report </a></p><p><a href="https://www.bbc.co.uk/news/technology-60864283">Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal</a></p><p><a href="https://www.infosecurity-magazine.com/news/netflix-to-charge-password-sharers/">Netflix to Charge Password Sharers</a></p><p><a href="https://www.infosecurity-magazine.com/news/background-check-company-sued-over/">Background Check Company Sued Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-25-customers-impacted-lapsus/">Okta Confirms 2.5% of Customers Impacted by Lapsus Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/medical-leaks-12000-sensitive/">Medical Service Leaks 12,000 Sensitive Patient Images</a></p><p><a href="https://www.infosecurity-magazine.com/news/west-blocks-russias-weather-data/">West Blocks Russia's Access to Weather Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-encrypts-100k-files/">Fastest Ransomware Encrypts 100k Files in Four Minutes</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-indicts-russian-over-carding/">US Indicts Russian Over "Carding Shop"</a></p><p><a href="https://www.infosecurity-magazine.com/news/okta-cso-lapsus-incident-was/">Okta CSO: Lapsus Incident Was “Embarrassing”</a></p><p><a href="https://www.infosecurity-magazine.com/news/indian-police-bust-online/">Indian Police Bust Online Helicopter Scam</a></p><p>Tweet of the week <a href="https://twitter.com/aschmelyun/status/1506960015063625733">https://twitter.com/aschmelyun/status/1506960015063625733</a>  </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="40936319" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8623967d-587d-4bfb-971b-b30b4945f7d2/audio/2047424d-9032-4534-9c8e-48562247ad20/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 98 - The Statin-Free Show</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:42:38</itunes:duration>
      <itunes:summary>Javvad and Andy run riot while Thom is away. </itunes:summary>
      <itunes:subtitle>Javvad and Andy run riot while Thom is away. </itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ee1fe731-0550-401a-84e0-79ab21e3558a</guid>
      <title>Episode 97 - He Is Back And He Really is Bad</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th March 1985: The <a href="https://gcn.com/cloud-infrastructure/2011/08/what-was-the-first-registered-domain-name-on-the-internet/316506/">first</a> Internet domain <a href="http://symbolics.com/">symbolics.com</a> is registered by Symbolics, a Massachusetts computer company.</p><p>16th March 2018: National Lottery owner Camelot has warned of a "low level" cyber-attack that affected customer accounts.  It has asked all of its customers to change the passwords on their accounts as a precaution.</p><p> </p><p><strong>Rant of the Week (16:31)</strong></p><p><a href="https://www.theregister.com/2022/03/15/kaspersky_germany_antivirus/">Germany advises citizens to uninstall Kaspersky antivirus</a></p><p>Nation's cybersecurity agency has doubts about Russian firm's reliability</p><p>Germany's BSI federal cybersecurity agency has warned the country's citizens not to install Russian-owned Kaspersky antivirus, saying it has "doubts about the reliability of the manufacturer."</p><p>Russia-based Kaspersky has long been a target of suspicious rumours in the West over its ownership and allegiance to Russia's rulers.</p><p>In an advisory published today, the agency said: "The BSI recommends replacing applications from Kaspersky's virus protection software portfolio with alternative products."</p><p> </p><p><strong>Billy Big Balls of the Week ( 24:49)</strong></p><p><a href="https://www.wired.co.uk/article/conti-leaks-ransomware-work-life">The Workaday Life of the World’s Most Dangerous Ransomware Gang</a></p><p>A Ukrainian researcher leaked 60,000 messages from inside the Conti ransomware group. </p><p>The Conti ransomware gang was on top of the world. The sprawling network of cybercriminals extorted $180 million from its victims last year, eclipsing the earnings of all other ransomware gangs. Then it backed Vladimir Putin’s invasion of Ukraine. And it all started falling apart.</p><p> </p><p><strong>Industry News (31:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/">French Bank Denies Access to Russian Workforce</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-unveils-new-cyber-flashing-law/">UK Unveils New Cyber Flashing Law</a></p><p><a href="https://www.infosecurity-magazine.com/news/israeli-goverment-websites-offline/">Israeli Government Websites Taken Offline in Large-Scale Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-hit-rosneft/">Hackers Hit Rosneft</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-blocks-assanges-extradition/">UK Blocks Assange's Extradition Appeal</a></p><p><a href="https://www.infosecurity-magazine.com/news/avast-merger-raises-competition/">Avast Merger Raises Competition Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-watchdog-fines-meta-19m-over/">Irish Watchdog Fines Meta $19m Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/kaspersky-hits-politically-bsi/">Kaspersky Hits Back at "Politically Motivated" BSI Advisory</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/">Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations</a></p><p> </p><p><strong>Tweet of the Week (39:12)</strong></p><img src="https://lh6.googleusercontent.com/0fdkZqO4OG8MfLuDM2_9gMBEDUdF3_KKlWfAUO2Bq5wPb0cMxHH7S7yGFek-EhQlJtJOccS5UjIR4WFIratbMlSWZ5SwAAyuOpwFPPKvgaXC_-Uveef003V0uXtjf27U_aP8lSbZ" /><p><a href="https://twitter.com/moonpolysoft/status/1503519499089186818">https://twitter.com/moonpolysoft/status/1503519499089186818</a>  </p><img src="https://lh6.googleusercontent.com/Ns64Yp1RDUjwdjSiTXvLMUmz9Qckn0lEahmyh7i_JGY-apnh573qrntYZpSkgVwv7XgLrrlx75R5Wc2BhsbHMAGVlrf9eC38pmOatluypKNEGjZgp3aWB1KGjtIsApG2fy8vCgOs" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Mar 2022 13:00:00 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford, Eugene Kaspersky)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-97-he-is-back-and-he-really-is-bad-ksMdzVt9</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:06)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>15th March 1985: The <a href="https://gcn.com/cloud-infrastructure/2011/08/what-was-the-first-registered-domain-name-on-the-internet/316506/">first</a> Internet domain <a href="http://symbolics.com/">symbolics.com</a> is registered by Symbolics, a Massachusetts computer company.</p><p>16th March 2018: National Lottery owner Camelot has warned of a "low level" cyber-attack that affected customer accounts.  It has asked all of its customers to change the passwords on their accounts as a precaution.</p><p> </p><p><strong>Rant of the Week (16:31)</strong></p><p><a href="https://www.theregister.com/2022/03/15/kaspersky_germany_antivirus/">Germany advises citizens to uninstall Kaspersky antivirus</a></p><p>Nation's cybersecurity agency has doubts about Russian firm's reliability</p><p>Germany's BSI federal cybersecurity agency has warned the country's citizens not to install Russian-owned Kaspersky antivirus, saying it has "doubts about the reliability of the manufacturer."</p><p>Russia-based Kaspersky has long been a target of suspicious rumours in the West over its ownership and allegiance to Russia's rulers.</p><p>In an advisory published today, the agency said: "The BSI recommends replacing applications from Kaspersky's virus protection software portfolio with alternative products."</p><p> </p><p><strong>Billy Big Balls of the Week ( 24:49)</strong></p><p><a href="https://www.wired.co.uk/article/conti-leaks-ransomware-work-life">The Workaday Life of the World’s Most Dangerous Ransomware Gang</a></p><p>A Ukrainian researcher leaked 60,000 messages from inside the Conti ransomware group. </p><p>The Conti ransomware gang was on top of the world. The sprawling network of cybercriminals extorted $180 million from its victims last year, eclipsing the earnings of all other ransomware gangs. Then it backed Vladimir Putin’s invasion of Ukraine. And it all started falling apart.</p><p> </p><p><strong>Industry News (31:24)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/">French Bank Denies Access to Russian Workforce</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-unveils-new-cyber-flashing-law/">UK Unveils New Cyber Flashing Law</a></p><p><a href="https://www.infosecurity-magazine.com/news/israeli-goverment-websites-offline/">Israeli Government Websites Taken Offline in Large-Scale Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-hit-rosneft/">Hackers Hit Rosneft</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-blocks-assanges-extradition/">UK Blocks Assange's Extradition Appeal</a></p><p><a href="https://www.infosecurity-magazine.com/news/avast-merger-raises-competition/">Avast Merger Raises Competition Concerns</a></p><p><a href="https://www.infosecurity-magazine.com/news/irish-watchdog-fines-meta-19m-over/">Irish Watchdog Fines Meta $19m Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/kaspersky-hits-politically-bsi/">Kaspersky Hits Back at "Politically Motivated" BSI Advisory</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/">Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations</a></p><p> </p><p><strong>Tweet of the Week (39:12)</strong></p><img src="https://lh6.googleusercontent.com/0fdkZqO4OG8MfLuDM2_9gMBEDUdF3_KKlWfAUO2Bq5wPb0cMxHH7S7yGFek-EhQlJtJOccS5UjIR4WFIratbMlSWZ5SwAAyuOpwFPPKvgaXC_-Uveef003V0uXtjf27U_aP8lSbZ" /><p><a href="https://twitter.com/moonpolysoft/status/1503519499089186818">https://twitter.com/moonpolysoft/status/1503519499089186818</a>  </p><img src="https://lh6.googleusercontent.com/Ns64Yp1RDUjwdjSiTXvLMUmz9Qckn0lEahmyh7i_JGY-apnh573qrntYZpSkgVwv7XgLrrlx75R5Wc2BhsbHMAGVlrf9eC38pmOatluypKNEGjZgp3aWB1KGjtIsApG2fy8vCgOs" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42111802" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d3ffe808-b7c5-4d3d-94af-31725904b3fe/audio/1141fe65-2f41-473a-a4fc-87458ad0459f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 97 - He Is Back And He Really is Bad</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford, Eugene Kaspersky</itunes:author>
      <itunes:duration>00:43:52</itunes:duration>
      <itunes:summary>This week in Infosec talks about the start of the Internet
 
Rant of the Week is a story about guilt by association

Billy Big Balls walks us through the inner workings of the worlds largest ransomware company
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives tips on how to endear yourself to colleagues</itunes:summary>
      <itunes:subtitle>This week in Infosec talks about the start of the Internet
 
Rant of the Week is a story about guilt by association

Billy Big Balls walks us through the inner workings of the worlds largest ransomware company
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives tips on how to endear yourself to colleagues</itunes:subtitle>
      <itunes:keywords>conti office politics, kaspersky, red bull, it could be you, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1abcdbab-fa71-45b2-9517-01486652e93a</guid>
      <title>Episode 96 - We Don&apos;t Know What She Has But They Are Colossal</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:22)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>6th March 1992:  The <a href="http://en.wikipedia.org/wiki/Michelangelo_(computer_virus)">Michelangelo virus</a>, so-named because it activates on March 6, the birthday of Michelangelo, begins infecting computers. The virus will also make news in 1993. It was one of the earliest viruses to receive widespread media attention and also one of the first to prompt widespread hysteria.  The irony of the name of the virus was that nothing in the virus’ code referenced Michelangelo. It is possible the virus author, who was never identified, did not know March 6th was Michelangelo’s birthday!</p><p>9th March 1999:  United States Vice President <a href="http://en.wikipedia.org/wiki/Al_Gore">Al Gore</a> gives an interview on CNN’s <a href="http://en.wikipedia.org/wiki/Late_Edition">Late Edition</a> in which he states, “During my service in the United States Congress, I took the initiative in creating the Internet. I took the initiative in moving forward a whole range of initiatives that have proven to be important to our country’s economic growth and environmental protection, improvements in our educational system.” This is the infamous statement which will be widely misquoted as “I invented the Internet.”</p><p> </p><p><strong>Rant of the Week  (13:59)</strong></p><p><a href="https://threatpost.com/orgs-security-bugs-ethical-hacking-help/178862/">Most Orgs Would Take Security Bugs Over Ethical Hacking Help</a></p><p>A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old “security by obscurity” ways.</p><p>Enterprises are putting greater stock in cybersecurity, but outdated “security by obscurity” is still prevailing as companies wrestle with security awareness and shy away from bug-bounty programs.</p><p>That’s according to new survey data from HackerOne, which found that a full 65 percent of organizations surveyed claimed that they “want to be seen as infallible.” However, just as many – 64 percent – said they practice a culture of security through obscurity, where secrecy is used as the primary method of protecting sensitive systems and assets.</p><p> </p><p><strong>Carole's Colossal Cahones (24:49)</strong></p><p>When Pigs Cry: Tool decodes the Emotional Lives of Swine</p><p><a href="https://www.nytimes.com/2022/03/09/science/pigs-oinks-grunts.html">https://www.nytimes.com/2022/03/09/science/pigs-oinks-grunts.html</a></p><p> </p><p><strong>Industry News  (30:31)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-to-acquire-mandiant/">Google to Acquire Mandiant</a></p><p><a href="https://www.infosecurity-magazine.com/news/dirty-pipe-exploit-rings-alarm/">Dirty Pipe Exploit Rings Alarm Bells in the Linux Community</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt41-group-compromises/">Chinese APT41 Group Compromises Six US Government Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/pokemon-card-covid-scammer/">Prison for Man Who Scammed US Government to Buy Pokémon Card</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-new-rules-tackle-online-scams/">UK Announces New Rules to Tackle Surging Online Scam Adverts</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-90-exposed-russia-cloud/">Over 90% of Exposed Russian Cloud Databases Compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-accountability-framework/">AI Accountability Framework Created to Guide Use of AI in Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-group-6m-salaries-tools/">Conti Group Spent $6m on Salaries, Tools and Services in a Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/qakbot-debuts-new-technique/">Qakbot Debuts New Technique</a></p><p> </p><p><strong>Tweet of the Week (39:33)</strong></p><img src="https://lh3.googleusercontent.com/c5D7BdJvlpArCYHrup3qVQ6SeXaI4YftJMo61v4ISkw5UmXtg4Q7vS7ZvmZ6TY9GpNrF7t4HtHaNv7A0oUtB9_22NyV2qus-IUsOryworZdkGylxJbo2y-RX3f696ezCsN4-xebE" /><p><a href="https://twitter.com/paygapapp">https://twitter.com/paygapapp</a>  </p><p><a href="https://twitter.com/achornback/status/1501677184515256321?s=12">https://twitter.com/achornback/status/1501677184515256321?s=12</a></p><img src="https://lh3.googleusercontent.com/E9nO1tdK4wFewUKAXBW-yLJHeGHXDG-JpdsYmzX526VJA_wSuMRugZRIUQwI57qhEZ_MFwX7ok01Gfzcyp9kXmYqGsY8UMtzd1xNX2K_sgadeqAU6cCFZmEWGU2Sgn8B0zsv2l3e" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Mar 2022 13:52:54 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Carole Theriault)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-96-we-dont-know-what-she-has-but-they-are-colossal-kH_H_dpn</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:22)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>6th March 1992:  The <a href="http://en.wikipedia.org/wiki/Michelangelo_(computer_virus)">Michelangelo virus</a>, so-named because it activates on March 6, the birthday of Michelangelo, begins infecting computers. The virus will also make news in 1993. It was one of the earliest viruses to receive widespread media attention and also one of the first to prompt widespread hysteria.  The irony of the name of the virus was that nothing in the virus’ code referenced Michelangelo. It is possible the virus author, who was never identified, did not know March 6th was Michelangelo’s birthday!</p><p>9th March 1999:  United States Vice President <a href="http://en.wikipedia.org/wiki/Al_Gore">Al Gore</a> gives an interview on CNN’s <a href="http://en.wikipedia.org/wiki/Late_Edition">Late Edition</a> in which he states, “During my service in the United States Congress, I took the initiative in creating the Internet. I took the initiative in moving forward a whole range of initiatives that have proven to be important to our country’s economic growth and environmental protection, improvements in our educational system.” This is the infamous statement which will be widely misquoted as “I invented the Internet.”</p><p> </p><p><strong>Rant of the Week  (13:59)</strong></p><p><a href="https://threatpost.com/orgs-security-bugs-ethical-hacking-help/178862/">Most Orgs Would Take Security Bugs Over Ethical Hacking Help</a></p><p>A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old “security by obscurity” ways.</p><p>Enterprises are putting greater stock in cybersecurity, but outdated “security by obscurity” is still prevailing as companies wrestle with security awareness and shy away from bug-bounty programs.</p><p>That’s according to new survey data from HackerOne, which found that a full 65 percent of organizations surveyed claimed that they “want to be seen as infallible.” However, just as many – 64 percent – said they practice a culture of security through obscurity, where secrecy is used as the primary method of protecting sensitive systems and assets.</p><p> </p><p><strong>Carole's Colossal Cahones (24:49)</strong></p><p>When Pigs Cry: Tool decodes the Emotional Lives of Swine</p><p><a href="https://www.nytimes.com/2022/03/09/science/pigs-oinks-grunts.html">https://www.nytimes.com/2022/03/09/science/pigs-oinks-grunts.html</a></p><p> </p><p><strong>Industry News  (30:31)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/google-to-acquire-mandiant/">Google to Acquire Mandiant</a></p><p><a href="https://www.infosecurity-magazine.com/news/dirty-pipe-exploit-rings-alarm/">Dirty Pipe Exploit Rings Alarm Bells in the Linux Community</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt41-group-compromises/">Chinese APT41 Group Compromises Six US Government Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/pokemon-card-covid-scammer/">Prison for Man Who Scammed US Government to Buy Pokémon Card</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-new-rules-tackle-online-scams/">UK Announces New Rules to Tackle Surging Online Scam Adverts</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-90-exposed-russia-cloud/">Over 90% of Exposed Russian Cloud Databases Compromised</a></p><p><a href="https://www.infosecurity-magazine.com/news/ai-accountability-framework/">AI Accountability Framework Created to Guide Use of AI in Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-group-6m-salaries-tools/">Conti Group Spent $6m on Salaries, Tools and Services in a Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/qakbot-debuts-new-technique/">Qakbot Debuts New Technique</a></p><p> </p><p><strong>Tweet of the Week (39:33)</strong></p><img src="https://lh3.googleusercontent.com/c5D7BdJvlpArCYHrup3qVQ6SeXaI4YftJMo61v4ISkw5UmXtg4Q7vS7ZvmZ6TY9GpNrF7t4HtHaNv7A0oUtB9_22NyV2qus-IUsOryworZdkGylxJbo2y-RX3f696ezCsN4-xebE" /><p><a href="https://twitter.com/paygapapp">https://twitter.com/paygapapp</a>  </p><p><a href="https://twitter.com/achornback/status/1501677184515256321?s=12">https://twitter.com/achornback/status/1501677184515256321?s=12</a></p><img src="https://lh3.googleusercontent.com/E9nO1tdK4wFewUKAXBW-yLJHeGHXDG-JpdsYmzX526VJA_wSuMRugZRIUQwI57qhEZ_MFwX7ok01Gfzcyp9kXmYqGsY8UMtzd1xNX2K_sgadeqAU6cCFZmEWGU2Sgn8B0zsv2l3e" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47461680" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f0cb687b-8629-46fd-b549-0c8b2a430123/audio/ae14e8f6-3f1b-4e0a-b4db-429f1dbd1530/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 96 - We Don&apos;t Know What She Has But They Are Colossal</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Carole Theriault</itunes:author>
      <itunes:duration>00:49:26</itunes:duration>
      <itunes:summary>This week in Infosec reminds us of how smart researchers name viruses
 
Rant of the Week is a story about security through obscurity

Billy Big Balls is a story that starts with oink oink

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week calls out Corporate social media accounts on their platitudes </itunes:summary>
      <itunes:subtitle>This week in Infosec reminds us of how smart researchers name viruses
 
Rant of the Week is a story about security through obscurity

Billy Big Balls is a story that starts with oink oink

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week calls out Corporate social media accounts on their platitudes </itunes:subtitle>
      <itunes:keywords>teenage mutant ninja turtles, pigs, sweetmeats, bug bounties, icyber cyber cyber, graham cluley, recruiters</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7db14793-b025-4d86-a797-abad6b01036a</guid>
      <title>Episode 95 - Dammit He Came Back</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:37)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>7th March 1997: During a hearing on Microsoft’s alleged antitrust activities, Bill Gates admits Microsoft’s contracts bar Internet content providers from promoting Netscape’s browser. Eventually, Internet Explorer dominates the web browser market as it is shipped for free with every copy of Windows.</p><p>3rd March 2009: “You may be wondering why I’ve turned myself into a zombie.</p><p>Well, it’s in honour of <a href="https://grahamcluley.com/national-zombie-awareness-week/">National Zombie Awareness</a> Week in Australia, which is highlighting the problem of compromised computers (known as bots or zombies).</p><p>Zombie computers can be invisibly controlled by criminal hackers to launch distributed denial-of-service attacks, spread spam messages or steal confidential information.”</p><p> </p><p><strong>Rant of the Week (15:36)</strong></p><p><a href="https://www.theregister.com/2022/03/02/passwords-weak-security-link/">The zero-password future can't come soon enough</a></p><p>SpyCloud highlights poor password hygiene of consumers and the threat to enterprises</p><p>Passwords, long a weakness in the tapestry of defences designed to keep enterprises and individuals more secure, continue to be a problem due in large part to the same issue that has haunted them for years: the users themselves.</p><p> </p><p><strong>Billy Big Balls of the Week (27:41)</strong></p><p><a href="https://jalopnik.com/russian-company-outsourced-the-main-components-in-ev-ch-1848603252">Russian Company Outsourced The Main Components In EV Chargers To A Ukrainian Company, Hilarity Ensues</a></p><p>The electric car chargers along one of the most important freeways in Russia are all down Monday after the Ukrainian company tasked with building the main components in the chargers used backdoor access to hack them, shut them down, and program anti-Putin/pro-Ukrainian messages to scroll past on their screens.</p><p>The outage affects chargers along the M11 motorway, which connects Moscow to St. Petersburg. The Russian energy company <a href="https://www.facebook.com/official.rosseti/posts/5236071213103660">Rosseti</a> confirmed the hack in a post on the company’s Facebook.</p><p> </p><p><strong>Industry News (33:52)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-asks-for-hackers-help/">Ukraine Asks for Hackers’ Help</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-tv-stations-hacked/">Russian TV Stations Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-encrypts-karma-ransomware/">Conti Encrypts Karma Ransom Note in Same Victim Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-and-google-turn-off-map-help/">Apple and Google Turn Off Map Features to Help Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-seeks-cybersecurity-framework/">NIST Seeks Cybersecurity Framework Feedback</a></p><p><a href="https://www.infosecurity-magazine.com/news/nvidia-admits-hackers-stole/">Nvidia Admits Hackers Stole Employee and Internal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-denies-satellite-hacking/">Russia Denies Satellite Hacking and Warns of Wider War</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-bank-destruction-documents/">Swiss Bank Requests Destruction of Documents</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerability-exploit-attempts/">Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites</a></p><p> </p><p><strong>Tweet of the Week (40:40)</strong></p><img src="https://lh4.googleusercontent.com/IwX5f-W7kVNVzMX4EMuYcLXgPMet3rAOi_mIB6IBE1KSzc7oeI4wONEa9rfolSawLneBctNX3eS85tkbutwbP5CkUdezG0Ht3DVgRG9lAnwSz_lT6oRCamTdPC6aDDcUu5DiZKUv" /><p><a href="https://twitter.com/gyarbij/status/1499289498005422083">https://twitter.com/gyarbij/status/1499289498005422083</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Mar 2022 13:44:26 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-95-dammit-he-came-back-z_mDwDKO</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:37)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>7th March 1997: During a hearing on Microsoft’s alleged antitrust activities, Bill Gates admits Microsoft’s contracts bar Internet content providers from promoting Netscape’s browser. Eventually, Internet Explorer dominates the web browser market as it is shipped for free with every copy of Windows.</p><p>3rd March 2009: “You may be wondering why I’ve turned myself into a zombie.</p><p>Well, it’s in honour of <a href="https://grahamcluley.com/national-zombie-awareness-week/">National Zombie Awareness</a> Week in Australia, which is highlighting the problem of compromised computers (known as bots or zombies).</p><p>Zombie computers can be invisibly controlled by criminal hackers to launch distributed denial-of-service attacks, spread spam messages or steal confidential information.”</p><p> </p><p><strong>Rant of the Week (15:36)</strong></p><p><a href="https://www.theregister.com/2022/03/02/passwords-weak-security-link/">The zero-password future can't come soon enough</a></p><p>SpyCloud highlights poor password hygiene of consumers and the threat to enterprises</p><p>Passwords, long a weakness in the tapestry of defences designed to keep enterprises and individuals more secure, continue to be a problem due in large part to the same issue that has haunted them for years: the users themselves.</p><p> </p><p><strong>Billy Big Balls of the Week (27:41)</strong></p><p><a href="https://jalopnik.com/russian-company-outsourced-the-main-components-in-ev-ch-1848603252">Russian Company Outsourced The Main Components In EV Chargers To A Ukrainian Company, Hilarity Ensues</a></p><p>The electric car chargers along one of the most important freeways in Russia are all down Monday after the Ukrainian company tasked with building the main components in the chargers used backdoor access to hack them, shut them down, and program anti-Putin/pro-Ukrainian messages to scroll past on their screens.</p><p>The outage affects chargers along the M11 motorway, which connects Moscow to St. Petersburg. The Russian energy company <a href="https://www.facebook.com/official.rosseti/posts/5236071213103660">Rosseti</a> confirmed the hack in a post on the company’s Facebook.</p><p> </p><p><strong>Industry News (33:52)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-asks-for-hackers-help/">Ukraine Asks for Hackers’ Help</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-tv-stations-hacked/">Russian TV Stations Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-encrypts-karma-ransomware/">Conti Encrypts Karma Ransom Note in Same Victim Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-and-google-turn-off-map-help/">Apple and Google Turn Off Map Features to Help Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-seeks-cybersecurity-framework/">NIST Seeks Cybersecurity Framework Feedback</a></p><p><a href="https://www.infosecurity-magazine.com/news/nvidia-admits-hackers-stole/">Nvidia Admits Hackers Stole Employee and Internal Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/russia-denies-satellite-hacking/">Russia Denies Satellite Hacking and Warns of Wider War</a></p><p><a href="https://www.infosecurity-magazine.com/news/swiss-bank-destruction-documents/">Swiss Bank Requests Destruction of Documents</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerability-exploit-attempts/">Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites</a></p><p> </p><p><strong>Tweet of the Week (40:40)</strong></p><img src="https://lh4.googleusercontent.com/IwX5f-W7kVNVzMX4EMuYcLXgPMet3rAOi_mIB6IBE1KSzc7oeI4wONEa9rfolSawLneBctNX3eS85tkbutwbP5CkUdezG0Ht3DVgRG9lAnwSz_lT6oRCamTdPC6aDDcUu5DiZKUv" /><p><a href="https://twitter.com/gyarbij/status/1499289498005422083">https://twitter.com/gyarbij/status/1499289498005422083</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44918816" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7a23d544-4b12-462f-a704-40c0a15145fc/audio/4be30d26-10c0-4172-ae43-df1df8e6151e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 95 - Dammit He Came Back</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom langford</itunes:author>
      <itunes:duration>00:46:47</itunes:duration>
      <itunes:summary>This week in Infosec talks about zombies of the past
 
Rant of the Week is a story about a problem as old as old man internet , and no, it’s not about porn

Billy Big Balls is an unverified story of an uno reverse manoeuvre (how the turns have tabled) 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week identifies that type of person</itunes:summary>
      <itunes:subtitle>This week in Infosec talks about zombies of the past
 
Rant of the Week is a story about a problem as old as old man internet , and no, it’s not about porn

Billy Big Balls is an unverified story of an uno reverse manoeuvre (how the turns have tabled) 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week identifies that type of person</itunes:subtitle>
      <itunes:keywords>ukraine, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">367649e1-3724-4b1f-80d8-1b1d8a66fe0e</guid>
      <title>Episode 94 - Lost Sole Founder Reward If Found</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (11:37)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>23rd February 2005: The discovery of the <a href="http://en.wikipedia.org/wiki/Caribe_(computer_worm)">first mobile phone virus, Cabir</a>, is accounced. Specifically, Cabir is a worm which infects phones running the Symbian OS. Whenever an infected phone is activated, the message “Caribe” is displayed. Infected phones also attempts to spread the virus through Bluetooth signals.</p><p> </p><p><strong>Billy Big Balls (21:51)</strong></p><img src="https://lh3.googleusercontent.com/2wwAowAebDeWwPHDtStYU8tY4gHeNJOvFHPffFuYeqsrr7WaH-ktdnyuHeE6yhUrxRce0nJPETg1Y84Oxv-uTJSamxWZCn4rNGMBoY4r9KlH4Te8D-eFO2opm9iH_RkdxWoJ49WS" /><p><a href="https://nypost.com/2022/02/24/ukrainian-women-say-russian-troops-are-flirting-with-them-on-tinder/">https://nypost.com/2022/02/24/ukrainian-women-say-russian-troops-are-flirting-with-them-on-tinder/</a></p><p>From Russia with lust.</p><p>Russian soldiers poised to invade Ukraine have bombarded women on the other side of the border with Tinder messages Tuesday, <a href="https://www.the-sun.com/news/4757640/russian-soldiers-tinder-ukraine/">according to the Sun</a>.</p><p>Dasha Synelnikova’s app lit up with matches from soldiers named Andrei, Alexander, Gregory, Michail and “Black” some 20 miles away, the report said.</p><p>“I actually live in Kyiv but changed my location settings to Kharkiv after a friend told me there were Russian troops all over Tinder,” Synelnikova, a 33-year-old video producer, told the outlet.</p><p>Many would-be paramours reportedly flirted with treachery as they gave away their military positions while forces assembled north of Kharkiv prepared for <a href="https://nypost.com/2022/02/23/russia-ukraine-conflict-live-updates-and-latest-news-coverage/">what appeared to be an imminent attack</a>, according to Ukrainian military intelligence officials.</p><p>“One muscular guy posed up trying to look sexy in bed posing with his pistol. Another was in full Russian combat gear and others just showed off in tight stripy vests,” Synelnikova told the British paper.</p><img src="https://lh3.googleusercontent.com/xC2QdcpNlLUeIRbnLwtZLtfK5r1fXcNHU8OiZB3RCrwsMDn3M57OLxEO0OHVla_L-xglWYO1P7V3pr_PgbZ1FGusoMDlIpoDskw8AWPHeoZtrUOFDHQ8zfkHLlznHt2Fx2WY2-2A" /><p> </p><p><strong>Rant of the Week (28:57)</strong></p><p><a href="https://www.vice.com/en/article/n7n9n8/ukraine-russia-documented-on-social-media">A War in Europe Is Being Documented One Social Media Post at a Time</a></p><p>The rest of the world watches Russia's invasion into Ukraine through the lens of Twitter and Tiktok.</p><p> </p><p><strong>Industry News (35:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/leak-exposes-18000-credit-suisse/">Banking World Rocked After Leak Exposes 18,000 Credit Suisse Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-framed-for-cybercrime-files/">Teen Framed for Cybercrime Files Lawsuit</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-receives-ransomware-warning/">US Receives Ransomware Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-cyber-response-unit-ukraine/">EU Deploys Cyber Response Unit to Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcom-set-to-crack-down-on-phone/">Ofcom Set to Crack Down on Phone Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/vishing-phishing-three-times/">Vishing Makes Phishing Campaigns Three-Times More Successful</a></p><p><a href="https://www.infosecurity-magazine.com/news/nonprofits-form-cyber-coalition/">Nonprofits Form Cyber Coalition</a></p><p><a href="https://www.infosecurity-magazine.com/news/wmata-twitter-account-hacked/">WMATA Twitter Account Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-attacked-with-wiper-malware/">Ukraine Attacked with ‘Wiper’ Malware</a></p><p> </p><p><strong>Tweet of the Week  (44:10)</strong></p><img src="https://lh4.googleusercontent.com/BSXX8exv4iHurxoJPIH2NBSChWjWHiMWVwBotBJJw2vgARpNq61nQSu_D6zchASZwy-tAmpIrw_zwOIQcUoJQOhYeSSPB8DINrSMCBvMcYUCp72mBN0b9UaG84AfbYbavOMhXje5" /><p><a href="https://twitter.com/dcuthbert/status/1496935547171835911">https://twitter.com/dcuthbert/status/1496935547171835911</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Feb 2022 13:25:53 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik AI)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-94-lost-sole-founder-reward-if-found-7he35MPR</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (11:37)</strong></p><p>With content liberated from the “today in infosec” twitter account and further afield</p><p>23rd February 2005: The discovery of the <a href="http://en.wikipedia.org/wiki/Caribe_(computer_worm)">first mobile phone virus, Cabir</a>, is accounced. Specifically, Cabir is a worm which infects phones running the Symbian OS. Whenever an infected phone is activated, the message “Caribe” is displayed. Infected phones also attempts to spread the virus through Bluetooth signals.</p><p> </p><p><strong>Billy Big Balls (21:51)</strong></p><img src="https://lh3.googleusercontent.com/2wwAowAebDeWwPHDtStYU8tY4gHeNJOvFHPffFuYeqsrr7WaH-ktdnyuHeE6yhUrxRce0nJPETg1Y84Oxv-uTJSamxWZCn4rNGMBoY4r9KlH4Te8D-eFO2opm9iH_RkdxWoJ49WS" /><p><a href="https://nypost.com/2022/02/24/ukrainian-women-say-russian-troops-are-flirting-with-them-on-tinder/">https://nypost.com/2022/02/24/ukrainian-women-say-russian-troops-are-flirting-with-them-on-tinder/</a></p><p>From Russia with lust.</p><p>Russian soldiers poised to invade Ukraine have bombarded women on the other side of the border with Tinder messages Tuesday, <a href="https://www.the-sun.com/news/4757640/russian-soldiers-tinder-ukraine/">according to the Sun</a>.</p><p>Dasha Synelnikova’s app lit up with matches from soldiers named Andrei, Alexander, Gregory, Michail and “Black” some 20 miles away, the report said.</p><p>“I actually live in Kyiv but changed my location settings to Kharkiv after a friend told me there were Russian troops all over Tinder,” Synelnikova, a 33-year-old video producer, told the outlet.</p><p>Many would-be paramours reportedly flirted with treachery as they gave away their military positions while forces assembled north of Kharkiv prepared for <a href="https://nypost.com/2022/02/23/russia-ukraine-conflict-live-updates-and-latest-news-coverage/">what appeared to be an imminent attack</a>, according to Ukrainian military intelligence officials.</p><p>“One muscular guy posed up trying to look sexy in bed posing with his pistol. Another was in full Russian combat gear and others just showed off in tight stripy vests,” Synelnikova told the British paper.</p><img src="https://lh3.googleusercontent.com/xC2QdcpNlLUeIRbnLwtZLtfK5r1fXcNHU8OiZB3RCrwsMDn3M57OLxEO0OHVla_L-xglWYO1P7V3pr_PgbZ1FGusoMDlIpoDskw8AWPHeoZtrUOFDHQ8zfkHLlznHt2Fx2WY2-2A" /><p> </p><p><strong>Rant of the Week (28:57)</strong></p><p><a href="https://www.vice.com/en/article/n7n9n8/ukraine-russia-documented-on-social-media">A War in Europe Is Being Documented One Social Media Post at a Time</a></p><p>The rest of the world watches Russia's invasion into Ukraine through the lens of Twitter and Tiktok.</p><p> </p><p><strong>Industry News (35:28)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/leak-exposes-18000-credit-suisse/">Banking World Rocked After Leak Exposes 18,000 Credit Suisse Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-framed-for-cybercrime-files/">Teen Framed for Cybercrime Files Lawsuit</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-receives-ransomware-warning/">US Receives Ransomware Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-cyber-response-unit-ukraine/">EU Deploys Cyber Response Unit to Ukraine</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcom-set-to-crack-down-on-phone/">Ofcom Set to Crack Down on Phone Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/vishing-phishing-three-times/">Vishing Makes Phishing Campaigns Three-Times More Successful</a></p><p><a href="https://www.infosecurity-magazine.com/news/nonprofits-form-cyber-coalition/">Nonprofits Form Cyber Coalition</a></p><p><a href="https://www.infosecurity-magazine.com/news/wmata-twitter-account-hacked/">WMATA Twitter Account Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-attacked-with-wiper-malware/">Ukraine Attacked with ‘Wiper’ Malware</a></p><p> </p><p><strong>Tweet of the Week  (44:10)</strong></p><img src="https://lh4.googleusercontent.com/BSXX8exv4iHurxoJPIH2NBSChWjWHiMWVwBotBJJw2vgARpNq61nQSu_D6zchASZwy-tAmpIrw_zwOIQcUoJQOhYeSSPB8DINrSMCBvMcYUCp72mBN0b9UaG84AfbYbavOMhXje5" /><p><a href="https://twitter.com/dcuthbert/status/1496935547171835911">https://twitter.com/dcuthbert/status/1496935547171835911</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46106238" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f6461274-06af-42a9-9b11-1c1f50f23349/audio/16522533-b3d1-4d28-b304-be9f7ce1cd8c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 94 - Lost Sole Founder Reward If Found</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik AI</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6e42eb89-1f00-4827-b866-3e9c694daf70/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:02</itunes:duration>
      <itunes:summary>This week in Infosec mentions the word Symbian which will evoke different thoughts depending on your age
 
Billy Big Balls is a Billy Blue Balls from Russia with lust

Rant of the Week is the documentation of World War 3

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells us it’s time to update those LinkedIn endorsements</itunes:summary>
      <itunes:subtitle>This week in Infosec mentions the word Symbian which will evoke different thoughts depending on your age
 
Billy Big Balls is a Billy Blue Balls from Russia with lust

Rant of the Week is the documentation of World War 3

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells us it’s time to update those LinkedIn endorsements</itunes:subtitle>
      <itunes:keywords>ukraine, social media osint, russia, synology support, putin, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f714e2ff-80ae-479a-959a-469e635a6b87</guid>
      <title>Episode 93 - Its That Man Again</title>
      <description><![CDATA[<p> </p><img src="https://lh6.googleusercontent.com/DPo_CyNRQCpbctjPAdcqWhnWwOztJjNd64MytLvR6dqXIoXGkgSaceblFRtDrfj2KETomCETpa_FaCER3phyQQbXg7Nr_Np1odZjNmh5U5d0bk0YXqx5-y8GXLXtKE-jEYQgzd0O" /><p><strong>This Week in InfoSec (07:54)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>15th February 1999</p><p>Computer owners (dominated by Linux users) marched on Microsoft’s offices demanding refunds for the copies of Windows that came pre-installed on their computers. This day came to be known as <a href="http://marc.merlins.org/linux/refundday/">Windows Refund Day</a>.</p><p>15th February 2007: <a href="https://www.wired.com/2007/02/tsa-removes-onl/">TSA Removes Online Traveller Redress System</a>.  The Transportation Security Agency has removed from its website an online system designed for travellers who have been told they are on a watchlist and inserted a statement that the agency takes information security seriously, following reporting by 27B (and others) that the site could put travellers at risk of identity theft and looked like online fraud.</p><p> </p><p><strong>Rant of the Week (17:41)</strong></p><p><a href="https://www.independent.co.uk/news/world/americas/3g-network-shutdown-devices-b2016141.html">3G network shutting down could disable millions of home security alarms and car safety systems</a></p><p><a href="https://apple.news/AuLfeucEvTSOwz1aqMIUDow">https://apple.news/AuLfeucEvTSOwz1aqMIUDow</a></p><p>Millions of burglar alarms, car safety systems, GPS trackers, medical monitors, and even prisoner ankle tags could stop working when American 3G mobile networks shut down later this year.</p><p> </p><p><strong>Billy Big Balls of the Week (29:26)</strong></p><p>Gary Bowser was recently sentenced to over 3 years in prison and ordered to pay millions to Nintendo for what his lawyers say was a relatively minor role in a Nintendo Switch piracy ring.</p><p>He was the victim of domestic violence from a girlfriend, and another girlfriend of his was murdered. His older brother died in a plane crash, and Bowser’s mother died when he was 15, the court record adds. In response, Bowser drank, the court records state.</p><p>Bowser was charged in Canada in 2004 in a fraud case concerning less than $5,000, the court records say. In 2018, he contracted lymphedema, likely from a mosquito bite, which “caused morbid swelling of his left leg,” the lawyers wrote.</p><p>When Bowser did join Xecutor, he was the only member who did so under his own identity; his colleagues were pseudonymous on the site. </p><p>Xecutor as “one of the most prolific video game hacking groups,” and said that Bowser also administered a website called rom-bank.com which contained illegal copies of over 10,000 video games, </p><p>Bowser was paid $500 to $1,000 a month over the course of seven years to maintain the organization’s websites</p><p>Last week, Bowser<a href="https://www.justice.gov/usao-wdwa/pr/public-voice-and-principal-salesperson-notorious-videogame-piracy-group-sentenced-3"> was sentenced to more than three years in prison</a> and has agreed to pay $4,500,000 in restitution to Nintendo. In a related civil lawsuit that concluded in December, a court ordered Bowser to also pay $10,000,000.</p><p><a href="https://www.vice.com/en/article/epxm5n/gary-bowser-small-apartment-owes-nintendo-10-million">https://www.vice.com/en/article/epxm5n/gary-bowser-small-apartment-owes-nintendo-10-million</a></p><p> </p><p><a href="https://www.bleepingcomputer.com/news/security/unskilled-hacker-linked-to-years-of-attacks-on-aviation-transport-sectors/">Unskilled hacker linked to years of attacks on aviation, transport sectors</a></p><p>For years, a low-skilled attacker has been using off-the-shelf malware in malicious campaigns aimed at companies in the aviation sector as well as in other sensitive industries.</p><p>The threat actor has been active since at least 2017, targeting entities in the aviation, aerospace, transportation, manufacturing, and defence industries.</p><p>Tracked as TA2541 by cybersecurity company Proofpoint, the adversary is believed to operate from Nigeria and its activity has been documented before in the analysis of separate campaigns.</p><p> </p><p><strong>Industry News (37:18) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/trustpilot-sues-alleged-fake-review/">Trustpilot Sues Immigration Biz for Alleged Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-society-data-leaked/">Internet Society Data Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-data-breaches-impact/">Healthcare Data Breaches Impact 147k Illinoisans</a></p><p><a href="https://www.infosecurity-magazine.com/news/finance-officer-jailed-stealing/">Finance Officer Jailed After Stealing £200,000 from Charity</a></p><p><a href="https://www.infosecurity-magazine.com/news/red-cross-attackers-exploited-zoho/">Red Cross Attackers Exploited Zoho Bug Used by China</a></p><p><a href="https://www.infosecurity-magazine.com/news/grand-prix-cfo-sentenced-for/">Grand Prix CFO Sentenced for Identity Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-block-largest-ever-bot/">Researchers Block "Largest Ever" Bot Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-privacy-lawsuit-could-cost/">Data Privacy Lawsuit Could Cost Meta $90m</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-top-threat-to-us/">Phishing Top Threat to US Healthcare</a></p><p> </p><p><strong>Tweet of the Week (44:32 )</strong></p><img src="https://lh6.googleusercontent.com/9QNRfkZoD_UzI9hQ6RSKXA2TnSBtA5RjKD5EY5Bgh3mAXdrj1gQ37FEFALvJUHhAbuBAN2Wq8mJP6UB_ftrk9Ub8qI5aNPf6j_rlIzxQ389gUzKEf41xqEfnoZ3dyfo2fiwOb1GU" /><p><a href="https://twitter.com/zebpalmer/status/1492742757185556483">https://twitter.com/zebpalmer/status/1492742757185556483</a>   </p><img src="https://lh6.googleusercontent.com/YR_6XsmkH87wdYGGj-lruoSqrf-SEHCH5A7aDuBTbf1kIxGEKvavxRyT68OVdkOvz3p7y41gm_ktgceRWPQLiQclle-6fqTzGYS0HlGzqDpi_-jhKIWXMxCwX9z631aoXLfIUl5L" /><p><a href="https://twitter.com/JackRhysider/status/1494330800564625413">https://twitter.com/JackRhysider/status/1494330800564625413</a></p><p> </p><p>[That was this week's TWEET OF THE WEEK!]</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Feb 2022 15:36:01 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, NOT Javvad Malik, Thom Langford, Graham Cluley)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-93-its-that-man-again-mR5W6vtV</link>
      <content:encoded><![CDATA[<p> </p><img src="https://lh6.googleusercontent.com/DPo_CyNRQCpbctjPAdcqWhnWwOztJjNd64MytLvR6dqXIoXGkgSaceblFRtDrfj2KETomCETpa_FaCER3phyQQbXg7Nr_Np1odZjNmh5U5d0bk0YXqx5-y8GXLXtKE-jEYQgzd0O" /><p><strong>This Week in InfoSec (07:54)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>15th February 1999</p><p>Computer owners (dominated by Linux users) marched on Microsoft’s offices demanding refunds for the copies of Windows that came pre-installed on their computers. This day came to be known as <a href="http://marc.merlins.org/linux/refundday/">Windows Refund Day</a>.</p><p>15th February 2007: <a href="https://www.wired.com/2007/02/tsa-removes-onl/">TSA Removes Online Traveller Redress System</a>.  The Transportation Security Agency has removed from its website an online system designed for travellers who have been told they are on a watchlist and inserted a statement that the agency takes information security seriously, following reporting by 27B (and others) that the site could put travellers at risk of identity theft and looked like online fraud.</p><p> </p><p><strong>Rant of the Week (17:41)</strong></p><p><a href="https://www.independent.co.uk/news/world/americas/3g-network-shutdown-devices-b2016141.html">3G network shutting down could disable millions of home security alarms and car safety systems</a></p><p><a href="https://apple.news/AuLfeucEvTSOwz1aqMIUDow">https://apple.news/AuLfeucEvTSOwz1aqMIUDow</a></p><p>Millions of burglar alarms, car safety systems, GPS trackers, medical monitors, and even prisoner ankle tags could stop working when American 3G mobile networks shut down later this year.</p><p> </p><p><strong>Billy Big Balls of the Week (29:26)</strong></p><p>Gary Bowser was recently sentenced to over 3 years in prison and ordered to pay millions to Nintendo for what his lawyers say was a relatively minor role in a Nintendo Switch piracy ring.</p><p>He was the victim of domestic violence from a girlfriend, and another girlfriend of his was murdered. His older brother died in a plane crash, and Bowser’s mother died when he was 15, the court record adds. In response, Bowser drank, the court records state.</p><p>Bowser was charged in Canada in 2004 in a fraud case concerning less than $5,000, the court records say. In 2018, he contracted lymphedema, likely from a mosquito bite, which “caused morbid swelling of his left leg,” the lawyers wrote.</p><p>When Bowser did join Xecutor, he was the only member who did so under his own identity; his colleagues were pseudonymous on the site. </p><p>Xecutor as “one of the most prolific video game hacking groups,” and said that Bowser also administered a website called rom-bank.com which contained illegal copies of over 10,000 video games, </p><p>Bowser was paid $500 to $1,000 a month over the course of seven years to maintain the organization’s websites</p><p>Last week, Bowser<a href="https://www.justice.gov/usao-wdwa/pr/public-voice-and-principal-salesperson-notorious-videogame-piracy-group-sentenced-3"> was sentenced to more than three years in prison</a> and has agreed to pay $4,500,000 in restitution to Nintendo. In a related civil lawsuit that concluded in December, a court ordered Bowser to also pay $10,000,000.</p><p><a href="https://www.vice.com/en/article/epxm5n/gary-bowser-small-apartment-owes-nintendo-10-million">https://www.vice.com/en/article/epxm5n/gary-bowser-small-apartment-owes-nintendo-10-million</a></p><p> </p><p><a href="https://www.bleepingcomputer.com/news/security/unskilled-hacker-linked-to-years-of-attacks-on-aviation-transport-sectors/">Unskilled hacker linked to years of attacks on aviation, transport sectors</a></p><p>For years, a low-skilled attacker has been using off-the-shelf malware in malicious campaigns aimed at companies in the aviation sector as well as in other sensitive industries.</p><p>The threat actor has been active since at least 2017, targeting entities in the aviation, aerospace, transportation, manufacturing, and defence industries.</p><p>Tracked as TA2541 by cybersecurity company Proofpoint, the adversary is believed to operate from Nigeria and its activity has been documented before in the analysis of separate campaigns.</p><p> </p><p><strong>Industry News (37:18) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/trustpilot-sues-alleged-fake-review/">Trustpilot Sues Immigration Biz for Alleged Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-society-data-leaked/">Internet Society Data Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-data-breaches-impact/">Healthcare Data Breaches Impact 147k Illinoisans</a></p><p><a href="https://www.infosecurity-magazine.com/news/finance-officer-jailed-stealing/">Finance Officer Jailed After Stealing £200,000 from Charity</a></p><p><a href="https://www.infosecurity-magazine.com/news/red-cross-attackers-exploited-zoho/">Red Cross Attackers Exploited Zoho Bug Used by China</a></p><p><a href="https://www.infosecurity-magazine.com/news/grand-prix-cfo-sentenced-for/">Grand Prix CFO Sentenced for Identity Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-block-largest-ever-bot/">Researchers Block "Largest Ever" Bot Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-privacy-lawsuit-could-cost/">Data Privacy Lawsuit Could Cost Meta $90m</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-top-threat-to-us/">Phishing Top Threat to US Healthcare</a></p><p> </p><p><strong>Tweet of the Week (44:32 )</strong></p><img src="https://lh6.googleusercontent.com/9QNRfkZoD_UzI9hQ6RSKXA2TnSBtA5RjKD5EY5Bgh3mAXdrj1gQ37FEFALvJUHhAbuBAN2Wq8mJP6UB_ftrk9Ub8qI5aNPf6j_rlIzxQ389gUzKEf41xqEfnoZ3dyfo2fiwOb1GU" /><p><a href="https://twitter.com/zebpalmer/status/1492742757185556483">https://twitter.com/zebpalmer/status/1492742757185556483</a>   </p><img src="https://lh6.googleusercontent.com/YR_6XsmkH87wdYGGj-lruoSqrf-SEHCH5A7aDuBTbf1kIxGEKvavxRyT68OVdkOvz3p7y41gm_ktgceRWPQLiQclle-6fqTzGYS0HlGzqDpi_-jhKIWXMxCwX9z631aoXLfIUl5L" /><p><a href="https://twitter.com/JackRhysider/status/1494330800564625413">https://twitter.com/JackRhysider/status/1494330800564625413</a></p><p> </p><p>[That was this week's TWEET OF THE WEEK!]</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47722904" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6fe3ad7b-e9ee-4f2a-bf5a-19228636f11c/audio/962a4be0-e39f-4579-aebf-84f3d313f35b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 93 - Its That Man Again</itunes:title>
      <itunes:author>Andrew Agnês, NOT Javvad Malik, Thom Langford, Graham Cluley</itunes:author>
      <itunes:duration>00:49:43</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the debate of OEM software
 
Rant of the Week is a story about the impact of phasing out 3G too quickly

Billy Big Balls is a story of persistence  
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the levity we’ll be leaving you with today</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the debate of OEM software
 
Rant of the Week is a story about the impact of phasing out 3G too quickly

Billy Big Balls is a story of persistence  
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is the levity we’ll be leaving you with today</itunes:subtitle>
      <itunes:keywords>bowser, smashing security, 3g, princess peaches, the dukes of hazard, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">20ad2e2a-1872-4bc1-bb2a-e8d8e0bf406b</guid>
      <title>Episode 92 - Just The Two Of Us</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (04:44)</strong></p><p>February 5th 2009 <a href="https://grahamcluley.com/kaspersky-challenge-2/">Come on Kaspersky, if you think you’re hard enough..</a></p><p>February 5th 2009 <a href="https://grahamcluley.com/sophos-snowball-fight/">The Sophos snowball fight</a></p><p>February 9th 2009 <a href="https://grahamcluley.com/hacked-road-sign-warns-british-invasion/">Hacked road sign warns of British invasion</a></p><p> </p><p><strong>Rant of the Week (16:01)</strong></p><p>Hackers are hitting Britain where it hurts by targeting some of its favourite savoury snacks, with the likes of Hula Hoops, KP Nuts, Butterkist popcorn and Nik Naks in their cyber sights.</p><p><a href="https://www.reuters.com/technology/hackers-hold-hula-hoops-hostage-cyber-raid-britains-kp-snacks-2022-02-03/#:~:text=The%20company%20behind%20those%20brands%2C%20KP%20Snacks%2C%20has,access%20to%20a%20network%20and%20hold%20data%20hostage.">Hackers hold Hula Hoops hostage in cyber-raid on Britain's KP Snacks | Reuters</a></p><p> </p><p><strong>Billy Big Balls of the Week  (22:48)</strong></p><p>A woman accused of laundering billions of dollars in stolen cryptocurrency alongside her husband may end up becoming better known for her excruciating music career as a self-styled “raunchy rapper” called Razzlekhan.</p><p><a href="https://www.theguardian.com/technology/2022/feb/10/sexy-horror-comedy-bitcoin-laundering-suspect-is-also-raunchy-rapper-razzlekhan">‘Sexy horror comedy’: Bitcoin laundering suspect is also ‘raunchy rapper’ Razzlekhan | Cryptocurrencies | The Guardian</a></p><p> </p><p><strong>Industry News  (29:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-attacks-hit-alltime-high/">DDoS Attacks Hit All-time High</a></p><p><a href="https://www.infosecurity-magazine.com/news/californian-college-ransomware/">Californian College Attacked with Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/sans-hbcu-cyber-academy/">SANS Institute Launches Nationwide Scholarship Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-rise-email-attacks/">ICO Hit by 2650% Rise in Email Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/almost-13bn-paid-to-ransomware/">Almost $1.3bn Paid to Ransomware Actors Since 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisos-reveal-biggest-challenges/">CISOs Reveal Biggest Challenges for Security Teams</a></p><p> </p><p><strong>Tweet of the Week  (38:58)</strong></p><p>https://twitter.com/d0rkph0enix/status/1491914588811501568</p><p> </p><img src="https://lh3.googleusercontent.com/sSQwYbVBFVMj5-dBBiM5qP9KW0DxyoJL9FK2CA2_DLx2De5jUC6tz4o1gynmf5mHjxJ_tp-8vm6rY0zZ-UIPn-pBCq85OGwzA-y0MccIVvX8yV0I1qYO6YiF-59HrWPQ_3PXQmbi" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Feb 2022 14:18:20 +0000</pubDate>
      <author>thom@tl2security.com (NOT Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-92-just-the-two-of-us-dRLQhKT9</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (04:44)</strong></p><p>February 5th 2009 <a href="https://grahamcluley.com/kaspersky-challenge-2/">Come on Kaspersky, if you think you’re hard enough..</a></p><p>February 5th 2009 <a href="https://grahamcluley.com/sophos-snowball-fight/">The Sophos snowball fight</a></p><p>February 9th 2009 <a href="https://grahamcluley.com/hacked-road-sign-warns-british-invasion/">Hacked road sign warns of British invasion</a></p><p> </p><p><strong>Rant of the Week (16:01)</strong></p><p>Hackers are hitting Britain where it hurts by targeting some of its favourite savoury snacks, with the likes of Hula Hoops, KP Nuts, Butterkist popcorn and Nik Naks in their cyber sights.</p><p><a href="https://www.reuters.com/technology/hackers-hold-hula-hoops-hostage-cyber-raid-britains-kp-snacks-2022-02-03/#:~:text=The%20company%20behind%20those%20brands%2C%20KP%20Snacks%2C%20has,access%20to%20a%20network%20and%20hold%20data%20hostage.">Hackers hold Hula Hoops hostage in cyber-raid on Britain's KP Snacks | Reuters</a></p><p> </p><p><strong>Billy Big Balls of the Week  (22:48)</strong></p><p>A woman accused of laundering billions of dollars in stolen cryptocurrency alongside her husband may end up becoming better known for her excruciating music career as a self-styled “raunchy rapper” called Razzlekhan.</p><p><a href="https://www.theguardian.com/technology/2022/feb/10/sexy-horror-comedy-bitcoin-laundering-suspect-is-also-raunchy-rapper-razzlekhan">‘Sexy horror comedy’: Bitcoin laundering suspect is also ‘raunchy rapper’ Razzlekhan | Cryptocurrencies | The Guardian</a></p><p> </p><p><strong>Industry News  (29:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-attacks-hit-alltime-high/">DDoS Attacks Hit All-time High</a></p><p><a href="https://www.infosecurity-magazine.com/news/californian-college-ransomware/">Californian College Attacked with Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/sans-hbcu-cyber-academy/">SANS Institute Launches Nationwide Scholarship Program</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-rise-email-attacks/">ICO Hit by 2650% Rise in Email Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/almost-13bn-paid-to-ransomware/">Almost $1.3bn Paid to Ransomware Actors Since 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisos-reveal-biggest-challenges/">CISOs Reveal Biggest Challenges for Security Teams</a></p><p> </p><p><strong>Tweet of the Week  (38:58)</strong></p><p>https://twitter.com/d0rkph0enix/status/1491914588811501568</p><p> </p><img src="https://lh3.googleusercontent.com/sSQwYbVBFVMj5-dBBiM5qP9KW0DxyoJL9FK2CA2_DLx2De5jUC6tz4o1gynmf5mHjxJ_tp-8vm6rY0zZ-UIPn-pBCq85OGwzA-y0MccIVvX8yV0I1qYO6YiF-59HrWPQ_3PXQmbi" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44917144" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c9ff8156-0450-48a7-a0cc-56ce9c00f0a4/audio/9f93aa20-1cab-40a9-990c-00f5db0e8802/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 92 - Just The Two Of Us</itunes:title>
      <itunes:author>NOT Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:duration>00:46:47</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to a very young, and almost boylike, Graham Cluley

Rant of the Week tells of an unprecedented and uncalled for attack on the very core of English culture

Billy Big Balls proves that anyone can be a Pwnie Award winner

Industry News brings us the latest and greatest news stories from around the globe

and, Tweet of the Week gives us prime Skeletor password tips</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to a very young, and almost boylike, Graham Cluley

Rant of the Week tells of an unprecedented and uncalled for attack on the very core of English culture

Billy Big Balls proves that anyone can be a Pwnie Award winner

Industry News brings us the latest and greatest news stories from around the globe

and, Tweet of the Week gives us prime Skeletor password tips</itunes:subtitle>
      <itunes:keywords>passwords, nik naks, infosec host unknown, pwnie awards, kp nuts, skeletor</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c412b97b-569d-4b4f-85b7-c6854441ae34</guid>
      <title>Episode 91 - Shorter Than The Average Podcast</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (05:24)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>30th January 1982: The first computer virus was written.  <a href="http://en.wikipedia.org/wiki/Richard_Skrenta">Richard Skrenta</a> writes the first PC virus code, which is 400 lines long and disguised as an Apple II boot program called “<a href="http://en.wikipedia.org/wiki/Elk_Cloner">Elk Cloner</a>“.</p><p>3rd February 1986: "Vaporware" Announced.  Time magazine reports on frustrations with the slow development of software for use in the computer industry. Reporter Philip Elmer-DeWitt complained about delays in Microsoft Corporation's new Windows operating system, which had been delayed much longer than promised. Silicon Valley pundits had taken to calling such software "Vaporware," the magazine noted.</p><p>30th January 2007:  Six years after the launch of Windows XP, the infamous operating system, Windows Vista, was released to an unsuspecting public. For various reasons, the launch of Vista was marred by numerous incompatibility, stability, and otherwise onerous problems. While Microsoft actually made Vista much more palatable after 2 Service Pack upgrades, the damage was already done. Vista’s reputation never recovered. Many wonder if this is why Microsoft so quickly followed only two years later with Windows 7.</p><p> </p><p><strong>Rant of the Week (10:45)</strong></p><p><a href="https://www.theregister.com/2022/02/03/c_suite_security_survey/">Execs keep flinging money at us instead of understanding security, moan infosec pros</a></p><p>Fresh from years of complaining about underfunding and not having enough staff to deal with problems, infosec bods are now complaining that corporate execs merely firehose cash at them without getting their own hands dirty or engaging with the problem.</p><p>That's one conclusion that could be drawn from a Trend Micro study published yesterday. Around half of businesses surveyed are spending more on "cyber attacks" than they used to, it said, while a similar number reckon their C-suites don't know what "cyber risk management" means – possibly something about ensuring monitors are firmly bolted to desks.</p><p> </p><p><strong>Billy Big Balls of the Week (16:55)</strong></p><p><a href="https://www.wionews.com/world/how-a-us-hacker-took-down-north-koreas-internet-in-a-revenge-cyber-attack-450032">How a US hacker took down North Korea's internet in a revenge cyber-attack</a></p><p>The blame for North Korea's persistent internet failures does not lie with the United States Cyber Command or any other state-sponsored hacker organisation.</p><p>In fact, it was the work of an American man, who sat in his living room night after night, watching Alien movies and munching on spicy corn snacks—and periodically walking over to his home office to check on the progress of the programmes he was running to disrupt the internet of an entire country.</p><p><a href="https://www.republicworld.com/world-news/us-news/us-hacker-brings-down-north-koreas-internet-after-latters-attack-on-security-researchers-articleshow.html">US Hacker Brings Down North Korea's Internet After Latter's Attack On Security Researchers</a></p><p><a href="https://www.cnbc.com/2022/02/02/facebook-says-apple-ios-privacy-change-will-cost-10-billion-this-year.html">Facebook says Apple iOS privacy change will result in $10 billion revenue hit this year</a></p><p> </p><p><strong>Industry News (23:55)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ssns-most-targeted-sensitive-data/">Social Security Numbers Most Targeted Sensitive Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-beijing-games-athletes-leave/">FBI: Olympic Athletes Should Leave Devices at Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-council-students-data/">British Council Students' Data Exposed in Major Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-leak-exposes-personal-details/">Data Leak Exposes IDs of Airport Security Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/scottish-agency-2020-ransomware/">Scottish Agency Still Recovering from 2020 Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-influencer-hacking-tactics/">Fake Influencer Flags Hacking Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-thieves-steal-320m-crypto/">Online Thieves Steal $320m from Crypto Firm Wormhole</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-improvement-firm-fined-200k/">Home Improvement Firm Fined £200k for Nuisance Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/growing-number-of-phish-kits/">Growing Number of Phish Kits Bypass MFA</a></p><p> </p><p><strong>Tweet of the Week (30:23)</strong></p><img src="https://lh4.googleusercontent.com/DaAh3CduOt8aHLWj1vhVsZQVb34SzlfS3NU7JaKFsl5U-0rRiilBfRxGS5d-0apSWqVkIcw5KtWNeobrQOAWsWPgpFL1Jqj5Ka3iyAJRTJ-6ZkpHx5RwHQE9KLEYyJw2eDr31y28" /><p><a href="https://twitter.com/1MrStoner/status/1488941503049261059">https://twitter.com/1MrStoner/status/1488941503049261059</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Feb 2022 13:00:00 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnês, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-91-shorter-than-the-average-podcast-YJQnaNN3</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (05:24)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>30th January 1982: The first computer virus was written.  <a href="http://en.wikipedia.org/wiki/Richard_Skrenta">Richard Skrenta</a> writes the first PC virus code, which is 400 lines long and disguised as an Apple II boot program called “<a href="http://en.wikipedia.org/wiki/Elk_Cloner">Elk Cloner</a>“.</p><p>3rd February 1986: "Vaporware" Announced.  Time magazine reports on frustrations with the slow development of software for use in the computer industry. Reporter Philip Elmer-DeWitt complained about delays in Microsoft Corporation's new Windows operating system, which had been delayed much longer than promised. Silicon Valley pundits had taken to calling such software "Vaporware," the magazine noted.</p><p>30th January 2007:  Six years after the launch of Windows XP, the infamous operating system, Windows Vista, was released to an unsuspecting public. For various reasons, the launch of Vista was marred by numerous incompatibility, stability, and otherwise onerous problems. While Microsoft actually made Vista much more palatable after 2 Service Pack upgrades, the damage was already done. Vista’s reputation never recovered. Many wonder if this is why Microsoft so quickly followed only two years later with Windows 7.</p><p> </p><p><strong>Rant of the Week (10:45)</strong></p><p><a href="https://www.theregister.com/2022/02/03/c_suite_security_survey/">Execs keep flinging money at us instead of understanding security, moan infosec pros</a></p><p>Fresh from years of complaining about underfunding and not having enough staff to deal with problems, infosec bods are now complaining that corporate execs merely firehose cash at them without getting their own hands dirty or engaging with the problem.</p><p>That's one conclusion that could be drawn from a Trend Micro study published yesterday. Around half of businesses surveyed are spending more on "cyber attacks" than they used to, it said, while a similar number reckon their C-suites don't know what "cyber risk management" means – possibly something about ensuring monitors are firmly bolted to desks.</p><p> </p><p><strong>Billy Big Balls of the Week (16:55)</strong></p><p><a href="https://www.wionews.com/world/how-a-us-hacker-took-down-north-koreas-internet-in-a-revenge-cyber-attack-450032">How a US hacker took down North Korea's internet in a revenge cyber-attack</a></p><p>The blame for North Korea's persistent internet failures does not lie with the United States Cyber Command or any other state-sponsored hacker organisation.</p><p>In fact, it was the work of an American man, who sat in his living room night after night, watching Alien movies and munching on spicy corn snacks—and periodically walking over to his home office to check on the progress of the programmes he was running to disrupt the internet of an entire country.</p><p><a href="https://www.republicworld.com/world-news/us-news/us-hacker-brings-down-north-koreas-internet-after-latters-attack-on-security-researchers-articleshow.html">US Hacker Brings Down North Korea's Internet After Latter's Attack On Security Researchers</a></p><p><a href="https://www.cnbc.com/2022/02/02/facebook-says-apple-ios-privacy-change-will-cost-10-billion-this-year.html">Facebook says Apple iOS privacy change will result in $10 billion revenue hit this year</a></p><p> </p><p><strong>Industry News (23:55)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ssns-most-targeted-sensitive-data/">Social Security Numbers Most Targeted Sensitive Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-beijing-games-athletes-leave/">FBI: Olympic Athletes Should Leave Devices at Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/british-council-students-data/">British Council Students' Data Exposed in Major Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-leak-exposes-personal-details/">Data Leak Exposes IDs of Airport Security Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/scottish-agency-2020-ransomware/">Scottish Agency Still Recovering from 2020 Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-influencer-hacking-tactics/">Fake Influencer Flags Hacking Tactics</a></p><p><a href="https://www.infosecurity-magazine.com/news/online-thieves-steal-320m-crypto/">Online Thieves Steal $320m from Crypto Firm Wormhole</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-improvement-firm-fined-200k/">Home Improvement Firm Fined £200k for Nuisance Calls</a></p><p><a href="https://www.infosecurity-magazine.com/news/growing-number-of-phish-kits/">Growing Number of Phish Kits Bypass MFA</a></p><p> </p><p><strong>Tweet of the Week (30:23)</strong></p><img src="https://lh4.googleusercontent.com/DaAh3CduOt8aHLWj1vhVsZQVb34SzlfS3NU7JaKFsl5U-0rRiilBfRxGS5d-0apSWqVkIcw5KtWNeobrQOAWsWPgpFL1Jqj5Ka3iyAJRTJ-6ZkpHx5RwHQE9KLEYyJw2eDr31y28" /><p><a href="https://twitter.com/1MrStoner/status/1488941503049261059">https://twitter.com/1MrStoner/status/1488941503049261059</a>  </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="33528174" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/99ca3219-c7ed-40f2-b4c7-6824f2f91c46/audio/72613d7f-5da8-4db6-9bd0-4665825a9d9a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 91 - Shorter Than The Average Podcast</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnês, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6c881827-dbab-41f6-ad68-4d929c3b3568/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:55</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the origins of a phrase regularly used to describe vendor’s upcoming magic products
 
Rant of the Week is a story about Infosec pros not understanding how to talk to the board

Billy Big Balls is the story of a man in pyjamas taking on the Democratic People&apos;s Republic of Korea 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is security career path advice</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the origins of a phrase regularly used to describe vendor’s upcoming magic products
 
Rant of the Week is a story about Infosec pros not understanding how to talk to the board

Billy Big Balls is the story of a man in pyjamas taking on the Democratic People&apos;s Republic of Korea 
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is security career path advice</itunes:subtitle>
      <itunes:keywords>art spiegelman, maus, vapourware, kim-john-wick, joe rogan, elk cloner</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">66bfaa2e-bd02-4f59-b61c-f8f01b476c65</guid>
      <title>Episode Joe 90 - Filmed in SuperMarionation</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (07:20)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>26th January 2011: <a href="https://www.wired.com/2011/01/facebook-https/">Facebook Enables HTTPS</a> So You Can Share Without Being Hijacked.  Facebook announced Wednesday it would begin supporting a feature to protect users from having their accounts hijacked over Wi-Fi connections or snooped on by schools and businesses.</p><p>19th January 2012: Feds Shutter Megaupload, Arrest Executives.  Since the shutdown of Megaupload, stories have erupted about the life and exploits of the company’s founder, a self-styled “Dr. Evil” of file sharing. Kim Dotcom’s opulent digs, high-end cars, fondness for models and other Bond-villain-esque behaviours have been splashed across websites and have confused evening newscasts for the last week.</p><p>25th January 2003: A new worm took the Internet by storm, infecting thousands of servers running Microsoft’s SQL Server software every minute. The worm, which became known as SQL Slammer, eventually became the fastest-spreading worm ever and helped change the way Microsoft approached security and reshaped the way many researchers handled advisories and exploit code. <a href="https://threatpost.com/inside-story-sql-slammer-102010/74589/">The Inside Story of SQL Slammer</a>. </p><p> </p><p><strong>Rant of the Week (15:35)</strong></p><p><a href="https://www.theregister.com/2022/01/27/hmrc_ss7_hlr_lookups/">Court papers indicate text messages from HMRC's 60886 number could snoop on Brit taxpayers' locations</a></p><p>Britain's tax collection agency asked a contractor to use the SS7 mobile phone signalling protocol that would make available location data of alleged tax defaulters, a High Court lawsuit has revealed.</p><p>Her Majesty's Revenue and Customs had the potential to use SS7 to silently request that tax debtors' mobile phones give up location data over the past six years, according to papers filed in an obscure court case about a contract dispute.</p><p> </p><p><strong>Billy Big Balls of the Week (25:31)</strong></p><p><a href="https://www.vice.com/en/article/k7w3dx/unmasking-poopsenders-the-anonymous-website-that-sends-people-fake-poop">Unmasking Poopsenders, The Anonymous Website That Sends People Fake Poop</a></p><p>Since 2007, Poopsenders.com has let people send packages filled with disturbingly realistic feces. Now, 'United States of America v. Poopsenders.com' has named two men who may be responsible.</p><p> </p><p><strong>Industry News (34:25)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/merck-wins-notpetya-payout-insurer/">Merck Wins $1.4bn NotPetya Payout from Insurer</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-overhauled-hybrid/">Cyber Essentials Overhauled for New Hybrid Working Era</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-open-security-culture/">Experts Call for More Open Security Culture After VW Sacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/eyemed-fined-600k-over-data-breach/">EyeMed Fined $600k Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-trials-effort-bug/">Government Trials Effort to Make Bug Scanning Easier</a></p><p><a href="https://www.infosecurity-magazine.com/news/best-cybersecurity-research-paper/">Best Cybersecurity Research Paper Revealed</a></p><p><a href="https://www.infosecurity-magazine.com/news/nkorea-suspected-cyber-attack/">North Korea Loses Internet in Suspected Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-considers-deepfake-ban/">Florida Considers Deepfake Ban</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-devops-staff-likely-click/">IT and DevOps Staff More Likely to Click on Phishing Links</a></p><p> </p><p><strong>Tweet of the Week (41:12)</strong></p><img src="https://lh6.googleusercontent.com/tv7zssAKU-pD9x0NIpgBLQym2gnkS9W3dI_Bzuv0B31Hn5Rw3qyAJv4xMuvbd113YUknE0s2WBdtjbPdJolHId6JkhllAXTEwa6eRozk_XwPL2SXIwx3TTsWJuyaw0NE-q7QOjU_" /><p><a href="https://twitter.com/ra6bit/status/1486695164332711939">https://twitter.com/ra6bit/status/1486695164332711939</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 Jan 2022 13:29:25 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnēs, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-joe-90-filmed-in-supermarionation-sHkbWt2Z</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (07:20)</strong></p><p>With content liberated from the “today in infosec” Twitter account and further afield</p><p>26th January 2011: <a href="https://www.wired.com/2011/01/facebook-https/">Facebook Enables HTTPS</a> So You Can Share Without Being Hijacked.  Facebook announced Wednesday it would begin supporting a feature to protect users from having their accounts hijacked over Wi-Fi connections or snooped on by schools and businesses.</p><p>19th January 2012: Feds Shutter Megaupload, Arrest Executives.  Since the shutdown of Megaupload, stories have erupted about the life and exploits of the company’s founder, a self-styled “Dr. Evil” of file sharing. Kim Dotcom’s opulent digs, high-end cars, fondness for models and other Bond-villain-esque behaviours have been splashed across websites and have confused evening newscasts for the last week.</p><p>25th January 2003: A new worm took the Internet by storm, infecting thousands of servers running Microsoft’s SQL Server software every minute. The worm, which became known as SQL Slammer, eventually became the fastest-spreading worm ever and helped change the way Microsoft approached security and reshaped the way many researchers handled advisories and exploit code. <a href="https://threatpost.com/inside-story-sql-slammer-102010/74589/">The Inside Story of SQL Slammer</a>. </p><p> </p><p><strong>Rant of the Week (15:35)</strong></p><p><a href="https://www.theregister.com/2022/01/27/hmrc_ss7_hlr_lookups/">Court papers indicate text messages from HMRC's 60886 number could snoop on Brit taxpayers' locations</a></p><p>Britain's tax collection agency asked a contractor to use the SS7 mobile phone signalling protocol that would make available location data of alleged tax defaulters, a High Court lawsuit has revealed.</p><p>Her Majesty's Revenue and Customs had the potential to use SS7 to silently request that tax debtors' mobile phones give up location data over the past six years, according to papers filed in an obscure court case about a contract dispute.</p><p> </p><p><strong>Billy Big Balls of the Week (25:31)</strong></p><p><a href="https://www.vice.com/en/article/k7w3dx/unmasking-poopsenders-the-anonymous-website-that-sends-people-fake-poop">Unmasking Poopsenders, The Anonymous Website That Sends People Fake Poop</a></p><p>Since 2007, Poopsenders.com has let people send packages filled with disturbingly realistic feces. Now, 'United States of America v. Poopsenders.com' has named two men who may be responsible.</p><p> </p><p><strong>Industry News (34:25)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/merck-wins-notpetya-payout-insurer/">Merck Wins $1.4bn NotPetya Payout from Insurer</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-overhauled-hybrid/">Cyber Essentials Overhauled for New Hybrid Working Era</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-open-security-culture/">Experts Call for More Open Security Culture After VW Sacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/eyemed-fined-600k-over-data-breach/">EyeMed Fined $600k Over Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-trials-effort-bug/">Government Trials Effort to Make Bug Scanning Easier</a></p><p><a href="https://www.infosecurity-magazine.com/news/best-cybersecurity-research-paper/">Best Cybersecurity Research Paper Revealed</a></p><p><a href="https://www.infosecurity-magazine.com/news/nkorea-suspected-cyber-attack/">North Korea Loses Internet in Suspected Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-considers-deepfake-ban/">Florida Considers Deepfake Ban</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-devops-staff-likely-click/">IT and DevOps Staff More Likely to Click on Phishing Links</a></p><p> </p><p><strong>Tweet of the Week (41:12)</strong></p><img src="https://lh6.googleusercontent.com/tv7zssAKU-pD9x0NIpgBLQym2gnkS9W3dI_Bzuv0B31Hn5Rw3qyAJv4xMuvbd113YUknE0s2WBdtjbPdJolHId6JkhllAXTEwa6eRozk_XwPL2SXIwx3TTsWJuyaw0NE-q7QOjU_" /><p><a href="https://twitter.com/ra6bit/status/1486695164332711939">https://twitter.com/ra6bit/status/1486695164332711939</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="43062659" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/22816094-7e85-4457-9ae5-14b6812f79f8/audio/14845334-74e5-416b-8003-13749ffd71f3/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode Joe 90 - Filmed in SuperMarionation</itunes:title>
      <itunes:author>Andrew Agnēs, Javvad Malik, Thom Langford</itunes:author>
      <itunes:duration>00:44:51</itunes:duration>
      <itunes:summary>This week in Infosec sounds like it was pulled together 2 minutes before we started recording
 
Rant of the Week is a story about a tax authority watching every step you take

Billy Big Balls is an OSINT story that looks like it’s going to land two people in deep poop
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week has an analogy for you</itunes:summary>
      <itunes:subtitle>This week in Infosec sounds like it was pulled together 2 minutes before we started recording
 
Rant of the Week is a story about a tax authority watching every step you take

Billy Big Balls is an OSINT story that looks like it’s going to land two people in deep poop
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week has an analogy for you</itunes:subtitle>
      <itunes:keywords>infosewc, hmrc, podcast, ant-virus, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30edaa92-0230-46be-b237-03ceff42ce37</guid>
      <title>Episode 89 - Normal Audio is Resumed</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (06:23)</strong></p><p>With content liberated from the “Today in InfoSec” twitter account and further afield</p><p>19th January 1999: The <a href="http://en.wikipedia.org/wiki/Happy99">Happy99</a> worm first appeared. It invisibly attached itself to emails, displayed fireworks to hide the changes being made, and wished the user a happy New Year. It was the first of a wave of malware that struck Microsoft Windows computers over the next several years, costing businesses and individuals untold amounts of money to resolve. </p><p>19th January 1999: <a href="http://en.wikipedia.org/wiki/BlackBerry">RIM introduces the BlackBerry</a>. The original BlackBerry devices were not phones, but instead were the first mobile devices that could do real-time e-mail. They looked like big pagers.  It is alleged the name “BlackBerry” came from the similarity that the buttons on the original device had to the surface of a blackberry fruit.</p><p><a href="https://www.theguardian.com/media/2011/aug/08/london-riots-facebook-twitter-blackberry">London riots: how BlackBerry Messenger played a key role</a></p><p> </p><p><strong>Rant of the Week (18:01)</strong></p><p><a href="https://www.theregister.com/2022/01/20/singapores_monetary_authority_requires_banks/">Singapore gives banks two-week deadline to fix SMS security</a></p><p>A widespread phishing operation targeting Southeast Asia's second-largest bank – Oversea-Chinese Banking Corporation (OCBC) – has prompted the Monetary Authority of Singapore (MAS) to introduce regulations for internet banking that include use of an SMS Sender ID registry.</p><p>Singapore banks have two weeks to remove clickable links in text messages or e-mails sent to retail customers. Furthermore, activation of a soft token on a mobile device will require a 12-hour cooling off period, customers must be notified of any request to change their contact details, and fund transfer threshold will by default be set to SG$100 ($74) or lower.</p><p>MAS has also offered a vague directive requiring banks to issue more scam education alerts, and to do so more often.</p><p> </p><p><strong>Billy Big Balls of the Week  (25:49)</strong></p><p><a href="https://www.vice.com/en/article/bvn7nw/train-robberies-are-back">Train Robberies Are Back</a></p><p>Freight trains loaded with valuable merchandise sitting on apparently unguarded tracks make for awfully inviting targets.</p><p>For months, Union Pacific freight trains have been getting systematically robbed in the Los Angeles area, according to local news reports, as thieves target valuable merchandise and online orders from retailers like Amazon sitting on delayed trains.</p><p><a href="https://www.forbes.com/sites/jimdobson/2019/04/13/superyacht-security-the-top-10-best-ways-to-avoid-pirates-and-paparazzi/">Superyacht Security: The 10 Best Ways To Protect From Pirates And Paparazzi</a></p><p> </p><p><strong>Industry News (33:12)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/european-regulators-hand-11bn-gdpr/">European Regulators Hand Out €1.1bn in GDPR Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/kids-young-nine-launched-ddos/">NCA: Kids as Young as Nine Have Launched DDoS Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-regulate-crypto/">Government to Regulate Crypto Advertising in New Crack Down</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-charged-smuggling-tech-iran/">Man Charged with Smuggling Tech Exports to Iran</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-hack-olympic-games-app/">Researchers Hack Olympic Games App</a></p><p><a href="https://www.infosecurity-magazine.com/news/red-cross-supply-chain-data-breach/">Red Cross: Supply Chain Data Breach Hit 500K People</a></p><p><a href="https://www.infosecurity-magazine.com/news/eleven-arrested-nigerian-bec/">Eleven Arrested in Bust of Prolific Nigerian BEC Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-effective-cvss/">Twitter Mentions More Effective Than CVSS at Reducing Exploitability</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-signs-memo-to-boost-national/">Biden Signs Memo to Boost National Cybersecurity</a></p><p> </p><p><strong>Tweet of the Week (42:00)</strong></p><img src="https://lh6.googleusercontent.com/4xdqZTOZg_OdyU87L-cU650iGPmOMFUcp2jOQZ6OK83MoGtc5OTOFTMN9ORaJFBykl3xz0SGRQEGODaS9WoPJj54PysbWQ1PDUPAlmJ9ld9eK-6djHMGnuUd_KlbJx_IUsG6UZvx" /><p><a href="https://twitter.com/blkcybersources/status/1483826713561862159?s=21">https://twitter.com/blkcybersources/status/1483826713561862159?s=21</a></p><p><a href="https://twitter.com/BLKCybersources/status/1483826713561862159/photo/1">https://twitter.com/BLKCybersources/status/1483826713561862159/photo/1</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 21 Jan 2022 13:26:15 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnês, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-89-normal-audio-is-resumed-Zo36c5f_</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (06:23)</strong></p><p>With content liberated from the “Today in InfoSec” twitter account and further afield</p><p>19th January 1999: The <a href="http://en.wikipedia.org/wiki/Happy99">Happy99</a> worm first appeared. It invisibly attached itself to emails, displayed fireworks to hide the changes being made, and wished the user a happy New Year. It was the first of a wave of malware that struck Microsoft Windows computers over the next several years, costing businesses and individuals untold amounts of money to resolve. </p><p>19th January 1999: <a href="http://en.wikipedia.org/wiki/BlackBerry">RIM introduces the BlackBerry</a>. The original BlackBerry devices were not phones, but instead were the first mobile devices that could do real-time e-mail. They looked like big pagers.  It is alleged the name “BlackBerry” came from the similarity that the buttons on the original device had to the surface of a blackberry fruit.</p><p><a href="https://www.theguardian.com/media/2011/aug/08/london-riots-facebook-twitter-blackberry">London riots: how BlackBerry Messenger played a key role</a></p><p> </p><p><strong>Rant of the Week (18:01)</strong></p><p><a href="https://www.theregister.com/2022/01/20/singapores_monetary_authority_requires_banks/">Singapore gives banks two-week deadline to fix SMS security</a></p><p>A widespread phishing operation targeting Southeast Asia's second-largest bank – Oversea-Chinese Banking Corporation (OCBC) – has prompted the Monetary Authority of Singapore (MAS) to introduce regulations for internet banking that include use of an SMS Sender ID registry.</p><p>Singapore banks have two weeks to remove clickable links in text messages or e-mails sent to retail customers. Furthermore, activation of a soft token on a mobile device will require a 12-hour cooling off period, customers must be notified of any request to change their contact details, and fund transfer threshold will by default be set to SG$100 ($74) or lower.</p><p>MAS has also offered a vague directive requiring banks to issue more scam education alerts, and to do so more often.</p><p> </p><p><strong>Billy Big Balls of the Week  (25:49)</strong></p><p><a href="https://www.vice.com/en/article/bvn7nw/train-robberies-are-back">Train Robberies Are Back</a></p><p>Freight trains loaded with valuable merchandise sitting on apparently unguarded tracks make for awfully inviting targets.</p><p>For months, Union Pacific freight trains have been getting systematically robbed in the Los Angeles area, according to local news reports, as thieves target valuable merchandise and online orders from retailers like Amazon sitting on delayed trains.</p><p><a href="https://www.forbes.com/sites/jimdobson/2019/04/13/superyacht-security-the-top-10-best-ways-to-avoid-pirates-and-paparazzi/">Superyacht Security: The 10 Best Ways To Protect From Pirates And Paparazzi</a></p><p> </p><p><strong>Industry News (33:12)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/european-regulators-hand-11bn-gdpr/">European Regulators Hand Out €1.1bn in GDPR Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/kids-young-nine-launched-ddos/">NCA: Kids as Young as Nine Have Launched DDoS Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-regulate-crypto/">Government to Regulate Crypto Advertising in New Crack Down</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-charged-smuggling-tech-iran/">Man Charged with Smuggling Tech Exports to Iran</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-hack-olympic-games-app/">Researchers Hack Olympic Games App</a></p><p><a href="https://www.infosecurity-magazine.com/news/red-cross-supply-chain-data-breach/">Red Cross: Supply Chain Data Breach Hit 500K People</a></p><p><a href="https://www.infosecurity-magazine.com/news/eleven-arrested-nigerian-bec/">Eleven Arrested in Bust of Prolific Nigerian BEC Gang</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-effective-cvss/">Twitter Mentions More Effective Than CVSS at Reducing Exploitability</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-signs-memo-to-boost-national/">Biden Signs Memo to Boost National Cybersecurity</a></p><p> </p><p><strong>Tweet of the Week (42:00)</strong></p><img src="https://lh6.googleusercontent.com/4xdqZTOZg_OdyU87L-cU650iGPmOMFUcp2jOQZ6OK83MoGtc5OTOFTMN9ORaJFBykl3xz0SGRQEGODaS9WoPJj54PysbWQ1PDUPAlmJ9ld9eK-6djHMGnuUd_KlbJx_IUsG6UZvx" /><p><a href="https://twitter.com/blkcybersources/status/1483826713561862159?s=21">https://twitter.com/blkcybersources/status/1483826713561862159?s=21</a></p><p><a href="https://twitter.com/BLKCybersources/status/1483826713561862159/photo/1">https://twitter.com/BLKCybersources/status/1483826713561862159/photo/1</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48174718" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/a39c8361-3442-4de8-ba51-aaf735ecff69/audio/1be0a995-00ef-4148-9d96-867d4a64cf1f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 89 - Normal Audio is Resumed</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnês, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/0375c962-f2f9-4e0b-8868-68feb24eec59/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:11</itunes:duration>
      <itunes:summary>This week in InfoSec talks about the ’90s
 
Rant of the Week is a story about a regulator not considering implications before mandating new requirements

Billy Big Balls dusts off the old school security skills
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives career advice that smacks of sponsorship</itunes:summary>
      <itunes:subtitle>This week in InfoSec talks about the ’90s
 
Rant of the Week is a story about a regulator not considering implications before mandating new requirements

Billy Big Balls dusts off the old school security skills
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week gives career advice that smacks of sponsorship</itunes:subtitle>
      <itunes:keywords>cool cyber, yahoo!, happy69, blackberry</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">263cc83a-1c28-46da-b6da-12631d6b4bc5</guid>
      <title>Episode 88 - Only 345 Days Until Christmas</title>
      <description><![CDATA[<p><strong>This week in Infosec (06:30)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>12th January 1981: Time Magazine published "Superzapping in Computer Land". Its primary focus was four 13-year-olds from New York City who broke into 2 computer networks and destroyed 1 million bits of data. Yes, a whopping 0.125 MB. Have a read of the article.</p><p><a href="https://phil-are-go.blogspot.com/2011/10/superzapping-in-computer-land-ride-of.html?m=1">Superzapping in Computer Land - The ride of the "Dalton Gang"</a></p><p><a href="https://twitter.com/todayininfosec/status/1481352763476832256">https://twitter.com/todayininfosec/status/1481352763476832256</a></p><p>13th January 1989: The “Friday the 13th” virus <a href="https://www.latimes.com/archives/la-xpm-1989-01-13-mn-402-story.html">strikes hundreds of IBM computers in Britain</a>. This is one of the most famous early examples of a computer virus making headlines.</p><p><a href="https://www.nytimes.com/1989/10/08/business/the-executive-computer-friday-the-13th-a-virus-is-lurking.html">THE EXECUTIVE COMPUTER; Friday the 13th: A Virus Is Lurking</a></p><p> </p><p><strong>Rant of the Week (13:43)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/">Dev corrupts NPM libs 'colors' and 'faker' breaking thousands of apps</a></p><p>Users of popular open-source libraries 'colors' and 'faker' were left stunned after they saw their applications, using these libraries, printing gibberish data and breaking.</p><p>Some surmised if the NPM libraries had been compromised, but it turns out there's much more to the story.</p><p>The developer of these libraries intentionally introduced an infinite loop that bricked thousands of projects that depend on 'colors' and 'faker.' </p><p> </p><p><strong>Billy Big Balls of the Week (23:18)</strong></p><p><a href="https://www.theregister.com/2022/01/12/bugalert_matt_sullivan_interview/">Info-saturated techie builds bug alert service that phones you to warn of new vulns</a></p><p>An infosec pro fed up of having to follow tedious Twitter accounts to stay on top of cybersecurity developments has set up a website that phones you if there's a new vuln you really need to know about.</p><p> </p><p><strong>Industry News (30:37)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/flexbooker-reveals-major-customer/">FlexBooker Reveals Major Customer Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/forensics-expert-kept-murder-snaps/">Forensics Expert Kept Murder Snaps on PC</a></p><p><a href="https://www.infosecurity-magazine.com/news/romance-scammers-stole-92m-victims/">Romance Scammers Stole £92m From Victims Last Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-supply-chain-attack-simulation/">European Union to Launch Supply Chain Attack Simulation</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-delete-trove-personal/">Europol Ordered to Delete Vast Trove of Personal Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-makes-tesla-hacking-claim/">Teen Makes Tesla Hacking Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-rats-spy-women-children/">Two Years for Man Who Used RATs to Spy on Women and Children</a></p><p><a href="https://www.infosecurity-magazine.com/news/fcc-stricter-data-breach-reporting/">FCC Proposes Stricter Data Breach Reporting Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-undetected-backdoor-three-os/">New "Undetected" Backdoor Runs Across Three OS Platforms</a></p><p> </p><p><strong>Tweet of the Week (38:32)</strong></p><img src="https://lh5.googleusercontent.com/Xl_ChqsjRNZrM4MB5ZTnSr9EbhOCIeXb11BvMu7gq8YLCWFyX4LeOZ8jjPZz5wRMoggrIiQS9QJCDyyCWdktC68P5pyau8to-JFFkmz-u-g-G90CBjPuEc-zIiYs_NeOSLX-j_1s" /><p><a href="https://twitter.com/dominotree/status/1481646565869584385?s=21">https://twitter.com/dominotree/status/1481646565869584385?s=21</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 Jan 2022 13:33:36 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-88-only-345-days-until-christmas-QHk0Nmr0</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec (06:30)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>12th January 1981: Time Magazine published "Superzapping in Computer Land". Its primary focus was four 13-year-olds from New York City who broke into 2 computer networks and destroyed 1 million bits of data. Yes, a whopping 0.125 MB. Have a read of the article.</p><p><a href="https://phil-are-go.blogspot.com/2011/10/superzapping-in-computer-land-ride-of.html?m=1">Superzapping in Computer Land - The ride of the "Dalton Gang"</a></p><p><a href="https://twitter.com/todayininfosec/status/1481352763476832256">https://twitter.com/todayininfosec/status/1481352763476832256</a></p><p>13th January 1989: The “Friday the 13th” virus <a href="https://www.latimes.com/archives/la-xpm-1989-01-13-mn-402-story.html">strikes hundreds of IBM computers in Britain</a>. This is one of the most famous early examples of a computer virus making headlines.</p><p><a href="https://www.nytimes.com/1989/10/08/business/the-executive-computer-friday-the-13th-a-virus-is-lurking.html">THE EXECUTIVE COMPUTER; Friday the 13th: A Virus Is Lurking</a></p><p> </p><p><strong>Rant of the Week (13:43)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/">Dev corrupts NPM libs 'colors' and 'faker' breaking thousands of apps</a></p><p>Users of popular open-source libraries 'colors' and 'faker' were left stunned after they saw their applications, using these libraries, printing gibberish data and breaking.</p><p>Some surmised if the NPM libraries had been compromised, but it turns out there's much more to the story.</p><p>The developer of these libraries intentionally introduced an infinite loop that bricked thousands of projects that depend on 'colors' and 'faker.' </p><p> </p><p><strong>Billy Big Balls of the Week (23:18)</strong></p><p><a href="https://www.theregister.com/2022/01/12/bugalert_matt_sullivan_interview/">Info-saturated techie builds bug alert service that phones you to warn of new vulns</a></p><p>An infosec pro fed up of having to follow tedious Twitter accounts to stay on top of cybersecurity developments has set up a website that phones you if there's a new vuln you really need to know about.</p><p> </p><p><strong>Industry News (30:37)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/flexbooker-reveals-major-customer/">FlexBooker Reveals Major Customer Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/forensics-expert-kept-murder-snaps/">Forensics Expert Kept Murder Snaps on PC</a></p><p><a href="https://www.infosecurity-magazine.com/news/romance-scammers-stole-92m-victims/">Romance Scammers Stole £92m From Victims Last Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-supply-chain-attack-simulation/">European Union to Launch Supply Chain Attack Simulation</a></p><p><a href="https://www.infosecurity-magazine.com/news/europol-delete-trove-personal/">Europol Ordered to Delete Vast Trove of Personal Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-makes-tesla-hacking-claim/">Teen Makes Tesla Hacking Claim</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-rats-spy-women-children/">Two Years for Man Who Used RATs to Spy on Women and Children</a></p><p><a href="https://www.infosecurity-magazine.com/news/fcc-stricter-data-breach-reporting/">FCC Proposes Stricter Data Breach Reporting Requirements</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-undetected-backdoor-three-os/">New "Undetected" Backdoor Runs Across Three OS Platforms</a></p><p> </p><p><strong>Tweet of the Week (38:32)</strong></p><img src="https://lh5.googleusercontent.com/Xl_ChqsjRNZrM4MB5ZTnSr9EbhOCIeXb11BvMu7gq8YLCWFyX4LeOZ8jjPZz5wRMoggrIiQS9QJCDyyCWdktC68P5pyau8to-JFFkmz-u-g-G90CBjPuEc-zIiYs_NeOSLX-j_1s" /><p><a href="https://twitter.com/dominotree/status/1481646565869584385?s=21">https://twitter.com/dominotree/status/1481646565869584385?s=21</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="39900380" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/10613e41-67d2-45d6-b8ff-8ad88be9ade7/audio/63a331be-7ced-419b-a00a-4ad1cb264f42/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 88 - Only 345 Days Until Christmas</itunes:title>
      <itunes:author>Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:duration>00:41:34</itunes:duration>
      <itunes:summary>This week in Infosec talks about “Bit-sized Bandits”
 
Rant of the Week is a story about a Dev who adopts a scorched-earth approach

Billy Big Balls attempts to reinvent the wheel and give it a different name
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about factors of authentication.</itunes:summary>
      <itunes:subtitle>This week in Infosec talks about “Bit-sized Bandits”
 
Rant of the Week is a story about a Dev who adopts a scorched-earth approach

Billy Big Balls attempts to reinvent the wheel and give it a different name
 
Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week talks about factors of authentication.</itunes:subtitle>
      <itunes:keywords>open source, back to work, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f89873e7-46ea-446c-bc2f-ded2380de635</guid>
      <title>Episode 87 - Merry New Year</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (6:20)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>1st January 1997: The Cult of the Dead Cow admitted it was responsible for the Good Times virus hoax of 1994.</p><p><a href="https://en.m.wikipedia.org/wiki/Goodtimes_virus">Good times virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1212558619205607426">https://twitter.com/todayininfosec/status/1212558619205607426</a></p><p>[Covered this story last month so will axe it]</p><p>2nd January 1975: Gates and Allen Name "Micro-Soft".  Microsoft founders Bill Gates and Paul Allen write a letter to MITS, the Albuquerque, New Mexico, company that manufactured the Altair computer, offering a version of BASIC for MITS's "Altair 8800" computer. The contract for BASIC reflected the first time Gates and Allen referred to themselves as the company Microsoft, spelled in the document as "Micro-Soft."</p><p><a href="https://www.computerhistory.org/tdih/january/2/#gates-and-allen-name-micro-soft">Gates and Allen name Micro-Soft</a></p><p><a href="https://en.wikipedia.org/wiki/Microsoft_v._MikeRoweSoft">Microsoft v. MikeRoweSoft</a></p><p>3rd January 1977: Apple Computer, Inc. is Incorporated</p><p>Apple Computer, Inc. is incorporated by Steven Jobs and Stephen Wozniak. Its IPO, which took place three years later, was the largest one since the Ford Motor Company went public in 1956. The stock rose almost 32% that day giving the company a market valuation of $1.778 billion. Seven years later, on January 24, 1984, the company revealed the Macintosh personal computer in a publicity campaign that compared IBM with Big Brother and Apple as the savior of the masses.</p><p><a href="https://www.reuters.com/markets/europe/apple-gets-closer-3-trillion-market-value-2022-01-03/">Apple becomes first company to hit $3 trillion market value, then slips</a></p><p> </p><p><strong>Rant of the Week (17:22)</strong></p><p><a href="https://www.theregister.com/2022/01/05/norton_360_cryptominer_deletion/">Remember Norton 360's bundled cryptominer? Irritated folk realise Ethereum crafter is tricky to delete</a></p><p>Back in June, NortonLifeLock, owner of the unloved PC antivirus product, declared it was offering Ethereum mining as part of its antivirus suite. NortonLifeLock's pitch, was that people dabbling in cryptocurrency mining probably weren't paying attention to security – so what better way than to take up a cryptocurrency miner than installing one from a trusted consumer security brand?</p><p>In return for you installing their cryptominer on your home PC, NortonLifeLock skims off a mere 15 per cent of whatever digital currency you generate. </p><p><a href="https://twitter.com/jwz/status/1478022085737803776?s=20">https://twitter.com/jwz/status/1478022085737803776?s=20</a></p><p> </p><p><strong>Billy Big Balls (25:18)</strong></p><p>A set of balls to bring us back </p><p><a href="https://www.newsweek.com/elizabeth-holmes-trial-theranos-ceo-jail-time-verdict-explained-1665239?utm_term=Autofeed&utm_medium=Social&utm_source=Twitter#Echobox=1641291106">Former CEO of Theranos Elizabeth Holmes convicted on 4 counts</a></p><p><a href="https://portswigger.net/daily-swig/us-clothing-supplier-pro-wrestling-tees-hit-by-data-breach">US clothing supplier Pro Wrestling Tees hit by data breach</a></p><p>A quick story that is near and dear to mine and Andy’s heart - which Thom will have absolutely no idea about. </p><p>But Pro wrestling Tee’s - which sells t-shirts designed by professional wrestlers, has discovered that some customers’ credit card numbers have been compromised in a data breach. </p><p>a small portion of our customers’ credit card numbers had been compromised,” reads a breach notification letter signed by Pro Wrestling Tees owner Ryan Barkan</p><p>“We immediately conducted a thorough investigation of our system and concluded that a malicious virus was the source of the breach.”</p><p>A cybersecurity firm has since helped to remove the malware.</p><p>Barkan added that they had found “no evidence that current individual personal information has been compromised”, or evidence “of any current misuse of your information” – despite admitting that the payment details were accessed.</p><p>You may be thinking that this isn’t a big deal. </p><p>But what kind of Jabroni thinks it’s a good idea to attack a wrestling store. It’s almost like they’re looking for a smack down. </p><p>I get it, they may have thought - oooh what a rush, but whatcha gonna do? Whatcha gonna do when the feds come looking for you brother? </p><p>Criminals can rest in peace - and that’s the bottom line, cos the host unknown podcast said so. </p><p>[That was this weeks BILLY BIG BALLS] Jav:</p><p> </p><p><strong>Industry News (39:53)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-new-years-exchange-bug/">Microsoft Fixes New Year's Day Exchange Server Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-defence-academy-attack-report/">UK Defence Academy Attack Forced IT Rebuild</a></p><p><a href="https://www.infosecurity-magazine.com/news/investigation-launched-into-app/">Investigation Launched into App “Selling” Women</a></p><p><a href="https://www.infosecurity-magazine.com/news/ftc-patch-log4j-now-or-risk-major/">FTC: Patch Log4j Now or Risk Major Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-information-commissioner-role/">UK's Information Commissioner Starts New Role Amid Major Changes</a></p><p><a href="https://www.infosecurity-magazine.com/news/morgan-stanley-agrees-data-breach/">Morgan Stanley Agrees to Data Breach Settlement</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-stuffers-hijack-accounts/">Credential Stuffers Compromised 1.1 Million Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-firm-pulls-rug-investors/">Crypto Firm Pulls the Rug from Under Investors with $10m Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-pleads-guilty-50m-investment/">Man Pleads Guilty to $50m Investment Fraud Scheme</a></p><p> </p><p><strong>Tweet of the Week (43:15)</strong></p><img src="https://lh3.googleusercontent.com/HYAkem922Rm13zyt_UQ-V2TdnV71WNQ7wrNLu-UZpGstPe_lsek1CDrVOZv2vOnChluV30L5WD8oBMfcEFG99F_voIq-VqhPHYQReQBj_FPpai3sZ0-uhiL1SPnEHXfIg8BWoeV1" /><p><a href="https://twitter.com/avrovulcanxh607/status/1445102818348699746">https://twitter.com/avrovulcanxh607/status/1445102818348699746</a></p><p><a href="https://www.theregister.com/2022/01/06/ceefax_replica/">Ceefax replica goes TITSUP* as folk pine for simpler times</a></p><p><a href="https://www.theregister.com/2022/01/06/ceefax_replica/">But creator runs server from home – we can forgive him</a></p><p>A young man who would have been around 10 when the plug was pulled on Ceefax has recreated the BBC's teletext information service online, replete with a digital remote control to punch in the number of your choice.</p><p><a href="https://www.nathanmediaservices.co.uk/teletext-viewer/">NMS Ceefax</a></p><p> </p><p>The joke that Jav didn't understand:</p><img src="https://lh5.googleusercontent.com/BLD49_uT8Gcnc99j7Ns0NJr1fdwjSwmLNskX_YKep5nzLhKIch0LA9QOXqEegTMhNGteSk48YpgmzwAH1VEIZkux29XeQRLYs2ClL-OKFQEjmYtcfpP5iANF0Fo2kYPjmYSoJuBj" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 7 Jan 2022 15:26:36 +0000</pubDate>
      <author>thom@tl2security.com (Jack Malik, Thom Langford, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-87-merry-new-year-GLv1Pyq3</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (6:20)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>1st January 1997: The Cult of the Dead Cow admitted it was responsible for the Good Times virus hoax of 1994.</p><p><a href="https://en.m.wikipedia.org/wiki/Goodtimes_virus">Good times virus</a></p><p><a href="https://twitter.com/todayininfosec/status/1212558619205607426">https://twitter.com/todayininfosec/status/1212558619205607426</a></p><p>[Covered this story last month so will axe it]</p><p>2nd January 1975: Gates and Allen Name "Micro-Soft".  Microsoft founders Bill Gates and Paul Allen write a letter to MITS, the Albuquerque, New Mexico, company that manufactured the Altair computer, offering a version of BASIC for MITS's "Altair 8800" computer. The contract for BASIC reflected the first time Gates and Allen referred to themselves as the company Microsoft, spelled in the document as "Micro-Soft."</p><p><a href="https://www.computerhistory.org/tdih/january/2/#gates-and-allen-name-micro-soft">Gates and Allen name Micro-Soft</a></p><p><a href="https://en.wikipedia.org/wiki/Microsoft_v._MikeRoweSoft">Microsoft v. MikeRoweSoft</a></p><p>3rd January 1977: Apple Computer, Inc. is Incorporated</p><p>Apple Computer, Inc. is incorporated by Steven Jobs and Stephen Wozniak. Its IPO, which took place three years later, was the largest one since the Ford Motor Company went public in 1956. The stock rose almost 32% that day giving the company a market valuation of $1.778 billion. Seven years later, on January 24, 1984, the company revealed the Macintosh personal computer in a publicity campaign that compared IBM with Big Brother and Apple as the savior of the masses.</p><p><a href="https://www.reuters.com/markets/europe/apple-gets-closer-3-trillion-market-value-2022-01-03/">Apple becomes first company to hit $3 trillion market value, then slips</a></p><p> </p><p><strong>Rant of the Week (17:22)</strong></p><p><a href="https://www.theregister.com/2022/01/05/norton_360_cryptominer_deletion/">Remember Norton 360's bundled cryptominer? Irritated folk realise Ethereum crafter is tricky to delete</a></p><p>Back in June, NortonLifeLock, owner of the unloved PC antivirus product, declared it was offering Ethereum mining as part of its antivirus suite. NortonLifeLock's pitch, was that people dabbling in cryptocurrency mining probably weren't paying attention to security – so what better way than to take up a cryptocurrency miner than installing one from a trusted consumer security brand?</p><p>In return for you installing their cryptominer on your home PC, NortonLifeLock skims off a mere 15 per cent of whatever digital currency you generate. </p><p><a href="https://twitter.com/jwz/status/1478022085737803776?s=20">https://twitter.com/jwz/status/1478022085737803776?s=20</a></p><p> </p><p><strong>Billy Big Balls (25:18)</strong></p><p>A set of balls to bring us back </p><p><a href="https://www.newsweek.com/elizabeth-holmes-trial-theranos-ceo-jail-time-verdict-explained-1665239?utm_term=Autofeed&utm_medium=Social&utm_source=Twitter#Echobox=1641291106">Former CEO of Theranos Elizabeth Holmes convicted on 4 counts</a></p><p><a href="https://portswigger.net/daily-swig/us-clothing-supplier-pro-wrestling-tees-hit-by-data-breach">US clothing supplier Pro Wrestling Tees hit by data breach</a></p><p>A quick story that is near and dear to mine and Andy’s heart - which Thom will have absolutely no idea about. </p><p>But Pro wrestling Tee’s - which sells t-shirts designed by professional wrestlers, has discovered that some customers’ credit card numbers have been compromised in a data breach. </p><p>a small portion of our customers’ credit card numbers had been compromised,” reads a breach notification letter signed by Pro Wrestling Tees owner Ryan Barkan</p><p>“We immediately conducted a thorough investigation of our system and concluded that a malicious virus was the source of the breach.”</p><p>A cybersecurity firm has since helped to remove the malware.</p><p>Barkan added that they had found “no evidence that current individual personal information has been compromised”, or evidence “of any current misuse of your information” – despite admitting that the payment details were accessed.</p><p>You may be thinking that this isn’t a big deal. </p><p>But what kind of Jabroni thinks it’s a good idea to attack a wrestling store. It’s almost like they’re looking for a smack down. </p><p>I get it, they may have thought - oooh what a rush, but whatcha gonna do? Whatcha gonna do when the feds come looking for you brother? </p><p>Criminals can rest in peace - and that’s the bottom line, cos the host unknown podcast said so. </p><p>[That was this weeks BILLY BIG BALLS] Jav:</p><p> </p><p><strong>Industry News (39:53)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-new-years-exchange-bug/">Microsoft Fixes New Year's Day Exchange Server Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-defence-academy-attack-report/">UK Defence Academy Attack Forced IT Rebuild</a></p><p><a href="https://www.infosecurity-magazine.com/news/investigation-launched-into-app/">Investigation Launched into App “Selling” Women</a></p><p><a href="https://www.infosecurity-magazine.com/news/ftc-patch-log4j-now-or-risk-major/">FTC: Patch Log4j Now or Risk Major Fines</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-information-commissioner-role/">UK's Information Commissioner Starts New Role Amid Major Changes</a></p><p><a href="https://www.infosecurity-magazine.com/news/morgan-stanley-agrees-data-breach/">Morgan Stanley Agrees to Data Breach Settlement</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-stuffers-hijack-accounts/">Credential Stuffers Compromised 1.1 Million Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-firm-pulls-rug-investors/">Crypto Firm Pulls the Rug from Under Investors with $10m Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-pleads-guilty-50m-investment/">Man Pleads Guilty to $50m Investment Fraud Scheme</a></p><p> </p><p><strong>Tweet of the Week (43:15)</strong></p><img src="https://lh3.googleusercontent.com/HYAkem922Rm13zyt_UQ-V2TdnV71WNQ7wrNLu-UZpGstPe_lsek1CDrVOZv2vOnChluV30L5WD8oBMfcEFG99F_voIq-VqhPHYQReQBj_FPpai3sZ0-uhiL1SPnEHXfIg8BWoeV1" /><p><a href="https://twitter.com/avrovulcanxh607/status/1445102818348699746">https://twitter.com/avrovulcanxh607/status/1445102818348699746</a></p><p><a href="https://www.theregister.com/2022/01/06/ceefax_replica/">Ceefax replica goes TITSUP* as folk pine for simpler times</a></p><p><a href="https://www.theregister.com/2022/01/06/ceefax_replica/">But creator runs server from home – we can forgive him</a></p><p>A young man who would have been around 10 when the plug was pulled on Ceefax has recreated the BBC's teletext information service online, replete with a digital remote control to punch in the number of your choice.</p><p><a href="https://www.nathanmediaservices.co.uk/teletext-viewer/">NMS Ceefax</a></p><p> </p><p>The joke that Jav didn't understand:</p><img src="https://lh5.googleusercontent.com/BLD49_uT8Gcnc99j7Ns0NJr1fdwjSwmLNskX_YKep5nzLhKIch0LA9QOXqEegTMhNGteSk48YpgmzwAH1VEIZkux29XeQRLYs2ClL-OKFQEjmYtcfpP5iANF0Fo2kYPjmYSoJuBj" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48127071" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/35d2f2c4-769d-4736-8e2b-23d16a24ad07/audio/0dc9aef0-c7e7-49a7-b258-fe0cdfbed65c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 87 - Merry New Year</itunes:title>
      <itunes:author>Jack Malik, Thom Langford, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e11bad45-1b9b-4b18-a8ee-5ffa4911e719/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:08</itunes:duration>
      <itunes:summary>This week in InfoSec takes us back to the Cult of Microsoft, or something like that…
 
Rant of the week shows that you will always be working for the man…

Billy Big Balls is a story about a wannabe Steve Jobs and stolen T Shirts

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells of the OG internet, at least if you are from the UK.
</itunes:summary>
      <itunes:subtitle>This week in InfoSec takes us back to the Cult of Microsoft, or something like that…
 
Rant of the week shows that you will always be working for the man…

Billy Big Balls is a story about a wannabe Steve Jobs and stolen T Shirts

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells of the OG internet, at least if you are from the UK.
</itunes:subtitle>
      <itunes:keywords>mikerowesoft, life360, their anus, representation matters, wrestling t-shirts, the french language, theranos, ghostbusters with the lady cast</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">208b43d6-a259-4f4b-bf4b-7dc49e687bd7</guid>
      <title>Episode 86 - The Oh So Christmas Special</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th December 1988: 25-year-old computer hacker Kevin Mitnick was charged for crimes including theft of software from DEC (Digital Equipment Corporation), including VMS source code and allegedly causing $4 million in damages to DEC.</p><p><a href="https://www.latimes.com/archives/la-xpm-1988-12-16-me-347-story.html">Ex-Computer Whiz Kid Held on New Fraud Counts</a></p><p><a href="https://twitter.com/todayininfosec/status/1471639991008825344">https://twitter.com/todayininfosec/status/1471639991008825344</a></p><p>15th December 1994: <a href="http://en.wikipedia.org/wiki/Netscape_Communications_Corporation">Netscape Communications Corporation</a> releases <a href="http://en.wikipedia.org/wiki/Netscape_Navigator">Netscape Navigator 1.0</a>, the world’s first commercially developed web browser, although this particular version was free for non-commercial use.</p><p>15th December 1995: Developed by researchers at <a href="http://www.nytimes.com/1995/12/18/business/digital-equipment-offers-web-browsers-its-super-spider.html">Digital Equipment Research Laboratories</a>, the <a href="http://en.wikipedia.org/wiki/AltaVista">AltaVista</a> search engine is launched. It was the first worldwide    web search service to gain significant popularity. One of the most popular search engines in the early world wide web, Google didn’t overtake AltaVista until 2001. AltaVista was eventually purchased by Yahoo! in 2003.</p><p> </p><p><strong>Rant of the Week (15:49)</strong></p><p>Thom starts but quickly hands the baton Jav who takes a clear lead on this weeks rant... about Andy. This is Andy's response:</p><p>Songs that build up tension and stumble forward: <a href="https://youtu.be/N6Wtvs42Ne8">Songs that skip a beat</a></p><p> </p><p><strong>Billy Big Balls of the Week (21:34)</strong></p><p><a href="https://www.bbc.co.uk/news/uk-england-manchester-59654724">National Lottery scratch card fraud: Men jailed over £4m jackpot claim</a></p><p>I talk about the time Thom went solo with (TL)2 ventures and highlights how going solo is a brave move for someone in a cushy CISO job. </p><p> </p><p><strong>Industry News (28:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-target-indias-prime/">Hackers Target India’s Prime Minister</a></p><p><a href="https://www.infosecurity-magazine.com/news/worstcase-scenario-exploit-travels/">“Worst-Case Scenario” Log4j Exploits Travel the Globe</a></p><p><a href="https://www.infosecurity-magazine.com/news/christmas-payroll-fears-ransomware/">Christmas Payroll Fears After Ransomware Hits Software Provider</a></p><p><a href="https://www.infosecurity-magazine.com/news/grindr-fined-user-data-explicit/">Grindr Fined €6.5m for Selling User Data Without Explicit Consent</a></p><p><a href="https://www.infosecurity-magazine.com/news/log4j-looms-large-over-patch/">Log4j Looms Large Over Patch Tuesday</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-orders-clearview-ai-delete/">France Orders Clearview AI to Delete Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-protect-user-privacy/">Regulator: Venues Must Protect User Privacy During #COVID19 Checks</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-ransomware-groups-emerge/">All Change at the Top as New Ransomware Groups Emerge</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-australia-cloud-act/">US and Australia Enter CLOUD Act Agreement</a></p><p> </p><p><strong>Tweet of the Week ( 38:09)</strong></p><img src="https://lh5.googleusercontent.com/P-UoUpchm4QgqWW5VsbnBsyC638DlovVsjq1CW3NPzq9whFk5Hg3Up1i2ngR2MnFxc18Z6bjnOUL2C7To_t5mli-tuIBp_SFkqJIKV9NHmkvx157ZE6VV5ISD1NvV9Rjs-TGqS0E" /><p><a href="https://twitter.com/GeekChickUK/status/541242616407687168?s=20">https://twitter.com/GeekChickUK/status/541242616407687168?s=20</a></p><img src="https://lh4.googleusercontent.com/uoyrdw-Dy4sOCvuqpXQDXVhhUMUXJUBnmFAgSJZOyYlOdjk5kXM1oqGhC7xvHU7JQ1blOZ6r_OZ3mglhZmEoU41YbALd6X2kVB_LGLVHMpXUA1qkeUFvQ7InT8hM-m11WvALtMEg" /><img src="https://lh4.googleusercontent.com/UaBmyax6TApJFJYN3fFtrrilw9x60QyUthZx--aBBWtmTtOMauv_sf6oWe-87Sv2ixk6E-jI9e274aOjQIWJZjBITpKK8eL64JaAVs8nBbEwePlbVcBXdDV-DTo0-Ag3C7_57F0C" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Dec 2021 16:03:45 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-86-the-oh-so-christmas-special-5bjP5tmF</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th December 1988: 25-year-old computer hacker Kevin Mitnick was charged for crimes including theft of software from DEC (Digital Equipment Corporation), including VMS source code and allegedly causing $4 million in damages to DEC.</p><p><a href="https://www.latimes.com/archives/la-xpm-1988-12-16-me-347-story.html">Ex-Computer Whiz Kid Held on New Fraud Counts</a></p><p><a href="https://twitter.com/todayininfosec/status/1471639991008825344">https://twitter.com/todayininfosec/status/1471639991008825344</a></p><p>15th December 1994: <a href="http://en.wikipedia.org/wiki/Netscape_Communications_Corporation">Netscape Communications Corporation</a> releases <a href="http://en.wikipedia.org/wiki/Netscape_Navigator">Netscape Navigator 1.0</a>, the world’s first commercially developed web browser, although this particular version was free for non-commercial use.</p><p>15th December 1995: Developed by researchers at <a href="http://www.nytimes.com/1995/12/18/business/digital-equipment-offers-web-browsers-its-super-spider.html">Digital Equipment Research Laboratories</a>, the <a href="http://en.wikipedia.org/wiki/AltaVista">AltaVista</a> search engine is launched. It was the first worldwide    web search service to gain significant popularity. One of the most popular search engines in the early world wide web, Google didn’t overtake AltaVista until 2001. AltaVista was eventually purchased by Yahoo! in 2003.</p><p> </p><p><strong>Rant of the Week (15:49)</strong></p><p>Thom starts but quickly hands the baton Jav who takes a clear lead on this weeks rant... about Andy. This is Andy's response:</p><p>Songs that build up tension and stumble forward: <a href="https://youtu.be/N6Wtvs42Ne8">Songs that skip a beat</a></p><p> </p><p><strong>Billy Big Balls of the Week (21:34)</strong></p><p><a href="https://www.bbc.co.uk/news/uk-england-manchester-59654724">National Lottery scratch card fraud: Men jailed over £4m jackpot claim</a></p><p>I talk about the time Thom went solo with (TL)2 ventures and highlights how going solo is a brave move for someone in a cushy CISO job. </p><p> </p><p><strong>Industry News (28:23)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-target-indias-prime/">Hackers Target India’s Prime Minister</a></p><p><a href="https://www.infosecurity-magazine.com/news/worstcase-scenario-exploit-travels/">“Worst-Case Scenario” Log4j Exploits Travel the Globe</a></p><p><a href="https://www.infosecurity-magazine.com/news/christmas-payroll-fears-ransomware/">Christmas Payroll Fears After Ransomware Hits Software Provider</a></p><p><a href="https://www.infosecurity-magazine.com/news/grindr-fined-user-data-explicit/">Grindr Fined €6.5m for Selling User Data Without Explicit Consent</a></p><p><a href="https://www.infosecurity-magazine.com/news/log4j-looms-large-over-patch/">Log4j Looms Large Over Patch Tuesday</a></p><p><a href="https://www.infosecurity-magazine.com/news/france-orders-clearview-ai-delete/">France Orders Clearview AI to Delete Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/regulator-protect-user-privacy/">Regulator: Venues Must Protect User Privacy During #COVID19 Checks</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-ransomware-groups-emerge/">All Change at the Top as New Ransomware Groups Emerge</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-and-australia-cloud-act/">US and Australia Enter CLOUD Act Agreement</a></p><p> </p><p><strong>Tweet of the Week ( 38:09)</strong></p><img src="https://lh5.googleusercontent.com/P-UoUpchm4QgqWW5VsbnBsyC638DlovVsjq1CW3NPzq9whFk5Hg3Up1i2ngR2MnFxc18Z6bjnOUL2C7To_t5mli-tuIBp_SFkqJIKV9NHmkvx157ZE6VV5ISD1NvV9Rjs-TGqS0E" /><p><a href="https://twitter.com/GeekChickUK/status/541242616407687168?s=20">https://twitter.com/GeekChickUK/status/541242616407687168?s=20</a></p><img src="https://lh4.googleusercontent.com/uoyrdw-Dy4sOCvuqpXQDXVhhUMUXJUBnmFAgSJZOyYlOdjk5kXM1oqGhC7xvHU7JQ1blOZ6r_OZ3mglhZmEoU41YbALd6X2kVB_LGLVHMpXUA1qkeUFvQ7InT8hM-m11WvALtMEg" /><img src="https://lh4.googleusercontent.com/UaBmyax6TApJFJYN3fFtrrilw9x60QyUthZx--aBBWtmTtOMauv_sf6oWe-87Sv2ixk6E-jI9e274aOjQIWJZjBITpKK8eL64JaAVs8nBbEwePlbVcBXdDV-DTo0-Ag3C7_57F0C" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48364889" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/9099eba3-3731-412e-84a6-13369e8fbfef/audio/a99f25ca-c703-4e91-8434-3cb61cf8e764/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 86 - The Oh So Christmas Special</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/22e6c9a2-6f3a-45db-a552-d531fe85f1ea/3000x3000/img-0450.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:23</itunes:duration>
      <itunes:summary>It’s Christmas, so we take a look back at our oh so fun packed lives and tell stories of the jinks, japes and capers of Host Unknown from the last few years.

This week in Infosec obviously takes us back to where it really started, although perhaps not as far back as the little tiny baby Jesus in his crib
 
Rant of the week  shows that scanning isn’t something done by just pentesters

Billy Big Balls is a story in two parts which unfortunately were not financially connected

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells of the greatest story ever told… from Nottingham... sorry, Leicester!
</itunes:summary>
      <itunes:subtitle>It’s Christmas, so we take a look back at our oh so fun packed lives and tell stories of the jinks, japes and capers of Host Unknown from the last few years.

This week in Infosec obviously takes us back to where it really started, although perhaps not as far back as the little tiny baby Jesus in his crib
 
Rant of the week  shows that scanning isn’t something done by just pentesters

Billy Big Balls is a story in two parts which unfortunately were not financially connected

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week tells of the greatest story ever told… from Nottingham... sorry, Leicester!
</itunes:subtitle>
      <itunes:keywords>merry christmas, jim shields, twist &amp; shout, the greatest story ever told, its christmas!, end of year, poundland monopoly</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f4658f64-b040-4d34-83e9-e9ad8009a9b1</guid>
      <title>Episode 85 - The Not So Christmas Special</title>
      <description><![CDATA[<p><a href="https://www.dreams.co.uk/therapur-actigel---plus-harmonic-2200-mattress/p/131-00675">Andy’s mattress</a></p><p><strong>This Week in InfoSec (11:46)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p> 7th December 1999: The <a href="http://www.wired.com/thisdayintech/2009/12/1207riaa-sues-napster/">Recording Industry Association of America sues the peer-to-peer file sharing service Napster</a> alleging copyright infringement for allowing users to download copyrighted music for free. The RIAA would eventually win injunctions against Napster forcing the service to suspend operations and eventually file bankruptcy. In the end the RIAA and its members would settle with Napster’s financial backers for hundreds of millions of dollars.</p><p><a href="https://www.factfiend.com/founder-napster-trolled-metallica/">How The Founder of Napster Trolled Metallica at the VMAs</a></p><p><a href="https://youtu.be/_q0Z3gBActg">Shawn Fanning at the MTV Video Music Awards in 2000</a></p><img src="https://lh6.googleusercontent.com/gIc3J5mRhfdaQ-elzKfeiTeck2zQ2yDsFnusbY7IZWQTyKlrMNrbqSo2U2CQiJewncr4C2YNLl6n9j_jUEo15unIucZOUCT7_TJaKgNw9F7aMhDo8sZD8lUqQxC_-G6fo_7E16bK" /><p> </p><p>December 2009, when Yahoo! Doesn't Want You To Know Its Spying Price List; <a href="https://www.wired.com/2009/12/yahoo-spy-prices/">Issues DMCA Takedown</a></p><p><a href="https://cryptome.org/isp-spy/yahoo-spy.pdf">Compliance Guide for Law Enforcement</a></p><p> </p><p><strong>Rant of the Week (22:37)</strong></p><p><a href="https://www.theverge.com/2021/12/7/22822431/kamala-harris-bluetooth-security-hacking-headphones">The vice president should not be using Bluetooth headphones</a></p><p>This week, Politico opened its newsletter with an article on Vice President Kamala Harris’ <a href="https://www.politico.com/newsletters/west-wing-playbook/2021/12/06/kamala-harris-is-bluetooth-phobic-495343">aversion to using Bluetooth headphones</a>. The VP was “Bluetooth-phobic,” the story claimed, “wary” of her AirPods and cautious with her technology use to an extent former aides described as “a bit paranoid.” Proof could be seen in her televised appearances: wires dangling from her ears in <a href="https://www.youtube.com/watch?v=0K00Zx8apeg">an interview with MSNBC’s Joy Reid</a> or clutched in her hand <a href="https://twitter.com/KamalaHarris/status/1325126733482385409">during the famous “We did it, Joe” call</a>.</p><p>But for a high-profile public official, this is a lot more reasonable than you might think. As security researchers <a href="https://twitter.com/SwiftOnSecurity/status/1468044270099742723">were quick to point out</a>, Bluetooth has a number of well-documented vulnerabilities that could be exploited if a bad actor wanted to hack, say, the second most powerful person in the US government.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/12/03/feds_youtube_theft/">Feds charge two men with claiming ownership of others' songs to steal YouTube royalty payments</a></p><p>Alleged scheme said to have netted $20m since 2017</p><p>"Batista and Teran perpetrated their fraud by falsely representing to Y.T. [YouTube] and to A.R., an intermediate company responsible for enforcing their music library, that they were the owners of a wide swath of music and that they were entitled to collect any resulting royalty payments."</p><p>The government claims that around April, 2017, two men, through their company MediaMuv, LLC, entered into a contract with A.R., which administers and distributes YouTube royalty payments, claiming to control a 50,000 song catalog of music.</p><p>They subsequently sent the corresponding song files to A.R., which in turn uploaded the files to YouTube, the indictment claims. The court filing cites as an example the song "<a href="https://www.youtube.com/watch?v=44hZavE3Ius">Viernes Sin Tu Amor</a>," which A.R. is said to have uploaded to YouTube in 2017 and has earned around $24,000 in royalty payments since then.</p><p>This was allegedly done for numerous songs, with A.R. eventually, at the direction of the MediaMuv, writing to YouTube "to bulk clear potential copyright conflicts from MediaMuv's entire music catalog."</p><p> </p><p><strong>Industry News (36:28) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/nine-state-department-phones/">Nine State Department Phones Hijacked by Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-closes-uk-convenience/">Cyber-attack Closes UK Convenience Stores</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-transport-giant-exposes/">French Transport Giant Exposes 57,000 Employees and Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/hotel-guests-locked-out-rooms/">Hotel Guests Locked Out of Rooms After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/passports-now-most-attacked-form-id/">Passports Now Most Attacked Form of ID</a></p><p><a href="https://www.infosecurity-magazine.com/news/aws-outage-hits-eastern-us/">AWS Outage Hits Eastern US</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-execs-half-likely-face-axe/">IT Execs Half as Likely to Face the Axe After Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-phishing-pages-are-shortlived/">Most Phishing Pages are Short-lived</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-websites-still-using/">Half of Websites Still Using Legacy Crypto Keys</a></p><p> </p><p><strong>Tweet of the Week (44:08)</strong></p><img src="https://lh3.googleusercontent.com/diMzDEZos3giNUI9zz52SJQRaP3S6vc7q8fK5I-XodNLxxpScG2UOiLfIShAILa18gVDbct_c8Sz7_wu8Zm8UaYWKFKhABdQBrD6PdA5IHs88rcGMTxIj82MeFzBbWiOKFhw99Ac" /><p><a href="https://twitter.com/TJ_Null/status/1469006847449440262">https://twitter.com/TJ_Null/status/1469006847449440262</a></p><img src="https://lh6.googleusercontent.com/-7dgJL80FHn61rZc_LCqfjLTqUU8BbfPtbR4-EaoghVsj8reCAlRwW_i5-WUXWEPm5AlsVDJOy8DkMbVKaxIJyr_W8Lx7UGboS_RS_opUymam1taztnvuNvudMnSTo_q6ttQcFBp" /><p><a href="https://twitter.com/johnjhacking/status/1468860997272174594">https://twitter.com/johnjhacking/status/1468860997272174594</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Dec 2021 14:36:44 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnês, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-85-the-not-so-christmas-special-4_bRc0yY</link>
      <content:encoded><![CDATA[<p><a href="https://www.dreams.co.uk/therapur-actigel---plus-harmonic-2200-mattress/p/131-00675">Andy’s mattress</a></p><p><strong>This Week in InfoSec (11:46)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p> 7th December 1999: The <a href="http://www.wired.com/thisdayintech/2009/12/1207riaa-sues-napster/">Recording Industry Association of America sues the peer-to-peer file sharing service Napster</a> alleging copyright infringement for allowing users to download copyrighted music for free. The RIAA would eventually win injunctions against Napster forcing the service to suspend operations and eventually file bankruptcy. In the end the RIAA and its members would settle with Napster’s financial backers for hundreds of millions of dollars.</p><p><a href="https://www.factfiend.com/founder-napster-trolled-metallica/">How The Founder of Napster Trolled Metallica at the VMAs</a></p><p><a href="https://youtu.be/_q0Z3gBActg">Shawn Fanning at the MTV Video Music Awards in 2000</a></p><img src="https://lh6.googleusercontent.com/gIc3J5mRhfdaQ-elzKfeiTeck2zQ2yDsFnusbY7IZWQTyKlrMNrbqSo2U2CQiJewncr4C2YNLl6n9j_jUEo15unIucZOUCT7_TJaKgNw9F7aMhDo8sZD8lUqQxC_-G6fo_7E16bK" /><p> </p><p>December 2009, when Yahoo! Doesn't Want You To Know Its Spying Price List; <a href="https://www.wired.com/2009/12/yahoo-spy-prices/">Issues DMCA Takedown</a></p><p><a href="https://cryptome.org/isp-spy/yahoo-spy.pdf">Compliance Guide for Law Enforcement</a></p><p> </p><p><strong>Rant of the Week (22:37)</strong></p><p><a href="https://www.theverge.com/2021/12/7/22822431/kamala-harris-bluetooth-security-hacking-headphones">The vice president should not be using Bluetooth headphones</a></p><p>This week, Politico opened its newsletter with an article on Vice President Kamala Harris’ <a href="https://www.politico.com/newsletters/west-wing-playbook/2021/12/06/kamala-harris-is-bluetooth-phobic-495343">aversion to using Bluetooth headphones</a>. The VP was “Bluetooth-phobic,” the story claimed, “wary” of her AirPods and cautious with her technology use to an extent former aides described as “a bit paranoid.” Proof could be seen in her televised appearances: wires dangling from her ears in <a href="https://www.youtube.com/watch?v=0K00Zx8apeg">an interview with MSNBC’s Joy Reid</a> or clutched in her hand <a href="https://twitter.com/KamalaHarris/status/1325126733482385409">during the famous “We did it, Joe” call</a>.</p><p>But for a high-profile public official, this is a lot more reasonable than you might think. As security researchers <a href="https://twitter.com/SwiftOnSecurity/status/1468044270099742723">were quick to point out</a>, Bluetooth has a number of well-documented vulnerabilities that could be exploited if a bad actor wanted to hack, say, the second most powerful person in the US government.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/12/03/feds_youtube_theft/">Feds charge two men with claiming ownership of others' songs to steal YouTube royalty payments</a></p><p>Alleged scheme said to have netted $20m since 2017</p><p>"Batista and Teran perpetrated their fraud by falsely representing to Y.T. [YouTube] and to A.R., an intermediate company responsible for enforcing their music library, that they were the owners of a wide swath of music and that they were entitled to collect any resulting royalty payments."</p><p>The government claims that around April, 2017, two men, through their company MediaMuv, LLC, entered into a contract with A.R., which administers and distributes YouTube royalty payments, claiming to control a 50,000 song catalog of music.</p><p>They subsequently sent the corresponding song files to A.R., which in turn uploaded the files to YouTube, the indictment claims. The court filing cites as an example the song "<a href="https://www.youtube.com/watch?v=44hZavE3Ius">Viernes Sin Tu Amor</a>," which A.R. is said to have uploaded to YouTube in 2017 and has earned around $24,000 in royalty payments since then.</p><p>This was allegedly done for numerous songs, with A.R. eventually, at the direction of the MediaMuv, writing to YouTube "to bulk clear potential copyright conflicts from MediaMuv's entire music catalog."</p><p> </p><p><strong>Industry News (36:28) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/nine-state-department-phones/">Nine State Department Phones Hijacked by Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-closes-uk-convenience/">Cyber-attack Closes UK Convenience Stores</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-transport-giant-exposes/">French Transport Giant Exposes 57,000 Employees and Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/hotel-guests-locked-out-rooms/">Hotel Guests Locked Out of Rooms After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/passports-now-most-attacked-form-id/">Passports Now Most Attacked Form of ID</a></p><p><a href="https://www.infosecurity-magazine.com/news/aws-outage-hits-eastern-us/">AWS Outage Hits Eastern US</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-execs-half-likely-face-axe/">IT Execs Half as Likely to Face the Axe After Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-phishing-pages-are-shortlived/">Most Phishing Pages are Short-lived</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-websites-still-using/">Half of Websites Still Using Legacy Crypto Keys</a></p><p> </p><p><strong>Tweet of the Week (44:08)</strong></p><img src="https://lh3.googleusercontent.com/diMzDEZos3giNUI9zz52SJQRaP3S6vc7q8fK5I-XodNLxxpScG2UOiLfIShAILa18gVDbct_c8Sz7_wu8Zm8UaYWKFKhABdQBrD6PdA5IHs88rcGMTxIj82MeFzBbWiOKFhw99Ac" /><p><a href="https://twitter.com/TJ_Null/status/1469006847449440262">https://twitter.com/TJ_Null/status/1469006847449440262</a></p><img src="https://lh6.googleusercontent.com/-7dgJL80FHn61rZc_LCqfjLTqUU8BbfPtbR4-EaoghVsj8reCAlRwW_i5-WUXWEPm5AlsVDJOy8DkMbVKaxIJyr_W8Lx7UGboS_RS_opUymam1taztnvuNvudMnSTo_q6ttQcFBp" /><p><a href="https://twitter.com/johnjhacking/status/1468860997272174594">https://twitter.com/johnjhacking/status/1468860997272174594</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49102169" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e42dc43f-9756-4253-ad38-4ae9d047e71b/audio/89ef6bec-9956-464d-8515-b04322f2d986/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 85 - The Not So Christmas Special</itunes:title>
      <itunes:author>Andrew Agnês, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/199e0d06-8700-4a0e-bb0c-352b7ce5ee77/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:09</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a time when sharing was caring
 
Rant of the week is a complaint about people criticising good security practice 

Billy Big Balls pays homage to people who take credit on group projects without contributing anything

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Is a new CVE about an old issue</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a time when sharing was caring
 
Rant of the week is a complaint about people criticising good security practice 

Billy Big Balls pays homage to people who take credit on group projects without contributing anything

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week Is a new CVE about an old issue</itunes:subtitle>
      <itunes:keywords>dial-up, youtube evil, paul choudry, beds r us, bluettoth security, the napster, kamala harris</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">287810b8-2dc0-44ff-8437-91e96a83d1f7</guid>
      <title>Episode 84 - The New Tiger King</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (06:57)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>4th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed.  </p><p><a href="https://twitter.com/todayininfosec/status/1335020238765744129">https://twitter.com/todayininfosec/status/1335020238765744129</a></p><p>1st December 1996: <a href="http://en.wikipedia.org/wiki/AOL">America Online</a> launches a new subscription plan offering their subscribers unlimited dial-up Internet access for $19.95/month. Previously, AOL charged $9.95/month for 5 hours of usage. The new plan brought in over one million new customers to AOL within weeks and daily usage doubled among subscribers (<a href="http://articles.latimes.com/1997-01-15/business/fi-18730_1_unlimited-access">to a whole 32 minutes per day!</a>). </p><p><a href="https://thisdayintechhistory.com/12/01/aol-goes-unlimited/">AOL goes unlimited</a></p><p> </p><p><strong>Billy Big Balls of the Week (16:06)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/">https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/</a></p><p> </p><p><strong>Industry News (21:15)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clearview-ico-data-fine/">Clearview AI to be Fined $22.6m for Breaching UK Data Protection Laws</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-set-for-major/">Cyber Essentials Set for Major Update in 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/texas-school-district-scan-devices/">Texas School District to Scan Children's Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi6-digital-attack-surface-growing/">MI6 Boss: Digital Attack Surface Growing "Exponentially"</a></p><p><a href="https://www.infosecurity-magazine.com/news/organizations-76-security-tools/">Organizations Now Have 76 Security Tools to Manage</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-to-remove-private-media/">Twitter to Remove Private Media</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-bulletproof-hosting/">Russian Bulletproof Hosting Kingpin Gets Five Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-money-laundering/">Police Arrest 1800 in Major Money Laundering Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-scam-targets-military/">Phishing Scam Targets Military Families</a></p><p> </p><p><strong>Tweets of the Week (29:50)</strong></p><img src="https://lh5.googleusercontent.com/KT7gwRCy5l4FG8Es7GxZYmBHPHldSmE9s59-vumyhAsLIy6VqtHah4VpliRsAgdgMcs9Hop4RcXXUGJtgZsroSxgke01dzK5IPSYK063VJe1vyDGzWsnn2YvdiR4uk_i3d5b1dMs" /><p><a href="https://twitter.com/j_opdenakker/status/1466380453036838913">https://twitter.com/j_opdenakker/status/1466380453036838913</a></p><img src="https://lh5.googleusercontent.com/V65DW1g8yOZcCO8K5Yk8BkF4WKTSYlYT3-to4BvZeNLZjbGYqjWGRzyOsWQWzJm5b-fHJZB82xCrj2c0ot18K0sLabCvvtqEz2ITZGSQ9vLlVsdgygnvjyr6f86CY4xxo3qBFgix" /><p><a href="https://twitter.com/bettersafetynet/status/1466460853105053699">https://twitter.com/bettersafetynet/status/1466460853105053699</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Dec 2021 13:53:48 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-84-the-new-tiger-king-uewHeZCG</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (06:57)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>4th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed.  </p><p><a href="https://twitter.com/todayininfosec/status/1335020238765744129">https://twitter.com/todayininfosec/status/1335020238765744129</a></p><p>1st December 1996: <a href="http://en.wikipedia.org/wiki/AOL">America Online</a> launches a new subscription plan offering their subscribers unlimited dial-up Internet access for $19.95/month. Previously, AOL charged $9.95/month for 5 hours of usage. The new plan brought in over one million new customers to AOL within weeks and daily usage doubled among subscribers (<a href="http://articles.latimes.com/1997-01-15/business/fi-18730_1_unlimited-access">to a whole 32 minutes per day!</a>). </p><p><a href="https://thisdayintechhistory.com/12/01/aol-goes-unlimited/">AOL goes unlimited</a></p><p> </p><p><strong>Billy Big Balls of the Week (16:06)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/">https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/</a></p><p> </p><p><strong>Industry News (21:15)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/clearview-ico-data-fine/">Clearview AI to be Fined $22.6m for Breaching UK Data Protection Laws</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-essentials-set-for-major/">Cyber Essentials Set for Major Update in 2022</a></p><p><a href="https://www.infosecurity-magazine.com/news/texas-school-district-scan-devices/">Texas School District to Scan Children's Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi6-digital-attack-surface-growing/">MI6 Boss: Digital Attack Surface Growing "Exponentially"</a></p><p><a href="https://www.infosecurity-magazine.com/news/organizations-76-security-tools/">Organizations Now Have 76 Security Tools to Manage</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-to-remove-private-media/">Twitter to Remove Private Media</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-bulletproof-hosting/">Russian Bulletproof Hosting Kingpin Gets Five Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-money-laundering/">Police Arrest 1800 in Major Money Laundering Crackdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/phishing-scam-targets-military/">Phishing Scam Targets Military Families</a></p><p> </p><p><strong>Tweets of the Week (29:50)</strong></p><img src="https://lh5.googleusercontent.com/KT7gwRCy5l4FG8Es7GxZYmBHPHldSmE9s59-vumyhAsLIy6VqtHah4VpliRsAgdgMcs9Hop4RcXXUGJtgZsroSxgke01dzK5IPSYK063VJe1vyDGzWsnn2YvdiR4uk_i3d5b1dMs" /><p><a href="https://twitter.com/j_opdenakker/status/1466380453036838913">https://twitter.com/j_opdenakker/status/1466380453036838913</a></p><img src="https://lh5.googleusercontent.com/V65DW1g8yOZcCO8K5Yk8BkF4WKTSYlYT3-to4BvZeNLZjbGYqjWGRzyOsWQWzJm5b-fHJZB82xCrj2c0ot18K0sLabCvvtqEz2ITZGSQ9vLlVsdgygnvjyr6f86CY4xxo3qBFgix" /><p><a href="https://twitter.com/bettersafetynet/status/1466460853105053699">https://twitter.com/bettersafetynet/status/1466460853105053699</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="36809154" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/88081159-68bd-4137-9200-b500a70d38ec/audio/025a083a-623f-4099-81ae-31a4401676a1/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 84 - The New Tiger King</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnês</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c7f2eb96-ed38-4d50-a76c-1d887bc4a902/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:38:20</itunes:duration>
      <itunes:summary>This week in Infosec Finds us repeating ourselves, just a little bit
 
Rant of the week is inexplicably missing

Billy Big Balls is the triple crown of billy big ball moves

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week explores the real reason we have security controls</itunes:summary>
      <itunes:subtitle>This week in Infosec Finds us repeating ourselves, just a little bit
 
Rant of the week is inexplicably missing

Billy Big Balls is the triple crown of billy big ball moves

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week explores the real reason we have security controls</itunes:subtitle>
      <itunes:keywords>tiger king, ubiquity, krebs, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6d687d1c-7b08-4c33-af0f-30f1a82fdb8a</guid>
      <title>Episode 83 - The Super Spreader Amateur Hour</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (11:00)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>23rd November 2011: It was reported that Apple took over 3 years to fix the iTunes installer vulnerability which the FinFisher remote spying Trojan exploited.</p><p><a href="https://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">Apple Took 3+ Years to Fix FinFisher Trojan Hole</a></p><p><a href="https://twitter.com/todayininfosec/status/1331028461612392448">https://twitter.com/todayininfosec/status/1331028461612392448</a></p><p>20th November 2000: eBay cancelled a listing for Kevin Mitnick's Bureau of Prisons inmate ID card due to uncertainty about his right to sell it. This was after an initial claim it was a prohibition from committing a "violent felony" and profiting from it.</p><p><a href="https://www.theregister.com/2000/11/23/ebay_pulls_kevin_mitnick_trinkets/">eBay pulls Kevin Mitnick trinkets: Taking a firm stand against "violent felons"</a></p><p><a href="https://twitter.com/todayininfosec/status/1329940298399703042">https://twitter.com/todayininfosec/status/1329940298399703042</a></p><p> </p><p><strong>Rant of the Week (18:50)</strong></p><p><a href="https://www.theregister.com/2021/11/22/godaddy_managed_wordpress_ssl_keys/">SSL keys, sFTP passwords and more exposed after someone broke into GoDaddy Managed WordPress using 'compromised password'</a></p><p>GoDaddy has admitted to America's financial watchdog that one or more miscreants broke into its systems and potentially accessed a huge amount of customer data, from email addresses to SSL private keys.</p><p>In a filing on Monday to the SEC, the internet giant said that on November 17 it discovered an "unauthorized third-party" had been roaming around part of its Managed WordPress service, which essentially stores and hosts people's websites.</p><p>GoDaddy’s chief information security officer Demetrius Comes said his company "immediately began an investigation with the help of an IT forensics firm and contacted law enforcement."</p><p>Those infosec sleuths, we're told, found evidence that an intruder had been inside part of GoDaddy's website provisioning system, described by Comes as a "legacy code base," since September 6, gaining access using a "compromised password."</p><p><a href="https://finance.yahoo.com/news/godaddy-latest-rebranding-break-sexist-160927732.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAInPRExaegfYrlDksQzO9s8S9FTlwS18JFj4hi_nfLhc6kqjzLmQ-tzSXGY9tZdGcmDZX5a_6Ay9eGLa3laCsdLeYCsnqpc9PikQSQNqEesYiKELE6oyD6b6IYGPZhRtxzcRPwrE_3Yh2eJI6DWYnPKHGgcLvYaYxROJi2zaud8p">GoDaddy’s latest rebranding is a break from its sexist past</a></p><p> </p><p><strong>Billy Big Balls of the Week (28:36)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-59400762">Huge fines and a ban on default passwords in new UK law</a></p><p>The government has introduced new legislation to protect smart devices in people's homes from being hacked.</p><p>Recent research from consumer watchdog Which? suggested homes filled with smart devices could be exposed to more than 12,000 attacks in a single week.</p><p>Default passwords for internet-connected devices will be banned, and firms which do not comply will face huge fines.</p><p> </p><p><strong>Industry News (34:36)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sky-router-flaw-slow-fix/">Sky Slow to Fix Bug in Routers</a></p><p><a href="https://www.infosecurity-magazine.com/news/godaddy-announces-data-breach/">GoDaddy Announces Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-accused-of-stealing-bitcoin/">Teen Accused of Stealing Bitcoin Worth $36.5M</a></p><p><a href="https://www.infosecurity-magazine.com/news/multiple-bugs-eavesdropping-37/">Multiple Bugs Enable Eavesdropping on 37% of Android Phones</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-sues-spyware-firm-nso-group/">Apple Sues “State-Sponsored” Spyware Firm NSO Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-javascript-loader-is-a/">Malicious JavaScript Loader is a Multi-RAT Dispenser</a></p><p><a href="https://www.infosecurity-magazine.com/news/youtube-live-crypto-scams-october/">YouTube Live Crypto Scams Made Nearly $9m in October</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cybersecurity-legislation-iot/">UK Introduces New Cybersecurity Legislation for IoT Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-cops-bust-mobile-device/">Ukrainian Cops Bust Mobile Device Hacking Group</a></p><p> </p><p><strong>Tweet of the Week (43:09)</strong></p><img src="https://lh3.googleusercontent.com/e2r-lxbU7DBtB32jOtuGNdx9DzkHvyFdwNz9UkQW9DloossDrxoMW5M8elpzVDy_9dxV_SLy7140RYN5IHCRSG16Hk-xM76rTdUtcz4dKW0YEyHZ5CUNF_wQfhMAU3p2MjOUivMX" /><p><a href="https://twitter.com/sociosploit/status/1462440968658079763">https://twitter.com/sociosploit/status/1462440968658079763</a></p><img src="https://lh4.googleusercontent.com/oFr1tqklKm323VKP7zln0gZLF0UBESNKVzmNZDaIvWfDGuP0YCfF5xaxAfzANf72vt61DhG7VSmPmkSDxCSPIOWJmJyODwcP8kOhoQ-BidC7uI8qlahY-HnbdOaXkfGoLOpHqcZ_" /><p><a href="https://twitter.com/Raspberry_Pi/status/1463803587180511233?s=20">https://twitter.com/Raspberry_Pi/status/1463803587180511233?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Nov 2021 13:59:59 +0000</pubDate>
      <author>thom@tl2security.com (Mikko Hypponen, Javvad Malik, Thom Langford, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-83-the-super-spreader-amateur-hour-mYb87UWI</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (11:00)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>23rd November 2011: It was reported that Apple took over 3 years to fix the iTunes installer vulnerability which the FinFisher remote spying Trojan exploited.</p><p><a href="https://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">Apple Took 3+ Years to Fix FinFisher Trojan Hole</a></p><p><a href="https://twitter.com/todayininfosec/status/1331028461612392448">https://twitter.com/todayininfosec/status/1331028461612392448</a></p><p>20th November 2000: eBay cancelled a listing for Kevin Mitnick's Bureau of Prisons inmate ID card due to uncertainty about his right to sell it. This was after an initial claim it was a prohibition from committing a "violent felony" and profiting from it.</p><p><a href="https://www.theregister.com/2000/11/23/ebay_pulls_kevin_mitnick_trinkets/">eBay pulls Kevin Mitnick trinkets: Taking a firm stand against "violent felons"</a></p><p><a href="https://twitter.com/todayininfosec/status/1329940298399703042">https://twitter.com/todayininfosec/status/1329940298399703042</a></p><p> </p><p><strong>Rant of the Week (18:50)</strong></p><p><a href="https://www.theregister.com/2021/11/22/godaddy_managed_wordpress_ssl_keys/">SSL keys, sFTP passwords and more exposed after someone broke into GoDaddy Managed WordPress using 'compromised password'</a></p><p>GoDaddy has admitted to America's financial watchdog that one or more miscreants broke into its systems and potentially accessed a huge amount of customer data, from email addresses to SSL private keys.</p><p>In a filing on Monday to the SEC, the internet giant said that on November 17 it discovered an "unauthorized third-party" had been roaming around part of its Managed WordPress service, which essentially stores and hosts people's websites.</p><p>GoDaddy’s chief information security officer Demetrius Comes said his company "immediately began an investigation with the help of an IT forensics firm and contacted law enforcement."</p><p>Those infosec sleuths, we're told, found evidence that an intruder had been inside part of GoDaddy's website provisioning system, described by Comes as a "legacy code base," since September 6, gaining access using a "compromised password."</p><p><a href="https://finance.yahoo.com/news/godaddy-latest-rebranding-break-sexist-160927732.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAInPRExaegfYrlDksQzO9s8S9FTlwS18JFj4hi_nfLhc6kqjzLmQ-tzSXGY9tZdGcmDZX5a_6Ay9eGLa3laCsdLeYCsnqpc9PikQSQNqEesYiKELE6oyD6b6IYGPZhRtxzcRPwrE_3Yh2eJI6DWYnPKHGgcLvYaYxROJi2zaud8p">GoDaddy’s latest rebranding is a break from its sexist past</a></p><p> </p><p><strong>Billy Big Balls of the Week (28:36)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-59400762">Huge fines and a ban on default passwords in new UK law</a></p><p>The government has introduced new legislation to protect smart devices in people's homes from being hacked.</p><p>Recent research from consumer watchdog Which? suggested homes filled with smart devices could be exposed to more than 12,000 attacks in a single week.</p><p>Default passwords for internet-connected devices will be banned, and firms which do not comply will face huge fines.</p><p> </p><p><strong>Industry News (34:36)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sky-router-flaw-slow-fix/">Sky Slow to Fix Bug in Routers</a></p><p><a href="https://www.infosecurity-magazine.com/news/godaddy-announces-data-breach/">GoDaddy Announces Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-accused-of-stealing-bitcoin/">Teen Accused of Stealing Bitcoin Worth $36.5M</a></p><p><a href="https://www.infosecurity-magazine.com/news/multiple-bugs-eavesdropping-37/">Multiple Bugs Enable Eavesdropping on 37% of Android Phones</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-sues-spyware-firm-nso-group/">Apple Sues “State-Sponsored” Spyware Firm NSO Group</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-javascript-loader-is-a/">Malicious JavaScript Loader is a Multi-RAT Dispenser</a></p><p><a href="https://www.infosecurity-magazine.com/news/youtube-live-crypto-scams-october/">YouTube Live Crypto Scams Made Nearly $9m in October</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cybersecurity-legislation-iot/">UK Introduces New Cybersecurity Legislation for IoT Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-cops-bust-mobile-device/">Ukrainian Cops Bust Mobile Device Hacking Group</a></p><p> </p><p><strong>Tweet of the Week (43:09)</strong></p><img src="https://lh3.googleusercontent.com/e2r-lxbU7DBtB32jOtuGNdx9DzkHvyFdwNz9UkQW9DloossDrxoMW5M8elpzVDy_9dxV_SLy7140RYN5IHCRSG16Hk-xM76rTdUtcz4dKW0YEyHZ5CUNF_wQfhMAU3p2MjOUivMX" /><p><a href="https://twitter.com/sociosploit/status/1462440968658079763">https://twitter.com/sociosploit/status/1462440968658079763</a></p><img src="https://lh4.googleusercontent.com/oFr1tqklKm323VKP7zln0gZLF0UBESNKVzmNZDaIvWfDGuP0YCfF5xaxAfzANf72vt61DhG7VSmPmkSDxCSPIOWJmJyODwcP8kOhoQ-BidC7uI8qlahY-HnbdOaXkfGoLOpHqcZ_" /><p><a href="https://twitter.com/Raspberry_Pi/status/1463803587180511233?s=20">https://twitter.com/Raspberry_Pi/status/1463803587180511233?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47936899" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6ca201b1-5f65-4a25-97e0-924b32e6073b/audio/6e257652-8a47-4517-9d1b-1c8977a29115/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 83 - The Super Spreader Amateur Hour</itunes:title>
      <itunes:author>Mikko Hypponen, Javvad Malik, Thom Langford, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c2539c2d-56c8-43ad-adea-0ecd23f6dd9b/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:56</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a time a vendor took 3 years to fix a reported vulnerability (is this an old or new story?)
 
Rant of the week is dedicated to password security 101, and how telling Daddy to fix it doesn’t always work

Billy Big Balls is a shift in mindset for the industry, backed up with teeth and endorsed by at least two industry heavy hitters

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reminisces of the times when we would happily raw dog the Internet, and then make useless things do useful tasks</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a time a vendor took 3 years to fix a reported vulnerability (is this an old or new story?)
 
Rant of the week is dedicated to password security 101, and how telling Daddy to fix it doesn’t always work

Billy Big Balls is a shift in mindset for the industry, backed up with teeth and endorsed by at least two industry heavy hitters

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week reminisces of the times when we would happily raw dog the Internet, and then make useless things do useful tasks</itunes:subtitle>
      <itunes:keywords>threat vectors, test &amp; trace, host unknown, rant events, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">82cdc97b-e45d-4083-817e-b1fdb3eaec8d</guid>
      <title>Episode 82 - The Irishman</title>
      <description><![CDATA[<p>IRISSCON - https://www.iriss.ie/</p><p> </p><p><strong>This week in Infosec (12:19)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initiating the hoax. </p><p><a href="https://en.wikipedia.org/wiki/Goodtimes_virus">Good Times Virus Hoax</a></p><p><a href="https://twitter.com/todayininfosec/status/1195353643857391623">https://twitter.com/todayininfosec/status/1195353643857391623</a></p><p>12th November 2012: John McAfee went into hiding because his neighbor Gregory Faull was found dead from a gunshot the day before. Belize police wanted McAfee to come in for questioning, but McAfee stated the police were “out to get him”. </p><p><a href="https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder">John McAfee hiding from police after businessman's murder in Belize</a></p><p><a href="https://twitter.com/todayininfosec/status/1326993312247656451">https://twitter.com/todayininfosec/status/1326993312247656451</a></p><p> </p><p>The Box © Charlie Langford</p><p> </p><p><strong>Rant of the Week (18:52)</strong></p><p><a href="https://www.theregister.com/2021/11/17/amazon_visa_drop/">Amazon tells folks it will stop accepting UK Visa credit cards via weird empty email</a></p><p>How will you be able to buy things you can't afford now?</p><p>Amazon has confirmed it will no longer accept payment via Visa credit cards issued in the United Kingdom after several Reg readers wrote in complaining of a cryptic message they'd been sent this morning.</p><p>The online sales giant has indicated the move was "due to the high fees Visa charges for processing credit card transactions."</p><p> </p><p><strong>Billy Big Balls of the Week (26:22)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-memento-ransomware-switches-to-winrar-after-failing-at-encryption/">New Memento ransomware switches to WinRar after failing at encryption</a></p><p>(The embodiment of: Improvise, adapt, overcome)</p><p>A new ransomware group called Memento takes the unusual approach of locking files inside password-protected archives after their encryption method kept being detected by security software.</p><p> </p><p><strong>Industry News (33:15)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-fixes-misconfigured-server/">FBI Fixes Misconfigured Server After Hoax Email Alert</a></p><p><a href="https://www.infosecurity-magazine.com/news/cryptojackers-disable-alibaba/">Cryptojackers Disable Alibaba Cloud Security Agent</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-telecom-appeals-against-us/">China Telecom Appeals Against US Ban</a></p><p><a href="https://www.infosecurity-magazine.com/news/emotet-is-rebuilding-its-botnet/">Emotet is Rebuilding its Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/ghostwriter-disinformation/">Ghostwriter Disinformation Operation Linked to Belarus</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-to-sell-56m-in-seized/">US to Sell $56m in Seized Crypto-Currency</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gangs-lease-zero-day/">Threat Actors Discuss Leasing Zero-Day Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinas-apt41-manages-library/">China's APT41 Manages Library of Breached Certificates</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-cybercrime-forums-open/">Russian Cybercrime Forums Open Doors to Chinese-Speakers</a></p><p> </p><p><strong>Tweet of the Week (39:15)</strong></p><img src="https://lh5.googleusercontent.com/IKYFsZNGacPqIiDsw_0-nWWjGIFgftCR2kvI95fGUt4QfbrINZqviKz6WTW-cf_YUeg4FIw0cUx3uC4e-uOwWeEA2eM8xFpIS2Rz5x62nDsFhupto21tneDaXrSJfimj4GCTR_z4" /><p><a href="https://twitter.com/benawad/status/1460738174783791105">https://twitter.com/benawad/status/1460738174783791105</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 Nov 2021 12:44:56 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnēs, Javvad Malik, Brian Honan)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-82-the-irishman-x9d_w7To</link>
      <content:encoded><![CDATA[<p>IRISSCON - https://www.iriss.ie/</p><p> </p><p><strong>This week in Infosec (12:19)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>15th November 1994: The earliest known example of the Good Times email hoax virus was posted to the TECH-LAW mailing list. Variants of the hoax spread for several years. In 1997, Cult of the Dead Cow (cDc) claimed responsibility for initiating the hoax. </p><p><a href="https://en.wikipedia.org/wiki/Goodtimes_virus">Good Times Virus Hoax</a></p><p><a href="https://twitter.com/todayininfosec/status/1195353643857391623">https://twitter.com/todayininfosec/status/1195353643857391623</a></p><p>12th November 2012: John McAfee went into hiding because his neighbor Gregory Faull was found dead from a gunshot the day before. Belize police wanted McAfee to come in for questioning, but McAfee stated the police were “out to get him”. </p><p><a href="https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder">John McAfee hiding from police after businessman's murder in Belize</a></p><p><a href="https://twitter.com/todayininfosec/status/1326993312247656451">https://twitter.com/todayininfosec/status/1326993312247656451</a></p><p> </p><p>The Box © Charlie Langford</p><p> </p><p><strong>Rant of the Week (18:52)</strong></p><p><a href="https://www.theregister.com/2021/11/17/amazon_visa_drop/">Amazon tells folks it will stop accepting UK Visa credit cards via weird empty email</a></p><p>How will you be able to buy things you can't afford now?</p><p>Amazon has confirmed it will no longer accept payment via Visa credit cards issued in the United Kingdom after several Reg readers wrote in complaining of a cryptic message they'd been sent this morning.</p><p>The online sales giant has indicated the move was "due to the high fees Visa charges for processing credit card transactions."</p><p> </p><p><strong>Billy Big Balls of the Week (26:22)</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-memento-ransomware-switches-to-winrar-after-failing-at-encryption/">New Memento ransomware switches to WinRar after failing at encryption</a></p><p>(The embodiment of: Improvise, adapt, overcome)</p><p>A new ransomware group called Memento takes the unusual approach of locking files inside password-protected archives after their encryption method kept being detected by security software.</p><p> </p><p><strong>Industry News (33:15)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-fixes-misconfigured-server/">FBI Fixes Misconfigured Server After Hoax Email Alert</a></p><p><a href="https://www.infosecurity-magazine.com/news/cryptojackers-disable-alibaba/">Cryptojackers Disable Alibaba Cloud Security Agent</a></p><p><a href="https://www.infosecurity-magazine.com/news/china-telecom-appeals-against-us/">China Telecom Appeals Against US Ban</a></p><p><a href="https://www.infosecurity-magazine.com/news/emotet-is-rebuilding-its-botnet/">Emotet is Rebuilding its Botnet</a></p><p><a href="https://www.infosecurity-magazine.com/news/ghostwriter-disinformation/">Ghostwriter Disinformation Operation Linked to Belarus</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-to-sell-56m-in-seized/">US to Sell $56m in Seized Crypto-Currency</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gangs-lease-zero-day/">Threat Actors Discuss Leasing Zero-Day Exploits</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinas-apt41-manages-library/">China's APT41 Manages Library of Breached Certificates</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-cybercrime-forums-open/">Russian Cybercrime Forums Open Doors to Chinese-Speakers</a></p><p> </p><p><strong>Tweet of the Week (39:15)</strong></p><img src="https://lh5.googleusercontent.com/IKYFsZNGacPqIiDsw_0-nWWjGIFgftCR2kvI95fGUt4QfbrINZqviKz6WTW-cf_YUeg4FIw0cUx3uC4e-uOwWeEA2eM8xFpIS2Rz5x62nDsFhupto21tneDaXrSJfimj4GCTR_z4" /><p><a href="https://twitter.com/benawad/status/1460738174783791105">https://twitter.com/benawad/status/1460738174783791105</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42872488" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/48490b20-ceb9-4a1c-8eba-ed4534e8e849/audio/4729c0a5-13f6-4fea-ba94-0f67c9824c60/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 82 - The Irishman</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnēs, Javvad Malik, Brian Honan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/1c8b9e05-28ac-4fec-b9f8-fa1af93d629d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:39</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the good times (as always).
 
Rant of the week is a story about a greedy giant annoyed with another greedy giant for being greedy.

Billy Big Balls is the very embodiment of the saying: Improvise. Adapt. Overcome.

Industry News brings us the latest and greatest security news stories from around the world.

And...

Tweet of the Week confirms that the geek shall inherit the earth.</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the good times (as always).
 
Rant of the week is a story about a greedy giant annoyed with another greedy giant for being greedy.

Billy Big Balls is the very embodiment of the saying: Improvise. Adapt. Overcome.

Industry News brings us the latest and greatest security news stories from around the world.

And...

Tweet of the Week confirms that the geek shall inherit the earth.</itunes:subtitle>
      <itunes:keywords>bsides london, super spreader, podcast, bsides, host unknown, irisscon, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bc664393-53e5-4d7b-bfc8-d209cfe13317</guid>
      <title>Episode 81 - Thom AI ver 2</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>10th November 1983: At a security seminar, Len Adleman used "virus" in connection with self-replicating computer programs. Afterwards, use of the term took off. But it wasn't the first use of "virus" in this way - the 1973 movie "Westworld" used it to describe malfunctions spreading in robots.</p><p><a href="https://twitter.com/todayininfosec/status/1193706921733189632">https://twitter.com/todayininfosec/status/1193706921733189632</a></p><p> </p><p><strong>Rant of the Week (14:24)</strong></p><p><a href="https://www.zdnet.com/article/eu-pharmaceutical-giants-run-old-vulnerable-apps-and-fail-to-use-encryption-in-login-forms/">EU pharmaceutical giants run old, vulnerable apps and fail to use encryption in login forms</a></p><p>According to the report, Outpost24's "2021 Web Application Security for Healthcare," EU pharmaceutical businesses often run large numbers of web applications and 3.3% of those scanned by the firm are deemed "suspicious," including open test environments that should have been closed. </p><p>In addition, 18% of organizations analyzed are using outdated, unpatched web components that contain known vulnerabilities. US healthcare organizations have roughly the same amount of suspicious apps in operation but tend to run far fewer apps on the whole -- however, 23.74% of them are outdated.</p><p>Over 200 EU pharmaceutical application forms noted in the report are operating without encryption, which puts users at risk of both the interception and theft of their information online. </p><p>Outpost24 said that basic SSL failures, privacy policy misconfigurations, and cookie settings also feature as common security and compliance problems. </p><p>The damage a cyberattack can cause a healthcare or pharmaceutical company can be severe. The COVID-19 pandemic put a target on the back of many of these organizations, with an Oxford University lab with COVID-19 research links and the UK Research and Innovation organization being only two examples of recent victims of incidents leading to data theft and disruption. </p><p> </p><p><strong>Billy Big Balls of the Week (21:18)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-59156683">Hack leaves fertility clinic medical data at risk</a></p><p>The Lister Fertility Clinic said the firm, which it used for scanning medical records, had been "hacked" by a"cyber-gang", in a letter sent to about 1,700 patients.</p><p> </p><p><strong>Industry News  (27:32)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-unmasks-armageddon-group/">Ukraine Unmasks Armageddon Group as FSB Officers</a></p><p><a href="https://www.infosecurity-magazine.com/news/facial-recognition-could-ordered/">Facial Recognition Firm Could Be Ordered to "Close" in UK, Warn Experts</a></p><p><a href="https://www.infosecurity-magazine.com/news/one-three-workers-monitored/">One in Three Workers Monitored by Their Employers</a></p><p><a href="https://www.infosecurity-magazine.com/news/robinhood-data-breach-seven-million/">Robinhood Data Breach Hits Seven Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-charge-suspects-kaseya/">US to Charge Suspects Over Kaseya Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/class-action-against-google/">Class Action Against Google Blocked</a></p><p><a href="https://www.infosecurity-magazine.com/news/anglers-redirected-to-pornhub/">Anglers Redirected to Pornhub</a></p><p><a href="https://www.infosecurity-magazine.com/news/scam-pacs-stole-35m-trump-voters/">Scam PACs Allegedly Stole $3.5m from Trump Voters</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-uncover-hacker-group/">Researchers Uncover Prolific Hacker-for-Hire Group</a></p><p> </p><p><strong>Tweet of the Week (35:44)</strong></p><img src="https://lh6.googleusercontent.com/DB43phXJyduo8r2zyMTdKh70_uyAJgl0B6JcrpIIbY5Sn-W4u60Pk_TNyjA1fQrA_T7Ty96SQ2MLLdLHUJ2xSHF3ZNlDquF6Zf3WfWVLHvTa_SzIHDWQ23EoOSvyuY-bYHQJfp3k" /><p><a href="https://twitter.com/bcmerchant/status/1457849195738451975">https://twitter.com/bcmerchant/status/1457849195738451975</a></p><img src="https://lh3.googleusercontent.com/ZPPCJs3AngildGurKBj1E8q041Mb6KU4ARrTrrGgChxy_pSymoxWR2KfdRH_FV3C2S9TDjXyfUzrL-tSwlZE2AqEOVqOtSbAdhparxPxlzx9XMmJJmWheIQJKmEc8tZf9jZvzyEz" /><p><a href="https://twitter.com/sherrod_im/status/1458460638561382401">https://twitter.com/sherrod_im/status/1458460638561382401</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Nov 2021 12:48:50 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-81-thom-ai-ver-2-BiUvUiHp</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (09:55)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>10th November 1983: At a security seminar, Len Adleman used "virus" in connection with self-replicating computer programs. Afterwards, use of the term took off. But it wasn't the first use of "virus" in this way - the 1973 movie "Westworld" used it to describe malfunctions spreading in robots.</p><p><a href="https://twitter.com/todayininfosec/status/1193706921733189632">https://twitter.com/todayininfosec/status/1193706921733189632</a></p><p> </p><p><strong>Rant of the Week (14:24)</strong></p><p><a href="https://www.zdnet.com/article/eu-pharmaceutical-giants-run-old-vulnerable-apps-and-fail-to-use-encryption-in-login-forms/">EU pharmaceutical giants run old, vulnerable apps and fail to use encryption in login forms</a></p><p>According to the report, Outpost24's "2021 Web Application Security for Healthcare," EU pharmaceutical businesses often run large numbers of web applications and 3.3% of those scanned by the firm are deemed "suspicious," including open test environments that should have been closed. </p><p>In addition, 18% of organizations analyzed are using outdated, unpatched web components that contain known vulnerabilities. US healthcare organizations have roughly the same amount of suspicious apps in operation but tend to run far fewer apps on the whole -- however, 23.74% of them are outdated.</p><p>Over 200 EU pharmaceutical application forms noted in the report are operating without encryption, which puts users at risk of both the interception and theft of their information online. </p><p>Outpost24 said that basic SSL failures, privacy policy misconfigurations, and cookie settings also feature as common security and compliance problems. </p><p>The damage a cyberattack can cause a healthcare or pharmaceutical company can be severe. The COVID-19 pandemic put a target on the back of many of these organizations, with an Oxford University lab with COVID-19 research links and the UK Research and Innovation organization being only two examples of recent victims of incidents leading to data theft and disruption. </p><p> </p><p><strong>Billy Big Balls of the Week (21:18)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-59156683">Hack leaves fertility clinic medical data at risk</a></p><p>The Lister Fertility Clinic said the firm, which it used for scanning medical records, had been "hacked" by a"cyber-gang", in a letter sent to about 1,700 patients.</p><p> </p><p><strong>Industry News  (27:32)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ukraine-unmasks-armageddon-group/">Ukraine Unmasks Armageddon Group as FSB Officers</a></p><p><a href="https://www.infosecurity-magazine.com/news/facial-recognition-could-ordered/">Facial Recognition Firm Could Be Ordered to "Close" in UK, Warn Experts</a></p><p><a href="https://www.infosecurity-magazine.com/news/one-three-workers-monitored/">One in Three Workers Monitored by Their Employers</a></p><p><a href="https://www.infosecurity-magazine.com/news/robinhood-data-breach-seven-million/">Robinhood Data Breach Hits Seven Million Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-charge-suspects-kaseya/">US to Charge Suspects Over Kaseya Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/class-action-against-google/">Class Action Against Google Blocked</a></p><p><a href="https://www.infosecurity-magazine.com/news/anglers-redirected-to-pornhub/">Anglers Redirected to Pornhub</a></p><p><a href="https://www.infosecurity-magazine.com/news/scam-pacs-stole-35m-trump-voters/">Scam PACs Allegedly Stole $3.5m from Trump Voters</a></p><p><a href="https://www.infosecurity-magazine.com/news/researchers-uncover-hacker-group/">Researchers Uncover Prolific Hacker-for-Hire Group</a></p><p> </p><p><strong>Tweet of the Week (35:44)</strong></p><img src="https://lh6.googleusercontent.com/DB43phXJyduo8r2zyMTdKh70_uyAJgl0B6JcrpIIbY5Sn-W4u60Pk_TNyjA1fQrA_T7Ty96SQ2MLLdLHUJ2xSHF3ZNlDquF6Zf3WfWVLHvTa_SzIHDWQ23EoOSvyuY-bYHQJfp3k" /><p><a href="https://twitter.com/bcmerchant/status/1457849195738451975">https://twitter.com/bcmerchant/status/1457849195738451975</a></p><img src="https://lh3.googleusercontent.com/ZPPCJs3AngildGurKBj1E8q041Mb6KU4ARrTrrGgChxy_pSymoxWR2KfdRH_FV3C2S9TDjXyfUzrL-tSwlZE2AqEOVqOtSbAdhparxPxlzx9XMmJJmWheIQJKmEc8tZf9jZvzyEz" /><p><a href="https://twitter.com/sherrod_im/status/1458460638561382401">https://twitter.com/sherrod_im/status/1458460638561382401</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="39472390" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ebd4a2b1-8e83-4603-8842-899b096b616e/audio/8c43e245-d19b-463f-af36-f539c20cb7bc/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 81 - Thom AI ver 2</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/d852a473-7bc1-4740-881a-5d36efea406d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:07</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to when having a virus meant something
 
Rant of the week proves that size doesn’t matter

Billy Big Balls  delivers on its promise

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is from the Infosec branding department where your security may go up as well down</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to when having a virus meant something
 
Rant of the week proves that size doesn’t matter

Billy Big Balls  delivers on its promise

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is from the Infosec branding department where your security may go up as well down</itunes:subtitle>
      <itunes:keywords>thom ver2, ransomware, hack, ai, bad security, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d0abb375-deb3-419a-98b5-9d6ccc9db67e</guid>
      <title>Episode 80 - The Thom Langford A.I.</title>
      <description><![CDATA[<p>This week in infosec</p><p>With content liberated from the “today in infosec” twitter account</p><p>Honourable mention for the Morris Worm</p><ol><li>3rd November 2000: A Dutch hacker gained access to Microsoft's network by exploiting a vulnerability Microsoft issued a patch for 10 weeks earlier. </li></ol><p><a href="https://www.wired.com/2000/11/the-patch-ms-forgot-to-apply/">The Patch MS Forgot to Apply</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a></p><ol><li>25th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</li></ol><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">Adobe breach THIRTEEN times worse than thought, 38 million users affected</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a>  </p><p>Rant of the week</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-fixes-hard-coded-credentials-and-default-ssh-key-issues">Cisco fixes hard-coded credentials and default SSH key issues</a></p><p>Billy big balls </p><p><a href="https://www.wired.com/story/sweden-stockholm-school-app-open-source/">These Parents Built a School App. Then the City Called the Cops</a></p><p>Stockholm’s official app was a disaster. So annoyed parents built their own open source version—ignoring warnings that it might be illegal.</p><p>[INDUSTRY NEWS]</p><p><a href="https://www.infosecurity-magazine.com/news/cops-receive-stalkerware-training/">Cops Receive Stalkerware Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-leak-celebs-data-ransom/">Conti Group Leak Celebs' Data After Ransom Attack on Jeweller</a></p><p><a href="https://www.infosecurity-magazine.com/news/venmo-to-reimburse-hacking-victims/">Venmo to Reimburse Hacking Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackmatter-speeds-data-theft-tool/">BlackMatter Group Speeds Up Data Theft with New Tool</a></p><p> <a href="https://www.infosecurity-magazine.com/news/student-loans-company-dismissals/">Student Loans Company Dismissals Highlight Insider Risk</a></p><p> <a href="https://www.infosecurity-magazine.com/news/nso-group-blacklisted-us-trade/">NSO Group Blacklisted by US for Trade in Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-incident-impacts-uk-labour/">Cyber-Incident Impacts UK Labour Party</a></p><p><a href="https://www.infosecurity-magazine.com/news/sectorca-jeff-moss-defines-the/">#SecTorCa: Jeff Moss Defines the Role of Hacking</a> </p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-claims-groove/">Threat Actor Claims 'Groove' Ransomware Gang Was Hoax</a></p><p>Tweet of the week</p><p><a href="https://twitter.com/summer__heidi/status/1456099556622364672">https://twitter.com/summer__heidi/status/1456099556622364672 </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 Nov 2021 15:12:38 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-80-the-thom-langford-ai-xgFx6RFI</link>
      <content:encoded><![CDATA[<p>This week in infosec</p><p>With content liberated from the “today in infosec” twitter account</p><p>Honourable mention for the Morris Worm</p><ol><li>3rd November 2000: A Dutch hacker gained access to Microsoft's network by exploiting a vulnerability Microsoft issued a patch for 10 weeks earlier. </li></ol><p><a href="https://www.wired.com/2000/11/the-patch-ms-forgot-to-apply/">The Patch MS Forgot to Apply</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a></p><ol><li>25th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</li></ol><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">Adobe breach THIRTEEN times worse than thought, 38 million users affected</a></p><p><a href="https://twitter.com/todayininfosec/status/1323807889425895424">https://twitter.com/todayininfosec/status/1323807889425895424</a>  </p><p>Rant of the week</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-fixes-hard-coded-credentials-and-default-ssh-key-issues">Cisco fixes hard-coded credentials and default SSH key issues</a></p><p>Billy big balls </p><p><a href="https://www.wired.com/story/sweden-stockholm-school-app-open-source/">These Parents Built a School App. Then the City Called the Cops</a></p><p>Stockholm’s official app was a disaster. So annoyed parents built their own open source version—ignoring warnings that it might be illegal.</p><p>[INDUSTRY NEWS]</p><p><a href="https://www.infosecurity-magazine.com/news/cops-receive-stalkerware-training/">Cops Receive Stalkerware Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/conti-leak-celebs-data-ransom/">Conti Group Leak Celebs' Data After Ransom Attack on Jeweller</a></p><p><a href="https://www.infosecurity-magazine.com/news/venmo-to-reimburse-hacking-victims/">Venmo to Reimburse Hacking Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackmatter-speeds-data-theft-tool/">BlackMatter Group Speeds Up Data Theft with New Tool</a></p><p> <a href="https://www.infosecurity-magazine.com/news/student-loans-company-dismissals/">Student Loans Company Dismissals Highlight Insider Risk</a></p><p> <a href="https://www.infosecurity-magazine.com/news/nso-group-blacklisted-us-trade/">NSO Group Blacklisted by US for Trade in Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-incident-impacts-uk-labour/">Cyber-Incident Impacts UK Labour Party</a></p><p><a href="https://www.infosecurity-magazine.com/news/sectorca-jeff-moss-defines-the/">#SecTorCa: Jeff Moss Defines the Role of Hacking</a> </p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-claims-groove/">Threat Actor Claims 'Groove' Ransomware Gang Was Hoax</a></p><p>Tweet of the week</p><p><a href="https://twitter.com/summer__heidi/status/1456099556622364672">https://twitter.com/summer__heidi/status/1456099556622364672 </a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="35204787" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/aa41d428-6bc3-4182-890c-35b1ff3207ea/audio/b78b7f59-8e01-415e-8795-997991bc9508/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 80 - The Thom Langford A.I.</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:36:40</itunes:duration>
      <itunes:summary>This week in Infosec is the common story of big corp telling people to do as they say, not as they do
Rant of the week is about hardcoded credentials 
Billy Big Balls admires the handiwork of fed up parents
Industry News brings us the latest and greatest security news stories from around the world
Tweet of the Week is a disheartening reminder that this industry is not for everyone</itunes:summary>
      <itunes:subtitle>This week in Infosec is the common story of big corp telling people to do as they say, not as they do
Rant of the week is about hardcoded credentials 
Billy Big Balls admires the handiwork of fed up parents
Industry News brings us the latest and greatest security news stories from around the world
Tweet of the Week is a disheartening reminder that this industry is not for everyone</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8119fd96-90b4-4bb7-94e8-6338b5bb6f50</guid>
      <title>Episode 79 - Is it a bird a plane or JavMan?</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:13)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>29th October 1969: The first message sent over the ARPANET was from Leonard Kleinrock’s UCLA computer, sent by student programmer Charley Kline at 10:30 PM to the second node at Stanford Research Institute’s computer in Menlo Park, California.</p><p>The message was simply "Lo." But not on purpose.</p><p><a href="https://www.historyofinformation.com/detail.php?id=882">Charley Kline Sends the First Message Over the ARPANET from Leonard Kleinrock's Computer</a></p><p><a href="https://twitter.com/todayininfosec/status/1321861878985953282">https://twitter.com/todayininfosec/status/1321861878985953282</a></p><p>25th October 2008: A 43-year-old woman in Japan was arrested after she hacked into the computer of the man she'd married in the online game MapleStory and erased his carefully constructed digital character after their relationship curdled.</p><p><a href="https://www.irishtimes.com/news/woman-faces-jail-for-hacking-her-virtual-husband-to-death-1.900708">Woman faces jail for hacking her virtual husband to death</a></p><p><a href="https://twitter.com/todayininfosec/status/1320513559500128257">https://twitter.com/todayininfosec/status/1320513559500128257</a></p><p> </p><p><strong>Rant of the Week (18:18)</strong></p><p><a href="https://www.forbes.com/sites/zakdoffman/2021/10/23/apple-iphone-users-delete-facebook-app-after-new-tracking-warning/">Why You Should Delete Your Facebook App</a></p><p>A stark new warning for almost all iPhone users, as Facebook is suddenly caught “secretly” harvesting sensitive data without anyone realizing. And worse, there’s no way to stop this especially invasive tracking other than by deleting the app.</p><p> </p><p><strong>Billy Big Balls of the Week (27:15)</strong></p><p><a href="https://www.theregister.com/2021/10/27/uk_teen_google_ad_48_bitcoin_scam_website/">Teen bought Google ad for his scam website and made 48 Bitcoins duping UK online shoppers</a></p><p>The schoolboy set up a website impersonating gift voucher site Love2Shop. Having done that he then bought Google ads which resulted in his fake site appearing above the real one in search results.</p><p> </p><p><strong>Industry News (34:03) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/agents-revil-backups-force-group/">Government Agents Compromise REvil Backups to Force Group Offline</a></p><p><a href="https://www.infosecurity-magazine.com/news/halloween-horrorshow-candymaker/">Halloween Horror-Show for Candy-Maker Hit by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cybersecurity-world-record-set/">New Cybersecurity World Record Set</a></p><p><a href="https://www.infosecurity-magazine.com/news/tesco-app-website-back-online/">Tesco App and Website Back Online After Cyber Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackmatter-bug-saved-victims/">BlackMatter Bug Saved Victims Millions in Ransom Payments</a></p><p><a href="https://www.infosecurity-magazine.com/news/study-coordinator-falsified/">Study Coordinator Falsified Clinical Trial Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/eccouncil-offers-free/">EC-Council Offers Free Cybersecurity Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcoms-scam-callblocking-plan/">Ofcom's Scam Call-Blocking Plan Could Save Consumers Millions</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-lazarus-software/">North Korean Lazarus APT Targets Software Supply Chain</a></p><p> </p><p><strong>Tweet of the week (41:28)</strong></p><img src="https://lh4.googleusercontent.com/iD47Bqr946fFphTT6AlSHWfIggxtLNPYGTd40Y2TTzT5p9IFLFvJ06YPrCqo_ZSm-Qn0ig1QegWXuG5p2wgy0aqnNT8mNsNEn1DPoxhvlDce7n2tKSKdREW_dn_dQJMQLjH9fbDi" /><p><a href="https://twitter.com/coriplusplus/status/1453483418944159748">https://twitter.com/coriplusplus/status/1453483418944159748</a></p><img src="https://lh4.googleusercontent.com/ShTXPBmLRAUGyb60VxZAkQYUodU6aYjg_Xe-zu8YLdKn3LuWjLPWksGHMweXkcHOmUJeB9yb1vAp-qxzM4ULdYEGf50WK23CJdgGiuTBhZRoscRWvk3cgHcojhFKmkwiGOJH_F5y" /><p><a href="https://twitter.com/MegabitMeghan/status/1453398057312215042">https://twitter.com/MegabitMeghan/status/1453398057312215042</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 Oct 2021 15:07:09 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-79-is-it-a-bird-a-plane-or-javman-KMMO84U5</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:13)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>29th October 1969: The first message sent over the ARPANET was from Leonard Kleinrock’s UCLA computer, sent by student programmer Charley Kline at 10:30 PM to the second node at Stanford Research Institute’s computer in Menlo Park, California.</p><p>The message was simply "Lo." But not on purpose.</p><p><a href="https://www.historyofinformation.com/detail.php?id=882">Charley Kline Sends the First Message Over the ARPANET from Leonard Kleinrock's Computer</a></p><p><a href="https://twitter.com/todayininfosec/status/1321861878985953282">https://twitter.com/todayininfosec/status/1321861878985953282</a></p><p>25th October 2008: A 43-year-old woman in Japan was arrested after she hacked into the computer of the man she'd married in the online game MapleStory and erased his carefully constructed digital character after their relationship curdled.</p><p><a href="https://www.irishtimes.com/news/woman-faces-jail-for-hacking-her-virtual-husband-to-death-1.900708">Woman faces jail for hacking her virtual husband to death</a></p><p><a href="https://twitter.com/todayininfosec/status/1320513559500128257">https://twitter.com/todayininfosec/status/1320513559500128257</a></p><p> </p><p><strong>Rant of the Week (18:18)</strong></p><p><a href="https://www.forbes.com/sites/zakdoffman/2021/10/23/apple-iphone-users-delete-facebook-app-after-new-tracking-warning/">Why You Should Delete Your Facebook App</a></p><p>A stark new warning for almost all iPhone users, as Facebook is suddenly caught “secretly” harvesting sensitive data without anyone realizing. And worse, there’s no way to stop this especially invasive tracking other than by deleting the app.</p><p> </p><p><strong>Billy Big Balls of the Week (27:15)</strong></p><p><a href="https://www.theregister.com/2021/10/27/uk_teen_google_ad_48_bitcoin_scam_website/">Teen bought Google ad for his scam website and made 48 Bitcoins duping UK online shoppers</a></p><p>The schoolboy set up a website impersonating gift voucher site Love2Shop. Having done that he then bought Google ads which resulted in his fake site appearing above the real one in search results.</p><p> </p><p><strong>Industry News (34:03) </strong></p><p><a href="https://www.infosecurity-magazine.com/news/agents-revil-backups-force-group/">Government Agents Compromise REvil Backups to Force Group Offline</a></p><p><a href="https://www.infosecurity-magazine.com/news/halloween-horrorshow-candymaker/">Halloween Horror-Show for Candy-Maker Hit by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-cybersecurity-world-record-set/">New Cybersecurity World Record Set</a></p><p><a href="https://www.infosecurity-magazine.com/news/tesco-app-website-back-online/">Tesco App and Website Back Online After Cyber Incident</a></p><p><a href="https://www.infosecurity-magazine.com/news/blackmatter-bug-saved-victims/">BlackMatter Bug Saved Victims Millions in Ransom Payments</a></p><p><a href="https://www.infosecurity-magazine.com/news/study-coordinator-falsified/">Study Coordinator Falsified Clinical Trial Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/eccouncil-offers-free/">EC-Council Offers Free Cybersecurity Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/ofcoms-scam-callblocking-plan/">Ofcom's Scam Call-Blocking Plan Could Save Consumers Millions</a></p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-lazarus-software/">North Korean Lazarus APT Targets Software Supply Chain</a></p><p> </p><p><strong>Tweet of the week (41:28)</strong></p><img src="https://lh4.googleusercontent.com/iD47Bqr946fFphTT6AlSHWfIggxtLNPYGTd40Y2TTzT5p9IFLFvJ06YPrCqo_ZSm-Qn0ig1QegWXuG5p2wgy0aqnNT8mNsNEn1DPoxhvlDce7n2tKSKdREW_dn_dQJMQLjH9fbDi" /><p><a href="https://twitter.com/coriplusplus/status/1453483418944159748">https://twitter.com/coriplusplus/status/1453483418944159748</a></p><img src="https://lh4.googleusercontent.com/ShTXPBmLRAUGyb60VxZAkQYUodU6aYjg_Xe-zu8YLdKn3LuWjLPWksGHMweXkcHOmUJeB9yb1vAp-qxzM4ULdYEGf50WK23CJdgGiuTBhZRoscRWvk3cgHcojhFKmkwiGOJH_F5y" /><p><a href="https://twitter.com/MegabitMeghan/status/1453398057312215042">https://twitter.com/MegabitMeghan/status/1453398057312215042</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="44893738" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/2b1a703f-23a1-4b13-a655-85d9613893f1/audio/fb84df8b-e93f-4d36-b7c5-de38ac71cff9/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 79 - Is it a bird a plane or JavMan?</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e919cd11-b086-45ac-9335-1ec15800101d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:46</itunes:duration>
      <itunes:summary>This week in Infosec is about the first electronic Hello World, and how the walls between reality and fiction may have a slight impact on personal relationships.
 
Rant of the week is Facebook looking like a data siphoning duck, quacking like a data siphoning duck, and walking like a data siphoning duck

Billy Big Balls admires the entrepreneurial spirit of a teen and his bob a job attitude

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week provides evidence for why IT Support people really hate end users.</itunes:summary>
      <itunes:subtitle>This week in Infosec is about the first electronic Hello World, and how the walls between reality and fiction may have a slight impact on personal relationships.
 
Rant of the week is Facebook looking like a data siphoning duck, quacking like a data siphoning duck, and walking like a data siphoning duck

Billy Big Balls admires the entrepreneurial spirit of a teen and his bob a job attitude

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week provides evidence for why IT Support people really hate end users.</itunes:subtitle>
      <itunes:keywords>facebook are evil, arpanet, delete facebook, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8c9e5938-cff0-4738-99e6-71263c773cc9</guid>
      <title>Episode 78 - A Record Breaking Breaking Episode</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (13:03)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>20th October 1996: Twenty-five years ago today. Happy birthday, Ping of Death. </p><p><a href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a></p><p><a href="https://twitter.com/ajMSFT/status/1450833383597043713?s=20">https://twitter.com/ajMSFT/status/1450833383597043713?s=20</a></p><p>15th October 1985: 50 FBI agents raided more than 20 homes, seizing 25 personal computers (mostly Commodore 64s) after a group of at least 23 teenagers in San Diego County remotely broke into Chase Manhattan Bank computer systems that July and August.</p><p><a href="https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html">CHASE COMPUTER RAIDED BY YOUTHS</a></p><p><a href="https://twitter.com/todayininfosec/status/1184283049204174849">https://twitter.com/todayininfosec/status/1184283049204174849</a></p><p> </p><p><strong>On the Group Chat (20:27) </strong></p><p>From @maxsec friend of the show:</p><img src="https://lh6.googleusercontent.com/6maO_lH45WSsKyAQUTjAx7eJAKEg48dFeW8IhidGwlC7P2W7JDwYBUrSylb9IpnM_usAJHKWu6TJBmM1FcGyzJ3k08-KVt99KRgWRkf0Yna01nJlptAVzPZrOa5v49blVkQdmDcY=s1600" /><p><a href="https://therecord.media/cybercrime-gang-sets-up-fake-company-to-hire-security-experts-to-aid-in-ransomware-attacks/">Cybercrime gang sets up fake company to hire security experts to aid in ransomware attacks</a></p><p><a href="https://twitter.com/campuscodi/status/1451241038908121099">https://twitter.com/campuscodi/status/1451241038908121099</a></p><p> </p><p><strong>Billy Big Balls of the Week  (29:04)</strong></p><img src="https://lh6.googleusercontent.com/4tbnxQrnIGme-r5_UEZt7yIn_3YbMVylUHCWCKz9mRYylBYAnDMQ1-uru_qVsnFEB0EqIy5h8ISi6U2HywHHEP_EspGPF-i0JwCr2Ycu7J3wteVFz8PxPV92GpAmE4egEJuz7inA=s1600" /><p><a href="https://twitter.com/ImposeCost/status/1449738212696641538?s=20">https://twitter.com/ImposeCost/status/1449738212696641538?s=20</a></p><p> </p><p><strong>Industry News (36:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-52bn-ransomware/">US Treasury Tracks $5.2bn of Ransomware Transactions in Six Months</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitch-no-passwords-were-taken-in/">Twitch: No Passwords Were Taken in Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-in-midst-of-200m-crypto-fraud/">UK in Midst of $200m Crypto Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-icloud-hacker-steals-nudes/">Apple iCloud Hacker Steals Nudes</a></p><p><a href="https://www.infosecurity-magazine.com/news/lightbasin-operation-compromises/">LightBasin Operation Compromises 13 Global Telcos in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-up-hardware-supply/">Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-pulls-account-argentinian/">Twitter Pulls Account After Argentinian Mega Breach Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-scrapers-expose-26-million/">Data Scrapers Expose 2.6 Million Instagram and TikTok Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-ban-export-hacking-tools/">US to Ban Export of Hacking Tools to Authoritarian States</a></p><p> </p><p><strong>Tweet of the Week (46:02)</strong></p><img src="https://lh4.googleusercontent.com/8PGi3PRjR9OOin2V-sy0KRulP4USBiroW1hGS4EtggxFmn-uaVgU7tQUzVlcaHplF3oDNn5vO7s7zqudClQmfW7PdilsBcwv-bJF7X39U-GVFe1A60w5yjoWVsY0eBYXRzMmtCvP=s1600" /><p><a href="https://twitter.com/ElJefeDSecurIT/status/1451232980463075332">https://twitter.com/ElJefeDSecurIT/status/1451232980463075332</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 22 Oct 2021 13:27:38 +0000</pubDate>
      <author>thom@tl2security.com (Martin Hepworth, Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-78-a-record-breaking-breaking-episode-x84U8__f</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (13:03)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>20th October 1996: Twenty-five years ago today. Happy birthday, Ping of Death. </p><p><a href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a></p><p><a href="https://twitter.com/ajMSFT/status/1450833383597043713?s=20">https://twitter.com/ajMSFT/status/1450833383597043713?s=20</a></p><p>15th October 1985: 50 FBI agents raided more than 20 homes, seizing 25 personal computers (mostly Commodore 64s) after a group of at least 23 teenagers in San Diego County remotely broke into Chase Manhattan Bank computer systems that July and August.</p><p><a href="https://www.nytimes.com/1985/10/19/business/chase-computer-raided-by-youths-officials.html">CHASE COMPUTER RAIDED BY YOUTHS</a></p><p><a href="https://twitter.com/todayininfosec/status/1184283049204174849">https://twitter.com/todayininfosec/status/1184283049204174849</a></p><p> </p><p><strong>On the Group Chat (20:27) </strong></p><p>From @maxsec friend of the show:</p><img src="https://lh6.googleusercontent.com/6maO_lH45WSsKyAQUTjAx7eJAKEg48dFeW8IhidGwlC7P2W7JDwYBUrSylb9IpnM_usAJHKWu6TJBmM1FcGyzJ3k08-KVt99KRgWRkf0Yna01nJlptAVzPZrOa5v49blVkQdmDcY=s1600" /><p><a href="https://therecord.media/cybercrime-gang-sets-up-fake-company-to-hire-security-experts-to-aid-in-ransomware-attacks/">Cybercrime gang sets up fake company to hire security experts to aid in ransomware attacks</a></p><p><a href="https://twitter.com/campuscodi/status/1451241038908121099">https://twitter.com/campuscodi/status/1451241038908121099</a></p><p> </p><p><strong>Billy Big Balls of the Week  (29:04)</strong></p><img src="https://lh6.googleusercontent.com/4tbnxQrnIGme-r5_UEZt7yIn_3YbMVylUHCWCKz9mRYylBYAnDMQ1-uru_qVsnFEB0EqIy5h8ISi6U2HywHHEP_EspGPF-i0JwCr2Ycu7J3wteVFz8PxPV92GpAmE4egEJuz7inA=s1600" /><p><a href="https://twitter.com/ImposeCost/status/1449738212696641538?s=20">https://twitter.com/ImposeCost/status/1449738212696641538?s=20</a></p><p> </p><p><strong>Industry News (36:50)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-treasury-52bn-ransomware/">US Treasury Tracks $5.2bn of Ransomware Transactions in Six Months</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitch-no-passwords-were-taken-in/">Twitch: No Passwords Were Taken in Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-in-midst-of-200m-crypto-fraud/">UK in Midst of $200m Crypto Fraud Epidemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-icloud-hacker-steals-nudes/">Apple iCloud Hacker Steals Nudes</a></p><p><a href="https://www.infosecurity-magazine.com/news/lightbasin-operation-compromises/">LightBasin Operation Compromises 13 Global Telcos in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-teams-up-hardware-supply/">Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-pulls-account-argentinian/">Twitter Pulls Account After Argentinian Mega Breach Claims</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-scrapers-expose-26-million/">Data Scrapers Expose 2.6 Million Instagram and TikTok Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-ban-export-hacking-tools/">US to Ban Export of Hacking Tools to Authoritarian States</a></p><p> </p><p><strong>Tweet of the Week (46:02)</strong></p><img src="https://lh4.googleusercontent.com/8PGi3PRjR9OOin2V-sy0KRulP4USBiroW1hGS4EtggxFmn-uaVgU7tQUzVlcaHplF3oDNn5vO7s7zqudClQmfW7PdilsBcwv-bJF7X39U-GVFe1A60w5yjoWVsY0eBYXRzMmtCvP=s1600" /><p><a href="https://twitter.com/ElJefeDSecurIT/status/1451232980463075332">https://twitter.com/ElJefeDSecurIT/status/1451232980463075332</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53952586" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7886968b-e816-4781-819f-bef01f512f88/audio/25ec39c8-90d0-47fb-95dc-242bb96f1aae/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 78 - A Record Breaking Breaking Episode</itunes:title>
      <itunes:author>Martin Hepworth, Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/bb708cd1-f5ec-4796-bf76-92041f218762/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:12</itunes:duration>
      <itunes:summary>This week in Infosec reveals a hero’s origin story actually had him starting out as the bad guy

On the Group Chat: makes all of us question precisely who we are employed by

Billy Big Balls is an impressive display of memory usage as a data exfiltration technique.

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is going to be an entry-level position.
</itunes:summary>
      <itunes:subtitle>This week in Infosec reveals a hero’s origin story actually had him starting out as the bad guy

On the Group Chat: makes all of us question precisely who we are employed by

Billy Big Balls is an impressive display of memory usage as a data exfiltration technique.

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is going to be an entry-level position.
</itunes:subtitle>
      <itunes:keywords>ping of death, podcast, myspace, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8ba8db3-385d-440b-bfb5-b27ca4dc75be</guid>
      <title>Episode 77 - An Analogy Wrapped in an Inception Surrounded by Idiots</title>
      <description><![CDATA[<p><strong>This Week in Infosec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>13th October 1999: An episode of the "True Life" documentary series titled "I'm a Hacker" aired on MTV. Afterwards one of the hackers featured on the show, Shamrock, issued a statement revealing that the whole thing was a hoax to dupe MTV. D'oh</p><p><a href="https://www.zdnet.com/article/mtv-made-to-look-ridiculous-by-fake-hacker/">MTV made to look ridiculous by fake hacker</a></p><p><a href="https://youtu.be/o9ckMAqn4gY">True Life 'I'm a Hacker' 1 of 2</a></p><p><a href="https://youtu.be/WqujZxEsqqU">True Life ‘I’m a Hacker’ 2 of 2</a></p><p><a href="https://twitter.com/todayininfosec/status/1316187816540413953">https://twitter.com/todayininfosec/status/1316187816540413953</a>  </p><p>9th October 1999: A year after Staples launched its website, it was compromised.</p><p>Add malicious code? Nope.</p><p>Deface with a political message. No. </p><p>Redirect to a porn site? Nah. </p><p>Then what!? Advertisements were added which led to one of its competitors, Office Depot. </p><p><a href="https://apnews.com/article/5998a45685b94e569c76c1908497d320">Staples Sues Unnamed Hacker</a></p><p><a href="https://twitter.com/todayininfosec/status/1314710023931559937">https://twitter.com/todayininfosec/status/1314710023931559937</a></p><p> </p><p><strong>As Seen on Reddit</strong></p><p>Superlative levels of TechBro shithousery in the technical recruitment zone of San Francisco</p><p><a href="https://www.reddit.com/r/SubredditDrama/comments/q80h7h/tech_bro_invents_a_skip_the_interview_tool_where/?utm_source=share&utm_medium=ios_app&utm_name=iossmf">Tech bro invents a "skip the interview" tool where you can crowdfund your way into getting a job. r/recruitinghell is having none of it.</a></p><p> </p><p><strong> Billy Big Balls of the Week</strong></p><p><a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=43bdf3c27559">Fraudsters Cloned Company Director’s Voice In $35 Million Bank Heist, Police Find</a></p><p>AI voice cloning is used in a huge heist in the U.A.E., according to Dubai investigators, amidst warnings about cybercriminal use of the new technology.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/natwest-pleads-guilty-400m-money/">NatWest Pleads Guilty in £400m Money Laundering Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/brewers-token-gaffe-massive-pii/">Brewer's Token Gaffe Causes Massive PII Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/couple-arrested-over-sale-of/">Couple Arrested Over Sale of Nuclear Secrets  </a><a href="https://www.infosecurity-magazine.com/news/android-user-data-opt-outs/">Android Phones Sharing Significant User Data Without Opt-Outs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-ransomware-immediate-threat/">NCSC CEO: Ransomware the "Most Immediate Threat" Facing UK Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/ghanaian-women-cautioned-nudes/">Ghanaian Women Cautioned Against Sharing Nudes</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-romance-scam-drains-14m/">Crypto Romance Scam Drains $1.4M</a></p><p><a href="https://www.infosecurity-magazine.com/news/financial-regulator-hybrid-working/">Financial Regulator Warns of Hybrid Working Security Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/met-police-loses-electronic-devices/">Met Police Loses 2280 Electronic Devices in Last Two Years</a></p><p> </p><p><strong>As Seen on TikTok</strong></p><p>The Ron Burgandy of British "politics"</p><p><a href="https://www.tiktok.com/@sirnigelfarage/video/6958406458279021830?sender_device=pc&sender_web_id=6972434784387974661&is_from_webapp=v1&is_copy_url=0">Nigel Farage promoting drug dealers</a></p><p> </p><p>The Box © Charlie Langford </p><p>charlie@clmediagroup.com for all of your video and sound production and postproduction needs.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 15 Oct 2021 11:04:15 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-77-an-analogy-wrapped-in-an-inception-surrounded-by-idiots-mgILwgi_</link>
      <content:encoded><![CDATA[<p><strong>This Week in Infosec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>13th October 1999: An episode of the "True Life" documentary series titled "I'm a Hacker" aired on MTV. Afterwards one of the hackers featured on the show, Shamrock, issued a statement revealing that the whole thing was a hoax to dupe MTV. D'oh</p><p><a href="https://www.zdnet.com/article/mtv-made-to-look-ridiculous-by-fake-hacker/">MTV made to look ridiculous by fake hacker</a></p><p><a href="https://youtu.be/o9ckMAqn4gY">True Life 'I'm a Hacker' 1 of 2</a></p><p><a href="https://youtu.be/WqujZxEsqqU">True Life ‘I’m a Hacker’ 2 of 2</a></p><p><a href="https://twitter.com/todayininfosec/status/1316187816540413953">https://twitter.com/todayininfosec/status/1316187816540413953</a>  </p><p>9th October 1999: A year after Staples launched its website, it was compromised.</p><p>Add malicious code? Nope.</p><p>Deface with a political message. No. </p><p>Redirect to a porn site? Nah. </p><p>Then what!? Advertisements were added which led to one of its competitors, Office Depot. </p><p><a href="https://apnews.com/article/5998a45685b94e569c76c1908497d320">Staples Sues Unnamed Hacker</a></p><p><a href="https://twitter.com/todayininfosec/status/1314710023931559937">https://twitter.com/todayininfosec/status/1314710023931559937</a></p><p> </p><p><strong>As Seen on Reddit</strong></p><p>Superlative levels of TechBro shithousery in the technical recruitment zone of San Francisco</p><p><a href="https://www.reddit.com/r/SubredditDrama/comments/q80h7h/tech_bro_invents_a_skip_the_interview_tool_where/?utm_source=share&utm_medium=ios_app&utm_name=iossmf">Tech bro invents a "skip the interview" tool where you can crowdfund your way into getting a job. r/recruitinghell is having none of it.</a></p><p> </p><p><strong> Billy Big Balls of the Week</strong></p><p><a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=43bdf3c27559">Fraudsters Cloned Company Director’s Voice In $35 Million Bank Heist, Police Find</a></p><p>AI voice cloning is used in a huge heist in the U.A.E., according to Dubai investigators, amidst warnings about cybercriminal use of the new technology.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/natwest-pleads-guilty-400m-money/">NatWest Pleads Guilty in £400m Money Laundering Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/brewers-token-gaffe-massive-pii/">Brewer's Token Gaffe Causes Massive PII Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/couple-arrested-over-sale-of/">Couple Arrested Over Sale of Nuclear Secrets  </a><a href="https://www.infosecurity-magazine.com/news/android-user-data-opt-outs/">Android Phones Sharing Significant User Data Without Opt-Outs</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-ransomware-immediate-threat/">NCSC CEO: Ransomware the "Most Immediate Threat" Facing UK Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/ghanaian-women-cautioned-nudes/">Ghanaian Women Cautioned Against Sharing Nudes</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-romance-scam-drains-14m/">Crypto Romance Scam Drains $1.4M</a></p><p><a href="https://www.infosecurity-magazine.com/news/financial-regulator-hybrid-working/">Financial Regulator Warns of Hybrid Working Security Risks</a></p><p><a href="https://www.infosecurity-magazine.com/news/met-police-loses-electronic-devices/">Met Police Loses 2280 Electronic Devices in Last Two Years</a></p><p> </p><p><strong>As Seen on TikTok</strong></p><p>The Ron Burgandy of British "politics"</p><p><a href="https://www.tiktok.com/@sirnigelfarage/video/6958406458279021830?sender_device=pc&sender_web_id=6972434784387974661&is_from_webapp=v1&is_copy_url=0">Nigel Farage promoting drug dealers</a></p><p> </p><p>The Box © Charlie Langford </p><p>charlie@clmediagroup.com for all of your video and sound production and postproduction needs.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49363812" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d981910c-7709-46dc-8b06-9184281f189d/audio/60ad16ea-e138-4152-b8fc-62e836c969ed/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 77 - An Analogy Wrapped in an Inception Surrounded by Idiots</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnēs</itunes:author>
      <itunes:duration>00:51:25</itunes:duration>
      <itunes:summary>This week in Infosec shows us that the entertainment industry does not let the truth get in the way of a good story

Billy Big Balls is something Jav is coming up with

As seen on Reddit: sees Tech Bros creating an app that solves a problem people don’t have

Industry News brings us the latest and greatest security news stories from around the world

And

As seen on Tik Tok is a real-world SQL injection analogy</itunes:summary>
      <itunes:subtitle>This week in Infosec shows us that the entertainment industry does not let the truth get in the way of a good story

Billy Big Balls is something Jav is coming up with

As seen on Reddit: sees Tech Bros creating an app that solves a problem people don’t have

Industry News brings us the latest and greatest security news stories from around the world

And

As seen on Tik Tok is a real-world SQL injection analogy</itunes:subtitle>
      <itunes:keywords>skip the interview, podcast, mtv, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">12b2de68-0684-4709-ba4f-ae8f11ea8cc1</guid>
      <title>Episode 76 - Our Best Episode Ever</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:01)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>8th September 2009: FBI director Robert Mueller disclosed that his wife banned him from banking online after he nearly fell for an email phishing scam.</p><p><a href="https://www.cnet.com/tech/services-and-software/wife-bans-fbi-head-from-online-banking/">Wife bans FBI head from online banking</a></p><p><a href="https://twitter.com/todayininfosec/status/1314002293226905600">https://twitter.com/todayininfosec/status/1314002293226905600</a></p><p>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</p><p><a href="https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html">Equifax Breach Caused by Lone Employee’s Error, Former C.E.O. Says</a></p><p><a href="https://www.cnet.com/tech/services-and-software/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed/">How the Equifax hack happened, and what still needs to be done</a></p><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050">https://twitter.com/todayininfosec/status/1312589059559170050</a></p><p> </p><p><strong>Rant of the Week (16:35)</strong></p><p><a href="https://www.theregister.com/2021/10/01/ikea_spycam_scandal/">IKEA: Cameras were hidden in the ceiling above warehouse toilets for 'health and safety'</a></p><p>IKEA has removed hidden security cameras from its warehouse in Peterborough, England, after an employee spotted one in the ceiling void while using the toilet.</p><p> </p><p><strong>As Seen on TikTok (24:59)</strong></p><p><a href="https://www.theregister.com/2021/10/06/facebook_outage_explained_in_detail/">Facebook rendered spineless by buggy audit code that missed catastrophic network config error</a></p><p>Facebook has admitted buggy auditing code was at the core of Tuesday’s <a href="https://www.theregister.com/2021/10/04/facebook_outage_fixed/">six-hour outage</a> – and revealed a little more about its infrastructure to explain how it vanished from the internet.</p><p>As described by <a href="https://www.tiktok.com/@rey.nbows/video/7015684824534928646?sender_device=pc&sender_web_id=6972434784387974661&is_from_webapp=v1&is_copy_url=0">rey.nbows on TIK TOK</a></p><p> </p><p><strong>Industry News (34:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-whistleblower-to-testify/">Facebook Whistleblower to Testify Before Senate</a></p><p><a href="https://www.infosecurity-magazine.com/news/pandora-spills-secrets-of-super/">Pandora Spills Secrets of Super Rich</a></p><p><a href="https://www.infosecurity-magazine.com/news/deepmind-sued-over-data-sharing/">DeepMind Technologies Sued Over Data Sharing</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-blames-global-outage/">Facebook Blames Global Outage on Configuration Error</a></p><p><a href="https://www.infosecurity-magazine.com/news/text-message-giant-breach/">Text Message Giant Reveals Five-Year Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/squid-game-scenes-cut-over-data/">Squid Game Scenes Cut Over Data Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-revoke-admin-access-byod/">NCSC: Revoke Admin Access for BYOD Users Immediately</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-experts-twitch-breach-as/">Infosec Experts: Twitch Breach “As Bad as it Gets”</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-national-cryptocurrency/">US Creates National Cryptocurrency Enforcement Team</a></p><p> </p><p><strong>Tweet of the Week (42:42)</strong></p><img src="https://lh6.googleusercontent.com/Jg2FHkOnVy1cUCqYYLR0GvBxSLv5mXMlb3L4JyNYGssamY6s89_6DGx2hTI7KWWn3GwLWdhARvxbPmai_1-8vJ8CwJpkYqC9mrzl_t24TmQTMeYeLENaaFvdEVRD46VohG4YkDSe=s0" /><p><a href="https://twitter.com/cybersecstu/status/1446104732578328583">https://twitter.com/cybersecstu/status/1446104732578328583</a></p><img src="https://lh3.googleusercontent.com/nE_S4o4leavKJuJi7j-kXXsryeWIZKkili9RW_mQxIRbRgMP3EAaHJV_bE19Poek83dgy0Bp2zy1g1H_GDIrATV_ZSjonWgYdyQHBv6ftDtN_4njuwWJb-N2LV_8P9e7C8lzzcA9=s0" /><p><a href="https://twitter.com/SmashinSecurity/status/1445520598017314826">https://twitter.com/SmashinSecurity/status/1445520598017314826</a></p><p> </p><p>The Box © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Oct 2021 11:52:43 +0000</pubDate>
      <author>thom@tl2security.com (NOT Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-76-did-we-forget-something-8bS_a5hb</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:01)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>8th September 2009: FBI director Robert Mueller disclosed that his wife banned him from banking online after he nearly fell for an email phishing scam.</p><p><a href="https://www.cnet.com/tech/services-and-software/wife-bans-fbi-head-from-online-banking/">Wife bans FBI head from online banking</a></p><p><a href="https://twitter.com/todayininfosec/status/1314002293226905600">https://twitter.com/todayininfosec/status/1314002293226905600</a></p><p>3rd October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</p><p><a href="https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html">Equifax Breach Caused by Lone Employee’s Error, Former C.E.O. Says</a></p><p><a href="https://www.cnet.com/tech/services-and-software/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed/">How the Equifax hack happened, and what still needs to be done</a></p><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050">https://twitter.com/todayininfosec/status/1312589059559170050</a></p><p> </p><p><strong>Rant of the Week (16:35)</strong></p><p><a href="https://www.theregister.com/2021/10/01/ikea_spycam_scandal/">IKEA: Cameras were hidden in the ceiling above warehouse toilets for 'health and safety'</a></p><p>IKEA has removed hidden security cameras from its warehouse in Peterborough, England, after an employee spotted one in the ceiling void while using the toilet.</p><p> </p><p><strong>As Seen on TikTok (24:59)</strong></p><p><a href="https://www.theregister.com/2021/10/06/facebook_outage_explained_in_detail/">Facebook rendered spineless by buggy audit code that missed catastrophic network config error</a></p><p>Facebook has admitted buggy auditing code was at the core of Tuesday’s <a href="https://www.theregister.com/2021/10/04/facebook_outage_fixed/">six-hour outage</a> – and revealed a little more about its infrastructure to explain how it vanished from the internet.</p><p>As described by <a href="https://www.tiktok.com/@rey.nbows/video/7015684824534928646?sender_device=pc&sender_web_id=6972434784387974661&is_from_webapp=v1&is_copy_url=0">rey.nbows on TIK TOK</a></p><p> </p><p><strong>Industry News (34:18)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-whistleblower-to-testify/">Facebook Whistleblower to Testify Before Senate</a></p><p><a href="https://www.infosecurity-magazine.com/news/pandora-spills-secrets-of-super/">Pandora Spills Secrets of Super Rich</a></p><p><a href="https://www.infosecurity-magazine.com/news/deepmind-sued-over-data-sharing/">DeepMind Technologies Sued Over Data Sharing</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-blames-global-outage/">Facebook Blames Global Outage on Configuration Error</a></p><p><a href="https://www.infosecurity-magazine.com/news/text-message-giant-breach/">Text Message Giant Reveals Five-Year Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/squid-game-scenes-cut-over-data/">Squid Game Scenes Cut Over Data Exposure</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-revoke-admin-access-byod/">NCSC: Revoke Admin Access for BYOD Users Immediately</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-experts-twitch-breach-as/">Infosec Experts: Twitch Breach “As Bad as it Gets”</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-national-cryptocurrency/">US Creates National Cryptocurrency Enforcement Team</a></p><p> </p><p><strong>Tweet of the Week (42:42)</strong></p><img src="https://lh6.googleusercontent.com/Jg2FHkOnVy1cUCqYYLR0GvBxSLv5mXMlb3L4JyNYGssamY6s89_6DGx2hTI7KWWn3GwLWdhARvxbPmai_1-8vJ8CwJpkYqC9mrzl_t24TmQTMeYeLENaaFvdEVRD46VohG4YkDSe=s0" /><p><a href="https://twitter.com/cybersecstu/status/1446104732578328583">https://twitter.com/cybersecstu/status/1446104732578328583</a></p><img src="https://lh3.googleusercontent.com/nE_S4o4leavKJuJi7j-kXXsryeWIZKkili9RW_mQxIRbRgMP3EAaHJV_bE19Poek83dgy0Bp2zy1g1H_GDIrATV_ZSjonWgYdyQHBv6ftDtN_4njuwWJb-N2LV_8P9e7C8lzzcA9=s0" /><p><a href="https://twitter.com/SmashinSecurity/status/1445520598017314826">https://twitter.com/SmashinSecurity/status/1445520598017314826</a></p><p> </p><p>The Box © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47556556" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/00a3a78b-5025-4e48-873c-8e43c10f126e/audio/31997934-a54d-4df8-828a-89579355809e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 76 - Our Best Episode Ever</itunes:title>
      <itunes:author>NOT Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6aec9ae8-feee-455d-a4e1-ac10ae0d1b42/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:32</itunes:duration>
      <itunes:summary>This week in Infosec Who amongst us can say we have never been fooled. Fool me once, shame on you, fool me… again... shame something something...

Rant of the Week: has some serious questions about the people who installed security cameras in a store

As Seen on Tik Tok breaks down the Facebook outage for us quicker than even Smashing Security could

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week asks a question… We haven’t decided if it’s a would you rather? Or whodunnit?</itunes:summary>
      <itunes:subtitle>This week in Infosec Who amongst us can say we have never been fooled. Fool me once, shame on you, fool me… again... shame something something...

Rant of the Week: has some serious questions about the people who installed security cameras in a store

As Seen on Tik Tok breaks down the Facebook outage for us quicker than even Smashing Security could

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week asks a question… We haven’t decided if it’s a would you rather? Or whodunnit?</itunes:subtitle>
      <itunes:keywords>facebook, ikea, duet, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce907c49-e8af-4cb1-8d3f-8ec44448658b</guid>
      <title>Episode 75 - The Old Men of InfoSec</title>
      <description><![CDATA[<p><strong>Jav's Record Breakers 14th October </strong><br /><a href="https://www.eventbrite.ie/e/biggest-virtual-cybersecurity-lesson-tickets-166314899341">https://www.eventbrite.ie/e/biggest-virtual-cybersecurity-lesson-tickets-166314899341</a> </p><p><a href="https://www.prnewswire.com/news-releases/organizers-of-security-serious-week-aim-to-set-new-guinness-world-records-title-for-viewership-of-an-online-security-lesson-301376191.html">https://www.prnewswire.com/news-releases/organizers-of-security-serious-week-aim-to-set-new-guinness-world-records-title-for-viewership-of-an-online-security-lesson-301376191.html</a></p><p> </p><p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the dawn of cybercrime toolkits.</p><p><a href="https://www.theregister.com/2001/09/27/kournikova_virus_kiddie_gets/">Kournikova virus kiddie gets 150 hours community service</a></p><p><a href="https://twitter.com/todayininfosec/status/1177772557077843968">https://twitter.com/todayininfosec/status/1177772557077843968</a></p><p>27th September 1998: On this day in 1998: Google launches</p><img src="https://lh6.googleusercontent.com/fme22jNLX7_6tea9aOdwm_bBSnTFKzGxRLMTCvs_JuElNvk3zYS2jYIDkke--6-0V4yp6b3zxtnhxEFc4TNDFGjUnXqjheDO6X1Twy2wFqR1SMV7eD3_jyBDoe6vwFF49TEnm_pw=s0" /><p><a href="https://www.theverge.com/2018/9/5/17823490/google-20th-birthday-anniversary-history-milestones">Google Milestones</a></p><p><a href="https://www.makeuseof.com/tag/7-search-engines-that-rocked-before-google-even-existed/">8 Search Engines That Rocked Before Google Even Existed</a></p><p><a href="https://twitter.com/JonErlichman/status/1442432706877399049?s=20">https://twitter.com/JonErlichman/status/1442432706877399049?s=20</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.zdnet.com/article/its-long-past-time-for-apple-to-step-up-and-actively-support-older-machines/">Secure those Macs: Apple must step up and support older machines</a></p><p>For the good of the planet and the safety of its users, it's time for Apple to step up and support its older machines.</p><p> </p><p><strong>Billy big Balls of the Week</strong></p><p>Mr Gox</p><p><a href="https://markets.businessinsider.com/news/currencies/hamster-trading-cryptocurrencies-rigged-cage-goxx-bitcoin-price-ether-doge-2021-9">A hamster has been trading cryptocurrencies in a cage rigged to automatically buy and sell tokens since June - and it's currently outperforming the S&P 500</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/eu-slams-russia-disinformation/">EU Slams Russia Over Disinformation Hacking Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/huawei-cfo-released-admitting-she/">Huawei CFO Released After Admitting She Misled Bank</a></p><p><a href="https://www.infosecurity-magazine.com/news/computer-scientist-jailed-over/">Computer Scientist Jailed Over Dark Web Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-pleads-guilty-north-korean/">Crypto Developer Pleads Guilty to North Korean Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-vaccine-passport-app/">Canadian Vaccine Passport App Exposes Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/solarwinds-attackers-foggyweb/">SolarWinds Attackers Develop New FoggyWeb Backdoor</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerability-iphone-payment-fraud/">Vulnerability Exposes iPhone Users to Payment Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-capitalize-on-new-bond/">Scammers Capitalize on Release of New Bond Movie</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-second-biggest-global-risk/">Cyber Second Only to Climate Change as Biggest Global Risk</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/isdekTBC61rAYENWcj4C09_eYKZSvZhnsvNrMlUItRSBY0AsY0Sq3b8X3pweMBXf7Mtc7UtE9yS_A0IA-rdgb8s17knZCT_QLa9WkGa0fMpefYk4Ji_LQKOcE_krUYdHbgldB-rj=s0" /><p><a href="https://twitter.com/csoandy/status/1442501996750118915?s=20">https://twitter.com/csoandy/status/1442501996750118915?s=20</a></p><img src="https://lh3.googleusercontent.com/hgI-87hVPzC40X3MNo5dwqUbbURZSwVPVKg8VC5okM2av5D6eQourCVD6FWTjyminrNx0DhAbm4yPv9cEJA3Hu83JKnfBrn8Tb1i2G-GyNqCuNaenGt_ifz3FcKiGHgHjB8RUSCX=s0" /><p><a href="https://twitter.com/dcuthbert/status/1442821545047601163?s=20">https://twitter.com/dcuthbert/status/1442821545047601163?s=20</a></p><p> </p><p>"The Boc" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 1 Oct 2021 12:29:41 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-75-the-old-men-of-infosec-sCCcz6L5</link>
      <content:encoded><![CDATA[<p><strong>Jav's Record Breakers 14th October </strong><br /><a href="https://www.eventbrite.ie/e/biggest-virtual-cybersecurity-lesson-tickets-166314899341">https://www.eventbrite.ie/e/biggest-virtual-cybersecurity-lesson-tickets-166314899341</a> </p><p><a href="https://www.prnewswire.com/news-releases/organizers-of-security-serious-week-aim-to-set-new-guinness-world-records-title-for-viewership-of-an-online-security-lesson-301376191.html">https://www.prnewswire.com/news-releases/organizers-of-security-serious-week-aim-to-set-new-guinness-world-records-title-for-viewership-of-an-online-security-lesson-301376191.html</a></p><p> </p><p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>27th September 2001: Jan de Wit was sentenced to 150 hours of community service in the Netherlands for creating and spreading the Anna Kournikova virus. It was one of the first of the major viruses created from a virus toolkit - the dawn of cybercrime toolkits.</p><p><a href="https://www.theregister.com/2001/09/27/kournikova_virus_kiddie_gets/">Kournikova virus kiddie gets 150 hours community service</a></p><p><a href="https://twitter.com/todayininfosec/status/1177772557077843968">https://twitter.com/todayininfosec/status/1177772557077843968</a></p><p>27th September 1998: On this day in 1998: Google launches</p><img src="https://lh6.googleusercontent.com/fme22jNLX7_6tea9aOdwm_bBSnTFKzGxRLMTCvs_JuElNvk3zYS2jYIDkke--6-0V4yp6b3zxtnhxEFc4TNDFGjUnXqjheDO6X1Twy2wFqR1SMV7eD3_jyBDoe6vwFF49TEnm_pw=s0" /><p><a href="https://www.theverge.com/2018/9/5/17823490/google-20th-birthday-anniversary-history-milestones">Google Milestones</a></p><p><a href="https://www.makeuseof.com/tag/7-search-engines-that-rocked-before-google-even-existed/">8 Search Engines That Rocked Before Google Even Existed</a></p><p><a href="https://twitter.com/JonErlichman/status/1442432706877399049?s=20">https://twitter.com/JonErlichman/status/1442432706877399049?s=20</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.zdnet.com/article/its-long-past-time-for-apple-to-step-up-and-actively-support-older-machines/">Secure those Macs: Apple must step up and support older machines</a></p><p>For the good of the planet and the safety of its users, it's time for Apple to step up and support its older machines.</p><p> </p><p><strong>Billy big Balls of the Week</strong></p><p>Mr Gox</p><p><a href="https://markets.businessinsider.com/news/currencies/hamster-trading-cryptocurrencies-rigged-cage-goxx-bitcoin-price-ether-doge-2021-9">A hamster has been trading cryptocurrencies in a cage rigged to automatically buy and sell tokens since June - and it's currently outperforming the S&P 500</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/eu-slams-russia-disinformation/">EU Slams Russia Over Disinformation Hacking Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/huawei-cfo-released-admitting-she/">Huawei CFO Released After Admitting She Misled Bank</a></p><p><a href="https://www.infosecurity-magazine.com/news/computer-scientist-jailed-over/">Computer Scientist Jailed Over Dark Web Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/crypto-pleads-guilty-north-korean/">Crypto Developer Pleads Guilty to North Korean Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-vaccine-passport-app/">Canadian Vaccine Passport App Exposes Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/solarwinds-attackers-foggyweb/">SolarWinds Attackers Develop New FoggyWeb Backdoor</a></p><p><a href="https://www.infosecurity-magazine.com/news/vulnerability-iphone-payment-fraud/">Vulnerability Exposes iPhone Users to Payment Fraud</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-capitalize-on-new-bond/">Scammers Capitalize on Release of New Bond Movie</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-second-biggest-global-risk/">Cyber Second Only to Climate Change as Biggest Global Risk</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/isdekTBC61rAYENWcj4C09_eYKZSvZhnsvNrMlUItRSBY0AsY0Sq3b8X3pweMBXf7Mtc7UtE9yS_A0IA-rdgb8s17knZCT_QLa9WkGa0fMpefYk4Ji_LQKOcE_krUYdHbgldB-rj=s0" /><p><a href="https://twitter.com/csoandy/status/1442501996750118915?s=20">https://twitter.com/csoandy/status/1442501996750118915?s=20</a></p><img src="https://lh3.googleusercontent.com/hgI-87hVPzC40X3MNo5dwqUbbURZSwVPVKg8VC5okM2av5D6eQourCVD6FWTjyminrNx0DhAbm4yPv9cEJA3Hu83JKnfBrn8Tb1i2G-GyNqCuNaenGt_ifz3FcKiGHgHjB8RUSCX=s0" /><p><a href="https://twitter.com/dcuthbert/status/1442821545047601163?s=20">https://twitter.com/dcuthbert/status/1442821545047601163?s=20</a></p><p> </p><p>"The Boc" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49553983" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/746507fe-4602-4214-8745-490a1e4fbe03/audio/e2543bd3-bf1d-4094-93ec-3ceb524f0006/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 75 - The Old Men of InfoSec</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/781d945f-c0d7-4334-95d6-f69b08c329ee/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:38</itunes:duration>
      <itunes:summary>This week in Infosec We were searching for stories on the internet but didn’t know how to find one

Billy Big Balls is about a hamster. I thought they were quite small on a hamster, who knew...

Rant of the Week: sees Apple yet again in the crosshairs, so unfairly

Industry News brings us the latest and greatest security news stories from around the world

And...

Tweet of the Week is just full of vendor hate. C’mon folks, throw us a bone!
</itunes:summary>
      <itunes:subtitle>This week in Infosec We were searching for stories on the internet but didn’t know how to find one

Billy Big Balls is about a hamster. I thought they were quite small on a hamster, who knew...

Rant of the Week: sees Apple yet again in the crosshairs, so unfairly

Industry News brings us the latest and greatest security news stories from around the world

And...

Tweet of the Week is just full of vendor hate. C’mon folks, throw us a bone!
</itunes:subtitle>
      <itunes:keywords>record breakers, norris mcwhirter, podcast, roy castle and his trumpet, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f2209877-c7c0-43ed-bdcb-251f83d234bc</guid>
      <title>Episode 74 - Was it me or was it a long week?</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (04:56)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><ol><li>18th September 2015: Google notified Symantec that the latter issued 23 test certificates for five organizations, including Google and Opera, without the domain owners' knowledge. Symantec performed an audit and announced that an additional 2,622 test certificates were mis-issued.</li></ol><p><a href="https://security.googleblog.com/2015/10/sustaining-digital-certificate-security.html">Sustaining Digital Certificate Security</a></p><p><a href="https://twitter.com/todayininfosec/status/1439388653264965638">https://twitter.com/todayininfosec/status/1439388653264965638</a></p><p>20th September 1996: An email began spreading about a destructive virus named Irina. Some virus nerd called Graham Cluley discovered it was a hoax "marketing ploy" from Penguin Books.</p><p><a href="http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm">Computer Viruses and Hoaxes</a></p><p><a href="https://twitter.com/todayininfosec/status/1307862674387144705">https://twitter.com/todayininfosec/status/1307862674387144705</a></p><p> </p><p>The Box © Charlie Langford</p><p> </p><p><strong>Rant of the Week (12:55)</strong></p><p><a href="https://www.computerweekly.com/news/252506972/Investigation-launched-after-MoD-email-blunder">Investigation launched after MoD email blunder</a></p><p> </p><p><strong>Billy Big Balls of the Week (20:55)</strong></p><p><a href="https://www.theregister.com/2021/09/20/douyin_youth_mode_time_limits/">Tick, tick, tick … TikTok China just limited kids to 40 minutes' use each day</a></p><p> </p><p><strong>Industry News (34:17)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-concern-digital-secretary/">Experts Concerned Over New Digital Secretary's Lack of Cyber Knowledge</a></p><p><a href="https://www.infosecurity-magazine.com/news/romance-scammers-make-133m-in/">Romance Scammers Make $133m in First Half of 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/former-it-exec-guilty-insider/">Former IT Exec Pleads Guilty to Insider Trading Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-of-106-million-visitors-to/">Data of 106 Million Visitors to Thailand Breached</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-bust-10m-mafia/">European Police Bust €10m Mafia Fraud Ring</a></p><p><a href="https://www.infosecurity-magazine.com/news/prison-for-att-phoneunlocking/">Prison for AT&T Phone-Unlocking Fraudster</a></p><p><a href="https://www.infosecurity-magazine.com/news/afghan-interpreters-data-exposed/">Afghan Interpreters' Data Exposed in MoD Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-web-dont-know-site-attacked/">Half of Web Owners Don't Know if Their Site Has Been Attacked</a><a href="https://www.infosecurity-magazine.com/news/us-eyecare-providers-report-data/">US Eye-Care Providers Report Data Breaches</a></p><p> </p><p><strong>Tweet of the Week (41:43)</strong></p><img src="https://lh5.googleusercontent.com/21kK7QDhRO_5qWukrgoJHiXYM8BbuoyDmz31grUfWI_uVjbZI0XKBQqT3yiPb6nYATguDLy0SNOEg3mC5lC7YQzsaH92gHqFvnofY4BCNBE4huUdTuKbbm8QKUsEafPuwTchcNm2=s0" /><p><a href="https://twitter.com/aprivateguy/status/1441091095471874053?s=20">https://twitter.com/aprivateguy/status/1441091095471874053?s=20</a></p><img src="https://lh6.googleusercontent.com/GjPXXbEHcAAXir82A4JSaElbCJqkA721pcGARC5q0XwS9en_a9VZjFGdlKOxQHrJSeo9Nyi4grPBhk_L_qr2YxP3XH5yo2vM8H4JwDXZ9R8oBC8rfnrd0aKLyzA8ioE54wwEIZ18=s0" /><p><a href="https://twitter.com/ReverseICS/status/1441048111292506112">https://twitter.com/ReverseICS/status/1441048111292506112</a></p><p>And just for Andy...</p><p><a href="https://twitter.com/AlyssaM_InfoSec/status/1441135546961563649?s=20">https://twitter.com/AlyssaM_InfoSec/status/1441135546961563649?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 24 Sep 2021 16:43:54 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Gray Ham Cla Lay, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-74-was-it-me-or-was-it-a-long-week-SXV0Xnho</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (04:56)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><ol><li>18th September 2015: Google notified Symantec that the latter issued 23 test certificates for five organizations, including Google and Opera, without the domain owners' knowledge. Symantec performed an audit and announced that an additional 2,622 test certificates were mis-issued.</li></ol><p><a href="https://security.googleblog.com/2015/10/sustaining-digital-certificate-security.html">Sustaining Digital Certificate Security</a></p><p><a href="https://twitter.com/todayininfosec/status/1439388653264965638">https://twitter.com/todayininfosec/status/1439388653264965638</a></p><p>20th September 1996: An email began spreading about a destructive virus named Irina. Some virus nerd called Graham Cluley discovered it was a hoax "marketing ploy" from Penguin Books.</p><p><a href="http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm">Computer Viruses and Hoaxes</a></p><p><a href="https://twitter.com/todayininfosec/status/1307862674387144705">https://twitter.com/todayininfosec/status/1307862674387144705</a></p><p> </p><p>The Box © Charlie Langford</p><p> </p><p><strong>Rant of the Week (12:55)</strong></p><p><a href="https://www.computerweekly.com/news/252506972/Investigation-launched-after-MoD-email-blunder">Investigation launched after MoD email blunder</a></p><p> </p><p><strong>Billy Big Balls of the Week (20:55)</strong></p><p><a href="https://www.theregister.com/2021/09/20/douyin_youth_mode_time_limits/">Tick, tick, tick … TikTok China just limited kids to 40 minutes' use each day</a></p><p> </p><p><strong>Industry News (34:17)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/experts-concern-digital-secretary/">Experts Concerned Over New Digital Secretary's Lack of Cyber Knowledge</a></p><p><a href="https://www.infosecurity-magazine.com/news/romance-scammers-make-133m-in/">Romance Scammers Make $133m in First Half of 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/former-it-exec-guilty-insider/">Former IT Exec Pleads Guilty to Insider Trading Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-of-106-million-visitors-to/">Data of 106 Million Visitors to Thailand Breached</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-police-bust-10m-mafia/">European Police Bust €10m Mafia Fraud Ring</a></p><p><a href="https://www.infosecurity-magazine.com/news/prison-for-att-phoneunlocking/">Prison for AT&T Phone-Unlocking Fraudster</a></p><p><a href="https://www.infosecurity-magazine.com/news/afghan-interpreters-data-exposed/">Afghan Interpreters' Data Exposed in MoD Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-web-dont-know-site-attacked/">Half of Web Owners Don't Know if Their Site Has Been Attacked</a><a href="https://www.infosecurity-magazine.com/news/us-eyecare-providers-report-data/">US Eye-Care Providers Report Data Breaches</a></p><p> </p><p><strong>Tweet of the Week (41:43)</strong></p><img src="https://lh5.googleusercontent.com/21kK7QDhRO_5qWukrgoJHiXYM8BbuoyDmz31grUfWI_uVjbZI0XKBQqT3yiPb6nYATguDLy0SNOEg3mC5lC7YQzsaH92gHqFvnofY4BCNBE4huUdTuKbbm8QKUsEafPuwTchcNm2=s0" /><p><a href="https://twitter.com/aprivateguy/status/1441091095471874053?s=20">https://twitter.com/aprivateguy/status/1441091095471874053?s=20</a></p><img src="https://lh6.googleusercontent.com/GjPXXbEHcAAXir82A4JSaElbCJqkA721pcGARC5q0XwS9en_a9VZjFGdlKOxQHrJSeo9Nyi4grPBhk_L_qr2YxP3XH5yo2vM8H4JwDXZ9R8oBC8rfnrd0aKLyzA8ioE54wwEIZ18=s0" /><p><a href="https://twitter.com/ReverseICS/status/1441048111292506112">https://twitter.com/ReverseICS/status/1441048111292506112</a></p><p>And just for Andy...</p><p><a href="https://twitter.com/AlyssaM_InfoSec/status/1441135546961563649?s=20">https://twitter.com/AlyssaM_InfoSec/status/1441135546961563649?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45154963" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f7aa2504-7640-4170-b280-79c3fa643e35/audio/e008c6aa-e3e4-4efe-af79-0239b9cb4e43/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 74 - Was it me or was it a long week?</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Gray Ham Cla Lay, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3ea03eb9-ae0a-4659-96c5-a44b3b223da3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:02</itunes:duration>
      <itunes:summary>This week in Infosec re-lives a Symantec screw up and celebrates nerds of the world

Billy Big Balls something something something GINA!

Rant of the Week: Emails us a little bit more than we needed to know

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a work in progress, let’s see what we can pull out of the bag
</itunes:summary>
      <itunes:subtitle>This week in Infosec re-lives a Symantec screw up and celebrates nerds of the world

Billy Big Balls something something something GINA!

Rant of the Week: Emails us a little bit more than we needed to know

Industry News brings us the latest and greatest security news stories from around the world

And

Tweet of the Week is a work in progress, let’s see what we can pull out of the bag
</itunes:subtitle>
      <itunes:keywords>virus nerd of the 90s, podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">843ba4d7-86d5-4162-a039-177553966158</guid>
      <title>Judas Priest! It&apos;s The Triple Crown!</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (04:09)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th September 2008: 20-year-old David Kernell compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, then posted her emails to 4chan.</p><p>2 years later he was found guilty and sentenced to a year in prison. At age 30 he died of complications related to MS.</p><p><a href="http://news.bbc.co.uk/1/hi/world/americas/8655569.stm">Student convicted of hacking Sarah Palin e-mail account</a></p><p><a href="https://en.wikipedia.org/wiki/Sarah_Palin_email_hack">Sarah Palin email hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1306360597915865097">https://twitter.com/todayininfosec/status/1306360597915865097</a></p><p>9th September 2015: The security of 300 million travel locks was compromised after 3-D printing files were posted online.</p><p>Then again, these travel locks never were particularly secure.</p><p><a href="https://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos/">Lockpickers 3-D Print TSA Master Luggage Keys From Leaked Photos</a></p><p><a href="https://twitter.com/todayininfosec/status/1303847394556219392">https://twitter.com/todayininfosec/status/1303847394556219392</a>  </p><p> </p><p><strong>Tweet of the Week (13:06)</strong></p><img src="https://lh6.googleusercontent.com/GrR11OOoufeK47lSYoj9XwPlzjY0B2D710pJsjKPWPFajH0fh6Z3Js45IW0txur6qV7ilJA_5WSeA6hsuzHU_r2nBFi6_SA82tGuC1Ylr8-gHwZUEo8VfjeqUVbRyXt6IBrAQXDi=s0" /><p><a href="https://twitter.com/yolkfolk_com/status/1438580784294735875">https://twitter.com/yolkfolk_com/status/1438580784294735875</a></p><p> </p><p><strong>Sticky Pickle of the Week (18:16)</strong></p><p>Sticky Pickle of the Week is the part of the show where everyone chooses something that they like. It could be a funny story, a book they’ve read, a TV show, movie, record, a podcast, a website, or an app, whatever they like.  It doesn’t have to be security-related necessarily.</p><p>Better not be!</p><p><a href="https://www.theregister.com/2021/09/14/too_polite_brits_scammed/">Brits open doors for tech-enabled fraudsters because they 'don't want to seem rude'</a></p><p>Brits are too polite to tell phone scammers to "get stuffed", "take a hike" or "sling yer 'ook" when they impersonate so-called "trusted organisations" such as banks.</p><p>That's according to the trade association <a href="https://www.ukfinance.org.uk/">UK Finance</a>, which found that the number of "impersonation scam cases" more than doubled in the first half of 2021 to 33,115 – up from 14,947 during the same period last year.</p><p><i>That is a Sticky Pickle</i></p><p><a href="https://www.theregister.com/2021/09/16/microsoft_passwordless/">It's time to delete that hunter2 password from your Microsoft account, says IT giant</a></p><p>From this week, Microsoft won't require you, or your password manager, to come up with strings of letters, numbers, and special characters forming a silly sentence or a reconfiguration of an ex’s name and birthday to access the Windows giant's services.</p><p>That is to say, you can delete the password from your Microsoft account, and login using the Microsoft Authenticator app, Windows Hello, a security key, or a verification code sent to your cellphone or email inbox. (Last year, Redmond said SMS codes <a href="https://www.theregister.com/2020/11/11/microsoft_mfa_warning/">were unsafe</a> for authentication, we note.)</p><p><i>That is a Sticky Pickle</i></p><p><a href="https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/">Ransomware crims saying 'We'll burn your data if you get a negotiator' can't be legally paid off anyway</a></p><p>A couple of ransomware gangs have threatened to start deleting files if targeted companies call in <a href="https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/">professional negotiators</a> to help lower prices for decryption tools.</p><p>Grief Corp is the latest criminal crew to warn its victims with instant data destruction if it suspects a mark has engaged a mediator.</p><p>In a statement posted to its Tor-hosted blog, Grief Corp said: "We wanna play a game. If we see professional negotiator from Recovery Company™ – we will just destroy the data.</p><p><i>That is a Sticky Pickle</i></p><p> </p><p><strong>Industry News (31:16)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/poland-extradites-alleged-botnet/">Poland Extradites Alleged Botnet Operator to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-man-gets-five-years-online-abuse/">UK Man Gets Five Years for Online Abuse Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-rollout-encrypted-backups/">WhatsApp to Roll Out Encrypted Backups</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-locks-up-key-player-in-nigerian/">US Locks Up Key Player in Nigerian Romance Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-patch-pegasus-spyware/">Apple Releases Urgent Patch Following Discovery of Pegasus Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/massachusetts-ag-launches-probe/">Massachusetts AG Launches Probe into T-Mobile Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-omigod-mshtml/">Microsoft Patches OMIGOD, MSHTML and PrintNightmare Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/americans-fined-after-hacking/">Americans Fined After Hacking for Foreign Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/household-brands-500k-fine/">Household Names Hit with £500K Fine for Spamming Consumers</a></p><p> </p><p><strong>Tweet of the Week (38:05)</strong></p><img src="https://lh6.googleusercontent.com/NQfp0NSjcmCTD1_9z3MERrnNepa4wpMDSFKldEMu4aL46jSpGQIQX2RjJsd_Kotoebsz246J4pXGE0TRwuH97jwVia0tHR6p7bTvLNP1CIlgetHb9dkRdfrLg2HHkv4GN1iw3uaj=s0" /><p><a href="https://twitter.com/snipeyhead/status/1437935968460304384?s=20">https://twitter.com/snipeyhead/status/1437935968460304384?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Sep 2021 11:50:00 +0000</pubDate>
      <author>thom@tl2security.com (Graham Cluley, Thom Langford, Javvad Malik, Andrew Agnēs, Carole Theriault)</author>
      <link>https://podcast.hostunknown.tv/episodes/judas-priest-its-the-triple-crown-C4TG50gz</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (04:09)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th September 2008: 20-year-old David Kernell compromised the Yahoo! email account of US vice presidential candidate Sarah Palin, then posted her emails to 4chan.</p><p>2 years later he was found guilty and sentenced to a year in prison. At age 30 he died of complications related to MS.</p><p><a href="http://news.bbc.co.uk/1/hi/world/americas/8655569.stm">Student convicted of hacking Sarah Palin e-mail account</a></p><p><a href="https://en.wikipedia.org/wiki/Sarah_Palin_email_hack">Sarah Palin email hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1306360597915865097">https://twitter.com/todayininfosec/status/1306360597915865097</a></p><p>9th September 2015: The security of 300 million travel locks was compromised after 3-D printing files were posted online.</p><p>Then again, these travel locks never were particularly secure.</p><p><a href="https://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos/">Lockpickers 3-D Print TSA Master Luggage Keys From Leaked Photos</a></p><p><a href="https://twitter.com/todayininfosec/status/1303847394556219392">https://twitter.com/todayininfosec/status/1303847394556219392</a>  </p><p> </p><p><strong>Tweet of the Week (13:06)</strong></p><img src="https://lh6.googleusercontent.com/GrR11OOoufeK47lSYoj9XwPlzjY0B2D710pJsjKPWPFajH0fh6Z3Js45IW0txur6qV7ilJA_5WSeA6hsuzHU_r2nBFi6_SA82tGuC1Ylr8-gHwZUEo8VfjeqUVbRyXt6IBrAQXDi=s0" /><p><a href="https://twitter.com/yolkfolk_com/status/1438580784294735875">https://twitter.com/yolkfolk_com/status/1438580784294735875</a></p><p> </p><p><strong>Sticky Pickle of the Week (18:16)</strong></p><p>Sticky Pickle of the Week is the part of the show where everyone chooses something that they like. It could be a funny story, a book they’ve read, a TV show, movie, record, a podcast, a website, or an app, whatever they like.  It doesn’t have to be security-related necessarily.</p><p>Better not be!</p><p><a href="https://www.theregister.com/2021/09/14/too_polite_brits_scammed/">Brits open doors for tech-enabled fraudsters because they 'don't want to seem rude'</a></p><p>Brits are too polite to tell phone scammers to "get stuffed", "take a hike" or "sling yer 'ook" when they impersonate so-called "trusted organisations" such as banks.</p><p>That's according to the trade association <a href="https://www.ukfinance.org.uk/">UK Finance</a>, which found that the number of "impersonation scam cases" more than doubled in the first half of 2021 to 33,115 – up from 14,947 during the same period last year.</p><p><i>That is a Sticky Pickle</i></p><p><a href="https://www.theregister.com/2021/09/16/microsoft_passwordless/">It's time to delete that hunter2 password from your Microsoft account, says IT giant</a></p><p>From this week, Microsoft won't require you, or your password manager, to come up with strings of letters, numbers, and special characters forming a silly sentence or a reconfiguration of an ex’s name and birthday to access the Windows giant's services.</p><p>That is to say, you can delete the password from your Microsoft account, and login using the Microsoft Authenticator app, Windows Hello, a security key, or a verification code sent to your cellphone or email inbox. (Last year, Redmond said SMS codes <a href="https://www.theregister.com/2020/11/11/microsoft_mfa_warning/">were unsafe</a> for authentication, we note.)</p><p><i>That is a Sticky Pickle</i></p><p><a href="https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/">Ransomware crims saying 'We'll burn your data if you get a negotiator' can't be legally paid off anyway</a></p><p>A couple of ransomware gangs have threatened to start deleting files if targeted companies call in <a href="https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/">professional negotiators</a> to help lower prices for decryption tools.</p><p>Grief Corp is the latest criminal crew to warn its victims with instant data destruction if it suspects a mark has engaged a mediator.</p><p>In a statement posted to its Tor-hosted blog, Grief Corp said: "We wanna play a game. If we see professional negotiator from Recovery Company™ – we will just destroy the data.</p><p><i>That is a Sticky Pickle</i></p><p> </p><p><strong>Industry News (31:16)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/poland-extradites-alleged-botnet/">Poland Extradites Alleged Botnet Operator to US</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-man-gets-five-years-online-abuse/">UK Man Gets Five Years for Online Abuse Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-rollout-encrypted-backups/">WhatsApp to Roll Out Encrypted Backups</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-locks-up-key-player-in-nigerian/">US Locks Up Key Player in Nigerian Romance Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/apple-patch-pegasus-spyware/">Apple Releases Urgent Patch Following Discovery of Pegasus Spyware</a></p><p><a href="https://www.infosecurity-magazine.com/news/massachusetts-ag-launches-probe/">Massachusetts AG Launches Probe into T-Mobile Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-omigod-mshtml/">Microsoft Patches OMIGOD, MSHTML and PrintNightmare Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/americans-fined-after-hacking/">Americans Fined After Hacking for Foreign Government</a></p><p><a href="https://www.infosecurity-magazine.com/news/household-brands-500k-fine/">Household Names Hit with £500K Fine for Spamming Consumers</a></p><p> </p><p><strong>Tweet of the Week (38:05)</strong></p><img src="https://lh6.googleusercontent.com/NQfp0NSjcmCTD1_9z3MERrnNepa4wpMDSFKldEMu4aL46jSpGQIQX2RjJsd_Kotoebsz246J4pXGE0TRwuH97jwVia0tHR6p7bTvLNP1CIlgetHb9dkRdfrLg2HHkv4GN1iw3uaj=s0" /><p><a href="https://twitter.com/snipeyhead/status/1437935968460304384?s=20">https://twitter.com/snipeyhead/status/1437935968460304384?s=20</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="40352194" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/617d4bc4-3d1a-40b8-842a-352e1f10dadf/audio/03d5ed9a-295c-41e4-b6ae-5e3845339427/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Judas Priest! It&apos;s The Triple Crown!</itunes:title>
      <itunes:author>Graham Cluley, Thom Langford, Javvad Malik, Andrew Agnēs, Carole Theriault</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b0305fe8-6f74-4f5d-94cf-563168413d08/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:02</itunes:duration>
      <itunes:summary>This week in Infosec is another story about leaked photos, but not the type you just thought of...

Have you ever found yourself stuck in a pickle, or knee-deep in a dilemma? Don’t worry we are here to help!

Industry News brings us the latest and greatest security news stories from around the world.

And...

Tweet of the Week ensures our food is up to federal standards, and thanks us for the memory, but just 48k mind you...
</itunes:summary>
      <itunes:subtitle>This week in Infosec is another story about leaked photos, but not the type you just thought of...

Have you ever found yourself stuck in a pickle, or knee-deep in a dilemma? Don’t worry we are here to help!

Industry News brings us the latest and greatest security news stories from around the world.

And...

Tweet of the Week ensures our food is up to federal standards, and thanks us for the memory, but just 48k mind you...
</itunes:subtitle>
      <itunes:keywords>sandwiches, smashing security, sticky pickle, tsa, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ab1c14e1-b801-41ec-b977-a54e2b505167</guid>
      <title>Episode 72 - Better Late Than Never</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (11:14)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>5th September 1983: The term "hacker" was used by Newsweek, mainstream media's earliest known use of the term in the pejorative sense.</p><p>The magazine's cover photo of 17-year-old 414s (hacker group) member Neal Patrick was captioned '414 "Hacker" Neal Patrick.'.</p><p><a href="https://www.edn.com/hacker-is-used-by-mainstream-media-september-5-1983/">‘Hacker’ is used by mainstream media, September 5, 1983</a></p><p><a href="https://t.co/bnFlllCEtz?amp=1">the414s.com</a></p><p><a href="https://twitter.com/todayininfosec/status/1302239152046563328">https://twitter.com/todayininfosec/status/1302239152046563328</a></p><p><a href="https://en.wikipedia.org/wiki/Phreaking_box">https://en.wikipedia.org/wiki/Phreaking_box</a></p><p> </p><p>9th September 2001: Mark Curphey started OWASP (the Open Web Application Security Project).</p><p><a href="https://owasp.org/">Who is the OWASP® Foundation?</a></p><p><a href="https://twitter.com/todayininfosec/status/1303830903987359744">https://twitter.com/todayininfosec/status/1303830903987359744</a>   </p><p> </p><p><strong>Tweet of the Week (21:26)</strong></p><img src="https://lh6.googleusercontent.com/Y17xVcmAWjXxoVM7-5PB429I5QtXxZPN-F8t-Rd_OXkEi3C5heRy9NYz2eU_Xbu2ZybbvNNyB4eG4ivtecX4a_gUqsdK2pHXXTgguAkSxCX43IFK8ryRIj5jxKP76iNQpqsjZYB_=s0" /><p><a href="https://twitter.com/RSnake/status/1435989191414976512?s=20">https://twitter.com/RSnake/status/1435989191414976512?s=20</a></p><p> </p><p><strong>Tweet of the Week (26:41) </strong></p><img src="https://lh6.googleusercontent.com/zLotN1QKVsovzmrnQ6fzCMT20lCcXxyQofphRluMxxyaNeHeWbBpPoXdq8F0yNjJkd2H6L4O0WGvxBl0G01VQibq0LgYTSAjO7wT4gW2y1Dj4qqdIo15fUI4AyMDs7-R88wcUSeq=s0" /><p><a href="https://twitter.com/hanbandit/status/1436008564020088833">https://twitter.com/hanbandit/status/1436008564020088833</a></p><p> </p><p><strong>Industry News (31:55)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ftc-bans-stalkerware-app-in/">FTC Bans Stalkerware App in Industry First</a></p><p><a href="https://www.infosecurity-magazine.com/news/texan-cyber-stalking-murder-dies/">Texan Accused of Cyber-Stalking and Murder Dies in Jail</a></p><p><a href="https://www.infosecurity-magazine.com/news/id-theft-couple-on-the-run/">ID Theft Couple on the Run</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-international-support-cookie/">ICO Requests International Support to Tackle Cookie Pop-Ups</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-student-scams-senior/">Cybersecurity Student Scams Senior Out of $55K</a></p><p><a href="https://www.infosecurity-magazine.com/news/stress-burnout-cybersecurity/">Stress and Burnout Affecting Majority of Cybersecurity Professionals</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-breach-lawsuit-against-sonic/">Data Breach Lawsuit Against Sonic Will Proceed</a></p><p><a href="https://www.infosecurity-magazine.com/news/berners-lee-joins-protonmail/">Berners-Lee Joins ProtonMail Following Privacy Debacle</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-now-a-thankless-task-for/">Security Now a "Thankless Task" For 80% of IT Teams</a></p><p> </p><p><strong>Tweet of the Week (40:01)</strong></p><img src="https://lh4.googleusercontent.com/aSkJPMAAKeZr8AUchWec3yDm1nhs2UJfkOJq78RfFmUqPRhiHSw4XwNh9EJ6Ox3dzkrfJ5sI-TZQZVjyUlRjAtiokktpEJoibPZJFam4eKVS8s2NsGA0-d_tKvqPEZfAjm4_6HnX=s0" /><p><a href="https://twitter.com/hondanhon/status/1436027395115393024">https://twitter.com/hondanhon/status/1436027395115393024</a></p><p> </p><p>The Box © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Sep 2021 21:07:38 +0000</pubDate>
      <author>thom@tl2security.com (Dementia Malik, Old Man Langford, Youth of Today Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-72-better-late-than-never-yzcahPYX</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (11:14)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>5th September 1983: The term "hacker" was used by Newsweek, mainstream media's earliest known use of the term in the pejorative sense.</p><p>The magazine's cover photo of 17-year-old 414s (hacker group) member Neal Patrick was captioned '414 "Hacker" Neal Patrick.'.</p><p><a href="https://www.edn.com/hacker-is-used-by-mainstream-media-september-5-1983/">‘Hacker’ is used by mainstream media, September 5, 1983</a></p><p><a href="https://t.co/bnFlllCEtz?amp=1">the414s.com</a></p><p><a href="https://twitter.com/todayininfosec/status/1302239152046563328">https://twitter.com/todayininfosec/status/1302239152046563328</a></p><p><a href="https://en.wikipedia.org/wiki/Phreaking_box">https://en.wikipedia.org/wiki/Phreaking_box</a></p><p> </p><p>9th September 2001: Mark Curphey started OWASP (the Open Web Application Security Project).</p><p><a href="https://owasp.org/">Who is the OWASP® Foundation?</a></p><p><a href="https://twitter.com/todayininfosec/status/1303830903987359744">https://twitter.com/todayininfosec/status/1303830903987359744</a>   </p><p> </p><p><strong>Tweet of the Week (21:26)</strong></p><img src="https://lh6.googleusercontent.com/Y17xVcmAWjXxoVM7-5PB429I5QtXxZPN-F8t-Rd_OXkEi3C5heRy9NYz2eU_Xbu2ZybbvNNyB4eG4ivtecX4a_gUqsdK2pHXXTgguAkSxCX43IFK8ryRIj5jxKP76iNQpqsjZYB_=s0" /><p><a href="https://twitter.com/RSnake/status/1435989191414976512?s=20">https://twitter.com/RSnake/status/1435989191414976512?s=20</a></p><p> </p><p><strong>Tweet of the Week (26:41) </strong></p><img src="https://lh6.googleusercontent.com/zLotN1QKVsovzmrnQ6fzCMT20lCcXxyQofphRluMxxyaNeHeWbBpPoXdq8F0yNjJkd2H6L4O0WGvxBl0G01VQibq0LgYTSAjO7wT4gW2y1Dj4qqdIo15fUI4AyMDs7-R88wcUSeq=s0" /><p><a href="https://twitter.com/hanbandit/status/1436008564020088833">https://twitter.com/hanbandit/status/1436008564020088833</a></p><p> </p><p><strong>Industry News (31:55)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ftc-bans-stalkerware-app-in/">FTC Bans Stalkerware App in Industry First</a></p><p><a href="https://www.infosecurity-magazine.com/news/texan-cyber-stalking-murder-dies/">Texan Accused of Cyber-Stalking and Murder Dies in Jail</a></p><p><a href="https://www.infosecurity-magazine.com/news/id-theft-couple-on-the-run/">ID Theft Couple on the Run</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-international-support-cookie/">ICO Requests International Support to Tackle Cookie Pop-Ups</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-student-scams-senior/">Cybersecurity Student Scams Senior Out of $55K</a></p><p><a href="https://www.infosecurity-magazine.com/news/stress-burnout-cybersecurity/">Stress and Burnout Affecting Majority of Cybersecurity Professionals</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-breach-lawsuit-against-sonic/">Data Breach Lawsuit Against Sonic Will Proceed</a></p><p><a href="https://www.infosecurity-magazine.com/news/berners-lee-joins-protonmail/">Berners-Lee Joins ProtonMail Following Privacy Debacle</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-now-a-thankless-task-for/">Security Now a "Thankless Task" For 80% of IT Teams</a></p><p> </p><p><strong>Tweet of the Week (40:01)</strong></p><img src="https://lh4.googleusercontent.com/aSkJPMAAKeZr8AUchWec3yDm1nhs2UJfkOJq78RfFmUqPRhiHSw4XwNh9EJ6Ox3dzkrfJ5sI-TZQZVjyUlRjAtiokktpEJoibPZJFam4eKVS8s2NsGA0-d_tKvqPEZfAjm4_6HnX=s0" /><p><a href="https://twitter.com/hondanhon/status/1436027395115393024">https://twitter.com/hondanhon/status/1436027395115393024</a></p><p> </p><p>The Box © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45083910" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6eba78cb-2148-45a9-a2ee-35d22a7983c6/audio/879b4c05-c2f5-402c-a22c-9a92013dd155/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 72 - Better Late Than Never</itunes:title>
      <itunes:author>Dementia Malik, Old Man Langford, Youth of Today Agnes</itunes:author>
      <itunes:duration>00:46:58</itunes:duration>
      <itunes:summary>This week in Infosec goes back to when men were men, women were women, and hackers were… umm...,

Rant of the week is all about innovative solutions for modern problems that really shouldn’t exist,

Billy Big Balls tells you all about your most valuable assets,

Industry News brings us the latest and greatest security news stories from around the world,

And...

Tweet of the Week is Andy’s worst nightmare come true.</itunes:summary>
      <itunes:subtitle>This week in Infosec goes back to when men were men, women were women, and hackers were… umm...,

Rant of the week is all about innovative solutions for modern problems that really shouldn’t exist,

Billy Big Balls tells you all about your most valuable assets,

Industry News brings us the latest and greatest security news stories from around the world,

And...

Tweet of the Week is Andy’s worst nightmare come true.</itunes:subtitle>
      <itunes:keywords>toupes, podcast, alzheimers, wigs, infosec, hair pieces</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6fef9286-611e-4e06-a5c2-2f621dbc2b81</guid>
      <title>Episode 71 - Thank You For the Music</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>1st September 1997: Nmap was first released as a simple port scanner via an article in issue 51 of Phrack magazine which included the source code.</p><p><a href="http://phrack.org/issues/51/11.html">http://phrack.org/issues/51/11.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1300864278497558528">https://twitter.com/todayininfosec/status/1300864278497558528</a></p><p>31st August 2014: A user of the message board 4chan posted leaked photos of actress Jennifer Lawrence and numerous other celebrities.</p><p><a href="https://mashable.com/archive/celebrity-nude-photo-hack">https://mashable.com/archive/celebrity-nude-photo-hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1300537361676283905">https://twitter.com/todayininfosec/status/1300537361676283905</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/GazTheJourno/status/1431522811093430272">Guntrader site hacked and plotted onto Google Maps</a></p><img src="https://lh4.googleusercontent.com/mganAc38sfcZ7aL7RpRmLPehvXroojWxRGYGjrRmtaE_3-bqBFH31it90wMkeg0Q69mGX3yqlpNXDiWgdCu1fKd_0t851B79vTnltySQ0nwPeBZVPy6BUEGyktqKgMomnSqHWOkS=s0" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.zdnet.com/article/scam-artists-are-recruiting-english-speakers-for-business-email-campaigns/">Scam artists are recruiting English speakers for business email campaigns</a></p><p>According to Intel 471, forums are now being used to seek out English speakers, in particular, to bring together teams able to manage both the technical aspects and social engineering elements of a BEC scam. </p><p>If a scam is to succeed, the target employee must believe communication comes from a legitimate source -- and secondary language use, spelling mistakes, and grammatical issues could all be indicators that something isn't right, in the same way that run-of-the-mill spam often contains issues that alert recipients to attempted fraud. </p><p>"Actors like those we witnessed are searching for native English speakers since North American and European markets are the primary targets of such scams," the researchers say.</p><p>In addition, threat actors are also trying to recruit launderers to clean up the proceeds from BEC schemes, often achieved through cryptocurrency mixer and tumbler platforms. One advert spotted by the team asked for a service able to launder up to $250,000. </p><p>"The BEC footprint on underground forums is not as large as other types of cybercrime, likely since many of the operational elements of BEC use targeted social engineering tactics and fraudulent domains, which do not typically require technical services or products that the underground offers," Intel 471 says. "[...] Criminals will use the underground for all types of schemes, as long as those forums remain a hotbed of skills that can make criminals money."</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/bangkok-airlines-attackers-stole/">Bangkok Airways Admits Attackers Stole Passenger Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-cloud-databases-exposed/">Microsoft Cloud Databases Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-regulations-streaming/">UK Government Considers New Regulations for Video Streaming Platforms</a></p><p><a href="https://www.infosecurity-magazine.com/news/indonesians-told-to-delete/">Indonesians Told to Delete Unsecured Tracing App</a></p><p><a href="https://www.infosecurity-magazine.com/news/schober-sues-alleged-cyber-thieves/">Victim of Cyber-Theft Sues Parents of Alleged Culprits</a></p><p><a href="https://www.infosecurity-magazine.com/news/australian-couple-id-theft-lees/">Australian Couple Admits “Serious Cyber Hacking Offenses”</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-fined-record-gdpr/">WhatsApp Fined a Record €225m for GDPR Violations</a></p><p><a href="https://www.infosecurity-magazine.com/news/sacked-employee-deletes-credit/">Sacked Employee Deletes 21GB of Credit Union Files</a></p><p><a href="https://www.infosecurity-magazine.com/news/invent-device-thwart-usb-malware/">UK Researchers Invent Device to Thwart USB Malware</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/vHBSKyZhQNuIkBVd0POAkjxVeN-V-LGNC7duo3Wu4MuzpxFaqticVpzNqm1-Z1Tflhem71v2tX1oHU0YFi9tOcmA7LkLtPeOUstk-HHyYuWW52QGUYTwouMPS_OCICaH8E7KvxQ5=s0" /><p><a href="https://twitter.com/JackRhysider/status/1433097343692324864">https://twitter.com/JackRhysider/status/1433097343692324864</a></p><p><a href="https://cybarrior.com/blog/2019/04/05/eagle-eye-reverse-lookup-tool-for-social-media-accounts/">https://cybarrior.com/blog/2019/04/05/eagle-eye-reverse-lookup-tool-for-social-media-accounts/</a></p><p> </p><p>"The Box" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Sep 2021 13:08:32 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnēs, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-71-thank-you-for-the-music-V9dhsXkS</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>1st September 1997: Nmap was first released as a simple port scanner via an article in issue 51 of Phrack magazine which included the source code.</p><p><a href="http://phrack.org/issues/51/11.html">http://phrack.org/issues/51/11.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1300864278497558528">https://twitter.com/todayininfosec/status/1300864278497558528</a></p><p>31st August 2014: A user of the message board 4chan posted leaked photos of actress Jennifer Lawrence and numerous other celebrities.</p><p><a href="https://mashable.com/archive/celebrity-nude-photo-hack">https://mashable.com/archive/celebrity-nude-photo-hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1300537361676283905">https://twitter.com/todayininfosec/status/1300537361676283905</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/GazTheJourno/status/1431522811093430272">Guntrader site hacked and plotted onto Google Maps</a></p><img src="https://lh4.googleusercontent.com/mganAc38sfcZ7aL7RpRmLPehvXroojWxRGYGjrRmtaE_3-bqBFH31it90wMkeg0Q69mGX3yqlpNXDiWgdCu1fKd_0t851B79vTnltySQ0nwPeBZVPy6BUEGyktqKgMomnSqHWOkS=s0" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.zdnet.com/article/scam-artists-are-recruiting-english-speakers-for-business-email-campaigns/">Scam artists are recruiting English speakers for business email campaigns</a></p><p>According to Intel 471, forums are now being used to seek out English speakers, in particular, to bring together teams able to manage both the technical aspects and social engineering elements of a BEC scam. </p><p>If a scam is to succeed, the target employee must believe communication comes from a legitimate source -- and secondary language use, spelling mistakes, and grammatical issues could all be indicators that something isn't right, in the same way that run-of-the-mill spam often contains issues that alert recipients to attempted fraud. </p><p>"Actors like those we witnessed are searching for native English speakers since North American and European markets are the primary targets of such scams," the researchers say.</p><p>In addition, threat actors are also trying to recruit launderers to clean up the proceeds from BEC schemes, often achieved through cryptocurrency mixer and tumbler platforms. One advert spotted by the team asked for a service able to launder up to $250,000. </p><p>"The BEC footprint on underground forums is not as large as other types of cybercrime, likely since many of the operational elements of BEC use targeted social engineering tactics and fraudulent domains, which do not typically require technical services or products that the underground offers," Intel 471 says. "[...] Criminals will use the underground for all types of schemes, as long as those forums remain a hotbed of skills that can make criminals money."</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/bangkok-airlines-attackers-stole/">Bangkok Airways Admits Attackers Stole Passenger Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-cloud-databases-exposed/">Microsoft Cloud Databases Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-government-regulations-streaming/">UK Government Considers New Regulations for Video Streaming Platforms</a></p><p><a href="https://www.infosecurity-magazine.com/news/indonesians-told-to-delete/">Indonesians Told to Delete Unsecured Tracing App</a></p><p><a href="https://www.infosecurity-magazine.com/news/schober-sues-alleged-cyber-thieves/">Victim of Cyber-Theft Sues Parents of Alleged Culprits</a></p><p><a href="https://www.infosecurity-magazine.com/news/australian-couple-id-theft-lees/">Australian Couple Admits “Serious Cyber Hacking Offenses”</a></p><p><a href="https://www.infosecurity-magazine.com/news/whatsapp-fined-record-gdpr/">WhatsApp Fined a Record €225m for GDPR Violations</a></p><p><a href="https://www.infosecurity-magazine.com/news/sacked-employee-deletes-credit/">Sacked Employee Deletes 21GB of Credit Union Files</a></p><p><a href="https://www.infosecurity-magazine.com/news/invent-device-thwart-usb-malware/">UK Researchers Invent Device to Thwart USB Malware</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/vHBSKyZhQNuIkBVd0POAkjxVeN-V-LGNC7duo3Wu4MuzpxFaqticVpzNqm1-Z1Tflhem71v2tX1oHU0YFi9tOcmA7LkLtPeOUstk-HHyYuWW52QGUYTwouMPS_OCICaH8E7KvxQ5=s0" /><p><a href="https://twitter.com/JackRhysider/status/1433097343692324864">https://twitter.com/JackRhysider/status/1433097343692324864</a></p><p><a href="https://cybarrior.com/blog/2019/04/05/eagle-eye-reverse-lookup-tool-for-social-media-accounts/">https://cybarrior.com/blog/2019/04/05/eagle-eye-reverse-lookup-tool-for-social-media-accounts/</a></p><p> </p><p>"The Box" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55854718" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/abbed277-3a25-4739-bc44-593b2570dda9/audio/7963e946-6a9a-4033-875b-cf1acc3da676/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 71 - Thank You For the Music</itunes:title>
      <itunes:author>Andrew Agnēs, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/cffe7a59-5aeb-496b-b26d-97bb82f0cfaa/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:11</itunes:duration>
      <itunes:summary>This week in Infosec we revisit Fyodor’s gift to the infosec community

Rant of the week is bad for the UK, but would be a welcome excuse in the USA to exercise your freedoms,

Billy Big Balls is written in perfect English this week,

Industry News brings us the latest and greatest security news stories from the around the world

And

Tweet of the Week is about stalkerware which refreshingly does not pretend to be anything else
</itunes:summary>
      <itunes:subtitle>This week in Infosec we revisit Fyodor’s gift to the infosec community

Rant of the week is bad for the UK, but would be a welcome excuse in the USA to exercise your freedoms,

Billy Big Balls is written in perfect English this week,

Industry News brings us the latest and greatest security news stories from the around the world

And

Tweet of the Week is about stalkerware which refreshingly does not pretend to be anything else
</itunes:subtitle>
      <itunes:keywords>podcast, hilarious, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4446f1ff-153e-4cc5-89a4-861100b1c4fc</guid>
      <title>Episode 70 - Two is the Magic number</title>
      <description><![CDATA[<p><strong>This week in Infosec (13:24)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>25th August 1991: Linux completes 30 years.</p><p>It was on this date in 1991 that Linus Torvalds announced the first version. He actually wanted to call it as Freax, but his friend Ari Lemmke named it as Linux, which he accepted. Version 1.0 would later be released in March 1994.</p><p><a href="https://twitter.com/SadaaShree/status/1430415723856203777">https://twitter.com/SadaaShree/status/1430415723856203777</a></p><p>2004: (a mere 17 years ago) The US Department of Justice (DOJ) announced the results of Operation Web Snare - the arrest or conviction of over 150 individuals involved in cybercrime.</p><p><a href="https://www.justice.gov/archive/opa/pr/2004/August/04_crm_583.htm">https://www.justice.gov/archive/opa/pr/2004/August/04_crm_583.htm</a></p><p> </p><p><strong>Rant of the Week (29:03)</strong></p><p><a href="https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security">https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security</a></p><img src="https://lh6.googleusercontent.com/3eog_7qTezsPAA9fHB-pvXN2WDW_FUtLxAG6Q7YsYs3n_AqDzEuDQeBBd9eWeWYkrsQRdHnBPJbXTyC4RpBSbc9S3zItnI7BSAkzUbALlMokSeXSvbA1D5BDfpr1Td6hlM-yjLPg=s0" /><p> </p><p><strong>Billy Big Balls of the Week (36:40)</strong></p><p><a href="https://apnews.com/article/middle-east-iran-e8d71902c0f48c8ee863a4d46e637116">Iran official acknowledges videos of Evin prison abuse real</a></p><p><a href="https://twitter.com/EdClowes/status/1430083273015840776">This clip of a security control room at Iran's most notorious prison being shut down by hackers is straight out of a movie.</a></p><p>Hackers are now leaking stolen CCTV from across the Evin prison to highlight the abuse of inmates</p><p> </p><p><strong>Industry News (45:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/liquid-cryptocurrency-exchange/">Crunch Time for Liquid as Crypto Exchange Loses $97m to Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-stealing-nude-pictures-college/">Man Gets Three Years for Stealing Nude Photos from College Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-leak-footage-of-iranian/">Hackers Leak Footage of Iranian Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/poly-network-hacker-returns/">Poly Network Hacker Returns Remaining Funds</a></p><p><a href="https://www.infosecurity-magazine.com/news/att-denies-data-breach/">AT&T Denies Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/time-to-fix-high-severity-apps/">Time to Fix High Severity Apps Increases by Ten Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/drug-dealers-police-crack-encrochat/">Drug Dealers Get 27 Years After Police Crack EncroChat Comms</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-pros-insurance-ransomware/">70% of Cyber Pros Believe Cyber Insurance is Exacerbating Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/angry-birds-alleged-illegal-data/">Angry Birds Developer Accused of Illegal Data Collection</a></p><p> </p><p><strong>Tweet of the Week (51:42)</strong></p><img src="https://lh3.googleusercontent.com/MRC5q1OupllFQLava6f49nhxEq8MEQvJrkk2Jce-AkYJJIy-xzP30tJyoLJ9Rf_8mqkTCgjjctnhipZG_sgsdwX1UcxehmwGomWqKGH7FEXzkH6i2dTHvKu2PMKyMOTsjeALMTSQ=s0" /><p><a href="https://attrition.org/errata/charlatan/frank_abagnale/">Charlatan - Frank W. Abagnale Jr.</a></p><p><a href="https://twitter.com/securityerrata/status/1429225280997142530">https://twitter.com/securityerrata/status/1429225280997142530</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 27 Aug 2021 12:33:19 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, NOT Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-70-two-is-the-magic-number-BJHUtf9v</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec (13:24)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>25th August 1991: Linux completes 30 years.</p><p>It was on this date in 1991 that Linus Torvalds announced the first version. He actually wanted to call it as Freax, but his friend Ari Lemmke named it as Linux, which he accepted. Version 1.0 would later be released in March 1994.</p><p><a href="https://twitter.com/SadaaShree/status/1430415723856203777">https://twitter.com/SadaaShree/status/1430415723856203777</a></p><p>2004: (a mere 17 years ago) The US Department of Justice (DOJ) announced the results of Operation Web Snare - the arrest or conviction of over 150 individuals involved in cybercrime.</p><p><a href="https://www.justice.gov/archive/opa/pr/2004/August/04_crm_583.htm">https://www.justice.gov/archive/opa/pr/2004/August/04_crm_583.htm</a></p><p> </p><p><strong>Rant of the Week (29:03)</strong></p><p><a href="https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security">https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security</a></p><img src="https://lh6.googleusercontent.com/3eog_7qTezsPAA9fHB-pvXN2WDW_FUtLxAG6Q7YsYs3n_AqDzEuDQeBBd9eWeWYkrsQRdHnBPJbXTyC4RpBSbc9S3zItnI7BSAkzUbALlMokSeXSvbA1D5BDfpr1Td6hlM-yjLPg=s0" /><p> </p><p><strong>Billy Big Balls of the Week (36:40)</strong></p><p><a href="https://apnews.com/article/middle-east-iran-e8d71902c0f48c8ee863a4d46e637116">Iran official acknowledges videos of Evin prison abuse real</a></p><p><a href="https://twitter.com/EdClowes/status/1430083273015840776">This clip of a security control room at Iran's most notorious prison being shut down by hackers is straight out of a movie.</a></p><p>Hackers are now leaking stolen CCTV from across the Evin prison to highlight the abuse of inmates</p><p> </p><p><strong>Industry News (45:35)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/liquid-cryptocurrency-exchange/">Crunch Time for Liquid as Crypto Exchange Loses $97m to Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-stealing-nude-pictures-college/">Man Gets Three Years for Stealing Nude Photos from College Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-leak-footage-of-iranian/">Hackers Leak Footage of Iranian Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/poly-network-hacker-returns/">Poly Network Hacker Returns Remaining Funds</a></p><p><a href="https://www.infosecurity-magazine.com/news/att-denies-data-breach/">AT&T Denies Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/time-to-fix-high-severity-apps/">Time to Fix High Severity Apps Increases by Ten Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/drug-dealers-police-crack-encrochat/">Drug Dealers Get 27 Years After Police Crack EncroChat Comms</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-pros-insurance-ransomware/">70% of Cyber Pros Believe Cyber Insurance is Exacerbating Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/angry-birds-alleged-illegal-data/">Angry Birds Developer Accused of Illegal Data Collection</a></p><p> </p><p><strong>Tweet of the Week (51:42)</strong></p><img src="https://lh3.googleusercontent.com/MRC5q1OupllFQLava6f49nhxEq8MEQvJrkk2Jce-AkYJJIy-xzP30tJyoLJ9Rf_8mqkTCgjjctnhipZG_sgsdwX1UcxehmwGomWqKGH7FEXzkH6i2dTHvKu2PMKyMOTsjeALMTSQ=s0" /><p><a href="https://attrition.org/errata/charlatan/frank_abagnale/">Charlatan - Frank W. Abagnale Jr.</a></p><p><a href="https://twitter.com/securityerrata/status/1429225280997142530">https://twitter.com/securityerrata/status/1429225280997142530</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56972341" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7585f850-6909-4965-8178-9531c757e0f4/audio/35fddecc-2843-43ed-a056-0bc7cc3b7d8e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 70 - Two is the Magic number</itunes:title>
      <itunes:author>Thom Langford, NOT Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/4f7436b1-2205-423d-adf3-41c16e0aef30/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:21</itunes:duration>
      <itunes:summary>This week in Infosec a penguin was born,

Rant of the week is 10 easy steps to cybersecurity, number 5 will amaze you!

Billy Big Balls tells of a prison break, but not how you imagined it,

Industry News brings us the latest and greatest security news stories from around the world,

and

Tweet of the Week, another charlatan has been added to the Errata list. Perhaps this is why Andy is missing today?
</itunes:summary>
      <itunes:subtitle>This week in Infosec a penguin was born,

Rant of the week is 10 easy steps to cybersecurity, number 5 will amaze you!

Billy Big Balls tells of a prison break, but not how you imagined it,

Industry News brings us the latest and greatest security news stories from around the world,

and

Tweet of the Week, another charlatan has been added to the Errata list. Perhaps this is why Andy is missing today?
</itunes:subtitle>
      <itunes:keywords>charlatan, podcast, abagnale, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">779f1fd5-8ba4-4100-b9a6-d526d4e536af</guid>
      <title>Episode 69 - Think of a Number Bill and Ted</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>14th August 2013: Affinity Health Plan was fined $1,215,780 for a HIPAA violation after a photocopier purchased by CBS for an investigatory report in 2010 revealed medical info.</p><p><a href="https://www.healthcareitnews.com/news/12m-photocopy-breach-proves-costly">At $1.2M, photocopy breach proves costly</a></p><p><a href="https://twitter.com/todayininfosec/status/1294252352191565824">https://twitter.com/todayininfosec/status/1294252352191565824</a>  </p><p>17th August 2005: Jason Smathers, a former employee of AOL, was sentenced to 15 months in prison for selling screen names and email addresses of 92 million users to spammers.</p><p><a href="https://www.nbcnews.com/id/wbna8985989">Ex-AOL worker who stole e-mail list sentenced</a></p><p><a href="https://www.networkcomputing.com/networking/jason-smathers-internet-criminal">Jason Smathers: Internet Criminal</a></p><p><a href="https://twitter.com/todayininfosec/status/1295500512830394371">https://twitter.com/todayininfosec/status/1295500512830394371</a></p><p> </p><p><i><strong>The Box</strong></i> incidental music © Charlie Langford</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/you-can-post-linkedin-jobs-as-almost-any-employer-so-can-attackers/">You can post LinkedIn jobs as almost ANY employer — so can attackers</a></p><p>Anyone can create a job listing on the leading recruitment platform LinkedIn on behalf of just about any employer—no verification needed.</p><p>And worse, the employer cannot easily take these down.</p><p>Now, that might be nothing new, but the feature and lax verification on career websites pave the ways for attackers to post bogus listings for malicious purposes.</p><p>The attackers can, for example, use this social engineering tactic to collect personal information and resumes from professionals who believe they are applying to a legitimate company, without realizing their data may be sold or used for phishing scams.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://apple.news/APB74OhpkQgCy8QKIUPw47g">Woman accessed ex-partner’s Alexa to torment his new girlfriend</a></p><p>Philippa Copleston-Warren terrified love rival by using smart device to switch lights on and off and tell her to get out of the house</p><p><a href="https://www.standard.co.uk/news/crime/alexa-chelsea-lincolnshire-facebook-nude-picture-b951057.html">Chelsea woman used Alexa to scold ex-lover’s new girlfriend</a></p><p>A management consultant from west London accessed the Alexa device at her ex-boyfriend’s home from more than 100 miles away to tell his new partner to get out of the house.</p><p>Philippa Copleston-Warren, 46, logged into an app linked to smart devices in the victim’s Lincolnshire home, and was able to see her ex’s new girlfriend on the property’s CCTV system.</p><p>Prosecutors said Copleston-Warren was able to tell the woman “to get out” and used the app to turn the bedside lights on and off.</p><p>At Isleworth crown court, Copelston-Warren admitted posting a naked photo of her ex-boyfriend on Facebook, accompanying it with the caption: “Do I look fat??? My daily question”.</p><p>[That was this weeks BILLY BIG BALLS]</p><p>[SEEN ON REDDIT] Thom:</p><p><a href="https://www.vice.com/en/article/epn8j4/antivax-semen-fertility-covid-vaccine-safe">Antivaxers Think Their ‘Pure’ Semen Will Skyrocket in Value</a></p><p><a href="https://archive.is/s2DeE">I’m going to retire as a “cum cow”</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/jigsaw-puzzle-phishing-attacks/">"Jigsaw Puzzle" Phishing Attacks Use Morse Code to Hide</a></p><p><a href="https://www.infosecurity-magazine.com/news/cadbury-campaigns-against/">Cadbury Campaigns Against Cyber-bullying</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigured-server-leaks-us/">Misconfigured Server Leaks US Terror Watchlist</a></p><p><a href="https://www.infosecurity-magazine.com/news/yik-yak-returns/">Yik Yak Returns</a></p><p><a href="https://www.infosecurity-magazine.com/news/airline-employee-spent-passengers/">Airline Employee Jailed for Spending Passengers’ Money</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-49-million-customers-breach/">T-Mobile: 49 Million Customers Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/jpmorgan-chase-notifies-customers/">JPMorgan Chase Notifies Customers of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/coin-ninja-ceo-operated-helix-grams/">Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer</a></p><p><a href="https://www.infosecurity-magazine.com/news/women-charged-over-newstar/">Women Charged Over Sexually Exploitative Child Modeling Sites</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/E-0How78RjvTKNtEAZES391YpJqIlOD0ZbnKkCeFGCYAguIec4v0rKVw5JCS_Y_lNbz6U5rDuIuGShGJxXMkCWIBPv6CCaLtOdKVPLROI0SQwPHYExPyMIBeyt37X86nPn7KTNkl" /><p><a href="https://twitter.com/Kaipo_Rozwolf/status/1428426623091724289">https://twitter.com/Kaipo_Rozwolf/status/1428426623091724289</a></p><p><a href="https://variety.com/2021/digital/news/onlyfans-ban-pornography-sexually-explicit-1235044904/amp/?__twitter_impression=true">OnlyFans Will Ban Pornography Starting in October, Citing Need to Comply With Financial Partners</a></p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 20 Aug 2021 12:46:57 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-69-think-of-a-number-bill-and-ted-prwHlZGJ</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>14th August 2013: Affinity Health Plan was fined $1,215,780 for a HIPAA violation after a photocopier purchased by CBS for an investigatory report in 2010 revealed medical info.</p><p><a href="https://www.healthcareitnews.com/news/12m-photocopy-breach-proves-costly">At $1.2M, photocopy breach proves costly</a></p><p><a href="https://twitter.com/todayininfosec/status/1294252352191565824">https://twitter.com/todayininfosec/status/1294252352191565824</a>  </p><p>17th August 2005: Jason Smathers, a former employee of AOL, was sentenced to 15 months in prison for selling screen names and email addresses of 92 million users to spammers.</p><p><a href="https://www.nbcnews.com/id/wbna8985989">Ex-AOL worker who stole e-mail list sentenced</a></p><p><a href="https://www.networkcomputing.com/networking/jason-smathers-internet-criminal">Jason Smathers: Internet Criminal</a></p><p><a href="https://twitter.com/todayininfosec/status/1295500512830394371">https://twitter.com/todayininfosec/status/1295500512830394371</a></p><p> </p><p><i><strong>The Box</strong></i> incidental music © Charlie Langford</p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/you-can-post-linkedin-jobs-as-almost-any-employer-so-can-attackers/">You can post LinkedIn jobs as almost ANY employer — so can attackers</a></p><p>Anyone can create a job listing on the leading recruitment platform LinkedIn on behalf of just about any employer—no verification needed.</p><p>And worse, the employer cannot easily take these down.</p><p>Now, that might be nothing new, but the feature and lax verification on career websites pave the ways for attackers to post bogus listings for malicious purposes.</p><p>The attackers can, for example, use this social engineering tactic to collect personal information and resumes from professionals who believe they are applying to a legitimate company, without realizing their data may be sold or used for phishing scams.</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://apple.news/APB74OhpkQgCy8QKIUPw47g">Woman accessed ex-partner’s Alexa to torment his new girlfriend</a></p><p>Philippa Copleston-Warren terrified love rival by using smart device to switch lights on and off and tell her to get out of the house</p><p><a href="https://www.standard.co.uk/news/crime/alexa-chelsea-lincolnshire-facebook-nude-picture-b951057.html">Chelsea woman used Alexa to scold ex-lover’s new girlfriend</a></p><p>A management consultant from west London accessed the Alexa device at her ex-boyfriend’s home from more than 100 miles away to tell his new partner to get out of the house.</p><p>Philippa Copleston-Warren, 46, logged into an app linked to smart devices in the victim’s Lincolnshire home, and was able to see her ex’s new girlfriend on the property’s CCTV system.</p><p>Prosecutors said Copleston-Warren was able to tell the woman “to get out” and used the app to turn the bedside lights on and off.</p><p>At Isleworth crown court, Copelston-Warren admitted posting a naked photo of her ex-boyfriend on Facebook, accompanying it with the caption: “Do I look fat??? My daily question”.</p><p>[That was this weeks BILLY BIG BALLS]</p><p>[SEEN ON REDDIT] Thom:</p><p><a href="https://www.vice.com/en/article/epn8j4/antivax-semen-fertility-covid-vaccine-safe">Antivaxers Think Their ‘Pure’ Semen Will Skyrocket in Value</a></p><p><a href="https://archive.is/s2DeE">I’m going to retire as a “cum cow”</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/jigsaw-puzzle-phishing-attacks/">"Jigsaw Puzzle" Phishing Attacks Use Morse Code to Hide</a></p><p><a href="https://www.infosecurity-magazine.com/news/cadbury-campaigns-against/">Cadbury Campaigns Against Cyber-bullying</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigured-server-leaks-us/">Misconfigured Server Leaks US Terror Watchlist</a></p><p><a href="https://www.infosecurity-magazine.com/news/yik-yak-returns/">Yik Yak Returns</a></p><p><a href="https://www.infosecurity-magazine.com/news/airline-employee-spent-passengers/">Airline Employee Jailed for Spending Passengers’ Money</a></p><p><a href="https://www.infosecurity-magazine.com/news/tmobile-49-million-customers-breach/">T-Mobile: 49 Million Customers Hit by Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/jpmorgan-chase-notifies-customers/">JPMorgan Chase Notifies Customers of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/coin-ninja-ceo-operated-helix-grams/">Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer</a></p><p><a href="https://www.infosecurity-magazine.com/news/women-charged-over-newstar/">Women Charged Over Sexually Exploitative Child Modeling Sites</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/E-0How78RjvTKNtEAZES391YpJqIlOD0ZbnKkCeFGCYAguIec4v0rKVw5JCS_Y_lNbz6U5rDuIuGShGJxXMkCWIBPv6CCaLtOdKVPLROI0SQwPHYExPyMIBeyt37X86nPn7KTNkl" /><p><a href="https://twitter.com/Kaipo_Rozwolf/status/1428426623091724289">https://twitter.com/Kaipo_Rozwolf/status/1428426623091724289</a></p><p><a href="https://variety.com/2021/digital/news/onlyfans-ban-pornography-sexually-explicit-1235044904/amp/?__twitter_impression=true">OnlyFans Will Ban Pornography Starting in October, Citing Need to Comply With Financial Partners</a></p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56924694" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f233a312-3146-4e27-922f-c32015858705/audio/2136329e-4793-4225-8b17-d30e0b54d9af/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 69 - Think of a Number Bill and Ted</itunes:title>
      <itunes:author>Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:duration>00:59:18</itunes:duration>
      <itunes:summary>This week in Infosec reminds us of the dangers of leasing equipment,

Rant of the week is offering you a job...,

Billy Big Balls gives a scary insight into the houses of the rich and famous,

Seen on Reddit brings us commentary from peak Reddit,

Industry News brings us the latest and greatest security news stories from around the world,

And

Tweet of the Week this week shows us we don’t learn from history. 
</itunes:summary>
      <itunes:subtitle>This week in Infosec reminds us of the dangers of leasing equipment,

Rant of the week is offering you a job...,

Billy Big Balls gives a scary insight into the houses of the rich and famous,

Seen on Reddit brings us commentary from peak Reddit,

Industry News brings us the latest and greatest security news stories from around the world,

And

Tweet of the Week this week shows us we don’t learn from history. 
</itunes:subtitle>
      <itunes:keywords>ant-vaxxer, non-gmo cum, podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f127bd58-c9d4-4c66-9c75-2ac6bf972a03</guid>
      <title>Episode 68 - One More Show Until Dinner</title>
      <description><![CDATA[<p><strong>This Week in Infosec</strong> (14:29)</p><p>With content liberated from the “today in infosec” Twitter account</p><p>10th August 2001: A Japanese woman, Kumiyo Kishi, was arrested for accessing her coworker's email account, then contacting the user's ISP to regain access after the coworker changed their password.</p><p><a href="https://www.theregister.com/2001/08/10/japan_arrests_woman_for_email/">Japan arrests woman for email snooping</a></p><p><a href="https://twitter.com/todayininfosec/status/1425123899474423811">https://twitter.com/todayininfosec/status/1425123899474423811</a></p><p> </p><p>7th August 2010: Terry Childs was sentenced to 4 years in prison for network tampering after refusing to hand over network passwords to his supervisor. He was later ordered to pay nearly $1.5 million in restitution. </p><p><a href="https://www.sfgate.com/bayarea/article/S-F-computer-whiz-Childs-gets-4-year-sentence-3178759.php">S.F. computer whiz Childs gets 4-year sentence</a></p><p><a href="http://web.archive.org/web/20100503075613/http://www.cio.com.au/article/255165/sorting_facts_terry_childs_case?fp=&fpid=&pf=1">Sorting out the facts in the Terry Childs case</a></p><p><a href="https://twitter.com/todayininfosec/status/1291377901456232448">https://twitter.com/todayininfosec/status/1291377901456232448</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong> (28:34)</p><p><a href="https://twitter.com/J4vv4D/status/1425381977482539008?s=20">https://twitter.com/J4vv4D/status/1425381977482539008?s=20</a></p><p>My scooter was stolen last week. Unknown to the thief, I hid two Airtags inside it. I was able to use the Apple Find My network and UWB direction finding to recover the scooter today. Here’s how it all went down: - Dan Guido</p><img src="https://lh6.googleusercontent.com/cNkQp05IqkAhTD9dsYCLl2Ghn9TW-dG5LiMqnOqFDPhb6qgWkRF7c938YyYJq6psiNCmtCoCbqkoUkodZOhqaFBXw5BK_mqxlRnmpBMtn5xZ0SFDvx0h2COpHGAQOHlw_8FkewEE" /><p> </p><p><strong>Industry News </strong>(38:51)</p><p><a href="https://www.infosecurity-magazine.com/news/disney-employees-arrested-in-child/">Disney Employees Among Those Arrested in Child Abuse Sting</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-three-random-words-passwords/">NCSC Sticks by 'Three Random Words' Strategy for Passwords</a></p><p><a href="https://www.infosecurity-magazine.com/news/martial-arts-instructor-accused-of/">Martial Arts Instructor Accused of Spying on Students</a></p><p><a href="https://www.infosecurity-magazine.com/news/fraudsters-dpd-smishing-scam/">Fraudsters Impersonate DPD in "Convincing" New Smishing Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/hoc-cyber-training-matt-hancock/">House of Commons (HoC) Beefs up Cyber Training Following Matt Hancock CCTV Leak Scandal</a></p><p><a href="https://www.infosecurity-magazine.com/news/unc215-targeted-israeli-government/">Chinese Espionage Group UNC215 Targeted Israeli Government Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/salesforce-expose-business/">Salesforce Communities Could Expose Business-Sensitive Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-600-million-stolen-biggest/">Over $600 Million Stolen in Biggest Ever Cryptocurrency Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/accenture-tied-up-in-50m-ransom/">Accenture Tied Up in $50M Ransom Lockbit 2.0 Attack</a></p><p> </p><p><strong>Tweet of the Week</strong> (46:45)</p><img src="https://lh4.googleusercontent.com/GaMiFf-QTCN9sfyujQ0mLK4uEkK1ODov9BMX5bTpAZ7Pm-5uM9dCjrMWYdVORL9yihn2ZeQGO6iJv-OOi5yyI5Ye8hs_lZS7eL2xnydCXUAjrEhDiH6p7EL5zqc-8h3_WGTq-IyF" /><p><a href="https://twitter.com/runasand/status/1423810127451365382?s=20">https://twitter.com/runasand/status/1423810127451365382?s=20</a></p><p>Looks like pornhub is always bending over backwards, doing far more than any other social media platform</p><p><a href="https://www.vice.com/en/article/v7m7k8/pornhub-banned-uploads-policy-change">In a Huge Policy Shift, Pornhub Bans Unverified Uploads</a></p><p> </p><p><i><strong>The Box</strong></i> incidental music © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 13 Aug 2021 13:35:26 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-68-one-more-show-until-dinner-ufJIAzIc</link>
      <content:encoded><![CDATA[<p><strong>This Week in Infosec</strong> (14:29)</p><p>With content liberated from the “today in infosec” Twitter account</p><p>10th August 2001: A Japanese woman, Kumiyo Kishi, was arrested for accessing her coworker's email account, then contacting the user's ISP to regain access after the coworker changed their password.</p><p><a href="https://www.theregister.com/2001/08/10/japan_arrests_woman_for_email/">Japan arrests woman for email snooping</a></p><p><a href="https://twitter.com/todayininfosec/status/1425123899474423811">https://twitter.com/todayininfosec/status/1425123899474423811</a></p><p> </p><p>7th August 2010: Terry Childs was sentenced to 4 years in prison for network tampering after refusing to hand over network passwords to his supervisor. He was later ordered to pay nearly $1.5 million in restitution. </p><p><a href="https://www.sfgate.com/bayarea/article/S-F-computer-whiz-Childs-gets-4-year-sentence-3178759.php">S.F. computer whiz Childs gets 4-year sentence</a></p><p><a href="http://web.archive.org/web/20100503075613/http://www.cio.com.au/article/255165/sorting_facts_terry_childs_case?fp=&fpid=&pf=1">Sorting out the facts in the Terry Childs case</a></p><p><a href="https://twitter.com/todayininfosec/status/1291377901456232448">https://twitter.com/todayininfosec/status/1291377901456232448</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong> (28:34)</p><p><a href="https://twitter.com/J4vv4D/status/1425381977482539008?s=20">https://twitter.com/J4vv4D/status/1425381977482539008?s=20</a></p><p>My scooter was stolen last week. Unknown to the thief, I hid two Airtags inside it. I was able to use the Apple Find My network and UWB direction finding to recover the scooter today. Here’s how it all went down: - Dan Guido</p><img src="https://lh6.googleusercontent.com/cNkQp05IqkAhTD9dsYCLl2Ghn9TW-dG5LiMqnOqFDPhb6qgWkRF7c938YyYJq6psiNCmtCoCbqkoUkodZOhqaFBXw5BK_mqxlRnmpBMtn5xZ0SFDvx0h2COpHGAQOHlw_8FkewEE" /><p> </p><p><strong>Industry News </strong>(38:51)</p><p><a href="https://www.infosecurity-magazine.com/news/disney-employees-arrested-in-child/">Disney Employees Among Those Arrested in Child Abuse Sting</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-three-random-words-passwords/">NCSC Sticks by 'Three Random Words' Strategy for Passwords</a></p><p><a href="https://www.infosecurity-magazine.com/news/martial-arts-instructor-accused-of/">Martial Arts Instructor Accused of Spying on Students</a></p><p><a href="https://www.infosecurity-magazine.com/news/fraudsters-dpd-smishing-scam/">Fraudsters Impersonate DPD in "Convincing" New Smishing Scam</a></p><p><a href="https://www.infosecurity-magazine.com/news/hoc-cyber-training-matt-hancock/">House of Commons (HoC) Beefs up Cyber Training Following Matt Hancock CCTV Leak Scandal</a></p><p><a href="https://www.infosecurity-magazine.com/news/unc215-targeted-israeli-government/">Chinese Espionage Group UNC215 Targeted Israeli Government Networks</a></p><p><a href="https://www.infosecurity-magazine.com/news/salesforce-expose-business/">Salesforce Communities Could Expose Business-Sensitive Information</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-600-million-stolen-biggest/">Over $600 Million Stolen in Biggest Ever Cryptocurrency Theft</a></p><p><a href="https://www.infosecurity-magazine.com/news/accenture-tied-up-in-50m-ransom/">Accenture Tied Up in $50M Ransom Lockbit 2.0 Attack</a></p><p> </p><p><strong>Tweet of the Week</strong> (46:45)</p><img src="https://lh4.googleusercontent.com/GaMiFf-QTCN9sfyujQ0mLK4uEkK1ODov9BMX5bTpAZ7Pm-5uM9dCjrMWYdVORL9yihn2ZeQGO6iJv-OOi5yyI5Ye8hs_lZS7eL2xnydCXUAjrEhDiH6p7EL5zqc-8h3_WGTq-IyF" /><p><a href="https://twitter.com/runasand/status/1423810127451365382?s=20">https://twitter.com/runasand/status/1423810127451365382?s=20</a></p><p>Looks like pornhub is always bending over backwards, doing far more than any other social media platform</p><p><a href="https://www.vice.com/en/article/v7m7k8/pornhub-banned-uploads-policy-change">In a Huge Policy Shift, Pornhub Bans Unverified Uploads</a></p><p> </p><p><i><strong>The Box</strong></i> incidental music © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57566679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0e0232c1-4019-4acf-bb2f-9feca1a436bb/audio/895e60a4-3243-4a3a-9ed3-2c6a64b9769c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 68 - One More Show Until Dinner</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f9e87f1c-0caf-4127-8c39-c0d7a844bed3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:58</itunes:duration>
      <itunes:summary>This week in Infosec warns of when Sys Admin’s go rogue,

Rant of the week is MIA this week,

Billy Big Balls gives us a blow by blow account of scooter theft and recovery,

Industry News brings us the latest and greatest security news stories from around the world,

And

Tweet of the week shows Apple possibly tripping up on their own shoelaces.
</itunes:summary>
      <itunes:subtitle>This week in Infosec warns of when Sys Admin’s go rogue,

Rant of the week is MIA this week,

Billy Big Balls gives us a blow by blow account of scooter theft and recovery,

Industry News brings us the latest and greatest security news stories from around the world,

And

Tweet of the week shows Apple possibly tripping up on their own shoelaces.
</itunes:subtitle>
      <itunes:keywords>airtag, podcast, mayor of san francisco, e-scooter, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59842696-5a70-4b5b-bb76-48c427c2bd0a</guid>
      <title>Episode 67 - A Total Car Crash</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (07:40) </strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>30th July 2013: Chelsea Manning (their name was Bradley Manning at the time) was found guilty of espionage, theft, and computer fraud, as well as military infractions.</p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Manning">United States v Manning</a></p><p><a href="https://twitter.com/todayininfosec/status/1421171398656024587">https://twitter.com/todayininfosec/status/1421171398656024587</a></p><p> </p><p>3rd August 2007: Reporter Michelle Madigan (Associate Producer of Dateline NBC) went undercover at DEF CON with a hidden camera to try to get attendees to confess to crimes, was outed by<a href="https://twitter.com/thedarktangent"> @thedarktangent</a>, and bolted from the venue chased by a pack of 150 people. </p><p><a href="https://www.wired.com/2007/08/media-mole-at-d/">Dateline Mole Allegedly at DefCon with Hidden Camera</a></p><p><a href="https://youtu.be/3n2cBSBIAP0">An undercover Dateline NBC reporter flees the Defcon</a> (Video)</p><p><a href="https://twitter.com/todayininfosec/status/1422682529220472833">https://twitter.com/todayininfosec/status/1422682529220472833</a></p><p> </p><p><strong>Rant of the Week (18:42)</strong></p><p><a href="https://www.reddit.com/r/ukpolitics/comments/ox5tke/three_senior_tories_have_now_either_replaced_a/?utm_source=share&utm_medium=ios_app&utm_name=iossmf">UK Politicians are apparently very unlucky with their IT equipment, especially when they need to be investigated</a>.</p><p> </p><p><strong>Billy Big Balls of the Week (29:45)</strong></p><p><a href="https://twitter.com/matthew_d_green/status/1423109002280513540?s=20">Apple snooping on your pics</a></p><p>https://twitter.com/matthew_d_green/status/1423109002280513540?s=20</p><p> </p><p><strong>Industry News (41:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-seeks-espionage-retrial-for/">US Seeks Espionage Retrial for Chinese Researcher</a></p><p><a href="https://www.infosecurity-magazine.com/news/zoom-pays-85m-to-settle-privacy/">Zoom Pays $85m to Settle Privacy Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-senate-seven-agencies-failing/">US Senate: Seven out of Eight Agencies Are Failing on Cyber</a></p><p><a href="https://www.infosecurity-magazine.com/news/son-charged-in-murder-of/">Son Charged in Murder of Cybersecurity ‘Genius’</a></p><p><a href="https://www.infosecurity-magazine.com/news/mod-ethical-hacker-project/">MoD Boosts Cyber-Resilience with Ethical Hacker Project</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-60-million-americans/">Over 60 Million Americans Exposed Through Misconfigured Database</a></p><p><a href="https://www.infosecurity-magazine.com/news/web-shells-digital-extortion/">Web Shells and Digital Extortion Drive Triple-Digit Growth in Cyber-Intrusions</a></p><p><a href="https://www.infosecurity-magazine.com/news/decade-old-router-bug-affect/">Decade-Old Router Bug Could Affect Millions of Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-ransomware-ban-no-match/">Cybercrime Ransomware 'Ban' is No Match for Threat Actors</a></p><p> </p><p><strong>Tweet of the Week (54:52)</strong></p><img src="https://lh3.googleusercontent.com/fUJZPN99U7n2TZmGbU1vjvRkBHfUlYhIq8bSzPMm86NtZbAp3Kbz68WHQV-ErC6IjKOoAvb2V7BsxK4KB01p63GNQnn-N81bhvBR3SdfFLiLTGu4HOjkvJErzP-I8tt22CPacrhA" /><p><a href="https://twitter.com/iamdevloper/status/1423219304435228676?s=21">https://twitter.com/iamdevloper/status/1423219304435228676?s=21</a></p><p> </p><p>"The Box" Incidental Music ©Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 6 Aug 2021 11:58:40 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew. Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-67-a-total-car-crash-QyE0PsjK</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (07:40) </strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>30th July 2013: Chelsea Manning (their name was Bradley Manning at the time) was found guilty of espionage, theft, and computer fraud, as well as military infractions.</p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Manning">United States v Manning</a></p><p><a href="https://twitter.com/todayininfosec/status/1421171398656024587">https://twitter.com/todayininfosec/status/1421171398656024587</a></p><p> </p><p>3rd August 2007: Reporter Michelle Madigan (Associate Producer of Dateline NBC) went undercover at DEF CON with a hidden camera to try to get attendees to confess to crimes, was outed by<a href="https://twitter.com/thedarktangent"> @thedarktangent</a>, and bolted from the venue chased by a pack of 150 people. </p><p><a href="https://www.wired.com/2007/08/media-mole-at-d/">Dateline Mole Allegedly at DefCon with Hidden Camera</a></p><p><a href="https://youtu.be/3n2cBSBIAP0">An undercover Dateline NBC reporter flees the Defcon</a> (Video)</p><p><a href="https://twitter.com/todayininfosec/status/1422682529220472833">https://twitter.com/todayininfosec/status/1422682529220472833</a></p><p> </p><p><strong>Rant of the Week (18:42)</strong></p><p><a href="https://www.reddit.com/r/ukpolitics/comments/ox5tke/three_senior_tories_have_now_either_replaced_a/?utm_source=share&utm_medium=ios_app&utm_name=iossmf">UK Politicians are apparently very unlucky with their IT equipment, especially when they need to be investigated</a>.</p><p> </p><p><strong>Billy Big Balls of the Week (29:45)</strong></p><p><a href="https://twitter.com/matthew_d_green/status/1423109002280513540?s=20">Apple snooping on your pics</a></p><p>https://twitter.com/matthew_d_green/status/1423109002280513540?s=20</p><p> </p><p><strong>Industry News (41:04)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-seeks-espionage-retrial-for/">US Seeks Espionage Retrial for Chinese Researcher</a></p><p><a href="https://www.infosecurity-magazine.com/news/zoom-pays-85m-to-settle-privacy/">Zoom Pays $85m to Settle Privacy Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-senate-seven-agencies-failing/">US Senate: Seven out of Eight Agencies Are Failing on Cyber</a></p><p><a href="https://www.infosecurity-magazine.com/news/son-charged-in-murder-of/">Son Charged in Murder of Cybersecurity ‘Genius’</a></p><p><a href="https://www.infosecurity-magazine.com/news/mod-ethical-hacker-project/">MoD Boosts Cyber-Resilience with Ethical Hacker Project</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-60-million-americans/">Over 60 Million Americans Exposed Through Misconfigured Database</a></p><p><a href="https://www.infosecurity-magazine.com/news/web-shells-digital-extortion/">Web Shells and Digital Extortion Drive Triple-Digit Growth in Cyber-Intrusions</a></p><p><a href="https://www.infosecurity-magazine.com/news/decade-old-router-bug-affect/">Decade-Old Router Bug Could Affect Millions of Devices</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-ransomware-ban-no-match/">Cybercrime Ransomware 'Ban' is No Match for Threat Actors</a></p><p> </p><p><strong>Tweet of the Week (54:52)</strong></p><img src="https://lh3.googleusercontent.com/fUJZPN99U7n2TZmGbU1vjvRkBHfUlYhIq8bSzPMm86NtZbAp3Kbz68WHQV-ErC6IjKOoAvb2V7BsxK4KB01p63GNQnn-N81bhvBR3SdfFLiLTGu4HOjkvJErzP-I8tt22CPacrhA" /><p><a href="https://twitter.com/iamdevloper/status/1423219304435228676?s=21">https://twitter.com/iamdevloper/status/1423219304435228676?s=21</a></p><p> </p><p>"The Box" Incidental Music ©Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56520527" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/689e383c-c40f-48f4-ba50-0b60f8c20b59/audio/4d2b63b9-8796-46ce-a0f7-2c8a01d815bb/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 67 - A Total Car Crash</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew. Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/88c7571d-e973-4fad-a0ad-c6d25df7ea18/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:52</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a time when the hunter became the hunted on the streets of Las Vegas

Billy Big Balls shows 

Industry News is back home and continues to bring us the latest and greatest security news stories from the around the world

Rant of the week tells just how unlucky some UK politicians are

And

Tweet of the week shows us how the best intentions of a hobby can lead to a professional career
</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a time when the hunter became the hunted on the streets of Las Vegas

Billy Big Balls shows 

Industry News is back home and continues to bring us the latest and greatest security news stories from the around the world

Rant of the week tells just how unlucky some UK politicians are

And

Tweet of the week shows us how the best intentions of a hobby can lead to a professional career
</itunes:subtitle>
      <itunes:keywords>podcast, apple, host unknown, tory surveillance</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f41e8d8a-d795-4b1b-9dbd-a5e01c28cf68</guid>
      <title>Episode 66 - Our Time to Shine</title>
      <description><![CDATA[<p><strong>This week in Infosec (06:42)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>27th July 1979: The first edition of Computer Security was published. It was written by David K. Hsiao, Douglas S. Kerr, and Stuart E. Madnick.</p><p>And to think, some of you probably are surprised there were computers in 1979, never mind computer security!</p><p><a href="https://www.elsevier.com/books/computer-security/hsiao/978-0-12-357650-7">Computer Security 1st Edition</a></p><p><a href="https://twitter.com/todayininfosec/status/1420498414874370049">https://twitter.com/todayininfosec/status/1420498414874370049</a></p><p> </p><p>28th July 1997: Tfreak (Dan Moschuk) released his program, smurf, a decision he later regarded as questionable. </p><p>Exactly one year after he retired smurf in 1997, Tfreak published (papa)smurf.c v5.0, a new hybrid DoS attack based on Smurf and Fraggle. </p><p><a href="https://packetstormsecurity.com/files/15266/papasmurf.c.html">(papa)smurf.c v5.0 - New hybrid DoS attack based on smurf and fraggle</a></p><p> </p><p><strong>Rant of the Week (23:23) </strong></p><p><a href="https://twitter.com/shanselman/status/1420800992388415491">https://twitter.com/shanselman/status/1420800992388415491</a></p><img src="https://lh6.googleusercontent.com/b31NHUoUMXTc6n7H7QjZSHMH8TtkgpZvuLUVtvXlXtJcSBhzWqtDp09hHns8OKzQHSoiceWT6ixr_zW4xhH6njvULLheI0-veZKiXavud9apWpglPab_vA9A57TdIyXUQRDbsk-L" /><p><a href="https://www.idtheftcenter.org/google-voice-scam-tries-to-trick-you-while-you-are-selling-items-online/">https://www.idtheftcenter.org/google-voice-scam-tries-to-trick-you-while-you-are-selling-items-online/</a></p><p> </p><p><strong>Billy Big Balls of the Week (32.25)</strong><br />The Tech Support Scams YouTube channel has been erased from existence in a blaze of irony as host and creator Jim Browning fell victim to a tech support scam that convinced him to secure his account – by deleting it.</p><p><br /><a href="https://www.theregister.com/2021/07/27/youtube_channel_tech_scam/">Scamming the scam scammer</a></p><p> </p><p><strong>Industry News (40:40)</strong></p><p><a href="https://www.theregister.com/2021/07/27/apple_patches_zeroday/">Apple patches zero-day vulnerability in iOS, iPadOS, macOS under active attack</a></p><p><a href="https://www.theregister.com/2021/07/27/uk_security_breach_reporting_law_thresholds/">Tech biz must tell us about more security breaches, says UK.gov as it ponders lowering report thresholds</a></p><p><a href="https://www.computerweekly.com/news/252504531/ICO-ends-its-involvement-in-dispute-between-NatWest-Bank-and-data-breach-whistleblower">ICO ends its involvement in dispute between NatWest Bank and data breach whistleblower</a></p><p><a href="https://www.theregister.com/2021/07/28/ebay_security_prison/">eBay ex-security boss sent down for 18 months for cyber-stalking, witness tampering</a></p><p><a href="https://www.theregister.com/2021/07/28/flirty_scouse_fitness_instructor_actually_iranian_spy/">Iranian state-backed hackers posed as flirty Scouser called Marcy to target workers in defence and aerospace</a></p><p><a href="https://www.theregister.com/2021/07/29/biden_memo_on_critical_infrastructure_control_systems_security/">'Woefully insufficient': Biden administration's assessment of critical infrastructure infosec protection</a></p><p><a href="https://www.theregister.com/2021/07/29/israel_probes_nso_group/">Israeli authorities investigate NSO Group over Pegasus spyware abuse claims</a></p><p><a href="https://www.theregister.com/2021/07/29/android_privacy_changes/">Upcoming Android privacy changes include ability to blank advertising ID, and 'safety section' in Play store</a></p><p><a href="https://www.theregister.com/2021/07/29/mailgun_chipotle_malware_spam/">Spam is Chipotle's secret ingredient: Marketing email hijacked to dish up malware</a></p><p> </p><p><strong>Tweet of the Week (55:24)</strong></p><img src="https://lh6.googleusercontent.com/G6M_e7lS277CRIpCR0tw4ZW8uy2CiSCTcuqKVFWLrgP31hBVyxTAjjkAYNLX3ucJ9lxUlAOpI4ORDB3HsDx-Ti8NFQ_VGcTACzDw5djnBeOF-tfJtA4_Kdj5CVMeEWUwnUzwnFNf" /><p><a href="https://twitter.com/bryanl/status/1420925333864386562">https://twitter.com/bryanl/status/1420925333864386562</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 Jul 2021 16:16:53 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-66-our-time-to-shine-AGv8Tedp</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec (06:42)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>27th July 1979: The first edition of Computer Security was published. It was written by David K. Hsiao, Douglas S. Kerr, and Stuart E. Madnick.</p><p>And to think, some of you probably are surprised there were computers in 1979, never mind computer security!</p><p><a href="https://www.elsevier.com/books/computer-security/hsiao/978-0-12-357650-7">Computer Security 1st Edition</a></p><p><a href="https://twitter.com/todayininfosec/status/1420498414874370049">https://twitter.com/todayininfosec/status/1420498414874370049</a></p><p> </p><p>28th July 1997: Tfreak (Dan Moschuk) released his program, smurf, a decision he later regarded as questionable. </p><p>Exactly one year after he retired smurf in 1997, Tfreak published (papa)smurf.c v5.0, a new hybrid DoS attack based on Smurf and Fraggle. </p><p><a href="https://packetstormsecurity.com/files/15266/papasmurf.c.html">(papa)smurf.c v5.0 - New hybrid DoS attack based on smurf and fraggle</a></p><p> </p><p><strong>Rant of the Week (23:23) </strong></p><p><a href="https://twitter.com/shanselman/status/1420800992388415491">https://twitter.com/shanselman/status/1420800992388415491</a></p><img src="https://lh6.googleusercontent.com/b31NHUoUMXTc6n7H7QjZSHMH8TtkgpZvuLUVtvXlXtJcSBhzWqtDp09hHns8OKzQHSoiceWT6ixr_zW4xhH6njvULLheI0-veZKiXavud9apWpglPab_vA9A57TdIyXUQRDbsk-L" /><p><a href="https://www.idtheftcenter.org/google-voice-scam-tries-to-trick-you-while-you-are-selling-items-online/">https://www.idtheftcenter.org/google-voice-scam-tries-to-trick-you-while-you-are-selling-items-online/</a></p><p> </p><p><strong>Billy Big Balls of the Week (32.25)</strong><br />The Tech Support Scams YouTube channel has been erased from existence in a blaze of irony as host and creator Jim Browning fell victim to a tech support scam that convinced him to secure his account – by deleting it.</p><p><br /><a href="https://www.theregister.com/2021/07/27/youtube_channel_tech_scam/">Scamming the scam scammer</a></p><p> </p><p><strong>Industry News (40:40)</strong></p><p><a href="https://www.theregister.com/2021/07/27/apple_patches_zeroday/">Apple patches zero-day vulnerability in iOS, iPadOS, macOS under active attack</a></p><p><a href="https://www.theregister.com/2021/07/27/uk_security_breach_reporting_law_thresholds/">Tech biz must tell us about more security breaches, says UK.gov as it ponders lowering report thresholds</a></p><p><a href="https://www.computerweekly.com/news/252504531/ICO-ends-its-involvement-in-dispute-between-NatWest-Bank-and-data-breach-whistleblower">ICO ends its involvement in dispute between NatWest Bank and data breach whistleblower</a></p><p><a href="https://www.theregister.com/2021/07/28/ebay_security_prison/">eBay ex-security boss sent down for 18 months for cyber-stalking, witness tampering</a></p><p><a href="https://www.theregister.com/2021/07/28/flirty_scouse_fitness_instructor_actually_iranian_spy/">Iranian state-backed hackers posed as flirty Scouser called Marcy to target workers in defence and aerospace</a></p><p><a href="https://www.theregister.com/2021/07/29/biden_memo_on_critical_infrastructure_control_systems_security/">'Woefully insufficient': Biden administration's assessment of critical infrastructure infosec protection</a></p><p><a href="https://www.theregister.com/2021/07/29/israel_probes_nso_group/">Israeli authorities investigate NSO Group over Pegasus spyware abuse claims</a></p><p><a href="https://www.theregister.com/2021/07/29/android_privacy_changes/">Upcoming Android privacy changes include ability to blank advertising ID, and 'safety section' in Play store</a></p><p><a href="https://www.theregister.com/2021/07/29/mailgun_chipotle_malware_spam/">Spam is Chipotle's secret ingredient: Marketing email hijacked to dish up malware</a></p><p> </p><p><strong>Tweet of the Week (55:24)</strong></p><img src="https://lh6.googleusercontent.com/G6M_e7lS277CRIpCR0tw4ZW8uy2CiSCTcuqKVFWLrgP31hBVyxTAjjkAYNLX3ucJ9lxUlAOpI4ORDB3HsDx-Ti8NFQ_VGcTACzDw5djnBeOF-tfJtA4_Kdj5CVMeEWUwnUzwnFNf" /><p><a href="https://twitter.com/bryanl/status/1420925333864386562">https://twitter.com/bryanl/status/1420925333864386562</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57566679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c9b962b8-1d45-4049-9417-76ce445a4be0/audio/617fcfa3-3346-4c1a-b32d-3839b474dd5f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 66 - Our Time to Shine</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5ddd9e9d-9f2f-4226-a34e-f24ea74ab1f8/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:58</itunes:duration>
      <itunes:summary>This week in Infosec  takes us back to a time before computers even existed, allegedly. And did you know Gargamel was actually the good guy in the Smurfs?

Billy Big Balls shows how a scam scammer got scammed

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

Rant of the week is some actual infosec consumer advice on this infosec podcast.

And

Tweet of the week shows us the future of programming and software project management, and what could possibly go wrong?
</itunes:summary>
      <itunes:subtitle>This week in Infosec  takes us back to a time before computers even existed, allegedly. And did you know Gargamel was actually the good guy in the Smurfs?

Billy Big Balls shows how a scam scammer got scammed

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

Rant of the week is some actual infosec consumer advice on this infosec podcast.

And

Tweet of the week shows us the future of programming and software project management, and what could possibly go wrong?
</itunes:subtitle>
      <itunes:keywords>most entertaining podcast, podcast, hilarious, best podcast ever, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8dda4e3-c538-41c8-b02d-ac6a41425ee5</guid>
      <title>Episode 65 - Its Too hot</title>
      <description><![CDATA[<p><strong>This week in Infosec (08:10)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th July 2001: Russian programmer Dmitry Sklyarov was arrested the day after DEF CON for writing software to decrypt Adobe's e-book format. Charges against him were later dropped and the trial against his employer resulted in not guilty verdicts. </p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Elcom_Ltd">United States v. Elcom Ltd</a>.</p><p><a href="https://twitter.com/todayininfosec/status/1416188118655459329">https://twitter.com/todayininfosec/status/1416188118655459329</a></p><p> </p><p>15th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats".</p><p><a href="https://threatpost.com/weak-passwords-banned-hotmail-071511/75437/">Weak Passwords Banned from Hotmail</a></p><p><a href="https://twitter.com/todayininfosec/status/1414330928537686021">https://twitter.com/todayininfosec/status/1414330928537686021</a></p><p> </p><p><strong>Rant of the Week (24:29)</strong></p><p><a href="https://inews.co.uk/news/technology/majority-of-britons-convinced-their-phones-and-smart-speakers-are-listening-without-being-prompted-1105602">Majority of Britons convinced their phones and smart speakers are listening without being prompted.</a></p><p> </p><p><strong>Billy Big Balls of the Week (33:48)</strong></p><p><a href="https://www.rt.com/news/529489-tank-secrets-russian-game/">Accuracy at any cost? Gamer leaks British military secrets to company founded in Russia to prove its tank model is wrong</a></p><p> </p><p><strong>Industry News (43:05)</strong></p><p><a href="https://www.theregister.com/2021/07/19/mass_misuse_of_nso_pegasus_spyware_alleged/">Amnesty International and French media protection org claim massive misuse of NSO spyware</a></p><p><a href="https://www.theregister.com/2021/07/20/campbell_law_firm_data_breach/">US legal eagles representing Apple, IBM, and more take 5 months to inform clients of ransomware data breach</a></p><p><a href="https://www.theregister.com/2021/07/20/government_launches_plans_for_digital/">Verified: UK.gov launching plans for yet another digital identity scheme</a></p><p><a href="https://www.theregister.com/2021/07/20/northern_trains_ticketing_system/">Northern Train's ticketing system out to lunch as ransomware attack shuts down servers</a></p><p><a href="https://www.theregister.com/2021/07/20/journalist_prison_offending/">Journo who went to prison for 2 years for breaking US cyber-security law is jailed again</a></p><p><a href="https://www.theregister.com/2021/07/21/twitter_arrest_spain/">Spanish cops cuff Brit bloke accused of playing role in 2020 celeb Twitter hijacking</a></p><p><a href="https://www.theregister.com/2021/07/22/nso_group_denies_everything_stops_answering_questions/">NSO Group 'will no longer be responding to inquiries' about misuse of its software</a></p><p><a href="https://www.theregister.com/2021/07/22/china_pushes_back_against_exchange/">China pushes back against Exchange attack sponsorship claims</a></p><p><a href="https://www.theregister.com/2021/07/22/thales_fingerprint_payment/">Thales launches payment card with onboard fingerprint scanner</a></p><p> </p><p><strong>Tweet of the Week (48:26)</strong></p><p><a href="https://people.com/crime/tennessee-man-dead-swatted-people-targeting-twitter-handle/">Tennessee Man Died After He Was 'Swatted' by People Targeting His Twitter Handle</a></p><p> </p><img src="https://lh3.googleusercontent.com/Zx-ttLPtj4DRh69OF4bAt6pjKGglGxdRiMD2HQTxhH68isdXx--YNWUC_9Hcw_1i_Mh4FzFtD9gIgQ6NCbuLsiyAVaKKgiA1bhF9VQsA2GxxKxlbK7Km0sfKjgvdY4JrNhG4n7dP" /><p><a href="https://twitter.com/ThomLangford/status/1416690928354463744">https://twitter.com/ThomLangford/status/1416690928354463744</a></p><p><a href="https://www.reddit.com/r/WatchPeopleDieInside/comments/nuc8xr/police_forces_in_brazil_celebrating_a_theifs_18th/">Police forces in brazil celebrating a thief's 18th birthday because they can't arrest anyone under 18</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 23 Jul 2021 15:02:12 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, \, The Late Javvad Malik, Andrew Agens)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-65-its-too-hot-XVQgixbv</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec (08:10)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>16th July 2001: Russian programmer Dmitry Sklyarov was arrested the day after DEF CON for writing software to decrypt Adobe's e-book format. Charges against him were later dropped and the trial against his employer resulted in not guilty verdicts. </p><p><a href="https://en.m.wikipedia.org/wiki/United_States_v._Elcom_Ltd">United States v. Elcom Ltd</a>.</p><p><a href="https://twitter.com/todayininfosec/status/1416188118655459329">https://twitter.com/todayininfosec/status/1416188118655459329</a></p><p> </p><p>15th July 2011: Microsoft Hotmail announced that it would be banning very common passwords such as "123456" and "ilovecats".</p><p><a href="https://threatpost.com/weak-passwords-banned-hotmail-071511/75437/">Weak Passwords Banned from Hotmail</a></p><p><a href="https://twitter.com/todayininfosec/status/1414330928537686021">https://twitter.com/todayininfosec/status/1414330928537686021</a></p><p> </p><p><strong>Rant of the Week (24:29)</strong></p><p><a href="https://inews.co.uk/news/technology/majority-of-britons-convinced-their-phones-and-smart-speakers-are-listening-without-being-prompted-1105602">Majority of Britons convinced their phones and smart speakers are listening without being prompted.</a></p><p> </p><p><strong>Billy Big Balls of the Week (33:48)</strong></p><p><a href="https://www.rt.com/news/529489-tank-secrets-russian-game/">Accuracy at any cost? Gamer leaks British military secrets to company founded in Russia to prove its tank model is wrong</a></p><p> </p><p><strong>Industry News (43:05)</strong></p><p><a href="https://www.theregister.com/2021/07/19/mass_misuse_of_nso_pegasus_spyware_alleged/">Amnesty International and French media protection org claim massive misuse of NSO spyware</a></p><p><a href="https://www.theregister.com/2021/07/20/campbell_law_firm_data_breach/">US legal eagles representing Apple, IBM, and more take 5 months to inform clients of ransomware data breach</a></p><p><a href="https://www.theregister.com/2021/07/20/government_launches_plans_for_digital/">Verified: UK.gov launching plans for yet another digital identity scheme</a></p><p><a href="https://www.theregister.com/2021/07/20/northern_trains_ticketing_system/">Northern Train's ticketing system out to lunch as ransomware attack shuts down servers</a></p><p><a href="https://www.theregister.com/2021/07/20/journalist_prison_offending/">Journo who went to prison for 2 years for breaking US cyber-security law is jailed again</a></p><p><a href="https://www.theregister.com/2021/07/21/twitter_arrest_spain/">Spanish cops cuff Brit bloke accused of playing role in 2020 celeb Twitter hijacking</a></p><p><a href="https://www.theregister.com/2021/07/22/nso_group_denies_everything_stops_answering_questions/">NSO Group 'will no longer be responding to inquiries' about misuse of its software</a></p><p><a href="https://www.theregister.com/2021/07/22/china_pushes_back_against_exchange/">China pushes back against Exchange attack sponsorship claims</a></p><p><a href="https://www.theregister.com/2021/07/22/thales_fingerprint_payment/">Thales launches payment card with onboard fingerprint scanner</a></p><p> </p><p><strong>Tweet of the Week (48:26)</strong></p><p><a href="https://people.com/crime/tennessee-man-dead-swatted-people-targeting-twitter-handle/">Tennessee Man Died After He Was 'Swatted' by People Targeting His Twitter Handle</a></p><p> </p><img src="https://lh3.googleusercontent.com/Zx-ttLPtj4DRh69OF4bAt6pjKGglGxdRiMD2HQTxhH68isdXx--YNWUC_9Hcw_1i_Mh4FzFtD9gIgQ6NCbuLsiyAVaKKgiA1bhF9VQsA2GxxKxlbK7Km0sfKjgvdY4JrNhG4n7dP" /><p><a href="https://twitter.com/ThomLangford/status/1416690928354463744">https://twitter.com/ThomLangford/status/1416690928354463744</a></p><p><a href="https://www.reddit.com/r/WatchPeopleDieInside/comments/nuc8xr/police_forces_in_brazil_celebrating_a_theifs_18th/">Police forces in brazil celebrating a thief's 18th birthday because they can't arrest anyone under 18</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57519449" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f2c6c13a-c8c8-4fca-87ff-0519c08d3bf0/audio/60a2c2bc-613e-47ff-a266-b88f6296d924/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 65 - Its Too hot</itunes:title>
      <itunes:author>Thom Langford, \, The Late Javvad Malik, Andrew Agens</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/ee2a5b69-f1e0-4177-8f86-41927641aabf/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:55</itunes:duration>
      <itunes:summary>This week in Infosec brings us another Def con related story

Billy Big Balls shows how attention to detail can put you behind bars

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

Rant of the week asks the real question we should all be asking ourselves, do the walls have ears?.

Tweet of the week is a new angle on FREEDOM!
</itunes:summary>
      <itunes:subtitle>This week in Infosec brings us another Def con related story

Billy Big Balls shows how attention to detail can put you behind bars

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

Rant of the week asks the real question we should all be asking ourselves, do the walls have ears?.

Tweet of the week is a new angle on FREEDOM!
</itunes:subtitle>
      <itunes:keywords>overslept, humour, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a22925ea-2ba1-4932-b575-8670039dea56</guid>
      <title>Episode 64 - He&apos;s Baaaaaack!</title>
      <description><![CDATA[<p><strong>This week in Infosec (10.28)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>14th July 1998: Ethereal was first released publicly as version 0.2.0. Its creator, Gerald Combs, thought it was cool that Bob Metcalfe named Ethernet after luminiferous ether so he picked a name beginning with ether. Since 2006 the network protocol analyzer has been known as Wireshark.</p><p><a href="https://twitter.com/todayininfosec/status/1415384753713340417">https://twitter.com/todayininfosec/status/1415384753713340417</a></p><p>11th July 2013: In the wake of revelations about the NSA's PRISM program, Jeff Moss (aka The Dark Tangent) asked feds not to attend DEF CON - the first time government employees were asked to stay away.</p><p><a href="https://twitter.com/todayininfosec/status/1414330928537686021">https://twitter.com/todayininfosec/status/1414330928537686021</a></p><p> </p><p><strong>Billy Big Balls of the Week (17:39)</strong></p><p>Thousands of PS4s seized in Ukraine in illegal cryptocurrency mining sting</p><p><a href="https://www.zdnet.com/article/thousands-of-ps4s-seized-in-ukraine-in-illegal-cryptocurrency-mining-sting/">https://www.zdnet.com/article/thousands-of-ps4s-seized-in-ukraine-in-illegal-cryptocurrency-mining-sting/</a></p><p> </p><p><strong>Tweet of the Week (27.57)</strong></p><p>FURY! at ICO doing their job for once.</p><p>The ICO is robustly investigating the data leak of hidden camera footage of former Health Secretary Matt Hancock breaking his own isolation and distancing rules. </p><p><a href="https://www.theregister.com/2021/07/15/ico_matt_hancock_raids/">https://www.theregister.com/2021/07/15/ico_matt_hancock_raids/</a></p><p><a href="https://metro.co.uk/2021/07/15/houses-raided-by-cops-in-hunt-for-matt-hancock-kissing-leaker-14934920/">https://metro.co.uk/2021/07/15/houses-raided-by-cops-in-hunt-for-matt-hancock-kissing-leaker-14934920/</a></p><p><a href="https://apple.news/AqkfgpuvFTd--l-z_bZRRmw">https://apple.news/AqkfgpuvFTd--l-z_bZRRmw</a></p><p> </p><p><strong>Industry News (42.35)</strong></p><p><a href="https://www.itproportal.com/news/too-many-workers-are-still-falling-victim-to-phishing-attacks/">Too many workers are still falling victim to phishing attacks</a></p><p><a href="https://www.itproportal.com/news/remote-workers-battle-against-a-massive-range-of-distractions/">Remote workers battle against a massive range of distractions</a></p><p><a href="https://www.itproportal.com/news/ransomware-groups-are-looking-for-new-recruits-with-solid-negotiation-skills/">Ransomware groups are looking for new recruits with solid negotiation skills</a></p><p><a href="https://www.itproportal.com/news/solarwinds-rolls-out-another-emergency-patch-as-new-attack-vector-emerges/">SolarWinds rolls out another emergency patch as new attack vector emerges</a></p><p><a href="https://www.itproportal.com/news/almost-half-of-companies-do-not-have-a-proper-security-policy-in-place/">Almost half of companies do not have a proper security policy in place</a></p><p><a href="https://www.itproportal.com/news/employees-in-the-dark-over-the-importance-of-new-digital-technologies/">Employees in the dark over the importance of new digital technologies</a></p><p><a href="https://www.itproportal.com/news/uk-businesses-are-spending-big-on-security-but-drowning-in-false-positives/">UK businesses are spending big on security, but drowning in false positives</a></p><p><a href="https://www.itproportal.com/news/traditional-ransomware-defenses-are-failing-businesses/">Traditional ransomware defenses are failing businesses</a></p><p><a href="https://www.itproportal.com/news/almost-half-of-businesses-reported-to-ico-since-gdpr-came-into-effect/">Almost half of businesses reported to ICO since GDPR came into effect</a></p><p> </p><p><strong>Rant of the Week (50:40)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-57836319">Facebook adds 'expert' feature to groups</a></p><p>Facebook is rolling out a way to designate topic "experts" inside user-run Facebook groups.</p><p>The social network says the new feature is designed to help real experts "stand out" in discussions about their field of expertise.</p><p>Group admins will have the power to give the title to nearly any member they want.</p><p> </p><p>Incidental Music "The Box" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Jul 2021 13:34:09 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Charlie Langford, Matt Hancock, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-64-hes-baaaaaack-Q3wAnASj</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec (10.28)</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>14th July 1998: Ethereal was first released publicly as version 0.2.0. Its creator, Gerald Combs, thought it was cool that Bob Metcalfe named Ethernet after luminiferous ether so he picked a name beginning with ether. Since 2006 the network protocol analyzer has been known as Wireshark.</p><p><a href="https://twitter.com/todayininfosec/status/1415384753713340417">https://twitter.com/todayininfosec/status/1415384753713340417</a></p><p>11th July 2013: In the wake of revelations about the NSA's PRISM program, Jeff Moss (aka The Dark Tangent) asked feds not to attend DEF CON - the first time government employees were asked to stay away.</p><p><a href="https://twitter.com/todayininfosec/status/1414330928537686021">https://twitter.com/todayininfosec/status/1414330928537686021</a></p><p> </p><p><strong>Billy Big Balls of the Week (17:39)</strong></p><p>Thousands of PS4s seized in Ukraine in illegal cryptocurrency mining sting</p><p><a href="https://www.zdnet.com/article/thousands-of-ps4s-seized-in-ukraine-in-illegal-cryptocurrency-mining-sting/">https://www.zdnet.com/article/thousands-of-ps4s-seized-in-ukraine-in-illegal-cryptocurrency-mining-sting/</a></p><p> </p><p><strong>Tweet of the Week (27.57)</strong></p><p>FURY! at ICO doing their job for once.</p><p>The ICO is robustly investigating the data leak of hidden camera footage of former Health Secretary Matt Hancock breaking his own isolation and distancing rules. </p><p><a href="https://www.theregister.com/2021/07/15/ico_matt_hancock_raids/">https://www.theregister.com/2021/07/15/ico_matt_hancock_raids/</a></p><p><a href="https://metro.co.uk/2021/07/15/houses-raided-by-cops-in-hunt-for-matt-hancock-kissing-leaker-14934920/">https://metro.co.uk/2021/07/15/houses-raided-by-cops-in-hunt-for-matt-hancock-kissing-leaker-14934920/</a></p><p><a href="https://apple.news/AqkfgpuvFTd--l-z_bZRRmw">https://apple.news/AqkfgpuvFTd--l-z_bZRRmw</a></p><p> </p><p><strong>Industry News (42.35)</strong></p><p><a href="https://www.itproportal.com/news/too-many-workers-are-still-falling-victim-to-phishing-attacks/">Too many workers are still falling victim to phishing attacks</a></p><p><a href="https://www.itproportal.com/news/remote-workers-battle-against-a-massive-range-of-distractions/">Remote workers battle against a massive range of distractions</a></p><p><a href="https://www.itproportal.com/news/ransomware-groups-are-looking-for-new-recruits-with-solid-negotiation-skills/">Ransomware groups are looking for new recruits with solid negotiation skills</a></p><p><a href="https://www.itproportal.com/news/solarwinds-rolls-out-another-emergency-patch-as-new-attack-vector-emerges/">SolarWinds rolls out another emergency patch as new attack vector emerges</a></p><p><a href="https://www.itproportal.com/news/almost-half-of-companies-do-not-have-a-proper-security-policy-in-place/">Almost half of companies do not have a proper security policy in place</a></p><p><a href="https://www.itproportal.com/news/employees-in-the-dark-over-the-importance-of-new-digital-technologies/">Employees in the dark over the importance of new digital technologies</a></p><p><a href="https://www.itproportal.com/news/uk-businesses-are-spending-big-on-security-but-drowning-in-false-positives/">UK businesses are spending big on security, but drowning in false positives</a></p><p><a href="https://www.itproportal.com/news/traditional-ransomware-defenses-are-failing-businesses/">Traditional ransomware defenses are failing businesses</a></p><p><a href="https://www.itproportal.com/news/almost-half-of-businesses-reported-to-ico-since-gdpr-came-into-effect/">Almost half of businesses reported to ICO since GDPR came into effect</a></p><p> </p><p><strong>Rant of the Week (50:40)</strong></p><p><a href="https://www.bbc.co.uk/news/technology-57836319">Facebook adds 'expert' feature to groups</a></p><p>Facebook is rolling out a way to designate topic "experts" inside user-run Facebook groups.</p><p>The social network says the new feature is designed to help real experts "stand out" in discussions about their field of expertise.</p><p>Group admins will have the power to give the title to nearly any member they want.</p><p> </p><p>Incidental Music "The Box" © Charlie Langford</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56877464" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/50bbe5f1-297b-4312-ab04-827ac05699ad/audio/b0d27323-3e90-4030-a3e3-3a91207099d5/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 64 - He&apos;s Baaaaaack!</itunes:title>
      <itunes:author>Andrew Agnes, Charlie Langford, Matt Hancock, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/bf27c703-71b4-4651-9186-9bc6effe0cf1/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:15</itunes:duration>
      <itunes:summary>This week in Infosec is all about the old pre-Wireshark days, and how to not get invited to DefCon

Billy Big Balls tells us where all the old Sony PS4s disappeared to

The badly labeled Tweet of the week sees fury at the ICO actually doing its job for once

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

and

Rant of the week just goes to show that there really is an expert hiding inside all of us, at least according to Facebook.
</itunes:summary>
      <itunes:subtitle>This week in Infosec is all about the old pre-Wireshark days, and how to not get invited to DefCon

Billy Big Balls tells us where all the old Sony PS4s disappeared to

The badly labeled Tweet of the week sees fury at the ICO actually doing its job for once

Industry News brings us the latest and greatest news stories from the around the world, only this time from our temp news agency

and

Rant of the week just goes to show that there really is an expert hiding inside all of us, at least according to Facebook.
</itunes:subtitle>
      <itunes:keywords>spittle flecked lips of fury, waste of blood and organs, podcast, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a64a2485-ff0e-4c1f-89ed-ce9f9314a091</guid>
      <title>Episode 63 - The JavAndy Show</title>
      <description><![CDATA[<p>This weeks show is 33% off but the content is still as average as ever!</p><p>This week in Infosec - 3 mins 11 secs</p><p>Billy Big Balls - 12 mins 49 secs</p><p>Rant of the week - 20 mins 52 secs</p><p>Industry News - 30 mins 56 secs</p><p>Tweet of the week - 38 mins 20 secs</p><p> </p><p><strong>THIS WEEK IN INFOSEC</strong></p><p>With content liberated from the “today in infosec” twitter account</p><ol><li>4th July 1994: John Markoff's article "Cyberspace's Most Wanted: Hacker Eludes F.B.I. Pursuit" was published by the New York Times. It was about Kevin Mitnick.</li></ol><p><a href="https://www.nytimes.com/1994/07/04/us/cyberspace-s-most-wanted-hacker-eludes-fbi-pursuit.html">Cyberspace's Most Wanted: Hacker Eludes F.B.I. Pursuit</a><br /><a href="https://twitter.com/todayininfosec/status/1411891849132924932">https://twitter.com/todayininfosec/status/1411891849132924932</a></p><ol><li>8th July 2008: Dan Kaminksy gave a press conference announcing a DNS vulnerability he discovered 6 months prior.  RIP, Dan.</li></ol><p><a href="http://news.bbc.co.uk/1/hi/technology/7496735.stm">Fix found for net security flaw</a></p><p><a href="https://twitter.com/todayininfosec/status/1413206908882804739">https://twitter.com/todayininfosec/status/1413206908882804739</a></p><p> </p><p><strong>BILLY BIG BALLS</strong></p><p><a href="https://www.theregister.com/2021/07/06/ransomware_4_new_square_chambers/">Ransomware-hit law firm gets court order asking crooks not to publish the data they stole</a></p><p>Criminals break into your systems, they do the usual, exfiltrate data, deploy ransomware, and leave you nasty messages about how they pwned you while blackmailing you.</p><p>However, New Square Ltd may have found a way to stop the criminals from capitalising on the data they have stolen by making it illegal for the criminals to release any of the stolen information. </p><p> </p><p><strong>RANT OF THE WEEK</strong></p><p><a href="https://www.vice.com/en/article/z3xqwj/this-tiktok-lawsuit-is-highlighting-how-ai-is-screwing-over-voice-actors">This TikTok Lawsuit Is Highlighting How AI Is Screwing Over Voice Actors</a></p><p>Voice actors are rallying behind Bev Standing, who is alleging that TikTok acquired and replicated her voice using AI without her knowledge.</p><p>At the center of this reckoning is voice actress Bev Standing, who is suing TikTok after alleging the company used her voice for its text-to-speech feature without compensation or consent. This is not the first case like this; voice actress Susan Bennett discovered that audio she recorded for another company was repurposed to be the <a href="https://www.cnn.com/2013/10/04/tech/mobile/bennett-siri-iphone-voice/index.html">voice of Siri</a> after Apple launched the feature in 2011. She was paid for the initial recording session <a href="https://www.cracked.com/personal-experiences-2108-i-am-siris-voice-4-bizarre-realities.html">but not for being Siri</a>.</p><p><a href="https://newsroom.tiktok.com/en-us/find-a-job-with-tiktok-resumes">Find a job with TikTok Resumes</a></p><p> </p><p><strong>INDUSTRY NEWS</strong></p><p><a href="https://www.infosecurity-magazine.com/news/revil-70-million-universal/">REvil Group Demands $70 Million for 'Universal Decryptor'</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminal-dr-hex-tracked/">Suspected Cyber-Criminal "Dr Hex" Tracked Down Via Phishing Kit</a></p><p><a href="https://www.infosecurity-magazine.com/news/ba-settles-with-data-breach-victims/">BA Settles with Data Breach Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/official-formula-1-app-hacked/">Official Formula 1 App Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-administration-cancels-10bn/">Biden Administration Cancels $10bn JEDI Contract</a></p><p><a href="https://www.infosecurity-magazine.com/news/170-scam-cryptomining-apps-charge/">Over 170 Scam Cryptomining Apps Charge for Non-Existent Services</a></p><p><a href="https://www.infosecurity-magazine.com/news/health-secretary-private-email/">Regulator Probes Former Health Secretary's Use of Private Email</a></p><p><a href="https://www.infosecurity-magazine.com/news/trump-sues-facebook-google-and/">Trump Sues Facebook, Google and Twitter</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-printnightmare-patch-bypassed/">New PrintNightmare Patch Can Be Bypassed, Say Researchers</a></p><p> </p><p><strong>TWEET OF THE WEEK</strong></p><img src="https://lh6.googleusercontent.com/TksBFu9NV5naVnEA_AOLPnYezHRKXeAQe75N7dKHHHDTmYL7pDLbqtt26JNFagsh2pKBkJZ_zQvmplCLvLytHt5VkcvtihVBRD2gKuqwvUbJLDyzqRWB6vgWR1rGsfsRu9hu4ROA" /><p><a href="https://twitter.com/sherrod_im/status/1412856171652861953">https://twitter.com/sherrod_im/status/1412856171652861953</a></p><img src="https://lh5.googleusercontent.com/2zQHM16sGhBu79OmrLFhyLqXd3IQ7MHIIndQ1lwqW9e6AnFsBxLgNRRzQCHaSujtPcVdH80DKHqGgT-VeXxv1TsJ7jaJm6051WeM7HXrFkEaxTYeIahRYl6ItS_Js4it412lMCAO" /><p><a href="https://twitter.com/doctorow/status/1412923242273140736?s=20">https://twitter.com/doctorow/status/1412923242273140736?s=20</a></p><p>Full story - </p><p><a href="https://www.vice.com/en/article/7kvpng/delivery-drivers-are-using-grey-market-apps-to-make-their-jobs-suck-less">Delivery Drivers Are Using Grey Market Apps to Make Their Jobs Suck Less</a></p><p><i>Drivers are there virtually, using GPS-spoofing apps to position themselves right in the center of the McDonald's lot while they physically wait under nearby shelters. Using these unofficial apps, known as tuyul, drivers can set their GPS pins at the optimal location they would like orders from, without having to physically drive there. </i>     </p><p> </p><p>And with that we leave you to enjoy the weekend!</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Jul 2021 18:49:41 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andy Agnês)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-63-the-javandy-show-UqaCsktx</link>
      <content:encoded><![CDATA[<p>This weeks show is 33% off but the content is still as average as ever!</p><p>This week in Infosec - 3 mins 11 secs</p><p>Billy Big Balls - 12 mins 49 secs</p><p>Rant of the week - 20 mins 52 secs</p><p>Industry News - 30 mins 56 secs</p><p>Tweet of the week - 38 mins 20 secs</p><p> </p><p><strong>THIS WEEK IN INFOSEC</strong></p><p>With content liberated from the “today in infosec” twitter account</p><ol><li>4th July 1994: John Markoff's article "Cyberspace's Most Wanted: Hacker Eludes F.B.I. Pursuit" was published by the New York Times. It was about Kevin Mitnick.</li></ol><p><a href="https://www.nytimes.com/1994/07/04/us/cyberspace-s-most-wanted-hacker-eludes-fbi-pursuit.html">Cyberspace's Most Wanted: Hacker Eludes F.B.I. Pursuit</a><br /><a href="https://twitter.com/todayininfosec/status/1411891849132924932">https://twitter.com/todayininfosec/status/1411891849132924932</a></p><ol><li>8th July 2008: Dan Kaminksy gave a press conference announcing a DNS vulnerability he discovered 6 months prior.  RIP, Dan.</li></ol><p><a href="http://news.bbc.co.uk/1/hi/technology/7496735.stm">Fix found for net security flaw</a></p><p><a href="https://twitter.com/todayininfosec/status/1413206908882804739">https://twitter.com/todayininfosec/status/1413206908882804739</a></p><p> </p><p><strong>BILLY BIG BALLS</strong></p><p><a href="https://www.theregister.com/2021/07/06/ransomware_4_new_square_chambers/">Ransomware-hit law firm gets court order asking crooks not to publish the data they stole</a></p><p>Criminals break into your systems, they do the usual, exfiltrate data, deploy ransomware, and leave you nasty messages about how they pwned you while blackmailing you.</p><p>However, New Square Ltd may have found a way to stop the criminals from capitalising on the data they have stolen by making it illegal for the criminals to release any of the stolen information. </p><p> </p><p><strong>RANT OF THE WEEK</strong></p><p><a href="https://www.vice.com/en/article/z3xqwj/this-tiktok-lawsuit-is-highlighting-how-ai-is-screwing-over-voice-actors">This TikTok Lawsuit Is Highlighting How AI Is Screwing Over Voice Actors</a></p><p>Voice actors are rallying behind Bev Standing, who is alleging that TikTok acquired and replicated her voice using AI without her knowledge.</p><p>At the center of this reckoning is voice actress Bev Standing, who is suing TikTok after alleging the company used her voice for its text-to-speech feature without compensation or consent. This is not the first case like this; voice actress Susan Bennett discovered that audio she recorded for another company was repurposed to be the <a href="https://www.cnn.com/2013/10/04/tech/mobile/bennett-siri-iphone-voice/index.html">voice of Siri</a> after Apple launched the feature in 2011. She was paid for the initial recording session <a href="https://www.cracked.com/personal-experiences-2108-i-am-siris-voice-4-bizarre-realities.html">but not for being Siri</a>.</p><p><a href="https://newsroom.tiktok.com/en-us/find-a-job-with-tiktok-resumes">Find a job with TikTok Resumes</a></p><p> </p><p><strong>INDUSTRY NEWS</strong></p><p><a href="https://www.infosecurity-magazine.com/news/revil-70-million-universal/">REvil Group Demands $70 Million for 'Universal Decryptor'</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminal-dr-hex-tracked/">Suspected Cyber-Criminal "Dr Hex" Tracked Down Via Phishing Kit</a></p><p><a href="https://www.infosecurity-magazine.com/news/ba-settles-with-data-breach-victims/">BA Settles with Data Breach Victims</a></p><p><a href="https://www.infosecurity-magazine.com/news/official-formula-1-app-hacked/">Official Formula 1 App Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-administration-cancels-10bn/">Biden Administration Cancels $10bn JEDI Contract</a></p><p><a href="https://www.infosecurity-magazine.com/news/170-scam-cryptomining-apps-charge/">Over 170 Scam Cryptomining Apps Charge for Non-Existent Services</a></p><p><a href="https://www.infosecurity-magazine.com/news/health-secretary-private-email/">Regulator Probes Former Health Secretary's Use of Private Email</a></p><p><a href="https://www.infosecurity-magazine.com/news/trump-sues-facebook-google-and/">Trump Sues Facebook, Google and Twitter</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-printnightmare-patch-bypassed/">New PrintNightmare Patch Can Be Bypassed, Say Researchers</a></p><p> </p><p><strong>TWEET OF THE WEEK</strong></p><img src="https://lh6.googleusercontent.com/TksBFu9NV5naVnEA_AOLPnYezHRKXeAQe75N7dKHHHDTmYL7pDLbqtt26JNFagsh2pKBkJZ_zQvmplCLvLytHt5VkcvtihVBRD2gKuqwvUbJLDyzqRWB6vgWR1rGsfsRu9hu4ROA" /><p><a href="https://twitter.com/sherrod_im/status/1412856171652861953">https://twitter.com/sherrod_im/status/1412856171652861953</a></p><img src="https://lh5.googleusercontent.com/2zQHM16sGhBu79OmrLFhyLqXd3IQ7MHIIndQ1lwqW9e6AnFsBxLgNRRzQCHaSujtPcVdH80DKHqGgT-VeXxv1TsJ7jaJm6051WeM7HXrFkEaxTYeIahRYl6ItS_Js4it412lMCAO" /><p><a href="https://twitter.com/doctorow/status/1412923242273140736?s=20">https://twitter.com/doctorow/status/1412923242273140736?s=20</a></p><p>Full story - </p><p><a href="https://www.vice.com/en/article/7kvpng/delivery-drivers-are-using-grey-market-apps-to-make-their-jobs-suck-less">Delivery Drivers Are Using Grey Market Apps to Make Their Jobs Suck Less</a></p><p><i>Drivers are there virtually, using GPS-spoofing apps to position themselves right in the center of the McDonald's lot while they physically wait under nearby shelters. Using these unofficial apps, known as tuyul, drivers can set their GPS pins at the optimal location they would like orders from, without having to physically drive there. </i>     </p><p> </p><p>And with that we leave you to enjoy the weekend!</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="46503855" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/2f6b55e2-3c3c-46ad-8428-0796bbae49b8/audio/82f92176-1885-4df4-acf5-36a7614131b4/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 63 - The JavAndy Show</itunes:title>
      <itunes:author>Javvad Malik, Andy Agnês</itunes:author>
      <itunes:duration>00:48:26</itunes:duration>
      <itunes:summary>You dear listeners paid for Thom&apos;s absence so the sole founder of Host Unknown and his sidekick stepped up to ensure the show went on.</itunes:summary>
      <itunes:subtitle>You dear listeners paid for Thom&apos;s absence so the sole founder of Host Unknown and his sidekick stepped up to ensure the show went on.</itunes:subtitle>
      <itunes:keywords>rant of the week, voice of siri, cyber security, tiktok lawsuit, this week in infosec, tiktok resume, billy big balls, new square ltd, gojek, ransomware, tweet of the week, bev standing, host unknown, infosec, it&apos;s coming home</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46252607-23f7-40af-abf9-6f42b7a78795</guid>
      <title>Episode 62 - Bikini Bottom</title>
      <description><![CDATA[<p><strong>This Week in InfoSec (08:03)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>30th June 1998: AOL confirmed a leaked spreadsheet containing info of 1,300 AOL community leaders had been stolen from an employee's account.</p><p>Not around then? AOL was kind of a big deal - it bought Time Warner in 2000 and was worth $200 billion before imploding.</p><p><a href="https://www.cnet.com/news/aol-volunteer-list-hacked/">https://www.cnet.com/news/aol-volunteer-list-hacked/</a></p><p><a href="https://twitter.com/todayininfosec/status/1410396545896177668">https://twitter.com/todayininfosec/status/1410396545896177668</a></p><p> </p><p><strong>Rant of the Week (22:15)</strong></p><img src="https://lh5.googleusercontent.com/25_EZeEgAXKHUBH-Ten1zwhxbVTn6VV6Et87JpadeCwjEdbCJRjgmFGIpgmhBCDx7mNMfQwmUwwk7l6u0xzBCw13sldvqAwPQ48SEPBHH5pnSuglQJZqWucvUqjL-_j5NmjSoenx" /><p>via <a href="https://twitter.com/rootsploit/status/1410303006269181952">@rootsploit</a></p><p><a href="https://www.vice.com/en/article/7kvwgb/cybersecurity-workers-flood-twitter-with-bikini-pics-to-protest-harassment">Cybersecurity Workers Flood Twitter With Bikini Pics to Protest Harassment</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-community-bikini-pics/">Infosec Community Posts Solidarity Bikini Pics After Twitter Troll Outburst</a></p><p>Cybersecurity professionals have come together on Twitter to show their support for an infosec worker who was trolled after posting a bikini pic.</p><p>Coleen Shane, founder and chief engineer for InfoSec Bad Girls and Hacker Spring Camp, was astonished when an anonymous follower reacted angrily to the shot.</p><p>The user, who follows over 200 infosec-related accounts, argued that there was "no warning" for the image, intimating that "otherwise respectable people" should not be doing such.</p><p><a href="https://twitter.com/Coleens_IS/status/1409537099603144704?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1409537099603144704%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https://www.vice.com/en/article/7kvwgb/cybersecurity-workers-flood-twitter-with-bikini-pics-to-protest-harassment">Coleen's response</a> was widely praised.</p><p>"It's a bikini, and I'm a human being who is a lot more complicated than just Infosec - also I do whatever the hell I want, whenever the hell I want, however the hell I want. Adios," she tweeted.</p><p><a href="https://twitter.com/LisaForteUK/status/1410565869781012483">Communications company got their support for the movement (horribly) wrong</a> by creating a calendar of the bikini photos (without consent) for people to download</p><p><a href="https://twitter.com/illumineyecomms/status/1410644978393489419">Their apology has gone as well as expected</a></p><img src="https://lh4.googleusercontent.com/4AwU-4CCko4iA-0M4uGG5h8dMQLAr99_AQkc9sZYmyP-CgqaH_j4yi7wROkmTdDP41cYQdz9hchv57UkwjcE2_CsL9IMNWhRQZjlG6z7zKXMiUwTfUzxcBwuwkfy35NRTwtkxqWC" /><p> </p><p><strong>Billy Big Balls of the Week (34:00)</strong></p><p><a href="https://www.independent.co.uk/news/world/americas/doctor-arrested-hitman-kidnap-wife-heroin-b1875107.html">Doctor arrested for trying to hire a hitman to kidnap and inject ex-wife with heroin in bizarre bid to win her back</a></p><p>Ronald Ilg, 55, was arrested in April and is being charged in federal court for hiring a hitman over the internet to abduct his wife and imprison her in a "secure location" for a week, all the while dosing her with heroin.</p><p>Dr Ilg apparently agreed to pay the would-be kidnapper in Bitcoin. The FBI traced the Bitcoin transaction, which led them to Dr Ilg's Coinbase account.</p><p> </p><p><strong>Industry News ( 41:41)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cma-fake-reviews-probe-google/">World’s Largest E-tailers to be Investigated Over Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-only-top-tier-cyberpower/">US the Only Top Tier Cyber-power</a></p><p><a href="https://www.infosecurity-magazine.com/news/sensitive-defense-documents-bus/">Sensitive Defense Documents Found at Bus Stop</a></p><p><a href="https://www.infosecurity-magazine.com/news/pentagon-ciso-suspected-of-sharing/">Pentagon CISO Suspected of Sharing Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/salvation-army-ransomware-attack/">Salvation Army Hit by Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/analyst-steals-millions-spoofing/">Analyst Steals Millions by Spoofing Director</a></p><p><a href="https://www.infosecurity-magazine.com/news/printnightmare-zero-day/">PrintNightmare: Windows Zero-Day Accidentally Disclosed by Chinese Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-charges-alleged-capital-one/">New Charges Filed Against Alleged Capital One Hacker</a></p><p><a href="https://www.infosecurity-magazine.com/news/putin-orders-twitter-to-open/">Putin Orders Twitter to Open Russian Office</a></p><p> </p><p><strong>Tweet of the Week (48:25)</strong></p><img src="https://lh4.googleusercontent.com/JAfuSe0trdXA9zykMuGJQbFAks3DBC2pVLlHBAEOVSasd0WUWp3HaUl7HBY79TV_ljwQmzCaLMOKPOrjHJEk8LeRCqoBEmkvS-jGAmwe2G--Vf3yQlYXoZsD1kR_JeVhtNQ5pYNs" /><p><a href="https://inews.co.uk/news/technology/tiktok-fake-covid-positive-test-schools-1079693">Teenagers are figuring out how to fake positive Covid tests using lemon juice and hacks from TikTok</a></p><p><a href="https://twitter.com/imbadatlife/status/1410526468577411072">https://twitter.com/imbadatlife/status/1410526468577411072</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 2 Jul 2021 12:02:52 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-62-bikini-bottom-YKe3zQ17</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec (08:03)</strong></p><p>With content liberated from the “today in infosec” twitter account</p><p>30th June 1998: AOL confirmed a leaked spreadsheet containing info of 1,300 AOL community leaders had been stolen from an employee's account.</p><p>Not around then? AOL was kind of a big deal - it bought Time Warner in 2000 and was worth $200 billion before imploding.</p><p><a href="https://www.cnet.com/news/aol-volunteer-list-hacked/">https://www.cnet.com/news/aol-volunteer-list-hacked/</a></p><p><a href="https://twitter.com/todayininfosec/status/1410396545896177668">https://twitter.com/todayininfosec/status/1410396545896177668</a></p><p> </p><p><strong>Rant of the Week (22:15)</strong></p><img src="https://lh5.googleusercontent.com/25_EZeEgAXKHUBH-Ten1zwhxbVTn6VV6Et87JpadeCwjEdbCJRjgmFGIpgmhBCDx7mNMfQwmUwwk7l6u0xzBCw13sldvqAwPQ48SEPBHH5pnSuglQJZqWucvUqjL-_j5NmjSoenx" /><p>via <a href="https://twitter.com/rootsploit/status/1410303006269181952">@rootsploit</a></p><p><a href="https://www.vice.com/en/article/7kvwgb/cybersecurity-workers-flood-twitter-with-bikini-pics-to-protest-harassment">Cybersecurity Workers Flood Twitter With Bikini Pics to Protest Harassment</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosec-community-bikini-pics/">Infosec Community Posts Solidarity Bikini Pics After Twitter Troll Outburst</a></p><p>Cybersecurity professionals have come together on Twitter to show their support for an infosec worker who was trolled after posting a bikini pic.</p><p>Coleen Shane, founder and chief engineer for InfoSec Bad Girls and Hacker Spring Camp, was astonished when an anonymous follower reacted angrily to the shot.</p><p>The user, who follows over 200 infosec-related accounts, argued that there was "no warning" for the image, intimating that "otherwise respectable people" should not be doing such.</p><p><a href="https://twitter.com/Coleens_IS/status/1409537099603144704?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1409537099603144704%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https://www.vice.com/en/article/7kvwgb/cybersecurity-workers-flood-twitter-with-bikini-pics-to-protest-harassment">Coleen's response</a> was widely praised.</p><p>"It's a bikini, and I'm a human being who is a lot more complicated than just Infosec - also I do whatever the hell I want, whenever the hell I want, however the hell I want. Adios," she tweeted.</p><p><a href="https://twitter.com/LisaForteUK/status/1410565869781012483">Communications company got their support for the movement (horribly) wrong</a> by creating a calendar of the bikini photos (without consent) for people to download</p><p><a href="https://twitter.com/illumineyecomms/status/1410644978393489419">Their apology has gone as well as expected</a></p><img src="https://lh4.googleusercontent.com/4AwU-4CCko4iA-0M4uGG5h8dMQLAr99_AQkc9sZYmyP-CgqaH_j4yi7wROkmTdDP41cYQdz9hchv57UkwjcE2_CsL9IMNWhRQZjlG6z7zKXMiUwTfUzxcBwuwkfy35NRTwtkxqWC" /><p> </p><p><strong>Billy Big Balls of the Week (34:00)</strong></p><p><a href="https://www.independent.co.uk/news/world/americas/doctor-arrested-hitman-kidnap-wife-heroin-b1875107.html">Doctor arrested for trying to hire a hitman to kidnap and inject ex-wife with heroin in bizarre bid to win her back</a></p><p>Ronald Ilg, 55, was arrested in April and is being charged in federal court for hiring a hitman over the internet to abduct his wife and imprison her in a "secure location" for a week, all the while dosing her with heroin.</p><p>Dr Ilg apparently agreed to pay the would-be kidnapper in Bitcoin. The FBI traced the Bitcoin transaction, which led them to Dr Ilg's Coinbase account.</p><p> </p><p><strong>Industry News ( 41:41)</strong></p><p><a href="https://www.infosecurity-magazine.com/news/cma-fake-reviews-probe-google/">World’s Largest E-tailers to be Investigated Over Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-only-top-tier-cyberpower/">US the Only Top Tier Cyber-power</a></p><p><a href="https://www.infosecurity-magazine.com/news/sensitive-defense-documents-bus/">Sensitive Defense Documents Found at Bus Stop</a></p><p><a href="https://www.infosecurity-magazine.com/news/pentagon-ciso-suspected-of-sharing/">Pentagon CISO Suspected of Sharing Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/salvation-army-ransomware-attack/">Salvation Army Hit by Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/analyst-steals-millions-spoofing/">Analyst Steals Millions by Spoofing Director</a></p><p><a href="https://www.infosecurity-magazine.com/news/printnightmare-zero-day/">PrintNightmare: Windows Zero-Day Accidentally Disclosed by Chinese Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-charges-alleged-capital-one/">New Charges Filed Against Alleged Capital One Hacker</a></p><p><a href="https://www.infosecurity-magazine.com/news/putin-orders-twitter-to-open/">Putin Orders Twitter to Open Russian Office</a></p><p> </p><p><strong>Tweet of the Week (48:25)</strong></p><img src="https://lh4.googleusercontent.com/JAfuSe0trdXA9zykMuGJQbFAks3DBC2pVLlHBAEOVSasd0WUWp3HaUl7HBY79TV_ljwQmzCaLMOKPOrjHJEk8LeRCqoBEmkvS-jGAmwe2G--Vf3yQlYXoZsD1kR_JeVhtNQ5pYNs" /><p><a href="https://inews.co.uk/news/technology/tiktok-fake-covid-positive-test-schools-1079693">Teenagers are figuring out how to fake positive Covid tests using lemon juice and hacks from TikTok</a></p><p><a href="https://twitter.com/imbadatlife/status/1410526468577411072">https://twitter.com/imbadatlife/status/1410526468577411072</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58850649" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/8def0ca8-def3-472c-b1fa-d8820323c0f9/audio/9132c778-e0b9-47ad-92e0-b0a91659a9da/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 62 - Bikini Bottom</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3ac3cbf1-6621-4782-8355-4c3130ab77ba/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:19</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a story about the Internet’s original Mods
Rant of the week talks about an Itsy-Bitsy, Teenie-Weenie, Yellow Trolling, Infosec meanie
Billy Big Balls this week can be filed under “how not to win back your ex”
Industry News brings you the latest and greatest infosec news from around the globe
and
Tweet of the week is just a reminder that teenagers gonna teenage (even in a pandemic)
</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a story about the Internet’s original Mods
Rant of the week talks about an Itsy-Bitsy, Teenie-Weenie, Yellow Trolling, Infosec meanie
Billy Big Balls this week can be filed under “how not to win back your ex”
Industry News brings you the latest and greatest infosec news from around the globe
and
Tweet of the week is just a reminder that teenagers gonna teenage (even in a pandemic)
</itunes:subtitle>
      <itunes:keywords>bikini, podcast, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4952e9a3-9f75-4c15-93af-259978dfaffb</guid>
      <title>Episode 61 - Hey Everybody Andy is Famous!</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>19th June 1987: The first Summercon hacker conference was held in St. Louis, Missouri and was run by the hacker zine Phrack. It's still going strong - the 33rd edition took place virtually last year with in-person attendance returning to NYC next month.</p><p><a href="https://www.summercon.org/">https://www.summercon.org/</a></p><p><a href="https://hackstory.net/Summercon">https://hackstory.net/Summercon</a></p><p><a href="https://twitter.com/todayininfosec/status/1274065780288548864">https://twitter.com/todayininfosec/status/1274065780288548864</a></p><p>20th June 2011: The earliest attack of Operation AntiSec was performed by LulzSec against the UK's Serious Organised Crime Agency.</p><p><a href="https://twitter.com/todayininfosec/status/1274498724786397184">https://twitter.com/todayininfosec/status/1274498724786397184</a>  <br /><br /> </p><p><strong>Rant of the Week</strong></p><p><a href="https://alyssasec.com/2021/06/ethics-in-cybersecurity-marketing-principles-of-value-contribution">Ethics in Cybersecurity Marketing – Principles of Value Contribution</a></p><p>EC-Council was recently discovered to be publishing blogs that were, in the opinion of a lawyer I spoke to, plagiarized from security and technology experts. One such work was my blog, “<a href="https://alyssasec.com/2020/12/what-is-a-business-information-security-officer">What is a Business Information Security Officer (BISO)</a>”. What follows is a description of the events and what I believe needs to be done to correct this horrific trend.</p><p><a href="https://twitter.com/AlyssaM_InfoSec">Alyssa Miller  Duchess of Hackington @AlyssaM_InfoSec</a></p><p>So I really want<a href="https://twitter.com/ECCOUNCIL"> @ECCouncil</a> to understand the damage they've done (<a href="https://twitter.com/AlyssaM_InfoSec/status/1408120698573316104?s=20">a thread</a>):</p><p><a href="https://attrition.org/errata/charlatan/ec-council/2021-eccouncil-response-to-plagiarism.html">EC-Council Deflects After Calls of Most Recent Plagiarism</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/23/africrypt_bitcoin_disappearance/">Three things that have vanished: $3.6bn in Bitcoin, a crypto investment biz, and the two brothers who ran it</a></p><p>“We got hacked and we'll be right back”, duo said ... two months ago.</p><p><a href="https://www.bloomberg.com/news/articles/2021-06-23/s-african-brothers-vanish-and-so-does-3-6-billion-in-bitcoin">South African Brothers Vanish, and So Does $3.6 Billion in Bitcoin</a></p><p>A Cape Town law firm hired by investors says they can’t locate the brothers and has reported the matter to the Hawks, an elite unit of the national police force. It’s also told crypto exchanges across the globe should any attempt be made to convert the digital coins.</p><p><a href="https://markets.businessinsider.com/currencies/news/south-african-brothers-billions-bitcoin-disapper-crypto-heist-2021-6-1030548585">Two South African brothers have vanished with $3.6 billion of bitcoin in what could be the biggest crypto heist in history</a></p><p>In the time the story first hit, to the time Forbes published it, the value of the haul had dropped significantly in line with the volatility we expect :)</p><p><a href="https://www.forbes.com/sites/emilymason/2021/06/23/south-african-brothers-disappear-along-with-22-billion-worth-of-bitcoin/?sh=4fbfe3aa1a60">South African Brothers Disappear, Along With $2.2 Billion Worth Of Bitcoin</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/novel-phishing-attack-abuses/">Novel Phishing Attack Abuses Google Drive and Docs</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-supply-china-security-slsa/">Google Spices Up Supply Chain Security with SLSA Framework</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuclear-research-institute/">Nuclear Research Institute Breached by Suspected North Korean Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/finger-scanning-costs-six-flags-36m/">Finger Scanning Costs Six Flags $36m</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-probes-solarwinds-breach/">SEC Probes SolarWinds Breach Disclosure Failures</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-publishes-ransomware-guidance/">NIST Publishes Ransomware Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuisance-call-company-fined/">Nuisance Call Company Fined £130,000 After Eight-Month Blitz</a></p><p><a href="https://www.infosecurity-magazine.com/news/john-mcafee-found-dead-in-prison/">Anti-virus Pioneer John McAfee Found Dead in Spanish Prison Cell</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-pushes-back-cookie-removal/">Google Pushes Back Cookie Removal Plans to 2023</a></p><p> </p><p>The John McAfee story</p><p><a href="https://youtu.be/xHuVW63ceSQ">When Javvad met John McAfee</a></p><p><a href="https://youtu.be/bKgf5PaBzyg">How to uninstall McAfee anti-virus in his own words</a></p><img src="https://lh3.googleusercontent.com/C5rak_DbRnmudUq_YOGLllpnI-bdXhBmnZwNropjEQoHK9R_-eAcWwaRZTSWiQsqs8jfhskMX_Vf7lzeqvO8UxF1QM_G_smBMTaM_Flzl-arWwJc_aTcPeTxan-sXAZhUeYG8Y-9" /><img src="https://lh5.googleusercontent.com/DKd-VaWE0H02_oLmG8Qb2RnWUNA9nJjsfQU3h7EUryXV8vH4auvgVyFpP1pe2bYHt4cvalTvEupEam6-2Ty1-dRCvpLVmvWCETWnMPzjCRWIJjOtmWrcmS39A1L0phVncWR4csay" /><img src="https://lh6.googleusercontent.com/3pL4aS1Q9bOq2PbCoWIgPTcHTcPMqnWPdOzkXMuEMwtIFHLfqf8FuX4SFC5TLwsWKPydL5u569oaTgmsCu8ReFLdocA8KB3ZSfKiCCiCDDTO9c0uFzW-vTL6QGSX9FQCbaPMO1xO" /><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/REWm3CNknk9lZqHP2s2EtClPYN8TNGoSfRU_lKTr-deUs5J9W-g_QFO5C7S0t7rKV8srFbHuHEvwQf8xoyArxUlg1gvo_fOfN6slSSBe8aA0lV3aODXw7YuSY9ym69qoUeTbaGbq" /><p><a href="https://twitter.com/ShootyDoody/status/1407684922786127873">https://twitter.com/ShootyDoody/status/1407684922786127873</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Jun 2021 14:57:11 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, John McAfee, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-61-hey-everybody-andy-is-famous1-FkG8Xxt9</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account</p><p>19th June 1987: The first Summercon hacker conference was held in St. Louis, Missouri and was run by the hacker zine Phrack. It's still going strong - the 33rd edition took place virtually last year with in-person attendance returning to NYC next month.</p><p><a href="https://www.summercon.org/">https://www.summercon.org/</a></p><p><a href="https://hackstory.net/Summercon">https://hackstory.net/Summercon</a></p><p><a href="https://twitter.com/todayininfosec/status/1274065780288548864">https://twitter.com/todayininfosec/status/1274065780288548864</a></p><p>20th June 2011: The earliest attack of Operation AntiSec was performed by LulzSec against the UK's Serious Organised Crime Agency.</p><p><a href="https://twitter.com/todayininfosec/status/1274498724786397184">https://twitter.com/todayininfosec/status/1274498724786397184</a>  <br /><br /> </p><p><strong>Rant of the Week</strong></p><p><a href="https://alyssasec.com/2021/06/ethics-in-cybersecurity-marketing-principles-of-value-contribution">Ethics in Cybersecurity Marketing – Principles of Value Contribution</a></p><p>EC-Council was recently discovered to be publishing blogs that were, in the opinion of a lawyer I spoke to, plagiarized from security and technology experts. One such work was my blog, “<a href="https://alyssasec.com/2020/12/what-is-a-business-information-security-officer">What is a Business Information Security Officer (BISO)</a>”. What follows is a description of the events and what I believe needs to be done to correct this horrific trend.</p><p><a href="https://twitter.com/AlyssaM_InfoSec">Alyssa Miller  Duchess of Hackington @AlyssaM_InfoSec</a></p><p>So I really want<a href="https://twitter.com/ECCOUNCIL"> @ECCouncil</a> to understand the damage they've done (<a href="https://twitter.com/AlyssaM_InfoSec/status/1408120698573316104?s=20">a thread</a>):</p><p><a href="https://attrition.org/errata/charlatan/ec-council/2021-eccouncil-response-to-plagiarism.html">EC-Council Deflects After Calls of Most Recent Plagiarism</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/23/africrypt_bitcoin_disappearance/">Three things that have vanished: $3.6bn in Bitcoin, a crypto investment biz, and the two brothers who ran it</a></p><p>“We got hacked and we'll be right back”, duo said ... two months ago.</p><p><a href="https://www.bloomberg.com/news/articles/2021-06-23/s-african-brothers-vanish-and-so-does-3-6-billion-in-bitcoin">South African Brothers Vanish, and So Does $3.6 Billion in Bitcoin</a></p><p>A Cape Town law firm hired by investors says they can’t locate the brothers and has reported the matter to the Hawks, an elite unit of the national police force. It’s also told crypto exchanges across the globe should any attempt be made to convert the digital coins.</p><p><a href="https://markets.businessinsider.com/currencies/news/south-african-brothers-billions-bitcoin-disapper-crypto-heist-2021-6-1030548585">Two South African brothers have vanished with $3.6 billion of bitcoin in what could be the biggest crypto heist in history</a></p><p>In the time the story first hit, to the time Forbes published it, the value of the haul had dropped significantly in line with the volatility we expect :)</p><p><a href="https://www.forbes.com/sites/emilymason/2021/06/23/south-african-brothers-disappear-along-with-22-billion-worth-of-bitcoin/?sh=4fbfe3aa1a60">South African Brothers Disappear, Along With $2.2 Billion Worth Of Bitcoin</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/novel-phishing-attack-abuses/">Novel Phishing Attack Abuses Google Drive and Docs</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-supply-china-security-slsa/">Google Spices Up Supply Chain Security with SLSA Framework</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuclear-research-institute/">Nuclear Research Institute Breached by Suspected North Korean Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/finger-scanning-costs-six-flags-36m/">Finger Scanning Costs Six Flags $36m</a></p><p><a href="https://www.infosecurity-magazine.com/news/sec-probes-solarwinds-breach/">SEC Probes SolarWinds Breach Disclosure Failures</a></p><p><a href="https://www.infosecurity-magazine.com/news/nist-publishes-ransomware-guidance/">NIST Publishes Ransomware Guidance</a></p><p><a href="https://www.infosecurity-magazine.com/news/nuisance-call-company-fined/">Nuisance Call Company Fined £130,000 After Eight-Month Blitz</a></p><p><a href="https://www.infosecurity-magazine.com/news/john-mcafee-found-dead-in-prison/">Anti-virus Pioneer John McAfee Found Dead in Spanish Prison Cell</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-pushes-back-cookie-removal/">Google Pushes Back Cookie Removal Plans to 2023</a></p><p> </p><p>The John McAfee story</p><p><a href="https://youtu.be/xHuVW63ceSQ">When Javvad met John McAfee</a></p><p><a href="https://youtu.be/bKgf5PaBzyg">How to uninstall McAfee anti-virus in his own words</a></p><img src="https://lh3.googleusercontent.com/C5rak_DbRnmudUq_YOGLllpnI-bdXhBmnZwNropjEQoHK9R_-eAcWwaRZTSWiQsqs8jfhskMX_Vf7lzeqvO8UxF1QM_G_smBMTaM_Flzl-arWwJc_aTcPeTxan-sXAZhUeYG8Y-9" /><img src="https://lh5.googleusercontent.com/DKd-VaWE0H02_oLmG8Qb2RnWUNA9nJjsfQU3h7EUryXV8vH4auvgVyFpP1pe2bYHt4cvalTvEupEam6-2Ty1-dRCvpLVmvWCETWnMPzjCRWIJjOtmWrcmS39A1L0phVncWR4csay" /><img src="https://lh6.googleusercontent.com/3pL4aS1Q9bOq2PbCoWIgPTcHTcPMqnWPdOzkXMuEMwtIFHLfqf8FuX4SFC5TLwsWKPydL5u569oaTgmsCu8ReFLdocA8KB3ZSfKiCCiCDDTO9c0uFzW-vTL6QGSX9FQCbaPMO1xO" /><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/REWm3CNknk9lZqHP2s2EtClPYN8TNGoSfRU_lKTr-deUs5J9W-g_QFO5C7S0t7rKV8srFbHuHEvwQf8xoyArxUlg1gvo_fOfN6slSSBe8aA0lV3aODXw7YuSY9ym69qoUeTbaGbq" /><p><a href="https://twitter.com/ShootyDoody/status/1407684922786127873">https://twitter.com/ShootyDoody/status/1407684922786127873</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="54164073" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e0cb09c9-3d93-406d-8be9-9f6d160727c4/audio/60771869-97df-4e9d-8bea-2ba4c676af3a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 61 - Hey Everybody Andy is Famous!</itunes:title>
      <itunes:author>Thom Langford, John McAfee, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/fd7241ba-a68e-4376-bc8d-697eda6b272d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:25</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to simpler times when hacking groups had monocles

Rant of the week looks at shithousery of the magnitude we’ve come to expect from EC-Council 

Billy Big Balls is the story of two brothers who said “We got hacked and we&apos;ll be right back” (two months ago)

Industry News brings you the latest and greatest infosec news from around the globe

and...
Tweet of the week will not be taking questions
</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to simpler times when hacking groups had monocles

Rant of the week looks at shithousery of the magnitude we’ve come to expect from EC-Council 

Billy Big Balls is the story of two brothers who said “We got hacked and we&apos;ll be right back” (two months ago)

Industry News brings you the latest and greatest infosec news from around the globe

and...
Tweet of the week will not be taking questions
</itunes:subtitle>
      <itunes:keywords>isolation special, podcast, john mcafee, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cf6c24b3-d0d3-4160-855d-b74d228a4741</guid>
      <title>Episode 60 - Guaranteed Jav Free May Contain Nuts</title>
      <description><![CDATA[<p><img src="https://lh5.googleusercontent.com/SeRZzuOxGu8JkPo_a6VQ4eMpTGBvByPrZHGF-SKxaLFYL64PePkV2aXzGLJCAm8XSHm9ckDNrpkrS-YO-0jR_89L-iAA3Cs4DBPHiKgQDJrgBw6IQS3hpOrAGw8lBw_aDSk9pLVL" /><p>Artist - Carole Theriault</p><p> </p><p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account (and embellished by us 😉)</p><p>11th June 2008: Verizon released the first edition of its annual Data Breach Investigations Report (DBIR).</p><p>Incidents are still a thing.  Data breaches are still a thing.  Some stuff has changed.  Some hasn't.  Time keeps on ticking.  ¯_(ツ)_/¯</p><p><a href="https://www.verizon.com/about/news/press-releases/verizon-business-releases-trailblazing-databreach-study-spanning-500-forensic-investigations">Verizon Business Releases Trailblazing Data-Breach Study Spanning 500 Forensic Investigations</a></p><p><a href="https://danielmiessler.com/blog/analysis-of-the-2021-verizon-data-breach-report-dbir/">Analysis of the 2021 Verizon Data Breach Report (DBIR)</a></p><p><a href="https://twitter.com/todayininfosec/status/1271264648986124289">https://twitter.com/todayininfosec/status/1271264648986124289</a>  </p><p>17th June 2010: The Stuxnet worm was first discovered by Sergey Ulasen at Belarusian antivirus software vendor VirusBlokAda. Announcement:<a href="https://t.co/g59IG8ySl1?amp=1"> http://anti-virus.by/en/tempo.shtml</a></p><p>Interview with Sergey Ulasen in 2011: </p><p><a href="https://eugene.kaspersky.com/2011/11/02/the-man-who-found-stuxnet-sergey-ulasen-in-the-spotlight/">The Man Who Found Stuxnet – Sergey Ulasen in the Spotlight</a></p><p><a href="https://twitter.com/todayininfosec/status/1273501720723648512">https://twitter.com/todayininfosec/status/1273501720723648512</a>  <br /><br /> </p><p><strong>Rant of the Week</strong></p><p>[Carole saves the show by having something prepared (even if it is from the cutting room floor of Smashing Security)]</p><p>ICO watchdog 'deeply concerned' over live facial recognition</p><p>https://www.bbc.co.uk/news/technology-57504717</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.vice.com/en/article/88n874/doctors-and-scientists-are-fighting-vaccine-misinformation-on-tiktok">Doctors and Scientists Are Fighting Vaccine Misinformation on TikTok</a></p><p>The experts of the Team Halo initiative have taken to social media in order to combat falsehoods about COVID-19 and promote accurate vaccine science.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/vw-vendor-leaves-data-unsecured/">VW Vendor Leaves Data Unsecured</a></p><p><a href="https://www.infosecurity-magazine.com/news/ikea-fined-12m-for-spying-on/">IKEA Fined $1.2m for Spying on Employees</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-of-staff-use-security/">Third of Staff Use Security Workarounds at Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/iot-supply-chain-bug-millions/">IoT Supply Chain Bug Hits Millions of Cameras</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-ransomware-victims-hit-again/">Most Ransomware Victims Are Hit Again After Paying</a></p><p><a href="https://www.infosecurity-magazine.com/news/football-fever-password-security/">Football Fever Puts Password Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-can-spy-on-peloton-workouts/">Hackers Can Spy on Peloton Workouts</a></p><p><a href="https://www.infosecurity-magazine.com/news/a-billion-cvs-records-exposed/">A Billion CVS Records Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/puzzling-new-malware-blocks-access/">Puzzling New Malware Blocks Access to Piracy Sites</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>A Neighbourly Pickle</p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/Zn_lp5-2Z3Bq_aFrdtFH0gOl3QzB65nzUICRpSH6Pcr5-Pgqobm_K9RNwstrXso3BSh9PI6EgJDLniZhHIjarz9holvECoY8EXvv4BQvQRQlRVlluAy-L1MDg3m4cdgaGM1rvPEg" /><p><a href="https://twitter.com/InfosecMiles/status/1405194858965475328">https://twitter.com/InfosecMiles/status/1405194858965475328</a></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Jun 2021 15:20:00 +0000</pubDate>
      <author>thom@tl2security.com (Carole Theriault, Thom Langford, Andrew Agnês, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-60-guaranteed-jav-free-may-contain-nuts-BjiTJK2z</link>
      <content:encoded><![CDATA[<p><img src="https://lh5.googleusercontent.com/SeRZzuOxGu8JkPo_a6VQ4eMpTGBvByPrZHGF-SKxaLFYL64PePkV2aXzGLJCAm8XSHm9ckDNrpkrS-YO-0jR_89L-iAA3Cs4DBPHiKgQDJrgBw6IQS3hpOrAGw8lBw_aDSk9pLVL" /><p>Artist - Carole Theriault</p><p> </p><p><strong>This week in Infosec</strong></p><p>With content liberated from the “today in infosec” Twitter account (and embellished by us 😉)</p><p>11th June 2008: Verizon released the first edition of its annual Data Breach Investigations Report (DBIR).</p><p>Incidents are still a thing.  Data breaches are still a thing.  Some stuff has changed.  Some hasn't.  Time keeps on ticking.  ¯_(ツ)_/¯</p><p><a href="https://www.verizon.com/about/news/press-releases/verizon-business-releases-trailblazing-databreach-study-spanning-500-forensic-investigations">Verizon Business Releases Trailblazing Data-Breach Study Spanning 500 Forensic Investigations</a></p><p><a href="https://danielmiessler.com/blog/analysis-of-the-2021-verizon-data-breach-report-dbir/">Analysis of the 2021 Verizon Data Breach Report (DBIR)</a></p><p><a href="https://twitter.com/todayininfosec/status/1271264648986124289">https://twitter.com/todayininfosec/status/1271264648986124289</a>  </p><p>17th June 2010: The Stuxnet worm was first discovered by Sergey Ulasen at Belarusian antivirus software vendor VirusBlokAda. Announcement:<a href="https://t.co/g59IG8ySl1?amp=1"> http://anti-virus.by/en/tempo.shtml</a></p><p>Interview with Sergey Ulasen in 2011: </p><p><a href="https://eugene.kaspersky.com/2011/11/02/the-man-who-found-stuxnet-sergey-ulasen-in-the-spotlight/">The Man Who Found Stuxnet – Sergey Ulasen in the Spotlight</a></p><p><a href="https://twitter.com/todayininfosec/status/1273501720723648512">https://twitter.com/todayininfosec/status/1273501720723648512</a>  <br /><br /> </p><p><strong>Rant of the Week</strong></p><p>[Carole saves the show by having something prepared (even if it is from the cutting room floor of Smashing Security)]</p><p>ICO watchdog 'deeply concerned' over live facial recognition</p><p>https://www.bbc.co.uk/news/technology-57504717</p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p><a href="https://www.vice.com/en/article/88n874/doctors-and-scientists-are-fighting-vaccine-misinformation-on-tiktok">Doctors and Scientists Are Fighting Vaccine Misinformation on TikTok</a></p><p>The experts of the Team Halo initiative have taken to social media in order to combat falsehoods about COVID-19 and promote accurate vaccine science.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/vw-vendor-leaves-data-unsecured/">VW Vendor Leaves Data Unsecured</a></p><p><a href="https://www.infosecurity-magazine.com/news/ikea-fined-12m-for-spying-on/">IKEA Fined $1.2m for Spying on Employees</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-of-staff-use-security/">Third of Staff Use Security Workarounds at Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/iot-supply-chain-bug-millions/">IoT Supply Chain Bug Hits Millions of Cameras</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-ransomware-victims-hit-again/">Most Ransomware Victims Are Hit Again After Paying</a></p><p><a href="https://www.infosecurity-magazine.com/news/football-fever-password-security/">Football Fever Puts Password Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-can-spy-on-peloton-workouts/">Hackers Can Spy on Peloton Workouts</a></p><p><a href="https://www.infosecurity-magazine.com/news/a-billion-cvs-records-exposed/">A Billion CVS Records Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/puzzling-new-malware-blocks-access/">Puzzling New Malware Blocks Access to Piracy Sites</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>A Neighbourly Pickle</p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/Zn_lp5-2Z3Bq_aFrdtFH0gOl3QzB65nzUICRpSH6Pcr5-Pgqobm_K9RNwstrXso3BSh9PI6EgJDLniZhHIjarz9holvECoY8EXvv4BQvQRQlRVlluAy-L1MDg3m4cdgaGM1rvPEg" /><p><a href="https://twitter.com/InfosecMiles/status/1405194858965475328">https://twitter.com/InfosecMiles/status/1405194858965475328</a></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57233983" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f62f0585-8d9e-4b72-bfb6-35df72665908/audio/b77e9259-f3ea-40e9-a0dd-ec737220e97f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 60 - Guaranteed Jav Free May Contain Nuts</itunes:title>
      <itunes:author>Carole Theriault, Thom Langford, Andrew Agnês, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/2e6d2b37-4aaa-41de-a078-b8687cb22d75/3000x3000/img-3442.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:38</itunes:duration>
      <itunes:summary>This week in Infosec: The most famous DBIR launches, and the source of security talks for a decade hts the wild

Rant of the Week: Carole saves us with some real journalistic content.

Billy Big Balls: Project Halo vs Tik Tok’s Anti-vaxxers

Industry News Brings you the latest and greatest news from our PA newswire from around the world

Sticky Pickle of the Week: Our protagonist deals with a neighbourly pickle

Tweet of the week: Has crime professionalised at long last?
</itunes:summary>
      <itunes:subtitle>This week in Infosec: The most famous DBIR launches, and the source of security talks for a decade hts the wild

Rant of the Week: Carole saves us with some real journalistic content.

Billy Big Balls: Project Halo vs Tik Tok’s Anti-vaxxers

Industry News Brings you the latest and greatest news from our PA newswire from around the world

Sticky Pickle of the Week: Our protagonist deals with a neighbourly pickle

Tweet of the week: Has crime professionalised at long last?
</itunes:subtitle>
      <itunes:keywords>sticky pickles, smashing security, podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a33ebb86-6c3d-4e1c-8bf5-68fe5a7bbce1</guid>
      <title>Episode 59 - We Voted For The Lazarus Heist</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account.</p><p><strong>5th June 1991</strong>: Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet.</p><p>Read his story about the release, including his disclosure of how little he understood about Usenet and what newsgroups even were. </p><p><a href="http://www.philzimmermann.com/EN/news/PGP_10thAnniversary.html">http://www.philzimmermann.com/EN/news/PGP_10thAnniversary.html</a></p><p><a href="https://philzimmermann.com/EN/news/index.html">PGP Marks 30th Anniversary</a></p><p><a href="https://twitter.com/todayininfosec/status/1269043313404862465">https://twitter.com/todayininfosec/status/1269043313404862465</a>  </p><p><strong>7th June 1989:</strong> The beta release of the Bourne Again SHell (Bash) was announced as version 0.99. 2 months later Shellshock was introduced into the Bash source code and persisted in subsequent versions for over 25 years.</p><p><a href="https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1">https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1</a></p><p><a href="https://twitter.com/todayininfosec/status/1269788726156124160">https://twitter.com/todayininfosec/status/1269788726156124160</a> <br /><br /><strong>9th June 1993</strong>: The first DEF CON hacker conference was held at the Sands Hotel & Casino in Las Vegas, Nevada. Initially planned by Jeff Moss as a farewell party for a hacker friend, about 100 people attended. It has since grown to become a 4-day conference with 30,000 attendees.</p><p><a href="https://twitter.com/todayininfosec/status/1270389947753627648">https://twitter.com/todayininfosec/status/1270389947753627648</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>There was widespread panic on Tuesday after a major Internet outage knocked dozens of websites offline.</p><p>Amazon, Reddit and Twitch were all affected, as were the Guardian, the New York Times and the Financial Times.</p><p>Additionally, the UK government website crashed – on the day that Britons aged 25–29 were invited to book their COVID-19 vaccines.</p><p>Despite initial speculation that the outage was the result of a cyber attack – with ‘#cyberattack’ trending on Twitter – the true cause of the incident was less sensational, although nonetheless concerning.</p><p><a href="https://www.itgovernance.co.uk/blog/what-caused-the-internet-to-crash">What caused the Internet to crash?</a></p><p><a href="https://www.bbc.co.uk/news/technology-57399628">Websites begin to work again after major outage</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Alleged drug syndicates, contract killers and weapons dealers thought they were using high-priced, securely encrypted phones that would protect them as they openly discussed drug deals by text message and swapped photos of cocaine-packed pineapples. What they were really doing, investigators revealed Tuesday, was channeling their plots straight into the hands of U.S. intelligence agents.</p><p>An international coalition of law enforcement officials announced they had ensnared alleged criminals around the world after duping them into using phones loaded with an encrypted messaging app controlled by the FBI.</p><p><a href="https://www.unodc.org/unodc/secured/wdr/Cocaine_Heroin_Prices.pdf">Street value of cocaine</a></p><p><a href="https://www.bbc.co.uk/news/world-57394831">ANOM: Hundreds arrested in massive global crime sting using messaging app</a></p><p><a href="https://www.washingtonpost.com/world/2021/06/08/fbi-app-arrests-australia-crime/">FBI-controlled Anom app ensnares scores of alleged criminals in global police sting</a></p><p><a href="https://www.vice.com/en/article/akgkwj/operation-trojan-shield-anom-fbi-secret-phone-network">Trojan Shield: How the FBI Secretly Ran a Phone Network for Criminals</a></p><p><a href="https://news.sky.com/story/anom-alleged-drug-kingpin-told-to-hand-himself-in-after-being-tricked-into-spreading-fake-phone-app-12328192">ANOM: Alleged drug kingpin told to hand himself in after being tricked into spreading fake phone app</a></p><p> </p><img src="https://lh6.googleusercontent.com/JthD0Fd-5WFB5l1CztGnoYsbYrjUkJ7jRUmQpt1ohAQrfpsJ9dU4sJdpBZiTVJ5rgbM66zKgNpqMPJ2mihU0RY-5Nvuxb1H7HmwXSLoETySXcpG8FPS1R_ZRJ7gAk7F8MnlRj6zZ" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/biden-expands-trump-china-ban/">Biden Expands Trump’s Investment Ban on Chinese Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-more-dangerous-than-sex/">More US Kids Warned About Internet Than Unsafe Sex</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-to-treat-ransomware-like/">US to Treat Ransomware Like Terrorism</a></p><p><a href="https://www.infosecurity-magazine.com/news/hacker-group-gunning-for-musk/">Hacker Group Gunning for Musk</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-antitrust-regulator-google/">French Antitrust Regulator Slaps $268 Million Fine on Google</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-seven-zerodays/">Microsoft Fixes Seven Zero-Days This Patch Tuesday</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-of-execs-planning-spy-staff/">A Third of Execs Plan to Spy on Staff to Guard Trade Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/jbs-admits-paying-revil-ransomware/">JBS Admits Paying REvil Ransomware Group $11 Million</a></p><p><a href="https://www.infosecurity-magazine.com/news/schools-shut-ransomware-attacl/">Schools Forced to Shut Following Critical Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/DzWJJKeNnOHMvw88INDc66zKXo-an-lsH4XeW44ZiXTDPDPEi4HALQLxOHliK3eIY5pwc6oFAl--aFSngRDPa5nzK6MyB5v2F5Vo_E9Pj4SLVGwojurvSINWbCSgYYM0gbMXXXIh" /><p><a href="https://twitter.com/Eskenzi/status/1402684475243438081">https://twitter.com/Eskenzi/status/1402684475243438081</a></p><img src="https://lh5.googleusercontent.com/yEX5DqZIxG_YXu8WhhdHxuuSeYIkV6baGl1B4yJcZTbCbVSyblRlMkj0TBw81WNNYa1XdHKvsanI3oUcJjR8jzSyEZGnkfeAVAfv-RzHlv_1ca0UNR0_Y3LbcRaezL_P8mAj23sp" /><p><a href="https://twitter.com/KimZetter/status/1402695107640393729">https://twitter.com/KimZetter/status/1402695107640393729</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Jun 2021 12:43:48 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-59-we-voted-for-the-lazarus-heist-LyXy2KWF</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account.</p><p><strong>5th June 1991</strong>: Philip Zimmermann sent the first release of PGP to 2 friends, Allan Hoeltje and Kelly Goen, to upload to the Internet.</p><p>Read his story about the release, including his disclosure of how little he understood about Usenet and what newsgroups even were. </p><p><a href="http://www.philzimmermann.com/EN/news/PGP_10thAnniversary.html">http://www.philzimmermann.com/EN/news/PGP_10thAnniversary.html</a></p><p><a href="https://philzimmermann.com/EN/news/index.html">PGP Marks 30th Anniversary</a></p><p><a href="https://twitter.com/todayininfosec/status/1269043313404862465">https://twitter.com/todayininfosec/status/1269043313404862465</a>  </p><p><strong>7th June 1989:</strong> The beta release of the Bourne Again SHell (Bash) was announced as version 0.99. 2 months later Shellshock was introduced into the Bash source code and persisted in subsequent versions for over 25 years.</p><p><a href="https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1">https://groups.google.com/g/gnu.announce/c/hvhlR1Vn1P0/m/NYwp-4_0CaUJ?pli=1</a></p><p><a href="https://twitter.com/todayininfosec/status/1269788726156124160">https://twitter.com/todayininfosec/status/1269788726156124160</a> <br /><br /><strong>9th June 1993</strong>: The first DEF CON hacker conference was held at the Sands Hotel & Casino in Las Vegas, Nevada. Initially planned by Jeff Moss as a farewell party for a hacker friend, about 100 people attended. It has since grown to become a 4-day conference with 30,000 attendees.</p><p><a href="https://twitter.com/todayininfosec/status/1270389947753627648">https://twitter.com/todayininfosec/status/1270389947753627648</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>There was widespread panic on Tuesday after a major Internet outage knocked dozens of websites offline.</p><p>Amazon, Reddit and Twitch were all affected, as were the Guardian, the New York Times and the Financial Times.</p><p>Additionally, the UK government website crashed – on the day that Britons aged 25–29 were invited to book their COVID-19 vaccines.</p><p>Despite initial speculation that the outage was the result of a cyber attack – with ‘#cyberattack’ trending on Twitter – the true cause of the incident was less sensational, although nonetheless concerning.</p><p><a href="https://www.itgovernance.co.uk/blog/what-caused-the-internet-to-crash">What caused the Internet to crash?</a></p><p><a href="https://www.bbc.co.uk/news/technology-57399628">Websites begin to work again after major outage</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Alleged drug syndicates, contract killers and weapons dealers thought they were using high-priced, securely encrypted phones that would protect them as they openly discussed drug deals by text message and swapped photos of cocaine-packed pineapples. What they were really doing, investigators revealed Tuesday, was channeling their plots straight into the hands of U.S. intelligence agents.</p><p>An international coalition of law enforcement officials announced they had ensnared alleged criminals around the world after duping them into using phones loaded with an encrypted messaging app controlled by the FBI.</p><p><a href="https://www.unodc.org/unodc/secured/wdr/Cocaine_Heroin_Prices.pdf">Street value of cocaine</a></p><p><a href="https://www.bbc.co.uk/news/world-57394831">ANOM: Hundreds arrested in massive global crime sting using messaging app</a></p><p><a href="https://www.washingtonpost.com/world/2021/06/08/fbi-app-arrests-australia-crime/">FBI-controlled Anom app ensnares scores of alleged criminals in global police sting</a></p><p><a href="https://www.vice.com/en/article/akgkwj/operation-trojan-shield-anom-fbi-secret-phone-network">Trojan Shield: How the FBI Secretly Ran a Phone Network for Criminals</a></p><p><a href="https://news.sky.com/story/anom-alleged-drug-kingpin-told-to-hand-himself-in-after-being-tricked-into-spreading-fake-phone-app-12328192">ANOM: Alleged drug kingpin told to hand himself in after being tricked into spreading fake phone app</a></p><p> </p><img src="https://lh6.googleusercontent.com/JthD0Fd-5WFB5l1CztGnoYsbYrjUkJ7jRUmQpt1ohAQrfpsJ9dU4sJdpBZiTVJ5rgbM66zKgNpqMPJ2mihU0RY-5Nvuxb1H7HmwXSLoETySXcpG8FPS1R_ZRJ7gAk7F8MnlRj6zZ" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/biden-expands-trump-china-ban/">Biden Expands Trump’s Investment Ban on Chinese Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/internet-more-dangerous-than-sex/">More US Kids Warned About Internet Than Unsafe Sex</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-to-treat-ransomware-like/">US to Treat Ransomware Like Terrorism</a></p><p><a href="https://www.infosecurity-magazine.com/news/hacker-group-gunning-for-musk/">Hacker Group Gunning for Musk</a></p><p><a href="https://www.infosecurity-magazine.com/news/french-antitrust-regulator-google/">French Antitrust Regulator Slaps $268 Million Fine on Google</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-seven-zerodays/">Microsoft Fixes Seven Zero-Days This Patch Tuesday</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-of-execs-planning-spy-staff/">A Third of Execs Plan to Spy on Staff to Guard Trade Secrets</a></p><p><a href="https://www.infosecurity-magazine.com/news/jbs-admits-paying-revil-ransomware/">JBS Admits Paying REvil Ransomware Group $11 Million</a></p><p><a href="https://www.infosecurity-magazine.com/news/schools-shut-ransomware-attacl/">Schools Forced to Shut Following Critical Ransomware Attack</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/DzWJJKeNnOHMvw88INDc66zKXo-an-lsH4XeW44ZiXTDPDPEi4HALQLxOHliK3eIY5pwc6oFAl--aFSngRDPa5nzK6MyB5v2F5Vo_E9Pj4SLVGwojurvSINWbCSgYYM0gbMXXXIh" /><p><a href="https://twitter.com/Eskenzi/status/1402684475243438081">https://twitter.com/Eskenzi/status/1402684475243438081</a></p><img src="https://lh5.googleusercontent.com/yEX5DqZIxG_YXu8WhhdHxuuSeYIkV6baGl1B4yJcZTbCbVSyblRlMkj0TBw81WNNYa1XdHKvsanI3oUcJjR8jzSyEZGnkfeAVAfv-RzHlv_1ca0UNR0_Y3LbcRaezL_P8mAj23sp" /><p><a href="https://twitter.com/KimZetter/status/1402695107640393729">https://twitter.com/KimZetter/status/1402695107640393729</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="54118934" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/0e720b36-16ca-45ac-a852-a841c4ff555c/audio/68c988e7-4b22-49d5-9586-d35f6e77d8fe/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 59 - We Voted For The Lazarus Heist</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/162c1cf3-7dd0-473a-8915-36154b6f833f/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:22</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the birth of PGP

Rant of the week addresses the worldwide outage of the internet this week

Billy Big Balls is a true Billy Big Balls move ensnaring criminals around the world

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week asks what’s in a name</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the birth of PGP

Rant of the week addresses the worldwide outage of the internet this week

Billy Big Balls is a true Billy Big Balls move ensnaring criminals around the world

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week asks what’s in a name</itunes:subtitle>
      <itunes:keywords>podcast, host unknown, eu security blogger awards, infosec, winner</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">137b4bf2-aa4e-44a5-9e7c-b82ac679f56e</guid>
      <title>Episode 58 - Ha Ha Ha</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>1st June 1864: The first record of electronic spam was broadly revealed. A recipient was so infuriated by the dentist's poppycock that he composed a letter to the editor of The Times about the telegram, begging the newspaper to kindly demand a stop to the nonsense.</p><img src="https://lh3.googleusercontent.com/0uPMTxezvm8zG4ZDu59_CXSo9Cz_6MPh7ZbPnVpO-VVdCoTP9iYymmXzoetHNvoiwsnh7Xo6woxjGP2YeTkrr85R-mpw_Arl1S6dseVB95OsaMA0kYaxS0Mwx78PLJ-AtSPoBK8M" /><p><a href="https://twitter.com/todayininfosec/status/1399864377415712773">https://twitter.com/todayininfosec/status/1399864377415712773</a></p><p>28th May 2014: The TrueCrypt website unexpectedly announced that the development of TrueCrypt had ended and that the tool wasn't secure.</p><p><a href="https://medium.com/asecuritysite-when-bob-met-alice/the-fall-of-truecrypt-and-rise-of-veracrypt-44f910ed5162">The Fall of TrueCrypt and Rise of VeraCrypt</a></p><p><a href="https://twitter.com/todayininfosec/status/1266260968004136962">https://twitter.com/todayininfosec/status/1266260968004136962</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/02/amazon_sidewalk_mesh/">Deadline draws near to avoid auto-joining Amazon's mesh network Sidewalk</a></p><p>Owners of Amazon Echo assistants and Ring doorbells have until June 8 to avoid automatically opting into Sidewalk, the internet giant's mesh network that taps into people's broadband and may prove to be a privacy nightmare.</p><p>'A stalker can abuse it to stalk people better. There are no mitigations mentioned'</p><p><a href="https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf">Sidewalk privacy and security whitepaper by Amazon</a></p><p> </p><p><strong>Bill Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/03/norton_crypto/">Antivirus that mines Ethereum sounds a bit wrong, right? Norton has started selling it</a></p><p>NortonLifeLock, the company that offers the consumer products Broadcom didn’t want when it bought Symantec, has started to offer Ethereum mining as a feature of its Norton 360 security suite.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-act-now-to-protect-streaming/">NCSC: Act Now to Protect Streaming Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-seizes-83-million-headed/">Interpol Seizes $83 Million Headed for Online Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/meat-processing-jbs-pulls-plug/">Meat Processing Giant JBS Pulls IT Plug After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/scripps-notifying-147k-people-of/">Scripps Notifying 147K People of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-crashes-florida-school/">Teen Crashes Florida School District’s Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/sextortion-lands-inmate-in-federal/">Sextortion Lands Inmate in Federal Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/battle-galaxy-gamers-data-leak/">Battle for the Galaxy: 6 Million Gamers Hit by Data Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-massachusetts-largest/">Ransomware Disrupts Largest Ferry Service in Massachusetts</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-to-reemerge-fireeye/">Mandiant to Re-Emerge After $1.2 Billion FireEye Sale</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/r0QYrI6gQOgzTTqJKS4c06edpnM2koWEnVEM1-UHWY50UakU_tZzrZ1QblnIz_e3mcC47kmnkBJRpKVGiNIkI9nU9M-CwNOkZPow10YqCoUVyWJggUdGtFAoL0mK5yioxFAZ9W_e" /><p><a href="https://twitter.com/Cyber_Cox/status/1400082437095387137">https://twitter.com/Cyber_Cox/status/1400082437095387137</a></p><img src="https://lh5.googleusercontent.com/jvn0-w2Q7CHmjPl8AAqtjRxtz-pa1T8Miygypsz81ydCFSEMCL94W_zJhTbt3VMPn4rufM5kfgD618rzdeM193WokH6m4b61aASDKORV-Dlw9HvJq_XQz3ElhcnKxMRfkflHjwmX" /><p><a href="https://twitter.com/ryanaraine/status/1399724475092983812?s=20">https://twitter.com/ryanaraine/status/1399724475092983812?s=20</a></p><p> </p><p>(Edited 00:18 7the June 2020 to seed Apple Podcast update.)</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Jun 2021 13:10:07 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-58-ha-ha-ha-0zVrmeXi</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>1st June 1864: The first record of electronic spam was broadly revealed. A recipient was so infuriated by the dentist's poppycock that he composed a letter to the editor of The Times about the telegram, begging the newspaper to kindly demand a stop to the nonsense.</p><img src="https://lh3.googleusercontent.com/0uPMTxezvm8zG4ZDu59_CXSo9Cz_6MPh7ZbPnVpO-VVdCoTP9iYymmXzoetHNvoiwsnh7Xo6woxjGP2YeTkrr85R-mpw_Arl1S6dseVB95OsaMA0kYaxS0Mwx78PLJ-AtSPoBK8M" /><p><a href="https://twitter.com/todayininfosec/status/1399864377415712773">https://twitter.com/todayininfosec/status/1399864377415712773</a></p><p>28th May 2014: The TrueCrypt website unexpectedly announced that the development of TrueCrypt had ended and that the tool wasn't secure.</p><p><a href="https://medium.com/asecuritysite-when-bob-met-alice/the-fall-of-truecrypt-and-rise-of-veracrypt-44f910ed5162">The Fall of TrueCrypt and Rise of VeraCrypt</a></p><p><a href="https://twitter.com/todayininfosec/status/1266260968004136962">https://twitter.com/todayininfosec/status/1266260968004136962</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/02/amazon_sidewalk_mesh/">Deadline draws near to avoid auto-joining Amazon's mesh network Sidewalk</a></p><p>Owners of Amazon Echo assistants and Ring doorbells have until June 8 to avoid automatically opting into Sidewalk, the internet giant's mesh network that taps into people's broadband and may prove to be a privacy nightmare.</p><p>'A stalker can abuse it to stalk people better. There are no mitigations mentioned'</p><p><a href="https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf">Sidewalk privacy and security whitepaper by Amazon</a></p><p> </p><p><strong>Bill Big Balls of the Week</strong></p><p><a href="https://www.theregister.com/2021/06/03/norton_crypto/">Antivirus that mines Ethereum sounds a bit wrong, right? Norton has started selling it</a></p><p>NortonLifeLock, the company that offers the consumer products Broadcom didn’t want when it bought Symantec, has started to offer Ethereum mining as a feature of its Norton 360 security suite.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-act-now-to-protect-streaming/">NCSC: Act Now to Protect Streaming Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-seizes-83-million-headed/">Interpol Seizes $83 Million Headed for Online Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/meat-processing-jbs-pulls-plug/">Meat Processing Giant JBS Pulls IT Plug After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/scripps-notifying-147k-people-of/">Scripps Notifying 147K People of Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/teen-crashes-florida-school/">Teen Crashes Florida School District’s Network</a></p><p><a href="https://www.infosecurity-magazine.com/news/sextortion-lands-inmate-in-federal/">Sextortion Lands Inmate in Federal Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/battle-galaxy-gamers-data-leak/">Battle for the Galaxy: 6 Million Gamers Hit by Data Leak</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-massachusetts-largest/">Ransomware Disrupts Largest Ferry Service in Massachusetts</a></p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-to-reemerge-fireeye/">Mandiant to Re-Emerge After $1.2 Billion FireEye Sale</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/r0QYrI6gQOgzTTqJKS4c06edpnM2koWEnVEM1-UHWY50UakU_tZzrZ1QblnIz_e3mcC47kmnkBJRpKVGiNIkI9nU9M-CwNOkZPow10YqCoUVyWJggUdGtFAoL0mK5yioxFAZ9W_e" /><p><a href="https://twitter.com/Cyber_Cox/status/1400082437095387137">https://twitter.com/Cyber_Cox/status/1400082437095387137</a></p><img src="https://lh5.googleusercontent.com/jvn0-w2Q7CHmjPl8AAqtjRxtz-pa1T8Miygypsz81ydCFSEMCL94W_zJhTbt3VMPn4rufM5kfgD618rzdeM193WokH6m4b61aASDKORV-Dlw9HvJq_XQz3ElhcnKxMRfkflHjwmX" /><p><a href="https://twitter.com/ryanaraine/status/1399724475092983812?s=20">https://twitter.com/ryanaraine/status/1399724475092983812?s=20</a></p><p> </p><p>(Edited 00:18 7the June 2020 to seed Apple Podcast update.)</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57566679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/44681f46-1957-4f71-af7b-8e1e93010431/audio/0fca9d4e-fe40-4c2a-9f75-6f23f1a89658/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 58 - Ha Ha Ha</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5d295afc-5eb7-4dc9-b993-051f52be5b76/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:58</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the earliest reported spam complaint (probably older than you realise)

Rant of the week tells another story of big tech chipping away at privacy like it’s no big deal

Billy Big Balls this week sees Norton doing something either really smart or really stupid, we haven’t made our minds up yet

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week resurfaces the debate on the difference between conferences

We no longer bring up the topic of Little People on this show but when we do have something to say, we like to keep it short (to confirm, the Little People will never be returning)

(Edited 00:20, 7the June 2020 to seed Apple Podcast update.)</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the earliest reported spam complaint (probably older than you realise)

Rant of the week tells another story of big tech chipping away at privacy like it’s no big deal

Billy Big Balls this week sees Norton doing something either really smart or really stupid, we haven’t made our minds up yet

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week resurfaces the debate on the difference between conferences

We no longer bring up the topic of Little People on this show but when we do have something to say, we like to keep it short (to confirm, the Little People will never be returning)

(Edited 00:20, 7the June 2020 to seed Apple Podcast update.)</itunes:subtitle>
      <itunes:keywords>podcast, amazon dark web, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10898818-5efb-42c5-9d38-cb81a46601b1</guid>
      <title>Episode 57 -  The Deleted Show Notes Episode</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><img src="https://lh5.googleusercontent.com/ALyojhU2rxog_3xI4HvMDUfXMB_i_2mebXhzdDLcz8ZwjW8nobi8bvIOrlitXajSTYn-tzAc_fWfDPe9-YRq6Pem5dtKFWs6bNX8Jsd_I3ZgORvwKS8cz6sK_Zq4PLZ-cWRNn-1c" /><p>20th May 1993: Neil Woods (24) and Karl Strickland (22) became the first people imprisoned under the UK's 1990 Computer Misuse Act. </p><p><a href="https://www.independent.co.uk/news/uk/hackers-given-six-months-for-intellectual-joyriding-judge-says-jail-sentences-inevitable-to-deter-others-similarly-tempted-2324352.html">Hackers given six months for 'intellectual joyriding': Judge says jail sentences inevitable to deter others 'similarly tempted'</a></p><p><a href="https://twitter.com/todayininfosec/status/1395711166580731908">https://twitter.com/todayininfosec/status/1395711166580731908</a></p><p>22nd May 1991: Michael John Lauffenburger's logic bomb was set to detonate on a system at General Dynamics. He'd implemented it 2 months prior. Lauffenburger later pleaded guilty to a misdemeanor charge of computer tampering.</p><p><a href="https://www.latimes.com/archives/la-xpm-1991-11-05-me-986-story.html">Hacker Pleads Guilty in ‘Logic Bomb’ Scheme : Crime: Ex-General Dynamics programmer tried to sabotage computers so the company would have to pay him to fix the problem.</a></p><p><a href="https://twitter.com/todayininfosec/status/1396858379285549059">https://twitter.com/todayininfosec/status/1396858379285549059</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Citizen is an app where users report "incidents" in their neighborhoods and, based on those reports and police scanner transcriptions, the app sends "real-time safety alerts" to users about crime and other incidents happening near where a user is located. It is essentially a mapping app that allows users to both report and learn about crime (or what users of the app perceive to be crime) in their neighborhood.</p><p><a href="https://www.theverge.com/2021/5/21/22447446/citizen-app-internal-slack-palisades-fire-arson-bounty-manhunt-los-angeles">CITIZEN CEO OFFERED TO PERSONALLY FUND LA ARSON MANHUNT — FOR THE WRONG PERSON</a></p><p>More on Citizen Shithousery:</p><p><a href="https://www.vice.com/en/article/v7evbx/citizen-app-private-security-leaked-emails">Leaked Emails Show Crime App Citizen Is Testing On-Demand Security Force</a></p><p><a href="https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web">Citizen data scraped and dumped on dark web</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Nigerian cyber criminals target Texas unemployment system</p><p><a href="https://www.itpro.co.uk/security/cyber-security/359695/nigerian-cyber-criminals-target-texas-unemployment-system">Cyber criminals use Gmail feature to register the same email address multiple times</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/telemarketing-fraudster-jailed-ten/">Telemarketing Fraudster Jailed for 10 Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gang-gifts-decryption/">Ransomware Gang Gifts Decryption Tool to HSE</a></p><p><a href="https://www.infosecurity-magazine.com/news/air-india-supplier-breach-45/">Air India: Supplier Breach Hit 4.5 Million Passengers</a></p><p><a href="https://www.infosecurity-magazine.com/news/amex-fined-sending-four-million/">Amex Fined After Sending Over Four Million Spam Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-analyst-takes-secrets-home/">FBI Employee Indicted Over Illegal Document Removal</a></p><p><a href="https://www.infosecurity-magazine.com/news/europes-court-rules-uk-mass/">Europe’s Top Human Rights Court Rules UK Mass Surveillance Illegal</a></p><p><a href="https://www.infosecurity-magazine.com/news/influencers-offered-money-to/">Influencers Offered Money to Vilify Vaccine</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-breach-at-canada-post/">Data Breach at Canada Post</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-phishing-targets/">Chinese Phishing Attack Targets High-Profile Uyghurs</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/lhOmo2SwNTIt-n_PEia_LHqckXmeBBd56fpMwzrQ5BxjWxmpOcgDK1ndR3ULVJ6mFpai00lvY1m2jNw2LLTwCO7RetrI9gUsN9yBpIW0kmCR3YanNASqEuh5u4owPdCNr4niAUFs" /><p><a href="https://www.atariarchives.org/bcc1/showpage.php?page=155">Students Stuff the Context Box</a></p><p><a href="https://twitter.com/todayininfosec/status/1395843517189132300">https://twitter.com/todayininfosec/status/1395843517189132300</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 May 2021 14:01:56 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnēs)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-57-the-deleted-show-notes-episode-dTUolnkF</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><img src="https://lh5.googleusercontent.com/ALyojhU2rxog_3xI4HvMDUfXMB_i_2mebXhzdDLcz8ZwjW8nobi8bvIOrlitXajSTYn-tzAc_fWfDPe9-YRq6Pem5dtKFWs6bNX8Jsd_I3ZgORvwKS8cz6sK_Zq4PLZ-cWRNn-1c" /><p>20th May 1993: Neil Woods (24) and Karl Strickland (22) became the first people imprisoned under the UK's 1990 Computer Misuse Act. </p><p><a href="https://www.independent.co.uk/news/uk/hackers-given-six-months-for-intellectual-joyriding-judge-says-jail-sentences-inevitable-to-deter-others-similarly-tempted-2324352.html">Hackers given six months for 'intellectual joyriding': Judge says jail sentences inevitable to deter others 'similarly tempted'</a></p><p><a href="https://twitter.com/todayininfosec/status/1395711166580731908">https://twitter.com/todayininfosec/status/1395711166580731908</a></p><p>22nd May 1991: Michael John Lauffenburger's logic bomb was set to detonate on a system at General Dynamics. He'd implemented it 2 months prior. Lauffenburger later pleaded guilty to a misdemeanor charge of computer tampering.</p><p><a href="https://www.latimes.com/archives/la-xpm-1991-11-05-me-986-story.html">Hacker Pleads Guilty in ‘Logic Bomb’ Scheme : Crime: Ex-General Dynamics programmer tried to sabotage computers so the company would have to pay him to fix the problem.</a></p><p><a href="https://twitter.com/todayininfosec/status/1396858379285549059">https://twitter.com/todayininfosec/status/1396858379285549059</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Citizen is an app where users report "incidents" in their neighborhoods and, based on those reports and police scanner transcriptions, the app sends "real-time safety alerts" to users about crime and other incidents happening near where a user is located. It is essentially a mapping app that allows users to both report and learn about crime (or what users of the app perceive to be crime) in their neighborhood.</p><p><a href="https://www.theverge.com/2021/5/21/22447446/citizen-app-internal-slack-palisades-fire-arson-bounty-manhunt-los-angeles">CITIZEN CEO OFFERED TO PERSONALLY FUND LA ARSON MANHUNT — FOR THE WRONG PERSON</a></p><p>More on Citizen Shithousery:</p><p><a href="https://www.vice.com/en/article/v7evbx/citizen-app-private-security-leaked-emails">Leaked Emails Show Crime App Citizen Is Testing On-Demand Security Force</a></p><p><a href="https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web">Citizen data scraped and dumped on dark web</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Nigerian cyber criminals target Texas unemployment system</p><p><a href="https://www.itpro.co.uk/security/cyber-security/359695/nigerian-cyber-criminals-target-texas-unemployment-system">Cyber criminals use Gmail feature to register the same email address multiple times</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/telemarketing-fraudster-jailed-ten/">Telemarketing Fraudster Jailed for 10 Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-gang-gifts-decryption/">Ransomware Gang Gifts Decryption Tool to HSE</a></p><p><a href="https://www.infosecurity-magazine.com/news/air-india-supplier-breach-45/">Air India: Supplier Breach Hit 4.5 Million Passengers</a></p><p><a href="https://www.infosecurity-magazine.com/news/amex-fined-sending-four-million/">Amex Fined After Sending Over Four Million Spam Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-analyst-takes-secrets-home/">FBI Employee Indicted Over Illegal Document Removal</a></p><p><a href="https://www.infosecurity-magazine.com/news/europes-court-rules-uk-mass/">Europe’s Top Human Rights Court Rules UK Mass Surveillance Illegal</a></p><p><a href="https://www.infosecurity-magazine.com/news/influencers-offered-money-to/">Influencers Offered Money to Vilify Vaccine</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-breach-at-canada-post/">Data Breach at Canada Post</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-phishing-targets/">Chinese Phishing Attack Targets High-Profile Uyghurs</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/lhOmo2SwNTIt-n_PEia_LHqckXmeBBd56fpMwzrQ5BxjWxmpOcgDK1ndR3ULVJ6mFpai00lvY1m2jNw2LLTwCO7RetrI9gUsN9yBpIW0kmCR3YanNASqEuh5u4owPdCNr4niAUFs" /><p><a href="https://www.atariarchives.org/bcc1/showpage.php?page=155">Students Stuff the Context Box</a></p><p><a href="https://twitter.com/todayininfosec/status/1395843517189132300">https://twitter.com/todayininfosec/status/1395843517189132300</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56853640" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1e2b9b43-869d-41cf-8531-fe95ba563cbf/audio/5a19ca0a-38ac-4ae6-8385-c08fe65e2086/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 57 -  The Deleted Show Notes Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnēs</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/880ac546-2d15-4a4f-9224-31607ad89570/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:13</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a time of legislative history

Rant of the week show you what happens when the Nextdoor App takes steroids

Billy Big Balls this week sees remote working scammers get efficient at scamming

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week is a throwback to the time some students did some studenting, and gamed the system to stick it to the man

Earlier this week I saw a dwarf climbing down a prison wall.  I thought to myself “That’s a little condescending.”  And that is all we have to say on the topic of little people this week.
</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a time of legislative history

Rant of the week show you what happens when the Nextdoor App takes steroids

Billy Big Balls this week sees remote working scammers get efficient at scamming

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week is a throwback to the time some students did some studenting, and gamed the system to stick it to the man

Earlier this week I saw a dwarf climbing down a prison wall.  I thought to myself “That’s a little condescending.”  And that is all we have to say on the topic of little people this week.
</itunes:subtitle>
      <itunes:keywords>podcast, serious, parody, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1831a37a-5d75-4104-9cc8-40e4449eb490</guid>
      <title>Episode 56 - The Post Birthday Blues</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account:</p><p>15th May 1998: The first issue of Bruce Schneier's (<a href="https://twitter.com/schneierblog">@schneierblog</a>) monthly Crypto-Gram internet newsletter was published. And The Secret Story of Non-Secret Encryption is a pretty pretty pretty pretty...good read.</p><p><a href="https://www.schneier.com/crypto-gram/archives/1998/0515.html">https://www.schneier.com/crypto-gram/archives/1998/0515.html</a></p><p><a href="https://www.schneierfacts.com/">https://www.schneierfacts.com/</a></p><p><a href="https://twitter.com/sirjester/status/867809572173602817">https://twitter.com/sirjester/status/867809572173602817</a></p><p><a href="https://twitter.com/todayininfosec/status/1393708868304359426">https://twitter.com/todayininfosec/status/1393708868304359426</a>  </p><p>22nd May 2010: A Floridian man named Laszlo Hanyecz, received what he thought was a “free lunch”.</p><p><a href="https://bitcointalk.org/index.php?topic=137.0">https://bitcointalk.org/index.php?topic=137.0</a></p><p><a href="https://www.forbes.com/sites/colinharper/2020/05/22/bitcoin-pizza-day-why-bitcoiners-are-celebrating-today-by-eating-pizza/">Bitcoin Pizza Day: Why Bitcoiners Are Celebrating Today By Eating Pizza</a></p><p><a href="https://www.businessinsider.com/bitcoin-surge-means-laszlo-hanyecz-paid-316-million-two-pizzas-2021-3?r=US&IR=T#:~:text=The%20programmer%20Laszlo%20Hanyecz%20has,as%20%22Bitcoin%20Pizza%20Day.%22">Bitcoin's surge beyond $60,000 means the famed programmer Laszlo Hanyecz effectively paid $613 million for 2 pizzas</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>We'd love to report on the outcome of the CREST exam cheatsheet probe, but the UK infosec body won't publish it</p><p><a href="https://www.theregister.com/2021/05/17/crest_not_publishing_cert_exam_cheat_report/">https://www.theregister.com/2021/05/17/crest_not_publishing_cert_exam_cheat_report/</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>The Military Is Creating a ‘Gig Eagle’ App to Uber-ize Its Workforce</p><p>“We are creating a gig economy for the Department of Defense,” said one official.</p><p><a href="https://www.vice.com/en/article/n7bzvw/the-military-is-creating-a-gig-eagle-app-to-uber-ize-its-workforce">https://www.vice.com/en/article/n7bzvw/the-military-is-creating-a-gig-eagle-app-to-uber-ize-its-workforce</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/rapid7-source-code-accessed-in/">Rapid7 Source Code Accessed in Cyber-attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/quarter-cisos-it-selfmedicate/">Quarter of CISOs Self-Medicate as Pandemic Stress Spikes</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-stalker-okamura-sentenced/">US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/toshiba-business-hit-darkside/">Toshiba Business Reportedly Hit by DarkSide Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-forum-bans-ransomware/">Cybercrime Forum Bans Ransomware Activity</a></p><p><a href="https://www.infosecurity-magazine.com/news/axa-faces-ddos-after-ransomware/">AXA Faces DDoS After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/families-missing-persons-fake/">Families of Missing Persons Receive Fake Ransom Demands</a></p><p><a href="https://www.infosecurity-magazine.com/news/darkside-gang-retires-on-90m/">DarkSide Gang Retires on $90m</a><a href="https://www.infosecurity-magazine.com/news/usps-reportedly-uses-clearview-ai/">USPS Reportedly Uses Clearview AI to Spy on Americans</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/brLG0TdUpHTGnvFEUag-EJ_txYShqZ3mX_a2opg3CQsUK146pUEpRvYnLvIo6Z_lOq34AeQlDmCkS86tEw-B3sX7jogihQPMvsQ7qq_GEYNdslwuA2_DvLEaBCHDSS2_nbD0HFGv" /><p><a href="https://twitter.com/WeldPond/status/1395151316809306114">https://twitter.com/WeldPond/status/1395151316809306114</a></p><img src="https://lh3.googleusercontent.com/LnPL0y5adnT6ohS6gywTh1-_GsmkehFeN3nsJ0p-DTLbmVQimDy1eMrnof9gpj85INrNt4BLomLbsqnvqluLTD40rBcBta8lhj6u1oiJmcyjdqNUXpCymQ3NzQfSzRozbufVcpL-" /><p><a href="https://twitter.com/GossiTheDog/status/1395502236101451777">https://twitter.com/GossiTheDog/status/1395502236101451777</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 21 May 2021 13:35:43 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnēs, Thom Langford, Bruce Schneier)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-56-the-post-birthday-blues-Z6zYaEDy</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account:</p><p>15th May 1998: The first issue of Bruce Schneier's (<a href="https://twitter.com/schneierblog">@schneierblog</a>) monthly Crypto-Gram internet newsletter was published. And The Secret Story of Non-Secret Encryption is a pretty pretty pretty pretty...good read.</p><p><a href="https://www.schneier.com/crypto-gram/archives/1998/0515.html">https://www.schneier.com/crypto-gram/archives/1998/0515.html</a></p><p><a href="https://www.schneierfacts.com/">https://www.schneierfacts.com/</a></p><p><a href="https://twitter.com/sirjester/status/867809572173602817">https://twitter.com/sirjester/status/867809572173602817</a></p><p><a href="https://twitter.com/todayininfosec/status/1393708868304359426">https://twitter.com/todayininfosec/status/1393708868304359426</a>  </p><p>22nd May 2010: A Floridian man named Laszlo Hanyecz, received what he thought was a “free lunch”.</p><p><a href="https://bitcointalk.org/index.php?topic=137.0">https://bitcointalk.org/index.php?topic=137.0</a></p><p><a href="https://www.forbes.com/sites/colinharper/2020/05/22/bitcoin-pizza-day-why-bitcoiners-are-celebrating-today-by-eating-pizza/">Bitcoin Pizza Day: Why Bitcoiners Are Celebrating Today By Eating Pizza</a></p><p><a href="https://www.businessinsider.com/bitcoin-surge-means-laszlo-hanyecz-paid-316-million-two-pizzas-2021-3?r=US&IR=T#:~:text=The%20programmer%20Laszlo%20Hanyecz%20has,as%20%22Bitcoin%20Pizza%20Day.%22">Bitcoin's surge beyond $60,000 means the famed programmer Laszlo Hanyecz effectively paid $613 million for 2 pizzas</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>We'd love to report on the outcome of the CREST exam cheatsheet probe, but the UK infosec body won't publish it</p><p><a href="https://www.theregister.com/2021/05/17/crest_not_publishing_cert_exam_cheat_report/">https://www.theregister.com/2021/05/17/crest_not_publishing_cert_exam_cheat_report/</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>The Military Is Creating a ‘Gig Eagle’ App to Uber-ize Its Workforce</p><p>“We are creating a gig economy for the Department of Defense,” said one official.</p><p><a href="https://www.vice.com/en/article/n7bzvw/the-military-is-creating-a-gig-eagle-app-to-uber-ize-its-workforce">https://www.vice.com/en/article/n7bzvw/the-military-is-creating-a-gig-eagle-app-to-uber-ize-its-workforce</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/rapid7-source-code-accessed-in/">Rapid7 Source Code Accessed in Cyber-attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/quarter-cisos-it-selfmedicate/">Quarter of CISOs Self-Medicate as Pandemic Stress Spikes</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-stalker-okamura-sentenced/">US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home</a></p><p><a href="https://www.infosecurity-magazine.com/news/toshiba-business-hit-darkside/">Toshiba Business Reportedly Hit by DarkSide Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybercrime-forum-bans-ransomware/">Cybercrime Forum Bans Ransomware Activity</a></p><p><a href="https://www.infosecurity-magazine.com/news/axa-faces-ddos-after-ransomware/">AXA Faces DDoS After Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/families-missing-persons-fake/">Families of Missing Persons Receive Fake Ransom Demands</a></p><p><a href="https://www.infosecurity-magazine.com/news/darkside-gang-retires-on-90m/">DarkSide Gang Retires on $90m</a><a href="https://www.infosecurity-magazine.com/news/usps-reportedly-uses-clearview-ai/">USPS Reportedly Uses Clearview AI to Spy on Americans</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/brLG0TdUpHTGnvFEUag-EJ_txYShqZ3mX_a2opg3CQsUK146pUEpRvYnLvIo6Z_lOq34AeQlDmCkS86tEw-B3sX7jogihQPMvsQ7qq_GEYNdslwuA2_DvLEaBCHDSS2_nbD0HFGv" /><p><a href="https://twitter.com/WeldPond/status/1395151316809306114">https://twitter.com/WeldPond/status/1395151316809306114</a></p><img src="https://lh3.googleusercontent.com/LnPL0y5adnT6ohS6gywTh1-_GsmkehFeN3nsJ0p-DTLbmVQimDy1eMrnof9gpj85INrNt4BLomLbsqnvqluLTD40rBcBta8lhj6u1oiJmcyjdqNUXpCymQ3NzQfSzRozbufVcpL-" /><p><a href="https://twitter.com/GossiTheDog/status/1395502236101451777">https://twitter.com/GossiTheDog/status/1395502236101451777</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57970845" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3148c284-1086-4053-9d3a-b0f92a329b8b/audio/39bd6818-5c8c-490b-ac70-08e13ffb3836/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 56 - The Post Birthday Blues</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnēs, Thom Langford, Bruce Schneier</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c0519aeb-5a3c-487f-88e0-4d3c4286094b/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:23</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to the humble beginnings of Infosec’s Chuck Norris.
Rant of the week addresses the outcome of the CREST cheat sheet probe.
Billy Big Balls this week sees the US military Uber-ise Its Workforce.
Industry News brings us the latest and greatest infosec news from around the globe.
Tweet of the week tries to sneak in another “this week in infosec”.
The literal definition of down-to-earth is all we have to say on the topic of the Little People this week.</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to the humble beginnings of Infosec’s Chuck Norris.
Rant of the week addresses the outcome of the CREST cheat sheet probe.
Billy Big Balls this week sees the US military Uber-ise Its Workforce.
Industry News brings us the latest and greatest infosec news from around the globe.
Tweet of the week tries to sneak in another “this week in infosec”.
The literal definition of down-to-earth is all we have to say on the topic of the Little People this week.</itunes:subtitle>
      <itunes:keywords>three idiots, podcast, humour, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bafb4a04-d37c-405f-b701-cf8645c52b21</guid>
      <title>Episode 55 - Hitting the Limit</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>6th May 1995: Chris Lamprecht (aka "Minor Threat") became the first person banned from the Internet. He received a 70 month sentence for money laundering...and was banned from the Internet until 2003.</p><p><a href="https://www.wired.com/1997/12/twice-removed-locked-up-and-barred-from-net/">https://www.wired.com/1997/12/twice-removed-locked-up-and-barred-from-net/</a></p><p><a href="https://twitter.com/todayininfosec/status/1257862817371156480">https://twitter.com/todayininfosec/status/1257862817371156480</a></p><p>7th May 2004: 18-year-old German computer science student Sven Jaschan was arrested for writing the Sasser worm and the NetSky worm. One of Jaschan's friends had informed Microsoft that Jaschan had created the worm.</p><p><a href="https://en.m.wikipedia.org/wiki/Sasser_(computer_worm)">https://en.m.wikipedia.org/wiki/Sasser_(computer_worm)</a></p><p><a href="https://twitter.com/todayininfosec/status/1390689536670420998">https://twitter.com/todayininfosec/status/1390689536670420998</a></p><p>9th May 1990: Operation Sundevil was revealed in a press release. It was a US Secret Service crackdown on "illegal computer hacking activities." Raids occurred in ~15 cities, resulting in a measly 3 arrests.</p><p><a href="https://twitter.com/todayininfosec/status/1259301463102074880">https://twitter.com/todayininfosec/status/1259301463102074880</a></p><p>The Hacker Crackdown audiobook <a href="https://boingboing.net/2008/01/13/podcast-of-bruce-ste.html">https://boingboing.net/2008/01/13/podcast-of-bruce-ste.html</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p>Ransomware victim Colonial Pipeline paid $5m to get oil pumping again, restored from backups anyway</p><p>Colonial Pipeline's operators reportedly paid $5m to regain control of their digital systems and get the pipeline pumping oil following last week's ransomware infection.</p><p>News of the payoff was <a href="https://www.bloomberg.com/news/articles/2021-05-13/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom">broken</a> by Bloomberg – which not only cited anonymous sources but also mocked other news outlets' anonymous sources for saying earlier this week that the American pipeline operator would never pay the ransom.</p><p><a href="https://www.theregister.com/2021/05/13/colonial_pipeline_ransom/">https://www.theregister.com/2021/05/13/colonial_pipeline_ransom/</a></p><p><a href="https://twitter.com/KimZetter/status/1392923544753872896">https://twitter.com/KimZetter/status/1392923544753872896</a></p><p> </p><p>Colonial Pipeline hackers apologize, promise to ransom less controversial targets in future</p><p><a href="https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation">https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation</a></p><p>Colonial Pipeline was looking to hire a cybersecurity manager before the ransomware attack shut down operations</p><p><a href="https://www.theregister.com/2021/05/13/colonial_pipeline_hiring_cybersecurity_manager/">https://www.theregister.com/2021/05/13/colonial_pipeline_hiring_cybersecurity_manager/</a></p><p> </p><p><strong> Billy Big Balls of the Week</strong></p><p>Hackers Are Having a Field Day With AirTags</p><p>Just two weeks after their release, several hackers and security researchers are tearing Apple’s AirTags apart and finding some issues with them.</p><p><a href="https://www.vice.com/en/article/pkbpa7/hackers-are-having-a-field-day-with-airtags">https://www.vice.com/en/article/pkbpa7/hackers-are-having-a-field-day-with-airtags</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/database-exposes-200k-fake-amazon/">Misconfigured Database Exposes 200K Fake Amazon Reviewers</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-takes-down-east-coast/">Ransomware Takes Down East Coast Fuel Pipeline</a></p><p><a href="https://www.infosecurity-magazine.com/news/university-cancels-exams-after/">University Cancels Exams After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/staff-bonus-was-crass-phishing/">Staff Bonus was “Crass” Phishing Simulation</a></p><p><a href="https://www.infosecurity-magazine.com/news/germany-facebook-whatsapp-data/">Germany Bans Facebook from Processing WhatsApp Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/axa-to-stop-reimbursing-ransom/">AXA to Stop Reimbursing Ransom Payments</a></p><p><a href="https://www.infosecurity-magazine.com/news/more-domestic-abuse-cases-involve/">More Domestic Abuse Cases Involve Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-working-parents-young-adults/">Home Working Parents and Young Adults Are Most Risky IT Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/">Biden Executive Order Mandates Zero Trust and Strong Encryption</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/mJftefv1D9HrmUuveFquQjJ4RjKFw34sY68mNjfWlh4KNypNPNvKKaYM-1nl1SlfF4VtLbdXBJkDAifcrOrEAYlH_BP0gUo2ri82EIXG8n0gBH9ollHIqVuWa1MPE8wxgHDhtG6R" /><p><a href="https://twitter.com/browninfosecguy/status/1392503491042611202">https://twitter.com/browninfosecguy/status/1392503491042611202</a></p><p><a href="https://twitter.com/olafhartong">Olaf Hartong @olafhartong: </a>FreemiumBackups</p><p><a href="https://twitter.com/IainCyto">Iain Cyto @IainCyto: </a>Surprise Pen Test Posse.</p><p><a href="https://twitter.com/illustrioushefe">Biteater @illustrioushefe: </a>WindowsOffender</p><p><a href="https://twitter.com/davidshipley">David Shipley @davidshipley: </a>Trailer Park Crypto Boys</p><p><a href="https://twitter.com/Nutritionist_AP">Adrian @Nutritionist_AP: </a>RanSomewhere</p><p><a href="https://twitter.com/0ldNavyDude">Old Navy Dude next @ DEFCON & HIMMS @0ldNavyDude: </a>Ransom McRansomface</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 May 2021 13:25:27 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnēs, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-55-hitting-the-limit-qb25f6xp</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>6th May 1995: Chris Lamprecht (aka "Minor Threat") became the first person banned from the Internet. He received a 70 month sentence for money laundering...and was banned from the Internet until 2003.</p><p><a href="https://www.wired.com/1997/12/twice-removed-locked-up-and-barred-from-net/">https://www.wired.com/1997/12/twice-removed-locked-up-and-barred-from-net/</a></p><p><a href="https://twitter.com/todayininfosec/status/1257862817371156480">https://twitter.com/todayininfosec/status/1257862817371156480</a></p><p>7th May 2004: 18-year-old German computer science student Sven Jaschan was arrested for writing the Sasser worm and the NetSky worm. One of Jaschan's friends had informed Microsoft that Jaschan had created the worm.</p><p><a href="https://en.m.wikipedia.org/wiki/Sasser_(computer_worm)">https://en.m.wikipedia.org/wiki/Sasser_(computer_worm)</a></p><p><a href="https://twitter.com/todayininfosec/status/1390689536670420998">https://twitter.com/todayininfosec/status/1390689536670420998</a></p><p>9th May 1990: Operation Sundevil was revealed in a press release. It was a US Secret Service crackdown on "illegal computer hacking activities." Raids occurred in ~15 cities, resulting in a measly 3 arrests.</p><p><a href="https://twitter.com/todayininfosec/status/1259301463102074880">https://twitter.com/todayininfosec/status/1259301463102074880</a></p><p>The Hacker Crackdown audiobook <a href="https://boingboing.net/2008/01/13/podcast-of-bruce-ste.html">https://boingboing.net/2008/01/13/podcast-of-bruce-ste.html</a>  </p><p> </p><p><strong>Rant of the Week</strong></p><p>Ransomware victim Colonial Pipeline paid $5m to get oil pumping again, restored from backups anyway</p><p>Colonial Pipeline's operators reportedly paid $5m to regain control of their digital systems and get the pipeline pumping oil following last week's ransomware infection.</p><p>News of the payoff was <a href="https://www.bloomberg.com/news/articles/2021-05-13/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom">broken</a> by Bloomberg – which not only cited anonymous sources but also mocked other news outlets' anonymous sources for saying earlier this week that the American pipeline operator would never pay the ransom.</p><p><a href="https://www.theregister.com/2021/05/13/colonial_pipeline_ransom/">https://www.theregister.com/2021/05/13/colonial_pipeline_ransom/</a></p><p><a href="https://twitter.com/KimZetter/status/1392923544753872896">https://twitter.com/KimZetter/status/1392923544753872896</a></p><p> </p><p>Colonial Pipeline hackers apologize, promise to ransom less controversial targets in future</p><p><a href="https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation">https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation</a></p><p>Colonial Pipeline was looking to hire a cybersecurity manager before the ransomware attack shut down operations</p><p><a href="https://www.theregister.com/2021/05/13/colonial_pipeline_hiring_cybersecurity_manager/">https://www.theregister.com/2021/05/13/colonial_pipeline_hiring_cybersecurity_manager/</a></p><p> </p><p><strong> Billy Big Balls of the Week</strong></p><p>Hackers Are Having a Field Day With AirTags</p><p>Just two weeks after their release, several hackers and security researchers are tearing Apple’s AirTags apart and finding some issues with them.</p><p><a href="https://www.vice.com/en/article/pkbpa7/hackers-are-having-a-field-day-with-airtags">https://www.vice.com/en/article/pkbpa7/hackers-are-having-a-field-day-with-airtags</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/database-exposes-200k-fake-amazon/">Misconfigured Database Exposes 200K Fake Amazon Reviewers</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-takes-down-east-coast/">Ransomware Takes Down East Coast Fuel Pipeline</a></p><p><a href="https://www.infosecurity-magazine.com/news/university-cancels-exams-after/">University Cancels Exams After Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/staff-bonus-was-crass-phishing/">Staff Bonus was “Crass” Phishing Simulation</a></p><p><a href="https://www.infosecurity-magazine.com/news/germany-facebook-whatsapp-data/">Germany Bans Facebook from Processing WhatsApp Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/axa-to-stop-reimbursing-ransom/">AXA to Stop Reimbursing Ransom Payments</a></p><p><a href="https://www.infosecurity-magazine.com/news/more-domestic-abuse-cases-involve/">More Domestic Abuse Cases Involve Tech</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-working-parents-young-adults/">Home Working Parents and Young Adults Are Most Risky IT Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/">Biden Executive Order Mandates Zero Trust and Strong Encryption</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/mJftefv1D9HrmUuveFquQjJ4RjKFw34sY68mNjfWlh4KNypNPNvKKaYM-1nl1SlfF4VtLbdXBJkDAifcrOrEAYlH_BP0gUo2ri82EIXG8n0gBH9ollHIqVuWa1MPE8wxgHDhtG6R" /><p><a href="https://twitter.com/browninfosecguy/status/1392503491042611202">https://twitter.com/browninfosecguy/status/1392503491042611202</a></p><p><a href="https://twitter.com/olafhartong">Olaf Hartong @olafhartong: </a>FreemiumBackups</p><p><a href="https://twitter.com/IainCyto">Iain Cyto @IainCyto: </a>Surprise Pen Test Posse.</p><p><a href="https://twitter.com/illustrioushefe">Biteater @illustrioushefe: </a>WindowsOffender</p><p><a href="https://twitter.com/davidshipley">David Shipley @davidshipley: </a>Trailer Park Crypto Boys</p><p><a href="https://twitter.com/Nutritionist_AP">Adrian @Nutritionist_AP: </a>RanSomewhere</p><p><a href="https://twitter.com/0ldNavyDude">Old Navy Dude next @ DEFCON & HIMMS @0ldNavyDude: </a>Ransom McRansomface</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="51884106" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6850d9ca-370e-4315-99b1-e21a9f1739d5/audio/3e3272ef-a792-4af7-86c1-8defb2b74b3b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 55 - Hitting the Limit</itunes:title>
      <itunes:author>Andrew Agnēs, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/76448be2-1c9e-4ca1-a3cf-010459daa45e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:03</itunes:duration>
      <itunes:summary>Sheds! Sheds! Sheds!

This week in Infosec takes us back to when the first person in the world was banned from using the Internet for 70 months (by a real Judge, not their parents).

Rant of the week is the will they / won’t they story of whether or not the victims will pay the ransom (hint: they did), only to discover it was not worth it!

Billy Big Balls this week Hackers Are Having a Field Day With AirTags

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week solicits suggested names for Host Unknown’s new business venture

For national password day I was told to create a password which included at least eight characters, so I chose Snow White and the Seven Dwarves.  And that is all we have to say on the topic of Little People this week.
</itunes:summary>
      <itunes:subtitle>Sheds! Sheds! Sheds!

This week in Infosec takes us back to when the first person in the world was banned from using the Internet for 70 months (by a real Judge, not their parents).

Rant of the week is the will they / won’t they story of whether or not the victims will pay the ransom (hint: they did), only to discover it was not worth it!

Billy Big Balls this week Hackers Are Having a Field Day With AirTags

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the week solicits suggested names for Host Unknown’s new business venture

For national password day I was told to create a password which included at least eight characters, so I chose Snow White and the Seven Dwarves.  And that is all we have to say on the topic of Little People this week.
</itunes:subtitle>
      <itunes:keywords>hostunknown, podcast, serious consumer advice, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">29bfd1a3-3297-44a1-8f92-75a6e09b60c0</guid>
      <title>Episode 54 - A Life Half Lived</title>
      <description><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>4th May 1990: Robert Tappan Morris was sentenced to 3 years probation, fined $10,000, and ordered to perform 400 hours of community service. Why? For releasing the Morris worm in 1988, then becoming the first person convicted under the then-new Computer Fraud and Abuse Act (CFAA).</p><p><a href="https://en.wikipedia.org/wiki/Morris_worm">https://en.wikipedia.org/wiki/Morris_worm</a></p><p><a href="https://twitter.com/todayininfosec/status/1257352370335465472">https://twitter.com/todayininfosec/status/1257352370335465472</a></p><p>4th May 2000: The ILOVEYOU worm spread worldwide, infecting an estimated 10% of the Internet-connected computers.</p><p>Its author was never prosecuted because the Philippines didn’t have any relevant laws. He was recently tracked down and interviewed about the worm:</p><p><a href="https://www.bbc.com/news/amp/technology-52458765">https://www.bbc.com/news/amp/technology-52458765</a></p><p><a href="https://twitter.com/todayininfosec/status/1257833516454211584">https://twitter.com/todayininfosec/status/1257833516454211584</a></p><p> </p><p>A little Billy Bonus...</p><img src="https://lh3.googleusercontent.com/IbVoNQ9QU4IanxDsCBH79dFt1nPQ9MYgAhcML9_JnHIo9-N0gYEDAo7nOeSnM1EDYaCZdlGu6WLpvRgcJvxLkDe_50P_TTRgCEX9_IiyNelupBvRMfJtPw70y_syNwRyrr1ff-1Y" /><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:6794950191586836480/">https://www.linkedin.com/feed/update/urn:li:activity:6794950191586836480/</a></p><p>A Little Cheap Plug:</p><p><a href="https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/">https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Twitter introduced a tip jar - except, when you use paypal to send the tip, it sends your registered address too! Noice. </p><img src="https://lh3.googleusercontent.com/CgzkNVm7YZrum9MLB9HJdAnqsTlbW3Lff-wUSPoNJTRIaqFh3Tqk75poT_C5NO8TkBME6quJMSEQ4i_HHMuH3pP-9rqKzLcTdo46lr8EWJK37eQlvVlBfcdMaEWbt4jtE6znOpXv" /><p>It’s not really an issue with twitter - more of a feature of PayPal cos that's how it sends receipts for goods and services. This threat exists with all users of PayPal. Not just tip jar. </p><p>But this isn’t really a rant about privacy or tipjar… let’s talk about Whitney Merrill’s tweet…. </p><p><a href="https://twitter.com/wbm312/status/1390444554587832324?s=20">https://twitter.com/wbm312/status/1390444554587832324?s=20</a></p><img src="https://lh6.googleusercontent.com/5iLBSeG8p_N5k_0iZAvqIEZ7m6eRcRwHLA41Yu1wz4ap1Px6tFHgdpEWsN0_jDHvkgjv4y7E2BiN8FtVYkhHSKwkgf_ga1iFW-_Hoj5_8VMlqB2HHIGH4R2QTnq1c4YHTh429shg" /><img src="https://lh6.googleusercontent.com/P1n8qJ7r0qVPI6f_WX57VSJebTTUi7HKP71H5xNC-hgmClEjNe_HdG84NKMnQ9gT3Rk4mC0lvmivHXA1w9JntRZrPZnLfsHd7gkPlcr5rMJ124b8lnpRXrAVofliBx4kgttCvIl5" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Dashcam footage showed the moment a gang of armed robbers in South Africa attempted a <a href="https://www.youtube.com/watch?v=Fgvdl87lqc8">cash-in-transit heist</a> by chasing and firing shots into a bulletproof security vehicle.</p><p>Members of a private security company were transporting money in a truck in the northern city of Pretoria on April 22 when they were attacked.</p><p>In the three-minute video, a security officer is seen driving with a colleague. Both men are wearing bulletproof vests.</p><p><a href="https://twitter.com/Abramjee/status/1388194148210167810">https://twitter.com/Abramjee/status/1388194148210167810</a></p><p><a href="https://www.insider.com/watch-video-shows-armored-cars-crew-in-daring-escape-under-fire-2021-5">https://www.insider.com/watch-video-shows-armored-cars-crew-in-daring-escape-under-fire-2021-5</a></p><img src="https://lh6.googleusercontent.com/19YDK_JcfHsYVSHHZMSLatxEzgsxuAN44Dvu_dKbn4QdvG0iNlFzEF8B5l67NjiQSAkrFUmc8XN-xVfm6z-AvDufR9jgawejT4A4XLVk909ZfmrQGOFk1fJGNg4AvqSvD1eU8VWb" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/british-prime-ministers-cell-phone/">British Prime Minister’s Cell Phone Number Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-vaccine-domain-seized/">Fake Vaccine Domain Seized</a></p><p><a href="https://www.infosecurity-magazine.com/news/shoppers-choose-guest-checkouts/">Shoppers Choose Guest Checkouts Over Security Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigs-unpatched-bugs-cloud/">Misconfigs and Unpatched Bugs Top Cloud Native Security Incidents</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-on-belgian-parliament/">Cyber-Attack on Belgian Parliament</a></p><p><a href="https://www.infosecurity-magazine.com/news/peloton-apis-exposed-all-users/">Researcher Claims Peloton APIs Exposed All Users Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/homecoming-queen-hacker-to-be/">Homecoming Queen Hacker to be Tried as an Adult</a></p><p><a href="https://www.infosecurity-magazine.com/news/capturerx-data-breach-impacts/">CaptureRx Data Breach Impacts Healthcare Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/financial-breach-reports-drop-30/">Financial Firms Report Puzzling 30% Drop in Breaches as Incidents Rise</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/PMgLjG8nZ6473FXeHnp9J1n6SVp2j8_ArXe1BHAsbmzg460mILlDRtfOQrzS12zMFQk-QwhOcoE10Gu-7cRMdbhQWxx-2HRKEH7nq89o_YvM6KwXNH7HtqK27-4G96Xv8f5qtONR" /><p><a href="https://edition.cnn.com/2021/05/05/entertainment/tiger-king-carole-baskin-crypto-coin/index.html">https://edition.cnn.com/2021/05/05/entertainment/tiger-king-carole-baskin-crypto-coin/index.html</a></p><p><a href="https://twitter.com/carole_baskin/status/1389662255747325955">https://twitter.com/carole_baskin/status/1389662255747325955</a></p><p><a href="https://twitter.com/krypt3ia/status/1389948564411932676">https://twitter.com/krypt3ia/status/1389948564411932676</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 7 May 2021 13:32:01 +0000</pubDate>
      <author>thom@tl2security.com (Carole Baskin, Andrew Agnês, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-54-a-life-half-lived-PbVyKhjD</link>
      <content:encoded><![CDATA[<p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” Twitter account</p><p>4th May 1990: Robert Tappan Morris was sentenced to 3 years probation, fined $10,000, and ordered to perform 400 hours of community service. Why? For releasing the Morris worm in 1988, then becoming the first person convicted under the then-new Computer Fraud and Abuse Act (CFAA).</p><p><a href="https://en.wikipedia.org/wiki/Morris_worm">https://en.wikipedia.org/wiki/Morris_worm</a></p><p><a href="https://twitter.com/todayininfosec/status/1257352370335465472">https://twitter.com/todayininfosec/status/1257352370335465472</a></p><p>4th May 2000: The ILOVEYOU worm spread worldwide, infecting an estimated 10% of the Internet-connected computers.</p><p>Its author was never prosecuted because the Philippines didn’t have any relevant laws. He was recently tracked down and interviewed about the worm:</p><p><a href="https://www.bbc.com/news/amp/technology-52458765">https://www.bbc.com/news/amp/technology-52458765</a></p><p><a href="https://twitter.com/todayininfosec/status/1257833516454211584">https://twitter.com/todayininfosec/status/1257833516454211584</a></p><p> </p><p>A little Billy Bonus...</p><img src="https://lh3.googleusercontent.com/IbVoNQ9QU4IanxDsCBH79dFt1nPQ9MYgAhcML9_JnHIo9-N0gYEDAo7nOeSnM1EDYaCZdlGu6WLpvRgcJvxLkDe_50P_TTRgCEX9_IiyNelupBvRMfJtPw70y_syNwRyrr1ff-1Y" /><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:6794950191586836480/">https://www.linkedin.com/feed/update/urn:li:activity:6794950191586836480/</a></p><p>A Little Cheap Plug:</p><p><a href="https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/">https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Twitter introduced a tip jar - except, when you use paypal to send the tip, it sends your registered address too! Noice. </p><img src="https://lh3.googleusercontent.com/CgzkNVm7YZrum9MLB9HJdAnqsTlbW3Lff-wUSPoNJTRIaqFh3Tqk75poT_C5NO8TkBME6quJMSEQ4i_HHMuH3pP-9rqKzLcTdo46lr8EWJK37eQlvVlBfcdMaEWbt4jtE6znOpXv" /><p>It’s not really an issue with twitter - more of a feature of PayPal cos that's how it sends receipts for goods and services. This threat exists with all users of PayPal. Not just tip jar. </p><p>But this isn’t really a rant about privacy or tipjar… let’s talk about Whitney Merrill’s tweet…. </p><p><a href="https://twitter.com/wbm312/status/1390444554587832324?s=20">https://twitter.com/wbm312/status/1390444554587832324?s=20</a></p><img src="https://lh6.googleusercontent.com/5iLBSeG8p_N5k_0iZAvqIEZ7m6eRcRwHLA41Yu1wz4ap1Px6tFHgdpEWsN0_jDHvkgjv4y7E2BiN8FtVYkhHSKwkgf_ga1iFW-_Hoj5_8VMlqB2HHIGH4R2QTnq1c4YHTh429shg" /><img src="https://lh6.googleusercontent.com/P1n8qJ7r0qVPI6f_WX57VSJebTTUi7HKP71H5xNC-hgmClEjNe_HdG84NKMnQ9gT3Rk4mC0lvmivHXA1w9JntRZrPZnLfsHd7gkPlcr5rMJ124b8lnpRXrAVofliBx4kgttCvIl5" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Dashcam footage showed the moment a gang of armed robbers in South Africa attempted a <a href="https://www.youtube.com/watch?v=Fgvdl87lqc8">cash-in-transit heist</a> by chasing and firing shots into a bulletproof security vehicle.</p><p>Members of a private security company were transporting money in a truck in the northern city of Pretoria on April 22 when they were attacked.</p><p>In the three-minute video, a security officer is seen driving with a colleague. Both men are wearing bulletproof vests.</p><p><a href="https://twitter.com/Abramjee/status/1388194148210167810">https://twitter.com/Abramjee/status/1388194148210167810</a></p><p><a href="https://www.insider.com/watch-video-shows-armored-cars-crew-in-daring-escape-under-fire-2021-5">https://www.insider.com/watch-video-shows-armored-cars-crew-in-daring-escape-under-fire-2021-5</a></p><img src="https://lh6.googleusercontent.com/19YDK_JcfHsYVSHHZMSLatxEzgsxuAN44Dvu_dKbn4QdvG0iNlFzEF8B5l67NjiQSAkrFUmc8XN-xVfm6z-AvDufR9jgawejT4A4XLVk909ZfmrQGOFk1fJGNg4AvqSvD1eU8VWb" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/british-prime-ministers-cell-phone/">British Prime Minister’s Cell Phone Number Exposed</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-vaccine-domain-seized/">Fake Vaccine Domain Seized</a></p><p><a href="https://www.infosecurity-magazine.com/news/shoppers-choose-guest-checkouts/">Shoppers Choose Guest Checkouts Over Security Fears</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigs-unpatched-bugs-cloud/">Misconfigs and Unpatched Bugs Top Cloud Native Security Incidents</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyber-attack-on-belgian-parliament/">Cyber-Attack on Belgian Parliament</a></p><p><a href="https://www.infosecurity-magazine.com/news/peloton-apis-exposed-all-users/">Researcher Claims Peloton APIs Exposed All Users Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/homecoming-queen-hacker-to-be/">Homecoming Queen Hacker to be Tried as an Adult</a></p><p><a href="https://www.infosecurity-magazine.com/news/capturerx-data-breach-impacts/">CaptureRx Data Breach Impacts Healthcare Providers</a></p><p><a href="https://www.infosecurity-magazine.com/news/financial-breach-reports-drop-30/">Financial Firms Report Puzzling 30% Drop in Breaches as Incidents Rise</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/PMgLjG8nZ6473FXeHnp9J1n6SVp2j8_ArXe1BHAsbmzg460mILlDRtfOQrzS12zMFQk-QwhOcoE10Gu-7cRMdbhQWxx-2HRKEH7nq89o_YvM6KwXNH7HtqK27-4G96Xv8f5qtONR" /><p><a href="https://edition.cnn.com/2021/05/05/entertainment/tiger-king-carole-baskin-crypto-coin/index.html">https://edition.cnn.com/2021/05/05/entertainment/tiger-king-carole-baskin-crypto-coin/index.html</a></p><p><a href="https://twitter.com/carole_baskin/status/1389662255747325955">https://twitter.com/carole_baskin/status/1389662255747325955</a></p><p><a href="https://twitter.com/krypt3ia/status/1389948564411932676">https://twitter.com/krypt3ia/status/1389948564411932676</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="50005797" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e3c286bc-0c57-48c2-acf4-a169a17bc3b9/audio/6c7530fb-3682-4f2a-9b48-e1aa9bc2ed37/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 54 - A Life Half Lived</itunes:title>
      <itunes:author>Carole Baskin, Andrew Agnês, Javvad Malik, Thom Langford</itunes:author>
      <itunes:duration>00:52:05</itunes:duration>
      <itunes:summary>Never mind the quality of this episode, feel the length!

This week in Infosec takes us back to a time when a young man from south-east Asia was just looking for free internet access and accidentally shut down the UK parliamentary email system.
Rant of the week is just the tip, I promise
Billy Big Balls is the textbook definition of someone who has ice in their veins 
Industry News brings us the latest and greatest infosec news from around the globe
Tweet of the week brings back one of the stars of the original lockdown, Carole Baskin 
On this show short people jokes are not offensive.  They’re considered the height of comedy.  And that is all we have to say on the topic of Little People this week.
</itunes:summary>
      <itunes:subtitle>Never mind the quality of this episode, feel the length!

This week in Infosec takes us back to a time when a young man from south-east Asia was just looking for free internet access and accidentally shut down the UK parliamentary email system.
Rant of the week is just the tip, I promise
Billy Big Balls is the textbook definition of someone who has ice in their veins 
Industry News brings us the latest and greatest infosec news from around the globe
Tweet of the week brings back one of the stars of the original lockdown, Carole Baskin 
On this show short people jokes are not offensive.  They’re considered the height of comedy.  And that is all we have to say on the topic of Little People this week.
</itunes:subtitle>
      <itunes:keywords>$cat, bad quality podcasting, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c8ab8b2a-4775-4837-aac0-250d79c7e813</guid>
      <title>Episode 53 - The Non Fungible Podcast</title>
      <description><![CDATA[<p><a href="https://cumrocketcrypto.com/">https://cumrocketcrypto.com/</a></p><p>This week in Infosec takes us back to a time Microsoft devalued a company, before buying it and another case of something being referred to as electronic graffiti.</p><p>Rant of the week is about this one time, at basecamp</p><p>Industry News brings us the latest and greatest infosec news from around the globe</p><p>Billy Big Balls talks about Apple’s app transparency</p><p>Tweet of the week tells us why the CEO of a $2bn Bay Area tech biz was fired (the real reason may SHOCK you)</p><p>It’s hard being overlooked all the time and that is all we have to say on the topic of Little People this week.</p><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account:</p><p>23rd April 2008: Microsoft announced that some of its antivirus tools had mislabeled Skype as adware for several days due to a bad definition update. 3 years later Microsoft bought Skype for $8.5 billion. </p><p><a href="https://www.computerworld.com/article/2787019/microsoft-mislabels-skype-as-adware.html">https://www.computerworld.com/article/2787019/microsoft-mislabels-skype-as-adware.html</a></p><p><a href="https://www.theregister.com/2010/04/21/mcafee_false_positive/">https://www.theregister.com/2010/04/21/mcafee_false_positive/</a></p><p><a href="https://twitter.com/todayininfosec/status/1253558642537713664">https://twitter.com/todayininfosec/status/1253558642537713664</a></p><p>27th April 1986: In protest of rates for satellite dish owners, Captain Midnight jammed HBO's satellite signal for 4 minutes.</p><p>Why did he do it? To raise awareness about unfair pricing and restrictive trade practices.</p><p><a href="https://en.m.wikipedia.org/wiki/Captain_Midnight_broadcast_signal_intrusion">https://en.m.wikipedia.org/wiki/Captain_Midnight_broadcast_signal_intrusion</a></p><p><a href="https://youtu.be/gtdwD0qqApQ">https://youtu.be/gtdwD0qqApQ</a></p><p><a href="https://ultimateclassicrock.com/captain-midnight-hbo/">https://ultimateclassicrock.com/captain-midnight-hbo/</a>  </p><p><a href="https://twitter.com/todayininfosec/status/1254799686906425346">https://twitter.com/todayininfosec/status/1254799686906425346</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>1. No more societal and political discussions on our company Basecamp account. </p><p>2. No more paternalistic benefits.</p><p>3. No more committees.</p><p>4. No more lingering or dwelling on past decisions.</p><p>5. No more 360 reviews. </p><p>6. No forgetting what we do here. </p><p><a href="https://world.hey.com/jason/changes-at-basecamp-7f32afc5">https://world.hey.com/jason/changes-at-basecamp-7f32afc5</a></p><p>Wider fallout:</p><p><a href="https://twitter.com/CaseyNewton/status/1387195551205105666">https://twitter.com/CaseyNewton/status/1387195551205105666</a></p><p><a href="https://twitter.com/jonasdowney/status/1386792772334768130">https://twitter.com/jonasdowney/status/1386792772334768130</a></p><p><a href="https://twitter.com/fox/status/1386836877857099777">https://twitter.com/fox/status/1386836877857099777</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Apple’s AppTrackingTransparency for iOS 14.5 is finally out. Here’s what it means for your privacy.</p><p><a href="https://www.eff.org/deeplinks/2021/04/apples-apptrackingtransparency-upending-mobile-phone-tracking">https://www.eff.org/deeplinks/2021/04/apples-apptrackingtransparency-upending-mobile-phone-tracking</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lockdown-hotel-bookings-risk-due/">Lockdown Hotel Bookings at Risk Due to DMARC Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/last-chance-forensics-teams-emotet/">Last Chance for Forensics Teams Ahead of Emotet Sunday Deadline</a></p><p><a href="https://www.infosecurity-magazine.com/news/space-command-to-launch-dedicated/">Space Command to Launch Dedicated Cyber Center</a></p><p><a href="https://www.infosecurity-magazine.com/news/nintendo-sues-bowser/">Nintendo Sues Bowser</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-impersonate-chase/">Threat Actors Impersonate Chase Bank</a></p><p><a href="https://www.infosecurity-magazine.com/news/revil-removes-apple-extortion/">REvil Removes Apple Extortion Attempt from Site: Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/covid19-rattles-banks-insurers/">#COVID19 Rattles Banks and Insurers as Security Budgets Are Slashed</a></p><p><a href="https://www.infosecurity-magazine.com/news/emotet-group-harvested-43-million/">Emotet Group Harvested Over 4.3 Million Victim Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-arrests-alleged-crypto-mixer/">US Arrests Alleged Crypto Mixer</a></p><p> </p><p>The <a href="https://www.cellebrite.com/en/physical-analyzer/">Cellebrite Physical Analyzer</a> – the most intrusive phone-cracking tool offered by the company – no longer supports the direct extraction of iPhone data</p><p><a href="https://9to5mac.com/2021/04/27/cellebrite-physical-analyzer-iphone/">https://9to5mac.com/2021/04/27/cellebrite-physical-analyzer-iphone/</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh4.googleusercontent.com/Cy0xBQMfIywhR3hTKbUww5KO4Y3x0P7qnhaUsdEZUNNOj9t1KOvaC_BtIGYxj6qnnOAO0PvC77EVj6ivBFr6EM4My0PvnPfa4HeMKoEu_6h3vpPmIr4DF6hG8IcYUkT3RQ81D47j" /><p><a href="https://twitter.com/JenniferJJacobs/status/1387046218602225667">https://twitter.com/JenniferJJacobs/status/1387046218602225667</a></p><p><a href="https://www.bloomberg.com/technology?sref=yYYRek8e">https://www.bloomberg.com/technology?sref=yYYRek8e</a></p><p> </p><p><a href="https://www.nytimes.com/2021/04/29/arts/disaster-girl-meme-nft.html?smid=tw-nytimes&smtyp=cur">https://www.nytimes.com/2021/04/29/arts/disaster-girl-meme-nft.html?smid=tw-nytimes&smtyp=cur</a></p><img src="https://static01.nyt.com/images/2021/04/30/multimedia/30xp-meme/29xp-meme-articleLarge-v3.jpg?quality=75&auto=webp&disable=upscale" alt="&ldquo;Disaster Girl&rdquo;" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 Apr 2021 12:15:21 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, The Cummie Bears, Andrew Agnēs, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-53-the-non-fungible-podcast-DOo5Xsyq</link>
      <content:encoded><![CDATA[<p><a href="https://cumrocketcrypto.com/">https://cumrocketcrypto.com/</a></p><p>This week in Infosec takes us back to a time Microsoft devalued a company, before buying it and another case of something being referred to as electronic graffiti.</p><p>Rant of the week is about this one time, at basecamp</p><p>Industry News brings us the latest and greatest infosec news from around the globe</p><p>Billy Big Balls talks about Apple’s app transparency</p><p>Tweet of the week tells us why the CEO of a $2bn Bay Area tech biz was fired (the real reason may SHOCK you)</p><p>It’s hard being overlooked all the time and that is all we have to say on the topic of Little People this week.</p><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” Twitter account:</p><p>23rd April 2008: Microsoft announced that some of its antivirus tools had mislabeled Skype as adware for several days due to a bad definition update. 3 years later Microsoft bought Skype for $8.5 billion. </p><p><a href="https://www.computerworld.com/article/2787019/microsoft-mislabels-skype-as-adware.html">https://www.computerworld.com/article/2787019/microsoft-mislabels-skype-as-adware.html</a></p><p><a href="https://www.theregister.com/2010/04/21/mcafee_false_positive/">https://www.theregister.com/2010/04/21/mcafee_false_positive/</a></p><p><a href="https://twitter.com/todayininfosec/status/1253558642537713664">https://twitter.com/todayininfosec/status/1253558642537713664</a></p><p>27th April 1986: In protest of rates for satellite dish owners, Captain Midnight jammed HBO's satellite signal for 4 minutes.</p><p>Why did he do it? To raise awareness about unfair pricing and restrictive trade practices.</p><p><a href="https://en.m.wikipedia.org/wiki/Captain_Midnight_broadcast_signal_intrusion">https://en.m.wikipedia.org/wiki/Captain_Midnight_broadcast_signal_intrusion</a></p><p><a href="https://youtu.be/gtdwD0qqApQ">https://youtu.be/gtdwD0qqApQ</a></p><p><a href="https://ultimateclassicrock.com/captain-midnight-hbo/">https://ultimateclassicrock.com/captain-midnight-hbo/</a>  </p><p><a href="https://twitter.com/todayininfosec/status/1254799686906425346">https://twitter.com/todayininfosec/status/1254799686906425346</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>1. No more societal and political discussions on our company Basecamp account. </p><p>2. No more paternalistic benefits.</p><p>3. No more committees.</p><p>4. No more lingering or dwelling on past decisions.</p><p>5. No more 360 reviews. </p><p>6. No forgetting what we do here. </p><p><a href="https://world.hey.com/jason/changes-at-basecamp-7f32afc5">https://world.hey.com/jason/changes-at-basecamp-7f32afc5</a></p><p>Wider fallout:</p><p><a href="https://twitter.com/CaseyNewton/status/1387195551205105666">https://twitter.com/CaseyNewton/status/1387195551205105666</a></p><p><a href="https://twitter.com/jonasdowney/status/1386792772334768130">https://twitter.com/jonasdowney/status/1386792772334768130</a></p><p><a href="https://twitter.com/fox/status/1386836877857099777">https://twitter.com/fox/status/1386836877857099777</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Apple’s AppTrackingTransparency for iOS 14.5 is finally out. Here’s what it means for your privacy.</p><p><a href="https://www.eff.org/deeplinks/2021/04/apples-apptrackingtransparency-upending-mobile-phone-tracking">https://www.eff.org/deeplinks/2021/04/apples-apptrackingtransparency-upending-mobile-phone-tracking</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/lockdown-hotel-bookings-risk-due/">Lockdown Hotel Bookings at Risk Due to DMARC Fail</a></p><p><a href="https://www.infosecurity-magazine.com/news/last-chance-forensics-teams-emotet/">Last Chance for Forensics Teams Ahead of Emotet Sunday Deadline</a></p><p><a href="https://www.infosecurity-magazine.com/news/space-command-to-launch-dedicated/">Space Command to Launch Dedicated Cyber Center</a></p><p><a href="https://www.infosecurity-magazine.com/news/nintendo-sues-bowser/">Nintendo Sues Bowser</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-impersonate-chase/">Threat Actors Impersonate Chase Bank</a></p><p><a href="https://www.infosecurity-magazine.com/news/revil-removes-apple-extortion/">REvil Removes Apple Extortion Attempt from Site: Report</a></p><p><a href="https://www.infosecurity-magazine.com/news/covid19-rattles-banks-insurers/">#COVID19 Rattles Banks and Insurers as Security Budgets Are Slashed</a></p><p><a href="https://www.infosecurity-magazine.com/news/emotet-group-harvested-43-million/">Emotet Group Harvested Over 4.3 Million Victim Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-arrests-alleged-crypto-mixer/">US Arrests Alleged Crypto Mixer</a></p><p> </p><p>The <a href="https://www.cellebrite.com/en/physical-analyzer/">Cellebrite Physical Analyzer</a> – the most intrusive phone-cracking tool offered by the company – no longer supports the direct extraction of iPhone data</p><p><a href="https://9to5mac.com/2021/04/27/cellebrite-physical-analyzer-iphone/">https://9to5mac.com/2021/04/27/cellebrite-physical-analyzer-iphone/</a></p><p> </p><p><strong>Tweet of the Week </strong></p><img src="https://lh4.googleusercontent.com/Cy0xBQMfIywhR3hTKbUww5KO4Y3x0P7qnhaUsdEZUNNOj9t1KOvaC_BtIGYxj6qnnOAO0PvC77EVj6ivBFr6EM4My0PvnPfa4HeMKoEu_6h3vpPmIr4DF6hG8IcYUkT3RQ81D47j" /><p><a href="https://twitter.com/JenniferJJacobs/status/1387046218602225667">https://twitter.com/JenniferJJacobs/status/1387046218602225667</a></p><p><a href="https://www.bloomberg.com/technology?sref=yYYRek8e">https://www.bloomberg.com/technology?sref=yYYRek8e</a></p><p> </p><p><a href="https://www.nytimes.com/2021/04/29/arts/disaster-girl-meme-nft.html?smid=tw-nytimes&smtyp=cur">https://www.nytimes.com/2021/04/29/arts/disaster-girl-meme-nft.html?smid=tw-nytimes&smtyp=cur</a></p><img src="https://static01.nyt.com/images/2021/04/30/multimedia/30xp-meme/29xp-meme-articleLarge-v3.jpg?quality=75&auto=webp&disable=upscale" alt="&ldquo;Disaster Girl&rdquo;" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56092537" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/e4eea711-422a-4785-af47-d2cf668ba971/audio/d845b129-c49c-4a46-9ba6-89ba379e6193/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 53 - The Non Fungible Podcast</itunes:title>
      <itunes:author>Thom Langford, The Cummie Bears, Andrew Agnēs, Javvad Malik</itunes:author>
      <itunes:duration>00:58:26</itunes:duration>
      <itunes:summary>We don&apos;t know what a non-fungible token is either.

This week in Infosec takes us back to a time Microsoft devalued a company, before buying it and another case of something being referred to as electronic graffiti.
Rant of the week is about this one time, at basecamp
Industry News brings us the latest and greatest infosec news from around the globe
Billy Big Balls talks about Apple’s app transparency
Tweet of the week tells us why the CEO of a $2bn Bay Area tech biz was fired (the real reason may SHOCK you)
It’s hard being overlooked all the time and that is all we have to say on the topic of Little People this week.</itunes:summary>
      <itunes:subtitle>We don&apos;t know what a non-fungible token is either.

This week in Infosec takes us back to a time Microsoft devalued a company, before buying it and another case of something being referred to as electronic graffiti.
Rant of the week is about this one time, at basecamp
Industry News brings us the latest and greatest infosec news from around the globe
Billy Big Balls talks about Apple’s app transparency
Tweet of the week tells us why the CEO of a $2bn Bay Area tech biz was fired (the real reason may SHOCK you)
It’s hard being overlooked all the time and that is all we have to say on the topic of Little People this week.</itunes:subtitle>
      <itunes:keywords>non fungible token, podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f3b037e-fa32-41d4-bad4-12f785da1388</guid>
      <title>Episode 52 - The Boys Are Back In Town</title>
      <description><![CDATA[<p>Thom’s l33t crypto coin investments</p><img src="https://lh6.googleusercontent.com/9xeiojf5UwS_1AfVdN-5oPzqVio2-kJ4982euqRtWLiJo6hL7HWW9uW4PdAqqI3_T68jiQkEogJkjX0taIM0Lgwg9dfM7ibzIlawgxbBO0HCxF0RScj-JoV89D8ewJ0OaQ2A-GIU" /><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>18th April 1995: proff (Julian Assange) published "The Dan Farmer Rap", about SATAN author, Dan Farmer.</p><p>Yes, that Julian Assange.</p><p>Yes, the same one.</p><p>Yes.</p><p><a href="https://seclists.org/bugtraq/1995/Apr/195">https://seclists.org/bugtraq/1995/Apr/195</a></p><p>19th April 2010: The OWASP Top 10 for 2010 was officially released.</p><p><a href="http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease">http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease</a></p><p><a href="https://twitter.com/todayininfosec/status/1251895022598803457">https://twitter.com/todayininfosec/status/1251895022598803457</a></p><p>19th April 2011: Microsoft published a policy requiring employees to follow specific procedures when reporting vulnerabilities in 3rd-party products.</p><img src="https://lh3.googleusercontent.com/J6T_jOdpOF8CSxv4hpQbw5jub9X1WvPHHO2Wm0LFzjMFE7zuoeL0GEcFNJQlCUbODIoyaP9KHOdBy67z0cYriGmcFoJOAKpPIISgxBwbSKz6T3NXGY3eqCFZN0xyZBNGR7wp-D0u" /><p><a href="https://twitter.com/todayininfosec/status/1252023386026340352">https://twitter.com/todayininfosec/status/1252023386026340352</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>They Hacked McDonald’s Ice Cream Machines—and Started a Cold War</p><img src="https://lh4.googleusercontent.com/fv8Ivu8HwabZQN1cowReUUoL3-ESjL_6f6MycaDAmTmdcm7WGzGUsdgOO1DyooKui8QTuaWgms7Y0FlTkXtaw21t5oHN1PGywFPNIpbsrgPqYbEfG2gKEDmc8iuL4PIxMhhfciHf" /><img src="https://lh3.googleusercontent.com/oL51xv9SxZJtoOzjfLlQzYNqKfOo2-0Q9fsl61ZDFL2cEqJDl2ho9qgz4mVfYpJ3FNZmXGsn_Euqno9zCfcfi8y4gLxJ5-OWW6BCVySMAr6_bwKNV88G9TaA79e8NC_HC14__Qwz" /><p><a href="https://www.wired.com/story/they-hacked-mcdonalds-ice-cream-makers-started-cold-war/">https://www.wired.com/story/they-hacked-mcdonalds-ice-cream-makers-started-cold-war/</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Cellebrite makes software to automate physically extracting and indexing data from mobile devices.</p><p><a href="https://signal.org/blog/cellebrite-vulnerabilities/">https://signal.org/blog/cellebrite-vulnerabilities/</a></p><p>ELI5: <a href="https://twitter.com/ErrataRob/status/1385020198697291777?s=20">https://twitter.com/ErrataRob/status/1385020198697291777?s=20</a></p><p> </p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/google-to-delay-publishing-bug/">Google to Delay Publishing Bug Details for 30 Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-issued-over-42-million-in/">ICO Issued Over £42 Million in Fines Last Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/fin7-sysadmin-gets-10-years-behind/">FIN7 Sysadmin Gets 10 Years Behind Bars</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-trumpets-new-mobile-app/">Google Trumpets New Mobile App Security Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi5-10000-brits-approached-by/">MI5: 10,000+ Brits Approached by Spies on Social Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/dating-service-suffers-data-breach/">Dating Service Suffers Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-sued-over-use-of-minors-data/">TikTok Sued Over Use of Minors’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-launches-ransomware-taskforce/">DoJ Launches Ransomware Taskforce as Apple Hit by Extortion Attempt</a></p><p><a href="https://www.infosecurity-magazine.com/news/stallone-classic-a-password/">Stallone Classic a Password Favorite</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/hOvBKWMtQBRSvG61GSXkC7JhWRctxxEhP1-5UBNPJvQfe6D8J4CmQUvwc9pD_DmlssXr3j7AgVCOjDHanYezlbD10KRPbu49dhvW735yUTXN6U4Lnx5dlhcJ4Au4GDKnWB9zcT4n" /><p><a href="https://twitter.com/H3KTlC/status/1385232019387404296?s=20">https://twitter.com/H3KTlC/status/1385232019387404296?s=20</a></p><p>Related:</p><p>Add another cause of mental health concern from the past year’s Pandemic-induced, work-from-home requirements.  New research from Microsoft shows the potential downside of the virtual workplace, confirming that stress increases over the course of back-to-back virtual meetings.</p><p><a href="https://www.forbes.com/sites/brucerogers/2021/04/20/our-brains-need-breaks-from-virtual-meetings/?sh=6de6770a21e9">https://www.forbes.com/sites/brucerogers/2021/04/20/our-brains-need-breaks-from-virtual-meetings/?sh=6de6770a21e9</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Hat-tip to Martin @maxsec Hepworth for bringing this story to our attention (and the reason Smashing Security missed it is because they record on Tuesday and spend a day and a half editing their show before releasing it):</p><p>“Linux kernel developers do not like being experimented on”</p><p><a href="https://twitter.com/gregkh/status/1384785747874656257?s=20">https://twitter.com/gregkh/status/1384785747874656257?s=20</a></p><p><a href="https://lore.kernel.org/linux-nfs/YH%2FfM%2FTsbmcZzwnX@kroah.com/">https://lore.kernel.org/linux-nfs/YH%2FfM%2FTsbmcZzwnX@kroah.com/</a></p><img src="https://lh4.googleusercontent.com/cEENyELl0fvW8MOE4T4kQMnaelYKj6wH2DM36NBzElTfTmMNQjFUVMEhTw5QKhgEZbe32GVhqYZy9cGiK5JB99LVlIFBQLeL95T8B6Era_TsrlV-4VXU1NFTPHjvXcqb_rDpCoZ9" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 23 Apr 2021 12:57:01 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-52-the-boys-are-back-in-town-_Dum8ucx</link>
      <content:encoded><![CDATA[<p>Thom’s l33t crypto coin investments</p><img src="https://lh6.googleusercontent.com/9xeiojf5UwS_1AfVdN-5oPzqVio2-kJ4982euqRtWLiJo6hL7HWW9uW4PdAqqI3_T68jiQkEogJkjX0taIM0Lgwg9dfM7ibzIlawgxbBO0HCxF0RScj-JoV89D8ewJ0OaQ2A-GIU" /><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>18th April 1995: proff (Julian Assange) published "The Dan Farmer Rap", about SATAN author, Dan Farmer.</p><p>Yes, that Julian Assange.</p><p>Yes, the same one.</p><p>Yes.</p><p><a href="https://seclists.org/bugtraq/1995/Apr/195">https://seclists.org/bugtraq/1995/Apr/195</a></p><p>19th April 2010: The OWASP Top 10 for 2010 was officially released.</p><p><a href="http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease">http://web.archive.org/web/20100628190859/http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease</a></p><p><a href="https://twitter.com/todayininfosec/status/1251895022598803457">https://twitter.com/todayininfosec/status/1251895022598803457</a></p><p>19th April 2011: Microsoft published a policy requiring employees to follow specific procedures when reporting vulnerabilities in 3rd-party products.</p><img src="https://lh3.googleusercontent.com/J6T_jOdpOF8CSxv4hpQbw5jub9X1WvPHHO2Wm0LFzjMFE7zuoeL0GEcFNJQlCUbODIoyaP9KHOdBy67z0cYriGmcFoJOAKpPIISgxBwbSKz6T3NXGY3eqCFZN0xyZBNGR7wp-D0u" /><p><a href="https://twitter.com/todayininfosec/status/1252023386026340352">https://twitter.com/todayininfosec/status/1252023386026340352</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>They Hacked McDonald’s Ice Cream Machines—and Started a Cold War</p><img src="https://lh4.googleusercontent.com/fv8Ivu8HwabZQN1cowReUUoL3-ESjL_6f6MycaDAmTmdcm7WGzGUsdgOO1DyooKui8QTuaWgms7Y0FlTkXtaw21t5oHN1PGywFPNIpbsrgPqYbEfG2gKEDmc8iuL4PIxMhhfciHf" /><img src="https://lh3.googleusercontent.com/oL51xv9SxZJtoOzjfLlQzYNqKfOo2-0Q9fsl61ZDFL2cEqJDl2ho9qgz4mVfYpJ3FNZmXGsn_Euqno9zCfcfi8y4gLxJ5-OWW6BCVySMAr6_bwKNV88G9TaA79e8NC_HC14__Qwz" /><p><a href="https://www.wired.com/story/they-hacked-mcdonalds-ice-cream-makers-started-cold-war/">https://www.wired.com/story/they-hacked-mcdonalds-ice-cream-makers-started-cold-war/</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Cellebrite makes software to automate physically extracting and indexing data from mobile devices.</p><p><a href="https://signal.org/blog/cellebrite-vulnerabilities/">https://signal.org/blog/cellebrite-vulnerabilities/</a></p><p>ELI5: <a href="https://twitter.com/ErrataRob/status/1385020198697291777?s=20">https://twitter.com/ErrataRob/status/1385020198697291777?s=20</a></p><p> </p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/google-to-delay-publishing-bug/">Google to Delay Publishing Bug Details for 30 Days</a></p><p><a href="https://www.infosecurity-magazine.com/news/ico-issued-over-42-million-in/">ICO Issued Over £42 Million in Fines Last Year</a></p><p><a href="https://www.infosecurity-magazine.com/news/fin7-sysadmin-gets-10-years-behind/">FIN7 Sysadmin Gets 10 Years Behind Bars</a></p><p><a href="https://www.infosecurity-magazine.com/news/google-trumpets-new-mobile-app/">Google Trumpets New Mobile App Security Standard</a></p><p><a href="https://www.infosecurity-magazine.com/news/mi5-10000-brits-approached-by/">MI5: 10,000+ Brits Approached by Spies on Social Site</a></p><p><a href="https://www.infosecurity-magazine.com/news/dating-service-suffers-data-breach/">Dating Service Suffers Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-sued-over-use-of-minors-data/">TikTok Sued Over Use of Minors’ Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-launches-ransomware-taskforce/">DoJ Launches Ransomware Taskforce as Apple Hit by Extortion Attempt</a></p><p><a href="https://www.infosecurity-magazine.com/news/stallone-classic-a-password/">Stallone Classic a Password Favorite</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/hOvBKWMtQBRSvG61GSXkC7JhWRctxxEhP1-5UBNPJvQfe6D8J4CmQUvwc9pD_DmlssXr3j7AgVCOjDHanYezlbD10KRPbu49dhvW735yUTXN6U4Lnx5dlhcJ4Au4GDKnWB9zcT4n" /><p><a href="https://twitter.com/H3KTlC/status/1385232019387404296?s=20">https://twitter.com/H3KTlC/status/1385232019387404296?s=20</a></p><p>Related:</p><p>Add another cause of mental health concern from the past year’s Pandemic-induced, work-from-home requirements.  New research from Microsoft shows the potential downside of the virtual workplace, confirming that stress increases over the course of back-to-back virtual meetings.</p><p><a href="https://www.forbes.com/sites/brucerogers/2021/04/20/our-brains-need-breaks-from-virtual-meetings/?sh=6de6770a21e9">https://www.forbes.com/sites/brucerogers/2021/04/20/our-brains-need-breaks-from-virtual-meetings/?sh=6de6770a21e9</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Hat-tip to Martin @maxsec Hepworth for bringing this story to our attention (and the reason Smashing Security missed it is because they record on Tuesday and spend a day and a half editing their show before releasing it):</p><p>“Linux kernel developers do not like being experimented on”</p><p><a href="https://twitter.com/gregkh/status/1384785747874656257?s=20">https://twitter.com/gregkh/status/1384785747874656257?s=20</a></p><p><a href="https://lore.kernel.org/linux-nfs/YH%2FfM%2FTsbmcZzwnX@kroah.com/">https://lore.kernel.org/linux-nfs/YH%2FfM%2FTsbmcZzwnX@kroah.com/</a></p><img src="https://lh4.googleusercontent.com/cEENyELl0fvW8MOE4T4kQMnaelYKj6wH2DM36NBzElTfTmMNQjFUVMEhTw5QKhgEZbe32GVhqYZy9cGiK5JB99LVlIFBQLeL95T8B6Era_TsrlV-4VXU1NFTPHjvXcqb_rDpCoZ9" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="62488566" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/85889fbb-27e4-44dc-9f56-7e239d1c0427/audio/339acb5a-e120-495e-b23c-5baab01f1d41/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 52 - The Boys Are Back In Town</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnes</itunes:author>
      <itunes:duration>01:05:05</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to an infosec rap artist who predates even Host Unknown and reminds us of just how recently responsible disclosure became a thing.

Rant of the week talks about a McDonalds cold war.

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the Week is a simple reminder to take care of yourself

Billy big Balls: Signal to Cellebrite - Bye Felicia!

Sticky Pickle of the week is about students pushing the boundaries of ethics 

If the sky falls, tall people will be killed first.  And that is something positive we have to say about Little People this week.</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to an infosec rap artist who predates even Host Unknown and reminds us of just how recently responsible disclosure became a thing.

Rant of the week talks about a McDonalds cold war.

Industry News brings us the latest and greatest infosec news from around the globe

Tweet of the Week is a simple reminder to take care of yourself

Billy big Balls: Signal to Cellebrite - Bye Felicia!

Sticky Pickle of the week is about students pushing the boundaries of ethics 

If the sky falls, tall people will be killed first.  And that is something positive we have to say about Little People this week.</itunes:subtitle>
      <itunes:keywords>rant of the week, today in infosec, tweet of the week, host unknown, sticky pickle of the week, infosec, billy big balls of the week</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">74440b52-f5ae-4cd2-b52c-b9aae2b5d456</guid>
      <title>Episode 51 - Punking the Punkbuster</title>
      <description><![CDATA[<p>We think we sound much better this week, all thanks to Krisp! Tighten up your audio, remove background noise, and annoying work colleagues, all with Krisp. Download it here:</p><p><a href="https://ref.krisp.ai/u/ue2a67ba76">https://ref.krisp.ai/u/ue2a67ba76</a></p><p> </p><p><i>One advantage of being short is that you get to be in the front of all pictures taken of a group and that is all we have to say about Little People this week.</i></p><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>15th April 2000: The RCMP arrested a Canadian juvenile known as MafiaBoy for a DDoS attack against cnn.com.</p><p><a href="https://twitter.com/todayininfosec/status/1250622615204454400">https://twitter.com/todayininfosec/status/1250622615204454400</a> <a href="https://en.wikipedia.org/wiki/Michael_Calce">https://en.wikipedia.org/wiki/Michael_Calce</a></p><p>14th April 2005: It was announced that the National Infrastructure Advisory Council (NIAC) had chosen FIRST to be the custodian of the Common Vulnerability Scoring System (CVSS), the then-emerging standard in vulnerability scoring.</p><p><a href="https://twitter.com/todayininfosec/status/1250251203390275584">https://twitter.com/todayininfosec/status/1250251203390275584</a></p><p>16th April 2014: Host Unknown released their debut music video to great acclaim within the Infosec echo-chamber</p><p><a href="https://twitter.com/HostUnknownTV/status/456395301159305216">https://twitter.com/HostUnknownTV/status/456395301159305216</a></p><p>Jav’s proposal for Pulp Security from 2011 (cue Mesirlou  clarinet version to avoid copyright infringment notices)</p><p>Cynic: So tell me more about America.</p><p>Jester: Well it's the same shit we got here, it's just a little different.</p><p>Cynic: Example?</p><p>Jester: Well I mean, you can get encryption products out there. It's legal for you to own it, it's legal for you to install it… but get this. If you try to export it out of the country it's illegal for you to do it.</p><p>Cynic: Damn man, that's harsh.</p><p>Jester: You know what they call a router (pronounced rooter) out in the US?</p><p>Cynic: They don't call it a Rooter?</p><p>Jester: Nah man, they got their own system, they call it a Router (pronounced rowter)</p><p>Cynic: haha</p><p> </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/qnbAd4_HxA3uZZil5EfKi5Si3a694-n4HFZUD5GNPOt_reyr5cZ0mqEj0DvDUSVPElUj-5jiAWpK5csM3WJRcNQav4JeIQDE9mNZPXuAeYBv3_lCz3lU5_BHtjdBoxI3x3KYTom4" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-hack-hackers-underground/">Hackers Hacked as Underground Carding Site is Breached</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-groups-trading-fake/">Facebook Removes 16k Groups for Trading Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/brits-still-confused-by/">Brits Still Confused by Multi-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/food-shortages-dutch-supermarkets/">Food Shortages at Dutch Supermarkets After Ransomware Outage</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-shutters-half/">Cyber-Attack Shutters Half of Tasmania’s Casinos</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patch-four-critical/">Microsoft Patches Four More Critical Exchange Server Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawsuit-facial-recognition-tech/">Lawsuit Filed After Facial Recognition Tech Leads to Wrongful Arrest</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-10-years-multimilliondollar/">Man Gets 10 Years for Multimillion-Dollar Medicare Fraud Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-data-protection-approve/">Europe's Data Protection Guardians Green Light EU-UK Data Flows</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><img src="https://lh4.googleusercontent.com/Bg4gPBnnp-KHpSfPwXecmH4vXbWsVVTjI3VtJscmtorMTNDgwmjzRk_BDHyWxN63mDeUSnWQO9tw9CoKHTAhEL1ycBUKXjpiYzRlzwGYblm3IqhjQp1AS-FBal6PkSbZb6tVG93M" /><p>How I pwned an ex-CISO and Smashing Security <a href="https://youtu.be/lb5htJmjcFM">https://youtu.be/lb5htJmjcFM</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>Robert McArdle - @bobmcardle</p><p>Director FTR - CyberCrime Research for<a href="https://twitter.com/TrendMicro"> @TrendMicro</a>. Lecturer in Malware Analysis.</p><img src="https://lh4.googleusercontent.com/RZ_Feiop9PjmPESNDk17LlSuedt9DVv7BHQuXWZxCv3mlmQ9Z0PRgxqZEJVAXuH2fyumCMZEjg71OwUBEBrOKhAodEeiZZn71rDgGj4bewhEldYIVg7ImvYFnDaaW3UyymLI3Lw4" /><p><a href="https://twitter.com/bobmcardle/status/1382602129005772801">https://twitter.com/bobmcardle/status/1382602129005772801</a></p><p> </p><p>Sticky Pickle of the Week</p><p>Your company is looking to promote an upcoming Women in Security webinar and you’re looking to maximise engagement on your social media channels so you come up with a single question which you believe will solicit engagement and believe the structure of the question is in a way that keeps responses on topic:</p><p>“What according to you are the most common challenges faced by women in the cybersecurity domain?”.</p><p>Sound good so far?  Can you make it simpler by providing multiple choice answers to choose from?  It’s not a bad strategy so what are the optional responses to the most common challenges faced by women in the industry are?</p><p>A: “Only men can do this job”</p><p>B: “Women can’t handle this job”</p><p>C: “Women aren’t encouraged enough.”</p><p>Now the responses you’re receiving to this insightful quiz are not going in the direction you thought they would - what are your next steps?</p><p><a href="https://www.infosecurity-magazine.com/blogs/the-story-of-the-eccouncil-gender/">https://www.infosecurity-magazine.com/blogs/the-story-of-the-eccouncil-gender/</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Apr 2021 13:24:07 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-51-punking-the-punkbuster-TtJF0pGt</link>
      <content:encoded><![CDATA[<p>We think we sound much better this week, all thanks to Krisp! Tighten up your audio, remove background noise, and annoying work colleagues, all with Krisp. Download it here:</p><p><a href="https://ref.krisp.ai/u/ue2a67ba76">https://ref.krisp.ai/u/ue2a67ba76</a></p><p> </p><p><i>One advantage of being short is that you get to be in the front of all pictures taken of a group and that is all we have to say about Little People this week.</i></p><p> </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>15th April 2000: The RCMP arrested a Canadian juvenile known as MafiaBoy for a DDoS attack against cnn.com.</p><p><a href="https://twitter.com/todayininfosec/status/1250622615204454400">https://twitter.com/todayininfosec/status/1250622615204454400</a> <a href="https://en.wikipedia.org/wiki/Michael_Calce">https://en.wikipedia.org/wiki/Michael_Calce</a></p><p>14th April 2005: It was announced that the National Infrastructure Advisory Council (NIAC) had chosen FIRST to be the custodian of the Common Vulnerability Scoring System (CVSS), the then-emerging standard in vulnerability scoring.</p><p><a href="https://twitter.com/todayininfosec/status/1250251203390275584">https://twitter.com/todayininfosec/status/1250251203390275584</a></p><p>16th April 2014: Host Unknown released their debut music video to great acclaim within the Infosec echo-chamber</p><p><a href="https://twitter.com/HostUnknownTV/status/456395301159305216">https://twitter.com/HostUnknownTV/status/456395301159305216</a></p><p>Jav’s proposal for Pulp Security from 2011 (cue Mesirlou  clarinet version to avoid copyright infringment notices)</p><p>Cynic: So tell me more about America.</p><p>Jester: Well it's the same shit we got here, it's just a little different.</p><p>Cynic: Example?</p><p>Jester: Well I mean, you can get encryption products out there. It's legal for you to own it, it's legal for you to install it… but get this. If you try to export it out of the country it's illegal for you to do it.</p><p>Cynic: Damn man, that's harsh.</p><p>Jester: You know what they call a router (pronounced rooter) out in the US?</p><p>Cynic: They don't call it a Rooter?</p><p>Jester: Nah man, they got their own system, they call it a Router (pronounced rowter)</p><p>Cynic: haha</p><p> </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/qnbAd4_HxA3uZZil5EfKi5Si3a694-n4HFZUD5GNPOt_reyr5cZ0mqEj0DvDUSVPElUj-5jiAWpK5csM3WJRcNQav4JeIQDE9mNZPXuAeYBv3_lCz3lU5_BHtjdBoxI3x3KYTom4" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-hack-hackers-underground/">Hackers Hacked as Underground Carding Site is Breached</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-groups-trading-fake/">Facebook Removes 16k Groups for Trading Fake Reviews</a></p><p><a href="https://www.infosecurity-magazine.com/news/brits-still-confused-by/">Brits Still Confused by Multi-Factor Authentication</a></p><p><a href="https://www.infosecurity-magazine.com/news/food-shortages-dutch-supermarkets/">Food Shortages at Dutch Supermarkets After Ransomware Outage</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattack-shutters-half/">Cyber-Attack Shutters Half of Tasmania’s Casinos</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patch-four-critical/">Microsoft Patches Four More Critical Exchange Server Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/lawsuit-facial-recognition-tech/">Lawsuit Filed After Facial Recognition Tech Leads to Wrongful Arrest</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-10-years-multimilliondollar/">Man Gets 10 Years for Multimillion-Dollar Medicare Fraud Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-data-protection-approve/">Europe's Data Protection Guardians Green Light EU-UK Data Flows</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><img src="https://lh4.googleusercontent.com/Bg4gPBnnp-KHpSfPwXecmH4vXbWsVVTjI3VtJscmtorMTNDgwmjzRk_BDHyWxN63mDeUSnWQO9tw9CoKHTAhEL1ycBUKXjpiYzRlzwGYblm3IqhjQp1AS-FBal6PkSbZb6tVG93M" /><p>How I pwned an ex-CISO and Smashing Security <a href="https://youtu.be/lb5htJmjcFM">https://youtu.be/lb5htJmjcFM</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>Robert McArdle - @bobmcardle</p><p>Director FTR - CyberCrime Research for<a href="https://twitter.com/TrendMicro"> @TrendMicro</a>. Lecturer in Malware Analysis.</p><img src="https://lh4.googleusercontent.com/RZ_Feiop9PjmPESNDk17LlSuedt9DVv7BHQuXWZxCv3mlmQ9Z0PRgxqZEJVAXuH2fyumCMZEjg71OwUBEBrOKhAodEeiZZn71rDgGj4bewhEldYIVg7ImvYFnDaaW3UyymLI3Lw4" /><p><a href="https://twitter.com/bobmcardle/status/1382602129005772801">https://twitter.com/bobmcardle/status/1382602129005772801</a></p><p> </p><p>Sticky Pickle of the Week</p><p>Your company is looking to promote an upcoming Women in Security webinar and you’re looking to maximise engagement on your social media channels so you come up with a single question which you believe will solicit engagement and believe the structure of the question is in a way that keeps responses on topic:</p><p>“What according to you are the most common challenges faced by women in the cybersecurity domain?”.</p><p>Sound good so far?  Can you make it simpler by providing multiple choice answers to choose from?  It’s not a bad strategy so what are the optional responses to the most common challenges faced by women in the industry are?</p><p>A: “Only men can do this job”</p><p>B: “Women can’t handle this job”</p><p>C: “Women aren’t encouraged enough.”</p><p>Now the responses you’re receiving to this insightful quiz are not going in the direction you thought they would - what are your next steps?</p><p><a href="https://www.infosecurity-magazine.com/blogs/the-story-of-the-eccouncil-gender/">https://www.infosecurity-magazine.com/blogs/the-story-of-the-eccouncil-gender/</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58375430" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/2ee04ed6-45de-4d7b-bafb-ab8006db935e/audio/229fa2e0-cd84-4603-a11b-7bf26927d364/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 51 - Punking the Punkbuster</itunes:title>
      <itunes:author>Andrew Agnes, Thom Langford, Javvad Malik</itunes:author>
      <itunes:duration>01:00:48</itunes:duration>
      <itunes:summary>It&apos;s a wonderful week for a groundbreaking musical anniversary:

https://twitter.com/HostUnknownTV/status/456395301159305216

</itunes:summary>
      <itunes:subtitle>It&apos;s a wonderful week for a groundbreaking musical anniversary:

https://twitter.com/HostUnknownTV/status/456395301159305216

</itunes:subtitle>
      <itunes:keywords>podcast, host unknown, ci double sp, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7af0172b-3f46-4d17-86d8-2529df3a4c72</guid>
      <title>Episode 50 - The Midlife Crisis Episode</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>4th April 1977: Ron Rivest first introduced Alice and Bob in the paper "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems".</p><img src="https://lh5.googleusercontent.com/iKJrEXsdZ3K02Sb-A7JUpJiIqwfTPZVqrWj2lRC09l97yRaIRsbkWyfFjCRYWvZYLjDUUQCta_XN5uGF1PhkIkfkm7AKEoXTvQzRhAQa7gJfxMfV3AYQ4vJ802Apc_Rt9aoGhTyy" /><p><a href="https://twitter.com/todayininfosec/status/1246652917605527554">https://twitter.com/todayininfosec/status/1246652917605527554</a></p><p><a href="http://web.mit.edu/jemorris/humor/alice-and-bob">http://web.mit.edu/jemorris/humor/alice-and-bob</a></p><p><a href="https://xkcd.com/177/">https://xkcd.com/177/</a></p><p>Javvad explains it better: </p><img src="https://lh5.googleusercontent.com/OpUFI6uMKZw5JBbYpD4AYlXal-4_aUz7iRmXps7PMZyhL-v_ovFvX4bWN2H1V8fPOa1Wvb38lnCQ0ojbZtz3VDYPCcifLu0L-83AAhJAiL-J-SfBgoZ9dLEy9OOCBkyToK-9vE1F" /><img src="https://lh5.googleusercontent.com/SMJieHNdpeRqBZb0PCPXf1B-uYENDeCkTLMyarLLGBtQJ3qUAVTwJULP9XsgGJ8KYSOiuC6yao3i9lPcrnWL-UjzeVYQZ05ykOztMo17oW9jK5lJ9ReHyZVB47IkZo0oCQEdU6NM" /><p><a href="https://en.wikipedia.org/wiki/Alice_and_Bob">https://en.wikipedia.org/wiki/Alice_and_Bob</a></p><p>8th April 2014: Extended support for Microsoft Windows XP Service Pack 3 ended, nearly 6 years after SP3's release and 12 1/2 after general availability of Windows XP.</p><p><a href="https://twitter.com/todayininfosec/status/1247920644030738433">https://twitter.com/todayininfosec/status/1247920644030738433</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>The UK Cyber Security Council launches itself by pointing world+dog to domain it doesn't own</p><p>The UK Cyber Security Council announced itself to the public realm last week by touting a domain it doesn't own. Helpfully, internet jokesters then bought up variations on the official address.</p><p>A brainchild of the Department for Digital, Culture, Media and Sport, the UK Cyber Security Council is billed by the government as "the regulatory body, and voice, for UK cybersecurity education, training, and skills." As part of that it "drives progress towards meeting the key challenges the profession faces."</p><p>All very worthy and important. When British infosec folk noticed that <a href="https://pressreleases.responsesource.com/news/101075/uk-cyber-security-council-begins-as-independent-body/">the official press release</a> mentioned an email address for ukcybersecurity[.]org[.]uk, however, everything started unraveling.</p><p>Why? Because the UK Cyber Security Council didn't own ukcybersecurity[.]org[.]uk. Nobody did – until Adrian Kennard bought it and pointed it at his personal <a href="https://www.revk.uk/2021/04/uk-cyber-security-council.html">blog</a>, where he dispensed some gentle advice to the new org.</p><p>"One of the tips I can give you when it comes to cybersecurity is that you should be careful to ensure that contact details you publish actually belong to you," wrote Kennard, who runs a UK ISP, adding: "It took a while to stop laughing at the irony first, but now, yes, the UK Cyber Security Council are welcome to ukcybersecurity.org.uk. They can email me at press@ukcybersecurity.org.uk for more information (be nice)."</p><p><a href="https://www.theregister.com/2021/04/06/uk_cybersecurity_council_domain_fail_launch/">https://www.theregister.com/2021/04/06/uk_cybersecurity_council_domain_fail_launch/</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>This Tech Exec Had Her Kids Sign a User Agreement Before She Got Them Their First Phone</p><p>When it came to tech and their own kids, both <a href="https://www.inc.com/jessica-stillman/why-steve-jobs-bill-gates-both-severely-limited-their-kids-tech-use.html">Steve Jobs and Bill Gates were famously strict</a> about how much screen time they allowed. Jobs didn't let his kids use the iPad he helped invent. Gates banned his kids from getting phones until they were 14. </p><p>Just like Gates and Jobs, <a href="https://twitter.com/jenzhuscott">Jennifer Zhu Scott,</a> a Hong Kong-based tech executive and TED speaker focused on privacy issues, was concerned about the dangers of giving her two children, aged 10 and 11, smartphones--given her deep understanding of the power and perils of technology.  She drew on her professional experience and made them sign a three-page, 15-point "user agreement" for their phones. </p><p>They had to agree to share their passwords with her, ask for permission before signing up for social media accounts, be open about harassment or strange phone calls or messages, and answer any questions about how they were using their phones.</p><p>Part of the agreement is a crash course in internet privacy. It tells her daughters what we adults so often forget--that everything we put online is likely to be read, used, and sold in ways that we can't begin to imagine.</p><p>Etiquette and overuse are also covered by the agreement. It bans phone use after 8 p.m. and requires the girls put their phones down while socializing and walking. It also contains a strong warning about the long life of potentially embarrassing photos and posts shared online. </p><p>A copy of the agreement is in the show notes. </p><p><a href="https://www.inc.com/jessica-stillman/this-tech-exec-had-her-kids-sign-a-user-agreement-before-she-got-them-their-first-phone.html#:~:text=Try%20a%20'user%20agreement',power%20and%20perils%20of%20technology">https://www.inc.com/jessica-stillman/this-tech-exec-had-her-kids-sign-a-user-agreement-before-she-got-them-their-first-phone.html#:~:text=Try%20a%20'user%20agreement',power%20and%20perils%20of%20technology</a>.</p><p>Link to the agreement: </p><p><a href="https://drive.google.com/file/d/1Yc3Np00vEgAIvNV7VzEIHoxbWqqC0Oon/view">https://drive.google.com/file/d/1Yc3Np00vEgAIvNV7VzEIHoxbWqqC0Oon/view</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-suffers-second-outage-in/">Microsoft Suffers Second Outage in Two Weeks</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-of-half-a-billion-facebook/">Data of Half a Billion Facebook Users Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/australia-considers-social-media/">Australia Considers Social Media ID Requirement</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-school-district-40m-ransom/">Florida School District Held to Impossibly High Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-industry-solutions/">Cybersecurity Industry Must Find Solutions for Third-Party Data Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/siesser-chemical-weapon-dark-web/">Chemical Weapon Shopping Sends Dark Web User to Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/italian-arrested-paying-hitman/">Italian Arrested After Allegedly Paying Hitman to Murder Ex-Girlfriend</a></p><p><a href="https://www.infosecurity-magazine.com/news/college-track-coach-accused-of/"> College Track Coach Accused of Cyberstalking</a></p><p><a href="https://www.infosecurity-magazine.com/news/wormable-netflix-malware-spreads/">Wormable Netflix Malware Spreads Via WhatsApp Messages</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://www.teiss.co.uk/ziggy-ransomware-admin-to-refund-victims/">https://www.teiss.co.uk/ziggy-ransomware-admin-to-refund-victims/</a></p><p>The administrators of Ziggy ransomware have reportedly decided to lead an honest life and refund the victims of their ransomware attacks. This historic announcement comes a couple of months after the hacker group decided to shut shop and release decryption keys for free.</p><p>As admitted by the ransomware's operators in statements given to the likes of Bleeping Computer and Threatpost, the Ziggy ransomware gang decided to shut shop in February following a string of law enforcement successes against well-established ransomware gangs, notably Emotet and NetWalker. Gripped by the fear of being next, the ransomware gang quickly released an SQL file with 922 decryption keys that could be used by the victims to unlock their files.</p><img src="https://lh3.googleusercontent.com/5iFV9DZgQSv38GoKVyUi_By-oLDB8OeSlv_5saY5AfzUPUb8R6Ve7f5D3iqNQPwS5GosiJZGyR4rUKkfLU1ImTlLzxWQutMGous4mVYI6h7gcLGlUt1J6d_TBDriNUp-AabjWNV8" /><p><a href="https://twitter.com/M_Shahpasandi/status/1376116414608736258?s=20">https://twitter.com/M_Shahpasandi/status/1376116414608736258?s=20</a></p><img src="https://lh4.googleusercontent.com/D3MCAMIDzW6OnTE9ACqOS3-FpY7FH0BP9DjJGbHKrn87cLfxZb4SJGj_IyHrb6RvG-OazTX73FG4YWvn7Z_ilDGk6XUbuelVfv_TVS--eI2WWdPGfYw4dCsw-RiJN4zfmkEbpQZ1" /><p> </p><p><strong>Bonus Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/4qrmZwJVAbum_ZnkTI6E-XexiiRBk39psdCq8sxT35hJbvPby_EhR_Kes9v9eQ01H3rPX7zaLI3KYLHQm-fFqEuDd9FGuAxT2o5ofkpgAVQ1j0EguE2nOX4y4MUr10M84QzsR8V_" /><p><a href="https://twitter.com/yarden_shafir/status/1380147188416778245">https://twitter.com/yarden_shafir/status/1380147188416778245</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Apr 2021 17:45:49 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-50-the-midlife-crisis-episode-y1NkJZG9</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>4th April 1977: Ron Rivest first introduced Alice and Bob in the paper "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems".</p><img src="https://lh5.googleusercontent.com/iKJrEXsdZ3K02Sb-A7JUpJiIqwfTPZVqrWj2lRC09l97yRaIRsbkWyfFjCRYWvZYLjDUUQCta_XN5uGF1PhkIkfkm7AKEoXTvQzRhAQa7gJfxMfV3AYQ4vJ802Apc_Rt9aoGhTyy" /><p><a href="https://twitter.com/todayininfosec/status/1246652917605527554">https://twitter.com/todayininfosec/status/1246652917605527554</a></p><p><a href="http://web.mit.edu/jemorris/humor/alice-and-bob">http://web.mit.edu/jemorris/humor/alice-and-bob</a></p><p><a href="https://xkcd.com/177/">https://xkcd.com/177/</a></p><p>Javvad explains it better: </p><img src="https://lh5.googleusercontent.com/OpUFI6uMKZw5JBbYpD4AYlXal-4_aUz7iRmXps7PMZyhL-v_ovFvX4bWN2H1V8fPOa1Wvb38lnCQ0ojbZtz3VDYPCcifLu0L-83AAhJAiL-J-SfBgoZ9dLEy9OOCBkyToK-9vE1F" /><img src="https://lh5.googleusercontent.com/SMJieHNdpeRqBZb0PCPXf1B-uYENDeCkTLMyarLLGBtQJ3qUAVTwJULP9XsgGJ8KYSOiuC6yao3i9lPcrnWL-UjzeVYQZ05ykOztMo17oW9jK5lJ9ReHyZVB47IkZo0oCQEdU6NM" /><p><a href="https://en.wikipedia.org/wiki/Alice_and_Bob">https://en.wikipedia.org/wiki/Alice_and_Bob</a></p><p>8th April 2014: Extended support for Microsoft Windows XP Service Pack 3 ended, nearly 6 years after SP3's release and 12 1/2 after general availability of Windows XP.</p><p><a href="https://twitter.com/todayininfosec/status/1247920644030738433">https://twitter.com/todayininfosec/status/1247920644030738433</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>The UK Cyber Security Council launches itself by pointing world+dog to domain it doesn't own</p><p>The UK Cyber Security Council announced itself to the public realm last week by touting a domain it doesn't own. Helpfully, internet jokesters then bought up variations on the official address.</p><p>A brainchild of the Department for Digital, Culture, Media and Sport, the UK Cyber Security Council is billed by the government as "the regulatory body, and voice, for UK cybersecurity education, training, and skills." As part of that it "drives progress towards meeting the key challenges the profession faces."</p><p>All very worthy and important. When British infosec folk noticed that <a href="https://pressreleases.responsesource.com/news/101075/uk-cyber-security-council-begins-as-independent-body/">the official press release</a> mentioned an email address for ukcybersecurity[.]org[.]uk, however, everything started unraveling.</p><p>Why? Because the UK Cyber Security Council didn't own ukcybersecurity[.]org[.]uk. Nobody did – until Adrian Kennard bought it and pointed it at his personal <a href="https://www.revk.uk/2021/04/uk-cyber-security-council.html">blog</a>, where he dispensed some gentle advice to the new org.</p><p>"One of the tips I can give you when it comes to cybersecurity is that you should be careful to ensure that contact details you publish actually belong to you," wrote Kennard, who runs a UK ISP, adding: "It took a while to stop laughing at the irony first, but now, yes, the UK Cyber Security Council are welcome to ukcybersecurity.org.uk. They can email me at press@ukcybersecurity.org.uk for more information (be nice)."</p><p><a href="https://www.theregister.com/2021/04/06/uk_cybersecurity_council_domain_fail_launch/">https://www.theregister.com/2021/04/06/uk_cybersecurity_council_domain_fail_launch/</a></p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>This Tech Exec Had Her Kids Sign a User Agreement Before She Got Them Their First Phone</p><p>When it came to tech and their own kids, both <a href="https://www.inc.com/jessica-stillman/why-steve-jobs-bill-gates-both-severely-limited-their-kids-tech-use.html">Steve Jobs and Bill Gates were famously strict</a> about how much screen time they allowed. Jobs didn't let his kids use the iPad he helped invent. Gates banned his kids from getting phones until they were 14. </p><p>Just like Gates and Jobs, <a href="https://twitter.com/jenzhuscott">Jennifer Zhu Scott,</a> a Hong Kong-based tech executive and TED speaker focused on privacy issues, was concerned about the dangers of giving her two children, aged 10 and 11, smartphones--given her deep understanding of the power and perils of technology.  She drew on her professional experience and made them sign a three-page, 15-point "user agreement" for their phones. </p><p>They had to agree to share their passwords with her, ask for permission before signing up for social media accounts, be open about harassment or strange phone calls or messages, and answer any questions about how they were using their phones.</p><p>Part of the agreement is a crash course in internet privacy. It tells her daughters what we adults so often forget--that everything we put online is likely to be read, used, and sold in ways that we can't begin to imagine.</p><p>Etiquette and overuse are also covered by the agreement. It bans phone use after 8 p.m. and requires the girls put their phones down while socializing and walking. It also contains a strong warning about the long life of potentially embarrassing photos and posts shared online. </p><p>A copy of the agreement is in the show notes. </p><p><a href="https://www.inc.com/jessica-stillman/this-tech-exec-had-her-kids-sign-a-user-agreement-before-she-got-them-their-first-phone.html#:~:text=Try%20a%20'user%20agreement',power%20and%20perils%20of%20technology">https://www.inc.com/jessica-stillman/this-tech-exec-had-her-kids-sign-a-user-agreement-before-she-got-them-their-first-phone.html#:~:text=Try%20a%20'user%20agreement',power%20and%20perils%20of%20technology</a>.</p><p>Link to the agreement: </p><p><a href="https://drive.google.com/file/d/1Yc3Np00vEgAIvNV7VzEIHoxbWqqC0Oon/view">https://drive.google.com/file/d/1Yc3Np00vEgAIvNV7VzEIHoxbWqqC0Oon/view</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-suffers-second-outage-in/">Microsoft Suffers Second Outage in Two Weeks</a></p><p><a href="https://www.infosecurity-magazine.com/news/data-of-half-a-billion-facebook/">Data of Half a Billion Facebook Users Leaked</a></p><p><a href="https://www.infosecurity-magazine.com/news/australia-considers-social-media/">Australia Considers Social Media ID Requirement</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-school-district-40m-ransom/">Florida School District Held to Impossibly High Ransom</a></p><p><a href="https://www.infosecurity-magazine.com/news/cybersecurity-industry-solutions/">Cybersecurity Industry Must Find Solutions for Third-Party Data Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/siesser-chemical-weapon-dark-web/">Chemical Weapon Shopping Sends Dark Web User to Prison</a></p><p><a href="https://www.infosecurity-magazine.com/news/italian-arrested-paying-hitman/">Italian Arrested After Allegedly Paying Hitman to Murder Ex-Girlfriend</a></p><p><a href="https://www.infosecurity-magazine.com/news/college-track-coach-accused-of/"> College Track Coach Accused of Cyberstalking</a></p><p><a href="https://www.infosecurity-magazine.com/news/wormable-netflix-malware-spreads/">Wormable Netflix Malware Spreads Via WhatsApp Messages</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://www.teiss.co.uk/ziggy-ransomware-admin-to-refund-victims/">https://www.teiss.co.uk/ziggy-ransomware-admin-to-refund-victims/</a></p><p>The administrators of Ziggy ransomware have reportedly decided to lead an honest life and refund the victims of their ransomware attacks. This historic announcement comes a couple of months after the hacker group decided to shut shop and release decryption keys for free.</p><p>As admitted by the ransomware's operators in statements given to the likes of Bleeping Computer and Threatpost, the Ziggy ransomware gang decided to shut shop in February following a string of law enforcement successes against well-established ransomware gangs, notably Emotet and NetWalker. Gripped by the fear of being next, the ransomware gang quickly released an SQL file with 922 decryption keys that could be used by the victims to unlock their files.</p><img src="https://lh3.googleusercontent.com/5iFV9DZgQSv38GoKVyUi_By-oLDB8OeSlv_5saY5AfzUPUb8R6Ve7f5D3iqNQPwS5GosiJZGyR4rUKkfLU1ImTlLzxWQutMGous4mVYI6h7gcLGlUt1J6d_TBDriNUp-AabjWNV8" /><p><a href="https://twitter.com/M_Shahpasandi/status/1376116414608736258?s=20">https://twitter.com/M_Shahpasandi/status/1376116414608736258?s=20</a></p><img src="https://lh4.googleusercontent.com/D3MCAMIDzW6OnTE9ACqOS3-FpY7FH0BP9DjJGbHKrn87cLfxZb4SJGj_IyHrb6RvG-OazTX73FG4YWvn7Z_ilDGk6XUbuelVfv_TVS--eI2WWdPGfYw4dCsw-RiJN4zfmkEbpQZ1" /><p> </p><p><strong>Bonus Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/4qrmZwJVAbum_ZnkTI6E-XexiiRBk39psdCq8sxT35hJbvPby_EhR_Kes9v9eQ01H3rPX7zaLI3KYLHQm-fFqEuDd9FGuAxT2o5ofkpgAVQ1j0EguE2nOX4y4MUr10M84QzsR8V_" /><p><a href="https://twitter.com/yarden_shafir/status/1380147188416778245">https://twitter.com/yarden_shafir/status/1380147188416778245</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56235479" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ee0ee00e-a098-4ec4-a1ca-bf8a0477f27c/audio/aa1ba1ef-e8d0-4267-a56e-7608f4a9b31e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 50 - The Midlife Crisis Episode</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/efdc0e24-a749-44e6-b41f-d5615498f776/3000x3000/exa-osgxaaaxamz.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:35</itunes:duration>
      <itunes:summary>This week in Infosec takes us back to a 60’s swinging movie
Rant of the week has some domain name shenanigans
Billy Big Balls  Karen’s Colossal Cahonas in the form of a techno Tiger Mom
Industry News brings us the latest and greatest infosec news from around the globe
Tweet of the Week - paid ransomware? You may be entitled to a refund! 
Hire cars are no good for short people. That is all we have to say about little people on this show</itunes:summary>
      <itunes:subtitle>This week in Infosec takes us back to a 60’s swinging movie
Rant of the week has some domain name shenanigans
Billy Big Balls  Karen’s Colossal Cahonas in the form of a techno Tiger Mom
Industry News brings us the latest and greatest infosec news from around the globe
Tweet of the Week - paid ransomware? You may be entitled to a refund! 
Hire cars are no good for short people. That is all we have to say about little people on this show</itunes:subtitle>
      <itunes:keywords>podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d167a70-b2cb-4e49-872a-39f40f2e435c</guid>
      <title>Episode 49 - Have Your Bunnies at the Ready</title>
      <description><![CDATA[<p><strong>April 1st!</strong></p><p><a href="https://www.facebook.com/burgerking/posts/4438200159526619">https://www.facebook.com/burgerking/posts/4438200159526619</a></p><p><a href="https://twitter.com/VW/status/1376868756782219266">https://twitter.com/VW/status/1376868756782219266</a></p><p><a href="https://www.animationmagazine.net/tv/the-cats-out-of-the-bag-cn-rebrands-as-cat-toon-network/">https://www.animationmagazine.net/tv/the-cats-out-of-the-bag-cn-rebrands-as-cat-toon-network/</a>  </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><ol><li>27th March 1979: 33-year-old computer consultant Stanley Mark Rifkin was sentenced to 8 years in prison for stealing $10.2 million from a bank via computer. Federal District Judge Matthew‐Byrne Jr., rejecting an appeal from Mr. Rifkin that he be placed on probation.</li></ol><img src="https://lh6.googleusercontent.com/Oe-m-El3XrRDH6iSmg8tNg5-Ad8xMkikAuEbVMnqRrJ_sfzv4dxKjQqX60xZpshSspA-lYhVhvmrvLaMuGqxNUuUBV09gIW6ZTuFoP4SAKNdrq2Lxkvw4okV6Lchlu5ttPyr8Ft8" alt="" /><p><a href="https://twitter.com/todayininfosec/status/1243427187165814785">https://twitter.com/todayininfosec/status/1243427187165814785</a></p><p><a href="https://www.social-engineer.org/wiki/archives/Hackers/hackers-Mark-Rifkin-Social-Engineer-furtherInfo.htm">https://www.social-engineer.org/wiki/archives/Hackers/hackers-Mark-Rifkin-Social-Engineer-furtherInfo.htm</a></p><p><strong>Rant of the Week</strong></p><p><strong>Whistleblower: Ubiquiti Breach "Catastrophic"</strong></p><p><a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/</a></p><p><a href="https://community.ui.com/questions/Update-to-January-2021-Account-Notification/3813e6f4-b023-4d62-9e10-1035dc51ad2e">https://community.ui.com/questions/Update-to-January-2021-Account-Notification/3813e6f4-b023-4d62-9e10-1035dc51ad2e</a></p><p> </p><p>Billy Big Balls</p><p><a href="https://www.linkedin.com/pulse/thoughts-selling-security-leaders-jason-chan/">Thoughts on Selling to Security Leaders</a></p><p>Jason Chan - VP Security Netflix</p><ul><li>If I ask to not be contacted by your company, ensure that fulfilling my request covers all channels (phone, LinkedIn, email, snail mail, etc.) and extends to your colleagues.</li><li>Don’t sell based on FUD (Fear, Uncertainty, and Doubt). Security is a tough field to work in, and bad things happen. I don’t need scare tactics from sales folks.</li><li>It’s fine to follow up to an unanswered message - once. And give it at least a week between messages. If someone doesn’t respond after the second reachout, it’s likely they are not interested. I’d not have time to do my job if I replied or unsubscribed to every reach out I receive.</li><li>Don’t assume you understand the problems I’m facing or that you know what should be at the top of my priority list. Every organization has a different threat model, culture, and risk tolerance.</li><li>If you’re selling something, don’t ask to “pick my brain” or for “feedback on your approach.”</li><li>DO NOT CALL ME ON THE PHONE. There is no situation where I'm looking to have this conversation. Email or LinkedIn is fine.</li><li>If you’re working with someone on my team, don’t escalate to me if things don’t go your way. I trust my team to make good decisions.</li><li>Your solution or product doesn’t solve every security problem. That’s okay, I don’t expect it to. Just be clear about the value you believe your solution brings.</li><li>Your solution won’t save me from the next [INSERT BREACH/EXPLOIT/VULNERABILITY] here. Don’t say it will. Perhaps it’s additive or helpful, but operating a security program successfully is complex and involves people and technology working together. Again, just be clear about your product’s value.</li><li>Don’t offer me a gift card, gift, or cash in exchange for a meeting. Just no.</li><li>Keep your word, and follow up on time if and when asked. I appreciate folks who meet their commitments and respect my time.</li><li>If I’m a customer, think long term partnership vs. transactional sale. There is a lot of overhead to switching vendors and I appreciate folks that I can build a long term, mutually beneficial relationship with.</li></ul><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-issues-mamba-alert/">FBI Issues Mamba Alert</a></p><p><a href="https://www.infosecurity-magazine.com/news/burned-out-employees-corporate/">Burned Out Employees Put Corporate Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/aussie-tv-network-taken-off-air-by/">Aussie TV Network Taken Off Air by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/german-mps-hit-russianbacked/">German MPs Hit by Russian-Backed Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberbullying-linked-to-social/">Cyberbullying Linked to Social Media Addiction</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cyber-security-council/">UK Cyber Security Council Officially Launches as Independent Body</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-and-rhisac-to-run/">CISA and RH-ISAC to Run Cybersecurity Drill</a></p><p><a href="https://www.infosecurity-magazine.com/news/threequarters-of-legal-breaches/">Three-Quarters of Legal Breaches Caused by Insiders</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-global-chip-companies-signs/">Most Global Chip Companies Show Signs of Compromise</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/B6YDO4oUkIFaS5EEvyOgmezNPYp2ytOWtcu9n4KyzXX63aUZF7rXzjeLvy0LqnCurvEuO9Yzzw9Hd0ENIG4v3c-sYCIaW-MjiU4xxODu6WhUvWHKZclWoRtO5UqPO5dFLzKyouUn" alt="" /><p><a href="https://twitter.com/0x26d/status/1377415060759269377">https://twitter.com/0x26d/status/1377415060759269377</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 1 Apr 2021 11:33:56 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-49-have-your-bunnies-at-the-ready-o3iQ_v1F</link>
      <content:encoded><![CDATA[<p><strong>April 1st!</strong></p><p><a href="https://www.facebook.com/burgerking/posts/4438200159526619">https://www.facebook.com/burgerking/posts/4438200159526619</a></p><p><a href="https://twitter.com/VW/status/1376868756782219266">https://twitter.com/VW/status/1376868756782219266</a></p><p><a href="https://www.animationmagazine.net/tv/the-cats-out-of-the-bag-cn-rebrands-as-cat-toon-network/">https://www.animationmagazine.net/tv/the-cats-out-of-the-bag-cn-rebrands-as-cat-toon-network/</a>  </p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><ol><li>27th March 1979: 33-year-old computer consultant Stanley Mark Rifkin was sentenced to 8 years in prison for stealing $10.2 million from a bank via computer. Federal District Judge Matthew‐Byrne Jr., rejecting an appeal from Mr. Rifkin that he be placed on probation.</li></ol><img src="https://lh6.googleusercontent.com/Oe-m-El3XrRDH6iSmg8tNg5-Ad8xMkikAuEbVMnqRrJ_sfzv4dxKjQqX60xZpshSspA-lYhVhvmrvLaMuGqxNUuUBV09gIW6ZTuFoP4SAKNdrq2Lxkvw4okV6Lchlu5ttPyr8Ft8" alt="" /><p><a href="https://twitter.com/todayininfosec/status/1243427187165814785">https://twitter.com/todayininfosec/status/1243427187165814785</a></p><p><a href="https://www.social-engineer.org/wiki/archives/Hackers/hackers-Mark-Rifkin-Social-Engineer-furtherInfo.htm">https://www.social-engineer.org/wiki/archives/Hackers/hackers-Mark-Rifkin-Social-Engineer-furtherInfo.htm</a></p><p><strong>Rant of the Week</strong></p><p><strong>Whistleblower: Ubiquiti Breach "Catastrophic"</strong></p><p><a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/</a></p><p><a href="https://community.ui.com/questions/Update-to-January-2021-Account-Notification/3813e6f4-b023-4d62-9e10-1035dc51ad2e">https://community.ui.com/questions/Update-to-January-2021-Account-Notification/3813e6f4-b023-4d62-9e10-1035dc51ad2e</a></p><p> </p><p>Billy Big Balls</p><p><a href="https://www.linkedin.com/pulse/thoughts-selling-security-leaders-jason-chan/">Thoughts on Selling to Security Leaders</a></p><p>Jason Chan - VP Security Netflix</p><ul><li>If I ask to not be contacted by your company, ensure that fulfilling my request covers all channels (phone, LinkedIn, email, snail mail, etc.) and extends to your colleagues.</li><li>Don’t sell based on FUD (Fear, Uncertainty, and Doubt). Security is a tough field to work in, and bad things happen. I don’t need scare tactics from sales folks.</li><li>It’s fine to follow up to an unanswered message - once. And give it at least a week between messages. If someone doesn’t respond after the second reachout, it’s likely they are not interested. I’d not have time to do my job if I replied or unsubscribed to every reach out I receive.</li><li>Don’t assume you understand the problems I’m facing or that you know what should be at the top of my priority list. Every organization has a different threat model, culture, and risk tolerance.</li><li>If you’re selling something, don’t ask to “pick my brain” or for “feedback on your approach.”</li><li>DO NOT CALL ME ON THE PHONE. There is no situation where I'm looking to have this conversation. Email or LinkedIn is fine.</li><li>If you’re working with someone on my team, don’t escalate to me if things don’t go your way. I trust my team to make good decisions.</li><li>Your solution or product doesn’t solve every security problem. That’s okay, I don’t expect it to. Just be clear about the value you believe your solution brings.</li><li>Your solution won’t save me from the next [INSERT BREACH/EXPLOIT/VULNERABILITY] here. Don’t say it will. Perhaps it’s additive or helpful, but operating a security program successfully is complex and involves people and technology working together. Again, just be clear about your product’s value.</li><li>Don’t offer me a gift card, gift, or cash in exchange for a meeting. Just no.</li><li>Keep your word, and follow up on time if and when asked. I appreciate folks who meet their commitments and respect my time.</li><li>If I’m a customer, think long term partnership vs. transactional sale. There is a lot of overhead to switching vendors and I appreciate folks that I can build a long term, mutually beneficial relationship with.</li></ul><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/fbi-issues-mamba-alert/">FBI Issues Mamba Alert</a></p><p><a href="https://www.infosecurity-magazine.com/news/burned-out-employees-corporate/">Burned Out Employees Put Corporate Security at Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/aussie-tv-network-taken-off-air-by/">Aussie TV Network Taken Off Air by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/german-mps-hit-russianbacked/">German MPs Hit by Russian-Backed Phishing Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberbullying-linked-to-social/">Cyberbullying Linked to Social Media Addiction</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cyber-security-council/">UK Cyber Security Council Officially Launches as Independent Body</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-and-rhisac-to-run/">CISA and RH-ISAC to Run Cybersecurity Drill</a></p><p><a href="https://www.infosecurity-magazine.com/news/threequarters-of-legal-breaches/">Three-Quarters of Legal Breaches Caused by Insiders</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-global-chip-companies-signs/">Most Global Chip Companies Show Signs of Compromise</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/B6YDO4oUkIFaS5EEvyOgmezNPYp2ytOWtcu9n4KyzXX63aUZF7rXzjeLvy0LqnCurvEuO9Yzzw9Hd0ENIG4v3c-sYCIaW-MjiU4xxODu6WhUvWHKZclWoRtO5UqPO5dFLzKyouUn" alt="" /><p><a href="https://twitter.com/0x26d/status/1377415060759269377">https://twitter.com/0x26d/status/1377415060759269377</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="52145748" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c81485fa-73e0-43a8-92fe-4312299c16aa/audio/cd6c511e-35e1-4aad-9268-65314b017a74/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 49 - Have Your Bunnies at the Ready</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:duration>00:54:19</itunes:duration>
      <itunes:summary>We are recording a day earlier than usual so next week&apos;s Smashing Security podcast may feature more outdated stories than usual.

</itunes:summary>
      <itunes:subtitle>We are recording a day earlier than usual so next week&apos;s Smashing Security podcast may feature more outdated stories than usual.

</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2cb79739-af33-482f-b02e-8bd062fef1c6</guid>
      <title>Episode 48 - The Biggest Loser</title>
      <description><![CDATA[<p><strong>The Biggest Loser, Week 0</strong></p><img src="https://lh3.googleusercontent.com/5WvC-NLS8hy36meWWR1agHOgHtfqxak9ANlM87JOOGxtHVWQ0rzvkc2IvgStvCYootdXNFK8NL5zrldLJzVtFJN69tpbzBCXvc-1e4J0UJ9UF_6KDv2xVoYL24u6l7VUTR9YppbQ" /><p>Andy is running a book if you are interested in a little flutter on who will be the healthiest in the next six months.</p><p>Jav issues an apology to our listeners for misinformation and to Andy for correcting him when he stated the opposite had occurred: <a href="https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true">https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true</a></p><p>Evil Knievel:</p><p><a href="https://twitter.com/little_birdy__/status/1373722427126116352?s=21">https://twitter.com/little_birdy__/status/1373722427126116352?s=21</a></p><p>Andy *Bathes in the glory of a heartfelt apology from Jav* Jav spoke at Infosecurity Conference and Thom spoke at The SASIG</p><p><a href="https://www.infosecurity-magazine.com/news/imos21-overcoming-defenders-dilemma/">https://www.infosecurity-magazine.com/news/imos21-overcoming-defenders-dilemma/</a></p><p>Thom mentions  the Nextdoor supplemental episode released midweek and how we could have saved many more people from the Royal Mail text scam had we not run out of time: <a href="https://www.standard.co.uk/business/royal-mail-text-scam-victim-banking-security-checks-b925810.html">https://www.standard.co.uk/business/royal-mail-text-scam-victim-banking-security-checks-b925810.html</a></p><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>25th March 2010: Albert Gonzalez was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington, a Kentucky facility for inmates requiring medical or mental health attention.</li></ol><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/albert-gonzalez-200-million-damage-hacker-sentenced-1928313.html">https://www.independent.co.uk/life-style/gadgets-and-tech/news/albert-gonzalez-200-million-damage-hacker-sentenced-1928313.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1243040970741956610">https://twitter.com/todayininfosec/status/1243040970741956610</a></p><ol><li>21st March 2021: Announcement from Attrition that on March 20, 2021, an argument was made to open their mirror back up to everyone.</li></ol><p>“<i>While we had provided access to the mirror for a couple dozen people over the last ten years, we think it may be beneficial to be public. Some defacers from back then want a trip down nostalgia lane. We still have reporters doing in-depth research on various topics that request access to dig up historical citations. It stands to reason more might be interested in revisiting the 'good old days' and the content that would lead us to over one million hits a few days. With that, the doors are open again. We hope you enjoy</i>”.</p><p><a href="https://attrition.org/news/content/21-03-21.001.html">https://attrition.org/news/content/21-03-21.001.html</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Daniel Kelley, Associate Director, Center for Technology and Society at Anti-Defamation League</p><p>Today we're releasing our annual nationally representative survey of hate and harassment on social media.</p><p>In a year where tech companies made bold statements about their efforts to address hate on their platforms, Americans' experience of harassment remained constant.</p><p>41% of Americans experienced harassment online according to this year's survey, with 27% experiencing severe harassment, which includes stalking, sustained harassment, physical threats, sexual harassment, doxing and swatting.</p><p>Overwhelmingly, the platform where Americans experience harassment was Facebook- 75% of Americans who were harassed reported being harassed on Facebook with the next highest being Twitter at 24%</p><img src="https://lh4.googleusercontent.com/hNLfZs8Tnhn2WkWDp2PhjKm176wxWw4fj5aWk-7NLLWMxzAWO0Gk2F-p5fyYQWiRj82AoQamBcA-Miy-pkDmHDx0k7jYefoGfw58OU93VmYEDFXoDtQRinpIdL9UmWAa38H80KEF" /><p><a href="https://www.adl.org/online-hate-2021">https://www.adl.org/online-hate-2021</a></p><p><a href="https://www.linkedin.com/posts/activity-6780520538549882880-ZmYD/">https://www.linkedin.com/posts/activity-6780520538549882880-ZmYD/</a></p><img src="https://lh5.googleusercontent.com/oGB6d6EuF15OoD77e2ePYONVd7jyUcXhh-U2iNAfp6YdNWMwXFsRvP3yQMOFjSwkbE3KK51wpRPea1cqkkmTR3RjFMK_WoWnsPyrFaP8JxdeiDMjtnY1zSdrhffKX5BlxQr7urXK" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Story of Helen Bevan, Chief Transformation Officer at the NHS, had her two Twitter accounts, with nearly 140,000 followers, stolen by hackers and used to promote fake PlayStation 5 sales.</p><p>She now has the accounts back but has received dozens of messages from people who fell for the scam.</p><p>Ms Bevan also paid money to someone who said they could help - but they turned out to be a scammer too.</p><p>She said she wanted to highlight the importance of extra security measures.</p><p>NHS Horizons chief transformation officer Ms Bevan mistakenly thought she had activated two-factor authentication (2FA), which requires account-holders to use two methods to log in, the second often involving a code sent by text or email.</p><p><a href="https://www.bbc.co.uk/news/technology-56456002">https://www.bbc.co.uk/news/technology-56456002</a></p><p><a href="https://twitter.com/HelenBevanTweet/status/1372955366212898816">https://twitter.com/HelenBevanTweet/status/1372955366212898816</a>  </p><p>She’s got an easy out if she doesn’t want to upset this guy:</p><img src="https://lh5.googleusercontent.com/kd6JtqVISiv9_EkhVFv7S5KWF1OqFcoTUXom18KcyC6yAe6wxSFKeraeB2XyPKkRkDzZG7U9goqLJrnbiGapvzPYH1ZrnDMubiKT0sKFd7N6JpjGftO5qFw_tTPEqsVB_M17wZ-R" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/russian-man-guilty-tesla-extortion/">Russian Man Pleads Guilty in Tesla Extortion Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-loss-mobiles-laptops/">UK Govt Department Loses 306 Mobiles and Laptops in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/delhi-police-bust-call-center/">Delhi Police Bust Call Center Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-contractor-retaliatory/">Fired IT Contractor Jailed for Retaliatory Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-loss-mobiles-laptops/">UK Govt Department Loses 306 Mobiles and Laptops in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-urged-to-patch-exploit/">Firms Urged to Patch as Attackers Exploit Critical F5 Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/drug-maker-to-pay-50m-for/">Drug Maker to Pay $50m for Destroying Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/fatface-faces-customer-anger/">FatFace Faces Customer Anger After Controversial Breach Response</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-uk-firms-suffer-cyber/">Half of UK Firms Suffer Cyber-Skills Gaps</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.purevpn.com/blog/cybersecurity-expert-interview-javvad-malik/">Jav interviewed by PureVPN</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/DZexyHl2m5sD48b8FJ29U1IMllFp9rNuWjeP1qVG14TXohf2Sftq0aN7GZisMG_RRkn6BqTDgr12B-4PuNDOL2JVeFDToV7blcGpJOtzOt0v6_15DQ_5AG37xTXdwEbmwdiPHcx2" /><p><a href="https://twitter.com/ParikPatelCFA/status/1375096656933306369">https://twitter.com/ParikPatelCFA/status/1375096656933306369</a></p><p><a href="https://www.wired.co.uk/article/suez-canal-ship-stuck-ever-given">https://www.wired.co.uk/article/suez-canal-ship-stuck-ever-given</a></p><img src="https://lh5.googleusercontent.com/rNXSoA_yrK89n6cRFFfA7xL5eWdNBPOnaeNQxlTv1ogTWxAbsRh54Gs4m4s-wR0pAqQSriatZupB_D6uOfLhRZWDsHgyJ01LeaxODrxiSkb-SPR7xaMoOHFKUEpa9i-gynrUQLkn" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Mar 2021 17:11:30 +0000</pubDate>
      <author>thom@tl2security.com (Raiders vs Twix, Andrew Agnes, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-48-the-biggest-loser-aM5bPT_X</link>
      <content:encoded><![CDATA[<p><strong>The Biggest Loser, Week 0</strong></p><img src="https://lh3.googleusercontent.com/5WvC-NLS8hy36meWWR1agHOgHtfqxak9ANlM87JOOGxtHVWQ0rzvkc2IvgStvCYootdXNFK8NL5zrldLJzVtFJN69tpbzBCXvc-1e4J0UJ9UF_6KDv2xVoYL24u6l7VUTR9YppbQ" /><p>Andy is running a book if you are interested in a little flutter on who will be the healthiest in the next six months.</p><p>Jav issues an apology to our listeners for misinformation and to Andy for correcting him when he stated the opposite had occurred: <a href="https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true">https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true</a></p><p>Evil Knievel:</p><p><a href="https://twitter.com/little_birdy__/status/1373722427126116352?s=21">https://twitter.com/little_birdy__/status/1373722427126116352?s=21</a></p><p>Andy *Bathes in the glory of a heartfelt apology from Jav* Jav spoke at Infosecurity Conference and Thom spoke at The SASIG</p><p><a href="https://www.infosecurity-magazine.com/news/imos21-overcoming-defenders-dilemma/">https://www.infosecurity-magazine.com/news/imos21-overcoming-defenders-dilemma/</a></p><p>Thom mentions  the Nextdoor supplemental episode released midweek and how we could have saved many more people from the Royal Mail text scam had we not run out of time: <a href="https://www.standard.co.uk/business/royal-mail-text-scam-victim-banking-security-checks-b925810.html">https://www.standard.co.uk/business/royal-mail-text-scam-victim-banking-security-checks-b925810.html</a></p><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>25th March 2010: Albert Gonzalez was sentenced to 20 years in prison for stealing credit card data from TJX and other companies. He is currently serving his sentence at FMC Lexington, a Kentucky facility for inmates requiring medical or mental health attention.</li></ol><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/albert-gonzalez-200-million-damage-hacker-sentenced-1928313.html">https://www.independent.co.uk/life-style/gadgets-and-tech/news/albert-gonzalez-200-million-damage-hacker-sentenced-1928313.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1243040970741956610">https://twitter.com/todayininfosec/status/1243040970741956610</a></p><ol><li>21st March 2021: Announcement from Attrition that on March 20, 2021, an argument was made to open their mirror back up to everyone.</li></ol><p>“<i>While we had provided access to the mirror for a couple dozen people over the last ten years, we think it may be beneficial to be public. Some defacers from back then want a trip down nostalgia lane. We still have reporters doing in-depth research on various topics that request access to dig up historical citations. It stands to reason more might be interested in revisiting the 'good old days' and the content that would lead us to over one million hits a few days. With that, the doors are open again. We hope you enjoy</i>”.</p><p><a href="https://attrition.org/news/content/21-03-21.001.html">https://attrition.org/news/content/21-03-21.001.html</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Daniel Kelley, Associate Director, Center for Technology and Society at Anti-Defamation League</p><p>Today we're releasing our annual nationally representative survey of hate and harassment on social media.</p><p>In a year where tech companies made bold statements about their efforts to address hate on their platforms, Americans' experience of harassment remained constant.</p><p>41% of Americans experienced harassment online according to this year's survey, with 27% experiencing severe harassment, which includes stalking, sustained harassment, physical threats, sexual harassment, doxing and swatting.</p><p>Overwhelmingly, the platform where Americans experience harassment was Facebook- 75% of Americans who were harassed reported being harassed on Facebook with the next highest being Twitter at 24%</p><img src="https://lh4.googleusercontent.com/hNLfZs8Tnhn2WkWDp2PhjKm176wxWw4fj5aWk-7NLLWMxzAWO0Gk2F-p5fyYQWiRj82AoQamBcA-Miy-pkDmHDx0k7jYefoGfw58OU93VmYEDFXoDtQRinpIdL9UmWAa38H80KEF" /><p><a href="https://www.adl.org/online-hate-2021">https://www.adl.org/online-hate-2021</a></p><p><a href="https://www.linkedin.com/posts/activity-6780520538549882880-ZmYD/">https://www.linkedin.com/posts/activity-6780520538549882880-ZmYD/</a></p><img src="https://lh5.googleusercontent.com/oGB6d6EuF15OoD77e2ePYONVd7jyUcXhh-U2iNAfp6YdNWMwXFsRvP3yQMOFjSwkbE3KK51wpRPea1cqkkmTR3RjFMK_WoWnsPyrFaP8JxdeiDMjtnY1zSdrhffKX5BlxQr7urXK" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Story of Helen Bevan, Chief Transformation Officer at the NHS, had her two Twitter accounts, with nearly 140,000 followers, stolen by hackers and used to promote fake PlayStation 5 sales.</p><p>She now has the accounts back but has received dozens of messages from people who fell for the scam.</p><p>Ms Bevan also paid money to someone who said they could help - but they turned out to be a scammer too.</p><p>She said she wanted to highlight the importance of extra security measures.</p><p>NHS Horizons chief transformation officer Ms Bevan mistakenly thought she had activated two-factor authentication (2FA), which requires account-holders to use two methods to log in, the second often involving a code sent by text or email.</p><p><a href="https://www.bbc.co.uk/news/technology-56456002">https://www.bbc.co.uk/news/technology-56456002</a></p><p><a href="https://twitter.com/HelenBevanTweet/status/1372955366212898816">https://twitter.com/HelenBevanTweet/status/1372955366212898816</a>  </p><p>She’s got an easy out if she doesn’t want to upset this guy:</p><img src="https://lh5.googleusercontent.com/kd6JtqVISiv9_EkhVFv7S5KWF1OqFcoTUXom18KcyC6yAe6wxSFKeraeB2XyPKkRkDzZG7U9goqLJrnbiGapvzPYH1ZrnDMubiKT0sKFd7N6JpjGftO5qFw_tTPEqsVB_M17wZ-R" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/russian-man-guilty-tesla-extortion/">Russian Man Pleads Guilty in Tesla Extortion Plot</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-loss-mobiles-laptops/">UK Govt Department Loses 306 Mobiles and Laptops in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/delhi-police-bust-call-center/">Delhi Police Bust Call Center Scammers</a></p><p><a href="https://www.infosecurity-magazine.com/news/it-contractor-retaliatory/">Fired IT Contractor Jailed for Retaliatory Cyber-Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-loss-mobiles-laptops/">UK Govt Department Loses 306 Mobiles and Laptops in Two Years</a></p><p><a href="https://www.infosecurity-magazine.com/news/firms-urged-to-patch-exploit/">Firms Urged to Patch as Attackers Exploit Critical F5 Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/drug-maker-to-pay-50m-for/">Drug Maker to Pay $50m for Destroying Data</a></p><p><a href="https://www.infosecurity-magazine.com/news/fatface-faces-customer-anger/">FatFace Faces Customer Anger After Controversial Breach Response</a></p><p><a href="https://www.infosecurity-magazine.com/news/half-of-uk-firms-suffer-cyber/">Half of UK Firms Suffer Cyber-Skills Gaps</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.purevpn.com/blog/cybersecurity-expert-interview-javvad-malik/">Jav interviewed by PureVPN</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/DZexyHl2m5sD48b8FJ29U1IMllFp9rNuWjeP1qVG14TXohf2Sftq0aN7GZisMG_RRkn6BqTDgr12B-4PuNDOL2JVeFDToV7blcGpJOtzOt0v6_15DQ_5AG37xTXdwEbmwdiPHcx2" /><p><a href="https://twitter.com/ParikPatelCFA/status/1375096656933306369">https://twitter.com/ParikPatelCFA/status/1375096656933306369</a></p><p><a href="https://www.wired.co.uk/article/suez-canal-ship-stuck-ever-given">https://www.wired.co.uk/article/suez-canal-ship-stuck-ever-given</a></p><img src="https://lh5.googleusercontent.com/rNXSoA_yrK89n6cRFFfA7xL5eWdNBPOnaeNQxlTv1ogTWxAbsRh54Gs4m4s-wR0pAqQSriatZupB_D6uOfLhRZWDsHgyJ01LeaxODrxiSkb-SPR7xaMoOHFKUEpa9i-gynrUQLkn" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="59896801" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/3e3a0b06-5891-400b-8450-c13e7bbde35d/audio/a1403c1d-dc5e-4f91-aefc-c4d83e1ea514/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 48 - The Biggest Loser</itunes:title>
      <itunes:author>Raiders vs Twix, Andrew Agnes, Javvad Malik, Thom Langford</itunes:author>
      <itunes:duration>01:02:23</itunes:duration>
      <itunes:summary>Jav and Thom are competing to be the biggest loser recently, fed up with being diagnosed with having FLU. Andy refuses to be defined by a number from his bathroom scales.

Stay secure, safe and healthy, friends!

There is a podcast here somewhere as well.

</itunes:summary>
      <itunes:subtitle>Jav and Thom are competing to be the biggest loser recently, fed up with being diagnosed with having FLU. Andy refuses to be defined by a number from his bathroom scales.

Stay secure, safe and healthy, friends!

There is a podcast here somewhere as well.

</itunes:subtitle>
      <itunes:keywords>podcast, facebook, the sooz, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e6e8a471-5ac5-460d-b62c-556b24695e85</guid>
      <title>Episode 47a - Nextdoor Cheeky Bantz</title>
      <description><![CDATA[<p>Jav, Andy and Thom chat about the delights of the Nextdoor app. For our international listeners, just head to https://nextdoor.co.uk/ to find out about the uniquely Britishness of complaining about your neighbours on a public forum in a passive aggressive way without actually openly complaining about them. And it is all OK because it is on an App.</p><p>In their own words:</p><p><i>"It's where communities come together to greet newcomers, exchange recommendations, and read the latest local news. Where neighbours support local businesses and get updates from public services. Where neighbours borrow tools and sell sofas. It's how to get the most out of everything nearby. Welcome, neighbour."</i></p><p>You're welcome.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 24 Mar 2021 08:41:45 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andrew Agnes, Our Neighbours, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-47a-nextdoor-cheeky-bantz-ZAcIk8um</link>
      <content:encoded><![CDATA[<p>Jav, Andy and Thom chat about the delights of the Nextdoor app. For our international listeners, just head to https://nextdoor.co.uk/ to find out about the uniquely Britishness of complaining about your neighbours on a public forum in a passive aggressive way without actually openly complaining about them. And it is all OK because it is on an App.</p><p>In their own words:</p><p><i>"It's where communities come together to greet newcomers, exchange recommendations, and read the latest local news. Where neighbours support local businesses and get updates from public services. Where neighbours borrow tools and sell sofas. It's how to get the most out of everything nearby. Welcome, neighbour."</i></p><p>You're welcome.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="8965967" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/db6b8a35-89ad-4c57-9b16-5bc2deb4ebd1/audio/bca16ae2-be58-4025-97a5-ea2b71fd557b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 47a - Nextdoor Cheeky Bantz</itunes:title>
      <itunes:author>Thom Langford, Andrew Agnes, Our Neighbours, Javvad Malik</itunes:author>
      <itunes:duration>00:09:20</itunes:duration>
      <itunes:summary>Special midweek exclusive bonus for our Patreon supporters only!

(Pretty sure we have a Patreon set up. Or is that the worlds second best infosec edutainment podcast?)</itunes:summary>
      <itunes:subtitle>Special midweek exclusive bonus for our Patreon supporters only!

(Pretty sure we have a Patreon set up. Or is that the worlds second best infosec edutainment podcast?)</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">7aad20f9-1d9f-4e40-9059-48a48905a00f</guid>
      <title>Episode 47 - What&apos;s Happening With ISSA UK?</title>
      <description><![CDATA[<p>Our regular know our regular features, so here is our regular update for our regular features for our regular listeners.</p><p>This week in Infosec</p><p>Tweet of the Week</p><p>Billy Big Balls</p><p>Rant of the week</p><p>Industry News</p><p>There is no Little People, there has never been a Little People</p><p>Will we have a Sticky Pickle of the Week? </p><p> </p><p><strong>This Week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>6th March 1995: The SATAN (Security Administrator Tool for Analyzing Networks) security tool was released by Dan Farmer and Wietse Venema. The release stirred huge debate about security auditing tools being given to the public.</li></ol><p>Fun fact:<a href="https://twitter.com/neilhimself"> @neilhimself</a> drew the tool's documentation artwork. </p><p><a href="https://www.latimes.com/archives/la-xpm-1995-03-01-fi-37458-story.html">https://www.latimes.com/archives/la-xpm-1995-03-01-fi-37458-story.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1240452423778308097">https://twitter.com/todayininfosec/status/1240452423778308097</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/campuscodi">Catalin Cimpanu:</a></p><p>Check Point says it is seeing a doubling in ProxyLogon exploitation attempts every few hours.</p><p>Please, red teamers, explain it to us like we're 5 how releasing PoCs for highly-dangerous bugs too early doesn't help threat actors</p><p>We're listening!</p><p><a href="https://twitter.com/HackingDave">Dave Kennedy:</a></p><p>Blaming red teamers is already an inaccurate statement as it's typically security researchers who publish these.</p><p>It was already actively exploited with hundreds of thousands of already compromised systems with little to no direction from Microsoft.</p><p>Yet offsec is to blame?</p><p><a href="https://twitter.com/HackingDave/status/1370424240801996809?s=20">https://twitter.com/HackingDave/status/1370424240801996809?s=20</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>TIKTOK INTRODUCES NEW ‘KINDNESS’ FEATURES AS IT URGES PEOPLE TO BE NICER TO EACH OTHER</p><p><a href="https://www.independent.co.uk/topic/tiktok-0">TikTok</a> has introduced new features in an attempt to make its users be “kinder” to each other.</p><p>They include a new prompt that will attempt to spot cruel comments and advise people to reconsider their posts before they are sent.</p><p>Video creators will also be able to filter comments – removing any comments at all, unless the owner of the video approves them.</p><p>That feature is called “filter all comments” and TikTok said it was an extension of existing tools that look out for “spam and offensive comments” so they can be filtered out, as well as a feature that allows for the hiding of specific keywords.</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/tiktok-update-new-feature-kind-comment-b1815148.html">https://www.independent.co.uk/life-style/gadgets-and-tech/tiktok-update-new-feature-kind-comment-b1815148.html</a></p><p>[That was this week's BILLY BIG BALLS]</p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/encrypted-comms-denies-police/">Encrypted Comms Firm Denies Police Cracked User Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/encrypted-comms-ceo-indicted-drug/">Encrypted Comms CEO Indicted in Drug Trafficking Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/exchange-exploit-attempts-sixfold/">Exchange Exploit Attempts Surge Sixfold as Ransomware Lands</a></p><p><a href="https://www.infosecurity-magazine.com/news/ovh-data-center-fire-impacts/">OVH Data Center Fire Impacts Cyber-criminals</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-warning-to-nurseries/">UK Nurseries Get First Official Cyber-Attack Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-2fa-security-keys/">Twitter Updates 2FA to Enable Use of Multiple Security Keys</a></p><p><a href="https://www.infosecurity-magazine.com/news/dropbox-password-manager-free/">Dropbox to Make Password Manager Feature Free for All Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-consultant-indicted-on-1/">Security Consultant Indicted on Cyberstalking Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/mom-charged-in-deepfake/">Mom Charged in Deepfake Cheerleading Plot</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true">https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true</a></p><p><a href="https://futurism.com/the-byte/deepfake-elon-musk-zoom-meetings">https://futurism.com/the-byte/deepfake-elon-musk-zoom-meetings</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/qUZFdGYLOoDcpmMmenkm-VBKwlRuXY1xsQnZvjgPW4NWUgFnodtTRyzM-hvDE-qWMutKaaj5GYr4Cfqu5WVTem2rTtHNLkUYvUMO5us5lnJ-rf5dNP-PCjhaipZFoeZ0VJtqiCow" /><p><a href="https://www.nytimes.com/2021/03/18/business/hacking-cars-cybersecurity.html">https://www.nytimes.com/2021/03/18/business/hacking-cars-cybersecurity.html</a></p><p><a href="https://twitter.com/WeldPond/status/1372530409536380931">https://twitter.com/WeldPond/status/1372530409536380931</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Theree is no Sticky Pickle of the Week</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 Mar 2021 17:42:07 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-47-whats-happening-with-issa-uk-zUnSUUJA</link>
      <content:encoded><![CDATA[<p>Our regular know our regular features, so here is our regular update for our regular features for our regular listeners.</p><p>This week in Infosec</p><p>Tweet of the Week</p><p>Billy Big Balls</p><p>Rant of the week</p><p>Industry News</p><p>There is no Little People, there has never been a Little People</p><p>Will we have a Sticky Pickle of the Week? </p><p> </p><p><strong>This Week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>6th March 1995: The SATAN (Security Administrator Tool for Analyzing Networks) security tool was released by Dan Farmer and Wietse Venema. The release stirred huge debate about security auditing tools being given to the public.</li></ol><p>Fun fact:<a href="https://twitter.com/neilhimself"> @neilhimself</a> drew the tool's documentation artwork. </p><p><a href="https://www.latimes.com/archives/la-xpm-1995-03-01-fi-37458-story.html">https://www.latimes.com/archives/la-xpm-1995-03-01-fi-37458-story.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1240452423778308097">https://twitter.com/todayininfosec/status/1240452423778308097</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/campuscodi">Catalin Cimpanu:</a></p><p>Check Point says it is seeing a doubling in ProxyLogon exploitation attempts every few hours.</p><p>Please, red teamers, explain it to us like we're 5 how releasing PoCs for highly-dangerous bugs too early doesn't help threat actors</p><p>We're listening!</p><p><a href="https://twitter.com/HackingDave">Dave Kennedy:</a></p><p>Blaming red teamers is already an inaccurate statement as it's typically security researchers who publish these.</p><p>It was already actively exploited with hundreds of thousands of already compromised systems with little to no direction from Microsoft.</p><p>Yet offsec is to blame?</p><p><a href="https://twitter.com/HackingDave/status/1370424240801996809?s=20">https://twitter.com/HackingDave/status/1370424240801996809?s=20</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>TIKTOK INTRODUCES NEW ‘KINDNESS’ FEATURES AS IT URGES PEOPLE TO BE NICER TO EACH OTHER</p><p><a href="https://www.independent.co.uk/topic/tiktok-0">TikTok</a> has introduced new features in an attempt to make its users be “kinder” to each other.</p><p>They include a new prompt that will attempt to spot cruel comments and advise people to reconsider their posts before they are sent.</p><p>Video creators will also be able to filter comments – removing any comments at all, unless the owner of the video approves them.</p><p>That feature is called “filter all comments” and TikTok said it was an extension of existing tools that look out for “spam and offensive comments” so they can be filtered out, as well as a feature that allows for the hiding of specific keywords.</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/tiktok-update-new-feature-kind-comment-b1815148.html">https://www.independent.co.uk/life-style/gadgets-and-tech/tiktok-update-new-feature-kind-comment-b1815148.html</a></p><p>[That was this week's BILLY BIG BALLS]</p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/encrypted-comms-denies-police/">Encrypted Comms Firm Denies Police Cracked User Messages</a></p><p><a href="https://www.infosecurity-magazine.com/news/encrypted-comms-ceo-indicted-drug/">Encrypted Comms CEO Indicted in Drug Trafficking Conspiracy</a></p><p><a href="https://www.infosecurity-magazine.com/news/exchange-exploit-attempts-sixfold/">Exchange Exploit Attempts Surge Sixfold as Ransomware Lands</a></p><p><a href="https://www.infosecurity-magazine.com/news/ovh-data-center-fire-impacts/">OVH Data Center Fire Impacts Cyber-criminals</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-warning-to-nurseries/">UK Nurseries Get First Official Cyber-Attack Warning</a></p><p><a href="https://www.infosecurity-magazine.com/news/twitter-2fa-security-keys/">Twitter Updates 2FA to Enable Use of Multiple Security Keys</a></p><p><a href="https://www.infosecurity-magazine.com/news/dropbox-password-manager-free/">Dropbox to Make Password Manager Feature Free for All Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-consultant-indicted-on-1/">Security Consultant Indicted on Cyberstalking Charges</a></p><p><a href="https://www.infosecurity-magazine.com/news/mom-charged-in-deepfake/">Mom Charged in Deepfake Cheerleading Plot</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true">https://mashable.com/article/joe-biden-green-screen-conspiracy-debunked/?europe=true</a></p><p><a href="https://futurism.com/the-byte/deepfake-elon-musk-zoom-meetings">https://futurism.com/the-byte/deepfake-elon-musk-zoom-meetings</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/qUZFdGYLOoDcpmMmenkm-VBKwlRuXY1xsQnZvjgPW4NWUgFnodtTRyzM-hvDE-qWMutKaaj5GYr4Cfqu5WVTem2rTtHNLkUYvUMO5us5lnJ-rf5dNP-PCjhaipZFoeZ0VJtqiCow" /><p><a href="https://www.nytimes.com/2021/03/18/business/hacking-cars-cybersecurity.html">https://www.nytimes.com/2021/03/18/business/hacking-cars-cybersecurity.html</a></p><p><a href="https://twitter.com/WeldPond/status/1372530409536380931">https://twitter.com/WeldPond/status/1372530409536380931</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Theree is no Sticky Pickle of the Week</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="59754277" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/2297d1ca-6156-4b9b-9d51-7deab831d42b/audio/fa58bec5-fc05-4df0-bff3-4b02da2e0f94/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 47 - What&apos;s Happening With ISSA UK?</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnes</itunes:author>
      <itunes:duration>01:02:15</itunes:duration>
      <itunes:summary>SATAN, SAINT, SANTA and the demonisation of hacking tools, car testing and TIKTOK does something right. 

Thom dedicates this episode to his Mother and apologises for forgetting Mother&apos;s Day. These two statements are in no way related.</itunes:summary>
      <itunes:subtitle>SATAN, SAINT, SANTA and the demonisation of hacking tools, car testing and TIKTOK does something right. 

Thom dedicates this episode to his Mother and apologises for forgetting Mother&apos;s Day. These two statements are in no way related.</itunes:subtitle>
      <itunes:keywords>podcast, our lawyers, satire, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d37e06d-efbb-4f24-b22b-a3e3d4dbcaf1</guid>
      <title>Episode 46 - The Insult free Episode</title>
      <description><![CDATA[<p><img src="https://lh4.googleusercontent.com/WFXuInjZtsX1X4M6QcArz0nCZcNohWZoV3fr_ORqW-SzxjqbwOjxbrdatnqA2qmYymW12xORKn2LYAYDXVKk11DB-MXA_6ZCfWDPyHPQ6D9f8BzzXSrAt0y3ayXCf1mi5aLU8oDk" /><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>6th March 1992: For the second year in a row the Michelangelo virus activated on this date. However, the lead up to March 6th, 1992 was the first instance of mass hysteria about a virus, though the hysteria was overblown. </p><p><a href="https://en.wikipedia.org/wiki/Michelangelo_(computer_virus)">https://en.wikipedia.org/wiki/Michelangelo_(computer_virus)</a></p><p><a href="https://nakedsecurity.sophos.com/2012/03/05/michelangelo-virus/">https://nakedsecurity.sophos.com/2012/03/05/michelangelo-virus/</a></p><p><a href="https://twitter.com/todayininfosec/status/1368258690143371264">https://twitter.com/todayininfosec/status/1368258690143371264</a></p><img src="https://lh3.googleusercontent.com/Gl2dTIws1gfazKl3SBOq8EVxO9TySo-5MaJOlxtHGjDOtlCwl9itH2fX5KaUmokgKQSu2EsJ4pZ1zjDnUeeKqB2HTeho7TM_H5Wb-JN9u_UfIozoPjDZ47tbiIQtJdVNRcKrM8V8" /><p><a href="https://nakedsecurity.sophos.com/2010/04/08/fame-bbc-newsround/">https://nakedsecurity.sophos.com/2010/04/08/fame-bbc-newsround/</a></p><p>5th March 2003: A Sendmail remote buffer overflow vulnerability was made public. Discovered by ISS 2 months prior, exploit code was published within 24 hours.</p><p><a href="https://www.techrepublic.com/article/watch-out-for-critical-buffer-overflow-vulnerability-in-sendmail/">https://www.techrepublic.com/article/watch-out-for-critical-buffer-overflow-vulnerability-in-sendmail/</a></p><p><a href="https://twitter.com/todayininfosec/status/1235425049923862529">https://twitter.com/todayininfosec/status/1235425049923862529</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Nike’s Resell Scandal and VP Ann Hebert’s Resignation, Explained</p><p><a href="https://www.complex.com/sneakers/nike-ann-hebert-son-sneaker-resale-scandal-explained/how-was-joe-hebert-getting-shoes">https://www.complex.com/sneakers/nike-ann-hebert-son-sneaker-resale-scandal-explained/how-was-joe-hebert-getting-shoes</a></p><ul><li>19-year-old entrepreneur from Portland, Oregon. Known as “West Coast Joe” and runs the @west.coast.streetwear account on Instagram, along with its affiliates.</li><li>Starting his business in high school, Joe begins selling limited-edition drops, “Deadstock”, and establishes Discord channels to share his unique knowledge of Nike sale schedules, sale locations, and more. </li><li>His success caught the eye of Joshua Hunt, who sought to write a piece for Bloomberg.</li><li>Fame and fortune got to Joe’s head when he sends through an American Express statement to demonstrate the company’s revenue. The name on the card? It wasn’t Joe. It was Ann Hebert, VP and GM of Nike’s North American market. Joe's mom. </li><li>Hunt reaches out to Joe to discuss the relationship. </li><li>Joe begs Hunt to not disclose this information in the article and ceases communication with Bloomberg entirely. </li><li>Ann Hebert resigns just days after the publication of Hunt’s article outlining the story. </li></ul><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>STURGIS, Mich. – A virtual preliminary examination in Michigan was interrupted last week after the defendant was found to be at the same home as an alleged victim of assault while the hearing took place.</p><p>Coby James Harris, 21, had gone before St. Joseph County District Court on March 2, accused of assault with intent to commit bodily harm less than murder, stemming from an incident Feb. 9 in Sturgis, Michigan.</p><p>About seven minutes into the proceeding, Deborah Davis, assistant to the prosecuting attorney and representing Lindsey, said she believed Lindsey and Harris were in close proximity during the livestream, based on Lindsey’s answers and body language.</p><p>“Your Honor … I have reason to believe that the defendant is in the same apartment as the complaining witness right now, and I am extremely scared for her safety,” Davis said. “The fact that she’s looking off to the side and he’s moving around, I want some confirmation that she is safe before we continue.&quot;</p><p>Middleton asked Lindsey where she was at that moment.</p><p>“Um, I’m at a house,” Lindsey said, with hesitation, giving a Hatch Street address in Sturgis.</p><p>Middleton then asked Harris to divulge the address where he was. Harris gave a house number on East Lafayette Street.</p><p>Middleton told Harris to go outside with his cell-phone and take a photograph of the house number. Harris declined, saying he was limited by low phone battery and that his device was connected to a charger.</p><p>A few moments later, Davis said the police were at the door of Lindsey’s confirmed location to check on her. Lindsey was instructed to go to the door to speak to police.</p><p>“We may need to adjourn this, your Honor,” Davis said to Middleton.</p><p>Lindsey's connection to the court proceeding went offline after it showed her speaking to </p><p>police outside the home. Moments later, Lindsey’s livestream came back online, showing Harris inside on Lindsey's phone and in the custody of police. Davis briefly “face-palmed” upon the reveal that Harris was at the same location as Lindsey.</p><p><a href="https://eu.sturgisjournal.com/story/news/crime/2021/03/05/court-hearing-postponed-after-accused-found-same-house-witness/4587600001/">https://eu.sturgisjournal.com/story/news/crime/2021/03/05/court-hearing-postponed-after-accused-found-same-house-witness/4587600001/</a></p><p>(start at 06:30.)</p><p> </p><p>Rollerblading Karachi cops <a href="https://youtu.be/Q0jED85uwbw">https://youtu.be/Q0jED85uwbw</a></p><p> </p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p><strong>Industry news</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sita-supply-chain-breach-hits/">SITA Supply Chain Breach Hits Multiple Airlines</a></p><p><a href="https://www.infosecurity-magazine.com/news/docker-hub-bitbucket-hijacked/">Docker Hub and Bitbucket Resources Hijacked for Crypto-Mining</a></p><p><a href="https://www.infosecurity-magazine.com/news/mcafee-decades-behind-bars-fraud/">McAfee Faces Decades Behind Bars After Fraud Indictment</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-dont-fall-for-mothers-day/">NCSC: Don’t Fall for Mother’s Day Scams This Week</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-expands-coverage/">Microsoft Expands Coverage of Exchange Server Patches</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-threat-analysts-banned/">Most Threat Analysts Banned from Sharing Intel with Peers</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-office-workers-share-data/">Third of Office Workers Warned After Sharing Data Via Unofficial Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/superstar-kpop-bands-tiktok-hacked/">Superstar K-Pop Band’s TikTok Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/school-boss-resigns-after-porn/">School Boss Resigns After Porn Found on Computer</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.infosecurity-magazine.com/news/javvad-malik-wendy-nather-online/">Industry Leaders Javvad Malik and Wendy Nather to Headline Infosecurity Magazine Online Summit</a> - industry pioneers <a href="https://twitter.com/J4vv4D">Javvad Malik</a>, security awareness advocate at KnowBe4, and <a href="https://twitter.com/wendynather">Wendy Nather</a>, head of advisory CISOs at Duo Security (Cisco), will be headlining the upcoming Infosecurity Magazine Online Summit, taking place on March 23 and 24.</p><p> </p><p><strong>Tweet of the Week</strong></p><p>Dr Jen Golbeck reminding us how creepy Facebook and other advertisers (but mostly Facebook) are:</p><img src="https://lh5.googleusercontent.com/Gn7QGXFXYmOFuOzrA8O2F1WAFZPKJL_zZQ0DcDLqGMdNaTaahg8WY_X5R0LdeYB9LoYOVDX5Jn0UHUNafoSgrI-N_VCBNVXcmiU243QuycCYcKWF3oJJsp9TvFEf86ESs_7GB8sb" /><ul><li><a href="https://nakedsecurity.sophos.com/2019/07/23/spearphone-researchers-eavesdrop-on-phone-loudspeakers/">Accelerometer Vibrations to Speech</a> — How your phone’s accelerometer can snoop on your calls (popular press)</li><li><a href="https://www.npr.org/2019/06/12/732157537/spains-soccer-league-fined-for-using-app-to-spy-on-fans-in-fight-to-curb-piracy">La Liga Soccer App Spying Scandal </a>— Without telling users, Spain’s soccer app used GPS and microphone access to fine bars who hadn’t paid licensing fees</li><li><a href="https://www.sonitor.com/tags">Sonitor’s Lyra system uses your phone’s microphone to track your position </a>— an example of the ultrasonic beacons mentioned in one of my videos</li><li><a href="https://www.csoonline.com/article/2925590/smartphone-location-tracking-via-wi-fi-signals-and-via-motion-sensors-for-subway-riders.html">Location tracking through WiFi signals </a>— Your location can be tracked even if you turn off location services</li><li><a href="https://www.cnet.com/news/shadow-profiles-facebook-has-information-you-didnt-hand-over/">Facebook Shadow Profiles</a> — Even if you haven’t set up a Facebook account, the company likely maintains a “shadow profile” of you.</li><li><a href="https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/?sh=8ce047e66686">Target Knows You’re Pregnant before you tell anyone else</a> — here’s how</li></ul><p><a href="https://www.tiktok.com/@jengolbeck">https://www.tiktok.com/@jengolbeck</a>? </p><p><a href="https://gizmodo.com/facebook-knows-how-to-track-you-using-the-dust-on-your-1821030620">https://gizmodo.com/facebook-knows-how-to-track-you-using-the-dust-on-your-1821030620</a></p><p><a href="https://twitter.com/jengolbeck/status/1368991334309257216?s=20">https://twitter.com/jengolbeck/status/1368991334309257216?s=20</a></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Mar 2021 13:14:25 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Miss Matey, Graham Cluley, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-46-the-insult-free-episode-W8yDmAhl</link>
      <content:encoded><![CDATA[<p><img src="https://lh4.googleusercontent.com/WFXuInjZtsX1X4M6QcArz0nCZcNohWZoV3fr_ORqW-SzxjqbwOjxbrdatnqA2qmYymW12xORKn2LYAYDXVKk11DB-MXA_6ZCfWDPyHPQ6D9f8BzzXSrAt0y3ayXCf1mi5aLU8oDk" /><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>6th March 1992: For the second year in a row the Michelangelo virus activated on this date. However, the lead up to March 6th, 1992 was the first instance of mass hysteria about a virus, though the hysteria was overblown. </p><p><a href="https://en.wikipedia.org/wiki/Michelangelo_(computer_virus)">https://en.wikipedia.org/wiki/Michelangelo_(computer_virus)</a></p><p><a href="https://nakedsecurity.sophos.com/2012/03/05/michelangelo-virus/">https://nakedsecurity.sophos.com/2012/03/05/michelangelo-virus/</a></p><p><a href="https://twitter.com/todayininfosec/status/1368258690143371264">https://twitter.com/todayininfosec/status/1368258690143371264</a></p><img src="https://lh3.googleusercontent.com/Gl2dTIws1gfazKl3SBOq8EVxO9TySo-5MaJOlxtHGjDOtlCwl9itH2fX5KaUmokgKQSu2EsJ4pZ1zjDnUeeKqB2HTeho7TM_H5Wb-JN9u_UfIozoPjDZ47tbiIQtJdVNRcKrM8V8" /><p><a href="https://nakedsecurity.sophos.com/2010/04/08/fame-bbc-newsround/">https://nakedsecurity.sophos.com/2010/04/08/fame-bbc-newsround/</a></p><p>5th March 2003: A Sendmail remote buffer overflow vulnerability was made public. Discovered by ISS 2 months prior, exploit code was published within 24 hours.</p><p><a href="https://www.techrepublic.com/article/watch-out-for-critical-buffer-overflow-vulnerability-in-sendmail/">https://www.techrepublic.com/article/watch-out-for-critical-buffer-overflow-vulnerability-in-sendmail/</a></p><p><a href="https://twitter.com/todayininfosec/status/1235425049923862529">https://twitter.com/todayininfosec/status/1235425049923862529</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Nike’s Resell Scandal and VP Ann Hebert’s Resignation, Explained</p><p><a href="https://www.complex.com/sneakers/nike-ann-hebert-son-sneaker-resale-scandal-explained/how-was-joe-hebert-getting-shoes">https://www.complex.com/sneakers/nike-ann-hebert-son-sneaker-resale-scandal-explained/how-was-joe-hebert-getting-shoes</a></p><ul><li>19-year-old entrepreneur from Portland, Oregon. Known as “West Coast Joe” and runs the @west.coast.streetwear account on Instagram, along with its affiliates.</li><li>Starting his business in high school, Joe begins selling limited-edition drops, “Deadstock”, and establishes Discord channels to share his unique knowledge of Nike sale schedules, sale locations, and more. </li><li>His success caught the eye of Joshua Hunt, who sought to write a piece for Bloomberg.</li><li>Fame and fortune got to Joe’s head when he sends through an American Express statement to demonstrate the company’s revenue. The name on the card? It wasn’t Joe. It was Ann Hebert, VP and GM of Nike’s North American market. Joe's mom. </li><li>Hunt reaches out to Joe to discuss the relationship. </li><li>Joe begs Hunt to not disclose this information in the article and ceases communication with Bloomberg entirely. </li><li>Ann Hebert resigns just days after the publication of Hunt’s article outlining the story. </li></ul><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>STURGIS, Mich. – A virtual preliminary examination in Michigan was interrupted last week after the defendant was found to be at the same home as an alleged victim of assault while the hearing took place.</p><p>Coby James Harris, 21, had gone before St. Joseph County District Court on March 2, accused of assault with intent to commit bodily harm less than murder, stemming from an incident Feb. 9 in Sturgis, Michigan.</p><p>About seven minutes into the proceeding, Deborah Davis, assistant to the prosecuting attorney and representing Lindsey, said she believed Lindsey and Harris were in close proximity during the livestream, based on Lindsey’s answers and body language.</p><p>“Your Honor … I have reason to believe that the defendant is in the same apartment as the complaining witness right now, and I am extremely scared for her safety,” Davis said. “The fact that she’s looking off to the side and he’s moving around, I want some confirmation that she is safe before we continue.&quot;</p><p>Middleton asked Lindsey where she was at that moment.</p><p>“Um, I’m at a house,” Lindsey said, with hesitation, giving a Hatch Street address in Sturgis.</p><p>Middleton then asked Harris to divulge the address where he was. Harris gave a house number on East Lafayette Street.</p><p>Middleton told Harris to go outside with his cell-phone and take a photograph of the house number. Harris declined, saying he was limited by low phone battery and that his device was connected to a charger.</p><p>A few moments later, Davis said the police were at the door of Lindsey’s confirmed location to check on her. Lindsey was instructed to go to the door to speak to police.</p><p>“We may need to adjourn this, your Honor,” Davis said to Middleton.</p><p>Lindsey's connection to the court proceeding went offline after it showed her speaking to </p><p>police outside the home. Moments later, Lindsey’s livestream came back online, showing Harris inside on Lindsey's phone and in the custody of police. Davis briefly “face-palmed” upon the reveal that Harris was at the same location as Lindsey.</p><p><a href="https://eu.sturgisjournal.com/story/news/crime/2021/03/05/court-hearing-postponed-after-accused-found-same-house-witness/4587600001/">https://eu.sturgisjournal.com/story/news/crime/2021/03/05/court-hearing-postponed-after-accused-found-same-house-witness/4587600001/</a></p><p>(start at 06:30.)</p><p> </p><p>Rollerblading Karachi cops <a href="https://youtu.be/Q0jED85uwbw">https://youtu.be/Q0jED85uwbw</a></p><p> </p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p><strong>Industry news</strong></p><p><a href="https://www.infosecurity-magazine.com/news/sita-supply-chain-breach-hits/">SITA Supply Chain Breach Hits Multiple Airlines</a></p><p><a href="https://www.infosecurity-magazine.com/news/docker-hub-bitbucket-hijacked/">Docker Hub and Bitbucket Resources Hijacked for Crypto-Mining</a></p><p><a href="https://www.infosecurity-magazine.com/news/mcafee-decades-behind-bars-fraud/">McAfee Faces Decades Behind Bars After Fraud Indictment</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-dont-fall-for-mothers-day/">NCSC: Don’t Fall for Mother’s Day Scams This Week</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-expands-coverage/">Microsoft Expands Coverage of Exchange Server Patches</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-threat-analysts-banned/">Most Threat Analysts Banned from Sharing Intel with Peers</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-office-workers-share-data/">Third of Office Workers Warned After Sharing Data Via Unofficial Apps</a></p><p><a href="https://www.infosecurity-magazine.com/news/superstar-kpop-bands-tiktok-hacked/">Superstar K-Pop Band’s TikTok Hacked</a></p><p><a href="https://www.infosecurity-magazine.com/news/school-boss-resigns-after-porn/">School Boss Resigns After Porn Found on Computer</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.infosecurity-magazine.com/news/javvad-malik-wendy-nather-online/">Industry Leaders Javvad Malik and Wendy Nather to Headline Infosecurity Magazine Online Summit</a> - industry pioneers <a href="https://twitter.com/J4vv4D">Javvad Malik</a>, security awareness advocate at KnowBe4, and <a href="https://twitter.com/wendynather">Wendy Nather</a>, head of advisory CISOs at Duo Security (Cisco), will be headlining the upcoming Infosecurity Magazine Online Summit, taking place on March 23 and 24.</p><p> </p><p><strong>Tweet of the Week</strong></p><p>Dr Jen Golbeck reminding us how creepy Facebook and other advertisers (but mostly Facebook) are:</p><img src="https://lh5.googleusercontent.com/Gn7QGXFXYmOFuOzrA8O2F1WAFZPKJL_zZQ0DcDLqGMdNaTaahg8WY_X5R0LdeYB9LoYOVDX5Jn0UHUNafoSgrI-N_VCBNVXcmiU243QuycCYcKWF3oJJsp9TvFEf86ESs_7GB8sb" /><ul><li><a href="https://nakedsecurity.sophos.com/2019/07/23/spearphone-researchers-eavesdrop-on-phone-loudspeakers/">Accelerometer Vibrations to Speech</a> — How your phone’s accelerometer can snoop on your calls (popular press)</li><li><a href="https://www.npr.org/2019/06/12/732157537/spains-soccer-league-fined-for-using-app-to-spy-on-fans-in-fight-to-curb-piracy">La Liga Soccer App Spying Scandal </a>— Without telling users, Spain’s soccer app used GPS and microphone access to fine bars who hadn’t paid licensing fees</li><li><a href="https://www.sonitor.com/tags">Sonitor’s Lyra system uses your phone’s microphone to track your position </a>— an example of the ultrasonic beacons mentioned in one of my videos</li><li><a href="https://www.csoonline.com/article/2925590/smartphone-location-tracking-via-wi-fi-signals-and-via-motion-sensors-for-subway-riders.html">Location tracking through WiFi signals </a>— Your location can be tracked even if you turn off location services</li><li><a href="https://www.cnet.com/news/shadow-profiles-facebook-has-information-you-didnt-hand-over/">Facebook Shadow Profiles</a> — Even if you haven’t set up a Facebook account, the company likely maintains a “shadow profile” of you.</li><li><a href="https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/?sh=8ce047e66686">Target Knows You’re Pregnant before you tell anyone else</a> — here’s how</li></ul><p><a href="https://www.tiktok.com/@jengolbeck">https://www.tiktok.com/@jengolbeck</a>? </p><p><a href="https://gizmodo.com/facebook-knows-how-to-track-you-using-the-dust-on-your-1821030620">https://gizmodo.com/facebook-knows-how-to-track-you-using-the-dust-on-your-1821030620</a></p><p><a href="https://twitter.com/jengolbeck/status/1368991334309257216?s=20">https://twitter.com/jengolbeck/status/1368991334309257216?s=20</a></p></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="61466238" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/db9f1c56-59ee-44e4-a12d-b79b7850db79/audio/6287398a-5624-4595-9605-92bc72da840a/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 46 - The Insult free Episode</itunes:title>
      <itunes:author>Andrew Agnes, Miss Matey, Graham Cluley, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b7e53abe-0052-4943-a98f-2a392145b251/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:04:02</itunes:duration>
      <itunes:summary>This episode is guaranteed* insult free. Legal proceedings have seen to that. Special guest  appearance by Miss Matey.

*not guaranteed.</itunes:summary>
      <itunes:subtitle>This episode is guaranteed* insult free. Legal proceedings have seen to that. Special guest  appearance by Miss Matey.

*not guaranteed.</itunes:subtitle>
      <itunes:keywords>insulting, graham cluley, host unknown, matey bubblebath, offensive, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c936b84-5f27-419f-bf76-6ecf0b846972</guid>
      <title>Episode 45 - The Antibody Episode</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>2nd March 2002: Zone-H was launched in Estonia and began saving and publishing copies of defaced websites 7 days later. </p><p><a href="http://www.zone-h.org/news/id/4742?hz=2">http://www.zone-h.org/news/id/4742?hz=2</a></p><p><a href="https://twitter.com/todayininfosec/status/1234492350833008640">https://twitter.com/todayininfosec/status/1234492350833008640</a></p><p>2nd March 2010: Gregory  D. Evans' book "How To Become The World's No. 1 Hacker" was published. The book was heavily plagiarized and not held in high regard. Evans was quite controversial...to say the least. And got a lot of attention for a couple of years. Google him if you wish.</p><p><a href="https://twitter.com/todayininfosec/status/1234320212117221376">https://twitter.com/todayininfosec/status/1234320212117221376</a></p><p><a href="https://attrition.org/errata/charlatan/gregory_evans/">https://attrition.org/errata/charlatan/gregory_evans/</a> <br /><br /><a href="https://blog.c22.cc/2010/06/17/threats/comment-page-2/">https://blog.c22.cc/2010/06/17/threats/comment-page-2/</a></p><p> </p><p><strong>Rant of the Week</strong> (not covered)</p><p>A warning went up on the perl.org infrastructure weblog late in January notifying users that perl.com now directed to a parking site and advised against visiting "as there are some signals that it may be related to sites that have distributed malware in the past."</p><p>The site later returned an ERR_CONNECTION_CLOSED error message.</p><p>The hijack appears to have followed the age-old path of an attacker pouncing on a compromised account and swiping the domain rather than a simple expiration.</p><p>A good read out of what happened from Perl’s point of view as well as their Incident Response processes (link at the bottom).</p><p>We had learned very quickly that when you use the registered domain for your email contact, no one can contact you when that domain no longer handles your mail. </p><p>What we think happened</p><p>This part veers into some speculation, and Perl.com wasn’t the only victim. We think that there was a social engineering attack on Network Solutions, including phony documents and so on. There’s no reason for Network Solutions to reveal anything to me (again, I’m not the injured party), but I did talk to other domain owners involved and this is the basic scheme they reported.</p><p>John Berryhill provided <a href="https://twitter.com/briandfoy_perl/status/1354535622069919748">some forensic work in Twitter</a> that showed the compromise actually happened in September. The domain was transferred to the BizCN registrar in December, but the nameservers were not changed. The domain was transferred again in January to another registrar, Key Systems, GmbH. This latency period avoids immediate detection, and bouncing the domain through a couple registrars makes the recovery much harder.</p><p>RANT: Domain was hijacked, old methods, there are no new hacks!</p><p><a href="https://www.perl.com/article/the-hijacking-of-perl-com/">https://www.perl.com/article/the-hijacking-of-perl-com/</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>AOL phishing email states your account will be closed</p><p><a href="https://www.bleepingcomputer.com/news/security/beware-aol-phishing-email-states-your-account-will-be-closed/">https://www.bleepingcomputer.com/news/security/beware-aol-phishing-email-states-your-account-will-be-closed/</a></p><p><a href="https://mashable.com/2014/08/21/aol-disc-marketing-jan-brandt/?europe=true">https://mashable.com/2014/08/21/aol-disc-marketing-jan-brandt/?europe=true</a></p><p> </p><p><strong>Industry News</strong></p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p> </p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-set-massive-92m-payout-over/">TikTok Set for Massive $92m Payout Over Privacy Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-phototagging-lawsuit/">Facebook Photo-tagging Lawsuit Settled for $650m</a></p><p><a href="https://www.infosecurity-magazine.com/news/go-malware-detections-increase-2000/">Go Malware Detections Increase 2000%</a></p><p><a href="https://www.infosecurity-magazine.com/news/quarter-healthcare-apps-high/">Quarter of Healthcare Apps Contain High Severity Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patch-four-zeroday/">Microsoft Patches Four Zero-Day Exchange Server Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/password-reuse-60-15-billion/">Password Reuse at 60% as 1.5 Billion Combos Discovered Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-attacks-soared-150-in/">Ransomware Attacks Soared 150% in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-cyber-agency-workers/">Canadian Cyber-Agency Workers Threaten Strike</a></p><p><a href="https://www.infosecurity-magazine.com/news/nc-missing-teens-found-alive/">Missing Teens Used School Laptops to Chat with Alleged Abductors</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p>Jav has the COVID Jab</p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/oNiOiH1KGBR5G_rZkSmeFWVXWSrcbVV8lj4M4OrlCf77xHrCT5yfl0bkxdZUtqm1GmtBN4hTDuxnDutcSwnzXZsvdvJsgUf1KLaSKOs4Iwza5Z_5-M2LkTAv-uw12n23voAK4lLJ" /><p><a href="https://twitter.com/malwrandpickles">MalwareAndPickles @malwrandpickles</a></p><p>It's probably nothing.</p><p><a href="https://twitter.com/DrGeekthumb">Marc J @DrGeekthumb</a></p><p>The server room had no lock.</p><p><a href="https://twitter.com/cooke_andy">Andy Cooke แอนดี้ คุกส์ @cooke_andy</a></p><p>OK, 3389 open to the internet.</p><p><a href="https://twitter.com/UK_Daniel_Card">MrR3b00t | it's safe just don't go outside @UK_Daniel_Card</a></p><p>i wiped the right drive right?</p><p><a href="https://twitter.com/christoperj">Christopher J. Marcinko @christoperj</a></p><p>I’m compliant so I’m definitely secure</p><p><a href="https://twitter.com/drdowns">David Downs @drdowns</a></p><p>We have a strong password policy</p><p><a href="https://twitter.com/cigh033">Simon @cigh033</a></p><p>"sorry, your password is too long"</p><p><a href="https://twitter.com/jcenters">Josh Centers @jcenters</a></p><p>Rudy Giuliani, professional cyber security expert</p><p><a href="https://twitter.com/wimletzer">wim letzer @wimletzer</a></p><p>That does not happen to me.</p><p><a href="https://twitter.com/davidnewman">David Robert Newman @davidnewman</a></p><p>“I wrote my own crypto libraries”</p><p><a href="https://twitter.com/TheTallestJJ">Jeroen Jetten @TheTallestJJ</a></p><p>We’re too small to be attacked</p><p><a href="https://twitter.com/kelleyllc">James Kelley @kelleyllc</a></p><p>Client required SolarWinds for security reasons.</p><p><a href="https://twitter.com/dms1899">dao ming si @dms1899</a></p><p>Our security policy protects against abuse.</p><p><a href="https://twitter.com/morenji">Moreno Daltin @morenji</a></p><p>We have always done this way</p><p><a href="https://twitter.com/tupelofortitude">Paul Stephenson @tupelofortitude</a></p><p>Wife found my credit card statement</p><p><a href="https://twitter.com/Sophos/status/1367082335997427720">https://twitter.com/Sophos/status/1367082335997427720</a></p><p> </p><p><strong>The Little People</strong></p><p>There will no longer be a Little People segment for the foreseeable future.</p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Imagine you are the CEO of an American based, billion dollar global company.  You hit a SNAFU and are called to testify before congress about what happened.  Obviously the members of congress will want to know in layman's terms how your IT infrastructure was left so unprotected that it was used to deliver malware to several branches of the federal government as well as a series of high-profile private sector targets?</p><p>What might be your go-to responses?</p><p>Correct answer: Blame the intern</p><p>According to Thompson and current SolarWinds CEO Sudhakar Ramakrishna, an intern who worked at the company posted the “solarwinds123” password on GitHub back in 2017. Security researcher Vinoth Kumar later <a href="https://www.cnn.com/2021/02/26/politics/solarwinds123-password-intern/index.html">discovered</a> that the password had been posted publicly since at least June 2018 and informed the company of the leak in 2019, at which point, according to Ramakrishna, it was removed from GitHub.</p><p>Needless to say, that explanation still leaves a lot of questions unanswered. For instance, was the intern actually responsible for setting the “solarwinds123” password? And, if so, why on earth had the company delegated responsibility for setting such an important password to an intern? Was the password actually changed when the leak was discovered in 2019 or was it just removed from GitHub? And why was there no multifactor authentication protecting that server if it could be used to transfer files onto company servers?</p><p>It’s a tempting narrative—as the stories about how a massive, complicated breach is the fault of a single actor often are—in which some clueless college student shows up for a summer and sets a dumb password and then carelessly leaves it up in some publicly accessible code on GitHub. Above all, it’s a story that’s easy to understand, especially for members of Congress. For instance, California Rep. Katie Porter pointed out at the hearing, “I’ve got a stronger password than ‘solarwinds123’ to stop my kids from watching too much YouTube on their iPad.”</p><p><a href="https://slate.com/technology/2021/03/solarwinds-hack-cyber-espionage-intern-password.html">https://slate.com/technology/2021/03/solarwinds-hack-cyber-espionage-intern-password.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 Mar 2021 16:12:55 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-45-the-antibody-episode-tt0_JWb3</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>2nd March 2002: Zone-H was launched in Estonia and began saving and publishing copies of defaced websites 7 days later. </p><p><a href="http://www.zone-h.org/news/id/4742?hz=2">http://www.zone-h.org/news/id/4742?hz=2</a></p><p><a href="https://twitter.com/todayininfosec/status/1234492350833008640">https://twitter.com/todayininfosec/status/1234492350833008640</a></p><p>2nd March 2010: Gregory  D. Evans' book "How To Become The World's No. 1 Hacker" was published. The book was heavily plagiarized and not held in high regard. Evans was quite controversial...to say the least. And got a lot of attention for a couple of years. Google him if you wish.</p><p><a href="https://twitter.com/todayininfosec/status/1234320212117221376">https://twitter.com/todayininfosec/status/1234320212117221376</a></p><p><a href="https://attrition.org/errata/charlatan/gregory_evans/">https://attrition.org/errata/charlatan/gregory_evans/</a> <br /><br /><a href="https://blog.c22.cc/2010/06/17/threats/comment-page-2/">https://blog.c22.cc/2010/06/17/threats/comment-page-2/</a></p><p> </p><p><strong>Rant of the Week</strong> (not covered)</p><p>A warning went up on the perl.org infrastructure weblog late in January notifying users that perl.com now directed to a parking site and advised against visiting "as there are some signals that it may be related to sites that have distributed malware in the past."</p><p>The site later returned an ERR_CONNECTION_CLOSED error message.</p><p>The hijack appears to have followed the age-old path of an attacker pouncing on a compromised account and swiping the domain rather than a simple expiration.</p><p>A good read out of what happened from Perl’s point of view as well as their Incident Response processes (link at the bottom).</p><p>We had learned very quickly that when you use the registered domain for your email contact, no one can contact you when that domain no longer handles your mail. </p><p>What we think happened</p><p>This part veers into some speculation, and Perl.com wasn’t the only victim. We think that there was a social engineering attack on Network Solutions, including phony documents and so on. There’s no reason for Network Solutions to reveal anything to me (again, I’m not the injured party), but I did talk to other domain owners involved and this is the basic scheme they reported.</p><p>John Berryhill provided <a href="https://twitter.com/briandfoy_perl/status/1354535622069919748">some forensic work in Twitter</a> that showed the compromise actually happened in September. The domain was transferred to the BizCN registrar in December, but the nameservers were not changed. The domain was transferred again in January to another registrar, Key Systems, GmbH. This latency period avoids immediate detection, and bouncing the domain through a couple registrars makes the recovery much harder.</p><p>RANT: Domain was hijacked, old methods, there are no new hacks!</p><p><a href="https://www.perl.com/article/the-hijacking-of-perl-com/">https://www.perl.com/article/the-hijacking-of-perl-com/</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>AOL phishing email states your account will be closed</p><p><a href="https://www.bleepingcomputer.com/news/security/beware-aol-phishing-email-states-your-account-will-be-closed/">https://www.bleepingcomputer.com/news/security/beware-aol-phishing-email-states-your-account-will-be-closed/</a></p><p><a href="https://mashable.com/2014/08/21/aol-disc-marketing-jan-brandt/?europe=true">https://mashable.com/2014/08/21/aol-disc-marketing-jan-brandt/?europe=true</a></p><p> </p><p><strong>Industry News</strong></p><p>Our source on probation over at the Infosec PA newswire has been very busy bringing us the latest and greatest security news from around the globe! </p><p> </p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-set-massive-92m-payout-over/">TikTok Set for Massive $92m Payout Over Privacy Suit</a></p><p><a href="https://www.infosecurity-magazine.com/news/facebook-phototagging-lawsuit/">Facebook Photo-tagging Lawsuit Settled for $650m</a></p><p><a href="https://www.infosecurity-magazine.com/news/go-malware-detections-increase-2000/">Go Malware Detections Increase 2000%</a></p><p><a href="https://www.infosecurity-magazine.com/news/quarter-healthcare-apps-high/">Quarter of Healthcare Apps Contain High Severity Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patch-four-zeroday/">Microsoft Patches Four Zero-Day Exchange Server Bugs</a></p><p><a href="https://www.infosecurity-magazine.com/news/password-reuse-60-15-billion/">Password Reuse at 60% as 1.5 Billion Combos Discovered Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-attacks-soared-150-in/">Ransomware Attacks Soared 150% in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/canadian-cyber-agency-workers/">Canadian Cyber-Agency Workers Threaten Strike</a></p><p><a href="https://www.infosecurity-magazine.com/news/nc-missing-teens-found-alive/">Missing Teens Used School Laptops to Chat with Alleged Abductors</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p>Jav has the COVID Jab</p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh5.googleusercontent.com/oNiOiH1KGBR5G_rZkSmeFWVXWSrcbVV8lj4M4OrlCf77xHrCT5yfl0bkxdZUtqm1GmtBN4hTDuxnDutcSwnzXZsvdvJsgUf1KLaSKOs4Iwza5Z_5-M2LkTAv-uw12n23voAK4lLJ" /><p><a href="https://twitter.com/malwrandpickles">MalwareAndPickles @malwrandpickles</a></p><p>It's probably nothing.</p><p><a href="https://twitter.com/DrGeekthumb">Marc J @DrGeekthumb</a></p><p>The server room had no lock.</p><p><a href="https://twitter.com/cooke_andy">Andy Cooke แอนดี้ คุกส์ @cooke_andy</a></p><p>OK, 3389 open to the internet.</p><p><a href="https://twitter.com/UK_Daniel_Card">MrR3b00t | it's safe just don't go outside @UK_Daniel_Card</a></p><p>i wiped the right drive right?</p><p><a href="https://twitter.com/christoperj">Christopher J. Marcinko @christoperj</a></p><p>I’m compliant so I’m definitely secure</p><p><a href="https://twitter.com/drdowns">David Downs @drdowns</a></p><p>We have a strong password policy</p><p><a href="https://twitter.com/cigh033">Simon @cigh033</a></p><p>"sorry, your password is too long"</p><p><a href="https://twitter.com/jcenters">Josh Centers @jcenters</a></p><p>Rudy Giuliani, professional cyber security expert</p><p><a href="https://twitter.com/wimletzer">wim letzer @wimletzer</a></p><p>That does not happen to me.</p><p><a href="https://twitter.com/davidnewman">David Robert Newman @davidnewman</a></p><p>“I wrote my own crypto libraries”</p><p><a href="https://twitter.com/TheTallestJJ">Jeroen Jetten @TheTallestJJ</a></p><p>We’re too small to be attacked</p><p><a href="https://twitter.com/kelleyllc">James Kelley @kelleyllc</a></p><p>Client required SolarWinds for security reasons.</p><p><a href="https://twitter.com/dms1899">dao ming si @dms1899</a></p><p>Our security policy protects against abuse.</p><p><a href="https://twitter.com/morenji">Moreno Daltin @morenji</a></p><p>We have always done this way</p><p><a href="https://twitter.com/tupelofortitude">Paul Stephenson @tupelofortitude</a></p><p>Wife found my credit card statement</p><p><a href="https://twitter.com/Sophos/status/1367082335997427720">https://twitter.com/Sophos/status/1367082335997427720</a></p><p> </p><p><strong>The Little People</strong></p><p>There will no longer be a Little People segment for the foreseeable future.</p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>Imagine you are the CEO of an American based, billion dollar global company.  You hit a SNAFU and are called to testify before congress about what happened.  Obviously the members of congress will want to know in layman's terms how your IT infrastructure was left so unprotected that it was used to deliver malware to several branches of the federal government as well as a series of high-profile private sector targets?</p><p>What might be your go-to responses?</p><p>Correct answer: Blame the intern</p><p>According to Thompson and current SolarWinds CEO Sudhakar Ramakrishna, an intern who worked at the company posted the “solarwinds123” password on GitHub back in 2017. Security researcher Vinoth Kumar later <a href="https://www.cnn.com/2021/02/26/politics/solarwinds123-password-intern/index.html">discovered</a> that the password had been posted publicly since at least June 2018 and informed the company of the leak in 2019, at which point, according to Ramakrishna, it was removed from GitHub.</p><p>Needless to say, that explanation still leaves a lot of questions unanswered. For instance, was the intern actually responsible for setting the “solarwinds123” password? And, if so, why on earth had the company delegated responsibility for setting such an important password to an intern? Was the password actually changed when the leak was discovered in 2019 or was it just removed from GitHub? And why was there no multifactor authentication protecting that server if it could be used to transfer files onto company servers?</p><p>It’s a tempting narrative—as the stories about how a massive, complicated breach is the fault of a single actor often are—in which some clueless college student shows up for a summer and sets a dumb password and then carelessly leaves it up in some publicly accessible code on GitHub. Above all, it’s a story that’s easy to understand, especially for members of Congress. For instance, California Rep. Katie Porter pointed out at the hearing, “I’ve got a stronger password than ‘solarwinds123’ to stop my kids from watching too much YouTube on their iPad.”</p><p><a href="https://slate.com/technology/2021/03/solarwinds-hack-cyber-espionage-intern-password.html">https://slate.com/technology/2021/03/solarwinds-hack-cyber-espionage-intern-password.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="63582365" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/78eebe45-0cc4-499c-9da3-bf7d5f977eef/audio/d41ab916-edc0-42af-9987-fa94f487c7ae/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 45 - The Antibody Episode</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c11fe682-ce35-4d33-985b-21ab71a1135e/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:06:14</itunes:duration>
      <itunes:summary>Javvad is incorrigible and continues to insult Sole Founder Thom&apos;s family. Is there no stopping this man? Andy didn&apos;t feel inclined to comment or intervene.

Your weekly stick of podcast bubblegum for your brain.</itunes:summary>
      <itunes:subtitle>Javvad is incorrigible and continues to insult Sole Founder Thom&apos;s family. Is there no stopping this man? Andy didn&apos;t feel inclined to comment or intervene.

Your weekly stick of podcast bubblegum for your brain.</itunes:subtitle>
      <itunes:keywords>podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">446543ce-07cc-46fe-9016-18a6d02d60c6</guid>
      <title>Episode 44 - Fly My Pretties, Fly!</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>25th February 1989: Knight Lightning published an Enhanced 911 technical doc (it had been stolen from a BellSouth computer) to Phrack under the pseudonym "The Eavesdropper".</p><p><a href="http://phrack.org/issues/24/5.html#article">http://phrack.org/issues/24/5.html#article</a></p><p><a href="https://en.wikipedia.org/wiki/United_States_v._Riggs">https://en.wikipedia.org/wiki/United_States_v._Riggs</a></p><p>On This Day: Feb. 25, 2005, authorities arrested Dennis Rader, a municipal employee and church leader, for the so-called BTK (blind, torture, kill) serial killings that terrorized Wichita, Kan. Rader was convicted and sentenced to 10 consecutive life terms.</p><p>Between 1974 and 1991, he murdered at least 10 people in Wichita, Kansas. He apparently got away with it for over a decade.</p><p>In 2004 an article was published suggesting that nobody remembered him.</p><p>Desperate for notoriety, he began to write to the police and media gloating and showboating.</p><p>In 2005 he sent a floppy disk with some bragging. When police examined the disk, they found metadata of an old word document on it which revealed the name of the Church where he worked and his surname.</p><p><a href="https://www.abajournal.com/magazine/article/how_the_cops_caught_btk">https://www.abajournal.com/magazine/article/how_the_cops_caught_btk</a></p><p> </p><p><strong>Bill Big Balls of the Week</strong></p><p>I use an email tracker to spy on people I work with. This is why</p><p><a href="https://www.independent.co.uk/life-style/email-trackers-how-to-work-b1806723.html">https://www.independent.co.uk/life-style/email-trackers-how-to-work-b1806723.html</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Apple has long held its position on iCloud backups. It has focused on usability rather than total security. If a user changes iPhone and wants all their old iMessages, the easiest way to retrieve them is by getting Apple to store and send them from the iCloud to the new device. It’s the same for other messaging apps like WhatsApp, which offers backups.</p><p>But Apple has reportedly considered making iClouds much more difficult for police to access. </p><p>A <a href="https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT">Reuters</a> report last year suggested that Apple did have plans to fully encrypt iCloud accounts too, so only users had the key, but backed down. Though the report claimed the decision was made after the FBI asked for iClouds to remain accessible, Reuters found no evidence of Apple’s motivation for ditching the plans.</p><p><a href="https://www.forbes.com/sites/thomasbrewster/2021/02/15/when-imessages-arent-private-government-raids-apple-icloud-in-a-dark-web-drug-investigation/">https://www.forbes.com/sites/thomasbrewster/2021/02/15/when-imessages-arent-private-government-raids-apple-icloud-in-a-dark-web-drug-investigation/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/internet-registry-ripe-ncc-warns/">Internet Registry RIPE NCC Warns of Credential Stuffing Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-halves-in/">Concern as Attacker “Breakout” Time Halves in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-retailer-kroger-admits/">US Retailer Kroger Admits Accellion Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/aircraftmaker-bombardier-breached/">Aircraft-Maker Bombardier Breached by Accellion FTA Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/legal-firm-leaks-15000-cases-via/">Legal Firm Leaks 15,000 Cases Via the Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/kia-denies-ransomware-attack/">Kia Denies Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/aston-martin-partners-with/">Aston Martin Partners with SentinelOne</a></p><p><a href="https://www.infosecurity-magazine.com/news/crowdstrike-slams-microsoft-over/">CrowdStrike Slams Microsoft Over SolarWinds Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/adapting-education-close-cyber/">Educational Adaptation Required to Close the Cyber-Skills Gap</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.bankinfosecurity.com/6000-vmware-vcenter-devices-vulnerable-to-remote-attacks-a-16066">6000 vmware vcentre devices vulnerable to remote attacks</a></p><p><a href="https://www.computerweekly.com/news/252496764/Is-Clubhouse-safe-and-should-CISOs-stop-its-use">Is Clubhouse safe, and should CISOs stop its use?</a></p><p><a href="https://www.scmagazine.com/home/security-news/google-alerts-used-to-launch-fake-adobe-flash-player-updater/">Google Alerts used to launch fake Adobe Flash Player updater</a></p><p><a href="https://www.itpro.co.uk/security/hacking/358677/hackers-are-using-google-alerts-to-help-spread-malware">Hackers are using Google Alerts to help spread malware</a></p><p><a href="https://cybersecurity-excellence-awards.com/2021-cybersecurity-professional-awards-winners-and-finalists/">Javvad wins 2021 Cybersecurity Professional Awards – Winners</a></p><img src="https://lh4.googleusercontent.com/Ej_EXU7A8OX2yUsuYc8jKRaQrBaIHE3UVQJjs3XSsexJLVyo7fdJrgYWFZ_WPpITqyy_LmOtbUXBOiQbZL4C9jZDJe4vHBhiUQ_MllGvJJQ9OKaDuarsHE4Xp8tlhWxo9UCcsWYB" /><p> </p><p><strong>Tweet of the Week </strong>(not aired)</p><img src="https://lh5.googleusercontent.com/a-qTkr2-a7F2kfftMWUMsmZ8l0Om8RlPyn1SaHjm345_GSrOkiCmRTVjwIjy0l3w18hfTUUhM5zBAzmVFJKS79XGFXKn2-IGcJpm8deuVhn9Rxt3VfKQdOhoiUGVqtG3egadjKU4" /><p><a href="https://twitter.com/HackingDave/status/1364945642599182344?s=20">https://twitter.com/HackingDave/status/1364945642599182344?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>Yousef Syed and security architects</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Feb 2021 12:50:35 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-44-fly-my-pretties-fly-9Xoywb_M</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>25th February 1989: Knight Lightning published an Enhanced 911 technical doc (it had been stolen from a BellSouth computer) to Phrack under the pseudonym "The Eavesdropper".</p><p><a href="http://phrack.org/issues/24/5.html#article">http://phrack.org/issues/24/5.html#article</a></p><p><a href="https://en.wikipedia.org/wiki/United_States_v._Riggs">https://en.wikipedia.org/wiki/United_States_v._Riggs</a></p><p>On This Day: Feb. 25, 2005, authorities arrested Dennis Rader, a municipal employee and church leader, for the so-called BTK (blind, torture, kill) serial killings that terrorized Wichita, Kan. Rader was convicted and sentenced to 10 consecutive life terms.</p><p>Between 1974 and 1991, he murdered at least 10 people in Wichita, Kansas. He apparently got away with it for over a decade.</p><p>In 2004 an article was published suggesting that nobody remembered him.</p><p>Desperate for notoriety, he began to write to the police and media gloating and showboating.</p><p>In 2005 he sent a floppy disk with some bragging. When police examined the disk, they found metadata of an old word document on it which revealed the name of the Church where he worked and his surname.</p><p><a href="https://www.abajournal.com/magazine/article/how_the_cops_caught_btk">https://www.abajournal.com/magazine/article/how_the_cops_caught_btk</a></p><p> </p><p><strong>Bill Big Balls of the Week</strong></p><p>I use an email tracker to spy on people I work with. This is why</p><p><a href="https://www.independent.co.uk/life-style/email-trackers-how-to-work-b1806723.html">https://www.independent.co.uk/life-style/email-trackers-how-to-work-b1806723.html</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Apple has long held its position on iCloud backups. It has focused on usability rather than total security. If a user changes iPhone and wants all their old iMessages, the easiest way to retrieve them is by getting Apple to store and send them from the iCloud to the new device. It’s the same for other messaging apps like WhatsApp, which offers backups.</p><p>But Apple has reportedly considered making iClouds much more difficult for police to access. </p><p>A <a href="https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT">Reuters</a> report last year suggested that Apple did have plans to fully encrypt iCloud accounts too, so only users had the key, but backed down. Though the report claimed the decision was made after the FBI asked for iClouds to remain accessible, Reuters found no evidence of Apple’s motivation for ditching the plans.</p><p><a href="https://www.forbes.com/sites/thomasbrewster/2021/02/15/when-imessages-arent-private-government-raids-apple-icloud-in-a-dark-web-drug-investigation/">https://www.forbes.com/sites/thomasbrewster/2021/02/15/when-imessages-arent-private-government-raids-apple-icloud-in-a-dark-web-drug-investigation/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/internet-registry-ripe-ncc-warns/">Internet Registry RIPE NCC Warns of Credential Stuffing Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacker-breakout-time-halves-in/">Concern as Attacker “Breakout” Time Halves in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-retailer-kroger-admits/">US Retailer Kroger Admits Accellion Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/aircraftmaker-bombardier-breached/">Aircraft-Maker Bombardier Breached by Accellion FTA Hackers</a></p><p><a href="https://www.infosecurity-magazine.com/news/legal-firm-leaks-15000-cases-via/">Legal Firm Leaks 15,000 Cases Via the Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/kia-denies-ransomware-attack/">Kia Denies Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/aston-martin-partners-with/">Aston Martin Partners with SentinelOne</a></p><p><a href="https://www.infosecurity-magazine.com/news/crowdstrike-slams-microsoft-over/">CrowdStrike Slams Microsoft Over SolarWinds Hack</a></p><p><a href="https://www.infosecurity-magazine.com/news/adapting-education-close-cyber/">Educational Adaptation Required to Close the Cyber-Skills Gap</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.bankinfosecurity.com/6000-vmware-vcenter-devices-vulnerable-to-remote-attacks-a-16066">6000 vmware vcentre devices vulnerable to remote attacks</a></p><p><a href="https://www.computerweekly.com/news/252496764/Is-Clubhouse-safe-and-should-CISOs-stop-its-use">Is Clubhouse safe, and should CISOs stop its use?</a></p><p><a href="https://www.scmagazine.com/home/security-news/google-alerts-used-to-launch-fake-adobe-flash-player-updater/">Google Alerts used to launch fake Adobe Flash Player updater</a></p><p><a href="https://www.itpro.co.uk/security/hacking/358677/hackers-are-using-google-alerts-to-help-spread-malware">Hackers are using Google Alerts to help spread malware</a></p><p><a href="https://cybersecurity-excellence-awards.com/2021-cybersecurity-professional-awards-winners-and-finalists/">Javvad wins 2021 Cybersecurity Professional Awards – Winners</a></p><img src="https://lh4.googleusercontent.com/Ej_EXU7A8OX2yUsuYc8jKRaQrBaIHE3UVQJjs3XSsexJLVyo7fdJrgYWFZ_WPpITqyy_LmOtbUXBOiQbZL4C9jZDJe4vHBhiUQ_MllGvJJQ9OKaDuarsHE4Xp8tlhWxo9UCcsWYB" /><p> </p><p><strong>Tweet of the Week </strong>(not aired)</p><img src="https://lh5.googleusercontent.com/a-qTkr2-a7F2kfftMWUMsmZ8l0Om8RlPyn1SaHjm345_GSrOkiCmRTVjwIjy0l3w18hfTUUhM5zBAzmVFJKS79XGFXKn2-IGcJpm8deuVhn9Rxt3VfKQdOhoiUGVqtG3egadjKU4" /><p><a href="https://twitter.com/HackingDave/status/1364945642599182344?s=20">https://twitter.com/HackingDave/status/1364945642599182344?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>Yousef Syed and security architects</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="60634081" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/bc38e3d5-6035-45fd-acb5-43c60de1e7a8/audio/77e7ec65-00ff-45cf-8e53-51bf5e75fe81/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 44 - Fly My Pretties, Fly!</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/ee35dc6c-42d9-415f-af4a-1076352d5226/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:03:10</itunes:duration>
      <itunes:summary>Jav insults a guest contributor, Thom slams Apple, and Andy admits he has read a book.</itunes:summary>
      <itunes:subtitle>Jav insults a guest contributor, Thom slams Apple, and Andy admits he has read a book.</itunes:subtitle>
      <itunes:keywords>podcast, apple, security architecture, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c723ff5-135d-46f4-8ff3-040ef3810a12</guid>
      <title>Episode 43 - The Avengers Snitched and Assembled</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Not liberated from the “today in infosec” twitter account:</p><p>12th February 2009: </p><table><tbody><tr><td><p>2009: Microsoft announced a $250,000 reward for info resulting in the arrest and conviction of those responsible for the Conficker worm. As of 2018, Microsoft's offer was still open.</p><p><a href="https://web.archive.org/web/20120418094401/http://www.microsoft.com/en-us/news/press/2009/feb09/02-12confickerpr.aspx">https://web.archive.org/web/20120418094401/http://www.microsoft.com/en-us/news/press/2009/feb09/02-12confickerpr.aspx</a></p><p><a href="https://www.dailymail.co.uk/sciencetech/article-6058565/Microsoft-offering-hackers-250-000-bounty-remove-Conficker-malware.html">https://www.dailymail.co.uk/sciencetech/article-6058565/Microsoft-offering-hackers-250-000-bounty-remove-Conficker-malware.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1227775375565918208">https://twitter.com/todayininfosec/status/1227775375565918208</a></p></td></tr></tbody></table><p> </p><p><strong>Billy Big Balls</strong></p><p>After the failure of the Facebook Phone, get ready for a Facebook Watch</p><p><a href="https://arstechnica.com/gadgets/2021/02/after-the-failure-of-the-facebook-phone-get-ready-for-a-facebook-watch/">https://arstechnica.com/gadgets/2021/02/after-the-failure-of-the-facebook-phone-get-ready-for-a-facebook-watch/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Password manager LastPass is making its free accounts effectively useless by limiting account holders to one type of device, leaving millions of users stranded.</p><p><a href="https://www.forbes.com/sites/barrycollins/2021/02/17/lastpass-breaks-free-accounts-where-to-store-your-passwords-now/?ss=cybersecurity">https://www.forbes.com/sites/barrycollins/2021/02/17/lastpass-breaks-free-accounts-where-to-store-your-passwords-now/?ss=cybersecurity</a></p><img src="https://lh5.googleusercontent.com/DFDITH-kSfQkVBwjsuuutJYssTSXYxzsqvfCdAvgaEI7dmfnuOgqwMOvqKuq03d5m4f7wRoNWUqyff6FPdivyR7v411I9bifQE_DB7ooQBEKla5bepI66i8sg2W_dpJQMZUMCHJh" /><img src="https://lh4.googleusercontent.com/v_cCqYK0iFHr-U4FfWcTMq-nXbm1eYM3rlWG6xeyrhqFRA5GSazhYYNmuPxzXo8PqAdwykWMUxyb2ZfQHpUPOyNxTV9LfyHF4CcwbmcGw84jCXVp6BqvgD5OiFMuW6BaNJSBaYKi" /><img src="https://lh3.googleusercontent.com/7ORUySUYsAzVjjy90R94VLUJ-7Oz7J-W0iGXvBjdIPfjJ22a_Irisc5gkT1Wte0JNKX2ZMXk6xOBB9bK5fo43TZaa6FI8_luYMr70P1Mka7nQ7nnTCaOMJmBVDO75q3N1Fcwi8QY" /><img src="https://lh5.googleusercontent.com/BZvlQddTw0L7A_Pvw7Dawx7HAK1NphM1cjC2yE4ZxgG-K5xFMGS_q62ganScM3S0BnBzNfLNBlhWonluHOJidH_jj7iSJ6la3jTrBMrRdhV58hHLyN56X4kyp2kSOLfYHWzihbPs" /><img src="https://lh6.googleusercontent.com/BLvlHUb78V3GSYJ1azLF9cSuE_TNYoumfndWtx0bJtygrJib_jGBLMf6Xp11hmP_86UF-WClOhisLzPha_YqXDHjeDDjToCod8ekUQ6UW9Pe0UjXDHYMyPKsArOoZryvG864A3Nx" /><img src="https://lh5.googleusercontent.com/vcfQEwSvZw9suSfTy_tIxj9Pw_QMXP8gtxSeposdnqRa47baHgaUWQTZkKR1QKY0abysm2XcVTJgIQIMA0bptKkqLojehAINCntg2LcP_Wd-JRR3YJ8YEAc5a5ra31qlJyVoiu1t" /><p>John Deere being dicks:</p><p><a href="https://www.bloomberg.com/news/features/2020-03-05/farmers-fight-john-deere-over-who-gets-to-fix-an-800-000-tractor">https://www.bloomberg.com/news/features/2020-03-05/farmers-fight-john-deere-over-who-gets-to-fix-an-800-000-tractor</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nearly-twothirds-of-cves-are-low/">Nearly Two-Thirds of CVEs Are Low Complexity</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-egregor-ransomware/">Police Reportedly Arrest Egregor Ransomware Members</a></p><p><a href="https://www.infosecurity-magazine.com/news/yandex-insider-breach-hits-nearly/">Yandex Insider Breach Hits Nearly 5000 Inboxes</a></p><p><a href="https://www.infosecurity-magazine.com/news/duo-multimilliondollar-dark-web/">Duo Charged with Multimillion-Dollar Dark Web Drugs Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-1000-hackers-worked/">Microsoft: 1000+ Hackers Worked on SolarWinds Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/centreon-sandworm-attacks-targeted/">Centreon: Sandworm Attacks Targeted Legacy Open Source Product</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-phishing-scam-promises-covid19/">NHS Phishing Scam Promises #COVID19 Vaccine</a></p><p><a href="https://www.infosecurity-magazine.com/news/singtel-breach-hits-129000/">Singtel Breach Hits 129,000 Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-indicted-north/">Two More Lazarus Group Members Indicted for North Korean Attacks</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/vvasvJ-2m_KvTt5hLk-5PuIE97YxachwFGQoyZuIboVS-hI8zHdh9PhXpNtl6IzYofUBflUYBw2FGcxsVEosQLSDKlFlXLKFfrE8kbvxZaAWg8tSbuM0K2qjDYJQUKSc0jZZXTdi" /><p><a href="https://twitter.com/torriangray/status/1361778280521605122">https://twitter.com/torriangray/status/1361778280521605122</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 Feb 2021 13:40:33 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Mark Zuckerberg, Javvad Malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-43-the-avengers-snitched-and-assembled-5wvv0XN7</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Not liberated from the “today in infosec” twitter account:</p><p>12th February 2009: </p><table><tbody><tr><td><p>2009: Microsoft announced a $250,000 reward for info resulting in the arrest and conviction of those responsible for the Conficker worm. As of 2018, Microsoft's offer was still open.</p><p><a href="https://web.archive.org/web/20120418094401/http://www.microsoft.com/en-us/news/press/2009/feb09/02-12confickerpr.aspx">https://web.archive.org/web/20120418094401/http://www.microsoft.com/en-us/news/press/2009/feb09/02-12confickerpr.aspx</a></p><p><a href="https://www.dailymail.co.uk/sciencetech/article-6058565/Microsoft-offering-hackers-250-000-bounty-remove-Conficker-malware.html">https://www.dailymail.co.uk/sciencetech/article-6058565/Microsoft-offering-hackers-250-000-bounty-remove-Conficker-malware.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1227775375565918208">https://twitter.com/todayininfosec/status/1227775375565918208</a></p></td></tr></tbody></table><p> </p><p><strong>Billy Big Balls</strong></p><p>After the failure of the Facebook Phone, get ready for a Facebook Watch</p><p><a href="https://arstechnica.com/gadgets/2021/02/after-the-failure-of-the-facebook-phone-get-ready-for-a-facebook-watch/">https://arstechnica.com/gadgets/2021/02/after-the-failure-of-the-facebook-phone-get-ready-for-a-facebook-watch/</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Password manager LastPass is making its free accounts effectively useless by limiting account holders to one type of device, leaving millions of users stranded.</p><p><a href="https://www.forbes.com/sites/barrycollins/2021/02/17/lastpass-breaks-free-accounts-where-to-store-your-passwords-now/?ss=cybersecurity">https://www.forbes.com/sites/barrycollins/2021/02/17/lastpass-breaks-free-accounts-where-to-store-your-passwords-now/?ss=cybersecurity</a></p><img src="https://lh5.googleusercontent.com/DFDITH-kSfQkVBwjsuuutJYssTSXYxzsqvfCdAvgaEI7dmfnuOgqwMOvqKuq03d5m4f7wRoNWUqyff6FPdivyR7v411I9bifQE_DB7ooQBEKla5bepI66i8sg2W_dpJQMZUMCHJh" /><img src="https://lh4.googleusercontent.com/v_cCqYK0iFHr-U4FfWcTMq-nXbm1eYM3rlWG6xeyrhqFRA5GSazhYYNmuPxzXo8PqAdwykWMUxyb2ZfQHpUPOyNxTV9LfyHF4CcwbmcGw84jCXVp6BqvgD5OiFMuW6BaNJSBaYKi" /><img src="https://lh3.googleusercontent.com/7ORUySUYsAzVjjy90R94VLUJ-7Oz7J-W0iGXvBjdIPfjJ22a_Irisc5gkT1Wte0JNKX2ZMXk6xOBB9bK5fo43TZaa6FI8_luYMr70P1Mka7nQ7nnTCaOMJmBVDO75q3N1Fcwi8QY" /><img src="https://lh5.googleusercontent.com/BZvlQddTw0L7A_Pvw7Dawx7HAK1NphM1cjC2yE4ZxgG-K5xFMGS_q62ganScM3S0BnBzNfLNBlhWonluHOJidH_jj7iSJ6la3jTrBMrRdhV58hHLyN56X4kyp2kSOLfYHWzihbPs" /><img src="https://lh6.googleusercontent.com/BLvlHUb78V3GSYJ1azLF9cSuE_TNYoumfndWtx0bJtygrJib_jGBLMf6Xp11hmP_86UF-WClOhisLzPha_YqXDHjeDDjToCod8ekUQ6UW9Pe0UjXDHYMyPKsArOoZryvG864A3Nx" /><img src="https://lh5.googleusercontent.com/vcfQEwSvZw9suSfTy_tIxj9Pw_QMXP8gtxSeposdnqRa47baHgaUWQTZkKR1QKY0abysm2XcVTJgIQIMA0bptKkqLojehAINCntg2LcP_Wd-JRR3YJ8YEAc5a5ra31qlJyVoiu1t" /><p>John Deere being dicks:</p><p><a href="https://www.bloomberg.com/news/features/2020-03-05/farmers-fight-john-deere-over-who-gets-to-fix-an-800-000-tractor">https://www.bloomberg.com/news/features/2020-03-05/farmers-fight-john-deere-over-who-gets-to-fix-an-800-000-tractor</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nearly-twothirds-of-cves-are-low/">Nearly Two-Thirds of CVEs Are Low Complexity</a></p><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-egregor-ransomware/">Police Reportedly Arrest Egregor Ransomware Members</a></p><p><a href="https://www.infosecurity-magazine.com/news/yandex-insider-breach-hits-nearly/">Yandex Insider Breach Hits Nearly 5000 Inboxes</a></p><p><a href="https://www.infosecurity-magazine.com/news/duo-multimilliondollar-dark-web/">Duo Charged with Multimillion-Dollar Dark Web Drugs Scheme</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-1000-hackers-worked/">Microsoft: 1000+ Hackers Worked on SolarWinds Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/centreon-sandworm-attacks-targeted/">Centreon: Sandworm Attacks Targeted Legacy Open Source Product</a></p><p><a href="https://www.infosecurity-magazine.com/news/nhs-phishing-scam-promises-covid19/">NHS Phishing Scam Promises #COVID19 Vaccine</a></p><p><a href="https://www.infosecurity-magazine.com/news/singtel-breach-hits-129000/">Singtel Breach Hits 129,000 Customers</a></p><p><a href="https://www.infosecurity-magazine.com/news/lazarus-group-indicted-north/">Two More Lazarus Group Members Indicted for North Korean Attacks</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/vvasvJ-2m_KvTt5hLk-5PuIE97YxachwFGQoyZuIboVS-hI8zHdh9PhXpNtl6IzYofUBflUYBw2FGcxsVEosQLSDKlFlXLKFfrE8kbvxZaAWg8tSbuM0K2qjDYJQUKSc0jZZXTdi" /><p><a href="https://twitter.com/torriangray/status/1361778280521605122">https://twitter.com/torriangray/status/1361778280521605122</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="60538787" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ea0c6229-766b-4de7-ac81-054fa3f756df/audio/6bbcc2f3-b871-434d-a615-d7598ea5220e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 43 - The Avengers Snitched and Assembled</itunes:title>
      <itunes:author>Thom Langford, Mark Zuckerberg, Javvad Malik, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/aef38eed-f5b5-43b3-b48d-817244cfef3b/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:03:04</itunes:duration>
      <itunes:summary>The Host Unknown trio are not known for much, and certainly not for being social justice warriors. This episode might therefore surprise you as they discuss serious privacy concerns, free services and morons in Texas. 
Then again, it probably won&apos;t.</itunes:summary>
      <itunes:subtitle>The Host Unknown trio are not known for much, and certainly not for being social justice warriors. This episode might therefore surprise you as they discuss serious privacy concerns, free services and morons in Texas. 
Then again, it probably won&apos;t.</itunes:subtitle>
      <itunes:keywords>podcast, information security, satire, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b8745a6c-86c3-458c-8497-6bf141aa371e</guid>
      <title>Episode 42 - Advocates for the Masses</title>
      <description><![CDATA[<p>10 minutes before rolling, our show notes were empty. This is what you get when you are dealing with professionals.</p><p>This week in Infosec</p><p>Tweet of the Week</p><p>Billy Big Balls</p><p>Rant of the week</p><p>Industry News</p><p>Sticky Pickle of the Week</p><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>11th February: </p><table><tbody><tr><td><p>1956: 'Cambridge spies' surface in Moscow</p><p>Two British diplomats who vanished in mysterious circumstances five years ago have reappeared in the Soviet Union.</p><p>Guy Burgess and Donald Maclean handed a statement to four representatives from the press in a hotel room overlooking Moscow's Red Square.</p><p>In their 1,000-word statement the former diplomats denied ever having been Soviet agents.</p><p>They said they had come to the USSR to "work for the aim of better understanding between the Soviet Union and the West".</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/11/newsid_2721000/2721413.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/11/newsid_2721000/2721413.stm</a></p><p>Agent Garbo: <a href="https://www.mi5.gov.uk/agent-garbo">https://www.mi5.gov.uk/agent-garbo</a></p></td></tr></tbody></table><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.theguardian.com/business/2021/feb/12/kpmg-bill-michael-resigns-after-telling-staff-to-stop-moaning?utm_term=Autofeed&CMP=twt_gu&utm_medium&utm_source=Twitter#Echobox=1613120699">https://www.theguardian.com/business/2021/feb/12/kpmg-bill-michael-resigns-after-telling-staff-to-stop-moaning</a></p><p>KPMG’s UK chairman, Bill Michael, has resigned after telling staff to “stop moaning” during a virtual meeting about the coronavirus pandemic and the impact of lockdown on people’s lives.</p><p>Michael, who has headed the company since 2017, was speaking at a virtual town hall meeting on Monday with members of the firm’s financial services consulting team when he made the comments.</p><p>The 52-year old Australian, who also said that staff should stop “playing the victim card” and described the concept of unconscious bias as being “complete and utter crap for years”, apologised and said on Friday the scandal over his comments had made his position at the accounting giant “untenable”.</p><p>“I love the firm and I am truly sorry that my words have caused hurt among my colleagues and for the impact the events of this week have had on them,” Michael said. “In light of that, I regard my position as untenable and so I have decided to leave the firm. It has been a privilege to have acted as chair of KPMG. I feel hugely proud of all our people and the things they have achieved, particularly during these very challenging times.”</p><p>KPMG, which said that it will undertake a “leadership election” to replace Michael in due course, has appointed senior elected board member Bina Mehta as acting UK chair.</p><p>“Bill has made a huge contribution to our firm over the last 30 years, especially over the last three years as chairman, and we wish him all the best for the future,” said Mehta.</p><p> </p><p><strong>Rant of the Week</strong></p><p>Florida county sheriff Bob Gualtieri held a remarkably clear-headed and fact-filled news conference about an attempt to poison the water supply of Oldsmar, a town of around 15,000 not far from Tampa.</p><p>Gualtieri told the media that someone (they don’t know who yet) remotely accessed a computer for the city’s water treatment system (using Teamviewer) and briefly increased the amount of sodium hydroxide (a.k.a. lye used to control acidity in the water) to 100 times the normal level.</p><p>“The city’s water supply was not affected,” The Tampa Bay Times reported. “A supervisor working remotely saw the concentration being changed on his computer screen and immediately reverted it, Gualtieri said. City officials on Monday emphasized that several other safeguards are in place to prevent contaminated water from entering the water supply and said they’ve disabled the remote-access system used in the attack.”</p><p><a href="https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/">https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/europol-breaks-14-million-card/">Europol Breaks $14m Card Fraud Ring</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattacker-tries-remotely/">Cyber-Attacker Tries to Remotely Poison Florida City</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-of-beg-bounty/">Experts Warn of “Beg Bounty” Extortion Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-council-drive-uks-cyber/">New Council Will Drive UK’s Cyber-Training and Standards</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-sell-fake-covid19/">Scammers Selling Fake #COVID19 Vaccination Cards for Just $20</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-theft-attacks-doubled/">Credential Theft Attacks Doubled Between 2016 and 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cops-arrest-eight-us-celeb-sim/">UK Cops Arrest Eight in US Celeb SIM Swap Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/un-links-north-korea-281m-crypto/">UN Links North Korea to $281m Crypto Exchange Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/political-bias-impulsive-behavior/">Political Bias and Impulsive Behavior Open Door to Misinformation</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><tumbleweed></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/UtBXHNuunGyDYkP1i2s1n81KdwCE5W90BBuLCRq7BA9OF6TJZPDf0RNIoETSv9Ld8r-nVuxmaOY15uBmF6Yb58E3eCCeRj41pmsSiS72paivG8lL-PLXQ7tqzHnJen5NGqRKPuMV" /><p><a href="https://www.theregister.com/2021/02/11/facebook_phishing_domains/">https://www.theregister.com/2021/02/11/facebook_phishing_domains/</a></p><p><a href="https://www.zdnet.com/article/proofpoint-sues-facebook-to-get-permission-to-use-lookalike-domains-for-phishing-tests/">https://www.zdnet.com/article/proofpoint-sues-facebook-to-get-permission-to-use-lookalike-domains-for-phishing-tests/</a></p><p><a href="https://twitter.com/campuscodi/status/1359708438859776002?s=20">https://twitter.com/campuscodi/status/1359708438859776002?s=20</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>You’re the head of a trio - have been wrongfully accused of having an over-inflated ego. </p><p>And you get this amazing interview and coverage in the largest magazine in the UK.</p><p>How do you bring it up without reinforcing their image of you having a large ego, and being insecure of your greatness. </p><img src="https://lh6.googleusercontent.com/_u7y6bF4bjCZJ9ViykDpUrhakQ71MpoORnKmj-kLXejhkpsqJEhtwdObbm6E3LFLVTvCP_skOxx_yuDt0wfHwkgUO0dpAYp4jHBtxX4Bd-R8cSTvxHfnDTkW22vBqWF7y3rO9jet" /><p><a href="https://edition.pagesuite-professional.co.uk/html5/reader/production/default.aspx?pubname=&edid=f73de865-57f0-49d7-9a61-318ea24773c7">https://edition.pagesuite-professional.co.uk/html5/reader/production/default.aspx?pubname=&edid=f73de865-57f0-49d7-9a61-318ea24773c7</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Feb 2021 13:08:19 +0000</pubDate>
      <author>thom@tl2security.com (Arnold Shwarzenegger, Thom Langford, Andrew Agnes, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-42-advocates-for-the-masses-kiaiW7hm</link>
      <content:encoded><![CDATA[<p>10 minutes before rolling, our show notes were empty. This is what you get when you are dealing with professionals.</p><p>This week in Infosec</p><p>Tweet of the Week</p><p>Billy Big Balls</p><p>Rant of the week</p><p>Industry News</p><p>Sticky Pickle of the Week</p><p> </p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>11th February: </p><table><tbody><tr><td><p>1956: 'Cambridge spies' surface in Moscow</p><p>Two British diplomats who vanished in mysterious circumstances five years ago have reappeared in the Soviet Union.</p><p>Guy Burgess and Donald Maclean handed a statement to four representatives from the press in a hotel room overlooking Moscow's Red Square.</p><p>In their 1,000-word statement the former diplomats denied ever having been Soviet agents.</p><p>They said they had come to the USSR to "work for the aim of better understanding between the Soviet Union and the West".</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/11/newsid_2721000/2721413.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/11/newsid_2721000/2721413.stm</a></p><p>Agent Garbo: <a href="https://www.mi5.gov.uk/agent-garbo">https://www.mi5.gov.uk/agent-garbo</a></p></td></tr></tbody></table><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.theguardian.com/business/2021/feb/12/kpmg-bill-michael-resigns-after-telling-staff-to-stop-moaning?utm_term=Autofeed&CMP=twt_gu&utm_medium&utm_source=Twitter#Echobox=1613120699">https://www.theguardian.com/business/2021/feb/12/kpmg-bill-michael-resigns-after-telling-staff-to-stop-moaning</a></p><p>KPMG’s UK chairman, Bill Michael, has resigned after telling staff to “stop moaning” during a virtual meeting about the coronavirus pandemic and the impact of lockdown on people’s lives.</p><p>Michael, who has headed the company since 2017, was speaking at a virtual town hall meeting on Monday with members of the firm’s financial services consulting team when he made the comments.</p><p>The 52-year old Australian, who also said that staff should stop “playing the victim card” and described the concept of unconscious bias as being “complete and utter crap for years”, apologised and said on Friday the scandal over his comments had made his position at the accounting giant “untenable”.</p><p>“I love the firm and I am truly sorry that my words have caused hurt among my colleagues and for the impact the events of this week have had on them,” Michael said. “In light of that, I regard my position as untenable and so I have decided to leave the firm. It has been a privilege to have acted as chair of KPMG. I feel hugely proud of all our people and the things they have achieved, particularly during these very challenging times.”</p><p>KPMG, which said that it will undertake a “leadership election” to replace Michael in due course, has appointed senior elected board member Bina Mehta as acting UK chair.</p><p>“Bill has made a huge contribution to our firm over the last 30 years, especially over the last three years as chairman, and we wish him all the best for the future,” said Mehta.</p><p> </p><p><strong>Rant of the Week</strong></p><p>Florida county sheriff Bob Gualtieri held a remarkably clear-headed and fact-filled news conference about an attempt to poison the water supply of Oldsmar, a town of around 15,000 not far from Tampa.</p><p>Gualtieri told the media that someone (they don’t know who yet) remotely accessed a computer for the city’s water treatment system (using Teamviewer) and briefly increased the amount of sodium hydroxide (a.k.a. lye used to control acidity in the water) to 100 times the normal level.</p><p>“The city’s water supply was not affected,” The Tampa Bay Times reported. “A supervisor working remotely saw the concentration being changed on his computer screen and immediately reverted it, Gualtieri said. City officials on Monday emphasized that several other safeguards are in place to prevent contaminated water from entering the water supply and said they’ve disabled the remote-access system used in the attack.”</p><p><a href="https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/">https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/europol-breaks-14-million-card/">Europol Breaks $14m Card Fraud Ring</a></p><p><a href="https://www.infosecurity-magazine.com/news/cyberattacker-tries-remotely/">Cyber-Attacker Tries to Remotely Poison Florida City</a></p><p><a href="https://www.infosecurity-magazine.com/news/experts-warn-of-beg-bounty/">Experts Warn of “Beg Bounty” Extortion Attempts</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-council-drive-uks-cyber/">New Council Will Drive UK’s Cyber-Training and Standards</a></p><p><a href="https://www.infosecurity-magazine.com/news/scammers-sell-fake-covid19/">Scammers Selling Fake #COVID19 Vaccination Cards for Just $20</a></p><p><a href="https://www.infosecurity-magazine.com/news/credential-theft-attacks-doubled/">Credential Theft Attacks Doubled Between 2016 and 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-cops-arrest-eight-us-celeb-sim/">UK Cops Arrest Eight in US Celeb SIM Swap Case</a></p><p><a href="https://www.infosecurity-magazine.com/news/un-links-north-korea-281m-crypto/">UN Links North Korea to $281m Crypto Exchange Heist</a></p><p><a href="https://www.infosecurity-magazine.com/news/political-bias-impulsive-behavior/">Political Bias and Impulsive Behavior Open Door to Misinformation</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><tumbleweed></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/UtBXHNuunGyDYkP1i2s1n81KdwCE5W90BBuLCRq7BA9OF6TJZPDf0RNIoETSv9Ld8r-nVuxmaOY15uBmF6Yb58E3eCCeRj41pmsSiS72paivG8lL-PLXQ7tqzHnJen5NGqRKPuMV" /><p><a href="https://www.theregister.com/2021/02/11/facebook_phishing_domains/">https://www.theregister.com/2021/02/11/facebook_phishing_domains/</a></p><p><a href="https://www.zdnet.com/article/proofpoint-sues-facebook-to-get-permission-to-use-lookalike-domains-for-phishing-tests/">https://www.zdnet.com/article/proofpoint-sues-facebook-to-get-permission-to-use-lookalike-domains-for-phishing-tests/</a></p><p><a href="https://twitter.com/campuscodi/status/1359708438859776002?s=20">https://twitter.com/campuscodi/status/1359708438859776002?s=20</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>You’re the head of a trio - have been wrongfully accused of having an over-inflated ego. </p><p>And you get this amazing interview and coverage in the largest magazine in the UK.</p><p>How do you bring it up without reinforcing their image of you having a large ego, and being insecure of your greatness. </p><img src="https://lh6.googleusercontent.com/_u7y6bF4bjCZJ9ViykDpUrhakQ71MpoORnKmj-kLXejhkpsqJEhtwdObbm6E3LFLVTvCP_skOxx_yuDt0wfHwkgUO0dpAYp4jHBtxX4Bd-R8cSTvxHfnDTkW22vBqWF7y3rO9jet" /><p><a href="https://edition.pagesuite-professional.co.uk/html5/reader/production/default.aspx?pubname=&edid=f73de865-57f0-49d7-9a61-318ea24773c7">https://edition.pagesuite-professional.co.uk/html5/reader/production/default.aspx?pubname=&edid=f73de865-57f0-49d7-9a61-318ea24773c7</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="60134620" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/7ce58a29-1573-4eb7-a715-75c836bebc8b/audio/002dfb20-da85-4b7d-ac57-ead690c3c1cd/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 42 - Advocates for the Masses</itunes:title>
      <itunes:author>Arnold Shwarzenegger, Thom Langford, Andrew Agnes, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a3668184-de9d-446a-8cac-11fc7f1e3029/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:38</itunes:duration>
      <itunes:summary>All new video format! 
*video not available on your audio only podcast.

Social warriors and justice for all campaigners Host Unknown open the show displaying how woke they are. Right on!</itunes:summary>
      <itunes:subtitle>All new video format! 
*video not available on your audio only podcast.

Social warriors and justice for all campaigners Host Unknown open the show displaying how woke they are. Right on!</itunes:subtitle>
      <itunes:keywords>woke, podcast, lit, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1aa40f4e-1e85-46f2-bf14-7b00121d71ad</guid>
      <title>Episode 41 - Mixing It Up</title>
      <description><![CDATA[<p>Nobody will look at Javvad in the eye again without seeing that image. It could be worse, you could have seen it live like Andy and Thom had to.</p><p><strong>This week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>3rd February 2007: A former Coca-Cola secretary to a executive was convicted after stealing documents and unlaunched product samples, then conspiring with coworkers to sell them to Pepsi, which warned Coca-Cola.</p><p><a href="https://www.thestar.com/business/2007/02/03/former_coke_secretary_convicted_in_spy_case.html">https://www.thestar.com/business/2007/02/03/former_coke_secretary_convicted_in_spy_case.html</a></p><p><a href="https://edition.cnn.com/2007/LAW/05/23/coca.cola.sentencing/">https://edition.cnn.com/2007/LAW/05/23/coca.cola.sentencing/</a></p><p><a href="https://twitter.com/todayininfosec/status/1224522561653919744">https://twitter.com/todayininfosec/status/1224522561653919744</a></p><p>1st February 1952:</p><p>A new method for tracking down users of unlicensed television sets was unveiled in the UK.</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/1/newsid_2521000/2521357.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/1/newsid_2521000/2521357.stm</a></p><p>5th February 1953: Sweet rationing ends in Britain</p><p>Children all over Britain have been emptying out their piggy-banks and heading straight for the nearest sweet-shop as the first unrationed sweets went on sale today.</p><p>Toffee apples were the biggest sellers, with sticks of nougat and liquorice strips also disappearing fast.</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/5/newsid_2737000/2737731.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/5/newsid_2737000/2737731.stm</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>The Biggest Threat to Facebook Isn’t Apple, It’s Mark Zuckerberg</p><p>During <a href="https://www.washingtonpost.com/technology/2021/01/27/zuckerberg-facebook-apple-anti-competitive/">Facebook's earnings call</a>, the company's founder and CEO, Mark Zuckerberg, made a point of talking about the risk <a href="https://www.inc.com/jason-aten/why-facebook-is-very-worried-about-apples-ios-14.html">Apple's upcoming iOS 14 changes </a>pose to Facebook's business. Those changes will <a href="https://www.inc.com/jason-aten/apple-is-delaying-a-major-change-to-ios-14-what-it-means-for-your-privacy.html">require apps to ask permission</a> before they are able to track users across apps and the internet. </p><p>For <a href="https://www.inc.com/jason-aten/facebook-apple-battle-over-privacy-existential-threat.html">Facebook</a>, a company whose entire business model is built on the ability to track users, collect their data, and then sell targeted ads based on all of that information, losing the ability to track users could be a real problem. The thing is, Apple isn't stopping any app from tracking any user. It's only <a href="https://www.inc.com/jason-aten/tim-cooks-response-to-facebook-is-best-example-of-emotional-intelligence-ive-ever-seen.html">requiring that apps ask permission</a> first. </p><p>The real problem is that now everyone will be given a choice about whether to let Facebook track them, and the company logically assumes that most people will opt out. </p><p>Suddenly people will be confronted with the reality that Facebook isn't free at all--it's just that most people weren't aware of the cost.</p><p><a href="https://www.inc.com/jason-aten/mark-zuckerberg-is-worried-apples-privacy-changes-could-be-end-of-facebook.html">https://www.inc.com/jason-aten/mark-zuckerberg-is-worried-apples-privacy-changes-could-be-end-of-facebook.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/LatVlUlCn7BJh3vHRU2_t3pNQmXWe9wAUSgVHqrm_dJXRNp8n56ktUZSVimEmuHg2G0VWyLjzZMU4wFVPRyKgZsPx6qoi1CPmrhqqW3Yk9in-8v-RB4JTNJE1ghcaXmijSwnVI2h" /><p><a href="https://twitter.com/TatianaDior/status/1357178566413287426">https://twitter.com/TatianaDior/status/1357178566413287426</a></p><p>Almost ran: <a href="https://twitter.com/fs0c131y/status/1356291273255227392?s=20">https://twitter.com/fs0c131y/status/1356291273255227392?s=20</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/apprenticeships-solution-cyber/">Apprenticeships Could Solve Cyber-Skills Crisis, Say Experts</a></p><p><a href="https://www.infosecurity-magazine.com/news/global-government-outsourcer-serco/">Global Government Outsourcer Serco Hit by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/trickbot-trojan-back-from-the-dead/">Trickbot Trojan Back from the Dead in New Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-charged-11m-crypto-steven/">Man Charged in $11m Crypto Scheme that Featured Steven Seagal</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-expose-80-oversharing/">Social Media Oversharing Exposes 80% of Office Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-of-foxtons-customers/">Data on Thousands of Foxtons Customers Posted Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-three-million-us-drivers/">Over Three Million US Drivers Exposed in Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-shipping-loses-75-million/">US Shipping Giant Loses $7.5m in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-more-vulnerabilities/">Three More Vulnerabilities Found in SolarWinds Products</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.computerweekly.com/news/252495799/Foxtons-rejects-claims-of-slow-reaction-to-data-leak">Foxtons rejects claims of slow reaction to data</a> leak</p><p><a href="https://www.teiss.co.uk/sms-bandits-operator-arrested/">SMS Bandits owner arrested for carrying out large-scale phishing</a> scams</p><p><a href="https://www.teiss.co.uk/ukri-suffers-ransomware-attack/">Ransomware attack disrupts UKRI services and web assets</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Ransomware: A company paid millions to get their data back, but forgot to do one thing.</p><p>A cautionary tale shows how organisations that fall foul of ransomware should concentrate on finding how it happened before anything else </p><p>A company that fell victim to a ransomware attack and paid cyber criminals millions for the decryption key to restore their network fell victim to the exact same ransomware gang under two weeks later after failing to examine why the attack was able to happen in the first place.</p><p><a href="https://www.zdnet.com/article/ransomware-this-is-the-first-thing-you-should-think-about-if-you-fall-victim-to-an-attack/">https://www.zdnet.com/article/ransomware-this-is-the-first-thing-you-should-think-about-if-you-fall-victim-to-an-attack/</a></p><p> </p><p><strong>The Little People</strong></p><p>Want to star in The Little People? Have an opinion you want to share, but don't have the social media clout to be heard?  Send us a 30-60 second voice recording and we might even play it on the show. theveryfinechaps@hostunknown.tv</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 Feb 2021 12:26:16 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Javvad Malik, James Dyson, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-41-mixing-it-up-ZmkfoWtN</link>
      <content:encoded><![CDATA[<p>Nobody will look at Javvad in the eye again without seeing that image. It could be worse, you could have seen it live like Andy and Thom had to.</p><p><strong>This week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>3rd February 2007: A former Coca-Cola secretary to a executive was convicted after stealing documents and unlaunched product samples, then conspiring with coworkers to sell them to Pepsi, which warned Coca-Cola.</p><p><a href="https://www.thestar.com/business/2007/02/03/former_coke_secretary_convicted_in_spy_case.html">https://www.thestar.com/business/2007/02/03/former_coke_secretary_convicted_in_spy_case.html</a></p><p><a href="https://edition.cnn.com/2007/LAW/05/23/coca.cola.sentencing/">https://edition.cnn.com/2007/LAW/05/23/coca.cola.sentencing/</a></p><p><a href="https://twitter.com/todayininfosec/status/1224522561653919744">https://twitter.com/todayininfosec/status/1224522561653919744</a></p><p>1st February 1952:</p><p>A new method for tracking down users of unlicensed television sets was unveiled in the UK.</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/1/newsid_2521000/2521357.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/1/newsid_2521000/2521357.stm</a></p><p>5th February 1953: Sweet rationing ends in Britain</p><p>Children all over Britain have been emptying out their piggy-banks and heading straight for the nearest sweet-shop as the first unrationed sweets went on sale today.</p><p>Toffee apples were the biggest sellers, with sticks of nougat and liquorice strips also disappearing fast.</p><p><a href="http://news.bbc.co.uk/onthisday/hi/dates/stories/february/5/newsid_2737000/2737731.stm">http://news.bbc.co.uk/onthisday/hi/dates/stories/february/5/newsid_2737000/2737731.stm</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>The Biggest Threat to Facebook Isn’t Apple, It’s Mark Zuckerberg</p><p>During <a href="https://www.washingtonpost.com/technology/2021/01/27/zuckerberg-facebook-apple-anti-competitive/">Facebook's earnings call</a>, the company's founder and CEO, Mark Zuckerberg, made a point of talking about the risk <a href="https://www.inc.com/jason-aten/why-facebook-is-very-worried-about-apples-ios-14.html">Apple's upcoming iOS 14 changes </a>pose to Facebook's business. Those changes will <a href="https://www.inc.com/jason-aten/apple-is-delaying-a-major-change-to-ios-14-what-it-means-for-your-privacy.html">require apps to ask permission</a> before they are able to track users across apps and the internet. </p><p>For <a href="https://www.inc.com/jason-aten/facebook-apple-battle-over-privacy-existential-threat.html">Facebook</a>, a company whose entire business model is built on the ability to track users, collect their data, and then sell targeted ads based on all of that information, losing the ability to track users could be a real problem. The thing is, Apple isn't stopping any app from tracking any user. It's only <a href="https://www.inc.com/jason-aten/tim-cooks-response-to-facebook-is-best-example-of-emotional-intelligence-ive-ever-seen.html">requiring that apps ask permission</a> first. </p><p>The real problem is that now everyone will be given a choice about whether to let Facebook track them, and the company logically assumes that most people will opt out. </p><p>Suddenly people will be confronted with the reality that Facebook isn't free at all--it's just that most people weren't aware of the cost.</p><p><a href="https://www.inc.com/jason-aten/mark-zuckerberg-is-worried-apples-privacy-changes-could-be-end-of-facebook.html">https://www.inc.com/jason-aten/mark-zuckerberg-is-worried-apples-privacy-changes-could-be-end-of-facebook.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/LatVlUlCn7BJh3vHRU2_t3pNQmXWe9wAUSgVHqrm_dJXRNp8n56ktUZSVimEmuHg2G0VWyLjzZMU4wFVPRyKgZsPx6qoi1CPmrhqqW3Yk9in-8v-RB4JTNJE1ghcaXmijSwnVI2h" /><p><a href="https://twitter.com/TatianaDior/status/1357178566413287426">https://twitter.com/TatianaDior/status/1357178566413287426</a></p><p>Almost ran: <a href="https://twitter.com/fs0c131y/status/1356291273255227392?s=20">https://twitter.com/fs0c131y/status/1356291273255227392?s=20</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/apprenticeships-solution-cyber/">Apprenticeships Could Solve Cyber-Skills Crisis, Say Experts</a></p><p><a href="https://www.infosecurity-magazine.com/news/global-government-outsourcer-serco/">Global Government Outsourcer Serco Hit by Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/trickbot-trojan-back-from-the-dead/">Trickbot Trojan Back from the Dead in New Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/man-charged-11m-crypto-steven/">Man Charged in $11m Crypto Scheme that Featured Steven Seagal</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-expose-80-oversharing/">Social Media Oversharing Exposes 80% of Office Workers</a></p><p><a href="https://www.infosecurity-magazine.com/news/thousands-of-foxtons-customers/">Data on Thousands of Foxtons Customers Posted Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-three-million-us-drivers/">Over Three Million US Drivers Exposed in Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-shipping-loses-75-million/">US Shipping Giant Loses $7.5m in Ransomware Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/three-more-vulnerabilities/">Three More Vulnerabilities Found in SolarWinds Products</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.computerweekly.com/news/252495799/Foxtons-rejects-claims-of-slow-reaction-to-data-leak">Foxtons rejects claims of slow reaction to data</a> leak</p><p><a href="https://www.teiss.co.uk/sms-bandits-operator-arrested/">SMS Bandits owner arrested for carrying out large-scale phishing</a> scams</p><p><a href="https://www.teiss.co.uk/ukri-suffers-ransomware-attack/">Ransomware attack disrupts UKRI services and web assets</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Ransomware: A company paid millions to get their data back, but forgot to do one thing.</p><p>A cautionary tale shows how organisations that fall foul of ransomware should concentrate on finding how it happened before anything else </p><p>A company that fell victim to a ransomware attack and paid cyber criminals millions for the decryption key to restore their network fell victim to the exact same ransomware gang under two weeks later after failing to examine why the attack was able to happen in the first place.</p><p><a href="https://www.zdnet.com/article/ransomware-this-is-the-first-thing-you-should-think-about-if-you-fall-victim-to-an-attack/">https://www.zdnet.com/article/ransomware-this-is-the-first-thing-you-should-think-about-if-you-fall-victim-to-an-attack/</a></p><p> </p><p><strong>The Little People</strong></p><p>Want to star in The Little People? Have an opinion you want to share, but don't have the social media clout to be heard?  Send us a 30-60 second voice recording and we might even play it on the show. theveryfinechaps@hostunknown.tv</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58993592" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/5cf9c945-aecf-43fa-95e9-b83682476127/audio/bcc4b48c-43fb-4723-bf51-f37bb810148f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 41 - Mixing It Up</itunes:title>
      <itunes:author>Andrew Agnes, Javvad Malik, James Dyson, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7dffe1e8-937f-42f0-9321-1e0cb67c46ef/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:27</itunes:duration>
      <itunes:summary>Javvad tells all in a podcast exclusive. Mind bleach is available from all good shops.

This week in InfoSec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?
Will we have a Sticky Pickle of the Week? </itunes:summary>
      <itunes:subtitle>Javvad tells all in a podcast exclusive. Mind bleach is available from all good shops.

This week in InfoSec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?
Will we have a Sticky Pickle of the Week? </itunes:subtitle>
      <itunes:keywords>podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce87a1c6-a7eb-4391-8359-367ed5fe6f07</guid>
      <title>Episode 40 - Mathematics Isn&apos;t Our Strong Point</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>19th January 2012: US federal authorities shut down /Megaupload.com, a popular hub for illegal media downloads, and arrested its leaders. Hours later, the hacktivist collective Anonymous, knocked the US Department of Justice website offline.</p><p><a href="https://en.wikipedia.org/wiki/Seizure_of_Megaupload">https://en.wikipedia.org/wiki/Seizure_of_Megaupload</a></p><p><a href="https://twitter.com/todayininfosec/status/1219086142428999681?s=20">https://twitter.com/todayininfosec/status/1219086142428999681?s=20</a></p><p>25th January 2003: The SQL Slammer worm was first observed. Slammer spread to the vast majority of all vulnerable hosts worldwide in 10 minutes. Yes, 10 minutes.</p><p>Though Microsoft released MS02-039 to patch the buffer overflow vuln in SQL Server six months earlier, many orgs hadn't patched.</p><p><a href="https://www.wired.com/2003/07/slammer/">https://www.wired.com/2003/07/slammer/</a></p><p><a href="https://twitter.com/todayininfosec/status/1221132001501007873?s=20">https://twitter.com/todayininfosec/status/1221132001501007873?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/UTlGYdxlUMiu-dNJfPmlbdguwoQguNsVg5guFF_0ooxiltVMYGIVcGEDQDGgt2Dl0ZRfnrM1CmHSoARq7WC35cepzxnWz6I44KTYo0bVz2yJKCVHShuIUJOl2HxiJQqKxjmuBVa_" /><p><a href="https://www.mirror.co.uk/tv/tv-news/bbc-wales-today-viewers-gobsmacked-23391438">https://www.mirror.co.uk/tv/tv-news/bbc-wales-today-viewers-gobsmacked-23391438</a></p><p><a href="https://twitter.com/Lovehoney/status/1354378061635063809?s=20">https://twitter.com/Lovehoney/status/1354378061635063809?s=20</a></p><p><a href="https://twitter.com/BCredibility/status/1354514912299593729/photo/1">https://twitter.com/BCredibility/status/1354514912299593729/photo/1</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/government-laptops-additional/">More Malware May Be Lurking on Govt School Laptops</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-government-agency-warns/">Russian Government Agency Warns Firms of US Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigured-cloud-server-exposes/">Misconfigured Cloud Server Exposes 66,000 Gamers</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-bug-gave-access-contacts/">TikTok Bug Gave Access to Contacts’ Profile Details</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-spies-called-on-to-help-in/">UK Spies Called on to Help in Fraud Fight</a></p><p><a href="https://www.infosecurity-magazine.com/news/manufacturing-giant-suffers-major/">Manufacturing Giant Suffers Major Cyber-Disruption</a></p><p><a href="https://www.infosecurity-magazine.com/news/more-security-vendors-admit-to/">More Security Vendors Admit to SolarWinds Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/consumers-falling-for-100m-clone/">Consumers Falling for $100m Clone Firm Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-brexit-britain/">Remote Workers Could Offer Brexit Britain Cybersecurity Lifeline</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.itpro.co.uk/security/phishing/358457/fears-over-cyber-crime-tool-that-can-build-phishing-pages-in-real-time">Fears over cyber crime tool that can build phishing pages in real-time</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/cautious-law-enforcement-requests/">Should We Be Cautious About Law Enforcement Requests for Digital Data</a>?</p><p><a href="https://threatpost.com/nefilim-ransomware-ghost-account/163341/">Nefilim Ransomware Gang Hits Jackpot with Ghost Accoun</a>t</p><p><a href="https://www.teiss.co.uk/department-of-education-laptops-malware/">Laptops handed out by Department of Education found laced with malwar</a>e</p><p> </p><p><strong>Billy Big Balls</strong></p><p>The greatest pyramid scheme of 2021 so far...</p><p><a href="https://imgur.com/a/DCCpuZA">https://imgur.com/a/DCCpuZA</a></p><p><a href="https://www.bbc.co.uk/news/newsbeat-55841719">https://www.bbc.co.uk/news/newsbeat-55841719</a></p><p><a href="https://twitter.com/swardley/status/1354482558147448835?s=20">https://twitter.com/swardley/status/1354482558147448835?s=20</a></p><p>Thom: Financial industry wrecks entire economy</p><p>Jav: "we must bail them out"</p><p>Thom: Senators do insider trading</p><p>Andy: "nothing we can do"</p><p>Thom: Covid shuts everything down</p><p>Jav: "bail out big company stocks with $4 trillion"</p><p>Thom: Random people do a stonk on reddit</p><p>Andy: "halt trading & bail out hedge funds they bankrupted"</p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>In October 2020, Kanye West bought Kim Kardashian West <a href="https://www.independent.co.uk/life-style/kanye-west-kim-kardashian-hologram-father-birthday-robert-b1441993.html">a hologram of her late father</a>, Robert Kardashian, to celebrate her 40th birthday, bringing to the wealthy the idea of digital representations of the dead that can more authentically communicate with the living.</p><p>The hologram spoke for around three minutes, directly addressing Kardashian and her decision to become a lawyer “and carry on my legacy”.</p><p>Imagine you had a bank balance like Jav, and you wanted to do something for your loved ones when you’ve departed this life, how on earth do you get started with a trusted company to preserve your legacy?  </p><p>What would you do in this situation?</p><p>This is what someone else is doing...</p><p>Microsoft has been granted a patent that would allow the company to make a chatbot using the personal information of deceased people.  </p><p>The patent describes creating a bot based on the “images, voice data, social media posts, electronic messages”, and more personal information.</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/microsoft-chatbot-patent-dead-b1789979.html">https://www.independent.co.uk/life-style/gadgets-and-tech/microsoft-chatbot-patent-dead-b1789979.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 Jan 2021 18:15:06 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andre Agnes, Yvette Amos, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-40-mathematics-isnt-our-strong-point-Nv6YItm3</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>19th January 2012: US federal authorities shut down /Megaupload.com, a popular hub for illegal media downloads, and arrested its leaders. Hours later, the hacktivist collective Anonymous, knocked the US Department of Justice website offline.</p><p><a href="https://en.wikipedia.org/wiki/Seizure_of_Megaupload">https://en.wikipedia.org/wiki/Seizure_of_Megaupload</a></p><p><a href="https://twitter.com/todayininfosec/status/1219086142428999681?s=20">https://twitter.com/todayininfosec/status/1219086142428999681?s=20</a></p><p>25th January 2003: The SQL Slammer worm was first observed. Slammer spread to the vast majority of all vulnerable hosts worldwide in 10 minutes. Yes, 10 minutes.</p><p>Though Microsoft released MS02-039 to patch the buffer overflow vuln in SQL Server six months earlier, many orgs hadn't patched.</p><p><a href="https://www.wired.com/2003/07/slammer/">https://www.wired.com/2003/07/slammer/</a></p><p><a href="https://twitter.com/todayininfosec/status/1221132001501007873?s=20">https://twitter.com/todayininfosec/status/1221132001501007873?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/UTlGYdxlUMiu-dNJfPmlbdguwoQguNsVg5guFF_0ooxiltVMYGIVcGEDQDGgt2Dl0ZRfnrM1CmHSoARq7WC35cepzxnWz6I44KTYo0bVz2yJKCVHShuIUJOl2HxiJQqKxjmuBVa_" /><p><a href="https://www.mirror.co.uk/tv/tv-news/bbc-wales-today-viewers-gobsmacked-23391438">https://www.mirror.co.uk/tv/tv-news/bbc-wales-today-viewers-gobsmacked-23391438</a></p><p><a href="https://twitter.com/Lovehoney/status/1354378061635063809?s=20">https://twitter.com/Lovehoney/status/1354378061635063809?s=20</a></p><p><a href="https://twitter.com/BCredibility/status/1354514912299593729/photo/1">https://twitter.com/BCredibility/status/1354514912299593729/photo/1</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/government-laptops-additional/">More Malware May Be Lurking on Govt School Laptops</a></p><p><a href="https://www.infosecurity-magazine.com/news/russian-government-agency-warns/">Russian Government Agency Warns Firms of US Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/misconfigured-cloud-server-exposes/">Misconfigured Cloud Server Exposes 66,000 Gamers</a></p><p><a href="https://www.infosecurity-magazine.com/news/tiktok-bug-gave-access-contacts/">TikTok Bug Gave Access to Contacts’ Profile Details</a></p><p><a href="https://www.infosecurity-magazine.com/news/uk-spies-called-on-to-help-in/">UK Spies Called on to Help in Fraud Fight</a></p><p><a href="https://www.infosecurity-magazine.com/news/manufacturing-giant-suffers-major/">Manufacturing Giant Suffers Major Cyber-Disruption</a></p><p><a href="https://www.infosecurity-magazine.com/news/more-security-vendors-admit-to/">More Security Vendors Admit to SolarWinds Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/consumers-falling-for-100m-clone/">Consumers Falling for $100m Clone Firm Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-brexit-britain/">Remote Workers Could Offer Brexit Britain Cybersecurity Lifeline</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.itpro.co.uk/security/phishing/358457/fears-over-cyber-crime-tool-that-can-build-phishing-pages-in-real-time">Fears over cyber crime tool that can build phishing pages in real-time</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/cautious-law-enforcement-requests/">Should We Be Cautious About Law Enforcement Requests for Digital Data</a>?</p><p><a href="https://threatpost.com/nefilim-ransomware-ghost-account/163341/">Nefilim Ransomware Gang Hits Jackpot with Ghost Accoun</a>t</p><p><a href="https://www.teiss.co.uk/department-of-education-laptops-malware/">Laptops handed out by Department of Education found laced with malwar</a>e</p><p> </p><p><strong>Billy Big Balls</strong></p><p>The greatest pyramid scheme of 2021 so far...</p><p><a href="https://imgur.com/a/DCCpuZA">https://imgur.com/a/DCCpuZA</a></p><p><a href="https://www.bbc.co.uk/news/newsbeat-55841719">https://www.bbc.co.uk/news/newsbeat-55841719</a></p><p><a href="https://twitter.com/swardley/status/1354482558147448835?s=20">https://twitter.com/swardley/status/1354482558147448835?s=20</a></p><p>Thom: Financial industry wrecks entire economy</p><p>Jav: "we must bail them out"</p><p>Thom: Senators do insider trading</p><p>Andy: "nothing we can do"</p><p>Thom: Covid shuts everything down</p><p>Jav: "bail out big company stocks with $4 trillion"</p><p>Thom: Random people do a stonk on reddit</p><p>Andy: "halt trading & bail out hedge funds they bankrupted"</p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p>In October 2020, Kanye West bought Kim Kardashian West <a href="https://www.independent.co.uk/life-style/kanye-west-kim-kardashian-hologram-father-birthday-robert-b1441993.html">a hologram of her late father</a>, Robert Kardashian, to celebrate her 40th birthday, bringing to the wealthy the idea of digital representations of the dead that can more authentically communicate with the living.</p><p>The hologram spoke for around three minutes, directly addressing Kardashian and her decision to become a lawyer “and carry on my legacy”.</p><p>Imagine you had a bank balance like Jav, and you wanted to do something for your loved ones when you’ve departed this life, how on earth do you get started with a trusted company to preserve your legacy?  </p><p>What would you do in this situation?</p><p>This is what someone else is doing...</p><p>Microsoft has been granted a patent that would allow the company to make a chatbot using the personal information of deceased people.  </p><p>The patent describes creating a bot based on the “images, voice data, social media posts, electronic messages”, and more personal information.</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/microsoft-chatbot-patent-dead-b1789979.html">https://www.independent.co.uk/life-style/gadgets-and-tech/microsoft-chatbot-patent-dead-b1789979.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53619890" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f7977a0c-30a1-4e25-9a72-1b9244eabeec/audio/0dc93860-adc1-41a8-963b-03b0324b2847/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 40 - Mathematics Isn&apos;t Our Strong Point</itunes:title>
      <itunes:author>Thom Langford, Andre Agnes, Yvette Amos, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/86f6b79d-26c3-44c5-b423-42230f592dc7/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:51</itunes:duration>
      <itunes:summary>We can&apos;t believe you are still with us after all this time; at least we still provide a fully packed show every week for you...

This week in Infosec
Tweet of the Week
Billy Big Balls
Industry News
Host Unknown&apos;s Security Sticky Pickle of the Week™  
</itunes:summary>
      <itunes:subtitle>We can&apos;t believe you are still with us after all this time; at least we still provide a fully packed show every week for you...

This week in Infosec
Tweet of the Week
Billy Big Balls
Industry News
Host Unknown&apos;s Security Sticky Pickle of the Week™  
</itunes:subtitle>
      <itunes:keywords>20&quot; dong, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">205792c2-5d7f-46b7-87bc-938bdebfd31f</guid>
      <title>Episode 39 - A New Hope</title>
      <description><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>19th January 1986: The first PC virus appeared. It was a boot sector virus called Brain, which spread via infected floppy disks to computers running MS-DOS. It was written by 2 brothers in Pakistan to protect their medical software from piracy. They later even licensed Brain.</p><img src="https://lh4.googleusercontent.com/zNQpWOsWvhsvTJs8Ip_mKLkYmQ789iT0B8CbdaGixq4grEXpGiCSraJPt2WQxLg_9xQdDfRlpVSaMsew3eCX07RJtB3YGtpQiWOJnOCF5x8tYGdEh_iBlIsOTeN5JpufcOpPlcwr" /><p><a href="https://www.theregister.com/2006/01/19/pc_virus_at_20/">https://www.theregister.com/2006/01/19/pc_virus_at_20/</a></p><p><a href="https://twitter.com/todayininfosec/status/1351695480791715840">https://twitter.com/todayininfosec/status/1351695480791715840</a></p><p>Worth mentioning <a href="mailto:mikko.hypponen@f-secure.com">Mikko Hyponnen</a> ‘s TED talk on when he went to Pakistan to meet the brothers <a href="https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net">https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net</a></p><p>18th January 2011: Andrew Auernheimer and Daniel Spitler were arrested by FBI agents for hacking into AT&T's servers and downloading customer info in 2010. There's a lot more to the story - either you know it or you should research it.</p><p><a href="https://www.darkreading.com/risk-management/two-arrested-for-atandt-ipad-network-breach/d/d-id/1095520">https://www.darkreading.com/risk-management/two-arrested-for-atandt-ipad-network-breach/d/d-id/1095520</a></p><p><a href="https://twitter.com/todayininfosec/status/1351277900834742274">https://twitter.com/todayininfosec/status/1351277900834742274</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Google threatens to pull out of Australia</p><p><a href="https://www.bbc.co.uk/news/world-australia-55760673">https://www.bbc.co.uk/news/world-australia-55760673</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/NQacuTdiPW2DwSLzKhfedyVIgkCmi0f6LN_UPm4JMfuT9PJ_8WkQbuoBnob5_iytyUKtAqFnfbOhagrf8HQ3yPiLGLoKNFViAjXRDQH6rmeEHITtjfK3XRR7MqK25dkh5BaDJCbi" /><p><a href="https://twitter.com/DanRaywood/status/1351555439612354562">https://twitter.com/DanRaywood/status/1351555439612354562</a></p><img src="https://lh3.googleusercontent.com/cYWvgAS8s2nDt31vw4THNvOxLnrH0BpH-7dOFGEuZpGbPVVrzPjaOgPK54WlblpN6DS-00e7V3yDxfDYb13H99du7rqn3_ZdsFxsBc0hUkhvNMEi7hbBm-LhMUuN3jK7EIcRwzRm" /><p>Defining what disinformation is, the role it played in the attack on the Capitol, social media as a vessel to deliver messages, etc.</p><p><a href="https://www.washingtonpost.com/lifestyle/magazine/disinformation-can-be-a-very-lucrative-business-especially-if-youre-good-at-it-media-scholar-says/2021/01/19/4c842f06-4a04-11eb-a9d9-1e3ec4a928b9_story.html">https://www.washingtonpost.com/lifestyle/magazine/disinformation-can-be-a-very-lucrative-business-especially-if-youre-good-at-it-media-scholar-says/2021/01/19/4c842f06-4a04-11eb-a9d9-1e3ec4a928b9_story.html</a>  </p><p><a href="https://twitter.com/washingtonpost/status/1351985551419863040">https://twitter.com/washingtonpost/status/1351985551419863040</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-dns-over-https-provides-false/">NSA: DNS over HTTPS Provides “False Sense of Security”</a></p><p><a href="https://www.infosecurity-magazine.com/news/leaked-covid19-vaccine-data/">Leaked #COVID19 Vaccine Data “Manipulated” to Mislead Public</a></p><p><a href="https://www.infosecurity-magazine.com/news/environmental-regulator-suffers/">Environmental Regulator Suffers Ransomware Blow</a></p><p><a href="https://www.infosecurity-magazine.com/news/gdpr-fines-surge-39-over-past-year/">GDPR Fines Surge 39% Over Past Year Despite #COVID19</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-config-error-exposes-xrated/">Cloud Config Error Exposes X-Rated College Pics</a></p><p><a href="https://www.infosecurity-magazine.com/news/coinmining-malware-volumes-soar-53/">Coin-Mining Malware Volumes Soar 53% in Q4 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/malwarebytes-solarwinds-hackers/">Malwarebytes: SolarWinds Hackers Read Our Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-dating-app-victims-lured/">Interpol: Dating App Victims Lured into Investment Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-dumps-19-million/">Threat Actor Dumps 1.9 Million Pixlr Records Online</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p>Nada. Nothing. Niet. Non. </p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Aditya Singh: Man found 'living in airport for three months' over Covid fears</p><p>A man too afraid to fly due to the pandemic lived undetected in a secure area of Chicago's international airport for three months, US prosecutors say.</p><p>Aditya Singh, 36, was arrested on Saturday after airline staff asked him to produce his identification.</p><p>He pointed to a badge, but it allegedly belonged to an operations manager who reported it missing in October.</p><p>Police say Mr Singh arrived on a flight from Los Angeles to O'Hare International Airport on 19 October.</p><p><a href="https://www.bbc.co.uk/news/world-us-canada-55702003">https://www.bbc.co.uk/news/world-us-canada-55702003</a></p><p> </p><p>Thom's Podcasting Desk</p><img src="https://lh4.googleusercontent.com/ovAhWmbQjNWqrTHC3X3eXt3GODtXqNivIL7Hpp3-eEizyWqhd7ePs78w-ESRJQkNaXT6FZIK7W-IBFECn5Cz1IvUvWHJU9Jz-NCItJSUXEL5Rpdg7sjlG79IJniaWj0-HJ51lE5w" /><p> </p><p><strong>Other Stories</strong></p><p>Go read this report about the US military endangering passenger jets by blocking GPS</p><p>GPS jamming can shut off a pilot’s access to navigation — or worse</p><p><a href="https://www.theverge.com/2021/1/21/22242761/us-military-gps-jamming-tests-airplane-danger">https://www.theverge.com/2021/1/21/22242761/us-military-gps-jamming-tests-airplane-danger</a></p><p> </p><p>Ubiquiti, maker of prosumer routers and access points, has had a data breach</p><p>The email encourages users to change their passwords</p><p><a href="https://www.theverge.com/2021/1/11/22226061/ubiquiti-data-breach-email-third-party-unathorized-access">https://www.theverge.com/2021/1/11/22226061/ubiquiti-data-breach-email-third-party-unathorized-access</a></p><p> </p><p>In hidden message on White House website, Biden calls for coders</p><p><a href="https://www.reuters.com/article/usa-biden-digital-service/in-hidden-message-on-white-house-website-biden-calls-for-coders-idINKBN29Q08Q">https://www.reuters.com/article/usa-biden-digital-service/in-hidden-message-on-white-house-website-biden-calls-for-coders-idINKBN29Q08Q</a></p><p> </p><p>Bugs in Signal, other video chat apps allowed attackers to listen in on users</p><p><a href="https://www.helpnetsecurity.com/2021/01/21/bugs-video-chat-apps/">https://www.helpnetsecurity.com/2021/01/21/bugs-video-chat-apps/</a></p><p> </p><img src="https://lh6.googleusercontent.com/6waVj-nqLcGNUVzUid2anjLgijOU1BjDERb6bnsEoYnroenYFq03EdyYy3nvh0GLv87Nd7gxYM1tsEXWFyU9ggtIkV0A40uZbPOv1uWyh5bK3Z-JXyeOtKsrXsiQeExPHOUymHrE" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 22 Jan 2021 18:00:36 +0000</pubDate>
      <author>thom@tl2security.com (Tim Apple, Thom Langford, Andrew Agnes, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-39-a-new-hope-zgo8Kh0T</link>
      <content:encoded><![CDATA[<p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>19th January 1986: The first PC virus appeared. It was a boot sector virus called Brain, which spread via infected floppy disks to computers running MS-DOS. It was written by 2 brothers in Pakistan to protect their medical software from piracy. They later even licensed Brain.</p><img src="https://lh4.googleusercontent.com/zNQpWOsWvhsvTJs8Ip_mKLkYmQ789iT0B8CbdaGixq4grEXpGiCSraJPt2WQxLg_9xQdDfRlpVSaMsew3eCX07RJtB3YGtpQiWOJnOCF5x8tYGdEh_iBlIsOTeN5JpufcOpPlcwr" /><p><a href="https://www.theregister.com/2006/01/19/pc_virus_at_20/">https://www.theregister.com/2006/01/19/pc_virus_at_20/</a></p><p><a href="https://twitter.com/todayininfosec/status/1351695480791715840">https://twitter.com/todayininfosec/status/1351695480791715840</a></p><p>Worth mentioning <a href="mailto:mikko.hypponen@f-secure.com">Mikko Hyponnen</a> ‘s TED talk on when he went to Pakistan to meet the brothers <a href="https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net">https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net</a></p><p>18th January 2011: Andrew Auernheimer and Daniel Spitler were arrested by FBI agents for hacking into AT&T's servers and downloading customer info in 2010. There's a lot more to the story - either you know it or you should research it.</p><p><a href="https://www.darkreading.com/risk-management/two-arrested-for-atandt-ipad-network-breach/d/d-id/1095520">https://www.darkreading.com/risk-management/two-arrested-for-atandt-ipad-network-breach/d/d-id/1095520</a></p><p><a href="https://twitter.com/todayininfosec/status/1351277900834742274">https://twitter.com/todayininfosec/status/1351277900834742274</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Google threatens to pull out of Australia</p><p><a href="https://www.bbc.co.uk/news/world-australia-55760673">https://www.bbc.co.uk/news/world-australia-55760673</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh4.googleusercontent.com/NQacuTdiPW2DwSLzKhfedyVIgkCmi0f6LN_UPm4JMfuT9PJ_8WkQbuoBnob5_iytyUKtAqFnfbOhagrf8HQ3yPiLGLoKNFViAjXRDQH6rmeEHITtjfK3XRR7MqK25dkh5BaDJCbi" /><p><a href="https://twitter.com/DanRaywood/status/1351555439612354562">https://twitter.com/DanRaywood/status/1351555439612354562</a></p><img src="https://lh3.googleusercontent.com/cYWvgAS8s2nDt31vw4THNvOxLnrH0BpH-7dOFGEuZpGbPVVrzPjaOgPK54WlblpN6DS-00e7V3yDxfDYb13H99du7rqn3_ZdsFxsBc0hUkhvNMEi7hbBm-LhMUuN3jK7EIcRwzRm" /><p>Defining what disinformation is, the role it played in the attack on the Capitol, social media as a vessel to deliver messages, etc.</p><p><a href="https://www.washingtonpost.com/lifestyle/magazine/disinformation-can-be-a-very-lucrative-business-especially-if-youre-good-at-it-media-scholar-says/2021/01/19/4c842f06-4a04-11eb-a9d9-1e3ec4a928b9_story.html">https://www.washingtonpost.com/lifestyle/magazine/disinformation-can-be-a-very-lucrative-business-especially-if-youre-good-at-it-media-scholar-says/2021/01/19/4c842f06-4a04-11eb-a9d9-1e3ec4a928b9_story.html</a>  </p><p><a href="https://twitter.com/washingtonpost/status/1351985551419863040">https://twitter.com/washingtonpost/status/1351985551419863040</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nsa-dns-over-https-provides-false/">NSA: DNS over HTTPS Provides “False Sense of Security”</a></p><p><a href="https://www.infosecurity-magazine.com/news/leaked-covid19-vaccine-data/">Leaked #COVID19 Vaccine Data “Manipulated” to Mislead Public</a></p><p><a href="https://www.infosecurity-magazine.com/news/environmental-regulator-suffers/">Environmental Regulator Suffers Ransomware Blow</a></p><p><a href="https://www.infosecurity-magazine.com/news/gdpr-fines-surge-39-over-past-year/">GDPR Fines Surge 39% Over Past Year Despite #COVID19</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-config-error-exposes-xrated/">Cloud Config Error Exposes X-Rated College Pics</a></p><p><a href="https://www.infosecurity-magazine.com/news/coinmining-malware-volumes-soar-53/">Coin-Mining Malware Volumes Soar 53% in Q4 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/malwarebytes-solarwinds-hackers/">Malwarebytes: SolarWinds Hackers Read Our Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/interpol-dating-app-victims-lured/">Interpol: Dating App Victims Lured into Investment Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-dumps-19-million/">Threat Actor Dumps 1.9 Million Pixlr Records Online</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p>Nada. Nothing. Niet. Non. </p><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>Aditya Singh: Man found 'living in airport for three months' over Covid fears</p><p>A man too afraid to fly due to the pandemic lived undetected in a secure area of Chicago's international airport for three months, US prosecutors say.</p><p>Aditya Singh, 36, was arrested on Saturday after airline staff asked him to produce his identification.</p><p>He pointed to a badge, but it allegedly belonged to an operations manager who reported it missing in October.</p><p>Police say Mr Singh arrived on a flight from Los Angeles to O'Hare International Airport on 19 October.</p><p><a href="https://www.bbc.co.uk/news/world-us-canada-55702003">https://www.bbc.co.uk/news/world-us-canada-55702003</a></p><p> </p><p>Thom's Podcasting Desk</p><img src="https://lh4.googleusercontent.com/ovAhWmbQjNWqrTHC3X3eXt3GODtXqNivIL7Hpp3-eEizyWqhd7ePs78w-ESRJQkNaXT6FZIK7W-IBFECn5Cz1IvUvWHJU9Jz-NCItJSUXEL5Rpdg7sjlG79IJniaWj0-HJ51lE5w" /><p> </p><p><strong>Other Stories</strong></p><p>Go read this report about the US military endangering passenger jets by blocking GPS</p><p>GPS jamming can shut off a pilot’s access to navigation — or worse</p><p><a href="https://www.theverge.com/2021/1/21/22242761/us-military-gps-jamming-tests-airplane-danger">https://www.theverge.com/2021/1/21/22242761/us-military-gps-jamming-tests-airplane-danger</a></p><p> </p><p>Ubiquiti, maker of prosumer routers and access points, has had a data breach</p><p>The email encourages users to change their passwords</p><p><a href="https://www.theverge.com/2021/1/11/22226061/ubiquiti-data-breach-email-third-party-unathorized-access">https://www.theverge.com/2021/1/11/22226061/ubiquiti-data-breach-email-third-party-unathorized-access</a></p><p> </p><p>In hidden message on White House website, Biden calls for coders</p><p><a href="https://www.reuters.com/article/usa-biden-digital-service/in-hidden-message-on-white-house-website-biden-calls-for-coders-idINKBN29Q08Q">https://www.reuters.com/article/usa-biden-digital-service/in-hidden-message-on-white-house-website-biden-calls-for-coders-idINKBN29Q08Q</a></p><p> </p><p>Bugs in Signal, other video chat apps allowed attackers to listen in on users</p><p><a href="https://www.helpnetsecurity.com/2021/01/21/bugs-video-chat-apps/">https://www.helpnetsecurity.com/2021/01/21/bugs-video-chat-apps/</a></p><p> </p><img src="https://lh6.googleusercontent.com/6waVj-nqLcGNUVzUid2anjLgijOU1BjDERb6bnsEoYnroenYFq03EdyYy3nvh0GLv87Nd7gxYM1tsEXWFyU9ggtIkV0A40uZbPOv1uWyh5bK3Z-JXyeOtKsrXsiQeExPHOUymHrE" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58993592" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/72a41b47-1e49-49e4-9ad9-568456c757c3/audio/ac02dc9b-6320-4818-a17f-9dfada4b2692/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 39 - A New Hope</itunes:title>
      <itunes:author>Tim Apple, Thom Langford, Andrew Agnes, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/df2bc1a4-5608-45fd-9635-432762ad7bbd/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:27</itunes:duration>
      <itunes:summary>Andy decides to record the entire episode with his head in a bucket, despite being on his third microphone since this time last year.

All your usual fun and game, minus The Little People.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News</itunes:summary>
      <itunes:subtitle>Andy decides to record the entire episode with his head in a bucket, despite being on his third microphone since this time last year.

All your usual fun and game, minus The Little People.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News</itunes:subtitle>
      <itunes:keywords>world wildlife fund, tax evasion, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">573a4540-f582-4701-8844-b2c9e60b719d</guid>
      <title>Episode 38 - Oh No He&apos;s Back</title>
      <description><![CDATA[<p>The boys are back in town. Jav's return has also reduced the average age of this podcast by roughly twenty years. The good news though is that we not only have a full program, but also new jingles too!</p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>16th January 2007: Jeffrey Goodin became the first person convicted under the US CAN-SPAM Act. He sent emails pretending to be AOL's billing department. He could have faced...wait for it...wait for it...101 years in prison! Instead, he was sentenced to 70 months. </p><p><a href="https://www.nytimes.com/2007/01/17/technology/17spam.html">https://www.nytimes.com/2007/01/17/technology/17spam.html</a></p><p><a href="https://www.lawdonut.co.uk/business/marketing-and-selling/marketing-and-advertising/your-email-marketing-and-anti-spam-law">https://www.lawdonut.co.uk/business/marketing-and-selling/marketing-and-advertising/your-email-marketing-and-anti-spam-law</a></p><p><a href="https://twitter.com/todayininfosec/status/1217962482909626368">https://twitter.com/todayininfosec/status/1217962482909626368</a></p><p>12th January 1984: The first issue of 2600 was mailed to several dozen people. At the time, it was a 3 page monthly newsletter. 2600: The Hacker Quarterly is still published today.</p><p><a href="https://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly">https://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly</a></p><p><a href="https://twitter.com/todayininfosec/status/1216431003721293825?s=20">https://twitter.com/todayininfosec/status/1216431003721293825?s=20</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Tech companies have grown a pair of balls in Trump’s last days in office.  Host Unknown remembers.</p><p>Twitter, Facebook, Snapchat, Shopify are just some of the companies finally taking a stand. </p><p>AirBnB have cancelled reservations in DC during the week of Biden’s inauguration</p><p><a href="https://www.independent.co.uk/voices/trump-ban-facebook-twitter-parler-first-amendment-b1785631.html">https://www.independent.co.uk/voices/trump-ban-facebook-twitter-parler-first-amendment-b1785631.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>WhatsApp clarifies it’s not giving all your data to Facebook after surge in Signal and Telegram users</p><p>The company is trying to contain fallout over a privacy policy update</p><img src="https://lh5.googleusercontent.com/gJFLtqShNVMOZmr1gSvlS_ICbvpvu3yaR4xtxXDl-GvmRMiuAhpF3d2RMrhwG9ivca49hPAOptKs82xcCZ4JAAkstVfhoz5OvQ87LGhbKdOmSJ2VRZ9Gvu3ZPZjlqENxA0uPyhIw" /><p>“We want to be clear that the policy update does not affect the privacy of your messages with friends or family in any way. Instead, this update includes changes related to messaging a business on WhatsApp, which is optional, and provides further transparency about how we collect and use data,” the company writes on the new FAQ page.</p><p><a href="https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification">https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification</a></p><p><a href="https://twitter.com/nickstatt/status/1349029486734565380">https://twitter.com/nickstatt/status/1349029486734565380</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ceo-refutes-involvement-solarwinds/">CEO Refutes Reports of Involvement in SolarWinds Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/ryuk-ransomware-attackers-have/">Ryuk Ransomware Attackers Have Made $150m</a></p><p>Jav: <a href="https://www.infosecurity-magazine.com/news/emotet-tops-malware-charts/">Emotet Tops Malware Charts in December After Reboot</a></p><p><a href="https://www.infosecurity-magazine.com/news/high-court-rules-against/">High Court Rules Against Government Bulk Hacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/100000-un-employee-records/">Over 100,000 UN Employee Records Accessed by Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-state-department-cyber-bureau/">US Announces Controversial State Department Cyber-Bureau</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-startup-leaks-social/">Chinese Startup Leaks Social Profiles of 214 Million Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-malware-strain-discovered/">New Malware Implant Discovered as Part of SolarWinds Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-zealands-central-bank-probes/">New Zealand Central Bank Breach Hit Other Companies</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-187m-monthly-web-app/">Healthcare Hit by 187 Million Monthly Web App Attacks in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-windows-defender/">Microsoft Fixes Windows Defender Zero-Day Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/mimecast-cert-compromised-target/">Mimecast Cert Abused to Target Inboxes in “Sophisticated” Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-regulator-covid19-vaccine/">European Regulator: #COVID19 Vaccine Data Leaked Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-warns-of-cloud-attacks-poor/">CISA Warns of Cloud Attacks Exploiting Poor Cyber-Hygiene</a></p><p><a href="https://www.infosecurity-magazine.com/news/ring-rollsout-endtoend-encryption/">Ring Rolls-Out End-to-End Encryption to Bolster Privacy</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.govinfosecurity.com/vulnerable-database-exposed-un-employees-data-a-15744">Vulnerable Database Exposed UN Employees' Data</a></p><p><a href="https://www.verdict.co.uk/national-cyber-force-uk-safer/">Will the National Cyber Force make the UK safer? Industry responds</a></p><p><a href="https://www.itpro.co.uk/security/data-breaches/358284/united-nations-reveals-potential-data-breach">United Nations suffers potential data breach</a></p><p><a href="https://www.securityinfowatch.com/security-executives/article/21204841/best-practices-for-building-a-security-culture-program">Best practices for building a security culture program</a></p><p><a href="https://www.infosecurity-magazine.com/blogs/five-key-cybersecurity-themes-2020">Five Key Cybersecurity Themes from 2020</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Dark Market taken offline</p><p>DarkMarket, the world's largest illegal marketplace on the dark web, has been taken offline in an international operation involving Germany, Australia, Denmark, Moldova, Ukraine, the United Kingdom (the National Crime Agency), and the USA (DEA, FBI, and IRS). Europol supported the takedown with specialist operational analysis and coordinated the cross-gender collaborative effort of the Host Unknown countries involved.</p><p>DarkMarket in figures:</p><ul><li>almost 500 000 users;</li><li>more than 2 400 sellers; </li><li>over 320 000 transactions;</li><li>more than 4 650 bitcoin and 12 800 monero transferred. </li></ul><p>At the current rate, this corresponds to a sum of more than €140 million. The vendors on the marketplace mainly traded all kinds of drugs and sold counterfeit money, stolen or counterfeit credit card details, anonymous SIM cards and malware.</p><p><a href="https://gizmodo.com/the-internets-biggest-darknet-just-got-taken-down-1846044148">https://gizmodo.com/the-internets-biggest-darknet-just-got-taken-down-1846044148</a></p><p><a href="https://www.europol.europa.eu/newsroom/news/darkmarket-worlds-largest-illegal-dark-web-marketplace-taken-down">https://www.europol.europa.eu/newsroom/news/darkmarket-worlds-largest-illegal-dark-web-marketplace-taken-down</a></p><img src="https://lh5.googleusercontent.com/36651YwOq5-kDw0dJlC5Rd6otc0SyBqAxzvbvmZF6X5eX3p-mHWYJfDLmpwLbIG51Z5gZR-X_vxBjDGqVfWmiXT3K2RAuo8xrKYY21pQHcX5WLi0PqVykLvzy-hjfig65GvVAqUb" /><p> </p><p><strong>Will we have a Little people today?</strong></p><p>No</p><p> </p><p><strong>Sticky Pickle of the week</strong></p><p>Imagine the year is 2009 and you’re sitting at home eating your lunch over your laptop as you always do and you spill your drink.</p><p>Laptop stops working due to the spillage, you salvage the parts you can and over time you forget about them and they get thrown out with the household rubbish.</p><p>Thinking nothing of it, you hear that this particular thing you threw out is now worth money.  Over time, you watch it’s value increase phenomenally.  You attempt to follow the trail and realise that what you threw out is sitting in the council landfill site.</p><p>There are no guarantees that you’ll find it but you know in your heart it’s in there and if you can rummage through the landfill, you are sure you can find it.</p><p>What would you do in this situation?</p><p><a href="https://www.bbc.co.uk/news/uk-wales-55658942">https://www.bbc.co.uk/news/uk-wales-55658942</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 15 Jan 2021 15:03:22 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-38-oh-no-hes-back-dKMMK2zw</link>
      <content:encoded><![CDATA[<p>The boys are back in town. Jav's return has also reduced the average age of this podcast by roughly twenty years. The good news though is that we not only have a full program, but also new jingles too!</p><p><strong>This week in Infosec</strong></p><p>Liberated from the “today in infosec” twitter account:</p><p>16th January 2007: Jeffrey Goodin became the first person convicted under the US CAN-SPAM Act. He sent emails pretending to be AOL's billing department. He could have faced...wait for it...wait for it...101 years in prison! Instead, he was sentenced to 70 months. </p><p><a href="https://www.nytimes.com/2007/01/17/technology/17spam.html">https://www.nytimes.com/2007/01/17/technology/17spam.html</a></p><p><a href="https://www.lawdonut.co.uk/business/marketing-and-selling/marketing-and-advertising/your-email-marketing-and-anti-spam-law">https://www.lawdonut.co.uk/business/marketing-and-selling/marketing-and-advertising/your-email-marketing-and-anti-spam-law</a></p><p><a href="https://twitter.com/todayininfosec/status/1217962482909626368">https://twitter.com/todayininfosec/status/1217962482909626368</a></p><p>12th January 1984: The first issue of 2600 was mailed to several dozen people. At the time, it was a 3 page monthly newsletter. 2600: The Hacker Quarterly is still published today.</p><p><a href="https://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly">https://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly</a></p><p><a href="https://twitter.com/todayininfosec/status/1216431003721293825?s=20">https://twitter.com/todayininfosec/status/1216431003721293825?s=20</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Tech companies have grown a pair of balls in Trump’s last days in office.  Host Unknown remembers.</p><p>Twitter, Facebook, Snapchat, Shopify are just some of the companies finally taking a stand. </p><p>AirBnB have cancelled reservations in DC during the week of Biden’s inauguration</p><p><a href="https://www.independent.co.uk/voices/trump-ban-facebook-twitter-parler-first-amendment-b1785631.html">https://www.independent.co.uk/voices/trump-ban-facebook-twitter-parler-first-amendment-b1785631.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>WhatsApp clarifies it’s not giving all your data to Facebook after surge in Signal and Telegram users</p><p>The company is trying to contain fallout over a privacy policy update</p><img src="https://lh5.googleusercontent.com/gJFLtqShNVMOZmr1gSvlS_ICbvpvu3yaR4xtxXDl-GvmRMiuAhpF3d2RMrhwG9ivca49hPAOptKs82xcCZ4JAAkstVfhoz5OvQ87LGhbKdOmSJ2VRZ9Gvu3ZPZjlqENxA0uPyhIw" /><p>“We want to be clear that the policy update does not affect the privacy of your messages with friends or family in any way. Instead, this update includes changes related to messaging a business on WhatsApp, which is optional, and provides further transparency about how we collect and use data,” the company writes on the new FAQ page.</p><p><a href="https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification">https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification</a></p><p><a href="https://twitter.com/nickstatt/status/1349029486734565380">https://twitter.com/nickstatt/status/1349029486734565380</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ceo-refutes-involvement-solarwinds/">CEO Refutes Reports of Involvement in SolarWinds Campaign</a></p><p><a href="https://www.infosecurity-magazine.com/news/ryuk-ransomware-attackers-have/">Ryuk Ransomware Attackers Have Made $150m</a></p><p>Jav: <a href="https://www.infosecurity-magazine.com/news/emotet-tops-malware-charts/">Emotet Tops Malware Charts in December After Reboot</a></p><p><a href="https://www.infosecurity-magazine.com/news/high-court-rules-against/">High Court Rules Against Government Bulk Hacking</a></p><p><a href="https://www.infosecurity-magazine.com/news/100000-un-employee-records/">Over 100,000 UN Employee Records Accessed by Researchers</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-state-department-cyber-bureau/">US Announces Controversial State Department Cyber-Bureau</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-startup-leaks-social/">Chinese Startup Leaks Social Profiles of 214 Million Users</a></p><p><a href="https://www.infosecurity-magazine.com/news/third-malware-strain-discovered/">New Malware Implant Discovered as Part of SolarWinds Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/new-zealands-central-bank-probes/">New Zealand Central Bank Breach Hit Other Companies</a></p><p><a href="https://www.infosecurity-magazine.com/news/healthcare-187m-monthly-web-app/">Healthcare Hit by 187 Million Monthly Web App Attacks in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-windows-defender/">Microsoft Fixes Windows Defender Zero-Day Bug</a></p><p><a href="https://www.infosecurity-magazine.com/news/mimecast-cert-compromised-target/">Mimecast Cert Abused to Target Inboxes in “Sophisticated” Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/european-regulator-covid19-vaccine/">European Regulator: #COVID19 Vaccine Data Leaked Online</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-warns-of-cloud-attacks-poor/">CISA Warns of Cloud Attacks Exploiting Poor Cyber-Hygiene</a></p><p><a href="https://www.infosecurity-magazine.com/news/ring-rollsout-endtoend-encryption/">Ring Rolls-Out End-to-End Encryption to Bolster Privacy</a></p><p> </p><p><strong>Javvad’s Weekly Stories</strong></p><p><a href="https://www.govinfosecurity.com/vulnerable-database-exposed-un-employees-data-a-15744">Vulnerable Database Exposed UN Employees' Data</a></p><p><a href="https://www.verdict.co.uk/national-cyber-force-uk-safer/">Will the National Cyber Force make the UK safer? Industry responds</a></p><p><a href="https://www.itpro.co.uk/security/data-breaches/358284/united-nations-reveals-potential-data-breach">United Nations suffers potential data breach</a></p><p><a href="https://www.securityinfowatch.com/security-executives/article/21204841/best-practices-for-building-a-security-culture-program">Best practices for building a security culture program</a></p><p><a href="https://www.infosecurity-magazine.com/blogs/five-key-cybersecurity-themes-2020">Five Key Cybersecurity Themes from 2020</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Dark Market taken offline</p><p>DarkMarket, the world's largest illegal marketplace on the dark web, has been taken offline in an international operation involving Germany, Australia, Denmark, Moldova, Ukraine, the United Kingdom (the National Crime Agency), and the USA (DEA, FBI, and IRS). Europol supported the takedown with specialist operational analysis and coordinated the cross-gender collaborative effort of the Host Unknown countries involved.</p><p>DarkMarket in figures:</p><ul><li>almost 500 000 users;</li><li>more than 2 400 sellers; </li><li>over 320 000 transactions;</li><li>more than 4 650 bitcoin and 12 800 monero transferred. </li></ul><p>At the current rate, this corresponds to a sum of more than €140 million. The vendors on the marketplace mainly traded all kinds of drugs and sold counterfeit money, stolen or counterfeit credit card details, anonymous SIM cards and malware.</p><p><a href="https://gizmodo.com/the-internets-biggest-darknet-just-got-taken-down-1846044148">https://gizmodo.com/the-internets-biggest-darknet-just-got-taken-down-1846044148</a></p><p><a href="https://www.europol.europa.eu/newsroom/news/darkmarket-worlds-largest-illegal-dark-web-marketplace-taken-down">https://www.europol.europa.eu/newsroom/news/darkmarket-worlds-largest-illegal-dark-web-marketplace-taken-down</a></p><img src="https://lh5.googleusercontent.com/36651YwOq5-kDw0dJlC5Rd6otc0SyBqAxzvbvmZF6X5eX3p-mHWYJfDLmpwLbIG51Z5gZR-X_vxBjDGqVfWmiXT3K2RAuo8xrKYY21pQHcX5WLi0PqVykLvzy-hjfig65GvVAqUb" /><p> </p><p><strong>Will we have a Little people today?</strong></p><p>No</p><p> </p><p><strong>Sticky Pickle of the week</strong></p><p>Imagine the year is 2009 and you’re sitting at home eating your lunch over your laptop as you always do and you spill your drink.</p><p>Laptop stops working due to the spillage, you salvage the parts you can and over time you forget about them and they get thrown out with the household rubbish.</p><p>Thinking nothing of it, you hear that this particular thing you threw out is now worth money.  Over time, you watch it’s value increase phenomenally.  You attempt to follow the trail and realise that what you threw out is sitting in the council landfill site.</p><p>There are no guarantees that you’ll find it but you know in your heart it’s in there and if you can rummage through the landfill, you are sure you can find it.</p><p>What would you do in this situation?</p><p><a href="https://www.bbc.co.uk/news/uk-wales-55658942">https://www.bbc.co.uk/news/uk-wales-55658942</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="61276067" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/21b327f4-517d-4a53-bd74-242f830ceb35/audio/1454b8a7-f30c-4260-8f58-2d0d2d52f24e/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 38 - Oh No He&apos;s Back</itunes:title>
      <itunes:author>Andrew Agnes, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6730e304-4ba6-4a5a-a69d-76a3c57e41e3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:03:50</itunes:duration>
      <itunes:summary>Jav is back. We were disappointed too. 

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?



</itunes:summary>
      <itunes:subtitle>Jav is back. We were disappointed too. 

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?



</itunes:subtitle>
      <itunes:keywords>jav&apos;s bad impersonations, the raj, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">48ff7523-2e08-4766-896f-935e0a468e6d</guid>
      <title>Episode 37 - Merry New Year!</title>
      <description><![CDATA[<p>Welcome back to the New year and the new look Host Unknown, with a slightly less ethnically diverse lineup than usual, but, but still the same average quality and distinctly suspect ethics you have come to expect from Host Unknown. </p><p>This week Thom displays his love of the Animaniacs, Andy has audio issues and Graham has the voice of a midnight hour radio show host.</p><p> </p><p><strong>Smutty or Security?</strong></p><p>Graham wins by a nose and a euphemism.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” twitter accoun):</p><p>6th January 1982: The final draft of the script for the movie WarGames was printed. Due to the Cold War and relative ignorance about remotely accessible computers, the film released in 1983 scared the hell out of politicians, the military, and adults. And inspired a generation of hackers!</p><p><a href="https://twitter.com/todayininfosec/status/1214381338028953600">https://twitter.com/todayininfosec/status/1214381338028953600</a>  </p><p>8th January 1986: "The Hacker Manifesto" was written by Loyd Blankenship (aka The Mentor) and originally titled "The Conscience of a Hacker".  8 months later it was published in issue 7 of the hacker zine Phrack.</p><p><a href="http://phrack.org/issues/7/3.html#article">http://phrack.org/issues/7/3.html#article</a></p><p><a href="https://twitter.com/todayininfosec/status/1215026869600313344">https://twitter.com/todayininfosec/status/1215026869600313344</a></p><p>9th January 2001: Macromedia, the maker of the Flash media player, claimed that Flash was secure because it was "a constrained environment by design". </p><p><a href="https://web.archive.org/web/20010123231000/http://www.zdnet.com/zdnn/stories/news/0,4586,2672473,00.html">https://web.archive.org/web/20010123231000/http://www.zdnet.com/zdnn/stories/news/0,4586,2672473,00.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1215067971963375616">https://twitter.com/todayininfosec/status/1215067971963375616</a></p><p>End of the road for Flash</p><p><a href="https://twitter.com/gcluley/status/1344822920946872320">https://twitter.com/gcluley/status/1344822920946872320</a></p><p><a href="https://www.bbc.co.uk/news/technology-55497353">https://www.bbc.co.uk/news/technology-55497353</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/technology-55573149">https://www.bbc.co.uk/news/technology-55573149</a></p><p><a href="https://threatpost.com/facebooks-mandatory-data-sharing-whatsapp-ire/162828/">https://threatpost.com/facebooks-mandatory-data-sharing-whatsapp-ire/162828/</a></p><p>WhatsApp is forcing users to agree to sharing information with Facebook if they want to keep using the service.</p><p>The update is designed to “offer integrations across the Facebook Company Products”, which also includes Instagram and Messenger.</p><p>Some of the data that WhatsApp collects includes:</p><ul><li>User phone numbers</li><li>Other people’s phone numbers stored in address books</li><li>Profile names</li><li>Profile pictures and</li><li>Status message including when a user was last online</li><li>Diagnostic data collected from app logs</li></ul><p>The company warns users in a pop-up notice that they "need to accept these updates to continue using WhatsApp" - or delete their accounts.</p><p>"Opt in, or fuck off by 8th Feb."</p><p>But…. some good news!</p><img src="https://lh3.googleusercontent.com/Q3SYRlC-VBMX98ty2eez6Ki8BTOZneQTguREyyAgkwrMDvF4cUtEpsU2jpd4AaCqPHzTs4SFiyr73thl_IDH6rjjXvVRSnf5GsHkpEMwff6525s3qVx56WjLNXCkK_JtTyIV2uOR" /><p>And the UK is still considered part of the “European region”, even if we’re not in the EU.  Yes, we are still Europeans in 2021!</p><p>However,<a href="https://www.whatsapp.com/legal/updates/privacy-policy?eea=0#privacy-policy-updates-how-we-work-with-other-facebook-companies"> the new version of the privacy policy for European users</a> explicitly says that data can be shared with other Facebook companies to show personalised advertising and offers, make suggestions for content, and "help" to complete purchases, among other reasons.</p><p>What’s telling to me...</p><p>In 2018, the founders of WhatsApp quit FB over disagreements about privacy and encryption.  Walking away from $850 million...</p><p><a href="https://www.theguardian.com/technology/2018/apr/30/jan-koum-whatsapp-co-founder-quits-facebook">https://www.theguardian.com/technology/2018/apr/30/jan-koum-whatsapp-co-founder-quits-facebook</a></p><p><a href="https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/">https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/</a></p><p>If they can walk away from $850 million, surely WhatsApp users can switch to Signal.</p><p>Alternatives:</p><ul><li>Signal</li><li>Wickr</li></ul><img src="https://lh3.googleusercontent.com/tWK-fdlAvQrHP9N9AnPXsz_e0x7GxkgAs0FDfaH0yYZa0fb5Uk5871uX80mgravjMKVTnLesNZAi3g6KeYV_TkAXSojp_xsamMsg3Bvke3JHKj5qaI3cdYEZD-kT1zkBbGsYk5mW" /><p> </p><p><strong>Billy Big Balls</strong></p><p>Elon Musk has become the wealthiest person on the planet, surpassing Amazon CEO Jeff Bezos, thanks to the continued rise in Tesla’s stock price. Musk is now worth around $188 billion, according to Bloomberg’s Billionaires Index.</p><p>“How strange,” Musk <a href="https://twitter.com/elonmusk/status/1347204459147902978?s=21">tweeted</a> Thursday. “Well, back to work ...”</p><p>Musk eclipsing Bezos’ own extravagant personal wealth of around $187 billion marks the latest development in a years-long rivalry between the two tech magnates.</p><p><a href="https://www.theverge.com/2021/1/7/22163361/elon-musk-billionaire-richest-world-jeff-bezos-tesla-stock-spacex">https://www.theverge.com/2021/1/7/22163361/elon-musk-billionaire-richest-world-jeff-bezos-tesla-stock-spacex</a></p><p>Encrypted messaging app Signal says it’s seeing a swell of new users signing up for the platform, so much so that the company is seeing delays in phone number verifications of new accounts across multiple cell providers.</p><p>As for what or who is responsible for so many new users interested in trying the platform, which is operated by the nonprofit Signal Foundation, there are two likely culprits: Tesla CEO Elon Musk and Signal competitor WhatsApp.</p><p><a href="https://www.theverge.com/2021/1/7/22218989/signal-new-signups-whatsapp-facebook-privacy-controversy-elon-musk">https://www.theverge.com/2021/1/7/22218989/signal-new-signups-whatsapp-facebook-privacy-controversy-elon-musk</a></p><img src="https://lh3.googleusercontent.com/M752YtQZS7bSOk3ufGq3VqIRfOtliKdIzRcJSQuKWILRYBUBaEIKXHn3nducGmuQf1wUguuxjXPVNZFe7BAAoVGTWSVWKVEG54QkjSziwfM4mbzVVJqfPOPdG7Sfr9pt5q_-n-JM" /><img src="https://lh6.googleusercontent.com/5J-cTfeext4fhgZvW0xvCbBghxy4qhlfG-oUv70Gxm5aRxGJ1zzfGEuVeXRHSaO03-5IIVbFSR6mlSMbbJsVrgosXNRRk97sw4YI1DV_pjiD8LQfS9DCxB9dgenmX3fOObpWCDzn" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nyse-delist-chinese-telcos/">NYSE to Delist Chinese Telcos on National Security Grounds</a></p><p><a href="https://www.infosecurity-magazine.com/news/one-million-compromised-accounts/">One Million Compromised Accounts Found at Top Gaming Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-solarwinds-attackers/">Microsoft: SolarWinds Attackers Viewed Our Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/nyse-uturn-means-chinese-telcos/">NYSE U-Turn Means Chinese Telcos Escape Delisting</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-group-linked-to/">Chinese APT Group Linked to Ransomware Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-drives-45-increase/">Ransomware Surge Drives 45% Increase in Healthcare Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-fewer-10-government-agencies/">US: Fewer Than 10 Govt Agencies Hit by SolarWinds Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-public-sector-victims-refuse/">Most Public Sector Victims Refuse to Pay Ransomware Gangs</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-user-numbers-spiked-covid/">Dark Web User Numbers Spiked During #COVID19 Lockdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-third-tmt-firms-hit-security/">Over a Third of TMT Firms Hit by Security Breach in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-neuters-trumps/">Social Media Neuters Trump’s Accounts After Fans Storm Capitol</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-solarwinds-attackers-thousands/">DoJ: SolarWinds Attackers Hit Thousands of O365 Inboxes</a></p><p> </p><p><strong>Tweet)s) of the Week</strong></p><p>Graham from the Smashing Security podcast: </p><p><a href="https://twitter.com/modesty_blaise0">@modesty_blaise0</a>: </p><p>Due to travel restrictions, the USA had to organize a coup at home this year.</p><p><a href="https://twitter.com/modesty_blaise0/status/1346965502703198208">https://twitter.com/modesty_blaise0/status/1346965502703198208</a></p><p>Andy: </p><p><a href="https://twitter.com/ChatGotNext">@ChatGotNext</a></p><p>You can’t even do this shit on GTA</p><p><a href="https://twitter.com/ChatGotNext/status/1346911137439223822">https://twitter.com/ChatGotNext/status/1346911137439223822</a></p><p>Thom:</p><p><a href="https://twitter.com/YousefMunayyer">@YousefMunayyer</a></p><p>We spend $750 billion annually on "defense" and the center of American government fell in two hours to the duck dynasty and the guy in the chewbacca bikini</p><p><a href="https://twitter.com/YousefMunayyer/status/1347026407294201863">https://twitter.com/YousefMunayyer/status/1347026407294201863</a></p><p>Graham from the Smashing Security podcast:</p><p><a href="https://twitter.com/bocxtop">@bocxtop</a></p><p>it’s literally harder to sign into gmail from a new device than it is to breach the capitol walls</p><p><a href="https://twitter.com/bocxtop/status/1347003538468204545">https://twitter.com/bocxtop/status/1347003538468204545</a></p><p>Andy:</p><p><a href="https://twitter.com/notviking">@notviking</a></p><p>starting to think it’d actually be incredibly easy to steal the declaration of independence</p><p><a href="https://twitter.com/notviking/status/1346923223489736704">https://twitter.com/notviking/status/1346923223489736704</a></p><p>Thom: (serious)</p><p><a href="https://twitter.com/Olivia_Beavers">@Olivia_Beavers</a></p><p>If there is still any question about how rhetoric can manifest into action, that question has been answered today.</p><p><a href="https://twitter.com/Olivia_Beavers/status/1346901714767642630">https://twitter.com/Olivia_Beavers/status/1346901714767642630</a></p><p> </p><p><a href="https://youtu.be/rqpr76S7UNE">They Pushed Me Out And Maced Me</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p><strong>Sticky Pickle of the Week</strong></p><p><strong>Sticky Pickle of the Week</strong></p><p>Graham applies his razor sharp mind to this weeks triple sticky pickle.</p><p> </p><p><a href="https://www.warhistoryonline.com/war-articles/us-nuclear-weapons-launch-code-terrifyingly-00000000.html">US nuclear launch codes were 00000000</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 Jan 2021 13:27:38 +0000</pubDate>
      <author>thom@tl2security.com (Javvad malik, Graham Cluley)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-37-merry-new-year-7oCrt201</link>
      <content:encoded><![CDATA[<p>Welcome back to the New year and the new look Host Unknown, with a slightly less ethnically diverse lineup than usual, but, but still the same average quality and distinctly suspect ethics you have come to expect from Host Unknown. </p><p>This week Thom displays his love of the Animaniacs, Andy has audio issues and Graham has the voice of a midnight hour radio show host.</p><p> </p><p><strong>Smutty or Security?</strong></p><p>Graham wins by a nose and a euphemism.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>Liberated from the “today in infosec” twitter accoun):</p><p>6th January 1982: The final draft of the script for the movie WarGames was printed. Due to the Cold War and relative ignorance about remotely accessible computers, the film released in 1983 scared the hell out of politicians, the military, and adults. And inspired a generation of hackers!</p><p><a href="https://twitter.com/todayininfosec/status/1214381338028953600">https://twitter.com/todayininfosec/status/1214381338028953600</a>  </p><p>8th January 1986: "The Hacker Manifesto" was written by Loyd Blankenship (aka The Mentor) and originally titled "The Conscience of a Hacker".  8 months later it was published in issue 7 of the hacker zine Phrack.</p><p><a href="http://phrack.org/issues/7/3.html#article">http://phrack.org/issues/7/3.html#article</a></p><p><a href="https://twitter.com/todayininfosec/status/1215026869600313344">https://twitter.com/todayininfosec/status/1215026869600313344</a></p><p>9th January 2001: Macromedia, the maker of the Flash media player, claimed that Flash was secure because it was "a constrained environment by design". </p><p><a href="https://web.archive.org/web/20010123231000/http://www.zdnet.com/zdnn/stories/news/0,4586,2672473,00.html">https://web.archive.org/web/20010123231000/http://www.zdnet.com/zdnn/stories/news/0,4586,2672473,00.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1215067971963375616">https://twitter.com/todayininfosec/status/1215067971963375616</a></p><p>End of the road for Flash</p><p><a href="https://twitter.com/gcluley/status/1344822920946872320">https://twitter.com/gcluley/status/1344822920946872320</a></p><p><a href="https://www.bbc.co.uk/news/technology-55497353">https://www.bbc.co.uk/news/technology-55497353</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.bbc.co.uk/news/technology-55573149">https://www.bbc.co.uk/news/technology-55573149</a></p><p><a href="https://threatpost.com/facebooks-mandatory-data-sharing-whatsapp-ire/162828/">https://threatpost.com/facebooks-mandatory-data-sharing-whatsapp-ire/162828/</a></p><p>WhatsApp is forcing users to agree to sharing information with Facebook if they want to keep using the service.</p><p>The update is designed to “offer integrations across the Facebook Company Products”, which also includes Instagram and Messenger.</p><p>Some of the data that WhatsApp collects includes:</p><ul><li>User phone numbers</li><li>Other people’s phone numbers stored in address books</li><li>Profile names</li><li>Profile pictures and</li><li>Status message including when a user was last online</li><li>Diagnostic data collected from app logs</li></ul><p>The company warns users in a pop-up notice that they "need to accept these updates to continue using WhatsApp" - or delete their accounts.</p><p>"Opt in, or fuck off by 8th Feb."</p><p>But…. some good news!</p><img src="https://lh3.googleusercontent.com/Q3SYRlC-VBMX98ty2eez6Ki8BTOZneQTguREyyAgkwrMDvF4cUtEpsU2jpd4AaCqPHzTs4SFiyr73thl_IDH6rjjXvVRSnf5GsHkpEMwff6525s3qVx56WjLNXCkK_JtTyIV2uOR" /><p>And the UK is still considered part of the “European region”, even if we’re not in the EU.  Yes, we are still Europeans in 2021!</p><p>However,<a href="https://www.whatsapp.com/legal/updates/privacy-policy?eea=0#privacy-policy-updates-how-we-work-with-other-facebook-companies"> the new version of the privacy policy for European users</a> explicitly says that data can be shared with other Facebook companies to show personalised advertising and offers, make suggestions for content, and "help" to complete purchases, among other reasons.</p><p>What’s telling to me...</p><p>In 2018, the founders of WhatsApp quit FB over disagreements about privacy and encryption.  Walking away from $850 million...</p><p><a href="https://www.theguardian.com/technology/2018/apr/30/jan-koum-whatsapp-co-founder-quits-facebook">https://www.theguardian.com/technology/2018/apr/30/jan-koum-whatsapp-co-founder-quits-facebook</a></p><p><a href="https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/">https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/</a></p><p>If they can walk away from $850 million, surely WhatsApp users can switch to Signal.</p><p>Alternatives:</p><ul><li>Signal</li><li>Wickr</li></ul><img src="https://lh3.googleusercontent.com/tWK-fdlAvQrHP9N9AnPXsz_e0x7GxkgAs0FDfaH0yYZa0fb5Uk5871uX80mgravjMKVTnLesNZAi3g6KeYV_TkAXSojp_xsamMsg3Bvke3JHKj5qaI3cdYEZD-kT1zkBbGsYk5mW" /><p> </p><p><strong>Billy Big Balls</strong></p><p>Elon Musk has become the wealthiest person on the planet, surpassing Amazon CEO Jeff Bezos, thanks to the continued rise in Tesla’s stock price. Musk is now worth around $188 billion, according to Bloomberg’s Billionaires Index.</p><p>“How strange,” Musk <a href="https://twitter.com/elonmusk/status/1347204459147902978?s=21">tweeted</a> Thursday. “Well, back to work ...”</p><p>Musk eclipsing Bezos’ own extravagant personal wealth of around $187 billion marks the latest development in a years-long rivalry between the two tech magnates.</p><p><a href="https://www.theverge.com/2021/1/7/22163361/elon-musk-billionaire-richest-world-jeff-bezos-tesla-stock-spacex">https://www.theverge.com/2021/1/7/22163361/elon-musk-billionaire-richest-world-jeff-bezos-tesla-stock-spacex</a></p><p>Encrypted messaging app Signal says it’s seeing a swell of new users signing up for the platform, so much so that the company is seeing delays in phone number verifications of new accounts across multiple cell providers.</p><p>As for what or who is responsible for so many new users interested in trying the platform, which is operated by the nonprofit Signal Foundation, there are two likely culprits: Tesla CEO Elon Musk and Signal competitor WhatsApp.</p><p><a href="https://www.theverge.com/2021/1/7/22218989/signal-new-signups-whatsapp-facebook-privacy-controversy-elon-musk">https://www.theverge.com/2021/1/7/22218989/signal-new-signups-whatsapp-facebook-privacy-controversy-elon-musk</a></p><img src="https://lh3.googleusercontent.com/M752YtQZS7bSOk3ufGq3VqIRfOtliKdIzRcJSQuKWILRYBUBaEIKXHn3nducGmuQf1wUguuxjXPVNZFe7BAAoVGTWSVWKVEG54QkjSziwfM4mbzVVJqfPOPdG7Sfr9pt5q_-n-JM" /><img src="https://lh6.googleusercontent.com/5J-cTfeext4fhgZvW0xvCbBghxy4qhlfG-oUv70Gxm5aRxGJ1zzfGEuVeXRHSaO03-5IIVbFSR6mlSMbbJsVrgosXNRRk97sw4YI1DV_pjiD8LQfS9DCxB9dgenmX3fOObpWCDzn" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/nyse-delist-chinese-telcos/">NYSE to Delist Chinese Telcos on National Security Grounds</a></p><p><a href="https://www.infosecurity-magazine.com/news/one-million-compromised-accounts/">One Million Compromised Accounts Found at Top Gaming Firms</a></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-solarwinds-attackers/">Microsoft: SolarWinds Attackers Viewed Our Source Code</a></p><p><a href="https://www.infosecurity-magazine.com/news/nyse-uturn-means-chinese-telcos/">NYSE U-Turn Means Chinese Telcos Escape Delisting</a></p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-group-linked-to/">Chinese APT Group Linked to Ransomware Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-drives-45-increase/">Ransomware Surge Drives 45% Increase in Healthcare Cyber-Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/us-fewer-10-government-agencies/">US: Fewer Than 10 Govt Agencies Hit by SolarWinds Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/most-public-sector-victims-refuse/">Most Public Sector Victims Refuse to Pay Ransomware Gangs</a></p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-user-numbers-spiked-covid/">Dark Web User Numbers Spiked During #COVID19 Lockdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/over-third-tmt-firms-hit-security/">Over a Third of TMT Firms Hit by Security Breach in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-neuters-trumps/">Social Media Neuters Trump’s Accounts After Fans Storm Capitol</a></p><p><a href="https://www.infosecurity-magazine.com/news/doj-solarwinds-attackers-thousands/">DoJ: SolarWinds Attackers Hit Thousands of O365 Inboxes</a></p><p> </p><p><strong>Tweet)s) of the Week</strong></p><p>Graham from the Smashing Security podcast: </p><p><a href="https://twitter.com/modesty_blaise0">@modesty_blaise0</a>: </p><p>Due to travel restrictions, the USA had to organize a coup at home this year.</p><p><a href="https://twitter.com/modesty_blaise0/status/1346965502703198208">https://twitter.com/modesty_blaise0/status/1346965502703198208</a></p><p>Andy: </p><p><a href="https://twitter.com/ChatGotNext">@ChatGotNext</a></p><p>You can’t even do this shit on GTA</p><p><a href="https://twitter.com/ChatGotNext/status/1346911137439223822">https://twitter.com/ChatGotNext/status/1346911137439223822</a></p><p>Thom:</p><p><a href="https://twitter.com/YousefMunayyer">@YousefMunayyer</a></p><p>We spend $750 billion annually on "defense" and the center of American government fell in two hours to the duck dynasty and the guy in the chewbacca bikini</p><p><a href="https://twitter.com/YousefMunayyer/status/1347026407294201863">https://twitter.com/YousefMunayyer/status/1347026407294201863</a></p><p>Graham from the Smashing Security podcast:</p><p><a href="https://twitter.com/bocxtop">@bocxtop</a></p><p>it’s literally harder to sign into gmail from a new device than it is to breach the capitol walls</p><p><a href="https://twitter.com/bocxtop/status/1347003538468204545">https://twitter.com/bocxtop/status/1347003538468204545</a></p><p>Andy:</p><p><a href="https://twitter.com/notviking">@notviking</a></p><p>starting to think it’d actually be incredibly easy to steal the declaration of independence</p><p><a href="https://twitter.com/notviking/status/1346923223489736704">https://twitter.com/notviking/status/1346923223489736704</a></p><p>Thom: (serious)</p><p><a href="https://twitter.com/Olivia_Beavers">@Olivia_Beavers</a></p><p>If there is still any question about how rhetoric can manifest into action, that question has been answered today.</p><p><a href="https://twitter.com/Olivia_Beavers/status/1346901714767642630">https://twitter.com/Olivia_Beavers/status/1346901714767642630</a></p><p> </p><p><a href="https://youtu.be/rqpr76S7UNE">They Pushed Me Out And Maced Me</a></p><p> </p><p><strong>Sticky Pickle of the Week</strong></p><p><strong>Sticky Pickle of the Week</strong></p><p><strong>Sticky Pickle of the Week</strong></p><p>Graham applies his razor sharp mind to this weeks triple sticky pickle.</p><p> </p><p><a href="https://www.warhistoryonline.com/war-articles/us-nuclear-weapons-launch-code-terrifyingly-00000000.html">US nuclear launch codes were 00000000</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="59919742" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1ddf33cc-8fe6-463a-9f82-8987909f74b4/audio/7b52f7ca-b91a-496f-9d21-895e05bfb000/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 37 - Merry New Year!</itunes:title>
      <itunes:author>Javvad malik, Graham Cluley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/38fc61ef-b5e1-46dc-9d03-9b300b81f0d0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:25</itunes:duration>
      <itunes:summary>The one with the bad audio, although special guest star Graham &quot;from the Smashing Security Podcast&quot; Cluley still sounds like he has a voice like dripping honey.

New Year, New Podcast, New Kit, New Co-Host!

Smutty or Security?
This week in Infosec
Rant of the week
Billy Big Balls
Industry News
Tweet of the Week
Will we have a Little people today?</itunes:summary>
      <itunes:subtitle>The one with the bad audio, although special guest star Graham &quot;from the Smashing Security Podcast&quot; Cluley still sounds like he has a voice like dripping honey.

New Year, New Podcast, New Kit, New Co-Host!

Smutty or Security?
This week in Infosec
Rant of the week
Billy Big Balls
Industry News
Tweet of the Week
Will we have a Little people today?</itunes:subtitle>
      <itunes:keywords>smashing security, troy hunt, lastpass, graham cluley, host unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">504c36c3-a8d8-4a64-8b88-2fa3994bec9a</guid>
      <title>Episode 36 - IT&apos;S CHRIIIISTMAAAAS!</title>
      <description><![CDATA[<p>This might be the last episode of the week, but that doesn't mean we scraped the barrel (except maybe for The Little People, but Jav has had a written warning for that already). Andy misunderstands the concept of "this week in infosec" and Thom tries to hold it together while juggling his newly acquired career in the security industry.</p><p>Your usual tasty festive treats this week are:</p><p>This Week in Infosec</p><p>Liberated from the “today in infosec” twitter account:</p><p>5th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? The identification of 10.5 billion compromised accounts.</p><p><a href="https://twitter.com/todayininfosec/status/1335020238765744129?s=20">https://twitter.com/todayininfosec/status/1335020238765744129?s=20</a></p><p>8th December 2020: December 8, FireEye, a well-known security firm, announced that they had experienced a security incident that involved the theft of  FireEye Red Team tools – the date of the incident was not revealed. Reportedly, evidence suggests that the compromise may have been carried out by a Russian nation-state threat actor “with top-tier offensive capabilities.” Per the blog post announcing the hack and authored by FireEye CEO Kevin Mandia, it appears that the attackers were also interested in the details related to FireEye customers that are government agencies. FireEye has engaged the FBI for this investigation.</p><p><a href="https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html">https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/5lDfVwVGjVU-nOqisBLyNWVLcVc3TDda8Y0FInZMgJw4-mc1bPc2NNNoWQL0Nwz6dC12Od5QD5UtZnRqrvoGKT-4J7HiNTDj0lxTt4eFlwaQLfxFn-3aPZsWHXQxvIU3Khw2rirN" /><p>https://twitter.com/GrazianoDennis/status/1336796234120646662?s=20</p><img src="https://lh6.googleusercontent.com/EDl1IRv_R5S22EonEQFvoHhfxjZt34y6FiOQ4n5zheJp7GIiTHp1A5ceA3TbUk48fJKPh3TUiOEceD-HWW2gVCE2NkDzYzq2QHBYLgzlxJaMl05CzfX0sircLG_erfaN0jq2Orm2" /><img src="https://lh6.googleusercontent.com/KMxK0ultzxotKwM1mcMjmEIl2EcYGifBSlOWiiWka1L7sTsIrnSNTCKZ-abS9SmvGiq1YuFX4RPXurpstobNC5IUKgUvfdUOI1YHFvEUEdZtf0fKCO0Z3kpp3XeovvkYN81Z6S5Q" /><img src="https://lh6.googleusercontent.com/U0-1rNkhGE3HQ2VbCjw8zgQ4uKAPzFJRW13ABwudfDkqTaNyMkhyMGFDZysKm5NIivA7aosAkUsw4_l1RBt8C4YdI2IBrjnYbZ81qeTqfeJvPfRt-v2R-s9DaUNwetAGdapd31hS" /><p> </p><p><strong>Billy Big Balls</strong></p><p>3 Reasons Scientists Endure Social Media Trolls And Attacks</p><p><a href="https://www.forbes.com/sites/marshallshepherd/2020/12/06/3-reasons-scientists-endure-social-media-trolls-and-attacks/?sh=668e1fb8424c">https://www.forbes.com/sites/marshallshepherd/2020/12/06/3-reasons-scientists-endure-social-media-trolls-and-attacks/?sh=668e1fb8424c</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/websummit-clegg-internet-rules/">#WebSummit: Nick Clegg Claims Internet Needs Accountability, Not Rules</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-evolution-capabilities/">Ransomware Set for Evolution in Attack Capabilities in 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/2020-the-most-vulnerable-year-yet/">2020: The Most Vulnerable Year Yet?</a></p><p><a href="https://www.infosecurity-magazine.com/news/thales-google-key-management/">Thales and Google Cloud Partner for External Encryption Key Management</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-government-hackers/">#BHEU: Collision of Cyber-Communities Creating Tension and Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-fundamentals-adversary/">#BHEU: Focus on Security Fundamentals, Not Adversarial Sophistication</a></p><p><a href="https://www.infosecurity-magazine.com/news/reports-data-losses-ico/">Data Loss Reports to ICO Increase Once Again</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-north-korea-targets/">#BHEU: North Korea’s Cyber-Offense Strategy Evolving to Focus on International Economic Targets</a></p><p> </p><p><strong>Jav's industry News</strong></p><p><a href="https://www.professionalsecurity.co.uk/news/training/furlough-survey/">Near three in ten of workers furloughed feel less loyal to their employer post-furlough</a></p><p><a href="https://www.cpomagazine.com/cyber-security/business-executives-logins-sold-on-russian-hacking-forum-accounts-can-be-used-for-bec-scams/">Business Executives’ Logins Sold on Russian Hacking Forum; Accounts Can Be Used for BEC Scams</a></p><p><a href="https://www.itpro.co.uk/security/malware/358062/using-a-power-bank-could-infect-your-smartphone-with-malware">Power banks could infect your smartphone with malware</a></p><p><a href="https://www.informationsecuritybuzz.com/expert-comments/experts-on-clop-ransomware-attacking-retail-giant-e-land/">Experts On Clop Ransomware Attacking Retail Giant E-Land</a></p><p><a href="https://www.cpomagazine.com/cyber-security/credential-stuffing-attack-disrupted-spotify-affecting-more-than-300000-accounts/">Credential Stuffing Attack Targeted Spotify, Affecting More Than 300,000 Accounts</a></p><p><a href="https://www.teiss.co.uk/e-land-retail-clop-ransomware-attack/">South Korean retail giant E-Land Retail suffers Clop ransomware attack</a></p><p> </p><p>Rant of the Week</p><img src="https://lh3.googleusercontent.com/CHPAqxbOnokaPD2OXVwwjKjYiJGdQQK9LVy1ScfW7i9CK_vm0_kFbVi9Y-xtv69PEf_MNTolZRbucgGIOeDacdTwlaVjTzt-k7MtjHYAOQ_9kC9mny5pWW0t4LUatH_nNjEY7x-j" /><p>A new lawsuit brought by one of Apple’s oldest foes seeks to force the iPhone maker to allow alternatives to the App Store, the latest in a growing number of cases that aim to curb the tech giant’s power.</p><p>The lawsuit was filed on Thursday by the maker of Cydia, a once-popular app store for the iPhone that launched in 2007, before Apple created its own version. The lawsuit alleges that Apple used anti-competitive means to nearly destroy Cydia, clearing the way for the App Store, which Cydia’s attorneys say has a monopoly over software distribution on iOS, Apple’s mobile operating system.</p><p><a href="https://www.washingtonpost.com/technology/2020/12/10/cydia-apple-lawsuit/">https://www.washingtonpost.com/technology/2020/12/10/cydia-apple-lawsuit/</a></p><p><a href="https://twitter.com/ihackbanme/status/1337079701756493825?s=20">https://twitter.com/ihackbanme/status/1337079701756493825?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>Don't go there. Seriously, just skip ahead.</p><p> </p><p><strong>Look Back on the Year</strong></p><p>January:</p><p><a href="https://www.zdnet.com/article/new-years-eve-malware-attack-strikes-travelex-services-still-offline/">Travelex</a>: Travelex services were pulled offline following a malware infection. The company itself and businesses using the platform to provide currency exchange services were all affected.</p><p>February:</p><p><a href="https://www.essentialretail.com/news/este-lauder-breach/">Estée Lauder</a>: 440 million internal records were reportedly exposed due to middleware security failures. </p><p>March:</p><p><a href="https://www.zdnet.com/article/marriott-discloses-new-data-breach-impacting-5-2-million-hotel-guests/">Marriott</a>: The hotel chain suffered a cyberattack in which email accounts were infiltrated. 5.2 million hotel guests were impacted. </p><p>April:</p><p><a href="https://www.zdnet.com/article/nintendo-says-160000-users-impacted-in-recent-account-hacks/">Nintendo</a>: Nintendo said 160,000 users were impacted by a mass account hijacking account caused by the NNID legacy login system.</p><p>May:</p><p><a href="https://www.zdnet.com/article/easyjet-faces-18-billion-class-action-lawsuit-over-data-breach/">EasyJet</a>: The budget airline revealed a data breach exposing data belonging to nine million customers, including some financial records.</p><p><a href="https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/">Blackbaud</a>: The cloud service provider was hit by ransomware operators who hijacked customer systems. The company later paid a ransom to stop client data from being leaked online.</p><p>June:</p><p><a href="https://www.zdnet.com/article/university-of-california-sf-pays-ransomware-hackers-1-14-million-to-salvage-research/">University of California SF</a>: The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.</p><p>July:</p><p><a href="https://www.zdnet.com/article/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web/">MGM Resorts</a>: A hacker put the records of 142 million MGM guests online for sale.</p><p>August:</p><p><a href="https://www.zdnet.com/article/experian-south-africa-discloses-data-breach-impacting-24-million-customers/">Experian, South Africa</a>: Experian's South African branch disclosed a data breach impacting 24 million customers. </p><p>September:</p><p><a href="https://www.zdnet.com/article/ceo-of-cyber-fraud-company-arrested-for-financial-fraud/">NS8</a>: The CEO of the cyberfraud startup was accused of defrauding investors out of $123 million.</p><p>October:</p><p><a href="https://www.zdnet.com/article/card-details-for-3-million-dickeys-customers-posted-on-carding-forum/">Dickey's</a>: The US barbeque restaurant chain suffered a point-of-sale attack between July 2019 and August 2020. Three million customers had their card details later posted online. </p><p>November:</p><p><a href="https://www.zdnet.com/article/manchester-united-football-club-discloses-security-breach/">Manchester United</a>: Manchester United football club said it was investigating a security incident impacting internal systems.</p><p><a href="https://www.afr.com/companies/financial-services/fake-zoom-invite-cripples-aussie-hedge-fund-with-8m-hit-20201122-p56f9c">Fake Zoom invite cripples Aussie hedge fund with $8m hit</a></p><p>December:</p><p><a href="https://www.zdnet.com/article/fireeye-one-of-the-worlds-largest-security-firms-discloses-security-breach/">FireEye</a>: FireEye disclosed a cyberattack, suspected to be the work of a nation-state group. The cybersecurity firm said the hack resulted in penetration tools being stolen.</p><p> </p><p><strong>The Dead Donkey</strong></p><p>Microsoft discloses fewest vulnerabilities in a month since January</p><p>Description: Microsoft released its monthly security update Tuesday, disclosing 58 vulnerabilities across its suite of products, the lowest number of vulnerabilities in any Patch Tuesday since January. There are only 10 critical vulnerabilities as part of this release, while there are two moderate-severity exploits, and the remainder are considered "important." Users of all Microsoft and Windows products are urged to update their software as soon as possible to avoid possible exploitation of all these bugs.</p><p><a href="https://blog.talosintelligence.com/2020/12/microsoft-patch-tuesday-dec-2020-.html">https://blog.talosintelligence.com/2020/12/microsoft-patch-tuesday-dec-2020-.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Dec 2020 16:21:15 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agens, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-36-its-chriiiistmaaaas-MOzPUMPN</link>
      <content:encoded><![CDATA[<p>This might be the last episode of the week, but that doesn't mean we scraped the barrel (except maybe for The Little People, but Jav has had a written warning for that already). Andy misunderstands the concept of "this week in infosec" and Thom tries to hold it together while juggling his newly acquired career in the security industry.</p><p>Your usual tasty festive treats this week are:</p><p>This Week in Infosec</p><p>Liberated from the “today in infosec” twitter account:</p><p>5th December 2013: Troy Hunt launched the site "Have I Been Pwned? (HIBP)". At launch, passwords from the Adobe, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures breaches were indexed. Today? The identification of 10.5 billion compromised accounts.</p><p><a href="https://twitter.com/todayininfosec/status/1335020238765744129?s=20">https://twitter.com/todayininfosec/status/1335020238765744129?s=20</a></p><p>8th December 2020: December 8, FireEye, a well-known security firm, announced that they had experienced a security incident that involved the theft of  FireEye Red Team tools – the date of the incident was not revealed. Reportedly, evidence suggests that the compromise may have been carried out by a Russian nation-state threat actor “with top-tier offensive capabilities.” Per the blog post announcing the hack and authored by FireEye CEO Kevin Mandia, it appears that the attackers were also interested in the details related to FireEye customers that are government agencies. FireEye has engaged the FBI for this investigation.</p><p><a href="https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html">https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh6.googleusercontent.com/5lDfVwVGjVU-nOqisBLyNWVLcVc3TDda8Y0FInZMgJw4-mc1bPc2NNNoWQL0Nwz6dC12Od5QD5UtZnRqrvoGKT-4J7HiNTDj0lxTt4eFlwaQLfxFn-3aPZsWHXQxvIU3Khw2rirN" /><p>https://twitter.com/GrazianoDennis/status/1336796234120646662?s=20</p><img src="https://lh6.googleusercontent.com/EDl1IRv_R5S22EonEQFvoHhfxjZt34y6FiOQ4n5zheJp7GIiTHp1A5ceA3TbUk48fJKPh3TUiOEceD-HWW2gVCE2NkDzYzq2QHBYLgzlxJaMl05CzfX0sircLG_erfaN0jq2Orm2" /><img src="https://lh6.googleusercontent.com/KMxK0ultzxotKwM1mcMjmEIl2EcYGifBSlOWiiWka1L7sTsIrnSNTCKZ-abS9SmvGiq1YuFX4RPXurpstobNC5IUKgUvfdUOI1YHFvEUEdZtf0fKCO0Z3kpp3XeovvkYN81Z6S5Q" /><img src="https://lh6.googleusercontent.com/U0-1rNkhGE3HQ2VbCjw8zgQ4uKAPzFJRW13ABwudfDkqTaNyMkhyMGFDZysKm5NIivA7aosAkUsw4_l1RBt8C4YdI2IBrjnYbZ81qeTqfeJvPfRt-v2R-s9DaUNwetAGdapd31hS" /><p> </p><p><strong>Billy Big Balls</strong></p><p>3 Reasons Scientists Endure Social Media Trolls And Attacks</p><p><a href="https://www.forbes.com/sites/marshallshepherd/2020/12/06/3-reasons-scientists-endure-social-media-trolls-and-attacks/?sh=668e1fb8424c">https://www.forbes.com/sites/marshallshepherd/2020/12/06/3-reasons-scientists-endure-social-media-trolls-and-attacks/?sh=668e1fb8424c</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/websummit-clegg-internet-rules/">#WebSummit: Nick Clegg Claims Internet Needs Accountability, Not Rules</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-evolution-capabilities/">Ransomware Set for Evolution in Attack Capabilities in 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/2020-the-most-vulnerable-year-yet/">2020: The Most Vulnerable Year Yet?</a></p><p><a href="https://www.infosecurity-magazine.com/news/thales-google-key-management/">Thales and Google Cloud Partner for External Encryption Key Management</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-government-hackers/">#BHEU: Collision of Cyber-Communities Creating Tension and Risk</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-fundamentals-adversary/">#BHEU: Focus on Security Fundamentals, Not Adversarial Sophistication</a></p><p><a href="https://www.infosecurity-magazine.com/news/reports-data-losses-ico/">Data Loss Reports to ICO Increase Once Again</a></p><p><a href="https://www.infosecurity-magazine.com/news/bheu-north-korea-targets/">#BHEU: North Korea’s Cyber-Offense Strategy Evolving to Focus on International Economic Targets</a></p><p> </p><p><strong>Jav's industry News</strong></p><p><a href="https://www.professionalsecurity.co.uk/news/training/furlough-survey/">Near three in ten of workers furloughed feel less loyal to their employer post-furlough</a></p><p><a href="https://www.cpomagazine.com/cyber-security/business-executives-logins-sold-on-russian-hacking-forum-accounts-can-be-used-for-bec-scams/">Business Executives’ Logins Sold on Russian Hacking Forum; Accounts Can Be Used for BEC Scams</a></p><p><a href="https://www.itpro.co.uk/security/malware/358062/using-a-power-bank-could-infect-your-smartphone-with-malware">Power banks could infect your smartphone with malware</a></p><p><a href="https://www.informationsecuritybuzz.com/expert-comments/experts-on-clop-ransomware-attacking-retail-giant-e-land/">Experts On Clop Ransomware Attacking Retail Giant E-Land</a></p><p><a href="https://www.cpomagazine.com/cyber-security/credential-stuffing-attack-disrupted-spotify-affecting-more-than-300000-accounts/">Credential Stuffing Attack Targeted Spotify, Affecting More Than 300,000 Accounts</a></p><p><a href="https://www.teiss.co.uk/e-land-retail-clop-ransomware-attack/">South Korean retail giant E-Land Retail suffers Clop ransomware attack</a></p><p> </p><p>Rant of the Week</p><img src="https://lh3.googleusercontent.com/CHPAqxbOnokaPD2OXVwwjKjYiJGdQQK9LVy1ScfW7i9CK_vm0_kFbVi9Y-xtv69PEf_MNTolZRbucgGIOeDacdTwlaVjTzt-k7MtjHYAOQ_9kC9mny5pWW0t4LUatH_nNjEY7x-j" /><p>A new lawsuit brought by one of Apple’s oldest foes seeks to force the iPhone maker to allow alternatives to the App Store, the latest in a growing number of cases that aim to curb the tech giant’s power.</p><p>The lawsuit was filed on Thursday by the maker of Cydia, a once-popular app store for the iPhone that launched in 2007, before Apple created its own version. The lawsuit alleges that Apple used anti-competitive means to nearly destroy Cydia, clearing the way for the App Store, which Cydia’s attorneys say has a monopoly over software distribution on iOS, Apple’s mobile operating system.</p><p><a href="https://www.washingtonpost.com/technology/2020/12/10/cydia-apple-lawsuit/">https://www.washingtonpost.com/technology/2020/12/10/cydia-apple-lawsuit/</a></p><p><a href="https://twitter.com/ihackbanme/status/1337079701756493825?s=20">https://twitter.com/ihackbanme/status/1337079701756493825?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>Don't go there. Seriously, just skip ahead.</p><p> </p><p><strong>Look Back on the Year</strong></p><p>January:</p><p><a href="https://www.zdnet.com/article/new-years-eve-malware-attack-strikes-travelex-services-still-offline/">Travelex</a>: Travelex services were pulled offline following a malware infection. The company itself and businesses using the platform to provide currency exchange services were all affected.</p><p>February:</p><p><a href="https://www.essentialretail.com/news/este-lauder-breach/">Estée Lauder</a>: 440 million internal records were reportedly exposed due to middleware security failures. </p><p>March:</p><p><a href="https://www.zdnet.com/article/marriott-discloses-new-data-breach-impacting-5-2-million-hotel-guests/">Marriott</a>: The hotel chain suffered a cyberattack in which email accounts were infiltrated. 5.2 million hotel guests were impacted. </p><p>April:</p><p><a href="https://www.zdnet.com/article/nintendo-says-160000-users-impacted-in-recent-account-hacks/">Nintendo</a>: Nintendo said 160,000 users were impacted by a mass account hijacking account caused by the NNID legacy login system.</p><p>May:</p><p><a href="https://www.zdnet.com/article/easyjet-faces-18-billion-class-action-lawsuit-over-data-breach/">EasyJet</a>: The budget airline revealed a data breach exposing data belonging to nine million customers, including some financial records.</p><p><a href="https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/">Blackbaud</a>: The cloud service provider was hit by ransomware operators who hijacked customer systems. The company later paid a ransom to stop client data from being leaked online.</p><p>June:</p><p><a href="https://www.zdnet.com/article/university-of-california-sf-pays-ransomware-hackers-1-14-million-to-salvage-research/">University of California SF</a>: The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.</p><p>July:</p><p><a href="https://www.zdnet.com/article/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web/">MGM Resorts</a>: A hacker put the records of 142 million MGM guests online for sale.</p><p>August:</p><p><a href="https://www.zdnet.com/article/experian-south-africa-discloses-data-breach-impacting-24-million-customers/">Experian, South Africa</a>: Experian's South African branch disclosed a data breach impacting 24 million customers. </p><p>September:</p><p><a href="https://www.zdnet.com/article/ceo-of-cyber-fraud-company-arrested-for-financial-fraud/">NS8</a>: The CEO of the cyberfraud startup was accused of defrauding investors out of $123 million.</p><p>October:</p><p><a href="https://www.zdnet.com/article/card-details-for-3-million-dickeys-customers-posted-on-carding-forum/">Dickey's</a>: The US barbeque restaurant chain suffered a point-of-sale attack between July 2019 and August 2020. Three million customers had their card details later posted online. </p><p>November:</p><p><a href="https://www.zdnet.com/article/manchester-united-football-club-discloses-security-breach/">Manchester United</a>: Manchester United football club said it was investigating a security incident impacting internal systems.</p><p><a href="https://www.afr.com/companies/financial-services/fake-zoom-invite-cripples-aussie-hedge-fund-with-8m-hit-20201122-p56f9c">Fake Zoom invite cripples Aussie hedge fund with $8m hit</a></p><p>December:</p><p><a href="https://www.zdnet.com/article/fireeye-one-of-the-worlds-largest-security-firms-discloses-security-breach/">FireEye</a>: FireEye disclosed a cyberattack, suspected to be the work of a nation-state group. The cybersecurity firm said the hack resulted in penetration tools being stolen.</p><p> </p><p><strong>The Dead Donkey</strong></p><p>Microsoft discloses fewest vulnerabilities in a month since January</p><p>Description: Microsoft released its monthly security update Tuesday, disclosing 58 vulnerabilities across its suite of products, the lowest number of vulnerabilities in any Patch Tuesday since January. There are only 10 critical vulnerabilities as part of this release, while there are two moderate-severity exploits, and the remainder are considered "important." Users of all Microsoft and Windows products are urged to update their software as soon as possible to avoid possible exploitation of all these bugs.</p><p><a href="https://blog.talosintelligence.com/2020/12/microsoft-patch-tuesday-dec-2020-.html">https://blog.talosintelligence.com/2020/12/microsoft-patch-tuesday-dec-2020-.html</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="66982463" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/cf6ac330-0e60-49dc-9617-5708703c46b9/audio/40f1a668-1df2-4350-b25b-ed7e1510acc4/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 36 - IT&apos;S CHRIIIISTMAAAAS!</itunes:title>
      <itunes:author>Andrew Agens, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/331065d5-a271-447a-b1d5-7f8533b3c93a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:09:46</itunes:duration>
      <itunes:summary>It&apos;s the last episode of the year as Host Unknown&apos;s contractual duties draw to a close. This weeks episode brings you your regular podcasty delectables:

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?

We also look back at some of the notable events of the year  


</itunes:summary>
      <itunes:subtitle>It&apos;s the last episode of the year as Host Unknown&apos;s contractual duties draw to a close. This weeks episode brings you your regular podcasty delectables:

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?

We also look back at some of the notable events of the year  


</itunes:subtitle>
      <itunes:keywords>christmas podcast, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">24073289-5a5f-4e79-ad2e-5d5c4da6eb25</guid>
      <title>Episode 35 - The Triple Unicorn</title>
      <description><![CDATA[<p>The penultimate episode of the year, so only one more to go until you have the full set for 2020.</p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>3rd December 1980: The Australian Law Reform Commission chairman called for new laws to deal with "computer crime". He said the old definition of theft was not apt for a "fleeting, transient medium, the ephemeral flicker of a screen or information stored on a disc..."</li></ol><p><a href="https://trove.nla.gov.au/newspaper/article/126161975">https://trove.nla.gov.au/newspaper/article/126161975</a></p><img src="https://lh5.googleusercontent.com/QmH0xeFJIj4QkHLRF7kXtYA89qnGVhR_r_LlQ1lsdVpUkFoJgEE8F_-FAzwdwMTF2rTA33Ag2nAoxTrJTv_vifsd4Jy2QrqAKprx5C99MjneMxRCpSSL7QmG-uS94XvQ2a7Es6HC" /><p><a href="https://twitter.com/todayininfosec/status/1334231500448034824?s=20">https://twitter.com/todayininfosec/status/1334231500448034824?s=20</a></p><ol><li>1st December 2012: Pepsi Cola's official website in the Philippines has been hacked by the Malaysian hacker group Cyb3rSeC.</li></ol><p>The hackers did not come across any sensitive information, but changed the appearance of the website. </p><img src="https://lh5.googleusercontent.com/5VL4RTo74SAqe4P6wRdtIB9R_AeVhwMJZPRwao8TA7UsV94TNGkniIX2ihWhsum_ryTB4cCRtfj9tbKp-8CgVemVBEcbsC_2_TZIuywM9Z3PrEvPZcTUmYD5KklboP-g4-kXUwGN" /><p><a href="https://www.flashback.se/artikel/2637/pepsi-cola-hackade">https://www.flashback.se/artikel/2637/pepsi-cola-hackade</a></p><p><a href="http://www.zone-h.org/mirror/id/18675231?hz=1">http://www.zone-h.org/mirror/id/18675231?hz=1</a></p><p><a href="https://www.securityfocus.com/news/389">https://www.securityfocus.com/news/389</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/BriannaWu/status/1333150373599715329?s=19">https://twitter.com/BriannaWu/status/1333150373599715329?s=19</a> </p><img src="https://lh3.googleusercontent.com/xL90wjFciCHj0OopIMGmV85Dea5Hl498uUIFs3DSVxtaoCmRNzKLWq9oI20RXrjAXx1TRwwwvK-esrvAAuyla5x5etsCA-5dxE9o0D66so3u4AdRWiPz5VcR0F5HtQqHHNHIP00P" /><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.vice.com/en/article/4ad3jm/watch-google-hacker-ha-26-iphones-with-zero-day-exploit">https://www.vice.com/en/article/4ad3jm/watch-google-hacker-ha-26-iphones-with-zero-day-exploit</a></p><p>Watch This Google Hacker Pwn 26 iPhones With a 'WiFi Broadcast Packet of Death'</p><p>A Google security researcher found bugs that allowed him to take over nearby iPhones with a Raspberry Pi and just $100 in WiFi gear.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-fake-news-vaccine/">Experts Call for Online Fake News to Be Addressed as #COVID19 Vaccine Emerges</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-news-online-advertising/">How to Reduce Fake News in Online Advertising</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-training/">Remote Workers Admit Lack of Security Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/thinkcybersec-hiring-digital/">#thinkcybersec: Reconsider Hiring Strategies to Meet 2021’s Digital Challenges</a></p><p><a href="https://www.infosecurity-magazine.com/news/thinkcybersec-legacy-tech-bad/">#thinkcybersec: Don’t Presume Legacy Tech is a Negative Thing</a></p><p><a href="https://www.infosecurity-magazine.com/news/salesforce-acquire-slack/">Salesforce Set to Acquire Slack for $27bn</a></p><p><a href="https://www.infosecurity-magazine.com/news/native-cloud-security-controls/">Native Cloud Security Controls Still “Not Good Enough”</a></p><p><a href="https://www.infosecurity-magazine.com/news/websummit-data-privacy-collection/">#WebSummit: Companies of the Future Should Focus on Data Privacy Rather than Data Collection</a></p><p> </p><p><strong>Jav’s industry news</strong></p><p><a href="https://www.forbes.com/sites/kateoflahertyuk/2020/11/29/microsofts-new-productivity-score-what-does-it-mean-for-you/?sh=585abcf41d6f">Microsoft’s New Productivity Score And Workplace Tracking: Here’s The Proble</a>m</p><p><a href="https://www.raconteur.net/public-sector/ransomware-hospitals/">There’s no vaccine for ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-training/">Remote Workers Admit Lack of Security</a> Training</p><p><a href="https://dazeinfo.com/2020/11/30/microsoft-365-tracking-tool-employees-productivity/">Microsoft 365: Corporate Privacy Invader Masked As A Collaboration</a> Tool?</p><p><a href="https://www.infosecurity-magazine.com/news/nhs-error-exposes-data-hundreds/">NHS Error Exposes Data on Hundreds of Patients and</a> Staff</p><p><a href="https://www.techrepublic.com/article/sales-of-ceo-email-accounts-may-give-cyber-criminals-access-to-the-crown-jewels-of-a-company/">Sales of CEO email accounts may give cyber criminals access to the "crown jewels" of a company</a></p><p> </p><p><strong>Infosec Stig is moving on from 17th December:</strong></p><p> <a href="https://www.infosecurity-magazine.com/editorial/final-shot-farewell/">https://www.infosecurity-magazine.com/editorial/final-shot-farewell/</a></p><p> </p><p><strong>Rant of the week</strong></p><p><a href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance</a></p><p>Microsoft has apologised for enabling a feature, “productivity score”, which critics said was <a href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">tantamount to workplace surveillance</a>.</p><p>The company says it will now make changes to the service, which lets IT administrators “help their people get the most” from its products, in order to limit the amount of information about individual employees that is shared with managers.</p><p> </p><p><strong>The Little People</strong></p><p>Is it Leslie Show or William Lau? @lausecurity</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 4 Dec 2020 18:50:29 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, William Lau, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-35-the-triple-unicorn-TcO_mXw5</link>
      <content:encoded><![CDATA[<p>The penultimate episode of the year, so only one more to go until you have the full set for 2020.</p><p><strong>This week in Infosec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><ol><li>3rd December 1980: The Australian Law Reform Commission chairman called for new laws to deal with "computer crime". He said the old definition of theft was not apt for a "fleeting, transient medium, the ephemeral flicker of a screen or information stored on a disc..."</li></ol><p><a href="https://trove.nla.gov.au/newspaper/article/126161975">https://trove.nla.gov.au/newspaper/article/126161975</a></p><img src="https://lh5.googleusercontent.com/QmH0xeFJIj4QkHLRF7kXtYA89qnGVhR_r_LlQ1lsdVpUkFoJgEE8F_-FAzwdwMTF2rTA33Ag2nAoxTrJTv_vifsd4Jy2QrqAKprx5C99MjneMxRCpSSL7QmG-uS94XvQ2a7Es6HC" /><p><a href="https://twitter.com/todayininfosec/status/1334231500448034824?s=20">https://twitter.com/todayininfosec/status/1334231500448034824?s=20</a></p><ol><li>1st December 2012: Pepsi Cola's official website in the Philippines has been hacked by the Malaysian hacker group Cyb3rSeC.</li></ol><p>The hackers did not come across any sensitive information, but changed the appearance of the website. </p><img src="https://lh5.googleusercontent.com/5VL4RTo74SAqe4P6wRdtIB9R_AeVhwMJZPRwao8TA7UsV94TNGkniIX2ihWhsum_ryTB4cCRtfj9tbKp-8CgVemVBEcbsC_2_TZIuywM9Z3PrEvPZcTUmYD5KklboP-g4-kXUwGN" /><p><a href="https://www.flashback.se/artikel/2637/pepsi-cola-hackade">https://www.flashback.se/artikel/2637/pepsi-cola-hackade</a></p><p><a href="http://www.zone-h.org/mirror/id/18675231?hz=1">http://www.zone-h.org/mirror/id/18675231?hz=1</a></p><p><a href="https://www.securityfocus.com/news/389">https://www.securityfocus.com/news/389</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/BriannaWu/status/1333150373599715329?s=19">https://twitter.com/BriannaWu/status/1333150373599715329?s=19</a> </p><img src="https://lh3.googleusercontent.com/xL90wjFciCHj0OopIMGmV85Dea5Hl498uUIFs3DSVxtaoCmRNzKLWq9oI20RXrjAXx1TRwwwvK-esrvAAuyla5x5etsCA-5dxE9o0D66so3u4AdRWiPz5VcR0F5HtQqHHNHIP00P" /><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.vice.com/en/article/4ad3jm/watch-google-hacker-ha-26-iphones-with-zero-day-exploit">https://www.vice.com/en/article/4ad3jm/watch-google-hacker-ha-26-iphones-with-zero-day-exploit</a></p><p>Watch This Google Hacker Pwn 26 iPhones With a 'WiFi Broadcast Packet of Death'</p><p>A Google security researcher found bugs that allowed him to take over nearby iPhones with a Raspberry Pi and just $100 in WiFi gear.</p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/social-media-fake-news-vaccine/">Experts Call for Online Fake News to Be Addressed as #COVID19 Vaccine Emerges</a></p><p><a href="https://www.infosecurity-magazine.com/news/fake-news-online-advertising/">How to Reduce Fake News in Online Advertising</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-training/">Remote Workers Admit Lack of Security Training</a></p><p><a href="https://www.infosecurity-magazine.com/news/thinkcybersec-hiring-digital/">#thinkcybersec: Reconsider Hiring Strategies to Meet 2021’s Digital Challenges</a></p><p><a href="https://www.infosecurity-magazine.com/news/thinkcybersec-legacy-tech-bad/">#thinkcybersec: Don’t Presume Legacy Tech is a Negative Thing</a></p><p><a href="https://www.infosecurity-magazine.com/news/salesforce-acquire-slack/">Salesforce Set to Acquire Slack for $27bn</a></p><p><a href="https://www.infosecurity-magazine.com/news/native-cloud-security-controls/">Native Cloud Security Controls Still “Not Good Enough”</a></p><p><a href="https://www.infosecurity-magazine.com/news/websummit-data-privacy-collection/">#WebSummit: Companies of the Future Should Focus on Data Privacy Rather than Data Collection</a></p><p> </p><p><strong>Jav’s industry news</strong></p><p><a href="https://www.forbes.com/sites/kateoflahertyuk/2020/11/29/microsofts-new-productivity-score-what-does-it-mean-for-you/?sh=585abcf41d6f">Microsoft’s New Productivity Score And Workplace Tracking: Here’s The Proble</a>m</p><p><a href="https://www.raconteur.net/public-sector/ransomware-hospitals/">There’s no vaccine for ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-workers-training/">Remote Workers Admit Lack of Security</a> Training</p><p><a href="https://dazeinfo.com/2020/11/30/microsoft-365-tracking-tool-employees-productivity/">Microsoft 365: Corporate Privacy Invader Masked As A Collaboration</a> Tool?</p><p><a href="https://www.infosecurity-magazine.com/news/nhs-error-exposes-data-hundreds/">NHS Error Exposes Data on Hundreds of Patients and</a> Staff</p><p><a href="https://www.techrepublic.com/article/sales-of-ceo-email-accounts-may-give-cyber-criminals-access-to-the-crown-jewels-of-a-company/">Sales of CEO email accounts may give cyber criminals access to the "crown jewels" of a company</a></p><p> </p><p><strong>Infosec Stig is moving on from 17th December:</strong></p><p> <a href="https://www.infosecurity-magazine.com/editorial/final-shot-farewell/">https://www.infosecurity-magazine.com/editorial/final-shot-farewell/</a></p><p> </p><p><strong>Rant of the week</strong></p><p><a href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance</a></p><p>Microsoft has apologised for enabling a feature, “productivity score”, which critics said was <a href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">tantamount to workplace surveillance</a>.</p><p>The company says it will now make changes to the service, which lets IT administrators “help their people get the most” from its products, in order to limit the amount of information about individual employees that is shared with managers.</p><p> </p><p><strong>The Little People</strong></p><p>Is it Leslie Show or William Lau? @lausecurity</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="53167193" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/1f0288e0-0d3a-4c54-af41-3247c45c5867/audio/4a4fb366-da62-4891-ac00-75609a5fada5/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 35 - The Triple Unicorn</itunes:title>
      <itunes:author>Andrew Agnes, William Lau, Thom Langford, Javvad Malik</itunes:author>
      <itunes:duration>00:55:23</itunes:duration>
      <itunes:summary>Andy creates his own content, Javvad thinks 26 iPhones are cheap, and Thom hates the GSuite.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?  
</itunes:summary>
      <itunes:subtitle>Andy creates his own content, Javvad thinks 26 iPhones are cheap, and Thom hates the GSuite.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Industry News
Will we have a Little people today?  
</itunes:subtitle>
      <itunes:keywords>leslie chow, satire, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c58e7702-01a6-4cc5-8870-c51d5a9cc9de</guid>
      <title>Episode 34 - Black Friday Special</title>
      <description><![CDATA[<p>Trigger warning, this episode is over an hour long; do not time anything with the length of this episode.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>21st November 2008: The Conficker worm was first discovered. It spread quickly by exploiting a vulnerability that was addressed via the patch described in Microsoft's out-of-band bulletin MS08-067 four weeks prior. It infected millions of computers, at the time more than any worm since 2003.</p><p><a href="https://twitter.com/todayininfosec/status/1330292959766573056?s=20">https://twitter.com/todayininfosec/status/1330292959766573056?s=20</a></p><p>22nd November 1987: Chicago TV stations WGN and WTTW had their signals overridden in 2 separate incidents by a man in a Max Headroom mask. To this day, the perpetrator is unknown. The second incident was...uh...wow...just wow. It's a must-watch.  Video:<a href="https://t.co/5NLDMz8qIY?amp=1"> </a><a href="https://youtu.be/tWdgAMYjYSs">https://youtu.be/tWdgAMYjYSs</a></p><img src="https://lh6.googleusercontent.com/qUrVmWXBWJAVFztJflXvAYQr7gXi5Gjd5Yto93NydYJuAejReajOuY6wh2Vf3OT_aBf6X2-eZQ9S48AkXmUyfwu-glVjtidez5eL8sCU01486oSTKMjU8qFTPKDp_I1FiqDPpKBQ" /><p><a href="https://allthatsinteresting.com/max-headroom-hack">https://allthatsinteresting.com/max-headroom-hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1330512600539521027?s=20">https://twitter.com/todayininfosec/status/1330512600539521027?s=20</a></p><p>24th November 2014: The Washington Post published an article which included a picture of TSA master keys. As a result, a short time later functional keys were 3-d printed using the [unblurred] key patterns displayed in the picture.  <a href="https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html">https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1331385955916402690?s=20">https://twitter.com/todayininfosec/status/1331385955916402690?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/l18aoojBy8ZGXFzXc9P66HjMuBSObebZdeHgY-3lI0HKW6KtAjC1Cbt1GDnMaHaerop1WaJFn4DgWxj_UnsK8-hJNVofmcp51LjvQtxRZfWuvJwcn3QaNnpxV7qyfKlTP-RFuqBj" /><p><a href="https://twitter.com/geoffbelknap/status/1331690657170157568?s=20">https://twitter.com/geoffbelknap/status/1331690657170157568?s=20</a></p><p>An outage with Amazon's web infrastructure left smart-home enthusiasts unable to use basic household items.</p><p>Amazon Web Services is a huge part of the company's business and the backbone of the internet's most popular sites and services.</p><p>A widespread US outage late on Wednesday disrupted many of those services.</p><p>Robot vacuums and smart doorbells suddenly stopped working in people's homes.</p><p><a href="https://www.bbc.co.uk/news/technology-55087054">https://www.bbc.co.uk/news/technology-55087054</a></p><p>I Cut the 'Big Five' Tech Giants From My Life. It Was Hell</p><p><a href="https://gizmodo.com/i-cut-the-big-five-tech-giants-from-my-life-it-was-hel-1831304194">https://gizmodo.com/i-cut-the-big-five-tech-giants-from-my-life-it-was-hel-1831304194</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>A Hacker Nearly Stole $8 Million From An Aussie Hedge Fund Using A Fake Zoom Invite</p><p>A fake Zoom invite has led to the demise of a successful Sydney-based hedge fund and nearly cost it $8.7million after a hacker was able to send off fake invoices on behalf of the firm.</p><p>On Monday, the <a href="https://www.afr.com/companies/financial-services/fake-zoom-invite-cripples-aussie-hedge-fund-with-8m-hit-20201122-p56f9c">AFR reported</a> that Levitas Capital was forced to close after its major client Australian Catholic Super withdrew its funds in the wake of the September cyber attack.</p><p>The hedge fund's cyber investigators have pinpointed a fake Zoom invite opened by one of the fund's cofounders Michael Fagan or Michael Brookes.</p><p><a href="https://www.gizmodo.com.au/2020/11/a-hacker-nearly-stole-8-million-from-an-aussie-hedge-fund-using-a-fake-zoom-invite/">https://www.gizmodo.com.au/2020/11/a-hacker-nearly-stole-8-million-from-an-aussie-hedge-fund-using-a-fake-zoom-invite/</a></p><p> </p><p><a href="https://youtu.be/K1EmYxOJGKI"><strong>Lost All The Money!</strong></a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-pluton-processor/">Microsoft Announces Pluton Processor for Better Hardware Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-crypto-successes/">#ISSE2020: Focus on 2020's Crypto Successes Rather than Efforts to Break it</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-blackfriday-scams/">NCSC Issues Warning About Expected #BlackFriday Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/covid19-multi-cloud-adoption/">#COVID19 Drives Massive Multi-Cloud Adoption</a></p><p><a href="https://www.infosecurity-magazine.com/news/fines-reputation-public/">Fines Less of a Concern than Reputational Damage for Public Sector Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-depot-2014-breach/">Home Depot Settles with US States Over 2014 Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-online-four/">DDoS Attacks Against Online Retailers Increase Four-Fold During Pandemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/conduct-brexit-gdpr/">Defining Codes of Conduct to Enable Post Brexit GDPR Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/gdpr-successes-public-data/">GDPR Has Had Successes, Requires Public Knowledge of Data Spread</a></p><p> </p><p><strong>Javvad's Weekly News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/350000-spotify-users-targeted/">Up to 350,000 Spotify Users Targeted by Credential Stuffers</a></p><p><a href="https://www.terabitweb.com/2020/11/23/beware-of-black-friday-deals-that-are-too-good-to-be-true/">Beware of Black Friday Deals That Are Too Good To Be True</a></p><p><a href="https://www.cpomagazine.com/cyber-security/data-breach-of-online-kids-game-exposed-personal-data-of-46-million-parents-and-children/">Data Breach of Online Kids’ Game Exposed Personal Data of 46 Million Parents and Children</a></p><p><a href="https://www.toolbox.com/security/data-security/news/spotify-hit-by-credential-stuffing-attack-300k-accounts-vulnerable/?utm_source=twitter&utm_medium=social&utm_campaign=r8_251120_toolboxsocial&utm_term=diga">Spotify Hit by Credential Stuffing Attack, 300K+ Accounts Vulnerable</a></p><p><a href="https://clicklancashire.com/2020/11/25/fraud-operation-targets-spotify-users-with-leaked-database.html">Fraud Operation Targets Spotify Users With Leaked Database</a></p><p>Thom calling it:</p><p>Manchester United Investigating Cybersecurity Incident</p><p>UK Football Club Says No Evidence of Fan Data Being Breached</p><p><a href="https://www.databreachtoday.eu/manchester-united-investigating-cybersecurity-incident-a-15438">https://www.databreachtoday.eu/manchester-united-investigating-cybersecurity-incident-a-15438</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Leaked docs from inside Amazon’s Global Security Operations Center reveal company’s use of Pinkerton operatives—private intel—to spy on workers and the extensive monitoring of labor unions, environmental activists, and other social movements</p><p><a href="https://www.vice.com/en/article/5dp3yn/amazon-leaked-reports-expose-spying-warehouse-workers-labor-union-environmental-groups-social-movements">https://www.vice.com/en/article/5dp3yn/amazon-leaked-reports-expose-spying-warehouse-workers-labor-union-environmental-groups-social-movements</a></p><p><a href="https://twitter.com/josephfcox/status/1330924178875109376?s=20">https://twitter.com/josephfcox/status/1330924178875109376?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>This week we are joined by the opinionated but equally correct Tricia Howard @TriciaKicksSaaS</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 27 Nov 2020 15:30:08 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad Malik, Tricia Howard, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-34-black-friday-special-8GupArku</link>
      <content:encoded><![CDATA[<p>Trigger warning, this episode is over an hour long; do not time anything with the length of this episode.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>21st November 2008: The Conficker worm was first discovered. It spread quickly by exploiting a vulnerability that was addressed via the patch described in Microsoft's out-of-band bulletin MS08-067 four weeks prior. It infected millions of computers, at the time more than any worm since 2003.</p><p><a href="https://twitter.com/todayininfosec/status/1330292959766573056?s=20">https://twitter.com/todayininfosec/status/1330292959766573056?s=20</a></p><p>22nd November 1987: Chicago TV stations WGN and WTTW had their signals overridden in 2 separate incidents by a man in a Max Headroom mask. To this day, the perpetrator is unknown. The second incident was...uh...wow...just wow. It's a must-watch.  Video:<a href="https://t.co/5NLDMz8qIY?amp=1"> </a><a href="https://youtu.be/tWdgAMYjYSs">https://youtu.be/tWdgAMYjYSs</a></p><img src="https://lh6.googleusercontent.com/qUrVmWXBWJAVFztJflXvAYQr7gXi5Gjd5Yto93NydYJuAejReajOuY6wh2Vf3OT_aBf6X2-eZQ9S48AkXmUyfwu-glVjtidez5eL8sCU01486oSTKMjU8qFTPKDp_I1FiqDPpKBQ" /><p><a href="https://allthatsinteresting.com/max-headroom-hack">https://allthatsinteresting.com/max-headroom-hack</a></p><p><a href="https://twitter.com/todayininfosec/status/1330512600539521027?s=20">https://twitter.com/todayininfosec/status/1330512600539521027?s=20</a></p><p>24th November 2014: The Washington Post published an article which included a picture of TSA master keys. As a result, a short time later functional keys were 3-d printed using the [unblurred] key patterns displayed in the picture.  <a href="https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html">https://www.washingtonpost.com/local/trafficandcommuting/where-oh-where-did-my-luggage-go/2014/11/24/16d168c6-69da-11e4-a31c-77759fc1eacc_story.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1331385955916402690?s=20">https://twitter.com/todayininfosec/status/1331385955916402690?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/l18aoojBy8ZGXFzXc9P66HjMuBSObebZdeHgY-3lI0HKW6KtAjC1Cbt1GDnMaHaerop1WaJFn4DgWxj_UnsK8-hJNVofmcp51LjvQtxRZfWuvJwcn3QaNnpxV7qyfKlTP-RFuqBj" /><p><a href="https://twitter.com/geoffbelknap/status/1331690657170157568?s=20">https://twitter.com/geoffbelknap/status/1331690657170157568?s=20</a></p><p>An outage with Amazon's web infrastructure left smart-home enthusiasts unable to use basic household items.</p><p>Amazon Web Services is a huge part of the company's business and the backbone of the internet's most popular sites and services.</p><p>A widespread US outage late on Wednesday disrupted many of those services.</p><p>Robot vacuums and smart doorbells suddenly stopped working in people's homes.</p><p><a href="https://www.bbc.co.uk/news/technology-55087054">https://www.bbc.co.uk/news/technology-55087054</a></p><p>I Cut the 'Big Five' Tech Giants From My Life. It Was Hell</p><p><a href="https://gizmodo.com/i-cut-the-big-five-tech-giants-from-my-life-it-was-hel-1831304194">https://gizmodo.com/i-cut-the-big-five-tech-giants-from-my-life-it-was-hel-1831304194</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>A Hacker Nearly Stole $8 Million From An Aussie Hedge Fund Using A Fake Zoom Invite</p><p>A fake Zoom invite has led to the demise of a successful Sydney-based hedge fund and nearly cost it $8.7million after a hacker was able to send off fake invoices on behalf of the firm.</p><p>On Monday, the <a href="https://www.afr.com/companies/financial-services/fake-zoom-invite-cripples-aussie-hedge-fund-with-8m-hit-20201122-p56f9c">AFR reported</a> that Levitas Capital was forced to close after its major client Australian Catholic Super withdrew its funds in the wake of the September cyber attack.</p><p>The hedge fund's cyber investigators have pinpointed a fake Zoom invite opened by one of the fund's cofounders Michael Fagan or Michael Brookes.</p><p><a href="https://www.gizmodo.com.au/2020/11/a-hacker-nearly-stole-8-million-from-an-aussie-hedge-fund-using-a-fake-zoom-invite/">https://www.gizmodo.com.au/2020/11/a-hacker-nearly-stole-8-million-from-an-aussie-hedge-fund-using-a-fake-zoom-invite/</a></p><p> </p><p><a href="https://youtu.be/K1EmYxOJGKI"><strong>Lost All The Money!</strong></a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-pluton-processor/">Microsoft Announces Pluton Processor for Better Hardware Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-crypto-successes/">#ISSE2020: Focus on 2020's Crypto Successes Rather than Efforts to Break it</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-blackfriday-scams/">NCSC Issues Warning About Expected #BlackFriday Scams</a></p><p><a href="https://www.infosecurity-magazine.com/news/covid19-multi-cloud-adoption/">#COVID19 Drives Massive Multi-Cloud Adoption</a></p><p><a href="https://www.infosecurity-magazine.com/news/fines-reputation-public/">Fines Less of a Concern than Reputational Damage for Public Sector Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/home-depot-2014-breach/">Home Depot Settles with US States Over 2014 Data Breach</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-online-four/">DDoS Attacks Against Online Retailers Increase Four-Fold During Pandemic</a></p><p><a href="https://www.infosecurity-magazine.com/news/conduct-brexit-gdpr/">Defining Codes of Conduct to Enable Post Brexit GDPR Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/gdpr-successes-public-data/">GDPR Has Had Successes, Requires Public Knowledge of Data Spread</a></p><p> </p><p><strong>Javvad's Weekly News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/350000-spotify-users-targeted/">Up to 350,000 Spotify Users Targeted by Credential Stuffers</a></p><p><a href="https://www.terabitweb.com/2020/11/23/beware-of-black-friday-deals-that-are-too-good-to-be-true/">Beware of Black Friday Deals That Are Too Good To Be True</a></p><p><a href="https://www.cpomagazine.com/cyber-security/data-breach-of-online-kids-game-exposed-personal-data-of-46-million-parents-and-children/">Data Breach of Online Kids’ Game Exposed Personal Data of 46 Million Parents and Children</a></p><p><a href="https://www.toolbox.com/security/data-security/news/spotify-hit-by-credential-stuffing-attack-300k-accounts-vulnerable/?utm_source=twitter&utm_medium=social&utm_campaign=r8_251120_toolboxsocial&utm_term=diga">Spotify Hit by Credential Stuffing Attack, 300K+ Accounts Vulnerable</a></p><p><a href="https://clicklancashire.com/2020/11/25/fraud-operation-targets-spotify-users-with-leaked-database.html">Fraud Operation Targets Spotify Users With Leaked Database</a></p><p>Thom calling it:</p><p>Manchester United Investigating Cybersecurity Incident</p><p>UK Football Club Says No Evidence of Fan Data Being Breached</p><p><a href="https://www.databreachtoday.eu/manchester-united-investigating-cybersecurity-incident-a-15438">https://www.databreachtoday.eu/manchester-united-investigating-cybersecurity-incident-a-15438</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Leaked docs from inside Amazon’s Global Security Operations Center reveal company’s use of Pinkerton operatives—private intel—to spy on workers and the extensive monitoring of labor unions, environmental activists, and other social movements</p><p><a href="https://www.vice.com/en/article/5dp3yn/amazon-leaked-reports-expose-spying-warehouse-workers-labor-union-environmental-groups-social-movements">https://www.vice.com/en/article/5dp3yn/amazon-leaked-reports-expose-spying-warehouse-workers-labor-union-environmental-groups-social-movements</a></p><p><a href="https://twitter.com/josephfcox/status/1330924178875109376?s=20">https://twitter.com/josephfcox/status/1330924178875109376?s=20</a></p><p> </p><p><strong>The Little People</strong></p><p>This week we are joined by the opinionated but equally correct Tricia Howard @TriciaKicksSaaS</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="61513885" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/14613dcf-0fbd-4ae5-bb76-68752a6da815/audio/df23dc2f-42b4-480d-9c81-2d6da0d9e8cd/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 34 - Black Friday Special</itunes:title>
      <itunes:author>Thom Langford, Javvad Malik, Tricia Howard, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b3c86b92-4061-4539-80a9-446b6c2084ee/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:04:05</itunes:duration>
      <itunes:summary>Episode 34. Andy sees a squirrel, Jav gets angered by a random friendly stranger, and Thom takes delivery of the wrong colour MacBook Pro. Oh the humanity!

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Jav’s new feature
Will we have a Little people today?  </itunes:summary>
      <itunes:subtitle>Episode 34. Andy sees a squirrel, Jav gets angered by a random friendly stranger, and Thom takes delivery of the wrong colour MacBook Pro. Oh the humanity!

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Jav’s new feature
Will we have a Little people today?  </itunes:subtitle>
      <itunes:keywords>friendly joggers, squirrels, silver macbook pro, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6ece7d66-d475-416b-b171-9c9e5ad61425</guid>
      <title>Episode 33 - Went Wrong Right From The Beginning</title>
      <description><![CDATA[<p>Join us for possibly the most incompetently performed and produced infosec podcast available today. At least we have some of your favourites to share and enjoy:</p><img src="https://lh4.googleusercontent.com/YP6Q3D4kMVEefaZLWxtq7kxG50_MR3A_JYmV0IrkFwYVgw3ppR9fwmOz5J0gktFiaJ2DtE-yMMT9yQpArXFl5kQ2xNfLZlk5mvOqa-ZZ0BVgYfcb94ii_A5Hp_o398ns7qtCB46N" /><p> </p><p><strong>This week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>14th November 1990: During an NBC News broadcast, two computer hackers from the hacker group MOD identified only by the aliases "Acid Phreak", "Phiber Optik" and “Scorpion” took responsibility for posting the "Happy Thanksgiving" message on the Learning Link's system after destroying data on it.</p><img src="https://lh6.googleusercontent.com/0tz_Nroryivc9m3WDTZdUf5lFIJcSXnEA_aeJz5nQw4Z0nMCpUvq6UZS6WoBgBBI4mcZbb-8c8R7rB8DMz-qVpEdKGX_EMw_uDaTrF0KtEzlPbwQHT8huJkhDevoHqe7Xnl1DpGF" /><p><a href="https://twitter.com/todayininfosec/status/1327615750564179970?s=20">https://twitter.com/todayininfosec/status/1327615750564179970?s=20</a></p><p>16th November 2000: The FBI released a second batch of documents related to its Carnivore email surveillance program as a result of a FOIA request by EPIC.</p><p><a href="https://www.cnet.com/news/new-documents-shed-more-light-on-fbis-carnivore/">https://www.cnet.com/news/new-documents-shed-more-light-on-fbis-carnivore/</a></p><p><a href="https://twitter.com/todayininfosec/status/1328481891901726721?s=20">https://twitter.com/todayininfosec/status/1328481891901726721?s=20</a></p><p> </p><p>Tweet of the Week</p><img src="https://lh3.googleusercontent.com/DNmDB-3u0jJAQt0DOo_uuJzB55ueR5jiiPThLBiF8rz8_RD2U8KYOR6VUOrLHLAiuxzReXslB-cZRgWzv7Q1ZcxjvMxTu1jqKAnmJFkRSeNZSQ7aJUwl__aCKOZgHMnqWWwPbZJi" /><p><a href="https://twitter.com/lapcatsoftware/status/1326990296412991489?s=20">https://twitter.com/lapcatsoftware/status/1326990296412991489?s=20</a></p><p><a href="https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/">https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/</a></p><p><a href="https://appleinsider.com/articles/20/11/15/big-sur-telling-apple-what-app-youve-opened-isnt-a-security-or-privacy-issue">https://appleinsider.com/articles/20/11/15/big-sur-telling-apple-what-app-youve-opened-isnt-a-security-or-privacy-issue</a></p><p> </p><p>Billy Big Balls of the Week</p><p>Timothy John Watson of Ransom, West Virginia, was arrested by federal agents this week for selling full-auto AR-15 sears disguised as “portable wall hangers” from a website dubbed <a href="https://www.portablewallhanger.com/">portablewallhanger.com</a> (still up as of 11/5 @ 2:07PM).</p><p>The product is ostensibly designed to hang keys, lanyards, and other small objects in a place where they can be easily accessed because, according to the site, “searching for your keys really sucks!”</p><p>They even provide a helpful assembly video.</p><p><a href="https://www.gunsamerica.com/digest/man-selling-full-auto-ar-15-sears-as-portable-wall-hangers/">https://www.gunsamerica.com/digest/man-selling-full-auto-ar-15-sears-as-portable-wall-hangers/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-reliant-data/">IT Leaders Reliant on Data for Threat Insight</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-decentralized-identity/">#ISSE2020: Look to Decentralized (Rather than Legacy) Identity Approvals</a></p><p><a href="https://www.infosecurity-magazine.com/news/employees-access-files/">Employees Have Access to an Average of 10 Million Files</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-digital-identity/">#ISSE2020: ‘Real’ Digital Identity Can Exist with New Technology</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-legacy-malware-2021/">Increase in Ransomware Sophistication and Leverage of Legacy Malware Predicted for 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/dxpsummit-quarantine-ransomware/">#DxPsummit: Use Quarantine in Your Ransomware Recovery</a></p><p><a href="https://www.infosecurity-magazine.com/news/dxpsummit-how-zoom-met-2020s/">#DxPsummit: How Zoom Met 2020’s Security Challenges</a></p><p><a href="https://www.infosecurity-magazine.com/news/mod-funding-cyber-spending/">MoD Receives Funding Boost and Confirms Increase in Cyber-Spending</a></p><p> </p><p><strong>Javvad's Weekly Stories</strong></p><p><a href="https://www.verdict.co.uk/lazarus-malware-supply-chain/">Lazarus malware deployed in South Korea supply chain hack</a></p><p><a href="https://siliconangle.com/2020/11/15/data-belonging-27-7m-texas-drivers-stolen-latest-case-unsecured-storage/">Data belonging to 27.7M Texas drivers stolen in latest case of unsecured storage</a></p><p><a href="https://threatpost.com/animal-jam-hack-data-breach/161177/">Animal Jam Hacked, 46M Records Roam the Dark Web</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>A Muslim prayer app with over 98 million downloads is one of the apps connected to a wide-ranging supply chain that sends ordinary people's personal data to brokers, contractors, and the military.</p><p><a href="https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x">https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x</a></p><p> </p><p><strong>The Little People</strong></p><p>Seriously? You honestly thought Jav could get a hot-trick of these together? Jog on! </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 20 Nov 2020 16:05:50 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-33-went-wrong-right-from-the-beginning-QRFOYsd_</link>
      <content:encoded><![CDATA[<p>Join us for possibly the most incompetently performed and produced infosec podcast available today. At least we have some of your favourites to share and enjoy:</p><img src="https://lh4.googleusercontent.com/YP6Q3D4kMVEefaZLWxtq7kxG50_MR3A_JYmV0IrkFwYVgw3ppR9fwmOz5J0gktFiaJ2DtE-yMMT9yQpArXFl5kQ2xNfLZlk5mvOqa-ZZ0BVgYfcb94ii_A5Hp_o398ns7qtCB46N" /><p> </p><p><strong>This week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>14th November 1990: During an NBC News broadcast, two computer hackers from the hacker group MOD identified only by the aliases "Acid Phreak", "Phiber Optik" and “Scorpion” took responsibility for posting the "Happy Thanksgiving" message on the Learning Link's system after destroying data on it.</p><img src="https://lh6.googleusercontent.com/0tz_Nroryivc9m3WDTZdUf5lFIJcSXnEA_aeJz5nQw4Z0nMCpUvq6UZS6WoBgBBI4mcZbb-8c8R7rB8DMz-qVpEdKGX_EMw_uDaTrF0KtEzlPbwQHT8huJkhDevoHqe7Xnl1DpGF" /><p><a href="https://twitter.com/todayininfosec/status/1327615750564179970?s=20">https://twitter.com/todayininfosec/status/1327615750564179970?s=20</a></p><p>16th November 2000: The FBI released a second batch of documents related to its Carnivore email surveillance program as a result of a FOIA request by EPIC.</p><p><a href="https://www.cnet.com/news/new-documents-shed-more-light-on-fbis-carnivore/">https://www.cnet.com/news/new-documents-shed-more-light-on-fbis-carnivore/</a></p><p><a href="https://twitter.com/todayininfosec/status/1328481891901726721?s=20">https://twitter.com/todayininfosec/status/1328481891901726721?s=20</a></p><p> </p><p>Tweet of the Week</p><img src="https://lh3.googleusercontent.com/DNmDB-3u0jJAQt0DOo_uuJzB55ueR5jiiPThLBiF8rz8_RD2U8KYOR6VUOrLHLAiuxzReXslB-cZRgWzv7Q1ZcxjvMxTu1jqKAnmJFkRSeNZSQ7aJUwl__aCKOZgHMnqWWwPbZJi" /><p><a href="https://twitter.com/lapcatsoftware/status/1326990296412991489?s=20">https://twitter.com/lapcatsoftware/status/1326990296412991489?s=20</a></p><p><a href="https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/">https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/</a></p><p><a href="https://appleinsider.com/articles/20/11/15/big-sur-telling-apple-what-app-youve-opened-isnt-a-security-or-privacy-issue">https://appleinsider.com/articles/20/11/15/big-sur-telling-apple-what-app-youve-opened-isnt-a-security-or-privacy-issue</a></p><p> </p><p>Billy Big Balls of the Week</p><p>Timothy John Watson of Ransom, West Virginia, was arrested by federal agents this week for selling full-auto AR-15 sears disguised as “portable wall hangers” from a website dubbed <a href="https://www.portablewallhanger.com/">portablewallhanger.com</a> (still up as of 11/5 @ 2:07PM).</p><p>The product is ostensibly designed to hang keys, lanyards, and other small objects in a place where they can be easily accessed because, according to the site, “searching for your keys really sucks!”</p><p>They even provide a helpful assembly video.</p><p><a href="https://www.gunsamerica.com/digest/man-selling-full-auto-ar-15-sears-as-portable-wall-hangers/">https://www.gunsamerica.com/digest/man-selling-full-auto-ar-15-sears-as-portable-wall-hangers/</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/it-leaders-reliant-data/">IT Leaders Reliant on Data for Threat Insight</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-decentralized-identity/">#ISSE2020: Look to Decentralized (Rather than Legacy) Identity Approvals</a></p><p><a href="https://www.infosecurity-magazine.com/news/employees-access-files/">Employees Have Access to an Average of 10 Million Files</a></p><p><a href="https://www.infosecurity-magazine.com/news/isse2020-digital-identity/">#ISSE2020: ‘Real’ Digital Identity Can Exist with New Technology</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-legacy-malware-2021/">Increase in Ransomware Sophistication and Leverage of Legacy Malware Predicted for 2021</a></p><p><a href="https://www.infosecurity-magazine.com/news/dxpsummit-quarantine-ransomware/">#DxPsummit: Use Quarantine in Your Ransomware Recovery</a></p><p><a href="https://www.infosecurity-magazine.com/news/dxpsummit-how-zoom-met-2020s/">#DxPsummit: How Zoom Met 2020’s Security Challenges</a></p><p><a href="https://www.infosecurity-magazine.com/news/mod-funding-cyber-spending/">MoD Receives Funding Boost and Confirms Increase in Cyber-Spending</a></p><p> </p><p><strong>Javvad's Weekly Stories</strong></p><p><a href="https://www.verdict.co.uk/lazarus-malware-supply-chain/">Lazarus malware deployed in South Korea supply chain hack</a></p><p><a href="https://siliconangle.com/2020/11/15/data-belonging-27-7m-texas-drivers-stolen-latest-case-unsecured-storage/">Data belonging to 27.7M Texas drivers stolen in latest case of unsecured storage</a></p><p><a href="https://threatpost.com/animal-jam-hack-data-breach/161177/">Animal Jam Hacked, 46M Records Roam the Dark Web</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>A Muslim prayer app with over 98 million downloads is one of the apps connected to a wide-ranging supply chain that sends ordinary people's personal data to brokers, contractors, and the military.</p><p><a href="https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x">https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x</a></p><p> </p><p><strong>The Little People</strong></p><p>Seriously? You honestly thought Jav could get a hot-trick of these together? Jog on! </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55878542" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/c6410dff-8496-463f-be46-dea86be506be/audio/96931ab9-c6a0-483f-82cd-6c3169b15178/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 33 - Went Wrong Right From The Beginning</itunes:title>
      <itunes:author>Andrew Agnes, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/aaa1d3f7-7842-49e0-bf5c-c08a9df715d6/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:12</itunes:duration>
      <itunes:summary>Episode 33 went wrong right from the beginning. Technical issues abound but the post-production work salvaged it. Mostly. Your regular features:
This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the Week
Jav’s New Feature
Will we have a Little people today?  
</itunes:summary>
      <itunes:subtitle>Episode 33 went wrong right from the beginning. Technical issues abound but the post-production work salvaged it. Mostly. Your regular features:
This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the Week
Jav’s New Feature
Will we have a Little people today?  
</itunes:subtitle>
      <itunes:keywords>host unknown, sentinel one, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">33203852-abb0-4393-8320-b73d246aa4ca</guid>
      <title>Episode 32 - Let&apos;s Just Eat Some Haribo!</title>
      <description><![CDATA[<p> Haribo feature heavily this week, with Andy and Jav fighting over how much and how they should be delivered.</p><p><strong>This Week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>5th November 1993: The Bugtraq mailing list was created by Scott Chasin.</p><p>In 1995 it became the property of SecurityFocus, in 2002 Symantec acquired SecurityFocus, and the last message was posted to the list on February 25th, 2020, with no explanation from Symantec.<a href="https://t.co/vPkfveEtTs?amp=1"> </a><a href="https://en.m.wikipedia.org/wiki/Bugtraq">https://en.m.wikipedia.org/wiki/Bugtraq</a></p><p><a href="https://twitter.com/todayininfosec/status/1324497907245109248?s=20">https://twitter.com/todayininfosec/status/1324497907245109248?s=20</a></p><p>13th November 2012: John McAfee went into hiding because his neighbor Gregory Faull was found dead from a gunshot the day before. Belize police wanted McAfee to come in for questioning, but McAfee stated the police were “out to get him”.</p><p><a href="https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder">https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder</a></p><p><a href="https://twitter.com/todayininfosec/status/1326993312247656451?s=20">https://twitter.com/todayininfosec/status/1326993312247656451?s=20</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Chris Nikic becomes first person with Down's syndrome to finish an Ironman triathlon</p><p><a href="https://www.bbc.co.uk/sport/triathlon/54869998">https://www.bbc.co.uk/sport/triathlon/54869998</a></p><p>Please consider donating here:</p><p><a href="https://www.charityextra.com/noahsarkmoments">https://www.charityextra.com/noahsarkmoments</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Ransomware Group Turns to Facebook Ads</p><p><a href="https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads">https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads</a></p><p>Mark Zuckerberg defends not suspending Steve Bannon from Facebook </p><p><a href="https://www.theguardian.com/technology/2020/nov/12/mark-zuckerberg-steve-bannon-facebook-fauci-ban">https://www.theguardian.com/technology/2020/nov/12/mark-zuckerberg-steve-bannon-facebook-fauci-ban</a></p><img src="https://lh5.googleusercontent.com/Q-OmWK2yGT953MIywRnecJ7rz9V5AM0ApuAB3wT68I0khzrJqQ8p9B1DBcbK1LMUSMundztvIIRusSNBGM_BvgWTEEVWbGFwdZ0CvDe174EbzfL8RvpmvGaxM7GUg4eEvx5L8O5H" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news-features/rise-identity-anonymity/">Has the Rise of Identity Seen the Death of Anonymity?</a></p><p><a href="https://www.infosecurity-magazine.com/news/price-educational-rdp/">Price Dropped on Hacked Educational RDP Details</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-ssl-attacks/">Malicious Use of SSL Increases as Attackers Deploy Hidden Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-ddos-rdos/">#EdgeLive: DDoS Attacks Are Evolving into Extortion-Led RDoS Campaigns</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-api-bot-mitigation/">#EdgeLive: Stopping API Attacks with Bot Mitigation</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/top-ten-learned-isc2-study/">Top Ten: Things Learned from the (ISC)2 Workforce Study</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-phishing-targeting/">#EdgeLive: Phishing Attacks Now Targeting Enterprise Specifics</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/psd2-delays-compliance/">PSD2 Faces Further Delays as UK Lags Behind European Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-data-protection-transfers/">Recommendations Accepted in Advancement for EU Data Protection Transfers</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/phil_branigan1/status/1324761080762163203?s=20">https://twitter.com/phil_branigan1/status/1324761080762163203?s=20</a></p><img src="https://lh6.googleusercontent.com/irjc-S3IdJpUR3f1Us4CfMhVVseZ8zHkvAR7dX2EiLu_yXv4Qdzkp1j9wYYaa4JsBo0j8NbaTg0NQP9XXj0X8z3q9nG_uiuFFii9rZ3HqgwQRMnrHQql9n85iQ9iuY12N3eL4MQ9" /><p>But also a story brought to our attention by @mat: </p><p>Google Photos is ending unlimited storage and people are not happy</p><p><a href="https://mashable.com/article/google-photos-ends-unlimited-free-storage/?europe=true">https://mashable.com/article/google-photos-ends-unlimited-free-storage/?europe=true</a></p><img src="https://lh5.googleusercontent.com/fvV2Z2h66yqDs80RwtDbSwVmEngBXqri9D1xAOXO3XEywFRxx6SVUgF-0xIHafiO7I3DlIu6JAJF3elkzFiu4O3qtdNlFciNFPSq7E4S7GNWQmxkpFi1h7QFgBdzcc1tXg4s7BL7" /><p><a href="https://twitter.com/mat/status/1326593729860231168?s=20">https://twitter.com/mat/status/1326593729860231168?s=20</a></p><p> </p><p>The Little People</p><p>The marvellously moustachioed Christian Toon</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 13 Nov 2020 13:49:15 +0000</pubDate>
      <author>thom@tl2security.com (Chyristian Toon, Javvad Malik, Thom Langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-32-lets-just-eat-some-haribo-QYV2glB9</link>
      <content:encoded><![CDATA[<p> Haribo feature heavily this week, with Andy and Jav fighting over how much and how they should be delivered.</p><p><strong>This Week in InfoSec</strong></p><p>(Liberated from the “today in infosec” twitter account):</p><p>5th November 1993: The Bugtraq mailing list was created by Scott Chasin.</p><p>In 1995 it became the property of SecurityFocus, in 2002 Symantec acquired SecurityFocus, and the last message was posted to the list on February 25th, 2020, with no explanation from Symantec.<a href="https://t.co/vPkfveEtTs?amp=1"> </a><a href="https://en.m.wikipedia.org/wiki/Bugtraq">https://en.m.wikipedia.org/wiki/Bugtraq</a></p><p><a href="https://twitter.com/todayininfosec/status/1324497907245109248?s=20">https://twitter.com/todayininfosec/status/1324497907245109248?s=20</a></p><p>13th November 2012: John McAfee went into hiding because his neighbor Gregory Faull was found dead from a gunshot the day before. Belize police wanted McAfee to come in for questioning, but McAfee stated the police were “out to get him”.</p><p><a href="https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder">https://www.theguardian.com/world/2012/nov/14/john-mcafee-hiding-businessman-murder</a></p><p><a href="https://twitter.com/todayininfosec/status/1326993312247656451?s=20">https://twitter.com/todayininfosec/status/1326993312247656451?s=20</a></p><p> </p><p><strong>Billy Big Balls</strong></p><p>Chris Nikic becomes first person with Down's syndrome to finish an Ironman triathlon</p><p><a href="https://www.bbc.co.uk/sport/triathlon/54869998">https://www.bbc.co.uk/sport/triathlon/54869998</a></p><p>Please consider donating here:</p><p><a href="https://www.charityextra.com/noahsarkmoments">https://www.charityextra.com/noahsarkmoments</a></p><p> </p><p><strong>Rant of the Week</strong></p><p>Ransomware Group Turns to Facebook Ads</p><p><a href="https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads">https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads</a></p><p>Mark Zuckerberg defends not suspending Steve Bannon from Facebook </p><p><a href="https://www.theguardian.com/technology/2020/nov/12/mark-zuckerberg-steve-bannon-facebook-fauci-ban">https://www.theguardian.com/technology/2020/nov/12/mark-zuckerberg-steve-bannon-facebook-fauci-ban</a></p><img src="https://lh5.googleusercontent.com/Q-OmWK2yGT953MIywRnecJ7rz9V5AM0ApuAB3wT68I0khzrJqQ8p9B1DBcbK1LMUSMundztvIIRusSNBGM_BvgWTEEVWbGFwdZ0CvDe174EbzfL8RvpmvGaxM7GUg4eEvx5L8O5H" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news-features/rise-identity-anonymity/">Has the Rise of Identity Seen the Death of Anonymity?</a></p><p><a href="https://www.infosecurity-magazine.com/news/price-educational-rdp/">Price Dropped on Hacked Educational RDP Details</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-ssl-attacks/">Malicious Use of SSL Increases as Attackers Deploy Hidden Attacks</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-ddos-rdos/">#EdgeLive: DDoS Attacks Are Evolving into Extortion-Led RDoS Campaigns</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-api-bot-mitigation/">#EdgeLive: Stopping API Attacks with Bot Mitigation</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/top-ten-learned-isc2-study/">Top Ten: Things Learned from the (ISC)2 Workforce Study</a></p><p><a href="https://www.infosecurity-magazine.com/news/edgelive-phishing-targeting/">#EdgeLive: Phishing Attacks Now Targeting Enterprise Specifics</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/psd2-delays-compliance/">PSD2 Faces Further Delays as UK Lags Behind European Compliance</a></p><p><a href="https://www.infosecurity-magazine.com/news/eu-data-protection-transfers/">Recommendations Accepted in Advancement for EU Data Protection Transfers</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/phil_branigan1/status/1324761080762163203?s=20">https://twitter.com/phil_branigan1/status/1324761080762163203?s=20</a></p><img src="https://lh6.googleusercontent.com/irjc-S3IdJpUR3f1Us4CfMhVVseZ8zHkvAR7dX2EiLu_yXv4Qdzkp1j9wYYaa4JsBo0j8NbaTg0NQP9XXj0X8z3q9nG_uiuFFii9rZ3HqgwQRMnrHQql9n85iQ9iuY12N3eL4MQ9" /><p>But also a story brought to our attention by @mat: </p><p>Google Photos is ending unlimited storage and people are not happy</p><p><a href="https://mashable.com/article/google-photos-ends-unlimited-free-storage/?europe=true">https://mashable.com/article/google-photos-ends-unlimited-free-storage/?europe=true</a></p><img src="https://lh5.googleusercontent.com/fvV2Z2h66yqDs80RwtDbSwVmEngBXqri9D1xAOXO3XEywFRxx6SVUgF-0xIHafiO7I3DlIu6JAJF3elkzFiu4O3qtdNlFciNFPSq7E4S7GNWQmxkpFi1h7QFgBdzcc1tXg4s7BL7" /><p><a href="https://twitter.com/mat/status/1326593729860231168?s=20">https://twitter.com/mat/status/1326593729860231168?s=20</a></p><p> </p><p>The Little People</p><p>The marvellously moustachioed Christian Toon</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55878542" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/983915b1-fbcb-4e04-b44a-b6baa58d135f/audio/905f6b5a-8d9c-428e-95e2-61e0ab07a66c/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 32 - Let&apos;s Just Eat Some Haribo!</itunes:title>
      <itunes:author>Chyristian Toon, Javvad Malik, Thom Langford, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/e458c0c6-fcb4-47e7-83d2-52ab702cab5b/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:12</itunes:duration>
      <itunes:summary>The MP4/MP3 Format wars continue apace. Ground is gained on both sides, but an impasse is the only inevitable end.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Will we have a Little people today?  </itunes:summary>
      <itunes:subtitle>The MP4/MP3 Format wars continue apace. Ground is gained on both sides, but an impasse is the only inevitable end.

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
Will we have a Little people today?  </itunes:subtitle>
      <itunes:keywords>haribo, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c0991f1-f2da-4b71-8625-195beffd40a9</guid>
      <title>Episode 31 - Just Embarrassed Ourselves Really</title>
      <description><![CDATA[<p> The fourth member of the Host Unknown trio, Carole Theriault, joins the podcast to bring an air of respectability to proceedings. Needless to say it was an uphill struggle. </p><p>This weeks show brings you, dear listener:</p><p><strong>Smut or Security</strong></p><p>Do you know the difference between your smut and your security?</p><p> </p><p><strong>This Week in InfoSec</strong></p><p> (Liberated from the “today in infosec” twitter account):</p><p>30th October 2001:  The author of the Nimda worm released a new variant that was functionally identical, but included a comment that it should be referred to as Concept Virus, not Nimda. It didn't happen - it got named Nimda.e. That’s right bitches.</p><img src="https://lh4.googleusercontent.com/l022f9ceNHXSUt4LFma7AVpfz5RV5eiFgdTIAgbUkGglhFhI2dbtaWkKkB1fNtNx1EVDv7VCEPy9qpnar_oOlMamwITWNznCrl-d-ABhUGlVROVfQfXWu2DmEwWkpkjC8BSgCsfj" /><p><a href="https://twitter.com/todayininfosec/status/1322141461949927424?s=20">https://twitter.com/todayininfosec/status/1322141461949927424?s=20</a></p><p>30th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</p><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/</a></p><p><a href="https://twitter.com/todayininfosec/status/1322306716114001920?s=20">https://twitter.com/todayininfosec/status/1322306716114001920?s=20</a></p><p>31st October 2005: Winternals researcher Mark Russinovich posted to his blog a detailed description and technical analysis of F4I's XCP software that he ascertained had been recently installed on his computer by a Sony BMG music CD.</p><p><a href="https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx">https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx</a></p><img src="https://lh6.googleusercontent.com/mpvVUoW2lMmA3jv9flFO2zzpLvBwS-81hFbK9XAlDwGjPF8sYtBQgrcsnH3DXiJDqVaeh4-bb3n-1IS0SlUEZzTVR7vlN_4vk0oTF66CpczFcro9nszjG9j4M6FL2Lrcp_4b2tgj" /><p><a href="https://twitter.com/todayininfosec/status/1322629012540157952?s=20">https://twitter.com/todayininfosec/status/1322629012540157952?s=20</a></p><p>2nd November 1988: The Morris worm spread like wildfire and was the first worm to get wide media attention.</p><p>After its author, Robert Tappan Morris, released his "experiment", it quickly spread and made many of the systems on the Internet unusable - an epoch for security...both good and bad. </p><p>It was one of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act.</p><p><a href="https://twitter.com/todayininfosec/status/1323248705164791814?s=20">https://twitter.com/todayininfosec/status/1323248705164791814?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>Flushing Away Preconceptions of Risk</p><p><a href="https://twitter.com/StevenShorrock/status/1323335595465318401?s=20">https://twitter.com/StevenShorrock/status/1323335595465318401?s=20</a></p><p><a href="https://www.independent.co.uk/news/uk/home-news/bacteria-toilets-flush-lid-closed-b1535481.html">https://www.independent.co.uk/news/uk/home-news/bacteria-toilets-flush-lid-closed-b1535481.html</a></p><p> </p><p><strong>Double Rant of the week #1</strong></p><p>The Poilce in the US struck a deal with Amazon to violate peoples Rings</p><p><a href="https://www.eff.org/deeplinks/2020/11/police-will-pilot-program-live-stream-amazon-ring-cameras">https://www.eff.org/deeplinks/2020/11/police-will-pilot-program-live-stream-amazon-ring-cameras</a></p><p>The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the security cameras, including Amazon Ring cameras, of participating residents.</p><p>While people buy Ring cameras and put them on their front door to keep their packages safe, police use them to build comprehensive CCTV camera networks blanketing whole neighborhoods. says the EFF</p><p>Only a few months ago, Jackson stood up for its residents, becoming the first city in the southern United States to <a href="https://www.jacksonfreepress.com/news/2020/aug/20/jackson-bans-facial-recognition-tech-new-airport-a/">ban police use</a> of face recognition technology. Clearly, this is a city that understands invasive surveillance technology when it sees it, and knows when police have overstepped their ability to invade privacy. </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ping-symphonic-boost-api-data/">Ping Identity Acquires Symphonic to Boost API and Data Security Offering</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-invest-controls/">Florida Invests in Security Controls Ahead of #Election2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-microsoft-accelerator/">NCSC Partners with Microsoft to Support Cyber Accelerator Program</a></p><p><a href="7baeb93556ed">Google Forms Used In Password-Stealing Spree: What You Need To Know</a></p><p> </p><p><strong>Double Rant of the week #2</strong></p><p>Carole's Nasty Tweet (no screenshot, the nob deleted it.</p><p> </p><p><strong>The Little People</strong></p><p>We were joined by Smashing Security's Terry Graham.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 6 Nov 2020 12:48:13 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Javvad Malik, Carole Theriault, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-31-just-embarrassed-ourselves-really-NyaCasIV</link>
      <content:encoded><![CDATA[<p> The fourth member of the Host Unknown trio, Carole Theriault, joins the podcast to bring an air of respectability to proceedings. Needless to say it was an uphill struggle. </p><p>This weeks show brings you, dear listener:</p><p><strong>Smut or Security</strong></p><p>Do you know the difference between your smut and your security?</p><p> </p><p><strong>This Week in InfoSec</strong></p><p> (Liberated from the “today in infosec” twitter account):</p><p>30th October 2001:  The author of the Nimda worm released a new variant that was functionally identical, but included a comment that it should be referred to as Concept Virus, not Nimda. It didn't happen - it got named Nimda.e. That’s right bitches.</p><img src="https://lh4.googleusercontent.com/l022f9ceNHXSUt4LFma7AVpfz5RV5eiFgdTIAgbUkGglhFhI2dbtaWkKkB1fNtNx1EVDv7VCEPy9qpnar_oOlMamwITWNznCrl-d-ABhUGlVROVfQfXWu2DmEwWkpkjC8BSgCsfj" /><p><a href="https://twitter.com/todayininfosec/status/1322141461949927424?s=20">https://twitter.com/todayininfosec/status/1322141461949927424?s=20</a></p><p>30th October 2013: Adobe revealed that a breach of 2.9 million customer accounts made public 3 weeks earlier actually affected 38 million users.</p><p><a href="https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/">https://nakedsecurity.sophos.com/2013/10/30/adobe-breach-thirteen-times-worse-than-thought-38-million-users-affected/</a></p><p><a href="https://twitter.com/todayininfosec/status/1322306716114001920?s=20">https://twitter.com/todayininfosec/status/1322306716114001920?s=20</a></p><p>31st October 2005: Winternals researcher Mark Russinovich posted to his blog a detailed description and technical analysis of F4I's XCP software that he ascertained had been recently installed on his computer by a Sony BMG music CD.</p><p><a href="https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx">https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx</a></p><img src="https://lh6.googleusercontent.com/mpvVUoW2lMmA3jv9flFO2zzpLvBwS-81hFbK9XAlDwGjPF8sYtBQgrcsnH3DXiJDqVaeh4-bb3n-1IS0SlUEZzTVR7vlN_4vk0oTF66CpczFcro9nszjG9j4M6FL2Lrcp_4b2tgj" /><p><a href="https://twitter.com/todayininfosec/status/1322629012540157952?s=20">https://twitter.com/todayininfosec/status/1322629012540157952?s=20</a></p><p>2nd November 1988: The Morris worm spread like wildfire and was the first worm to get wide media attention.</p><p>After its author, Robert Tappan Morris, released his "experiment", it quickly spread and made many of the systems on the Internet unusable - an epoch for security...both good and bad. </p><p>It was one of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act.</p><p><a href="https://twitter.com/todayininfosec/status/1323248705164791814?s=20">https://twitter.com/todayininfosec/status/1323248705164791814?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p>Flushing Away Preconceptions of Risk</p><p><a href="https://twitter.com/StevenShorrock/status/1323335595465318401?s=20">https://twitter.com/StevenShorrock/status/1323335595465318401?s=20</a></p><p><a href="https://www.independent.co.uk/news/uk/home-news/bacteria-toilets-flush-lid-closed-b1535481.html">https://www.independent.co.uk/news/uk/home-news/bacteria-toilets-flush-lid-closed-b1535481.html</a></p><p> </p><p><strong>Double Rant of the week #1</strong></p><p>The Poilce in the US struck a deal with Amazon to violate peoples Rings</p><p><a href="https://www.eff.org/deeplinks/2020/11/police-will-pilot-program-live-stream-amazon-ring-cameras">https://www.eff.org/deeplinks/2020/11/police-will-pilot-program-live-stream-amazon-ring-cameras</a></p><p>The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the security cameras, including Amazon Ring cameras, of participating residents.</p><p>While people buy Ring cameras and put them on their front door to keep their packages safe, police use them to build comprehensive CCTV camera networks blanketing whole neighborhoods. says the EFF</p><p>Only a few months ago, Jackson stood up for its residents, becoming the first city in the southern United States to <a href="https://www.jacksonfreepress.com/news/2020/aug/20/jackson-bans-facial-recognition-tech-new-airport-a/">ban police use</a> of face recognition technology. Clearly, this is a city that understands invasive surveillance technology when it sees it, and knows when police have overstepped their ability to invade privacy. </p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ping-symphonic-boost-api-data/">Ping Identity Acquires Symphonic to Boost API and Data Security Offering</a></p><p><a href="https://www.infosecurity-magazine.com/news/florida-invest-controls/">Florida Invests in Security Controls Ahead of #Election2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-microsoft-accelerator/">NCSC Partners with Microsoft to Support Cyber Accelerator Program</a></p><p><a href="7baeb93556ed">Google Forms Used In Password-Stealing Spree: What You Need To Know</a></p><p> </p><p><strong>Double Rant of the week #2</strong></p><p>Carole's Nasty Tweet (no screenshot, the nob deleted it.</p><p> </p><p><strong>The Little People</strong></p><p>We were joined by Smashing Security's Terry Graham.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57495626" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/444c6ad9-a259-4fac-b1ad-6d712f4a58f2/audio/b137b42b-c2f7-4e84-9c2b-6e4c4a1c551f/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 31 - Just Embarrassed Ourselves Really</itunes:title>
      <itunes:author>Andrew Agnes, Javvad Malik, Carole Theriault, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/9c3983a3-ca30-40c2-8890-ee3dcd6c3e1a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:53</itunes:duration>
      <itunes:summary>The boys are joined by the award winning podcaster Carole Theriault of Smashing Security and the wonderful Sticky Pickles podcast.

We play our new game &quot;Smut or Security?&quot; and after wiping ourselves off we get on with the regular show.

Smut or Security
This Week in InfoSec
Tweet of the Week
Double Rant of the week
Will we have a Little people today? 
</itunes:summary>
      <itunes:subtitle>The boys are joined by the award winning podcaster Carole Theriault of Smashing Security and the wonderful Sticky Pickles podcast.

We play our new game &quot;Smut or Security?&quot; and after wiping ourselves off we get on with the regular show.

Smut or Security
This Week in InfoSec
Tweet of the Week
Double Rant of the week
Will we have a Little people today? 
</itunes:subtitle>
      <itunes:keywords>smashing security, carole theriault, graham cluley, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d99b2bf7-a3d3-4eb4-82e7-def6552b8b22</guid>
      <title>Episode 30 - The Magic Number</title>
      <description><![CDATA[<p>Our presenters delve into their darkest secrets from the past,  the internet is rebooted, the logs cleared, and cats play havoc with your home security (according to your training programme).</p><p><strong>This week in Infosec</strong></p><p>24th October 2010: 2010: Eric Butler announced Firefox extension Firesheep's release at Toorcon, making HTTP session hijacking on open Wi-Fi trivial.</p><p>Today, by far, high traffic sites redirect HTTP requests by default - so 90% of Internet web traffic is encrypted. That long tail though? Sad face. </p><img src="https://lh3.googleusercontent.com/Hz7quYOhrW0yHMT031jPzMB0b5fCrTKrPWJxlar1tkDGxjPmqr3fSJHfroM9CNRKw8kHP5OHTBygJZZxVFR95P5ZuOnaS0d4aSJ-au5jCk5Al13C5PkuM8P1NydQbiFD8Uq2s5Hm" /><p><a href="https://twitter.com/todayininfosec/status/1320095119857561603?s=20">https://twitter.com/todayininfosec/status/1320095119857561603?s=20</a></p><p>27th October 1980: ARPANET ground to a halt because a bad status message propagated, causing all IMPs (routers) to exhaust memory. The solution? Reboot all IMPs! Yep, a reboot.</p><p>This incident was such a big deal that the case study of it was published as RFC 789.</p><p><a href="https://twitter.com/todayininfosec/status/1321054719863828481?s=20">https://twitter.com/todayininfosec/status/1321054719863828481?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/KathsBurgess/status/1321509257431449600?s=20">https://twitter.com/KathsBurgess/status/1321509257431449600?s=20</a></p><img src="https://lh6.googleusercontent.com/_6G_0KbAK5MihRSl1A0wycQUosUQ6vgKvfVPtUnUpB6t8DVgtL-s66916wGD3gdxFCoUy1ZIs1K5q7DIicu8GJf-T_4Ltax4rR0UH45MopqKOa5fMgdFwqq4aF9zqcF-rUjJIFBf" /><p>Very good awareness video:</p><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.huffingtonpost.co.uk/entry/no-woolworths-is-not-returning-to-the-uks-high-streets_uk_5f97f50ec5b6b74d85f459cc">https://www.huffingtonpost.co.uk/entry/no-woolworths-is-not-returning-to-the-uks-high-streets_uk_5f97f50ec5b6b74d85f459cc</a></p><p>Here to save 2020! Woolworths is coming back to your high street, as a physical store!</p><p>A couple of legal things to get sorted, but we’re full steam ahead at Woolworths HQ.</p><p>We want to get this right, so we need your help. What do you want at your UK <a href="https://twitter.com/hashtag/YourWoolworths?src=hash&ref_src=twsrc%5Etfw">#YourWoolworths</a>?</p><p><a href="https://www.standard.co.uk/news/uk/woolworths-reopening-prank-student-a4573379.html">https://www.standard.co.uk/news/uk/woolworths-reopening-prank-student-a4573379.html</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-sanctions-iran-russia/">US and UK Issue Sanctions to Iran and Russia</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-insider-disclosing/">Amazon Warns Users of Insider Disclosing Details to Third Party</a></p><p><a href="https://www.infosecurity-magazine.com/news/report-application-flaws/">Report: Application Flaws Being Fixed Faster Although Bugs Persist</a></p><p><a href="https://www.infosecurity-magazine.com/news/akamai-asavie-acqusition/">Akamai Boosts Mobile Security Offering with Asavie Acqusition</a></p><p> </p><p>Rant of the week</p><p><a href="https://www.theregister.com/2020/10/26/finland_psychotherapy_clinic_ransom_attack/">https://www.theregister.com/2020/10/26/finland_psychotherapy_clinic_ransom_attack/</a></p><p>A Finnish psychotherapy centre was hit by hackers who stole therapy session notes – before threatening patients of the clinic with ransom demands amid selective dark web leaks of stolen material.</p><p>"Psychotherapy Center Vastaamo has been the victim of data breaches and blackmail," said the Helsinki-based clinical chain <a href="https://vastaamo.fi/ajankohtaista/">late last week</a> (in Finnish), adding: "In recent days, the blackmailer has published sections of the information he obtained during the hacking. Now the blackmailer has begun to approach the victims of the breach with blackmail letters demanding a ransom."</p><p> </p><p>The Little People</p><p>Madelaine Howard of Cygenta and the NCSC</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 30 Oct 2020 11:57:25 +0000</pubDate>
      <author>thom@tl2security.com (Madelaine Howard, Thom Langford, Andrew Agnes, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-30-the-magic-number-3tsWuJfJ</link>
      <content:encoded><![CDATA[<p>Our presenters delve into their darkest secrets from the past,  the internet is rebooted, the logs cleared, and cats play havoc with your home security (according to your training programme).</p><p><strong>This week in Infosec</strong></p><p>24th October 2010: 2010: Eric Butler announced Firefox extension Firesheep's release at Toorcon, making HTTP session hijacking on open Wi-Fi trivial.</p><p>Today, by far, high traffic sites redirect HTTP requests by default - so 90% of Internet web traffic is encrypted. That long tail though? Sad face. </p><img src="https://lh3.googleusercontent.com/Hz7quYOhrW0yHMT031jPzMB0b5fCrTKrPWJxlar1tkDGxjPmqr3fSJHfroM9CNRKw8kHP5OHTBygJZZxVFR95P5ZuOnaS0d4aSJ-au5jCk5Al13C5PkuM8P1NydQbiFD8Uq2s5Hm" /><p><a href="https://twitter.com/todayininfosec/status/1320095119857561603?s=20">https://twitter.com/todayininfosec/status/1320095119857561603?s=20</a></p><p>27th October 1980: ARPANET ground to a halt because a bad status message propagated, causing all IMPs (routers) to exhaust memory. The solution? Reboot all IMPs! Yep, a reboot.</p><p>This incident was such a big deal that the case study of it was published as RFC 789.</p><p><a href="https://twitter.com/todayininfosec/status/1321054719863828481?s=20">https://twitter.com/todayininfosec/status/1321054719863828481?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/KathsBurgess/status/1321509257431449600?s=20">https://twitter.com/KathsBurgess/status/1321509257431449600?s=20</a></p><img src="https://lh6.googleusercontent.com/_6G_0KbAK5MihRSl1A0wycQUosUQ6vgKvfVPtUnUpB6t8DVgtL-s66916wGD3gdxFCoUy1ZIs1K5q7DIicu8GJf-T_4Ltax4rR0UH45MopqKOa5fMgdFwqq4aF9zqcF-rUjJIFBf" /><p>Very good awareness video:</p><p> </p><p><strong>Billy Big Balls</strong></p><p><a href="https://www.huffingtonpost.co.uk/entry/no-woolworths-is-not-returning-to-the-uks-high-streets_uk_5f97f50ec5b6b74d85f459cc">https://www.huffingtonpost.co.uk/entry/no-woolworths-is-not-returning-to-the-uks-high-streets_uk_5f97f50ec5b6b74d85f459cc</a></p><p>Here to save 2020! Woolworths is coming back to your high street, as a physical store!</p><p>A couple of legal things to get sorted, but we’re full steam ahead at Woolworths HQ.</p><p>We want to get this right, so we need your help. What do you want at your UK <a href="https://twitter.com/hashtag/YourWoolworths?src=hash&ref_src=twsrc%5Etfw">#YourWoolworths</a>?</p><p><a href="https://www.standard.co.uk/news/uk/woolworths-reopening-prank-student-a4573379.html">https://www.standard.co.uk/news/uk/woolworths-reopening-prank-student-a4573379.html</a></p><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/us-uk-sanctions-iran-russia/">US and UK Issue Sanctions to Iran and Russia</a></p><p><a href="https://www.infosecurity-magazine.com/news/amazon-insider-disclosing/">Amazon Warns Users of Insider Disclosing Details to Third Party</a></p><p><a href="https://www.infosecurity-magazine.com/news/report-application-flaws/">Report: Application Flaws Being Fixed Faster Although Bugs Persist</a></p><p><a href="https://www.infosecurity-magazine.com/news/akamai-asavie-acqusition/">Akamai Boosts Mobile Security Offering with Asavie Acqusition</a></p><p> </p><p>Rant of the week</p><p><a href="https://www.theregister.com/2020/10/26/finland_psychotherapy_clinic_ransom_attack/">https://www.theregister.com/2020/10/26/finland_psychotherapy_clinic_ransom_attack/</a></p><p>A Finnish psychotherapy centre was hit by hackers who stole therapy session notes – before threatening patients of the clinic with ransom demands amid selective dark web leaks of stolen material.</p><p>"Psychotherapy Center Vastaamo has been the victim of data breaches and blackmail," said the Helsinki-based clinical chain <a href="https://vastaamo.fi/ajankohtaista/">late last week</a> (in Finnish), adding: "In recent days, the blackmailer has published sections of the information he obtained during the hacking. Now the blackmailer has begun to approach the victims of the breach with blackmail letters demanding a ransom."</p><p> </p><p>The Little People</p><p>Madelaine Howard of Cygenta and the NCSC</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58208664" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/6c18f106-7354-4f41-bfee-26c3c100b9e5/audio/6cd13fbc-c5c0-4381-b842-520654d68558/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 30 - The Magic Number</itunes:title>
      <itunes:author>Madelaine Howard, Thom Langford, Andrew Agnes, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/d2ee81e3-f297-41fd-ada9-cb5ceddc54e3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:38</itunes:duration>
      <itunes:summary>Psychotherapy patients risk having their darkest secrets exposed, and that is just the presenters of this weeks podcast.

This Week in InfoSec
Tweet of the Week
Billy Big Balls
Rant of the week
Will we have a Little people today?  

</itunes:summary>
      <itunes:subtitle>Psychotherapy patients risk having their darkest secrets exposed, and that is just the presenters of this weeks podcast.

This Week in InfoSec
Tweet of the Week
Billy Big Balls
Rant of the week
Will we have a Little people today?  

</itunes:subtitle>
      <itunes:keywords>industry news, billy big balls, tweet of the week, host unknown, woolworths, the little people, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">67cc4e4c-1018-4bc6-9be1-a0811f5887ce</guid>
      <title>Episode 29 - Probably</title>
      <description><![CDATA[<p>Perhaps a total IQ of 197 is a little ambitious, as this podcast clearly shows:</p><p><strong>This Week in InfoSec</strong></p><p>20th October 1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Then<a href="https://twitter.com/dotMudge"> @dotMudge</a> sent a copy to<a href="https://twitter.com/aleph_one"> @aleph_one</a>, who wrote "Smashing the Stack For Fun and Profit" in 1996. Seminal paper to seminal paper.</p><p><a href="https://insecure.org/stf/mudge_buffer_overflow_tutorial.html">https://insecure.org/stf/mudge_buffer_overflow_tutorial.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1318551462000185353?s=20">https://twitter.com/todayininfosec/status/1318551462000185353?s=20</a></p><p>20th October 2006: IBM announced it had completed its acquisition of Internet Security Systems, Inc. (ISS).</p><p><a href="https://twitter.com/todayininfosec/status/1318652004894412808?s=20">https://twitter.com/todayininfosec/status/1318652004894412808?s=20</a></p><p>Billy Big Balls</p><p>Javvad wouldn't say who he chose this week...</p><p><a href="https://news.sky.com/story/goldman-snubs-2bn-darktrace-float-amid-lynch-extradition-battle-12075941">https://news.sky.com/story/goldman-snubs-2bn-darktrace-float-amid-lynch-extradition-battle-12075941</a></p><p>Sky News has learnt that Goldman has declined to seek a role on the initial public offering (IPO) of Darktrace, a leading player in the provision of artificial intelligence (AI) cybersecurity services.</p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/wimremes/status/1318981442114867201?s=20">https://twitter.com/wimremes/status/1318981442114867201?s=20</a></p><img src="https://lh4.googleusercontent.com/kOg0ajT04Cz6J4d_3ZNGG8cof4cK0Vj0rIcKmJtxahEfOpX1ms-Sw4Zkb-HlqJrul7XJNBxWzMdyG5VDiM42z8cPWXWFkT1GfTYLecrophwYN6Ycsu1B0ZQyTa7yMNXeLFKDO8aC" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/election-security-partnerships/">Election Security and Confidence Can Be Enabled Through Public-Private Partnerships</a></p><p><a href="https://www.infosecurity-magazine.com/news/ba-gdpr-fine-20/">BA GDPR Data Breach Fine Lowered to £20m Due to COVID-19</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-attack-tripled-ransom/">DDoS Attacks Triple in Size as Ransom Demands Re-Emerge</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacks-hopping-reversing-agile/">Modern Attacks Include Supply Chain "Hopping" and Reversing Agile Environments</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-urls-redirects/">#InfosecurityOnline: Beware of Malicious URLs and Rogue Redirects</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosecurityonline-flexible/">#InfosecurityOnline: Consider Flexible Training for Different Skill Sets</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-working-tools-declines/">Trust in Remote Working Tools Declines as Need for Security Increases</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-automation-driving/">#InfosecurityOnline: Are the Cloud and Automation Driving or Hindering Your Business?</a></p><p><a href="https://www.infosecurity-magazine.com/news/tactics-defend-credential-stuffing/">#InfosecurityOnline: Tactics for Defending Against Credential Stuffing</a></p><p> </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/AJOwke5Zv1FSyj5ZVK4dg6AVuckvgSrtIs4OsXJkcoTLrOaLZKo7HVtwiczAiaNm831Z2xBZ4Bq5Y-uotvfZ6EyNx0r5O4dV_WvS42_gwcJuQN0O-31cx0LJJKhX0AOxteDDAe_C" /><p>Contributions from: @notameadow @astr0sec @Sinwindie @ginger_hax @Jaysonstreet @Mattjay @chrisculling @zwned @krypt3ia @0xBanana @gossithedog @secops_and_hops @dfirsamurai @stuarthare @lee_holmes</p><p>https://en.wikipedia.org/wiki/List_of_burn_centers_in_the_United_States</p><p> </p><p><strong>The Little People</strong></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 23 Oct 2020 15:02:30 +0000</pubDate>
      <author>thom@tl2security.com (Andrew agnes, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-29-probably-9X8TM2oR</link>
      <content:encoded><![CDATA[<p>Perhaps a total IQ of 197 is a little ambitious, as this podcast clearly shows:</p><p><strong>This Week in InfoSec</strong></p><p>20th October 1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Then<a href="https://twitter.com/dotMudge"> @dotMudge</a> sent a copy to<a href="https://twitter.com/aleph_one"> @aleph_one</a>, who wrote "Smashing the Stack For Fun and Profit" in 1996. Seminal paper to seminal paper.</p><p><a href="https://insecure.org/stf/mudge_buffer_overflow_tutorial.html">https://insecure.org/stf/mudge_buffer_overflow_tutorial.html</a></p><p><a href="https://twitter.com/todayininfosec/status/1318551462000185353?s=20">https://twitter.com/todayininfosec/status/1318551462000185353?s=20</a></p><p>20th October 2006: IBM announced it had completed its acquisition of Internet Security Systems, Inc. (ISS).</p><p><a href="https://twitter.com/todayininfosec/status/1318652004894412808?s=20">https://twitter.com/todayininfosec/status/1318652004894412808?s=20</a></p><p>Billy Big Balls</p><p>Javvad wouldn't say who he chose this week...</p><p><a href="https://news.sky.com/story/goldman-snubs-2bn-darktrace-float-amid-lynch-extradition-battle-12075941">https://news.sky.com/story/goldman-snubs-2bn-darktrace-float-amid-lynch-extradition-battle-12075941</a></p><p>Sky News has learnt that Goldman has declined to seek a role on the initial public offering (IPO) of Darktrace, a leading player in the provision of artificial intelligence (AI) cybersecurity services.</p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://twitter.com/wimremes/status/1318981442114867201?s=20">https://twitter.com/wimremes/status/1318981442114867201?s=20</a></p><img src="https://lh4.googleusercontent.com/kOg0ajT04Cz6J4d_3ZNGG8cof4cK0Vj0rIcKmJtxahEfOpX1ms-Sw4Zkb-HlqJrul7XJNBxWzMdyG5VDiM42z8cPWXWFkT1GfTYLecrophwYN6Ycsu1B0ZQyTa7yMNXeLFKDO8aC" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/election-security-partnerships/">Election Security and Confidence Can Be Enabled Through Public-Private Partnerships</a></p><p><a href="https://www.infosecurity-magazine.com/news/ba-gdpr-fine-20/">BA GDPR Data Breach Fine Lowered to £20m Due to COVID-19</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-attack-tripled-ransom/">DDoS Attacks Triple in Size as Ransom Demands Re-Emerge</a></p><p><a href="https://www.infosecurity-magazine.com/news/attacks-hopping-reversing-agile/">Modern Attacks Include Supply Chain "Hopping" and Reversing Agile Environments</a></p><p><a href="https://www.infosecurity-magazine.com/news/malicious-urls-redirects/">#InfosecurityOnline: Beware of Malicious URLs and Rogue Redirects</a></p><p><a href="https://www.infosecurity-magazine.com/news/infosecurityonline-flexible/">#InfosecurityOnline: Consider Flexible Training for Different Skill Sets</a></p><p><a href="https://www.infosecurity-magazine.com/news/remote-working-tools-declines/">Trust in Remote Working Tools Declines as Need for Security Increases</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-automation-driving/">#InfosecurityOnline: Are the Cloud and Automation Driving or Hindering Your Business?</a></p><p><a href="https://www.infosecurity-magazine.com/news/tactics-defend-credential-stuffing/">#InfosecurityOnline: Tactics for Defending Against Credential Stuffing</a></p><p> </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/AJOwke5Zv1FSyj5ZVK4dg6AVuckvgSrtIs4OsXJkcoTLrOaLZKo7HVtwiczAiaNm831Z2xBZ4Bq5Y-uotvfZ6EyNx0r5O4dV_WvS42_gwcJuQN0O-31cx0LJJKhX0AOxteDDAe_C" /><p>Contributions from: @notameadow @astr0sec @Sinwindie @ginger_hax @Jaysonstreet @Mattjay @chrisculling @zwned @krypt3ia @0xBanana @gossithedog @secops_and_hops @dfirsamurai @stuarthare @lee_holmes</p><p>https://en.wikipedia.org/wiki/List_of_burn_centers_in_the_United_States</p><p> </p><p><strong>The Little People</strong></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56237569" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f5015b1d-967b-46cf-80cc-8f11d835c32f/audio/05b25080-6315-4525-8154-d169cc420728/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 29 - Probably</itunes:title>
      <itunes:author>Andrew agnes, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/c217b8b5-b979-40cd-ab7b-41ec38ba9e35/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:35</itunes:duration>
      <itunes:summary>With a combine IQ of 197 and with 5% each of the podcast running order, Host Unknown&apos;s Javvad, Andy and thom present their latest satirical podcast, featuring:

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
The Little People
</itunes:summary>
      <itunes:subtitle>With a combine IQ of 197 and with 5% each of the podcast running order, Host Unknown&apos;s Javvad, Andy and thom present their latest satirical podcast, featuring:

This week in Infosec
Tweet of the Week
Billy Big Balls
Rant of the week
The Little People
</itunes:subtitle>
      <itunes:keywords>host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8984fc3f-695a-45e6-aa19-57430d3defab</guid>
      <title>Episode 28 - The World&apos;s Number One Podcast</title>
      <description><![CDATA[<p> </p><p>All your regular Host Unknown goodness, proof we really are part of your five a day.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>10th October 1990: The case of black hat hacker Kevin Poulsen aired on Unsolved Mysteries, 7 years after he went on the run.<a href="https://t.co/aXsLjpDSBr?amp=1"> </a><a href="https://apnews.com/article/5998a45685b94e569c76c1908497d320">https://apnews.com/article/5998a45685b94e569c76c1908497d320</a></p><p><a href="https://twitter.com/todayininfosec/status/1314988791153790978?s=20">https://twitter.com/todayininfosec/status/1314988791153790978?s=20</a></p><p>14th October 2003: Microsoft launched its first Patch Tuesday, its program to release security updates the second Tuesday each month.</p><p><a href="https://twitter.com/todayininfosec/status/1316542893079834625?s=20">https://twitter.com/todayininfosec/status/1316542893079834625?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://www.huffingtonpost.co.uk/entry/government-branded-ad-telling-a-ballet-dancer-to-retrain-slammed-for-lack-of-respect-for-the-arts_uk_5f841a6ec5b62f97bac5140a?ncid=APPLENEWS00001&guccounter=1">https://www.huffingtonpost.co.uk/entry/government-branded-ad-telling-a-ballet-dancer-to-retrain-slammed-for-lack-of-respect-for-the-arts_uk_5f841a6ec5b62f97bac5140a?ncid=APPLENEWS00001&guccounter=1</a></p><p><a href="https://twitter.com/AnneVosser/status/1315419252783034368?s=20">https://twitter.com/AnneVosser/status/1315419252783034368?s=20</a></p><p>  </p><img src="https://lh6.googleusercontent.com/QNQKDx_8Jws1aUNfHAoqGx_7B2bZtcu-0SsBMhrtYwysO0gDLf57vDBc1erwQ9BLG_ktCjx4Tg33clfSGmXCohqJjZf7nbM5FPwjVGzHC8O53Yg1Y3a9_fN2z-fABTM3Rhb1fvMZ" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>(Not sure where we’re going with this one)</p><img src="https://lh4.googleusercontent.com/EX7rcHH70PSfrpQ17dhtbNpqqn_bBNPUDVc-IogwnSUGFzqPeuWqIgH4zaELPGJT03OvNhuQ4cCUZoQwkeXnetq1xBAXfMXcBHCYbAMbE2yNDrpcLSGcjwSnRQJmbdx5tcQgiaSq" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gpc-launched-trust/">Global Privacy Control Launched to Offer Users Greater Internet Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/fatima-advert-removed-backlash/">Gov-Linked “Fatima” Cybersecurity Career Advert Removed After Backlash</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackney-council-attack/">Hackney Hacked as Council Investigates Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-serious-award-winners/">Security Serious Unsung Heroes Awards Winners Announced</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-victims-recover-hire/">Ransomware Victims Struggle to Recover, Hire and Spend on Threat Prevention</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-cios-response/">Government CIOs Praised for Pandemic Response, Better Collaboration Required</a></p><p> </p><p>Jav didn’t win a security serious award - boohoo</p><p>But Jav did make another list, and it’s not the kind he’s usually on… </p><p><a href="https://onalytica.com/blog/posts/whos-who-in-cybersecurity/">https://onalytica.com/blog/posts/whos-who-in-cybersecurity/</a></p><img src="https://lh6.googleusercontent.com/vvDuDvZI5AQiLw_XwMinr1lTlMcXnXf7WzsSTSaj5TesgV7FkDt5mnIfQlqM-LWZepx4RdPXec0pq5tvzECbDPS2q6FMUKJr7R9C4SZOgXqRuVdB9qay8qRqbXXAOShibAZ34kIt" /><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.independent.co.uk/life-style/scarlett-london-instagram-death-threats-blogger-twitter-viral-a8520311.html">https://www.independent.co.uk/life-style/scarlett-london-instagram-death-threats-blogger-twitter-viral-a8520311.html</a></p><p>A London-based blogger has revealed that she received death threats after a tweet mocking one of her Instagram posts went viral.</p><p>Scarlett Dixon, 24, posted a picture on Instagram of herself sitting in bed drinking a cup of tea.</p><p>The blogger, who has 45,600 followers on the photo- and video-sharing social network under her blog name, Scarlett London, added that the picture was a sponsored post in collaboration with Listerine.</p><img src="https://lh3.googleusercontent.com/QeCQ-Tyrf8-KWlPVHFFa1GbmiI9Et19ftV3oU0pT6cdBDe8A0r4RFRY4L6rNn5ftorrF8zAh9nYYQXXTo-HWGXqnXApcBctjsahAQmmv6EZpCNwJ6VypK5PhmT5Cik7uuqbVBPcZ" /><p> </p><p><strong>The Little People</strong></p><p>Magda de Jager</p><p> </p><p><strong>Host Unknown at a Conference</strong></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 16 Oct 2020 13:57:29 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Fatima the Ballerina, Andrew Agnes, Thom Langford, Magda de Jager)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-28-the-worlds-number-one-podcast-gQTefyj0</link>
      <content:encoded><![CDATA[<p> </p><p>All your regular Host Unknown goodness, proof we really are part of your five a day.</p><p> </p><p><strong>This Week in InfoSec</strong></p><p>10th October 1990: The case of black hat hacker Kevin Poulsen aired on Unsolved Mysteries, 7 years after he went on the run.<a href="https://t.co/aXsLjpDSBr?amp=1"> </a><a href="https://apnews.com/article/5998a45685b94e569c76c1908497d320">https://apnews.com/article/5998a45685b94e569c76c1908497d320</a></p><p><a href="https://twitter.com/todayininfosec/status/1314988791153790978?s=20">https://twitter.com/todayininfosec/status/1314988791153790978?s=20</a></p><p>14th October 2003: Microsoft launched its first Patch Tuesday, its program to release security updates the second Tuesday each month.</p><p><a href="https://twitter.com/todayininfosec/status/1316542893079834625?s=20">https://twitter.com/todayininfosec/status/1316542893079834625?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><p><a href="https://www.huffingtonpost.co.uk/entry/government-branded-ad-telling-a-ballet-dancer-to-retrain-slammed-for-lack-of-respect-for-the-arts_uk_5f841a6ec5b62f97bac5140a?ncid=APPLENEWS00001&guccounter=1">https://www.huffingtonpost.co.uk/entry/government-branded-ad-telling-a-ballet-dancer-to-retrain-slammed-for-lack-of-respect-for-the-arts_uk_5f841a6ec5b62f97bac5140a?ncid=APPLENEWS00001&guccounter=1</a></p><p><a href="https://twitter.com/AnneVosser/status/1315419252783034368?s=20">https://twitter.com/AnneVosser/status/1315419252783034368?s=20</a></p><p>  </p><img src="https://lh6.googleusercontent.com/QNQKDx_8Jws1aUNfHAoqGx_7B2bZtcu-0SsBMhrtYwysO0gDLf57vDBc1erwQ9BLG_ktCjx4Tg33clfSGmXCohqJjZf7nbM5FPwjVGzHC8O53Yg1Y3a9_fN2z-fABTM3Rhb1fvMZ" /><p> </p><p><strong>Billy Big Balls of the Week</strong></p><p>(Not sure where we’re going with this one)</p><img src="https://lh4.googleusercontent.com/EX7rcHH70PSfrpQ17dhtbNpqqn_bBNPUDVc-IogwnSUGFzqPeuWqIgH4zaELPGJT03OvNhuQ4cCUZoQwkeXnetq1xBAXfMXcBHCYbAMbE2yNDrpcLSGcjwSnRQJmbdx5tcQgiaSq" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/gpc-launched-trust/">Global Privacy Control Launched to Offer Users Greater Internet Trust</a></p><p><a href="https://www.infosecurity-magazine.com/news/fatima-advert-removed-backlash/">Gov-Linked “Fatima” Cybersecurity Career Advert Removed After Backlash</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackney-council-attack/">Hackney Hacked as Council Investigates Attack</a></p><p><a href="https://www.infosecurity-magazine.com/news/security-serious-award-winners/">Security Serious Unsung Heroes Awards Winners Announced</a></p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-victims-recover-hire/">Ransomware Victims Struggle to Recover, Hire and Spend on Threat Prevention</a></p><p><a href="https://www.infosecurity-magazine.com/news/government-cios-response/">Government CIOs Praised for Pandemic Response, Better Collaboration Required</a></p><p> </p><p>Jav didn’t win a security serious award - boohoo</p><p>But Jav did make another list, and it’s not the kind he’s usually on… </p><p><a href="https://onalytica.com/blog/posts/whos-who-in-cybersecurity/">https://onalytica.com/blog/posts/whos-who-in-cybersecurity/</a></p><img src="https://lh6.googleusercontent.com/vvDuDvZI5AQiLw_XwMinr1lTlMcXnXf7WzsSTSaj5TesgV7FkDt5mnIfQlqM-LWZepx4RdPXec0pq5tvzECbDPS2q6FMUKJr7R9C4SZOgXqRuVdB9qay8qRqbXXAOShibAZ34kIt" /><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.independent.co.uk/life-style/scarlett-london-instagram-death-threats-blogger-twitter-viral-a8520311.html">https://www.independent.co.uk/life-style/scarlett-london-instagram-death-threats-blogger-twitter-viral-a8520311.html</a></p><p>A London-based blogger has revealed that she received death threats after a tweet mocking one of her Instagram posts went viral.</p><p>Scarlett Dixon, 24, posted a picture on Instagram of herself sitting in bed drinking a cup of tea.</p><p>The blogger, who has 45,600 followers on the photo- and video-sharing social network under her blog name, Scarlett London, added that the picture was a sponsored post in collaboration with Listerine.</p><img src="https://lh3.googleusercontent.com/QeCQ-Tyrf8-KWlPVHFFa1GbmiI9Et19ftV3oU0pT6cdBDe8A0r4RFRY4L6rNn5ftorrF8zAh9nYYQXXTo-HWGXqnXApcBctjsahAQmmv6EZpCNwJ6VypK5PhmT5Cik7uuqbVBPcZ" /><p> </p><p><strong>The Little People</strong></p><p>Magda de Jager</p><p> </p><p><strong>Host Unknown at a Conference</strong></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56900870" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/d85d1e8d-cdfc-4865-bd0c-37369fbd4fff/audio/5934c15d-728e-4020-941c-545de05bf80b/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 28 - The World&apos;s Number One Podcast</itunes:title>
      <itunes:author>Javvad Malik, Fatima the Ballerina, Andrew Agnes, Thom Langford, Magda de Jager</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/20355234-30c4-42b3-96bb-815870e6b5a3/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:16</itunes:duration>
      <itunes:summary>Thom is late, Smashing Security is mentioned again and again despite no further sponsorship, Thom empties Ikea Cardiff, Andy remembers his old sports car, and Jav tells an orthopaedic joke. We all find our spirit animals.</itunes:summary>
      <itunes:subtitle>Thom is late, Smashing Security is mentioned again and again despite no further sponsorship, Thom empties Ikea Cardiff, Andy remembers his old sports car, and Jav tells an orthopaedic joke. We all find our spirit animals.</itunes:subtitle>
      <itunes:keywords>host unknown, fatima the ballerina, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b60175fd-40ce-47d4-bc31-43e10828b0a9</guid>
      <title>Episode 27 - Normal Service is Resumed</title>
      <description><![CDATA[<p>Your regular features and even more, such as vegan sweets, Host Unknown imposters, Jav appears in the press with the same quote for different stories, and HMRC incompetence.</p><p>Vegan sweets</p><p><a href="https://www.thejealouslife.com/products/tropical-wonder">https://www.thejealouslife.com/products/tropical-wonder</a></p><p>Will the real Host Unknown please stand up?</p><img src="https://lh3.googleusercontent.com/NsU8BgyAnh7tsMOnM0L38ihUyZ2M9NaLmMXUZgLPQ1gWXtIgxQVN0g7GGmW6QQZhxdow84v-lubEBrJ1K1F5yYBSLfKeWn3q0yKe7JYdpLZEw5ycxmvF3BqEVwlJ7IYy3UhMcoa4" alt="" /><p> </p><p><strong>This Week in Infosec</strong></p><p>5th October 1991: The Linux kernel was released by Linus Torvalds.</p><p>"This is a program for hackers by a hacker." -Linus Benedict Torvalds</p><p>For those keeping score at home, he said "hacker[s]" 4 times in his post to the comp.os.minix newsgroup.</p><p><a href="https://twitter.com/todayininfosec/status/1313239418682179585?s=20">https://twitter.com/todayininfosec/status/1313239418682179585?s=20</a></p><p>4th October 2005: The Samy worm, the first self-propagating cross-site scripting worm, was released onto the-then-mega-popular MySpace by Samy Kamkar.</p><p><a href="https://twitter.com/todayininfosec/status/1312752236712333312?s=20">https://twitter.com/todayininfosec/status/1312752236712333312?s=20</a></p><p>4th October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</p><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050?s=20">https://twitter.com/todayininfosec/status/1312589059559170050?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/qi7HszdX6mur4G0CsQagmerrA2BIZdCDmNXq04M2B-AZdggmszAFhCdOsC2ixykMYo2f6PnNyU3vj_5I0Ccg-7CSEark5gXrXnwZPRVoxkJ_V4mgMGa7psMVp7DmxpRrqW9f3yhn" /><p> </p><p><strong>Billy Big balls of the Week</strong></p><p><a href="https://twitter.com/repshalala/status/1313187148540137474?s=21">https://twitter.com/repshalala/status/1313187148540137474?s=21</a></p><img src="https://lh4.googleusercontent.com/hR6bRN4FKtYR-1ic3WxUKWyDxzupcrfGxZaPhdTktzwVmhNkYVPoX_uo0rfgDSY4ceL0Mf5ELdLhQJn42Isf4-1U5l5MHJj1ZeqAQDZo454vHOkmjxUhCmXmKxQcNhBhpm0cDYMf" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/pm-australia-awareness/">Former Australian PM Talks Importance of Cyber Awareness</a></p><p><a href="https://www.infosecurity-magazine.com/news/hmrc-phishing-spam-emails/">HMRC Hit by Multiple Phishing and Spam Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/endpoint-pain-point/">Endpoint Security Primary Pain Point in 2020</a></p><p> <a href="https://www.infosecurity-magazine.com/news/delivery-service-chowbus-breach/">Food Delivery Service Chowbus Experiences Data Breach</a></p><p> <a href="https://www.infosecurity-magazine.com/news/boards-increase-investment-fines/">Boards Increase Investment in Cybersecurity in Face of Threats and Regulatory Fines</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.verdict.co.uk/excel-coronavirus-test-data/">https://www.verdict.co.uk/excel-coronavirus-test-data/</a></p><p>It has emerged that almost 16,000 cases were delayed in being transferred to the test-and-trace system because the government was using an Excel spreadsheet to store the data, with an individual column for each case.</p><p>This reportedly caused problems because the maximum number of columns on an Excel spreadsheet is 16,384, meaning the sheet exceeded its maximum size and so failed to update, preventing the coronavirus test data from updating.</p><p>Notably, if rows had been used instead, the problem would have been avoided, as Excel supports up to 1,048,576, although many experts are arguing that the software is wholly unsuited to the purpose at all.</p><p>“If indeed the government was using Excel to track Covid cases, it is a wholly inappropriate use of the tool,” said Javvad Malik, security awareness advocate at KnowBe4.</p><p>“Excel is a very good spreadsheet, but it has its limitations and in no way ever intended to be used as a database.”</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 9 Oct 2020 14:31:19 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-27-normal-service-is-resumed-yYVfNVTM</link>
      <content:encoded><![CDATA[<p>Your regular features and even more, such as vegan sweets, Host Unknown imposters, Jav appears in the press with the same quote for different stories, and HMRC incompetence.</p><p>Vegan sweets</p><p><a href="https://www.thejealouslife.com/products/tropical-wonder">https://www.thejealouslife.com/products/tropical-wonder</a></p><p>Will the real Host Unknown please stand up?</p><img src="https://lh3.googleusercontent.com/NsU8BgyAnh7tsMOnM0L38ihUyZ2M9NaLmMXUZgLPQ1gWXtIgxQVN0g7GGmW6QQZhxdow84v-lubEBrJ1K1F5yYBSLfKeWn3q0yKe7JYdpLZEw5ycxmvF3BqEVwlJ7IYy3UhMcoa4" alt="" /><p> </p><p><strong>This Week in Infosec</strong></p><p>5th October 1991: The Linux kernel was released by Linus Torvalds.</p><p>"This is a program for hackers by a hacker." -Linus Benedict Torvalds</p><p>For those keeping score at home, he said "hacker[s]" 4 times in his post to the comp.os.minix newsgroup.</p><p><a href="https://twitter.com/todayininfosec/status/1313239418682179585?s=20">https://twitter.com/todayininfosec/status/1313239418682179585?s=20</a></p><p>4th October 2005: The Samy worm, the first self-propagating cross-site scripting worm, was released onto the-then-mega-popular MySpace by Samy Kamkar.</p><p><a href="https://twitter.com/todayininfosec/status/1312752236712333312?s=20">https://twitter.com/todayininfosec/status/1312752236712333312?s=20</a></p><p>4th October 2017: A week after he retired as the result of Equifax's data breach, former CEO Richard F. Smith told members of Congress one person in the IT department was at fault.</p><p><a href="https://twitter.com/todayininfosec/status/1312589059559170050?s=20">https://twitter.com/todayininfosec/status/1312589059559170050?s=20</a></p><p> </p><p><strong>Tweet of the Week</strong></p><img src="https://lh3.googleusercontent.com/qi7HszdX6mur4G0CsQagmerrA2BIZdCDmNXq04M2B-AZdggmszAFhCdOsC2ixykMYo2f6PnNyU3vj_5I0Ccg-7CSEark5gXrXnwZPRVoxkJ_V4mgMGa7psMVp7DmxpRrqW9f3yhn" /><p> </p><p><strong>Billy Big balls of the Week</strong></p><p><a href="https://twitter.com/repshalala/status/1313187148540137474?s=21">https://twitter.com/repshalala/status/1313187148540137474?s=21</a></p><img src="https://lh4.googleusercontent.com/hR6bRN4FKtYR-1ic3WxUKWyDxzupcrfGxZaPhdTktzwVmhNkYVPoX_uo0rfgDSY4ceL0Mf5ELdLhQJn42Isf4-1U5l5MHJj1ZeqAQDZo454vHOkmjxUhCmXmKxQcNhBhpm0cDYMf" /><p> </p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/pm-australia-awareness/">Former Australian PM Talks Importance of Cyber Awareness</a></p><p><a href="https://www.infosecurity-magazine.com/news/hmrc-phishing-spam-emails/">HMRC Hit by Multiple Phishing and Spam Emails</a></p><p><a href="https://www.infosecurity-magazine.com/news/endpoint-pain-point/">Endpoint Security Primary Pain Point in 2020</a></p><p> <a href="https://www.infosecurity-magazine.com/news/delivery-service-chowbus-breach/">Food Delivery Service Chowbus Experiences Data Breach</a></p><p> <a href="https://www.infosecurity-magazine.com/news/boards-increase-investment-fines/">Boards Increase Investment in Cybersecurity in Face of Threats and Regulatory Fines</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://www.verdict.co.uk/excel-coronavirus-test-data/">https://www.verdict.co.uk/excel-coronavirus-test-data/</a></p><p>It has emerged that almost 16,000 cases were delayed in being transferred to the test-and-trace system because the government was using an Excel spreadsheet to store the data, with an individual column for each case.</p><p>This reportedly caused problems because the maximum number of columns on an Excel spreadsheet is 16,384, meaning the sheet exceeded its maximum size and so failed to update, preventing the coronavirus test data from updating.</p><p>Notably, if rows had been used instead, the problem would have been avoided, as Excel supports up to 1,048,576, although many experts are arguing that the software is wholly unsuited to the purpose at all.</p><p>“If indeed the government was using Excel to track Covid cases, it is a wholly inappropriate use of the tool,” said Javvad Malik, security awareness advocate at KnowBe4.</p><p>“Excel is a very good spreadsheet, but it has its limitations and in no way ever intended to be used as a database.”</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58757863" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/ac291002-fe15-48ba-a5ce-1e5edf865a3a/audio/52744934-a6ba-4dfb-8108-61f70d6cac36/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 27 - Normal Service is Resumed</itunes:title>
      <itunes:author>Andrew Agnes, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7bee3de0-e3fa-4df4-908c-54087e62f1e5/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:12</itunes:duration>
      <itunes:summary>Stuff. Lots and lots of stuff strung out to fill an hour and meet the Host Unknown Podcast legal obligations.
Who else thinks Andy should get a new computer?</itunes:summary>
      <itunes:subtitle>Stuff. Lots and lots of stuff strung out to fill an hour and meet the Host Unknown Podcast legal obligations.
Who else thinks Andy should get a new computer?</itunes:subtitle>
      <itunes:keywords>fake plastic trees, infosec, host unknow</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">52ed42e2-cc1f-40ac-a6ab-890cfa21c092</guid>
      <title>Episode 25 - The Week of Weak Content</title>
      <description><![CDATA[<p>It has been a quiet week, but Host Unknown still provides the goods. Admittedly the goods have come from Lidl.</p><p><strong>This Week in Infosec</strong></p><p>25th September 2003: A report critical of Microsoft, "CyberInsecurity - The Cost of Monopoly", was published. As a result, Dan Geer, one of seven co-authors of the report, was fired by<a href="https://twitter.com/Stake"> @stake</a>.<a href="https://t.co/fId0xg0uN6?amp=1"> https://cryptome.org/cyberinsecurity.htm#Fired</a></p><p>30th Sept 2009: "Schneier on Security" was published. It consisted of a compilation of articles Bruce Schneier wrote between 2002 and 2008.</p><p> </p><p><strong>Billy Big Balls</strong></p><img src="https://lh4.googleusercontent.com/o3Qxn_W-Ary8RTD7mfFsDCexXAnLpuv50kAvbv2-xzDH0RADn5YVTXyqMzA0AFFhJTogdm4ZiPao-1TcUuX4vYt4SgeeB47KVZusqFMDNR0cNjvD46g2ighyfxseYL25Kc0AeNQe" /><p> </p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/J4vv4D/status/1311682834738929665?s=20</p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ivanti-vpn-mdm-acquisition/">Ivanti Adds VPN and MDM Technolgies in Double Acquisition</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-skills-solutions-shortage/">Research: Cloud Skills and Solutions Are in Short Supply</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-awarded-role-model/">UK Receives 2020 European CYBERSEC Award</a></p><p><a href="https://www.infosecurity-magazine.com/news/dtxnow-remove-security/">#DTXNOW: Time to Remove Security from IT</a></p><p><a href="https://www.infosecurity-magazine.com/news/concerns-passwordless-bother/">Technical and Cost Concerns of Passwordless Authentication Bother Security Leaders</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/hacks4pancakes/status/1311295830838710273?s=20">https://twitter.com/hacks4pancakes/status/1311295830838710273?s=20</a></p><img src="https://lh6.googleusercontent.com/2kr5sN_1rURMZYTd5TGW6yphjitQobM9hsGul8beSmmndBkl4N7xMvVrdwYuA52sHdzYVgJhwlrzyia_MoBdRkOnZODrTUdR77QN3snF-f4IC04vzEuvFyK561hZdBTT0CHaPf-O" /><p><a href="https://collider.com/hackers-movie-sequel-reboot-details/">https://collider.com/hackers-movie-sequel-reboot-details/</a>  </p><p> </p><p>Monkey Business Illusion / Invisible Gorilla:</p><img src="https://lh3.googleusercontent.com/Artdg9zY_vf53OOlL_MIKIhkXUOJDVvjU4ga8uI9krYdKiNFVRKZXHJBYvoRJ5av4LbjbDIQCQu9tBEoplns1nOR2p_wsMLMePWmK8j18sEo5psjURSzFDZm8RxHLRp2PhzFQDBG" /><p><a href="https://youtu.be/IGQmdoK_ZfY">https://youtu.be/IGQmdoK_ZfY</a></p><p><a href="https://www.itsecurityguru.org/2020/09/23/the-invisible-risk/">https://www.itsecurityguru.org/2020/09/23/the-invisible-risk/</a></p><p>Drinking quotes: </p><p><a href="https://imgur.com/gallery/i0Wt7">https://imgur.com/gallery/i0Wt7</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 2 Oct 2020 15:03:13 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Javvad malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-25-the-week-of-weak-content-5SISj_HU</link>
      <content:encoded><![CDATA[<p>It has been a quiet week, but Host Unknown still provides the goods. Admittedly the goods have come from Lidl.</p><p><strong>This Week in Infosec</strong></p><p>25th September 2003: A report critical of Microsoft, "CyberInsecurity - The Cost of Monopoly", was published. As a result, Dan Geer, one of seven co-authors of the report, was fired by<a href="https://twitter.com/Stake"> @stake</a>.<a href="https://t.co/fId0xg0uN6?amp=1"> https://cryptome.org/cyberinsecurity.htm#Fired</a></p><p>30th Sept 2009: "Schneier on Security" was published. It consisted of a compilation of articles Bruce Schneier wrote between 2002 and 2008.</p><p> </p><p><strong>Billy Big Balls</strong></p><img src="https://lh4.googleusercontent.com/o3Qxn_W-Ary8RTD7mfFsDCexXAnLpuv50kAvbv2-xzDH0RADn5YVTXyqMzA0AFFhJTogdm4ZiPao-1TcUuX4vYt4SgeeB47KVZusqFMDNR0cNjvD46g2ighyfxseYL25Kc0AeNQe" /><p> </p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/J4vv4D/status/1311682834738929665?s=20</p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/ivanti-vpn-mdm-acquisition/">Ivanti Adds VPN and MDM Technolgies in Double Acquisition</a></p><p><a href="https://www.infosecurity-magazine.com/news/cloud-skills-solutions-shortage/">Research: Cloud Skills and Solutions Are in Short Supply</a></p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-awarded-role-model/">UK Receives 2020 European CYBERSEC Award</a></p><p><a href="https://www.infosecurity-magazine.com/news/dtxnow-remove-security/">#DTXNOW: Time to Remove Security from IT</a></p><p><a href="https://www.infosecurity-magazine.com/news/concerns-passwordless-bother/">Technical and Cost Concerns of Passwordless Authentication Bother Security Leaders</a></p><p> </p><p><strong>Rant of the Week</strong></p><p><a href="https://twitter.com/hacks4pancakes/status/1311295830838710273?s=20">https://twitter.com/hacks4pancakes/status/1311295830838710273?s=20</a></p><img src="https://lh6.googleusercontent.com/2kr5sN_1rURMZYTd5TGW6yphjitQobM9hsGul8beSmmndBkl4N7xMvVrdwYuA52sHdzYVgJhwlrzyia_MoBdRkOnZODrTUdR77QN3snF-f4IC04vzEuvFyK561hZdBTT0CHaPf-O" /><p><a href="https://collider.com/hackers-movie-sequel-reboot-details/">https://collider.com/hackers-movie-sequel-reboot-details/</a>  </p><p> </p><p>Monkey Business Illusion / Invisible Gorilla:</p><img src="https://lh3.googleusercontent.com/Artdg9zY_vf53OOlL_MIKIhkXUOJDVvjU4ga8uI9krYdKiNFVRKZXHJBYvoRJ5av4LbjbDIQCQu9tBEoplns1nOR2p_wsMLMePWmK8j18sEo5psjURSzFDZm8RxHLRp2PhzFQDBG" /><p><a href="https://youtu.be/IGQmdoK_ZfY">https://youtu.be/IGQmdoK_ZfY</a></p><p><a href="https://www.itsecurityguru.org/2020/09/23/the-invisible-risk/">https://www.itsecurityguru.org/2020/09/23/the-invisible-risk/</a></p><p>Drinking quotes: </p><p><a href="https://imgur.com/gallery/i0Wt7">https://imgur.com/gallery/i0Wt7</a></p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55450552" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/f1ca57b4-6d1e-45c7-9fd1-4da6394d9908/audio/87344f8a-cf24-40f2-8edc-aae5bff3592d/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 25 - The Week of Weak Content</itunes:title>
      <itunes:author>Thom Langford, Javvad malik, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/4254a858-f558-4212-b78f-353e54aef2d0/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:46</itunes:duration>
      <itunes:summary>Jav&apos;s day out at Thom&apos;s place.

This Week in InfoSec
Tweet of the Week
Industry News
Billy Big balls
Rant of the Week

Jav spends the day annoying Thom. Andy has the &apos;rona.</itunes:summary>
      <itunes:subtitle>Jav&apos;s day out at Thom&apos;s place.

This Week in InfoSec
Tweet of the Week
Industry News
Billy Big balls
Rant of the Week

Jav spends the day annoying Thom. Andy has the &apos;rona.</itunes:subtitle>
      <itunes:keywords>a gorrilla, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6aefd8d3-8e5c-4bb0-9836-9fd25568a203</guid>
      <title>Episode 25 - The Duchess of Ladywell Special</title>
      <description><![CDATA[<p>Andy's microphone is miraculously fixed, Thom's story is broken and Jav joins The Lemon Party.</p><p><strong>This Week in InfoSec</strong></p><p>19th September 2011: Thai Duong and Juliano Rizzo demonstrated a proof of concept at the Ekoparty security conference to decrypt encrypted cookies, exploiting a vulnerability in TLS 1.0 and earlier. They named the attack BEAST (Browser Exploit Against SSL/TLS.</p><p><a href="https://www.theregister.com/2011/09/19/beast_exploits_paypal_ssl/">https://www.theregister.com/2011/09/19/beast_exploits_paypal_ssl/</a></p><p>21st Sept 1996: An email began spreading about a destructive virus named Irina. Friend of the show Graham Cluley discovered it was a hoax "marketing ploy" from Penguin Books.</p><p><a href="http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm">http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm</a></p><p><strong>Billy Big Balls of the Week</strong></p><p>How to Sell Protest Footage to FOX AND CNN</p><p><a href="https://youtu.be/xiYZ__Ww02c">https://youtu.be/xiYZ__Ww02c</a></p><p>“This isn’t even satire anymore. You are just giving away industry secrets.” </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/ldMFP572vmAz2OF84BrTreEV92az48itl2C3aH8Jj-3ZoV1TYE_nachX7tAurUizi8B_w7Md_mnxEX4aryWijVeYkHg3mbOmmedOpG-IkICtN05OswRFTfAWqxou4bEvsM6qtA55" /><p><a href="https://www.epicgames.com/help/en-US/epic-accounts-c74/general-support-c79/how-do-i-delete-my-epic-games-account-a3636">https://www.epicgames.com/help/en-US/epic-accounts-c74/general-support-c79/how-do-i-delete-my-epic-games-account-a3636</a></p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/activision-denies-hacking/">Activision Denies Hacking Claims Over Leaked Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/uncomplicated-insurance-launched/">Uncomplicated Cyber Insurance Program Launched</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-collaboration-remote-working/">Cisco: Ensure Collaboration to Better Survive Remote Working</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-passwordless-future/">Cisco: How Real is a Passwordless Future?</a></p><p><a href="https://www.infosecurity-magazine.com/news/shopify-insiders-records/">Shopify Insiders Attempted to Steal Customer Transactional Records</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/public-image-problem/">Does Cybersecurity Have a Public Image Problem?</a></p><p><strong>Tweet of the Week</strong></p><p>Switching off a faulty telly sees internet speeds increase</p><p>"The source of the ‘electrical noise’ was traced to a property in the village. It turned out that at 7:00 am every morning the occupant would switch on their old TV which would in-turn knock out broadband for the entire village,"</p><p><a href="https://twitter.com/BBCWalesNews/status/1308315605272080386">https://twitter.com/BBCWalesNews/status/1308315605272080386</a></p><p><a href="https://www.youtube.com/watch?v=ub82Xb1C8os">Fake News! TV Did Not Wipe Out aa Villages Internet!</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 25 Sep 2020 12:56:06 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-25-the-duchess-of-ladywell-special-vvb2xiuu</link>
      <content:encoded><![CDATA[<p>Andy's microphone is miraculously fixed, Thom's story is broken and Jav joins The Lemon Party.</p><p><strong>This Week in InfoSec</strong></p><p>19th September 2011: Thai Duong and Juliano Rizzo demonstrated a proof of concept at the Ekoparty security conference to decrypt encrypted cookies, exploiting a vulnerability in TLS 1.0 and earlier. They named the attack BEAST (Browser Exploit Against SSL/TLS.</p><p><a href="https://www.theregister.com/2011/09/19/beast_exploits_paypal_ssl/">https://www.theregister.com/2011/09/19/beast_exploits_paypal_ssl/</a></p><p>21st Sept 1996: An email began spreading about a destructive virus named Irina. Friend of the show Graham Cluley discovered it was a hoax "marketing ploy" from Penguin Books.</p><p><a href="http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm">http://web.archive.org/web/20170924094557/http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/ephoaxes.htm</a></p><p><strong>Billy Big Balls of the Week</strong></p><p>How to Sell Protest Footage to FOX AND CNN</p><p><a href="https://youtu.be/xiYZ__Ww02c">https://youtu.be/xiYZ__Ww02c</a></p><p>“This isn’t even satire anymore. You are just giving away industry secrets.” </p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/ldMFP572vmAz2OF84BrTreEV92az48itl2C3aH8Jj-3ZoV1TYE_nachX7tAurUizi8B_w7Md_mnxEX4aryWijVeYkHg3mbOmmedOpG-IkICtN05OswRFTfAWqxou4bEvsM6qtA55" /><p><a href="https://www.epicgames.com/help/en-US/epic-accounts-c74/general-support-c79/how-do-i-delete-my-epic-games-account-a3636">https://www.epicgames.com/help/en-US/epic-accounts-c74/general-support-c79/how-do-i-delete-my-epic-games-account-a3636</a></p><p>Industry News</p><p><a href="https://www.infosecurity-magazine.com/news/activision-denies-hacking/">Activision Denies Hacking Claims Over Leaked Accounts</a></p><p><a href="https://www.infosecurity-magazine.com/news/uncomplicated-insurance-launched/">Uncomplicated Cyber Insurance Program Launched</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-collaboration-remote-working/">Cisco: Ensure Collaboration to Better Survive Remote Working</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisco-passwordless-future/">Cisco: How Real is a Passwordless Future?</a></p><p><a href="https://www.infosecurity-magazine.com/news/shopify-insiders-records/">Shopify Insiders Attempted to Steal Customer Transactional Records</a></p><p><a href="https://www.infosecurity-magazine.com/news-features/public-image-problem/">Does Cybersecurity Have a Public Image Problem?</a></p><p><strong>Tweet of the Week</strong></p><p>Switching off a faulty telly sees internet speeds increase</p><p>"The source of the ‘electrical noise’ was traced to a property in the village. It turned out that at 7:00 am every morning the occupant would switch on their old TV which would in-turn knock out broadband for the entire village,"</p><p><a href="https://twitter.com/BBCWalesNews/status/1308315605272080386">https://twitter.com/BBCWalesNews/status/1308315605272080386</a></p><p><a href="https://www.youtube.com/watch?v=ub82Xb1C8os">Fake News! TV Did Not Wipe Out aa Villages Internet!</a></p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="54428223" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/712a9fa1-6c28-4d3b-9c1c-f44c2f50f6ee/audio/b92570d7-68db-44b9-96a2-d391cda947d7/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 25 - The Duchess of Ladywell Special</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/b62a3e40-3e74-4fe4-bf88-830d38b29c12/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:42</itunes:duration>
      <itunes:summary>The one where Thom gets stitched up, and the Duchess of Ladywell mention quota is finally reached.
This Week in InfoSec
Rant of the Week
Billy Big Balls of the Week
Industry News
Tweet of the Week</itunes:summary>
      <itunes:subtitle>The one where Thom gets stitched up, and the Duchess of Ladywell mention quota is finally reached.
This Week in InfoSec
Rant of the Week
Billy Big Balls of the Week
Industry News
Tweet of the Week</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16e3cedf-46bf-4470-aea2-702b40b95f33</guid>
      <title>Episode 24 - Andy Has a Broken Microphone</title>
      <description><![CDATA[<p>It's definitely episode 24 and don't let anyone tell you otherwise.</p><p><strong>This week in Infosec</strong></p><p>17th Sept 2003: Court documents were unsealed which showed that Melissa virus author David Smith began working with the FBI within weeks of his 1999 arrest</p><p><a href="http://web.archive.org/web/20030922234951/http://ap.tbo.com/ap/breaking/MGA2Q265QKD.html">http://web.archive.org/web/20030922234951/http://ap.tbo.com/ap/breaking/MGA2Q265QKD.html</a></p><p>18th Sept 2014: Apple announced that the iOS 8 operating system (used on iPhone and iPad) would encrypt data by default for the first time. A day later Google made a similar announcement pertaining to Android.</p><p><strong>Tweet of the Week</strong></p><p>This weeks Tweet of the Week is from the second best Infosec Podcast after we discovered they crowdsource their content (which is why it’s probably better than ours):</p><p><a href="https://twitter.com/SmashinSecurity/status/1305801947149225986?s=20">https://twitter.com/SmashinSecurity/status/1305801947149225986?s=20</a></p><p><strong>Billy Big Balls of the Week</strong></p><p>Best security blog post you'll ever read - better than 90% of blackhat / defcon talks </p><p>“When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number”</p><p><a href="https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram">https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram</a></p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/zero-trust-adoption-lockdown/">Zero Trust Adoption Increases During Lockdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-relied-security/">#GartnerSEC: Professionals Survived #COVID19 as Businesses Relied on Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-projects-2020/">#GartnerSEC: Top Projects for 2020 Include Authentication, Risk Management and Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-five-board-engagement/">#GartnerSEC: Five Steps to Ensuring Board Engagement</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-covid19-data/">#GartnerSEC: #COVID19 Created New Roles, More Data Collection and Flexible Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-recruitment-strategies/">#GartnerSEC: Rewrite Recruitment Strategies to Fit New Roles and Career Paths</a></p><p><a href="https://www.infosecurity-magazine.com/news/outbound-email-breaches/">Outbound Email Errors Cause 93% Increase in Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-trends-risk-security/">#GartnerSEC: Top Trends for Risk and Security Include Cloud, Automation and Privacy</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-midsized-ransomware/">#GartnerSEC: How Midsized Enterprises Can Recover from Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-1tbps-2020/">DDoS Attacks Hit 1 Tbps in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/universities-ransomware-attacks/">Universities Face Increase in Ransomware Attacks as Students Return</a></p><p><strong>Rant of the Week</strong></p><p>First rule of twitter - rather than just praise someone and applaud them for good work... make it all about you</p><img src="https://lh6.googleusercontent.com/TNz4Lo07Lssk5fPKN1tGcPOfRE9PRmUspqJeW1lqsUdlXAYhfxRa7UAYfiU5pVdVH1QfMbHH-gGcudy9xVHO4_ggLcVMsU-WyYdK-x7H5qUzeOr9Nj29viMYIKAd74yVN9CRWy98" /><p> </p><p><strong>Novi Sad, Serbian Gangster</strong> (not for the faint of heart... unpleasantness abounds) <a href="https://newsbeezer.com/serbiaeng/the-novi-sad-attacker-is-the-director-of-the-company-that-founded-the-maxbet-bookmakers/">https://newsbeezer.com/serbiaeng/the-novi-sad-attacker-is-the-director-of-the-company-that-founded-the-maxbet-bookmakers/</a></p><img src="https://lh3.googleusercontent.com/npcEmmMHrfJEjLzeFJrSIgyUttZARJn7fY3RdP1wyprt6rdUTiqt81_ZU3LeyjOS9Uifdb8pF6nR1CGli_ym0d7x2tPMill1prhg9zKUofuKd4afZU-_xVtqOaR5qjOOJU_6O955" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 18 Sep 2020 14:14:26 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Javvad Malik, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-24-andy-has-a-broken-microphone-wOs2nzE3</link>
      <content:encoded><![CDATA[<p>It's definitely episode 24 and don't let anyone tell you otherwise.</p><p><strong>This week in Infosec</strong></p><p>17th Sept 2003: Court documents were unsealed which showed that Melissa virus author David Smith began working with the FBI within weeks of his 1999 arrest</p><p><a href="http://web.archive.org/web/20030922234951/http://ap.tbo.com/ap/breaking/MGA2Q265QKD.html">http://web.archive.org/web/20030922234951/http://ap.tbo.com/ap/breaking/MGA2Q265QKD.html</a></p><p>18th Sept 2014: Apple announced that the iOS 8 operating system (used on iPhone and iPad) would encrypt data by default for the first time. A day later Google made a similar announcement pertaining to Android.</p><p><strong>Tweet of the Week</strong></p><p>This weeks Tweet of the Week is from the second best Infosec Podcast after we discovered they crowdsource their content (which is why it’s probably better than ours):</p><p><a href="https://twitter.com/SmashinSecurity/status/1305801947149225986?s=20">https://twitter.com/SmashinSecurity/status/1305801947149225986?s=20</a></p><p><strong>Billy Big Balls of the Week</strong></p><p>Best security blog post you'll ever read - better than 90% of blackhat / defcon talks </p><p>“When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number”</p><p><a href="https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram">https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram</a></p><p><strong>Industry News</strong></p><p><a href="https://www.infosecurity-magazine.com/news/zero-trust-adoption-lockdown/">Zero Trust Adoption Increases During Lockdown</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-relied-security/">#GartnerSEC: Professionals Survived #COVID19 as Businesses Relied on Security</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-projects-2020/">#GartnerSEC: Top Projects for 2020 Include Authentication, Risk Management and Cloud</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-five-board-engagement/">#GartnerSEC: Five Steps to Ensuring Board Engagement</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-covid19-data/">#GartnerSEC: #COVID19 Created New Roles, More Data Collection and Flexible Businesses</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-recruitment-strategies/">#GartnerSEC: Rewrite Recruitment Strategies to Fit New Roles and Career Paths</a></p><p><a href="https://www.infosecurity-magazine.com/news/outbound-email-breaches/">Outbound Email Errors Cause 93% Increase in Breaches</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-trends-risk-security/">#GartnerSEC: Top Trends for Risk and Security Include Cloud, Automation and Privacy</a></p><p><a href="https://www.infosecurity-magazine.com/news/gartnersec-midsized-ransomware/">#GartnerSEC: How Midsized Enterprises Can Recover from Ransomware</a></p><p><a href="https://www.infosecurity-magazine.com/news/ddos-1tbps-2020/">DDoS Attacks Hit 1 Tbps in 2020</a></p><p><a href="https://www.infosecurity-magazine.com/news/universities-ransomware-attacks/">Universities Face Increase in Ransomware Attacks as Students Return</a></p><p><strong>Rant of the Week</strong></p><p>First rule of twitter - rather than just praise someone and applaud them for good work... make it all about you</p><img src="https://lh6.googleusercontent.com/TNz4Lo07Lssk5fPKN1tGcPOfRE9PRmUspqJeW1lqsUdlXAYhfxRa7UAYfiU5pVdVH1QfMbHH-gGcudy9xVHO4_ggLcVMsU-WyYdK-x7H5qUzeOr9Nj29viMYIKAd74yVN9CRWy98" /><p> </p><p><strong>Novi Sad, Serbian Gangster</strong> (not for the faint of heart... unpleasantness abounds) <a href="https://newsbeezer.com/serbiaeng/the-novi-sad-attacker-is-the-director-of-the-company-that-founded-the-maxbet-bookmakers/">https://newsbeezer.com/serbiaeng/the-novi-sad-attacker-is-the-director-of-the-company-that-founded-the-maxbet-bookmakers/</a></p><img src="https://lh3.googleusercontent.com/npcEmmMHrfJEjLzeFJrSIgyUttZARJn7fY3RdP1wyprt6rdUTiqt81_ZU3LeyjOS9Uifdb8pF6nR1CGli_ym0d7x2tPMill1prhg9zKUofuKd4afZU-_xVtqOaR5qjOOJU_6O955" />
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55165503" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b53-f126-47be-840c-5fde5a6d15ea/episodes/96897b02-bc31-43be-b7de-85383c44086b/audio/19954b22-6836-4c11-9370-010a5b90979e/128/default_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 24 - Andy Has a Broken Microphone</itunes:title>
      <itunes:author>Andrew Agnes, Javvad Malik, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3f24ae1e-4b56-44aa-9fbf-fdbee63bf161/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:28</itunes:duration>
      <itunes:summary>The one where Andy tries to improve his audio quality by putting his head in a bucket. It doesn&apos;t work.

This Week in Infosec
Tweet of the Week
Billy Big Balls of the Week
Industry News
Rant of the Week
Just one more thing...</itunes:summary>
      <itunes:subtitle>The one where Andy tries to improve his audio quality by putting his head in a bucket. It doesn&apos;t work.

This Week in Infosec
Tweet of the Week
Billy Big Balls of the Week
Industry News
Rant of the Week
Just one more thing...</itunes:subtitle>
      <itunes:keywords>troy hunt, elephant erotica, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5cb1db80-91d1-4d03-96ef-f6b79c4bbccd</guid>
      <title>Episode 23 - TGIF</title>
      <description><![CDATA[<p>Lest we forget. It is a scant 12 months since Host Unknown released this onto their unsuspecting public:</p><p><a href="https://youtu.be/K1EmYxOJGKI">Lost all the Money</a></p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/happygeek/status/1302582251159519233?s=20</p><p><strong>Billy Big Balls of the Week</strong></p><p>https://www.bbc.co.uk/news/world-africa-54051424</p><img src="https://lh6.googleusercontent.com/KhbjDgW_XUovrrd-gBhs8dJF08wswrPj2fCcTTEP1_KgQIoE4s2dTznydcBifJIGgW_ExMIhiDM2Xbma07avPkFLkFemH8RSmoDCw7XfCrohGy4RmEvua_LePCHIXZync4T_ZjOt" /><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/incidents-third-ico-reports/</p><p>https://www.infosecurity-magazine.com/news/credit-skimmer-1500/</p><p>https://www.infosecurity-magazine.com/news/ransomware-2020-election/</p><p>https://www.infosecurity-magazine.com/news/bsides-london-44con-cancel-2020/</p><p>https://www.infosecurity-magazine.com/news/smbs-invest-budget-firewall/</p><p>https://www.infosecurity-magazine.com/news/businesses-insider-breaches/</p><p>https://www.infosecurity-magazine.com/news/threatconnect-nehemiah-quantifier/</p><p><strong>Rant of the Week</strong></p><p>Entitlement and job searches.</p><p>no notes supplied...</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 11 Sep 2020 13:52:06 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Thom Langford, Javvad malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-23-tgif-h5zmD3an</link>
      <content:encoded><![CDATA[<p>Lest we forget. It is a scant 12 months since Host Unknown released this onto their unsuspecting public:</p><p><a href="https://youtu.be/K1EmYxOJGKI">Lost all the Money</a></p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/happygeek/status/1302582251159519233?s=20</p><p><strong>Billy Big Balls of the Week</strong></p><p>https://www.bbc.co.uk/news/world-africa-54051424</p><img src="https://lh6.googleusercontent.com/KhbjDgW_XUovrrd-gBhs8dJF08wswrPj2fCcTTEP1_KgQIoE4s2dTznydcBifJIGgW_ExMIhiDM2Xbma07avPkFLkFemH8RSmoDCw7XfCrohGy4RmEvua_LePCHIXZync4T_ZjOt" /><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/incidents-third-ico-reports/</p><p>https://www.infosecurity-magazine.com/news/credit-skimmer-1500/</p><p>https://www.infosecurity-magazine.com/news/ransomware-2020-election/</p><p>https://www.infosecurity-magazine.com/news/bsides-london-44con-cancel-2020/</p><p>https://www.infosecurity-magazine.com/news/smbs-invest-budget-firewall/</p><p>https://www.infosecurity-magazine.com/news/businesses-insider-breaches/</p><p>https://www.infosecurity-magazine.com/news/threatconnect-nehemiah-quantifier/</p><p><strong>Rant of the Week</strong></p><p>Entitlement and job searches.</p><p>no notes supplied...</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57400331" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/0a8a908d-0ec3-4e7b-955d-77506ca9fc12/episode-23-tgif_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 23 - TGIF</itunes:title>
      <itunes:author>Andrew Agnes, Thom Langford, Javvad malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/54d3f94e-72f9-4872-bf0c-a9df36c2ab41/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:47</itunes:duration>
      <itunes:summary>The well rehearsed start goes somewhat awry, but the boys recover well and deliver a distinctly average podcast for your listening pleasure. Feathuring;

Tweet of the Week
Billy Big Balls of the Week
Rant of the Week
Sadly, no time for The Little People</itunes:summary>
      <itunes:subtitle>The well rehearsed start goes somewhat awry, but the boys recover well and deliver a distinctly average podcast for your listening pleasure. Feathuring;

Tweet of the Week
Billy Big Balls of the Week
Rant of the Week
Sadly, no time for The Little People</itunes:subtitle>
      <itunes:keywords>lost all the money, host unknown, lest we forget, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb6fd98d-6198-4da9-abe9-dd65eef4c6c0</guid>
      <title>Episode 22 - It&apos;s Twirly</title>
      <description><![CDATA[<p>The now world famous Jav and Thom take Andy to task for not being as famous as them and not appearing on the recent InfoSecurity Magazine front cover. Next week's Little People will be by Andy.</p><p>This week we have:</p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/WBLooneyTunes/status/1301375017515712513</p><img src="https://lh4.googleusercontent.com/Ea28E_eeYqFuEpD6cFRh-74FgA2LMGVvHXOr9YW6q-6IltzTrJwr3-u8MkeOGt0wHD1D7yUkehA03CRrO632dlbNjkdSLMa3lCeYXFFoNfIpKRr_oavn_erS49Twu2SEnYW6BB9e" /><p><strong>Billy Big Balls</strong></p><img src="https://lh5.googleusercontent.com/1C9UxNmqPdTAmJXWin1PWExCvc28mcJvCbEzqYZPrD8iRH4PNnkIscs5nj3YBezcvzs0EuViH0oCNsl9OUCnFquN2gbs8QJOXvDB9spVGnCsQP4q-kd56lrlS82EBthN6EOtHCvn" /><p> </p><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/covid19-spam-emails-analyzed/</p><p>https://www.infosecurity-magazine.com/news/fake-login-detections/</p><p>https://www.infosecurity-magazine.com/news/tls-certificates-398/</p><p>https://www.infosecurity-magazine.com/news/dhs-biometric-collection-rules/</p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/SQSdoE9DU9oysrAf5eA7EL4KyUENdR0iXRlZBr5Zqi-vjKqiV9A6RgapW41y8DQldxL5N1zFlcfHh2vfHzsAAa-6fSPpkBo79xDczBfOqwEKNKBsa8fQy9ONkylw0PgYON4pzR1g" /><p><strong>The Little People</strong></p><p>The spectacularly lovely, furry and moist James McQuiggan</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 5 Sep 2020 00:18:19 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, James McQuiggan, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-22-its-twirly-PTLsCmIq</link>
      <content:encoded><![CDATA[<p>The now world famous Jav and Thom take Andy to task for not being as famous as them and not appearing on the recent InfoSecurity Magazine front cover. Next week's Little People will be by Andy.</p><p>This week we have:</p><p><strong>Tweet of the Week</strong></p><p>https://twitter.com/WBLooneyTunes/status/1301375017515712513</p><img src="https://lh4.googleusercontent.com/Ea28E_eeYqFuEpD6cFRh-74FgA2LMGVvHXOr9YW6q-6IltzTrJwr3-u8MkeOGt0wHD1D7yUkehA03CRrO632dlbNjkdSLMa3lCeYXFFoNfIpKRr_oavn_erS49Twu2SEnYW6BB9e" /><p><strong>Billy Big Balls</strong></p><img src="https://lh5.googleusercontent.com/1C9UxNmqPdTAmJXWin1PWExCvc28mcJvCbEzqYZPrD8iRH4PNnkIscs5nj3YBezcvzs0EuViH0oCNsl9OUCnFquN2gbs8QJOXvDB9spVGnCsQP4q-kd56lrlS82EBthN6EOtHCvn" /><p> </p><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/covid19-spam-emails-analyzed/</p><p>https://www.infosecurity-magazine.com/news/fake-login-detections/</p><p>https://www.infosecurity-magazine.com/news/tls-certificates-398/</p><p>https://www.infosecurity-magazine.com/news/dhs-biometric-collection-rules/</p><p><strong>Rant of the Week</strong></p><img src="https://lh6.googleusercontent.com/SQSdoE9DU9oysrAf5eA7EL4KyUENdR0iXRlZBr5Zqi-vjKqiV9A6RgapW41y8DQldxL5N1zFlcfHh2vfHzsAAa-6fSPpkBo79xDczBfOqwEKNKBsa8fQy9ONkylw0PgYON4pzR1g" /><p><strong>The Little People</strong></p><p>The spectacularly lovely, furry and moist James McQuiggan</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57186336" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/f247ae36-77af-4959-a19a-4e4abad4f8e4/episode-22-its-twirly_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 22 - It&apos;s Twirly</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, James McQuiggan, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/8ce9472b-476b-4e41-bab5-ac567edb9475/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:34</itunes:duration>
      <itunes:summary>Thom almost gives his evening plans away, Andy has the builders in, and Jav is late (surprise).
Your usual weekly smorgasbord of:
Tweet of the Week
Billy Big Balls
Industry News
Rant of the Week
The Little People</itunes:summary>
      <itunes:subtitle>Thom almost gives his evening plans away, Andy has the builders in, and Jav is late (surprise).
Your usual weekly smorgasbord of:
Tweet of the Week
Billy Big Balls
Industry News
Rant of the Week
The Little People</itunes:subtitle>
      <itunes:keywords>does ayone actully use these?, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">602699d0-051e-4929-8b60-8b5241f76cfb</guid>
      <title>Episode 21 - Wireless Access Protocol</title>
      <description><![CDATA[<p>Marital advice, PETA safe hobbies, Aimee Laycock and Cardi B's WAP. We are nothing if not varied.</p><p><strong>The Little People (Part 1)</strong></p><p>Aimee Laycock talks about Research</p><p><strong>Tweet of the Week</strong></p><p>https://www.wired.com/story/how-four-brothers-allegedly-fleeced-19-million-amazon/</p><p><strong>Billy Big Balls</strong></p><p>https://www.zdnet.com/article/russian-arrested-for-trying-to-recruit-an-insider-and-hack-a-nevada-company/</p><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/palo-alto-crypsis/</p><p>https://www.infosecurity-magazine.com/news/tls-vpn-flaws-tester/</p><p>https://www.infosecurity-magazine.com/news/bt-security-vendor-partners/</p><p><strong>Rant of the Week</strong></p><p>https://www.linkedin.com/posts/brianbrackenborough_im-more-sympathetic-than-ive-ever-been-activity-6704317848841420801-lYr-/</p><p><strong>The Little People (Part 2)</strong></p><p>Aimee Laycock is still talking about Research.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 28 Aug 2020 11:15:55 +0000</pubDate>
      <author>thom@tl2security.com (Aimee Laycock, Thom Langford, Javvad Malik, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-21-wireless-access-protocol-WCa1qoOt</link>
      <content:encoded><![CDATA[<p>Marital advice, PETA safe hobbies, Aimee Laycock and Cardi B's WAP. We are nothing if not varied.</p><p><strong>The Little People (Part 1)</strong></p><p>Aimee Laycock talks about Research</p><p><strong>Tweet of the Week</strong></p><p>https://www.wired.com/story/how-four-brothers-allegedly-fleeced-19-million-amazon/</p><p><strong>Billy Big Balls</strong></p><p>https://www.zdnet.com/article/russian-arrested-for-trying-to-recruit-an-insider-and-hack-a-nevada-company/</p><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/palo-alto-crypsis/</p><p>https://www.infosecurity-magazine.com/news/tls-vpn-flaws-tester/</p><p>https://www.infosecurity-magazine.com/news/bt-security-vendor-partners/</p><p><strong>Rant of the Week</strong></p><p>https://www.linkedin.com/posts/brianbrackenborough_im-more-sympathetic-than-ive-ever-been-activity-6704317848841420801-lYr-/</p><p><strong>The Little People (Part 2)</strong></p><p>Aimee Laycock is still talking about Research.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57614326" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/596286f3-da6f-4cfd-93b4-bd24c7dd49a3/episode-21-wireless-access-protocol_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 21 - Wireless Access Protocol</itunes:title>
      <itunes:author>Aimee Laycock, Thom Langford, Javvad Malik, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5a24887d-dae0-4d0b-8354-b0ead761471a/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:01</itunes:duration>
      <itunes:summary>Who knew Cardi B was an MCSE?

The Little People (part 1)
Tweet of the Week
Billy Big Balls
Industry news
Rant of the Week
The Little People (Part 2)
</itunes:summary>
      <itunes:subtitle>Who knew Cardi B was an MCSE?

The Little People (part 1)
Tweet of the Week
Billy Big Balls
Industry news
Rant of the Week
The Little People (Part 2)
</itunes:subtitle>
      <itunes:keywords>seal clubbing, peta, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5dca43b8-ffb1-4471-b29e-473d5452449c</guid>
      <title>Episode 20 - Dr Foster Went to Gloucester</title>
      <description><![CDATA[<p>The one without Jav. Mostly.</p><p><strong>Tweet of the Week</strong></p><p>KnowBe4 release thier Organisational Cyber Security Culture Research Report, and no registration wall to download it!</p><p>https://www.knowbe4.com/organizational-cyber-security-culture-research-report</p><p><strong>Billy Big Balls</strong></p><p>Athena Health guy holds his hands up after Host Unknown attention</p><img src="https://lh3.googleusercontent.com/4ROq124cXmef0DNwYdWHmloj2sBlolK98FmEnnJ7uq2I-YdtG0mvzwNfN9z9lmgZUzGZyOAPfrryrm-fL5WMVWP8J35BSG1wJ0A9zPo1K0onQQ27ufotme08CLu1H2Yy7PrfRU2n" /><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/reported-data-breaches-down-2020/</p><p>https://www.infosecurity-magazine.com/news/huawei-phones-updates-ban/</p><p>https://www.infosecurity-magazine.com/news/outsource-cyber-services/</p><p><strong>Rant of the week</strong></p><p>https://www.theregister.com/2020/08/20/uber_sullivan_charges</p><p>As Uber's chief security officer, Joe Sullivan broke the law by hushing up the theft of millions of people's details from the app maker's databases by hackers, prosecutors say.</p><p>Sullivan, 52, formerly of eBay, Facebook, and PayPal, was today charged with obstruction of justice and misprision – concealing knowledge of a crime from law enforcement – by the US District Attorney for Northern California, an office he briefly worked for back in the day. These come with potentially five and three-year prison sentences, respectively, and a fine of up to $250,000 apiece.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 21 Aug 2020 11:18:06 +0000</pubDate>
      <author>thom@tl2security.com (Andew Agnes, Thom Langford, Jav &quot;I&apos;m Never Late&quot; Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-20-dr-foster-went-to-gloucester-OzvbdTwc</link>
      <content:encoded><![CDATA[<p>The one without Jav. Mostly.</p><p><strong>Tweet of the Week</strong></p><p>KnowBe4 release thier Organisational Cyber Security Culture Research Report, and no registration wall to download it!</p><p>https://www.knowbe4.com/organizational-cyber-security-culture-research-report</p><p><strong>Billy Big Balls</strong></p><p>Athena Health guy holds his hands up after Host Unknown attention</p><img src="https://lh3.googleusercontent.com/4ROq124cXmef0DNwYdWHmloj2sBlolK98FmEnnJ7uq2I-YdtG0mvzwNfN9z9lmgZUzGZyOAPfrryrm-fL5WMVWP8J35BSG1wJ0A9zPo1K0onQQ27ufotme08CLu1H2Yy7PrfRU2n" /><p><strong>Industry News</strong></p><p>https://www.infosecurity-magazine.com/news/reported-data-breaches-down-2020/</p><p>https://www.infosecurity-magazine.com/news/huawei-phones-updates-ban/</p><p>https://www.infosecurity-magazine.com/news/outsource-cyber-services/</p><p><strong>Rant of the week</strong></p><p>https://www.theregister.com/2020/08/20/uber_sullivan_charges</p><p>As Uber's chief security officer, Joe Sullivan broke the law by hushing up the theft of millions of people's details from the app maker's databases by hackers, prosecutors say.</p><p>Sullivan, 52, formerly of eBay, Facebook, and PayPal, was today charged with obstruction of justice and misprision – concealing knowledge of a crime from law enforcement – by the US District Attorney for Northern California, an office he briefly worked for back in the day. These come with potentially five and three-year prison sentences, respectively, and a fine of up to $250,000 apiece.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55616899" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/cff8c570-4c74-4691-a449-50c845527487/episode-20-dr-foster-went-to-gloucester_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 20 - Dr Foster Went to Gloucester</itunes:title>
      <itunes:author>Andew Agnes, Thom Langford, Jav &quot;I&apos;m Never Late&quot; Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/de9daf19-aa7d-490a-8238-f1e6fb1118bd/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:56</itunes:duration>
      <itunes:summary>This is a Jav Free Episode. May contain Jav.

Your usual collection of stories, banter, rubbish and blather, all in under an hour.</itunes:summary>
      <itunes:subtitle>This is a Jav Free Episode. May contain Jav.

Your usual collection of stories, banter, rubbish and blather, all in under an hour.</itunes:subtitle>
      <itunes:keywords>notjav, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a229b7b4-9957-475f-b767-5fd0ac89938d</guid>
      <title>Episode 19 - Fuck off You Big Lamp, The It&apos;s Too Hot Episode</title>
      <description><![CDATA[<p>Technical issues abound, and the boys nearly miss this episode. It started slow, but we warmed up by the end. </p><p>TRIGGER WARNING: Jimmy Saville</p><p>In this episode:</p><p><strong>Tweet of the Week</strong></p><p>Hamptons He-Hooker for Hire Hoses High Class Hussies</p><p>https://twitter.com/jaimeprimak/status/1292653091582615552?s=21</p><p> </p><p><strong>Billy Big Balls</strong></p><p>Healthcare Hissy-Fit Highlights His Holier-than-though Haughtiness</p><img src="https://lh5.googleusercontent.com/rJv_ZYjxB4_FXoHA6WhXZnElJ6dZvFZnNXZoJFRoJOSgW_CtsB1LRwvOqWsUFbep3rz2CaQIKC0wQe0LZHjs6HXGqOqWYroO-32tympJ9-YyS9Q4o3aBvdBevxHDyQ68A2UNVMHZ" /><p> </p><img src="https://lh6.googleusercontent.com/ETCGRhaUL0XVL9l-uZEpis-x2a5U7oVNTpQcfdnU8UnZwqex4eai8Hf7jju6T_P4BcsjKvdTA3V2ui4kkFkh5FyXMcPNsNPwa1MUolTM6pKixe_mHR-Nh3L5GlraJWoU69AnBsB9" /><p> </p><img src="https://lh3.googleusercontent.com/-RGbgO0mQTlGsapZms65SzjnX_TQ_22U4Q5RN3_S4DhWtwB7m5VijDCf0oKWibIqD7gPjLYGxoCGFZLiUFRitRdSFx95lGDQ4v5QQQLVD6SHQyewzgYDf0awlm8k2OlYj6aqQLnQ" /><p> </p><p><strong>Rant of the Week</strong></p><p>Phone Provider Pisses off Parent of Premium Pioneer</p><p>https://twitter.com/mikko/status/1291718787507662849</p><p> </p><p><strong>The Little People</strong></p><p>Just kidding, Jav let us down again.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 14 Aug 2020 17:41:38 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Andre Agnes, Javvad malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-19-fuck-off-you-big-lamp-the-its-too-hot-episode-cBmgu_4B</link>
      <content:encoded><![CDATA[<p>Technical issues abound, and the boys nearly miss this episode. It started slow, but we warmed up by the end. </p><p>TRIGGER WARNING: Jimmy Saville</p><p>In this episode:</p><p><strong>Tweet of the Week</strong></p><p>Hamptons He-Hooker for Hire Hoses High Class Hussies</p><p>https://twitter.com/jaimeprimak/status/1292653091582615552?s=21</p><p> </p><p><strong>Billy Big Balls</strong></p><p>Healthcare Hissy-Fit Highlights His Holier-than-though Haughtiness</p><img src="https://lh5.googleusercontent.com/rJv_ZYjxB4_FXoHA6WhXZnElJ6dZvFZnNXZoJFRoJOSgW_CtsB1LRwvOqWsUFbep3rz2CaQIKC0wQe0LZHjs6HXGqOqWYroO-32tympJ9-YyS9Q4o3aBvdBevxHDyQ68A2UNVMHZ" /><p> </p><img src="https://lh6.googleusercontent.com/ETCGRhaUL0XVL9l-uZEpis-x2a5U7oVNTpQcfdnU8UnZwqex4eai8Hf7jju6T_P4BcsjKvdTA3V2ui4kkFkh5FyXMcPNsNPwa1MUolTM6pKixe_mHR-Nh3L5GlraJWoU69AnBsB9" /><p> </p><img src="https://lh3.googleusercontent.com/-RGbgO0mQTlGsapZms65SzjnX_TQ_22U4Q5RN3_S4DhWtwB7m5VijDCf0oKWibIqD7gPjLYGxoCGFZLiUFRitRdSFx95lGDQ4v5QQQLVD6SHQyewzgYDf0awlm8k2OlYj6aqQLnQ" /><p> </p><p><strong>Rant of the Week</strong></p><p>Phone Provider Pisses off Parent of Premium Pioneer</p><p>https://twitter.com/mikko/status/1291718787507662849</p><p> </p><p><strong>The Little People</strong></p><p>Just kidding, Jav let us down again.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="54024057" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/0ced5417-985e-477b-8899-0e36323fc404/episode-19-fuck-off-you-big-lamp-the-its-too-hot-episode_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 19 - Fuck off You Big Lamp, The It&apos;s Too Hot Episode</itunes:title>
      <itunes:author>Thom Langford, Andre Agnes, Javvad malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/92073fdd-4703-49e3-a19d-6ac52fcc0aac/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:16</itunes:duration>
      <itunes:summary>Technical issues abound, and the boys nearly miss this episode.

In this episode:
Tweet of the Week
Hamptons He-Hooker for Hire Hoses High Class Hussies 
https://twitter.com/jaimeprimak/status/1292653091582615552?s=21

Billy Big Balls
  Healthcare Hissy-Fit Highlights His Holier-than-though Haughtiness

Industry News

Rant of the Week
Phone Provider Pisses off Parent of Premium Pioneer</itunes:summary>
      <itunes:subtitle>Technical issues abound, and the boys nearly miss this episode.

In this episode:
Tweet of the Week
Hamptons He-Hooker for Hire Hoses High Class Hussies 
https://twitter.com/jaimeprimak/status/1292653091582615552?s=21

Billy Big Balls
  Healthcare Hissy-Fit Highlights His Holier-than-though Haughtiness

Industry News

Rant of the Week
Phone Provider Pisses off Parent of Premium Pioneer</itunes:subtitle>
      <itunes:keywords>ncc group, hostunknown, icjd ltd, gavin holt, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ff966036-2532-4526-8af6-c2271174e287</guid>
      <title>Episode 18 - The Tik Tok Free Episode</title>
      <description><![CDATA[<p>The episode where Andy's redundant broadband connections both fail, mid podcast. Don't worry, we fixed it in post and you would never notice.</p><p><strong>Tweet of the Week</strong></p><p>Tik Tok doesn't do anything untoward with your data.</p><p>https://twitter.com/fs0c131y/status/1290229777870159873?s=20</p><p>http://appleinsider.com/articles/20/08/04/apple-allegedly-in-the-running-to-buy-tiktok</p><p><strong>Billy Big Balls of the Week</strong></p><p>Low paid servitude in LA</p><p>https://twitter.com/taylorlorenz/status/1289245991346925574?s=21</p><p><strong>Rant of the Week</strong></p><p>Andy gets upset with a clients "problem statement"</p><p><strong>The Little People</strong></p><p>Just kidding, not this week, although Thom retracts his statement that Lee Munson is "some nobody from my distant past" and that they regularly exchange Christmas cards.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 6 Aug 2020 12:12:19 +0000</pubDate>
      <author>thom@tl2security.com (Javvad malik, Andrew Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-18-the-tik-tok-free-episode-JGvLE0Jr</link>
      <content:encoded><![CDATA[<p>The episode where Andy's redundant broadband connections both fail, mid podcast. Don't worry, we fixed it in post and you would never notice.</p><p><strong>Tweet of the Week</strong></p><p>Tik Tok doesn't do anything untoward with your data.</p><p>https://twitter.com/fs0c131y/status/1290229777870159873?s=20</p><p>http://appleinsider.com/articles/20/08/04/apple-allegedly-in-the-running-to-buy-tiktok</p><p><strong>Billy Big Balls of the Week</strong></p><p>Low paid servitude in LA</p><p>https://twitter.com/taylorlorenz/status/1289245991346925574?s=21</p><p><strong>Rant of the Week</strong></p><p>Andy gets upset with a clients "problem statement"</p><p><strong>The Little People</strong></p><p>Just kidding, not this week, although Thom retracts his statement that Lee Munson is "some nobody from my distant past" and that they regularly exchange Christmas cards.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="47223861" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/e0e74e5f-96f2-4773-a09f-d4f856815b92/episode-18-the-tik-tok-free-epsode_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 18 - The Tik Tok Free Episode</itunes:title>
      <itunes:author>Javvad malik, Andrew Agnes, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6fb614d8-8d54-4434-82e0-614c7b463742/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:11</itunes:duration>
      <itunes:summary>To be clear, Thom loves Lee Munson.

All your favourite features, including a low paying job of servitude, Zoom Bombing and pushy, uninformed clients.

Happy DefCon week everyone!</itunes:summary>
      <itunes:subtitle>To be clear, Thom loves Lee Munson.

All your favourite features, including a low paying job of servitude, Zoom Bombing and pushy, uninformed clients.

Happy DefCon week everyone!</itunes:subtitle>
      <itunes:keywords>host unknown, we need sponsors, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c2fedce-f699-4cae-a67c-5a62dc2b4412</guid>
      <title>Episode 17 - Sponsored by The Duchess of Ladywell</title>
      <description><![CDATA[<p>This weeks show is sponsored, demonstrating Host Unknown's 200% performance increase year on year when it comes to sponsorship deals. Who wouldn't want to be a sponsor of our show with those stats?</p><p>Andy's Percy Pig Problem</p><p><a href="https://twitter.com/trevolafoam/status/1288364716004450304?s=20">https://twitter.com/trevolafoam/status/1288364716004450304?s=20</a></p><p>Thom's Bonobo Problem</p><img src="https://lh6.googleusercontent.com/Y1S2YUSksayY5sjELEluLF6LdVkiqYXMI9gferxKHnUJxAaADelwyc-8ByzmW-1NvSLds32WN-hhm8g31b6L_I96RhWO5blQfIC46pfQibzUdgXffGFZYRqgv01PJeGDYeZlh-tY" /><p> </p><p>Jav's Instagram Problem</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-camera-spying-iphone-ios-14-feature-bug-a9641286.html">https://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-camera-spying-iphone-ios-14-feature-bug-a9641286.html</a></p><p>... and the much anticipated return of the little people with the ineffable Lee Munson.</p><p>That's a full show, and yet we still manage to fit in Industry news and an offer of free advertising for anyone who took out lifetime sponsorship packages at Peerlyst, which unfortunately closed its doors this week.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 30 Jul 2020 14:27:38 +0000</pubDate>
      <author>thom@tl2security.com (Javvad malik, Sheila Langford, Andrew Agnes, Lee Munson, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-17-sponsored-by-the-duchess-of-ladywell-ucWAIN5W</link>
      <content:encoded><![CDATA[<p>This weeks show is sponsored, demonstrating Host Unknown's 200% performance increase year on year when it comes to sponsorship deals. Who wouldn't want to be a sponsor of our show with those stats?</p><p>Andy's Percy Pig Problem</p><p><a href="https://twitter.com/trevolafoam/status/1288364716004450304?s=20">https://twitter.com/trevolafoam/status/1288364716004450304?s=20</a></p><p>Thom's Bonobo Problem</p><img src="https://lh6.googleusercontent.com/Y1S2YUSksayY5sjELEluLF6LdVkiqYXMI9gferxKHnUJxAaADelwyc-8ByzmW-1NvSLds32WN-hhm8g31b6L_I96RhWO5blQfIC46pfQibzUdgXffGFZYRqgv01PJeGDYeZlh-tY" /><p> </p><p>Jav's Instagram Problem</p><p><a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-camera-spying-iphone-ios-14-feature-bug-a9641286.html">https://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-camera-spying-iphone-ios-14-feature-bug-a9641286.html</a></p><p>... and the much anticipated return of the little people with the ineffable Lee Munson.</p><p>That's a full show, and yet we still manage to fit in Industry news and an offer of free advertising for anyone who took out lifetime sponsorship packages at Peerlyst, which unfortunately closed its doors this week.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55379498" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/fc57ecc8-0e8e-48e9-946f-89789dad88f7/episode-17-30-07-2020-15-10_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 17 - Sponsored by The Duchess of Ladywell</itunes:title>
      <itunes:author>Javvad malik, Sheila Langford, Andrew Agnes, Lee Munson, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/3620dd97-0fe2-4f66-aa61-349a6ac6ccdd/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:41</itunes:duration>
      <itunes:summary>Finally Host Unknown gets the better Langford involved in the podcast.
Tweet of the Week
Billy Big Balls of the Week
Rant of the Week
AND AN ACTUAL LITTLE PEOPLE!</itunes:summary>
      <itunes:subtitle>Finally Host Unknown gets the better Langford involved in the podcast.
Tweet of the Week
Billy Big Balls of the Week
Rant of the Week
AND AN ACTUAL LITTLE PEOPLE!</itunes:subtitle>
      <itunes:keywords>peerlyst, security-faqs.com, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9d54ac23-eee6-4905-a251-f6760a9bc99e</guid>
      <title>Episode 16 - I&apos;m So Sorry Mum</title>
      <description><![CDATA[<p>It's a day late, it was Thom's fault, but the episode is all the better for it (probably).</p><p>This episode is bought to you by Thom's mum (I am so sorry Mum, they made me do it...).</p><p><strong>Tweet of the week</strong></p><p>Daniel Cuthbert's hair talks sense on the latest static testing tools.</p><p>https://twitter.com/dcuthbert/status/1286226224172404738?s=20</p><p><strong>Billy Big Balls of the Week</strong></p><p>Jav drives traffic to his content through the news of the new Meow Bot worm.</p><p>https://www.forbes.com/sites/daveywinder/2020/07/22/not-all-internet-cats-are-cute-meow-bot-is-a-database-destroyer/#264687e930e2</p><p><strong>Rant of the Week</strong></p><p>Andy unknowingly drives traffic to Jav's content on an awful breach response.</p><p>https://www.computerweekly.com/news/252486556/A-question-of-trust-University-and-supplier-on-the-hook-for-data-breach</p><p><strong>The Little People</strong></p><p>Jav has a surprise for us in the little people. Not.</p><p>This weeks show also features Thom's amazing Mother, Sheila Langford. Love you Mum! xxx</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Sat, 25 Jul 2020 11:23:07 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Javvad Malik, Sheila Langford, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-16-im-so-sorry-mum-OESy_RfC</link>
      <content:encoded><![CDATA[<p>It's a day late, it was Thom's fault, but the episode is all the better for it (probably).</p><p>This episode is bought to you by Thom's mum (I am so sorry Mum, they made me do it...).</p><p><strong>Tweet of the week</strong></p><p>Daniel Cuthbert's hair talks sense on the latest static testing tools.</p><p>https://twitter.com/dcuthbert/status/1286226224172404738?s=20</p><p><strong>Billy Big Balls of the Week</strong></p><p>Jav drives traffic to his content through the news of the new Meow Bot worm.</p><p>https://www.forbes.com/sites/daveywinder/2020/07/22/not-all-internet-cats-are-cute-meow-bot-is-a-database-destroyer/#264687e930e2</p><p><strong>Rant of the Week</strong></p><p>Andy unknowingly drives traffic to Jav's content on an awful breach response.</p><p>https://www.computerweekly.com/news/252486556/A-question-of-trust-University-and-supplier-on-the-hook-for-data-breach</p><p><strong>The Little People</strong></p><p>Jav has a surprise for us in the little people. Not.</p><p>This weeks show also features Thom's amazing Mother, Sheila Langford. Love you Mum! xxx</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56996165" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/15eb94d5-0916-46e3-a805-66b7d96a3560/episode-16-i-m-sorry-mum_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 16 - I&apos;m So Sorry Mum</itunes:title>
      <itunes:author>Andrew Agnes, Javvad Malik, Sheila Langford, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7d1684d2-fb04-481b-8a25-c61f25dab03b/3000x3000/hu-podcast-artwork-2020-1.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:22</itunes:duration>
      <itunes:summary>The podcast that should have been released the day before, featuring prehistoric tools, Blackbaud, Cats and a surprise Little People.</itunes:summary>
      <itunes:subtitle>The podcast that should have been released the day before, featuring prehistoric tools, Blackbaud, Cats and a surprise Little People.</itunes:subtitle>
      <itunes:keywords>keepnet labs, blackbaud, host unknown, inbfosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0837b2e2-a360-415c-9756-ba6d825ed77b</guid>
      <title>Episode 15 - Barely Adequate friend</title>
      <description><![CDATA[<p><strong>Tweet of the Week</strong></p><p>https://news.sky.com/story/twitter-accounts-of-obama-biden-musk-and-others-hacked-in-apparent-bitcoin-scam-12029394</p><p>https://javvadmalik.com/2020/07/16/twittersupport-a-lesson-in-incident-response-comms/</p><p><strong>Billy Big Balls</strong></p><p><strong>Industry News</strong></p><p><strong>Rant of the Week</strong></p><p>https://twitter.com/TriciaKicksSaaS/status/1283721814896771072?s=20</p><p>Oh, and Carole Baskin as well.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 17 Jul 2020 10:51:48 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andy &quot;Andrew&quot; Agnes, Thom Langford)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-15-barely-adequate-friend-Z5Yo0Rdn</link>
      <content:encoded><![CDATA[<p><strong>Tweet of the Week</strong></p><p>https://news.sky.com/story/twitter-accounts-of-obama-biden-musk-and-others-hacked-in-apparent-bitcoin-scam-12029394</p><p>https://javvadmalik.com/2020/07/16/twittersupport-a-lesson-in-incident-response-comms/</p><p><strong>Billy Big Balls</strong></p><p><strong>Industry News</strong></p><p><strong>Rant of the Week</strong></p><p>https://twitter.com/TriciaKicksSaaS/status/1283721814896771072?s=20</p><p>Oh, and Carole Baskin as well.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="58470307" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/246056e0-e6dc-4622-9ab8-59bfd3588ab2/episode-15-barely-adequate-friend_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 15 - Barely Adequate friend</itunes:title>
      <itunes:author>Javvad Malik, Andy &quot;Andrew&quot; Agnes, Thom Langford</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/f930b2d9-a5ce-4eb3-9b4b-32ac57fa10e7/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:54</itunes:duration>
      <itunes:summary>All of the latest news, comment and dirt on our industry from the three people who really should know better; Carole Baskin, Bill Gates and the cybersecurity salesperson.</itunes:summary>
      <itunes:subtitle>All of the latest news, comment and dirt on our industry from the three people who really should know better; Carole Baskin, Bill Gates and the cybersecurity salesperson.</itunes:subtitle>
      <itunes:keywords>tiger king, carole baskin, bad friends, infosec, hust unknown</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b7d94cf7-1efd-42bd-90d6-d77a7d6b8630</guid>
      <title>Episode 14 - The one that was crashed</title>
      <description><![CDATA[<p>If you thought Avengers was the greatest crossover event of all time, hold our beer.</p><p>Host Unknown was sans Jav this week, but we were crashed by the Friends of the Show, Smashing Security. We managed to get the Tweet of the Week and Billy Big Balls before we were rudely crashed by the fragrant Carole Theriault and the plummy Graham Cluley.</p><ul><li>Four grenades recovered by police.</li><li>Industry News.</li><li>Ranting about the copy clipboard scandal.</li></ul><p>It then pretty much goes off the rails.</p><p>Thank you Carole and Graham for you assistance in filling the Jav sized ego space in the podcast.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 10 Jul 2020 11:46:38 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Graham Cluley, Thom Langford, Carole Theriault)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-14-the-one-that-was-crashed-DSODnvx_</link>
      <content:encoded><![CDATA[<p>If you thought Avengers was the greatest crossover event of all time, hold our beer.</p><p>Host Unknown was sans Jav this week, but we were crashed by the Friends of the Show, Smashing Security. We managed to get the Tweet of the Week and Billy Big Balls before we were rudely crashed by the fragrant Carole Theriault and the plummy Graham Cluley.</p><ul><li>Four grenades recovered by police.</li><li>Industry News.</li><li>Ranting about the copy clipboard scandal.</li></ul><p>It then pretty much goes off the rails.</p><p>Thank you Carole and Graham for you assistance in filling the Jav sized ego space in the podcast.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="56425650" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/e0a6864e-7f1d-48fa-8bb3-b05c76b34f1f/episode-14-the-greatest-crossover-event-of-all-time-10-07-2020-12-40_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 14 - The one that was crashed</itunes:title>
      <itunes:author>Andrew Agnes, Graham Cluley, Thom Langford, Carole Theriault</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/387335af-4782-4e66-9c49-f844c4d1c373/3000x3000/hu-podcast-artwork-2020-smashing-security.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:47</itunes:duration>
      <itunes:summary>Podcast crossover Special with the lovely folks from Smashing Security. Just a shame they don&apos;t really like each other, but remained professional for our sake.</itunes:summary>
      <itunes:subtitle>Podcast crossover Special with the lovely folks from Smashing Security. Just a shame they don&apos;t really like each other, but remained professional for our sake.</itunes:subtitle>
      <itunes:keywords>smashing security, greatest crossover event, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eca256a5-d745-4867-b864-261f4cd84371</guid>
      <title>Unlucky Number Thirteen For Some</title>
      <description><![CDATA[<p>Unlucky for some? Yes we were, as Jav turned up anyway.</p><p>Kickstarting the economy and taking advantage of good samaritans.</p><p>Jav talks about bug bounty profit in three easy steps.</p><p>Thom receives some very, very, very bad news.</p><p>Thom talks about how our industry is becoming nicer to us normal people. https://www.linkedin.com/feed/update/urn:li:activity:6679522900304814080/</p><p>Award winning industry news from our InfoSec Stig.</p><p>Andy makes it all serious again with privacy & DuckDuckGo.</p><p>This weeks sponsors could have been Tesla and British Airways.</p><p>Jav drops the ball on The Little People. You had one job,   Jav.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 3 Jul 2020 11:40:08 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Thom Langford, Andrew Agnes, InfoSec Stig)</author>
      <link>https://podcast.hostunknown.tv/episodes/unlucky-number-thirteen-for-some-LOFuONCp</link>
      <content:encoded><![CDATA[<p>Unlucky for some? Yes we were, as Jav turned up anyway.</p><p>Kickstarting the economy and taking advantage of good samaritans.</p><p>Jav talks about bug bounty profit in three easy steps.</p><p>Thom receives some very, very, very bad news.</p><p>Thom talks about how our industry is becoming nicer to us normal people. https://www.linkedin.com/feed/update/urn:li:activity:6679522900304814080/</p><p>Award winning industry news from our InfoSec Stig.</p><p>Andy makes it all serious again with privacy & DuckDuckGo.</p><p>This weeks sponsors could have been Tesla and British Airways.</p><p>Jav drops the ball on The Little People. You had one job,   Jav.</p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="60372439" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/6daea65f-5088-46ba-a78c-064f81cdaa79/unlucky-number-thirteen-for-some-03-07-2020-12-33_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Unlucky Number Thirteen For Some</itunes:title>
      <itunes:author>Javvad Malik, Thom Langford, Andrew Agnes, InfoSec Stig</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/6efbbaa1-581d-467a-8d09-2e08ac8d2636/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:53</itunes:duration>
      <itunes:summary>Unlucky for some? Not us! We kicked off with only two presenters and it went downhill from there.
Another serious privacy discussion; who signed you up for this?</itunes:summary>
      <itunes:subtitle>Unlucky for some? Not us! We kicked off with only two presenters and it went downhill from there.
Another serious privacy discussion; who signed you up for this?</itunes:subtitle>
      <itunes:keywords>host unknown, ba gold card, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f34b04b-69bb-46ad-93f9-52563b811153</guid>
      <title>Episode 12 - Where Did All The Money Go?</title>
      <description><![CDATA[<p>Where Did All The Money Go?</p><p>Shit got real in this episode; we covered:</p><p>Front doors</p><p>A house that looks like Hitler</p><p>https://i.dailymail.co.uk/i/pix/2016/09/08/11/380E25DA00000578-3779485-image-a-86_1473329102921.jpg</p><p>Monopoly Billy Big Balls moves</p><p>https://www.npr.org/sections/thetwo-way/2010/06/how_to_win_monopoly_in_21_seco.html</p><p>Smiling for capitalism</p><p>Out of work accountants</p><p>Javvad pulls no bunches</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 26 Jun 2020 15:20:49 +0000</pubDate>
      <author>thom@tl2security.com (Javvad malik, Thom langford, Andrew Agnes)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-12-where-did-all-the-money-go-2P2DwnCu</link>
      <content:encoded><![CDATA[<p>Where Did All The Money Go?</p><p>Shit got real in this episode; we covered:</p><p>Front doors</p><p>A house that looks like Hitler</p><p>https://i.dailymail.co.uk/i/pix/2016/09/08/11/380E25DA00000578-3779485-image-a-86_1473329102921.jpg</p><p>Monopoly Billy Big Balls moves</p><p>https://www.npr.org/sections/thetwo-way/2010/06/how_to_win_monopoly_in_21_seco.html</p><p>Smiling for capitalism</p><p>Out of work accountants</p><p>Javvad pulls no bunches</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="62084400" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/544878e4-a47c-4f92-b7f3-20f376320e5f/episode-11-where-did-all-the-money-go-26-06-2020-16-07_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 12 - Where Did All The Money Go?</itunes:title>
      <itunes:author>Javvad malik, Thom langford, Andrew Agnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/5ffbfd8e-d232-4869-806e-11e1dc13d88d/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:04:40</itunes:duration>
      <itunes:summary>This one got serious!

If you would like to apply to be the third member of Host Unknown please send your CV and covering video to Thom and Javvad.</itunes:summary>
      <itunes:subtitle>This one got serious!

If you would like to apply to be the third member of Host Unknown please send your CV and covering video to Thom and Javvad.</itunes:subtitle>
      <itunes:keywords>podcast, commentary, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5e5a3f6d-4388-4bf6-949f-609b03b83acb</guid>
      <title>Episode 11 The One What Was Sponsored</title>
      <description><![CDATA[<p>This weeks episode includes Kim Kardashian, toilet flushing shenanigans, a plethora of expertly written industry news, the Cambodian Government Covid-19 'scam', eBay and their excellent customer service and finally Paco Hope tells us about his big cat reserve in Florida.</p><p>Thom also reveals who Graham's least favourite guest on carole's Smashing Security Podcast is. Honestly.</p><p>Thank you to our Sponsors, the wonderful Carol Theriault and the adequate Graham Cluley of The Smashing Security podcast.</p><p>https://www.smashingsecurity.com</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 19 Jun 2020 14:06:07 +0000</pubDate>
      <author>thom@tl2security.com (Javvad Malik, Andrew Agnes, Thom Langford, Paco Hope)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-11-the-one-what-was-sponsored-btiUu6hV</link>
      <content:encoded><![CDATA[<p>This weeks episode includes Kim Kardashian, toilet flushing shenanigans, a plethora of expertly written industry news, the Cambodian Government Covid-19 'scam', eBay and their excellent customer service and finally Paco Hope tells us about his big cat reserve in Florida.</p><p>Thom also reveals who Graham's least favourite guest on carole's Smashing Security Podcast is. Honestly.</p><p>Thank you to our Sponsors, the wonderful Carol Theriault and the adequate Graham Cluley of The Smashing Security podcast.</p><p>https://www.smashingsecurity.com</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57852145" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/2048730b-3b76-4e35-8d4e-666835ceb38a/episode-11-the-one-what-was-sponsored-19-06-2020-14-55_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 11 The One What Was Sponsored</itunes:title>
      <itunes:author>Javvad Malik, Andrew Agnes, Thom Langford, Paco Hope</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/07d3b3de-2bf6-43ff-9cf9-db9d74a1b522/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:16</itunes:duration>
      <itunes:summary>This is NOT the Smashing Security Podcast...

This is the one where Andy incriminates himself. Twice.</itunes:summary>
      <itunes:subtitle>This is NOT the Smashing Security Podcast...

This is the one where Andy incriminates himself. Twice.</itunes:subtitle>
      <itunes:keywords>carole baskin, smashing security, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce8813b5-4511-4f1a-a441-f2c7f512ab6c</guid>
      <title>We Can&apos;t Believe It&apos;s Episode 10!</title>
      <description><![CDATA[<p>Breaking news about the financial future of the Host Unknown Podcast, tea and takedown notices.</p><p>Despite what it sounds like this episode is categorically NOT sponsored by The Smashing Security Podcast, even with our special guest in The Little People.</p><p>Some audio challenges (sorry about breaking your headphones with some of the jingles), but you really do get what you pay for. Want better quality? Sponsor us at https://hostunknown.tv/the-financials/.</p><p>Want Episode 2? Pay £100, or £250 if you want to be the sole owner of that episode. Your chance for a piece of Podcast InfoSec history.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 12 Jun 2020 17:00:04 +0000</pubDate>
      <author>thom@tl2security.com (Carole Theriault, Andrew Agnes, Thom Langford, Javvad malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/we-cant-believe-its-episode-10-PKMaqDcU</link>
      <content:encoded><![CDATA[<p>Breaking news about the financial future of the Host Unknown Podcast, tea and takedown notices.</p><p>Despite what it sounds like this episode is categorically NOT sponsored by The Smashing Security Podcast, even with our special guest in The Little People.</p><p>Some audio challenges (sorry about breaking your headphones with some of the jingles), but you really do get what you pay for. Want better quality? Sponsor us at https://hostunknown.tv/the-financials/.</p><p>Want Episode 2? Pay £100, or £250 if you want to be the sole owner of that episode. Your chance for a piece of Podcast InfoSec history.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="59373934" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/e605ef6e-8043-4e6c-9556-9daece3271a0/i-can-t-believe-its-episode-10_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>We Can&apos;t Believe It&apos;s Episode 10!</itunes:title>
      <itunes:author>Carole Theriault, Andrew Agnes, Thom Langford, Javvad malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7866db3b-bc24-4b20-85f0-5a25632e9bda/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:51</itunes:duration>
      <itunes:summary>Breaking news about the financial future of the Host Unknown Podcast, tea and takedown notices. With special guest star Carole Theriault, Sole Founder of the Smashing Security Podcast.
</itunes:summary>
      <itunes:subtitle>Breaking news about the financial future of the Host Unknown Podcast, tea and takedown notices. With special guest star Carole Theriault, Sole Founder of the Smashing Security Podcast.
</itunes:subtitle>
      <itunes:keywords>smashing security, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f01b948-8f70-4ba9-8d8d-803349903abb</guid>
      <title>Episode 9 - The podcast for all people</title>
      <description><![CDATA[<p>This Episode is a Trump Free Zone.</p><p>It is also the episode where we mangle our support for a very real and urgent cause, Black Lives Matter. We are neither qualified or intelligent enough to comment any further except to say BLACK LIVES MATTER, and if you disagree we no longer want you near our podcast.</p><p>The world is full of injustices, and BLM is the one that is quite rightly in the public eye at the moment. Our podcast is produced to bring a smile to the faces of anyone and everyone, all colours and creeds (except the intolerant) and to help people through their daily lives.</p><p>In this weeks episode, Joy Lycett (comedian) screws up teaching a woman how to phish, a well known journalist throws shade at bloggers worldwide (Dan Raywood), Tiger King dethroned, Javvad folds like a pack of cards.</p><p>Paco Hope. </p><p>The cocktail company is Stir Crazy: https://www.instagram.com/stir_crazy_cocktails/</p><p>Post credits copyright Monty Python.</p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 5 Jun 2020 16:20:31 +0000</pubDate>
      <author>thom@tl2security.com (Dan Raywood, Andrew Agnes, Thom Langford, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-9-the-podcast-for-all-people-jGMI4vmh</link>
      <content:encoded><![CDATA[<p>This Episode is a Trump Free Zone.</p><p>It is also the episode where we mangle our support for a very real and urgent cause, Black Lives Matter. We are neither qualified or intelligent enough to comment any further except to say BLACK LIVES MATTER, and if you disagree we no longer want you near our podcast.</p><p>The world is full of injustices, and BLM is the one that is quite rightly in the public eye at the moment. Our podcast is produced to bring a smile to the faces of anyone and everyone, all colours and creeds (except the intolerant) and to help people through their daily lives.</p><p>In this weeks episode, Joy Lycett (comedian) screws up teaching a woman how to phish, a well known journalist throws shade at bloggers worldwide (Dan Raywood), Tiger King dethroned, Javvad folds like a pack of cards.</p><p>Paco Hope. </p><p>The cocktail company is Stir Crazy: https://www.instagram.com/stir_crazy_cocktails/</p><p>Post credits copyright Monty Python.</p><p> </p><p> </p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="55331851" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/a8689946-ab44-4a9f-b5c5-15a13121c2db/episode-9-for-all-people_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 9 - The podcast for all people</itunes:title>
      <itunes:author>Dan Raywood, Andrew Agnes, Thom Langford, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/a2a863b7-50d3-4eb7-9e7a-1204cd4cddcf/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:38</itunes:duration>
      <itunes:summary>BLM

Joe Lycett and the court of social media, bad bloggers, Joe Exotic, Industry News, keeping labs safe on the net. Also, Paco Hope.</itunes:summary>
      <itunes:subtitle>BLM

Joe Lycett and the court of social media, bad bloggers, Joe Exotic, Industry News, keeping labs safe on the net. Also, Paco Hope.</itunes:subtitle>
      <itunes:keywords>keepnet labs, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a7030999-00c7-444c-8059-37d00c3319be</guid>
      <title>Episode 8 is the Charm</title>
      <description><![CDATA[<p>Medicaid scam, LinkedIn trolling, Magnum PI and Murder She Wrote crossovers, Wim Remes (at last!) and Trump. </p><p>WARNING! This episode strays dangerously close to being a serious, current affairs podcast towards the end. We apologise for our slip of judgement. Normal service will be resumed next week.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 29 May 2020 15:20:36 +0000</pubDate>
      <author>thom@tl2security.com (Andrew Agnes, Thom langford, Wim Remes, Javvad malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/episode-8-is-the-charm-HjNM0hLr</link>
      <content:encoded><![CDATA[<p>Medicaid scam, LinkedIn trolling, Magnum PI and Murder She Wrote crossovers, Wim Remes (at last!) and Trump. </p><p>WARNING! This episode strays dangerously close to being a serious, current affairs podcast towards the end. We apologise for our slip of judgement. Normal service will be resumed next week.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="51004302" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/305a4a2d-db34-4a37-af53-07aceb6c65f5/episode-8-29-05-2020-16-05_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Episode 8 is the Charm</itunes:title>
      <itunes:author>Andrew Agnes, Thom langford, Wim Remes, Javvad malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/7f6d8d47-f9e4-4b7e-a994-9af82066eba2/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:08</itunes:duration>
      <itunes:summary>Medicaid scam, LinkedIn trolling, Magnum PI and Murder She Wrote crossovers, Wim Remes (at last!) and Trump. </itunes:summary>
      <itunes:subtitle>Medicaid scam, LinkedIn trolling, Magnum PI and Murder She Wrote crossovers, Wim Remes (at last!) and Trump. </itunes:subtitle>
      <itunes:keywords>serious debate, commentary, host unknown, infosec</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9fd3d3a8-2507-467a-8eb7-6a85a9583940</guid>
      <title>Lucky Number SLeven</title>
      <description><![CDATA[<p>Professionalism is so last week. This week we start as we mean to go on... badly.</p><p> </p><p>This episode features Trump, EasyJet (an airline, who knew?), and the Verizon DBIR. Special guest star Shan Lee (@secwaza).</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 21 May 2020 20:03:13 +0000</pubDate>
      <author>thom@tl2security.com (Thom Langford, Shan Lee, Andrew Agnes, Javvad Malik)</author>
      <link>https://podcast.hostunknown.tv/episodes/lucky-number-sleven-USjiV6X9</link>
      <content:encoded><![CDATA[<p>Professionalism is so last week. This week we start as we mean to go on... badly.</p><p> </p><p>This episode features Trump, EasyJet (an airline, who knew?), and the Verizon DBIR. Special guest star Shan Lee (@secwaza).</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="48983051" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/a47988b8-a8d1-462f-b854-4e5c9850bdfd/episode-7-21-05-2020-20-50_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Lucky Number SLeven</itunes:title>
      <itunes:author>Thom Langford, Shan Lee, Andrew Agnes, Javvad Malik</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/77d2f091-1ec5-4b54-8aa0-26e01c0e7a3f/ae65a1a4-df9b-4886-8c71-409632ce855f/3000x3000/hu-podcast-artwork-2020.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:01</itunes:duration>
      <itunes:summary>The one where we crash all the jingles.</itunes:summary>
      <itunes:subtitle>The one where we crash all the jingles.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/821115979</guid>
      <title>Host Unknown Podcast: The Definitive 6th Episode</title>
      <description><![CDATA[<p>Absolutely no technical difficulties were experienced, and we heard every word that our very special guest Rowenna Fielding was making, especially her third point.</p>
<p>Stay tuned for Jav's legal woes and Andy's auditor supremacy.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 15 May 2020 15:16:56 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/host-unknown-podcast-the-definitive-6th-episode-ofeqEda6</link>
      <content:encoded><![CDATA[<p>Absolutely no technical difficulties were experienced, and we heard every word that our very special guest Rowenna Fielding was making, especially her third point.</p>
<p>Stay tuned for Jav's legal woes and Andy's auditor supremacy.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="57137853" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/1a1c6c9d-9b75-48ba-bc12-027322f21a7a/821115979-hostunknown-host-unknown-podcast-the-definitive-6th-episode_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Host Unknown Podcast: The Definitive 6th Episode</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/1a1c6c9d-9b75-48ba-bc12-027322f21a7a/3000x3000/artworks-ekn28wp402g70daj-payzkg-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:31</itunes:duration>
      <itunes:summary>Absolutely no technical difficulties were experienced, and we heard every word that our very special guest Rowenna Fielding was making, especially her third point.

Stay tuned for Jav&apos;s legal woes and Andy&apos;s auditor supremacy.</itunes:summary>
      <itunes:subtitle>Absolutely no technical difficulties were experienced, and we heard every word that our very special guest Rowenna Fielding was making, especially her third point.

Stay tuned for Jav&apos;s legal woes and Andy&apos;s auditor supremacy.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/816201196</guid>
      <title>HU Podcast Number 5, Really</title>
      <description><![CDATA[<p>This time we get really professional, although no planning was actually carried out. Starring Rik Ferguson, Dame Dido Harding, an Ambulance Crew, and none of Thom's clients.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 8 May 2020 12:38:50 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/hu-podcast-number-5-really-isAIAapP</link>
      <content:encoded><![CDATA[<p>This time we get really professional, although no planning was actually carried out. Starring Rik Ferguson, Dame Dido Harding, an Ambulance Crew, and none of Thom's clients.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49699445" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/6428b832-a2a7-40b9-a0a1-9f7aef79efad/816201196-hostunknown-hu-podcast-number-5-really_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>HU Podcast Number 5, Really</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/6428b832-a2a7-40b9-a0a1-9f7aef79efad/3000x3000/artworks-ekn28wp402g70daj-payzkg-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:46</itunes:duration>
      <itunes:summary>This time we get really professional, although no planning was actually carried out. Starring Rik Ferguson, Dame Dido Harding, an Ambulance Crew, and none of Thom&apos;s clients.</itunes:summary>
      <itunes:subtitle>This time we get really professional, although no planning was actually carried out. Starring Rik Ferguson, Dame Dido Harding, an Ambulance Crew, and none of Thom&apos;s clients.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/811543789</guid>
      <title>Podcast The Fifth Or Something V2</title>
      <description><![CDATA[<p>The fourth or fifth podcast from the incorrigible trio of Host Unknown. Dubious audio quality. dire subject matter told in a dreary way, amateur productions techniques.</p>
<p>The show Thom was trying to remember? Benson.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Fri, 1 May 2020 19:50:46 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/podcast-the-fifth-or-something-v2-PvtjxfAw</link>
      <content:encoded><![CDATA[<p>The fourth or fifth podcast from the incorrigible trio of Host Unknown. Dubious audio quality. dire subject matter told in a dreary way, amateur productions techniques.</p>
<p>The show Thom was trying to remember? Benson.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="45715584" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/d9eb242f-1ddf-4015-966e-474525b2937b/811543789-hostunknown-podcast-the-fifth-or-something-v2_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Podcast The Fifth Or Something V2</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/d9eb242f-1ddf-4015-966e-474525b2937b/3000x3000/artworks-ekn28wp402g70daj-payzkg-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:37</itunes:duration>
      <itunes:summary>The fourth or fifth podcast from the incorrigible trio of Host Unknown. Dubious audio quality. dire subject matter told in a dreary way, amateur productions techniques.

The show Thom was trying to remember? Benson.</itunes:summary>
      <itunes:subtitle>The fourth or fifth podcast from the incorrigible trio of Host Unknown. Dubious audio quality. dire subject matter told in a dreary way, amateur productions techniques.

The show Thom was trying to remember? Benson.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/805664521</guid>
      <title>Host Unknown Podcast - The Difficult Third Album</title>
      <description><![CDATA[<p>What we lack in quality we make up for in volume.</p>
<p>Here are the presentation skills Andy should have paid attention to: https://youtu.be/bdcX5-4D_Uo</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 23 Apr 2020 21:52:43 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/host-unknown-podcast-the-difficult-third-album-QSpN9ZJo</link>
      <content:encoded><![CDATA[<p>What we lack in quality we make up for in volume.</p>
<p>Here are the presentation skills Andy should have paid attention to: https://youtu.be/bdcX5-4D_Uo</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="42508416" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/dc6ab492-d3fe-4c93-bfb7-1e3c9cf8a13b/805664521-hostunknown-host-unknown-podcast-the-difficult-third-album_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>Host Unknown Podcast - The Difficult Third Album</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/dc6ab492-d3fe-4c93-bfb7-1e3c9cf8a13b/3000x3000/artworks-ekn28wp402g70daj-payzkg-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:17</itunes:duration>
      <itunes:summary>What we lack in quality we make up for in volume.

Here are the presentation skills Andy should have paid attention to: https://youtu.be/bdcX5-4D_Uo</itunes:summary>
      <itunes:subtitle>What we lack in quality we make up for in volume.

Here are the presentation skills Andy should have paid attention to: https://youtu.be/bdcX5-4D_Uo</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/800427397</guid>
      <title>HU Podcast Episode 4b</title>
      <description><![CDATA[<p>Episode 4(b) of the inimitable Host Unknown Podcast!</p>
<p>Featuring Andy, Jav and Thom. In this episode we;</p>
<p>Look for sponsors.<br />
Pine for British Airways Lounges.<br />
Talk about Carole Baskin.<br />
Try to be nice about infosec celebrities.<br />
Look for sponsors again.<br />
Get a little serious about a few things.</p>
<p>HostUnknown.tv<br />
@HostUnknownTV</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Thu, 16 Apr 2020 23:14:52 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/hu-podcast-episode-4b-dDL7YxkA</link>
      <content:encoded><![CDATA[<p>Episode 4(b) of the inimitable Host Unknown Podcast!</p>
<p>Featuring Andy, Jav and Thom. In this episode we;</p>
<p>Look for sponsors.<br />
Pine for British Airways Lounges.<br />
Talk about Carole Baskin.<br />
Try to be nice about infosec celebrities.<br />
Look for sponsors again.<br />
Get a little serious about a few things.</p>
<p>HostUnknown.tv<br />
@HostUnknownTV</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="49879531" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/c07e1848-34d1-467e-a441-edf5c152a32b/800427397-hostunknown-hu-podcast-episode-4b_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>HU Podcast Episode 4b</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/c07e1848-34d1-467e-a441-edf5c152a32b/3000x3000/artworks-ekn28wp402g70daj-payzkg-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:57</itunes:duration>
      <itunes:summary>Episode 4(b) of the inimitable Host Unknown Podcast!

Featuring Andy, Jav and Thom. In this episode we;

Look for sponsors.
Pine for British Airways Lounges.
Talk about Carole Baskin.
Try to be nice about infosec celebrities.
Look for sponsors again.
Get a little serious about a few things.

HostUnknown.tv
@HostUnknownTV</itunes:summary>
      <itunes:subtitle>Episode 4(b) of the inimitable Host Unknown Podcast!

Featuring Andy, Jav and Thom. In this episode we;

Look for sponsors.
Pine for British Airways Lounges.
Talk about Carole Baskin.
Try to be nice about infosec celebrities.
Look for sponsors again.
Get a little serious about a few things.

HostUnknown.tv
@HostUnknownTV</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/205127179</guid>
      <title>HostUnknown Podcast Official Pilot</title>
      <description><![CDATA[<p>In this, our first iAudioBlog, we talk to the young and up and coming, the old and grey, review the news, tweets, as well as realize we needed just one more jingle recorded. There is some other stuff there as well.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></description>
      <pubDate>Wed, 13 May 2015 00:00:00 +0000</pubDate>
      <author>thom@tl2security.com (Host Unknown)</author>
      <link>https://podcast.hostunknown.tv/episodes/hostunknown-podcast-official-pilot-6iqvuF11</link>
      <content:encoded><![CDATA[<p>In this, our first iAudioBlog, we talk to the young and up and coming, the old and grey, review the news, tweets, as well as realize we needed just one more jingle recorded. There is some other stuff there as well.</p>
<p><p>Come on! Like and bloody well subscribe!</p></p>]]></content:encoded>
      <enclosure length="11818178" type="audio/mpeg" url="https://cdn.simplecast.com/audio/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/abeb7d41-5aeb-4da4-9414-50f01ca4f3d3/205127179-hostunknown-hostunknown-podcast-official_tc.mp3?aid=rss_feed&amp;feed=_hSKbGFl"/>
      <itunes:title>HostUnknown Podcast Official Pilot</itunes:title>
      <itunes:author>Host Unknown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/56d09b/56d09b53-f126-47be-840c-5fde5a6d15ea/abeb7d41-5aeb-4da4-9414-50f01ca4f3d3/3000x3000/artworks-000117069168-4xybqb-t500x500.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:19</itunes:duration>
      <itunes:summary>In this, our first iAudioBlog, we talk to the young and up and coming, the old and grey, review the news, tweets, as well as realize we needed just one more jingle recorded. There is some other stuff there as well.</itunes:summary>
      <itunes:subtitle>In this, our first iAudioBlog, we talk to the young and up and coming, the old and grey, review the news, tweets, as well as realize we needed just one more jingle recorded. There is some other stuff there as well.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>0</itunes:episode>
    </item>
  </channel>
</rss>