Defensive Security Podcast Episode 77

Russians steal the NASDAQ; Importance of AV in incident response; Report finds poor security communication between staff and executives; Microsoft recommends reusing weak passwords; Government malware found being used by criminals; Don’t use security as an excuse to resist the cloud.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://www.businessweek.com/printer/articles/213544-how-russian-hackers-stole-the-nasdaq
http://www.bankinfosecurity.com/nasdaq-hack-attribution-questioned-a-7080
http://blogs.technet.com/b/neilcar/archive/2009/11/23/incident-response-the-importance-of-anti-virus.aspx
http://searchsecurity.techtarget.com/news/2240224785/Report-finds-poor-security-communication-among-executives
http://www.darknet.org.uk/2014/07/microsoft-says-re-use-passwords-across-sites/
http://www.sentinel-labs.com/wp-content/uploads/2014/07/Sentinel-Labs-Intelligence-Report_0714.pdf
http://images.infoworld.com/d/cloud-computing/sorry-cloud-resisters-control-does-not-equal-security-246386?source=rss_security

2 thoughts on “Defensive Security Podcast Episode 77

  1. Love your podcast. I have two questions that I haven’t found suitable answers for.

    #1 Why do bad links show up on search engines? I use Privoxy and have found blocked links mostly on the first/last 5 answers to my search question. Surly the seach engines can find these also and kill them or at least put them in a “Danger Box”.

    #2 Emails seems to be used to transmit bad stuff by using a link that says its going one place but sends you to another. It seems a simple solution that if the printed name does not equal the link url it should be red flagged. Cant something like Privoxy be used to check outgoing links also?

    Thanks, can’t wait for the next show.

    1. 1. Scammers try hard to get their sites listed high in search engines. Most search engines try to filter out the crap, but it can be hard to do. Also, there is probably a difference between what privoxy is blocking (for privacy purposes) and what is actually malicious.

      2. There are a number of mail security systems that do exactly this. I have one on my personal mail server. I’ve noticed over time that the phishing emails are not using URLs as anchor text much any more and are using other things like “click here” – mail security software can’t tell that the link goes somewhere not intended.
      Now some mail security software will also apply filtering of the links in emails, similar to what is done with web filters, like websense and change known malicious links.

Leave a Reply