Podcast: Play in new window | Download | Embed
Subscribe: RSS
The depressingly small impact from the arrest of the black hole exploit kit author; detecting malware embedded in hardware; altering CPUs during manufacturing to weaken random number generation; investigation into major identity theft operation results in discovery that data brokers were infected and that Adobe’s source code and 2.9M user IDs were stolen; recapping Derbycon 3.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
Depressing impact from the arrest of the black hole exploit kit author: http://nakedsecurity.sophos.com/2013/10/08/assessing-the-impact-of-the-blackhole-arrests/
Malware on graphics cards: http://www.csoonline.com/article/740549/new-proof-of-concept-tool-detects-stealthy-malware-hiding-in-graphics-cards
Altering CPU manufacturing: http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/
This is why we ought to look for signs that our servers are compromised: http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/
Derbycon videos: http://www.irongeek.com/i.php?page=videos/derbycon3/mainlist