go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: Home [0]

Go to contents or to navigation menu



The Security box, podcast 53: Better Get Your Windows Update on … especially if you print

Hello folks,

This is the link to podcast 53 for you to freely download. While we had trouble with what I thought would be a simple process of merging calls, but Skype broke it. It is 184.1mb in size.

Here are the show notes for this week’s program.


Hello everyone, welcome to the security box, podcast 53. On this edition, we’ll be talking about some of the things that articles talk about in regards to Windows Update that came out the week of July 16, 2021. Seems like we had good success with last week where we opened the phone lines for others to participate in an open forum, so we’ll do that again and see what happens and if people participate or not. You can always comment after the fact by calling our voice mail line at 602-887-5198 and letting me know you want your comments aired. We’ll also have some news notes and maybe a discussion on those as well.

Windows Update

Here are the articles that deal with Windows Update. One is by Trend Micro and one is done by Brian Krebs from Krebs on Security.

Sans News bites

News Notes from around the web

>


Thanks so much for checking out the program, and we’ll make it work. Its all a learning curve, and we all learn how this works. Thanks again for checking out the program! We’ll see what next week’s program brings.

Comments (0)

SolarWinds 0-day gave Chinese hackers privileged access to customer servers

Wow. This is quite interesting. Dev0322 now in the solar winds ordeal now.

Hackers IDed as DEV-0322 have a fondness for defense contractors and software-makers.

Source: SolarWinds 0-day gave Chinese hackers privileged access to customer servers

Comments (0)

Morgan Stanley discloses data breach that resulted from Accellion FTA hacks

I can’t blame Morgan Stanley directly for this one, but anothr story about the file transfer application we talked about some time ago. Wow.

Financial services firm says data was stolen by exploiting flaws discovered in December.

Source: Morgan Stanley discloses data breach that resulted from Accellion FTA hacks

Comments (0)

Facebook catches Iranian spies catfishing US military targets

Putting a new spin on cat fishing, eh? Michael in Tennessee sent me this one, and I think we hould look at it. Found the article from Ars very interesting. Its quoted and sourced below.

Hackers posed as recruiters, journalists, and hospitality workers to lure their victims.

Source: Facebook catches Iranian spies catfishing US military targets

Comments (0)

Ransomware attack at Comparis resulted in data breach

If people are familiar with this, better know about it. Doesn’t seem like a U.S. company, so it is good for us in the States. The post is on twittr and it was three days old.

Last week’s ransomware attack on Swiss price comparison website Comparis resulted in a data breach.

Source: Ransomware attack at Comparis resulted in data breach

Comments (0)

July Patch Tuesday is here, better get your patch on … especially if you print

Hello everyone, both articles from Trend Micro and Krebs on Security are similar in content this week. While Krebs mentions Adobe as he always does, both articles make sure that you are aware of several things.

  • There are either 116 or 117 different patches are out there.
  • 15 of the patches were submitted through the Zero Day Initive project.
  • The biggest vulnerability is fixed in this week’s update dealing with printing.
  • Several other CVE’s are given and linked within talking about other aspects of vulnerabilities.

The Print issue

Both articles talk about CVE-2021-34527, an issue that deals with printing in Windows. An out of band patch was issued last week in regards to this vulnerability however it may have caused problems according to what I’ve read.

The vulnerability is known as print nightmare and there is guidance linked within Trend Micro’s article. Of course, Trend Micro talks about Microsoft Exchange and DNS servers multiplied. Krebs also has the same MSRC link for the print nightmare and links to the others as well.

I recently rebooted after a good week and Windows promnpted me to update and restart which I did.

While I don’t print, if you do, you’ll want to know about this vulnerability and othrs that might affect you, so give the two articles linked a read. Just click on their names to read it.

Comments (0)

The Security box, podcast 52: The Security of our Water Supply, news notes and a very interesting robery story to boot

Hello folks,

I don’t have a link to one of the best interesting articles I’ve found to date in a news story heard on Michael in Indiana’s local news, but boy you’ll want to hear that. We talk about the water supply hacks and go in to password managers and other topics as Michael in Tennessee joins me.

Here is the link for this week’s program. The file size is 153.6mb.

Below, please find the show notes, which include links to the things we’re talking about.


Welcome to the security box, podcast 52. On this podcast, let’s talk about the water supply hacks and the growing threat of them through the help of an interesting article by Last Pass. After that, we’ll see if people partook in an open forum of topics they want to talk about and of course news, notes and highlights from the landscape that have been read.

Topic: The Water Supply and the landscape

News Notes

Below, find links to items that are of interest we’ve read from around the landscape.

Thanks for listening!

Comments (0)

The Security box, podcast 51: Domains and their Security

Hello,

The podcast had some comments, and thats cool. We hope that there will be more comments, and you can use the methods that are given out during the program.

Don’t have RSS? No problem! Download the file (80.1mb) at your convenience.

Below, please find the show notes with links to everything we covered, including some very interesting news notes we’ve come across. Thanks again for listening!


Hello folks, welcome to the security box, podcast 51. On this edition of the program, we continue with Phishlabs and their q1 Phishing and intellegence report talking about Top Level Domains and certificate abuse. Next, Michael in Tennessee sent me an article talking about one email which exposed hundreds of email addresses. We’ll also have news and notes, people can call and comment as usual, and we’ll see where the show takes us.

Topics

News Notes

We hope you enjoy the program!

Comments (0)

Kaseya is the next victim in ReEvil’s grasp

According to this article Kaseya hit with suspected cyberattack, raising fears of major supply chain incident ReEvil is back affecting 300 partners with 200 companies so far. Security Now will be covering this today as part of today’s program. Go to TWIT for details.

This is definitely getting interesting.

Comments (0)

US hits anti-robocall milestone but annoying calls won’t stop any time soon

Large carriers deploy STIR/SHAKEN. Small carriers, old landlines are still problems.

Source: US hits anti-robocall milestone but annoying calls won’t stop any time soon

This seems to be an update to the whole shaken and stir that we talked about on the Security Box. This is quite interesting.

Michael in Tennessee sent this one to me.

Comments (0)

DOJ files 7 new charges against alleged Capital One hacker

The U.S. Department of Justice (DOJ) has filed seven new charges against Paige Thompson, the former Amazon Web Services (AWS) engineer accused of hacking Capital One and stealing the personal data of more than 100 million Americans. The new charges, which include six counts of computer fraud and abuse and one count of access device […]

Source: DOJ files 7 new charges against alleged Capital One hacker

Michael in Tennessee sent me this, and we’re definitely going to put this in our news notes. While delaying a trial may be a good idea, now we’ve got new charges and this is just going to get interesting.

Above, find a quote with the link to the article, but do read it, it is definitely facinating.

Comments (0)

Western Digital is not done, more zero-days on the way

There are two researchers named Radek Domanski and Pedro Ribeiro featured in an article by Krebs called Another 0-Day Looms for Many Western Digital Users. While one particular issue couldn’t be demonstrated in Pown to Own because of an OS upgrade, they did find something else that Western Digital did not respond to. After that incident, the company vows to respond to all researchers regardless of life cycle and the like. These guys are trying to keep a company honest, and I hope this is a lesson to companies that there are people trying to help you.

The article details the Mybook ordeal as a reference point for those who didn’t hear about it till now.

Comments (0)

Cops seize a VPN service, logs stats and data taken

According to an article titled International cops seize DoubleVPN, a service allegedly meant to shield ransomware attacks from investigators read this past week, Cops seized servers and domains belonging to double VPN. This is one of those providers that allowed cybercriminals to hide, similar to how VPN services work for us. This service logged things by the sound of it, something Security Now’s Steve Gibson frowns upon.

If what the article says, this isn’t the first time this has occurred, where cops were able to get access to data and servers of a VPN service.

If you’re interested in this one, do check out the article.

Comments (0)

TLD’s are a big commodity in phishing

TLD’s are how the internet works. In a great article we’re going to talk about as part of our first topic, Phishlabs has some great numbers in here, and even a dropoff of https vs http. The article is Breaking Down Phishing Site TLDs and Certificate Abuse in Q1 and I highly recommend it a read.

There are 5 CCTLDs which can be baught for free, and they are listed and talked about. Its going to be very interesting what happens in quarter 2, but we can’t let our guard down.

Comments (0)

An email sent by One Medical exposed hundreds of customers’ email addresses

I think this was an honest mistake, which sadly made the headlines. I personally would have used an email list, ran by mailing list software, to contact those people. I would not use the “to” or “BCC” field to do it, and some mailing list software allow you to personalize your email specific to them. Check this out.

The primary care startup admitted the mistake was not caused by a security breach.

Source: An email sent by One Medical exposed hundreds of customers’ email addresses

Comments (0)

Use Android? These 9 applications should NOT! be on your phone

Michael in Tennessee read out loud this article titled These Android apps appear normal but steal your Facebook password; uninstall them immediately from Phone Arena and lists 9 applications not to have running on your Android device.

These are the applications not to have running, according to the article.

  1. • Processing Photo
  2. • App Lock Keep
  3. • Rubbish Cleaner
  4. • Hororscope Daily
  5. • Horoscope Pi
  6. • App Lock Manager
  7. • Lockit Master
  8. • Inwell Fitness
  9. • PiP Photo

While the applications may work as designed, they may come with trojans and other problems, which is why Google pulled them from the Google app store.

The article goes in to more detail in to what these apps did, so please read the attached article linked to learn if you are effected on your device.

Comments (0)

Western Digital drives remotely wiped: What experts say to do now

I was afraid this was mybook and what we covered last podcast, and I was right. Shaun, our other admin sent me this and I’m trying to determine what is going on. This has some tips people can follow if they are affected by this, and we talk about this in news notes of the last security box podcast. Please stay safe with these drives, I don’t use one so I’m good.

Owners of some Western Digital external hard drives should disconnect them from the internet and probably turn them off completely, as reports of remotely wiped data continue. The drive-maker confi…

Source: Western Digital drives remotely wiped: What experts say to do now

Comments (0)

The Security box, podcast 50: 62 percent of free services are abused

Hello Folks,

Welcome to another edition of the Security Box. I know, I know, the RSS already got its copy, why haven’t we gotten ours when we can’t access RSS?

Part of it is that I’ve been a bit on the busy side which is good, but that is no excuse. The good news is that it is here, and I’ve got the link for you too.

Don’t fret, this isn’t the only thing I’ve neglected, trust me.

Here is the download link (113.9mb) for you to have.

Here are the links as part of our show notes.


Welcome to the security box, podcast 50. On the big 50th episode, we’ve got quite a bit of news notes to cover this week. Besides that, we’re continuing with Phishlabs and their ongoing rundown of the Q1 Intelligence Report, this time, talking about free tools and their abuse. We hope that users find this of interest like I did. Of course, the lines of communication are always open whether on the show or podcast.

Topic:

Sans News Bites

News Notes

Comments (0)

The Security and tech podcast email lists

I’ve posted this to the Mix’s listeners list where my programs are broadcasted or aired, and I’m curious if you guys are interested.

Here’s the email I’ve sent.


I’ve been thinking lately about a list specifically for the security box and technology podcasts whereby interested listeners can subscribe to the list, get articles I may cover for the podcast, we can discuss them, and the like. I’ll post this to the blog to see if there are any comments, and then I can move forward.

If you’re interested in such a list, let me know.

I could install a forum, but with Spam rampant on those, it would have to be constantly monitored.

You can also choose to subscribe to the blog and get things delivered to you. Let’s see what ahppens with this one.


If you’re interested, send me an email, and I’ll either host the list through this domain, or my lists.jaredrimer.net domain. I can send articles I’ll be covering, and I’ll even subscribe using my tech address instead of my list specific one.

Comments (0)

Misinformation is not just in English

According to an article which is backdated close to mid-june, although not quite mid-june, I read about misinformation problems on Facebook especially in Spanish.

While I don’t speak Spanish well enough to do anything in the language, I can understand how difficult it is to make sure it is factual, especially since some words we say in English may not have meaning in Spanish.

There is an example of this in one of the tracks we played on the Independent artist show this past Sunday where the Spanish version is not what the English title is.

Facebook declined to mention how many moderators they have doing the Spanish work, yet it mentions other languages in this article.

The article is titled Spanish-language misinformation about vaccines is evading Facebook’s moderators and I’d be interested to hear if you’ve come across this type of thing.

I guess the biggest question is whether you use social media to make decisions? I don’t. Let me know.

Comments (0)

Older Posts »

go to sections menu


navigation menu

go to sections menu