The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard
This is quite interesting. I’m looking at twitter and found this. I never knew who was behind the 2nd part of the silk road, but knew there was a second version of it Very interesting.
Source: Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard
Comments (0)
Walkthrough Of Tor, Silk Road, Deep Web – Business Insider
Walkthrough Of Tor, Silk Road, Deep Web – Business Insider.
This is something I think you should read. A two page article dealing with the underworld using TOR, although like it says, there are uses that are legal with the service. I’ve never tried it, I wonder if it is accessible?
Comments (0)
Solar Wind update: update as of December 19, 2020
Continuing to read on December 18, 2020, there are some articles that came across my desk.
Security Notification: SolarWinds Supply Chain Attack is the first article. This came from Lastpass and was written by someone by the name of Ian Pitt. As I’ve said before, some of these articles I’m linking to may be behind, but worth the read anyhow. The reason this article is of importance is because of what LastPass and LogMain do, secure our lives by making a password manager that can do so much.
I really like the transparancy this company gives us in to their strategy and understanding of the issue(s) they must face to prevent a big time problem. While LastPass have had issues just like any other company, this company has been transparent behind what they’ve disclosed and what they’re doing about it.
I really think that this article should be read, because of the work they do.
We know that our current President, president Trump has not really said anything about the Solar Winds fiasco. While he ahs fired multiple people because he feels the election is fraud, and he continues to make waves with his lawsuits, I do have to give praise to Mr. Biden for coming out and saying he’ll be looking in to this. The article Biden says he will ‘elevate’ cybersecurity as US hack investigation goes on seems very promising.
In my discussions with someone, they had told me that Mr. Biden has pretty much taken the same people our former president Obama took, and he’ll not really do anything as he’s a puppet to the agenda. I’m not sure, I guess we’ll see for now about all that, but the fact that he’s saying he’ll be looking in to this and bulster the landscape is a good sign. I have no idea really who Biden is, but now is his time to shine in the limelight of what our efforts are in this field.
I believe that cybersecurity should be imperative everywhere, it is something we should all be doing whether it is government or otherwise. The fact that the Government has said to do certain things, yet a big huge breach like this in the supply chain goes unnoticed for months. The Government should be at the top of their game.
This article also goes in to account and says that it is now the Russians that had something to do with this, not the Chinese as first reported.
As I’ve written many times, we’re still learning about this. Speaking of learning, I’ve got my Trend Micro blog issues resolved, and I’ll be reading more about Suntrust, the supposed problem that has plagued the government. I’ll also get back to posting the news and talking about what I’ve seen from there now that I got this resolved. So there is definitely more coming on this front.
Speaking of the Supply Chain which Trend Micro has covered numerous times, the last article for now seems to cover the supply chain as it is entitled SolarWinds hack exposes underbelly of supply-chain attacks and it was quite interesting.
Hackers of lore are often depicted breaking into prominent targets by typing frantically on keyboards in dark rooms and yelling “I’m in!” when they’ve
purportedly breached their victim’s systems. But the sweeping SolarWinds breach, which has reportedly impacted the U.S. Treasury and Commerce departments,
shows the reality is much less flashy and can be far more devastating.
This is why I’ve never really liked the idea of Crime Scene Investigation because its a 30 minute program that may talk about a particular crime which they enact. If it was a hacking crime they covered, they hit a few buttons and they’re in and can find the bad guys.
This is not how this works, and I’ve known this. This is why I liked Dragnet, because even though it was a 30 minute show, they said that time passed by mentioning a date, a time, a place, where they were and what was happening. If these other CSI shows did this, I could have gotten in to it, and my family for years would watch it. I watched one and it didn’t feel realistic to me.
Even when we talked about some of the things like Dread Pirate Roberts who was eventually jailed, I knew it was quite a long time before he was caught. Even when we released podcast 216 back in 2015 we’ve read a bunch on that, and several articles were quite good.
If we’re ever going to get to the bottom of the supply chain problem like Solar Winds, we need to take in what is going on just like they did with Silk Road, Pirate Roberts, the articles that were covered in 216 and even others that have been arrested afterword.
The problem is that Solar Winds have now 300,000 customers which is the latest number, and they include:
the likes of the Pentagon, the Navy, the Army, Cyber Command, the FBI and the departments of Homeland Security,
Defense and Health and Human Services
which makes this more important to make sure that you’re as up-to-date as possible. The number we saw was 18,000 and I wrote that it is probably much more and not everything is known.
Do you think Solar Winds reminds you a little bit like the small company, Philmore, whom we’ve talked about in many podcasts?
That’s it. Lots of linked stuff in all articles, let the reading begin.You can search out any of the terms throughout the Internet you want and feel free to comment onm this or anything else we have to offer.
Comments (0)
What has been read, blogged, and talked about: News ending November 7, 2020
Hello folks, welcome to another blog post talking about what has been read, blogged, and talked about within the last week and few days. Yes, its better late than never, but sometimes other projects and things get in the way.
According to this week in security news ending November 6, 2020, there has been a lot including a Ransomware gang aquiring malware. It also has an article about the Google Drive Scam that I also posted to the blog.
An article asks the question about cybersecurity for small businesses and what protection may be out there. There are a lot of cybersecurity people out there and new ones to boot. An article talks about education and encouraging those stars to come forward.
This is just some of whats out there in this blog post from last week: This Week in Security News: US Cyber Command Exposes New Russian Malware and REvil Ransomware Gang ‘Acquires’ KPOT Malware for you to peruse.
In the governmental side, the United States takes control of more domains when it comes to influencing campaigns. To learn more, read: US seizes more domains with ties to suspected Iranian influence campaign from Cyberscoop’s Joe Warminsky.
In the biggest seizure, the department of justice, part of the United States arm seizes a billion dollars of silk road’s crypto currency. This is the largest seizure ever made to my knowledge. As we know from talking about this on the tech podcast, the operator was arrested thanks to a mistake that leaked his IP. I’m not saying that TOR was the cause of the leak, we honestly don’t know, but you can check out this latest blog post about the 2nd silk road to see the latest, as well as looking at this silk road search page from the tech blog directly. There aren’t that many blog posts, but some link to article through podcast show notes. If you want those podcasts, please contact me, Jared, and I’ll get you copies. Let me know what number you want. For details on this latest, check out DOJ seizes $1 billion in cryptocurrency tied to Silk Road dark web market by Tim Starks on Cyberscoop.
At the time of writing, it has been decided, although as predicted by some, it isn’t going to be a smooth transition in regards to our election. This won’t be the end of the misinformation and disinformation that we see. Election-related misinformation is spilling into the real world. Just look at Arizona. should be read for all of the latest on this problem.
I normally don’t talk about spam I get in my email, but as I read this particular email coming from my contact form, the domain is still up. Its going to be almost a week old, and it isn’t what you think. Just saw the best email ever … in my inbox … domain is relatively new links to a copy of this email which has me go to a page on a domain called emailhostsecurity.com which is very questionable at best. At the time of writing, the domain may have been taken down, it looks to go nowhere, and a domain lookup yields nothing. The article when published, talked about when it was registered but yielded nothing else that was public at the time. Maybe the phone call I placed last week yielded results, however, I do not know for sure and am unable to prove anything. I do know that it isn’t an email security company and the page was definitely suspicious. The name caught my attention, but what was on it was something that you would really question if you’ve been around my blog for years.
In the sickening but true in the new internet age, I blogged about an Oklahoma man that was caught doing something he wasn’t supposed to do. Why bring it up here? If you care about security, here is NOT! what you want to use social media for. In my blog post Oklahoma School Employee Arrested On Multiple Child Porn Charges I link to an article from the same name. The gentleman, if you call him a gentleman, used social media to share what he apparently did with children. The worst part is that he worked for the Oklahoma school district. Oh boy. …
Think paying a ransome is a great idea? Thought about it as a solution? Maybe my article talking about a krebs on security article may change your mind. My blog post is entitled We’re sorry we fucked you over: why paying a ransome may not be the best thing to do and I quote the best part from that article in mine. It said:
“ “When you look at a lot of ransom notes, you can actually see groups address this very directly and have texts that say stuff along the lines of, Yeah,
you are fucked now. But if you pay us, everything can go back to before we fucked you.’” ”
This has got to be the best quote and line ever. It ended that article pretty much.
There is more on the blog that I didn’t cover, but this is a subset.
Here are others that might be of interest that I didn’t blog that goes back to the end of October.
- 5 Tips to Increase Security for Your Remote Workforce Lastpass
- Why Do Hackers Want Your Email Address? Lastpass
- Ransomware attacks grow more menacing during the pandemic, creating headaches in health sector Cyberscoop
- The Cost of Doing Nothing Is This Year’s Scariest Halloween Horror Lastpass
- Health sector mobilizes defenses following Ryuk ransomware warning Cyberscoop
Thanks so much for reading and checking out the blog! Remember, some of this may or may not be talked about in podcasts, and you definitely have your say. Unlike elections which may or may not be fair, I will give you an opportunity to contribute. Send your files to me through dropbox, wetransfer, my send space drop box, or any other service you’d like. It can be wave, mp3, m4a, or any other format you want. I don’t limit on time, and let me know whether you want the airing on the tech podcast or the security box. I thank you so much for listening, reading, and contributing anything on your mind! See you next time.
Comments (0)
technology podcast 216 for July 17, 2015
Hi folks,
As I write, I am currently uploading technology podcast 216 to the the RSS feed where it lives. It is mainly an IOS based podcast, with a podcast segment on articles with a theme. If the show notes did not appear in the RSS when you went to the feed, we are providing the notes below.
Welcome to Podcast 216 for July 17, 2015. On this podcast, we have quite a bit of IOS discussion. We have an updated Capital One update since podcast 197’s running of the demo. Listten to podcast 197’s demo of the app by using this link. We talk about some articles that have a theme, and they are good ones. We also have a comparison between The Transit App and go metro version 3. listen to go metro version 2.x by listening to this file as we talk briefly about that as well. Here are the articles and apps we talk about within this podcast.
articles:
- APRIL 28, 2015: JOSHUAH BEARMAN The Untold Story of Silk Road, Part 1 How a 29-year-old idealist built a global drug bazaar and became a murderous kingpin wired
- MAY 14, 2015 JOSHUA BEARMAN The Untold Story of Silk Road, Part 2: The Fall Wired
- Going Deeper: Exploring the Deep Web Trend Micro
Apps:
- Capital One Mobile app Itunes store
We hope you enjoy the 1 hour and 58 minute podcast, and we’ll see you on another edition very soon! Thanks for listening!
It is now available, so we hope you enjoy!
Comments (0)
TOR is talked about in a book I’m reading
Hi folks,
I’ve got a brand new podcast, which I’ve mentioned here before called the Books Podcast. On this podcast, the books read are talked about in podcasts, like this podcast which hasn’t had one in quite awhile. I also have an accompanying blog which posts books my co-host Janet and I are currently reading, whether it is for the podcast or not. That may be our choice. The current book I’m reading is This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information by Andy Greenberg. It is not available on BARD as of yet, but maybe soon as some of the books on the podcast recently appeared there. In chapter 4, this book is talking about the Tor (anonymity network) which Steve Gibson talked about on Security Now a weekly security podcast which I subscribe. More recently, I published an article talking about how TOR now has services on it, just like the normal Internet. The difference between these services and the services you and I use are the very different. The services on TOR can’t be traced, so illegal activity such as child pornography, drug sales, and more can go on without law enforcement supervission. Chapter 4 of the above mentioned book is talking about this very thing. Here is the blog post I posted on the books blog about This Machine Kills Secrets in case you don’t want to go to Amazon right away. Byron Lee recommended this book, and so far I’m enjoying it. Things like TOR, or any anonymous service you may choose to use is only as secure as the users using them. I don’t think I’d personally use it for every day use, but I’d sure keep it in mind in cases i could see a use for, but not at the current time. I find it interesting that this book brings it up and some of the things that were discussed in articles and Security Now being in this book. The article in question that goes in to detail is Walkthrough Of Tor, Silk Road, Deep Web – from the Business Insider is the article I mention where the link to the article is within that post. Is this a coincidence or could TOR not be as secured as first built? I’m going to continue to read this book to find out, and I’d be interested in your thoughts. I recommend you use the comment system if possible or to send me an E-mail. View our about page here on the blog for contact information. The comment boards await you.
Comments (0)
Technology blog and podcast, podcast 177 is now available!
Edited on 3/14 for HTML issues.
Get your copy via the RSS feed. Here are the show notes.
Welcome to podcast 177 of the Technology blog and podcast. This podcast has been marked as time allows right now, and I have time to do one because we have a topic. There’s A Secret Internet For Drug Dealers, Assassins, And Pedophiles is the article I posted on this blog as well as the AMW Reloaded blog. AMW Reloaded’s Jared Rimer, Janet Quam, and Melissa Harrell talk about the article. Then, Steve Gibson from GRC from Security Now has his segment from episode 394 which I cut from that podcast. I hope to have more podcasts when I have something of interest to talk about without reairing everything under the sun. Enjoy!
Comments (0)
navigation menu
- Archives
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
- The tech blog’s pages
- Blogroll