Risky Business

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.

https://risky.biz/

subscribe
share






Risky Business #501 -- Trisis: signalling, deterrence or escalation?


On this week’s show we’ll be talking about a whole bunch of stuff – the FBI taking down a botnet in a very FBI way, we go deep on the Trisis malware popping up in the US following America’s withdrawal from the so-called Iran agreement. We look at the latest in the crypto debate, breaches, bugs and more!

We’ll hear from Tom Uren of Australia’s Strategic Policy Institute (ASPI) on the Trisis side of things. Tom worked in an interesting place in Australia’s defence department but these days spends his days think tanking for the Australian Strategic Policy Institute. He shares his thoughts on what it is Iran could be up to with Trisis.

This week’s show is brought to you by: Australia!

AustCYBER is a government-supported industry group here that is trying to get the Australian cybersecurity industry organised. There’s the VC-backed US model, the build a “cyber city” in the desert Israeli model, then there’s the Australia model, which is actually quite different. It’s much more about helping local startups win deals locally, then internationally, to get them on a path to profitability so they don’t have to sign the awful term sheets Australian VCs put in front of them.

Well, there’s more to it than that, but AustCYBER head honcho Michelle Price will be along in this week’s sponsor interview to walk us through what she’s trying to do for the Australian security industry and how foreign multinational companies can also benefit from that.

Show notes Exclusive: FBI Seizes Control of Russian Botnet Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide Robᵉʳᵗ Graham ???? on Twitter: "This advice from the FBI is best described as "moronic". It advised 126 million households in the U.S. to reboot their routers in order to address a botnet of 500,000 devices located mostly outside the U.S. https://t.co/qhm96HmLVZ" FBI: Kindly Reboot Your Router Now, Please — Krebs on Security FBI shuts down domain behind Russian 'VPNFilter' botnet Researchers uncover sophisticated botnet aimed at possible attack inside Ukraine Trisis masterminds have expanded operations to target U.S. industrial firms U.S. industry experts call for vigilance after Trisis group goes global In the dark about 'going dark' Encryption advocates rip FBI over inflated encrypted device statistics Apple reports spike in national security requests amid promises of more transparency Why Is Your Location Data No Longer Private? — Krebs on Security The U.S. military combined cyber and kinetic operations to hunt down ISIS, general says Hacker linked to Russian intelligence sentenced to five years in prison Cyber crooks claim to hit two big Canadian banks | Reuters Chinese researchers warn blockchain company EOS about 'epic' vulnerability in soon-to-launch platform No one is updating their Android devices, new data shows Oracle Plans to Drop Java Serialization Support, the Source of Most Security Bugs 3 Charged In Fatal Kansas ‘Swatting’ Attack — Krebs on Security Russian unit, GRU officer linked to 2014 shoot-down of airliner over Ukraine | Ars Technica Cyber Security Growth Network - Australian Cyber Security Growth Network


fyyd: Podcast Search Engine
share








 May 30, 2018  48m