Author: Paul

Breaking the Ice on DICE: scaling secure Internet of Things Identities

Breaking the Ice on DICE: scaling secure Internet of Things Identities

Podcast: Play in new window | Download (Duration: 33:20 — 38.2MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of  solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device identity, doing device attestation and safe deployment at scale and verifying software updates. 

State sponsored trolling is a new form of human rights abuse, according to a new report from the Institute for the Future.

Episode 105: Is Trolling a Human Rights Abuse? Also: the Do’s and Dont’s of Ransomware Negotiation

Podcast: Play in new window | Download (Duration: 42:49 — 49.0MB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s podcast: a report out last week from The Institute for the Future makes clear that state sponsored trolling has gone global and is now a go-to tool for repressive regimes worldwide, constituting a new form of human rights abuse. Ben Nimmo of The Atlantic Council joins us to discuss. Also: ransomware is one of the most effective forms of online crime. Despite that, many organizations have no formal plan for responding to a ransomware attack: we talk with Thomas Hofmann of the firm Flashpoint*, which has launched a new service to help firms prepare for and respond to ransomware.

What did we learn from the indictment of 12 Russian hackers? We read the indictment so you don't have to.

Episode 104: Mueller’s Cyber Eye on the Russian Guys also Reaper Drone Docs Stolen

Podcast: Play in new window | Download (Duration: 30:20 — 34.7MB)Subscribe: Android | Email | Google Podcasts | RSS In this week’s episode of the podcast (#104): the Mueller indictment of 12 Russian GRU operatives for hacking the 2016 presidential election was a bombshell. It was also 30 pages long. We read it so you don’t have to and we’ll talk about the big take aways. Also: when researchers from Recorded Future saw an offer on a dark web marketplace for documentation describing the operation of the US Military’s classified Reaper Drone, they thought it must be a ruse. But they were wrong. We’ll talk with RF researcher Andrei Barysevich about how highly sensitive military drone documents fell into the hands of a low level cyber crook.

The Electronic Frontier Foundation is arguing that voice assistants should be allowed to be jailbroken, permitting security researchers to analyze their workings

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

Podcast: Play in new window | Download (Duration: 22:38 — 25.9MB)Subscribe: Android | Email | Google Podcasts | RSSVoice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? In this podcast we speak with Ben Rafferty of the firm Semafone about the challenges of securing voice-based systems. Semafone won the recent PAYMNTS.com Voice Challenge with a way to use Amazon’s Alexa voice assistant as an out of band authentication mechanism.