In this week’s podcast: Facebook revealed that a breach affected 50 million accounts and as many as 90 million users. Is complexity at the root of the social media giant’s troubles? We speak with Gary McGraw of the firm Synopsys about it. Also: BIOS-based malware has been demonstrated at security conferences for years. Last week, the security firm ESET warned that it identified a sample in the wild. Even worse: the Russian Hacking Group Fancy Bear was believed to be responsible. We’ll talk to firmware security expert Giovanni Vigna of the firm Lastline about the truth and hype around LoJax and other firmware based attacks.
Search Results for "Fancy Bear"
As Election Threats Mount, Voting Machine Hacks are a Distraction
Beating up on direct record electronic (DRE) voting machines has been popular sport in security circles for more than a decade. But is it a distraction from other, more present and dangerous threats to the integrity of elections? A growing body of evidence says “yes.”
Episode 85: Supply Chain Attacks and Hacking Diversity with Leon Johnson
In this week’s Podcast (#85), we’re joined by Adam Meyers of the firm CrowdStrike to talk about that company’s Global Threat Report for 2018. Also: we continue our observation of Black History Month in the US by talking to prominent information security professionals from the black community. This week, our guest is Leon Johnson, a principal pen tester at the firm Rapid 7 about becoming the first person in his family to go to college and then finding his way to information security.
AP: Russia hackers had targets worldwide, beyond US election
The Associated Press is reporting on a trove of data accidentally leaked by the Russian-backed advanced persistent threat (APT) group known as Fancy Bear that suggests the group conducted a years-long campaign against targets in the US, Ukraine, Russia, Georgia and Syria.
It’s the Corruption, Stupid: why Russians aren’t the biggest threat to Election Security
In-brief: Russian hackers aren’t the biggest threat to the security and integrity of elections says Bev Harris of Black Box Voting. Instead, it’s a more common enemy: run of the mill political corruption, mostly at the local level. Also: Eric Hodge of CyberScout talks about the challenges of helping states secure their election systems. Problem number one: recalcitrant voting machine makers.