Tag: hacking

Uber paid $100,000 to a Florida man to keep quiet about the theft of its customer data. The repercussions could damage the reputation of bounty programs, experts warn.

Podcast: will Uber’s Florida Man Problem chill Bug Bounties?

In our latest podcast: the ride sharing firm Uber finds itself on the wrong side of a Florida Man story after paying $100,000 in hush money to a man from The Sunshine State who stole information on 57 million Uber customers. We speak with Katie Moussouris about how the company’s actions could affect the future of the young vulnerability disclosure industry. Also: with BitCoins trading for $16,000 each, Wandera researcher Dan Cuddeford joins us to talk about mobile crypto-jacking schemes that hijack mobile devices to mine crypto currencies. And we invite Alan Brill of the firm Kroll back to discuss recent House of Representatives hearings on the future of authentication in an age of rampant data sharing and data theft. Podcast: Play in new window | DownloadSubscribe: Android | RSS

The firm CyberX said it found a way to sneak data off industrial control networks using radio frequency signals.

Researchers use radio to jump air gapped industrial control systems

Researchers at CyberX say they have found a way to sneak sensitive data off of industrial control system networks using radio frequency communications. The attack could be used to compromise so-called “air gapped” networks that are not connected to the Internet.

Dev Ops Secrets are a major source of breaches, including the recent hack of Uber. We speak with Elizabeth Lawler of CyberArk about it.

Podcast: Uber Breach Puts Focus on Securing DevOps Secrets

The hack of Uber and the loss of information on 57 million customers is just the latest security incident stemming from what our guest Elizabeth Lawler calls “DevOps secrets” – valuable credentials, APIs and other sensitive information that often end up exposed to the public as a result of lax continuous development operations. In this Spotlight Edition* of The Security Ledger Podcast, sponsored by CyberArk, we talk with Elizabeth about how to contain DevOps secrets and secure the secret super user lurking in modern organizations: highly privileged application code.  Podcast: Play in new window | DownloadSubscribe: Android | RSS

CrowdStrike says that North Korean hackers have been expanding their list of targets to include defense and financial firms in the US.

North Korea’s widening Net, pricing the Equifax Hack & Dark Markets in Turmoil

In this week’s podcast, after a string of reports about North Korea’s growing forays onto sensitive corporate networks, we speak with Adam Meyers of CrowdStrike about the widening net of North Korean offensive hacking and how the Hermit Kingdom is playing the part both of cyber criminal and nation-state actor.  Also: we unpack the cost of the Equifax breach with Accenture and talk to Flashpoint about the turmoil on the deep, dark web following the shutdown of the AlphaBay marketplace.  Podcast: Play in new window | DownloadSubscribe: Android | RSS

There are warnings from the DHS and FBI about a North Korean cyber operation dubbed Hidden Cobra.

US Government Warns of Hidden Cobra North Korea Cyber Threat

A Department of Homeland Security (DHS) Alert released on Tuesday warns the public about a campaign of hacking by the government of North Korea it has code-named “Hidden Cobra.”