whoisjoe.com

What I’m Thinking About March

 Location, Location, Location 

March 2, 2018

Home About Projects Blog LinkedIn ReThink Security

Lots of lost certificates

23,000 HTTPS certificates axed after CEO emails private keys | Ars Technica The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate authority that acquired Symantec’s certificate issuance business after Symantec was caught flouting binding industry rules, prompting Google to distrust Symantec certificates in its Chrome browser. In communications earlier this month, Trustico notified DigiCert that 50,000 Symantec-issued certificates Trustico had resold should be mass revoked because of security concerns.

Strava loses the location of an army base

Strava released a heat map of where their users were running, swimming, and cycling as a marketing tool. They failed to properly anonymize the data and inadvertently gave away the locations of secret US army bases and some details about their users. This shows how difficult anonymization is. I think we could have helped Strava identify these risks before they released the data.

  • Steve Loughran: Advanced Denanonymization through Strava
  • Fitness tracking app Strava gives away location of secret US army bases | Technology | The Guardian

ML is still scary

Have I mentioned how scary Machine Learning is getting? Let’s recap:

  • We can create audio that simulates anybody’s voice, based on a few samples
  • We can use ML to face swap photos and videos
  • Faceswapping, Unethical Videos, and Future Shock - YouTube
  • Family fun with deepfakes. Or how I got my wife onto the Tonight Show – sven charleer
  • New tool swaps Nicolas Cage with every actor in every film ever

Krebs talks about Jackpotting ATMs

Krebs on Security posts a lot about ATM insecurities, but he’s talking about “Jackpotting” ATMs in the US now. This crime installs malicious software or hardware on the ATMs that forces the machine to spit out huge amounts of cash. Our embedded security services could help with an attack like this. There are two sides to this attack, first the software protections that need to be in place and the physical ones (most attacks require the attacker to plug in an ethernet cable or a keyboard to initiate the attack). First ‘Jackpotting’ Attacks Hit U.S. ATMs — Krebs on Security

Blockchain

No, You Probably Don’t Need a Blockchain - Ashton Kemerling

Have I Been Pwn’d?

Troy Hunt: I’ve Just Launched “Pwned Passwords” V2 With Half a Billion Passwords for Download

This is truly an exceptional resource for checking emails, passwords, and getting breach notifications.

When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised. - NIST

A friend of mine, craSH was asked recently what the number one mistake companies are often making right now for AWS security. His response was insecure configuration of S3 buckets - we’ve seen dozens of cases where this has been breached lately, e.g.: Verizon: https://www.upguard.com/breaches/verizon-cloud-leak Experian: https://www.scmagazine.com/open-aws-s3-bucket-exposes-sensitive-experian-and-census-info-on-123-million-us-households/article/720067/ Accenture: https://www.upguard.com/breaches/cloud-leak-accenture US Army Intel: https://arstechnica.com/information-technology/2017/11/army-red-disk-intel-sharing-system-left-exposed-in-open-aws-data-store/ Many others, more every day: https://www.tripwire.com/state-of-security/featured/preventing-yet-another-aws-s3-storage-breach-with-tripwire/

Posted By: Joe Basirico

  • 81 More Posts
  • So, You're a Manager Now
  • A Mixtape in 2022
  • The Middle Path of Planning and Reflection
  • Micromanagement and Trust
  • On Giving Advice
  • Emergency Preparedness During Coronavirus Frenzy
  • Mind Map Your Life
  • Start With the Hard Part
  • Delight in the Details
  • Introducing ReThink Security
  • Newsletter & Recommendations
  • Take a Moment
  • Triage Decision Making
  • Show Your Work
  • Getting Back Up
  • Max Out vs. Continuous Development
  • Mental Diet and Exercise
  • Asking for Help Part 2 - Alerting
  • High Water Mark
  • Who Do You Want to Be
  • Presentation Tips
  • Asking for Help
  • China Hijacking the Internet
  • Recording Audio with AirPods in Imovie
  • Active Decisions
  • Create/Publish Scripts
  • Specialize or Do Not Specialize
  • Exactis Breach
  • Optimizing Images
  • What I Track
  • What I’m Thinking About May
  • What I’m Thinking About March
  • What I’m Thinking About January
  • Building a Collaborative & Social Application Security Program
  • Lazy Days in the Cloud
  • Delegate Then Do
  • So you want to be a better programmer
  • Project Success
  • Don't Short Circuit a Lesson
  • Scale Your Solution to the Problem
  • Digital Currencies
  • Fortnightly
  • Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone
  • In Defense of Reverse Engineering and Responsible Disclosure
  • Ruby open allows command injection if user controlled
  • New Mac Install Guide
  • Understanding Customer Needs and Helping Them Mature
  • My Experiences with IOS8 and Yosemite so far
  • The Importance of Vulnerability Disclosure Programs and Bug Bounties
  • My New Record Player and Beck - Morning Phase (The Vinyl Experience)
  • An Hour of Code with Code.org
  • Gmail Changes to Displays Images by Default
  • Why I Donated to Help Jailbreak iOS7 & You Should Too
  • Email Strategy
  • Shutdown
  • Anatomy of a Distributed Denial of Service (DDoS) Attack
  • NASA Forced to Suspend All Public Outreach & Education Programs
  • Joe_CMS Open Source!
  • Mobile Application Security Testing FAQs: Post #1
  • How Much Security Does Obfuscation Get You?
  • Why Privacy Matters Even if You Have 'Nothing to Hide'
  • What LinkedIn Should Have Done with Your Passwords
  • Constant Vigilance
  • Boeing Paying Hackers to Break into Their Systems
  • My Reading Cycle
  • Developing Tools for Professional Hackers
  • Finding Your Inner Evildoer (4/4): An Evil Streak
  • Finding Your Inner Evildoer (3/4): A Good Imagination
  • When to Rebuild Your Process from Scratch
  • Finding Your Inner Evildoer (2/4): Complete Knowledge of the System
  • Continuous Incremental, Personal Improvement
  • Finding Your Inner Evildoer: Part 1
  • CISCO Password Revealer
  • Battling with Word and Excel
  • Which is More Secure: Windows or Linux?
  • The High Cost of an Application Security Data Breach
  • Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config
  • New WikiRater Features
  • When is it OK to Build up Technical Debt
  • Time Management with the Pomodoro Technique
  • Manage Energy Not Time
  • Goals, Results and Activities - defining your productivity
© 2022 whoisjoe.com