"I am routinely astonished at how little people understand the concept of "cyberwar", and, subsequently, "cyberweapon". Remember that anything that gives access to another machine w/o consent from the author can be turned into a cyberweapon in an instant. This includes, crucially, auto-update features - in a "real", serious conflict, update-signing keys are valid weapons. With the right signing keys, any firmware updater turns into a hardware-destroying "weapon". Control of the software and update infrastructure are the most crucial strategic weapons a nation can acquire. I don't need a windows exploit if I have control of a good part of the backbone / traffic and the MS update signing keys." halvarflake
"'APT reports serve as attacker QA' is a valid reason for not going full disclosure if u cant shut down the attacker" @pinkflawd
"It's much easier to train users if there's no way they can get it wrong." Matthew Garrett
"Any sufficiently advanced antivirus is indistinguishable from mediocre malware." Carlos Pizano Uribe
"All the insults thrown at me from the Apple corner does not change that the fastest way to get 0day is to just recheck what they say fixed" Stefan Esser
"If you have more certs than years of experience on your resume, you are doing it wrong #getrealworldexperience" Laughing_Mantis
"2015: your SSN was stolen multiple times and even the companies with two factor still use it for account recovery. " Greg Castle
A History of Hard Choices
This post describes some history of deprecating SSL technologies such as MD5, 1024-bit keys, and most recently SHA1. Specifically it points out the repeated non-compliance of Symantec. This exposes the scary world of certificate authorities which all Internet trust is based around. It is a broken system.
Yandex worker stole search engine source code, tried selling for just $28K
This post describes how an employee at Yandex (Russia's version of Google), tried to sell the source code of the company for as little as $28K. This post shows that although companies themselves and many outsiders may view certain assets as valuable, their actual value on the market is quite low. For example, Yandex apprises their source code to be worth around $14M, but the inside threat was unable to sell it for even $28K.
- Database with 191 Million US voters' personal data exposed online: A lot of news was made over publicly accessible data of 191M US voters, that provided names, addresses, and voter status. Unfortunately, this data is made publicly available by law, so it's not actually wrong for this data to be exposed online. This company has been making the data available for free since 2012, so it's unclear what, if anything, is "wrong" about this. I'll admit, I don't like that this data is available, but it's not a breach or misconfiguration.
Conference materials and publications
- CRYPTO 2015 videos: CRYPTO 2015 took place in Santa Barbara, California in August.
- osxlockdown: I wrote a tool to check for and remediate security configuration settings on OSX. These are more aggressive settings that disable various features to reduce the attack surface of the system.
- CrowdStrike/travel-laptop: This open-source project uses coreboot to load the GRUB2 bootloader from the firmware, as opposed to the hard-drive, to better ensure it's protection for encrypted laptops.
- Closing "Heaven’s Gate": Post by Alex Ionescu discusses how 32-bit processes can abuse the WoW64 interface on 64-bit systems to bypass potential security products, among other concepts related to this interface.
- AVG: "Web TuneUP" extension multiple critical vulnerabilities: AVG's browser extension contains vulns. The researcher, Tavis Ormandy, wrote in his initial letter to AVG:
"The extension is so badly broken that I'm not sure whether I should be reporting it to you as a vulnerability, or asking the extension abuse team to investigate if it's a PuP." Tavis Ormandy, where PuP means something that should be considered to be flagged as malware.