Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Risky Business 2

Risky Business 2

Patrick Gray

Risky Business Extra is Risky.biz's second podcast feed. Here you'll find recorded security presentations and lectures, single-shot interviews with industry players, freelance contributions and more. Clearly labelled, single-shot sponsored content sometimes appears in this feed.
bookmark
Share icon

All episodes

Best episodes

Top 10 Risky Business 2 Episodes

Goodpods has curated a list of the 10 best Risky Business 2 episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Risky Business 2 for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Risky Business 2 episode by adding your comments to the episode page.

Risky Business 2 - PRESENTATION: Why break crypto when you can bypass it?
play

05/15/14 • -1 min

You're about to hear a recording of Peter Gutmann's speech here which is all about crypto. Well, it's sort of about crypto. With newspapers filled with stories about the NSA subverting crypto standards, Peter asks us whether that really matters. Why would an attacker bother breaking crypto when they can just bypass it?

Peter is well positioned to do this talk. He's a researcher in the Department of Computer Science at the University of Auckland and works on the design and analysis of cryptographic security architectures and security usability.

He helped write PGP, has authored a number of papers and RFC's on security and encryption, and is the author of the open source cryptlib security toolkit. And luckily for us, he's a fairly regular guest on Risky Business.

bookmark
plus icon
share episode
Risky Business 2 - INTERVIEW: Hacking supercomputers with y011
play

05/15/14 • -1 min

In this interview we're chatting with Neal Wise of Assurance.com.au. Don't let the accent fool you, Neal is based in Melbourne and has been for as long as I can remember, and he did a great talk here at the AusCERT conference called Hacking the Gibson, which was all about pwning supercomputers.

I warn you in advance that there are a few references from the movie Hackers in this interview... sorry about that... HACK THE PLANET!! .... but yeah, Neal has been doing some work involving supercomputers and I decided to interview him about them. They make excellent bitcoin mining boxes!

bookmark
plus icon
share episode
Risky Business 2 - INTERVIEW: Bob Clark on the CFAA
play

05/15/14 • -1 min

You're about to hear an interview I recorded with Bob Clark. He currently teaches law at the US Naval Academy, but he's been doing military law for a long time, even serving as the operational attorney for the US Army Cyber Command at one point.

I posted his talk yesterday... he touched on the Weev vs AT&T trial in that and I thought it would be interesting to get his perspective on the CFAA, precisely because it's not the sort of thing he normally concerns himself with. He has less of an agenda than a defence attorney or a prosecutor.

(If you haven't heard the episode of the regular Risky Business podcast where I had a chat with Weev and recapped that whole thing you might want to check it out because we reference it in this interview. It's here.)

bookmark
plus icon
share episode
Risky Business 2 - PRESENTATION: Does Anonymous have a future?
play

05/28/13 • -1 min

You're about to hear Parmy Olson's presentation from AusCERT's 2013 conference. Parmy is a journalist for Forbes, but she's also an author -- she wrote We Are Anonymous, Inside the Hacker world of LulzSec, Anonymous and the Global Cyber Insurgency. She got amazing access to the LulzSec crew and the book is well worth reading.

In this presentation she looks at why these young men got involved in such risky activity. What drove them, and what does the future of Anonymous look like?

bookmark
plus icon
share episode

Active defence is the new black. It's the issue of 2013. One of the organisations that helped put the issue on to the agenda is CrowdStrike, a business founded by some senior ex technologists from McAfee. CrowdStrike was founded on the premise that simply relying on defensive measures in information security isn't enough -- you need to be able to mess with your adversaries.

One of CrowdStrike's founders was Dmitri Alperovitch. He was at AusCERT and used his speaking slot to basically deliver the thinking behind CrowdStrike's pitch. It's nothing earth shattering, but it's a really well packaged speech that presents a cogent argument for the concept of active defence. So here it is, Dmitri Alperovitch's AusCERT talk titled Offence as the Best Defence.

bookmark
plus icon
share episode

In this sponsor interview we chat with Paul Ducklin of Sophos about trends in code signing technology designed to combat malware.

During the great "SSL wars" of 2011, when hackers like Comodohacker went cyber-berserk owning CAs and minting their own certificates for sites like Gmail and Facebook, valuable lessons were learned. It's becoming the norm for browsers to pin certs for well known websites... and now this same approach to certificate sanity checking is finding its way into code signing checks.

Microsoft's latest EMET, version 4.0 which I think is still in Beta, will pin certs for signed applications. It's a good idea -- it makes life a little tougher for the bad guys, but as you'll hear, it's not going to kick the can THAT far down the road, as Paul Ducklin explains.

bookmark
plus icon
share episode
Risky Business 2 - PRESENTATION: BYOD in government, a high level talk
play

05/22/13 • -1 min

The following is a recorded presentation from AusCERT. It's by Al Blake, the Chief Information Officer of the Department of Sustainability, Environment, Water, Population and Communities. In it he talks about BYOD, basically, from an Australian government perspective. It's not an overly technical talk, but it is a good overview of what a CIO like him has to consider when allowing staff to use their own devices in a heavily regulated environment.

bookmark
plus icon
share episode

In this sponsor interview with chat with Casey Ellis, the founder of BugCrowd.

When Casey co-founded the business the idea was simple -- the company would host outsourced bug bounty programs for clients that didn't have the expertise to run their own. As some of you may know, the idea really took off, but what no one expected was for BugCrowd's registered testers to do a better job than many penetration testing teams.

It's cheaper than a pentest, and in the case of Web application or mobile application security testing, these bug bounty programs are turning up more actionable issues than penetration testing teams.

Could these types of programs be disruptive to the penetration testing services industry? Casey joined me to discuss.

bookmark
plus icon
share episode
Risky Business 2 - INTERVIEW: Musclenerd on Qualcomm baseband hacking
play

10/30/12 • -1 min

This podcast is an interview with Eric "Musclenerd" McDonald. Eric is a renowned iPhone jailbreaker and as such has a very detailed understanding of smartphone platforms.

His talk at Ruxcon Breakpoint was all about the security of baseband chipsets. If you follow this stuff you might know that the baseband chipsets in these smartphones -- which handle all the basic communications functions of the phones -- are actually quite sophisticated. And where there's sophistication, there are potential problems.

As you'll hear, there's research going into attacking baseband chipsets through two vectors -- directly through the cell network, if you control it, or if you can trick your targets handset into associating with your fake networks... or indeed through the OS. It's interesting stuff.

bookmark
plus icon
share episode

This is a completely unedited recording of a YouTube livestream broadcast on March 31, 2020. It features Patrick Gray, Dmitri Alperovitch, Alex Stamos and Adam Boileau discussing:

  • The recent Booz Allen Hamilton report into GRU activity over the years
  • The role of SIGINT collection in the COVID-19 crisis
  • Microsoft Azure struggling to keep up with new capacity demands

You can view the YouTube recording here:

</iframe>
bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Risky Business 2 have?

Risky Business 2 currently has 100 episodes available.

What topics does Risky Business 2 cover?

The podcast is about News, Tech News, Podcasts and Technology.

What is the most popular episode on Risky Business 2?

The episode title 'Serious Business #5 -- Kanye 2020, vaccination-free childcare and the EU refugee crisis' is the most popular.

What is the average episode length on Risky Business 2?

The average episode length on Risky Business 2 is 53 minutes.

When was the first episode of Risky Business 2?

The first episode of Risky Business 2 was released on Feb 25, 2010.

Show more FAQ

Toggle view more icon

Comments