Episode 115 - IoT Strikes Again - Bluetooth Flaw Impacts 20 Million Amazon and Google Home Devices
Release Date: 11/20/2017
Security In Five Podcast
A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
This episode talks about some exciting news for the Security In Five and your host's new roles. Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The HIPAA Security Rule is a supportive rule to HIPAA focused on more of the technical security aspects of the privacy rule. NIST released an updated draft of a guide to help people understand and implement controls for the security rule. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A Virtual Private Network (VPN) should be part of your personal security practice. This episode talks about the additional benefits you can get by regularly using one. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
One of the biggest lottery jackpots is drawn tonight. This episode talks about some of the things you should do to protect your privacy if you win. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing attacks use commonly known companies and brands to help trick you into falling for them. This episode talks about a study that reveals the most used brand of 2022 for phishing attacks. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineThe Internet of Things lack of security focus strikes again! This times it is a flaw in Bluetooth dubbed BlueBorne than impacts billions of mobiles devices and now your home devices too.
This episode goes into the flaw, how it can be exploited and what you can do to protect yourself.
Here are the the flaws that were found -
- Information Leak Vulnerability in Android (CVE-2017-0785)
- Remote Code Execution Vulnerability (CVE-2017-0781) in Android's Bluetooth Network Encapsulation Protocol (BNEP) service
- Remote Code Execution Vulnerability (CVE-2017-0782) in Android BNEP's Personal Area Networking (PAN) profile
- The Bluetooth Pineapple in Android—Logical flaw (CVE-2017-0783)
- Linux kernel Remote Code Execution vulnerability (CVE-2017-1000251)
- Linux Bluetooth stack (BlueZ) information leak vulnerability (CVE-2017-1000250)
- The Bluetooth Pineapple in Windows—Logical flaw (CVE-2017-8628)
- Apple Low Energy Audio Protocol Remote Code Execution vulnerability (CVE Pending)
You can look up the CVE definitions here - http://www.cvedetails.com/
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Podcast RSS - http://securityinfive.libsyn.com/rss
Twitter @binaryblogger - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
iHeartRadio - Security In Five Channel
Email - [email protected]