Handler on Duty: Jesse La Grew
Threat Level: green
Podcast Detail
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://chrt.fm/track/2748D7/https://traffic.libsyn.com/securitypodcast/3903.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Interested in Internet Storm Center stickers? Check here if there are still some available for today.
Individual Account Compromisse Leads to Spam Incident
https://isc.sans.edu/forums/diary/How+the+Compromised+of+a+User+Account+Lead+to+a+Spam+Incident/17843
Microsoft Using Employees Private Hotmail Account To Track Down Intellecutal Property Leak
http://www.zdnet.com/how-microsoft-tracked-down-a-spy-who-leaked-its-secrets-7000027545
Andorid Privilege Escalation Via Updating
http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf
Chrome will require Certificate Transperancy from all EV Certificate Authorities after February 2015.
https://sites.google.com/site/certificatetransparency/ev-ct-plan
https://isc.sans.edu/forums/diary/How+the+Compromised+of+a+User+Account+Lead+to+a+Spam+Incident/17843
Microsoft Using Employees Private Hotmail Account To Track Down Intellecutal Property Leak
http://www.zdnet.com/how-microsoft-tracked-down-a-spy-who-leaked-its-secrets-7000027545
Andorid Privilege Escalation Via Updating
http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf
Chrome will require Certificate Transperancy from all EV Certificate Authorities after February 2015.
https://sites.google.com/site/certificatetransparency/ev-ct-plan
Discussion
The Hotmail account Microsoft accessed wasn't that of their (former) employee, but that of the journalist he had sent the source code to. Which might not make a big difference legally, but it does make it more embarrassing for Microsoft.
Posted by Martijn Grooten on Mon Mar 24 2014, 10:36
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |