BrightTALK webinar: Google Docs Phishing Scam

What-is-google-docs-phishing-slide-2

ICYMI: I moderated a BrightTALK webinar on the recent Google Docs phishing attack.

Join BrightTALK and check out this informative panel discussion featuring myself along with panelists Nathan Wenzler and Kowsik Guruswamy.

This slideshow requires JavaScript.

A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

We discuss:
– What is the Google Docs email scam?
– How is this scam different from other phishing scams?
– What’s the deal with Eugene Pupov?
– Who’s at risk and how can you avoid being a victim?
– What can we expect in the future?

Moderator:
– Vince Tocce, Vince in the Bay Podcast

Speakers:
– Nathan Wenzler, Chief Security Strategist at AsTech Consulting
– Kowsik Guruswamy, CTO for Menlo Security

Follow me on Twitter!

Tagged , , , , , , , , , , , , , , , , ,

PODCAST: Laurie Segall

Laurie-Segall-dead-irl-thumbnail-large-main

This episode my guest is Laurie Segall senior technology correspondent for CNN and editor-at-large for CNN Tech.

mh-dead-irl-text-conversation-1280x720

Laurie is host of CNN’s first CNNgo original, Mostly Human with Laurie Segall, a 6-part investigative docuseries, exploring sex, love, death & humanity through the lens of tech.

MH_mostly-human-smart-tv_1280x1280

Mostly Human follows Laurie around the world as she tackles the uncomfortable questions about our increasingly complicated relationship with technology. She examines the power modern technology holds, while exposing the darker side.

The full Mostly Human series streams exclusively on CNNgo.

You can access the series for free through CNNgo on Apple TV, Roku, Amazon FireTV, and Android TV.

It is also available on CNN.com, and CNN’s iOS and Android apps.

______________________________________________________________________________________

Mostly Human – Episodes

1 – Dead, IRL

Laurie-Segal-Mostly-Human-1

Using thousands of texts, tweets and Facebook posts, a woman creates a digital version of her best friend … after he died. Artificial intelligence and years of social media data allowed her to create a bot that responds like her best friend, jokes like him, and blurs the lines between man and machine. This is death in the digital age.

______________________________________________________________________________________

2 – Hacker down: ISIS’ Twitter star

MH_hussain_embed

An investigation into the first person deemed dangerous enough to kill… because of his ability to tweet. We explore the life and death of Junaid Hussain, the ISIS hacker who ushered in a new era of terror, mainly due to his social media celebrity. We infiltrate hacker circles in Vegas, explore undercover operations, and have a dangerous run-in outside his hometown, to understand how he went from computer nerd to third most dangerous member of ISIS.

______________________________________________________________________________________

3 – I love you, Bot

mostly-human-ilyb-realdolls-00003028-1280x720

Westworld, or real world? From people falling in love with robots to sex dolls who now have, “AI brains,” our relationship with tech is getting…complicated. We explore a sexual assault in the virtual world and Minority Report technology being used in a high security psychiatric ward. It’s too controversial for the US and will blow your mind.

______________________________________________________________________________________

4 – Silicon Valley’s dark secret

MOSTLY-HUMAN-JERRY-STILL-1

Dig into the myth of Silicon Valley – where heroes are hailed and success celebrated. Silicon Valley has a secret they don’t want you to know about. Much of the creative genius, the brainiac success stories are also associated  with depression and bi-polar disorder. Is there a price to creative genius?

______________________________________________________________________________________

5 – Swipe, Click, Cheat

ashmad_embed2

Explore the human impact of a hack that exposed 36 million potential cheaters. Behind the hack, there were suicides, broken families. We introduce you to the human impact of Ashley Madison and take our viewers inside the War Room of Ashley Madison where there were millions of dollars on the table, death threats, and a ticking time bomb that would explode with society’s secrets. We’ll also look at the company’s secret: their ability to program algorithms that would make you more likely to click-for-affair.

______________________________________________________________________________________

6 – Electric Sheep

mostly-human-electric-sheep-missed-connections-00003826-1280x720

A look at why the most powerful people in tech are stepping away from the products they’ve built. In a place where algorithms play god, we explore the soul searching Silicon Valley is doing.  The biggest CEO’s are raising the alarm bells and wondering – have we entered the singularity? Who’s in control… man or machine?

______________________________________________________________________________________

VITB CAMEO!

VITBonCNNgo

______________________________________________________________________________________

SUBSCRIBE TO VITB PODCAST:

googleplay-logo

1-logo-itunes

stitcher-logo

DIRECT DOWNLOAD MP3 OF PODCAST

______________________________________________________________________________________

Tagged , , , , , , , , , , , , , , , ,

PODCAST: Christopher Kelly

600x600ck-Christopher-Kelly

This podcast features guest Christopher Kelly who shares a historical perspective on the “surveillance society” we live in and its origins in World War I espionage. Below is a recent article Christopher wrote on this subject and is the basis for our conversation.

Surveillance Technology Drove America to Enter World War I

by Christopher Kelly

Lately, we’ve been hearing on a daily basis about alleged wiretapping by leaders and governments both foreign and domestic. Americans find themselves asking, What is our government up to? What might be the consequences of governments’ abilities to listen into our private conversations?

If history is any indicator, the answer may be troubling. Much of the “surveillance society” in which we live today had its origins in World War I espionage, which began the decade after Guglielmo Marconi transmitted the first transatlantic message from Cornwall in England to Newfoundland in Canada, in 1901.

Soon, governments were scrambling to intercept the blizzard of electronic transmissions that followed. The British built a sophisticated signals intelligence network designed to monitor German radio traffic during the war. Their SIS (Secret Intelligence Service and forerunner to MI6) established monitoring stations from Folkestone to London.

And these newfound clandestine surveillance capabilities, while a promising tool for national security, also turned out to be the very thing that prompted America’s entry into World War I one hundred years ago.

800px-Post_Office_Engineers

British intelligence played a decisive role in the American entry into World War I. But it was not a martini-swilling gun-toting field agent that did it.

It all began in Room 40 — the decryption service of the British Admiralty in World War I. Experts there managed to obtain the German naval codebooks in 1914, including one seized by the Russian Navy in the Baltic. Room 40’s greatest coup of the war, however, was the interception and decryption of the famous Zimmermann Telegram in 1917.

800px-Admiralty_office_Whitehall_1760_D_Cunego

Relations between Mexico and America were tense even in those days. In March 1916, Mexican revolutionary Pancho Villa launched a cross-border attack on Columbus, New Mexico. He seized supplies and burned the town. In retaliation, President Wilson ordered the U.S. Army into Mexico to capture the notorious bandit leader. Brigadier General John Pershing led the Punitive Expedition from New Mexico into Chihuahua. Pershing was a tough veteran of Indian wars and the Moro uprising in the Philippines. A young George S. Patton Jr., whose attractive sister Nita was dating the widower Pershing, was detailed to Pershing’s staff.

Pancho Villa, as it turned out, proved to be somewhat elusive, but Patton, leading a small patrol, participated in a skirmish at a hacienda in San Miguelito. Three Villistas were killed. When about fifty Villistas approached the hacienda, Patton beat a hasty retreat with the three dead men strapped across the hood of his automobile. Patton was later promoted to first lieutenant.

In January 1917, less than eight months after Patton’s skirmish, Room 40 intercepted and decrypted the Zimmerman Telegram.

The message it contained, sent by the German minister of foreign affairs to the German ambassador in Mexico City, proposed an alliance with Mexico in the event of America’s entry into the war. According to its terms, Mexican territory lost in previous wars with the United States, in states such as Arizona, New Mexico, and Texas, would be returned to Mexican sovereignty in exchange for Mexico’s declaration of war on the United States. When its contents were disclosed, the telegram enraged many Americans, and was one of the catalysts (along with unrestricted submarine warfare) for the declaration of war by the United States Congress on April 6, 1917.

The intrepid Lieutenant Patton would serve in the American Expeditionary Force in World War I. General Pershing would command over two million men in the AEF in Europe.

American neutrality was not the only victim of British intelligence. Room 40 also decrypted messages that identified Mata Hari—a Dutch courtesan and exotic dancer in Paris, who was born Margaretha Geertruida Zelle in Leeuwarden, Netherlands, in 1876—as H-21, a German spy.

The information was passed to French intelligence, and the femme fatale was arrested, convicted, and executed by firing squad in 1917. The unfortunate Mata Hari had been overly friendly with officers on both sides of the Great War.

Years later, Room 40 would, of course, provide inspiration for the codebreaking that took place at Bletchley Park in World War II. Both Britain and America were routinely listening in on Axis messages. Eisenhower claimed that the work of the codebreakers may have shortened the war by as much as two years, saving countless lives.

After World War II, Henry Stimson, FDR’s Secretary of State, would write in his memoirs that “Gentlemen do not read each other’s mail.” But the truth is that gentlemen began reading each other’s mail long before World War II. And they continue to read all of our mail today. And the full scope of the consequences such breaches of trust can have remains to be seen.

**

Christopher Kelly, an American history writer living in London and Seattle, edited An Adventure in 1914, a memoir about an American family traveling in Europe on the brink of World War I (www.anadventurein1914.com).

Subscribe to the Vince in the Bay podcast on iTunes, GooglePlay, Stitcher and Soundcloud!

1-logo-itunesgoogleplay-logostitcher-logo

Tagged , , , , , , , , , , , , , , ,

PODCAST: RSA Conference 2017

RSAC2017-Banner

LISTEN TO FULL PODCAST

Another year, another wave of security incidents and threat models to keep the cybersecurity industry busy. So there was plenty to discuss and share as the InfoSec community flocked to San Francisco for the annual RSA Conference last month.

RSAC2017-escalator1

A view from the escalator as I descend into the bowels of RSAC 2017.

As always, the latest trends in the industry were addressed. Large data breaches, quickly growing threat models, security education, political hacking, and the risks posed by the Internet of Things were common threads throughout many of the keynotes, sessions, workshops, expos, and general chatter among attendees.

RSAC has more of a trade show feel compared to other security conferences so I’ve learned over the years that it’s best to approach the conference as an opportunity to meet and network with industry experts. This year I spent less time attending the talks and more time meeting with the players in the industry who are there to make deals and form partnerships.

However, I did catch several enlightening talks and panel discussions featuring the likes of ex-CIA operative Valerie Plame, security guru Bruce Schneier, researcher Rob Graham, people-security expert Masha Sedova, and security consultant Jeff Carr. Also enjoyed the entertaining keynotes by Late Night host Seth Meyers and astrophysicist Neil deGrasse Tyson.

This slideshow requires JavaScript.

CHECK OUT ROB GRAHAM’S TALK ON MIRAI AND IoT BOTNETS HERE!

Throughout the week I was lucky to catch up with several industry professionals representing some of the top tier firms in the cybersecurity sector who shared their take on the challenges and trends facing cybersecurity firms, their clients, and end users.

This episode of the podcast features interviews collected at RSAC 2017.

BIG THANKS TO THE GUESTS ON THIS EPISODE!!

Dave-Lewis-Akamai

Dave Lewis

Dave Lewis – Akamai

rob-graham

Rob Graham – Errata Security

Donald-Meyer

Donald Meyer

Donald Meyer – Check Point Software

Dario

Dario Forte

Dario Forte – DFLabs

Sebastian, Alex and SelenaOnapsis

Scott-Bollinger

Scott Bollinger

Scott Bollinger – Security Researcher

Jeff-Carr

Jeffrey Carr

Jeffrey Carr – 20K League

DOWNLOAD FULL PODCAST MP3

SUBSCRIBE on iTunes, GooglePlay, Stitcher, and Soundcloud!!

1-logo-itunesgoogleplay-logostitcher-logo

Follow on Twitter!