Talking the Ashley Madison hack on ABC Gold Coast

ABC logoThe Ashley Madison hack returned to the news this week, because the 30-day deadline given by Impact Team, the hacker(s) who claimed responsibility, expired, and the site’s data started being dumped onto the internet.

While I’d spoken about this before on ABC 936 Hobart, this week I spoke about the then-latest developments on Friday with ABC Gold Coast. Here’s the full conversation with morning presenter Nicole Dyer.

The site I mentioned at the end, where you can check whether your email address appears in the Ashley Madison data dump, or in many of the larger data breaches of recent years, is haveibeenpwned.com, run by Australian security researcher Troy Hunt. Use it.

The audio is of course ©2015 Australian Broadcasting Corporation.

Talking the cybers on ABC TV’s Lateline

Screenshot of Stilgherrian on Lateline: click for video and transcriptIt was my very great pleasure to talk about hacking and the impending security disaster that is the Internet of Things (IoT) on ABC TV’s Lateline last night — and don’t I look concerned.

Also joining the program was security researcher Runa Sandvik, who got plenty of media recently for hacking a smart sniper rifle.

I won’t go into too many details here, because you can see the video and transcript at the Lateline website. For the next month or so, you can also watch it in HD on iView.

However, this exchange surprised me:

STILGHERRIAN: … Scarier though is what’s happening with smart TVs. There are millions of those around the world. They’re networked, so you can watch clips from YouTube or whatever on them or Netflix or any of the streaming services, and yet I’ve seen a young hacker from South Korea not only hack a smart TV, hack it in 10 different ways and set it up so that the camera and microphone in the TV are streaming live video and sound out to the internet while the television looks like it’s turned off. These are televisions that are being installed over the last few years and more in the future in hotel bedrooms, classrooms, corporate boardrooms. So they’re kind of like an always-on surveillance device.

JOHN BARRON: I guess, Runa, the question then occurs: well, who would want to do this? Who would want to hack into somebody’s TV set in suburban Australia or the United States? The answer would probably be: well, nobody. But why would somebody want to do this?

RUNA SANDVIK: There’s a mix. There’s definitely people that are doing this for sort of evil purposes, if you will, or to make money, and there are people that do it just because they can, because it’s there, it’s a possibility, it’s not as secure as it should be and they do it just to show that they can.

Personally, I’d have thought that the security risks of peering into people’s homes would have been obvious, but the questions moved on before I could point out the attraction to both pilferers and perverts.

Anyway, you can also read my thoughts on this in my December 2014 column, All aboard the internet of things infosec hype train, and its January 2014 predecessor, Our hackers, who art in open source, deliver us from refrigerators.

Talking the Wentworth Falls bushfire on ABC 702 Sydney

Firefighters tackle the Wentworth Falls bushfire, 2 August 2015

ABC logoAs Monday morning kicked off, the Wentworth Falls bushfire that I mentioned in yesterday’s Weekly Wrap was of course a major news story.

ABC 702 Sydney breakfast presenter Robbie Buck asked for locals to talk about their experiences, so I gave him a call. Here’s the three-minute conversation that resulted.

The audio is ©2015 Australian Broadcasting Corporation.

[Photo: Firefighters tackle the Wentworth Falls bushfire, 2 August 2015, via the NSW Rural Fire Service.]

Talking the ACSC cyber threat report on 1395 FIVEaa

FIVEaa logoThe (relatively) new Australian Cyber Security Centre (ACSC) released its first-ever unclassified threat report yesterday, but as I wrote at ZDNet, I was disappointed.

The report (PDF) has dropped, and indeed it contains few surprises. It tells the now-familiar story of serious and organised criminals, foreign state-sponsored actors, and other “cyber adversaries”, all of whom are getting better at what they do.

“The cyber threat to Australian organisations is undeniable, unrelenting and continues to grow. If an organisation is connected to the internet, it is vulnerable. The incidents in the public eye are just the tip of the iceberg,” begins the report’s foreword.

“Cyber adversaries are aggressive and persistent in their efforts to compromise Australian networks and information. They are constantly improving their tradecraft in an attempt to defeat our network defences and exploit new technologies,” it says later.

“Australia is an innovative country with a globally important resources sector. We are a regional leader with global interests and important partnerships. This makes Australia a target-rich environment for cyber adversaries.”

All of which is true, of course, but all of which has been said so many times before.

I spoke about the report today with Will Goodings on 1395 FIVEaa Adelaide — with somewhat less disappointment in my voice.

The audio is ©2015 Nova Entertainment.

Talking the Ashley Madison data breach on ABC 936 Hobart

ABC logoThe information security news story of the week was, of course, the data breach at “affairs” and “cheaters” website Ashley Madison, something first reported by journalist Brian Krebs.

I spoke about this data breach in a couple of radio spots — I’m reluctant to call it a
“hack” until we have some evidence that a hack was involved, as opposed to some internal problem — but I reckon the first was the best.

Here’s that conversation, a 13-minute chat from Tuesday morning with ABC 936 Hobart morning presenter Leon Compton. Enjoy.

The audio is of course ©2015 Australian Broadcasting Corporation.