Stilgherrian (@stilgherrian)

Wentworth Falls NSW AU

The below is an off-site archive of all tweets posted by @stilgherrian ever

November 14th, 2014

Back at @bunjaree, and pants off.

via Tweetbot for iΟS

The train is running ten minutes late, which isn’t too bad, considering. Next stop Wentworth Falls.

via Tweetbot for iΟS

@erkpod [Nods.] I’m slowly learning, as I watch the evolution of fires on a terrain map.

via Tweetbot for iΟS in reply to erkpod

So iOS wanted to correct “doorknock” to “dork jock”. OK then.

via Tweetbot for iΟS

@erkpod It did look like some doorknock and evacuation was happening.

via Tweetbot for iΟS in reply to erkpod

“Air power is inexplicably linked to technological change,” reports @abcnews, mysteriously. abc.net.au/news/5893240

via iOS

I’ll have no further information n the fire. I’ll soon be 30km or so from it, and it’ll be of no relevance to me.

via Tweetbot for iΟS

@katie18O I know no more than you. I’m in a train. And it’s dark outside.

via Tweetbot for iΟS in reply to katie18O

Strong smell of smoke in the train now as we pass Warimoo to Valley Heights. Many, many fire and police units to the south of the railway.

via Tweetbot for iΟS

Sorry, correction coming.

via Tweetbot for iΟS

@michaelneale Yeah, a southerly change just came through. Helpfully*.

via Tweetbot for iΟS in reply to michaelneale

Well, that grass fire has been dealt with, but another fire has kicked off near Valley Heights. pic.twitter.com/8FVgMiDXTt

via iOS

RT @haruki_zaemon: BA flights are “speedbird.” I think it fitting that the PM’s callsign be “speed-oh” [Oh good point.]

via Tweetbot for iΟS

I dare the RAAF to change the callsign of the Prime Minister’s flight to SHIRTFRONT ONE.

via Tweetbot for iΟS

@erkpod Yep, it wasn’t there half an hour ago. It’s presumably wind-borne embers. I’ll turn to GRN once we get to Penrith.

via Tweetbot for iΟS in reply to erkpod

@eldonnn They’re not new, just refurbished, and the seat layout it the same, just new upholstery.

via Tweetbot for iΟS in reply to eldonnn

@erkpod I can imagine. But at the same time it’s an excellent scenario to rehearse.

via Tweetbot for iΟS in reply to erkpod

Yeah so this is what I specifically wanted not to see. pic.twitter.com/rECMkBZyOx

via iOS

Though she did apologise and leave when I pointed out it was a quiet carriage.

via Tweetbot for iΟS

OH, woman on phone: “I’m just on a train at the end of the universe.” We just passed Flemington.

via Tweetbot for iΟS

@erkpod Hah. You bastard. That’s very messy.

via Tweetbot for iΟS in reply to erkpod

RT @GuardianAus: I didnt have enough Facebook friends to prove to Airbnb I was real trib.al/7Ypxc1R [And @Airbnb’s empty response.]

via Tweetbot for iΟS

Thanks for the various best wishes re the fire. For me, the only problem is this flare-up cutting the rail link before I pass it.

via Tweetbot for iΟS

NSWRFS Southerly change moving across Blue Mountains fireground. Fire is flaring up. Crews in place.

via TweetDeck (retweeted on 9:29 PM, Nov 14th, 2014 via Tweetbot for iΟS)

@erkpod Ah yep, I’ve popped in there to orient myself once or twice, but no that’s not relevant to my needs generally.

via Tweetbot for iΟS in reply to erkpod

@erkpod @carolduncan What’s you callsign? I listen to the Blue Mountains GRN, usually the woman on FIRECOM.

via Tweetbot for iΟS in reply to erkpod

After three nights of less the three hours sleep each, and two days of absorbing malware research, I’ll be glad to collapse tonight.

via Tweetbot for iΟS

AlexChesser Strike Teams awaiting the wind change on Florabella St, Warrimoo in the Blue Mountains. pic.twitter.com/vIrEnJBnnH

via Twitter for iPhone (retweeted on 9:13 PM, Nov 14th, 2014 via Tweetbot for iΟS)

@carolduncan @erkpod @ABCemergency I connect in upstream, from @NSWRFS and the Government Radio Network.

via Tweetbot for iΟS in reply to carolduncan

Excellent. The 2118 service to Mt Victoria is set to depart Central on time, and has the usual number of waiting passengers.

via Tweetbot for iΟS

Right, I’ll head to Central station and see what’s going on.

via Tweetbot for iΟS

@retrogrrl Um, at was “closed”, not “loses”. Apple was helping*.

via Tweetbot for iΟS in reply to retrogrrl

@carolduncan @erkpod Fire near Warimoo / Blaxland. Some evacuations, rail/road closed earlier but it’s open for now.

via Tweetbot for iΟS in reply to carolduncan

@erkpod That’s precisely what I was thinking. Thanks for the confirmation.

via Tweetbot for iΟS in reply to erkpod

mikko The Tor exit node that was infecting binaries with OnionDuke was 78.24.222.229. It has been reported to Tor Project so it should be blocked.

via Twitter for Websites (retweeted on 8:49 PM, Nov 14th, 2014 via Tweetbot for iΟS)

mikko A Tor exit node in Russia was automatically infecting downloaded executables with the ‘OnionDuke’ APT malware: f-secure.com/weblog/archive…

via Twitter for iPhone (retweeted on 8:49 PM, Nov 14th, 2014 via Tweetbot for iΟS)

@retrogrrl Thanks, but the railway will be loses again well before a train starts getting close to a fire.

via Tweetbot for iΟS in reply to retrogrrl

@SMinney @R_Chirgwin @drnaomi @bunjaree No, it’s the media’s bad. Always “Blue Mountains under threat” for a fire near one town.

via Tweetbot for iΟS in reply to SMinney

@SMinney @R_Chirgwin @drnaomi @bunjaree Just remember that “the Blue Mountains” is 11,000 sq km, and fires rather smaller.

via Tweetbot for iΟS in reply to SMinney

Silly @NSWRFS website map doesn’t have a scale. But that’s the fire, @mpesce pic.twitter.com/MTIW7Sxbo6

via iOS

@boymc Assuming my battery holds up, I’ll be listening to the Government Radio Network en route.

via Tweetbot for iΟS in reply to boymc

@mpesce Within a couple hundred metres, it looks like. Trains were cancelled earlier.

via Tweetbot for iΟS in reply to mpesce

@SMinney There fire is a long, long way from @bunjaree. But the train passes the fire zone. If the fire turns, it might be cut off.

via Tweetbot for iΟS in reply to SMinney

Assuming the fire doesn’t turn back towards the railway, I’ll finally be in bed before midnight.

via Tweetbot for iΟS

Trains appear to be back to running on time. How full they are remains to be seen. But I’ll try the next one, at 2118.

via Tweetbot for iΟS

@alias_steven Well I’m agnostic about such things. I’m not categorisable by brands.

via Tweetbot for iΟS in reply to alias_steven

Oh good*, my iPad just randomly rebooted. I am filled with confidence. No, not confidence. The other thing.

via Tweetbot for iΟS

thegrugq_ebooks That makes little sense.

via Orwell for iPhone (retweeted on 7:45 PM, Nov 14th, 2014 via Tweetbot for iΟS)

JohnBirmingham You know, if really wants to show Putin a bad time they could get me to meet him at the airport & drive him into town via Ipswich.

via Tweetbot for iΟS (retweeted on 7:34 PM, Nov 14th, 2014 via Tweetbot for iΟS)

RT @NewtonMark: So climate change was clearly mentioned a lot, just not when tony was within earshot. [Would you discuss Poe with a duck?]

via Tweetbot for iΟS

NewtonMark Everyone spare a thought for @bernietb, who is at this very moment getting out of bed to begin his commute from Newcastle for work on Monday

via Tweetbot for iΟS (retweeted on 7:29 PM, Nov 14th, 2014 via Tweetbot for iΟS)

kcarruthers once you realise that someone is a complete dick it is very hard to respect them

via TweetDeck (retweeted on 6:31 PM, Nov 14th, 2014 via Tweetbot for iΟS)

Conference organiser says: “The End. Let’s go to the bar.” And we shall.

via Janetter for Mac

AVAR 2015 is in Da Nang, Vietnam. Trieu Tran Duc, CEO of CMC Info Security Corp, says it will be NextGen.

via Janetter for Mac

A lot of interesting stuff in that panel about the legitimacy of testing anti-malware products. The panel ends.

via Janetter for Mac

AntonyGreenABC You can watch free on tv, listen free on radio, but have to sign up to listen on-line?

via Twitter Web Client (retweeted on 5:00 PM, Nov 14th, 2014 via Janetter for Mac)

AntonyGreenABC What dingbat at Cricket Australia thinks its clever to prevent people listening to the cricket via their computer!

via Twitter Web Client (retweeted on 4:59 PM, Nov 14th, 2014 via Janetter for Mac)

5at5daily 5at5 number 107: Japanese death rituals, lazy-ass research, robot tweeters, smart bombs, and deradicalisation. tinyletter.com/5at5/letters/5…

via Janetter for Mac (retweeted on 4:58 PM, Nov 14th, 2014 via Janetter for Mac)

@NGruen1 This is why I like your practicality.

via Janetter for Mac in reply to NGruen1

@JohnnySoftware @SwiftOnSecurity Tizen has been out in developer land, there’s 10,000-odd apps ready to go in their app store on launch.

via Janetter for Mac in reply to JohnnySoftware

@TheFailedProjek @TrainLinkWest @NSWRFS Oh thanks for that. Sounds like they’ll have that all working.

via Janetter for Mac in reply to TheFailedProjek

OK, this whole panel discussion has gone feral.

via Janetter for Mac

Abrams prefers to call APTs “targeted persistent attacks”, because that captures the intent aspect.

via Janetter for Mac

Edwards tells is that it’s not ethical to strap pregnant women into cars and drive them into walls at high speed. [My weekend gone.]

via Janetter for Mac

The consensus seems to be that “testing for an APT” is not really a thing because that’s about intent, not a technology.

via Janetter for Mac

Edwards: It’s like going back to 1999 and talking about IDS, detecting rather than removing problems.

via Janetter for Mac

Edwards: “NextGen and fashion are both 7-letter words. Bullshit is an 8-letter word.”

via Janetter for Mac

Bridwell says NextGen is usually just a natural evolution of what people are doing already. Better hardware, fix mistakes etc.

via Janetter for Mac

Abrams says “NextGen” is just code for “fashion, quotes Oscar Wilde on the subject.

via Janetter for Mac

Panel is: Simon Edwards (Dennis Labs), Larry Bridwell (West Coast Labs), Randy Abrams (NSS Labs).

via Janetter for Mac

It’s a panel, “The Efficacy of “NextGen” Security”, moderated by @gcluley.

via Janetter for Mac

The final session of the Association of anti-Virus Asia Researchers (AVAR) conference starts. etouches.com/ehome/avar2014… Mute to avoid.

via Janetter for Mac

@dobes @jturner_ibrs I am willing to destroy fun, with or without numbers.

via Janetter for Mac in reply to dobes

@sam_ikin That doesn’t mean I couldn’t discover a lot very quickly. I only look at specific threats if I need to do so.

via Janetter for Mac in reply to sam_ikin

@sam_ikin I know nothing about My Start Search, but I see that it’s listed as malware in some lists.

via Janetter for Mac in reply to sam_ikin

@dobes @jturner_ibrs A psychopath with an agenda, eh…? [Narrows eyes.]

via Janetter for Mac in reply to dobes

@mattdasilva True. There is also reason to believe that this is not German malware. ;)

via Janetter for Mac in reply to mattdasilva

And now we’re learning how memory scraping works, and how to write anti-malware code to block said memory-scraping.

via Janetter for Mac

This means the POS malware industry is starting to worry about the AV industry, ‘cos they’re now taking countermeasures.

via Janetter for Mac

Oprisa: “This POS malware is getting more integrated into the malware landscape.”

via Janetter for Mac

Backoff is the next generation. Injects into explorer.exe to respawn, talks to C&C server, includes a keylogger.

via Janetter for Mac

The malware called Decebal does the same sort of thing, all in 400 lines of VB code, including a neat trick to avoid detection.

via Janetter for Mac

The card numbers would seem to end up at the black market credit card site rescator.cc

via Janetter for Mac

BlackPOS scans the computer’s memory looking for credit card patterns, saves them via \system32\winxml.dll

via Janetter for Mac

We’re looking at BlackPOS, the malware used in the Target attacks. AKA Kaptoxa/Kartoxa (Картофель is Russian for potato).

via Janetter for Mac

These computers are usually Windows machines, and many are still running Windows XP, so obviously vulnerable.

via Janetter for Mac

Oprisa runs through the attack vectors on a store’s POS system. The POS terminal and the in-store payment server are the way.

via Janetter for Mac

It’s just Ciprian Oprisa presenting today.

via Janetter for Mac

Next up, Ciprian Oprisa & George Cabau from Bitdefender, “Point of Sale (POS) Malware: Are we really defenceless?”

via Janetter for Mac

Malware vendors are already advertising spyware for smart wristband devices etc, and Tizen isn’t even officially launched yet.

via Janetter for Mac

I’ve just seen a report of a certain smart camera being scanned with nmap. It had ports open. They popped images onto its screen.

via Janetter for Mac

I had to duck out of this presentation for a moment, so I’ve lost the thread. May not tweet much of it.

via Janetter for Mac

@Nanso44 Thanks. I was fairly happy with that analysis.

via Janetter for Mac in reply to Nanso44

So Asrar gave the AFP this presentation at the airport. He bored them at such length they figured he was legit and let him in. (2/2)

via Janetter for Mac

Asrar explains how he got interrogated at SYD for bringing in unlabelled [suspicious?] hardware etc. No FCC certification etc. (1/2)

via Janetter for Mac

Asrar is currently running through background on Tizen. tizen.org en.wikipedia.org/wiki/Tizen

via Janetter for Mac

Next up, Mc Afee’s Irfan Asrar, “The Tizen Attack Surface”, Tizen being a Linux-based OS for embedded use.

via Janetter for Mac

Apparently I don’t look Asian, and this confuses someone. (See the first comment.) zdnet.com/on-metadata-le…

via Janetter for Mac

@darrenpauli You read the comments? I don’t recall seeing that one.

via Janetter for Mac in reply to darrenpauli

@ewe2 Actually, please see immediately previous tweet.

via Janetter for Mac in reply to ewe2

That smart home vulnerability test? Summary at av-test.org/en/news/news-s… Full research (PDF, German) at av-test.org/fileadmin/pdf/…

via Janetter for Mac

@marcoostini Nah, I’m at the AVAR conference in Sydney.

via Janetter for Mac in reply to marcoostini

@ewe2 I will track it down later. Maybe not today.

via Janetter for Mac in reply to ewe2

An open letter to device developers. instagram.com/p/vXXfheCFj5/

via Instagram

Why would I care about someone hacking my smart home? instagram.com/p/vXXT5liFiz/

via Janetter for Mac

Marx is essentially calling for industry self-regulation before more clumsy government regulation comes in.

via Janetter for Mac

See also Michael Jordan’s “Hacking Canon Pixma Printers - Doomed Encryption”, where he installed Doom on his printer firmware.

via Janetter for Mac

Marx found a Yamaha AV receiver, the iPhone app works in any wireless network, not just the one in that venue’s sound system.

via Janetter for Mac

See also David Jackoby, “How I hacked my home”.

via Janetter for Mac

Marx found some Western Digital hard drives where you could load any firmware you liked onto them, there was no authentication.

via Janetter for Mac

See also Karsten Nohl & Jakob Lell’s work on USB security.

via Janetter for Mac

See also Alex Chapman’s research on vulnerable lightbulbs.

via Janetter for Mac

This research is on AV-TEST’s website, but in German only.

via Janetter for Mac

Also there were often undocumented admin logins, “Not as bad as ‘root’/’root’, but ‘root’/’1234’.” Cool*.

via Janetter for Mac

Marx looked at smart home starter kits and found all sorts of basic problems: old/bad ciphers, unpatched OS, the usual mistakes.

via Janetter for Mac

Now on, Andreas Marx from AV-TEST, “The Internet of Things – Or – Security: The Forgotten Featuavar

via Janetter for Mac

More tweeting from the Association of anti-Virus Asia Researchers (AVAR) conference now. etouches.com/ehome/avar2014… Mute to avoid.

via Janetter for Mac

No, @RealNickHodge, it is not Lionel “Buster” Crabb in the Brisbane River. That’s hands-down certain. en.wikipedia.org/wiki/Lionel_Cr…

via Janetter for Mac

SUSPICIOUS BUBBLING PEOPLE THERE IS SUSPICIOUS BUBBLING THERE ARE BUBBLES IN A RIVER MAKE THEM STOP. couriermail.com.au/news/queenslan…

via Janetter for Mac

The appropriate government agencies need to look at the security of government sites in those and other nations.

via Janetter for Mac

One in three of the infected websites in Bangladesh belong to the government.

via Janetter for Mac

Australia does well, but Bangladesh and China have real problems.

via Janetter for Mac

Gryaznov is now running through the fine details of his methodology. It’s in the paper so I won’t repeat it.

via Janetter for Mac

thegrugq A signal (the V) in Moscow to a CIA case officer that an operational task has been done. pic.twitter.com/uTN0dZW0Xw

via Tweetbot for iΟS (retweeted on 12:48 PM, Nov 14th, 2014 via Janetter for Mac)

CosmicRami google just launched new product at with LIVE data from the global fishing..instagram.com/p/vXLlOlSbMq/3b

via Instagram (retweeted on 12:47 PM, Nov 14th, 2014 via Janetter for Mac)

And also for other patterns, such as state-level in US etc. [I am now tweeting too much fine detail. Will zoom out now.]

via Janetter for Mac

Gryaznov’s research was into sites of the form whatever.gov.CC [AU for Australia], or gob.CC in Spanish, etc.

via Janetter for Mac

“One would expect government sites to be well protected and safe, but are they really?” Compared with other sectors?

via Janetter for Mac

We’re not just talking about national government sites, but regional and local too, and they can be easier targets.

via Janetter for Mac

“You usually won’t get infected, unless it’s government-approved, and that is better than most other stuff.” Cynical laughter.

via Janetter for Mac

Government sites are therefore “good” for criminals to compromised, because most people trust them.

via Janetter for Mac

Background: WWW continues to be the main infection vector. Infection via trusted sites which have been compromised is more effective.

via Janetter for Mac

Gryaznov’s research started when he was at McAfee, and they let him continue to work on the data at Microsoft.

via Janetter for Mac

Next up is Microsoft’s Dmitry Gryaznov with “Infected.gov”, an analysis of various nations’ government sites serving malware

via Janetter for Mac

saladinahmed Wonder Woman has this shit figured out. ht @rabihalameddine pic.twitter.com/TVEk9sTVAG

via Twitter for iPad (retweeted on 12:36 PM, Nov 14th, 2014 via Janetter for Mac)

That’s it for Roman Unuchek’s run-through of Android banking trojans.

via Janetter for Mac

@FraknToastr The message is that 2FA via your phone is still vulnerable if your phone gets infected. So it’s about keeping your phone clean.

via Janetter for Mac in reply to FraknToastr

@FraknToastr That’s bad advice. Banking with 2FA is still better than banking without it.

via Janetter for Mac in reply to FraknToastr

Key lesson here: “SMS banking” is not a thing you want to activate, ‘cos it looks straightforward to compromise.

via Janetter for Mac

“Now let’s see how we steal money with these commands.” Yes, please show us.

via Janetter for Mac

The lesson I’m getting from this is that one one of these Android banking trojans is on your phone, it’ll monetise all sorts of ways.

via Janetter for Mac

“The management control panel [in the screenshot] is in Russian. Every control panel I have seen in these botnets is in Russian.”

via Janetter for Mac

Six minutes into his presentation, Unuchek has now got us inside the botnets and we’re generating fake 2FA tokens for AU banks.

via Janetter for Mac

And just three minutes in, Unuchek has already taken us down into the code architecture of these botnet, then how to “monitor” them.

via Janetter for Mac

Next up, Roman Unuchek from Kaspersky Lab, “Inside Android banking botnets”. Well, anti-banking, really.

via Janetter for Mac

Setting up the hosting and logistics takes a little clue, but after that “any idiot can use Hesperbot.” Thanks, Yurii. Ends

via Janetter for Mac

“We are working together with law enforcement in different countries.” Yes, an ongoing criminal investigation.

via Janetter for Mac

Laughing at the photo of the alleged perpetrator [REDACTED] and the huge pile of cocaine on his mirror at [REDACTED].

via Janetter for Mac

RT @AbstractCode: I am totally fine with criminals using MongoDB. Because some data should be lost. [Ouch! ]

via Janetter for Mac in reply to AbstractCode

Terrorists use software too, you know.

via Janetter for Mac

Ah, data was stored in MongoDB. [See? Criminals use software like MongoDB. We must ban it. Ban all software.]

via Janetter for Mac

Command and control servers were in Ukraine and Kazakhstan.

via Janetter for Mac

Yurii Khvyl: “This is a very big project, and very well done.”

via Janetter for Mac

Cool, the mobile component intercepts the SMS for two-factor authentication.

via Janetter for Mac

Customers of all Big 4 Australian banks have been with with Hesper, plus several others. Looks like ~100-200 hundred customers each?

via Janetter for Mac

The Danes haven’t thrown the media out. They’ve just flagged what we can’t report because it’s (presumably) sub judice.

via Janetter for Mac

Next up, Peter Kruse & Yurii Khvyl of CSIS will talk us through the HesperBOT.

via Janetter for Mac

Categories of people.

via Janetter for Mac

Has Crusader Rabbit got his earpiece in properly today? Is it tuned to the right channel?

via Janetter for Mac

@semibogan One can never have too many Nigerian princes. Wait, what?

via Janetter for Mac in reply to semibogan

Patrickavenell Those Russian warships can’t come quick enough…

RT @Nickelback: AUSTRALIA! Our new album is out & the tour is heading your way in 2015

via TweetDeck (retweeted on 11:10 AM, Nov 14th, 2014 via Janetter for Mac)

@semibogan Yeah that was mentioned. Life must be one endless cyberspamdystopia.

via Janetter for Mac in reply to semibogan

joshxhowie Was late to my first Fight Club last night so missed the intro rules. Still, Fight Club was brilliant and I’d highly recommend Fight Club.

via Twitter for iPhone (retweeted on 10:45 AM, Nov 14th, 2014 via Janetter for Mac)

And there ends Lion Gu’s presentation.

via Janetter for Mac

These tools are all for GSM mobiles. 3G/4G networks have mechanisms to help stop fake base stations getting phones to connect.

via Janetter for Mac

Markets are very active, more sellers than buyers, most active 1900-2200, and lots of cheaters, all use Tencent QQ for messaging.

via Janetter for Mac

There’s lots of price figures in the published paper, could feed into an economic analysis of the Chinese mobile spam industry.

via Janetter for Mac

@BarbaraBerkery No, aim is to identify numbers to be fed into iMessage-spamming automation. If they don’t have iMessage you don’t want them.

via Janetter for Mac in reply to BarbaraBerkery

SMS spammer, a box with 16 GSM modems, to churn out SMS spam, costs RMB 2000.

via Janetter for Mac

SMS server or “fake base station” the size of a PC, range 2km or so, costs RMB 45,000 (about USD 7400).

via Janetter for Mac

Current black market cost of spamming iPhone users. instagram.com/p/vW67HjiFvp/

via Instagram

How to identify iPhone users: Try to send a message to iMessage. Response code will tell you if that number is known to iMessage. Heh.

via Janetter for Mac

Source code for SMS Forwarder malware costs RMB 3000 (USD 492).

via Janetter for Mac

Apps have the goals to attack privacy (e.e. forwarding SMS) and/or unapproved charges to premium service numbers.

via Janetter for Mac

The three attack vectors onto mobiles are apps, messages, calls.

via Janetter for Mac

In China, there’s more mobile phones accessing the internet that either desktop or laptop computers.

via Janetter for Mac

Gu’s job includes monitoring the underground markets for “dirty” tools and services.

via Janetter for Mac

Next up, Trend Micro’s Lion Gu, “Mobile Underground Activities in China”

via Janetter for Mac

Keep our anti-malware ecosystem effective. instagram.com/p/vW5IEOiFiR/

via Instagram

Patching makes a huge difference. AV vendors have an opportunity here. instagram.com/p/vW4-B_CFhE/

via Instagram

Now he’s plugging the Coordinated Malware Eradication (CME) process.

via Janetter for Mac

Batchelder is whinging about the presentation laptop not having a touchscreen. “How do you work these old computers?”

via Janetter for Mac

Batchelder plugs the Clean Software Alliance (CSA). It seems to be working so far, he says.

via Janetter for Mac

RT @reillystyley: So, I’m late here. But I just downloaded my first podcast :D [I shall send you a telegram of congratulations.]

via Janetter for Mac in reply to reillystyley

Some industry practices hurt our customers: AV looking like unwanted software, or AVs fighting each other. “I’m looking at China.”

via Janetter for Mac

Batchelder says we’re gradually getting on top of broad-spectrum malware, “but Android is a whole ‘nuther story.”

via Janetter for Mac

Those figures were reported quarterly, but I’m not sure if that was millions per quarter or annualised.

via Janetter for Mac

The number of Microsoft’s customers encountering malware has declined from 35 million in 2012 to 27 million. Roughly 1/3 get infected.

via Janetter for Mac

But, the top 20 malware families are now fighting over a declining share. The tail is not as steep. Malware startup costs are up.

via Janetter for Mac

There’s better industry information-sharing now, but the increased volume of malware families increases all the workloads.

via Janetter for Mac

“At first glance, it looks like we’re losing,” Batchelder says.

via Janetter for Mac

In 2012 Microsoft proposed: “Imagine a world where malware paid as poorly as pickpocketing,” a handful of malware families survived.

via Janetter for Mac

Windows Malicious Software Removal Tool is now 10 years hold. Ahhh.

via Janetter for Mac

First up is Microsoft’s Dennis Batchelder, “Our global antimalware ecosystem: Threats and opportunities”

via Janetter for Mac

Today I’m tweeting from the Association of anti-Virus Asia Researchers (AVAR) conference again. etouches.com/ehome/avar2014… Mute to avoid.

via Janetter for Mac

leslienassar Breakfast TV’s analysis is exactly as insightful as you’d expect.

via Twitter Web Client (retweeted on 9:20 AM, Nov 14th, 2014 via Plume for Android)

Why is Adam Sandler even a thing?

via Plume for Android

kilgore_cliff@DrScienceCat: Cats come in both liquid and solid form pic.twitter.com/UO1tT5XnZf@mr45144

via Twitter for iPad (retweeted on 9:05 AM, Nov 14th, 2014 via Plume for Android)

jdub “IoT” as a technology category is such a bogus idea. Inmates running the asylum, etc.

via TweetDeck (retweeted on 9:04 AM, Nov 14th, 2014 via Plume for Android)

@scott_thewspot @Steve_Dalby @bengrubb @joshgnosis Everyone interprets the law to suit their needs, unless they’re a fool.

via Plume for Android in reply to scott_thewspot

Nasty chemtrail over eastern Sydney right now. instagram.com/p/vWwfxTiFkE/

via Instagram

SwiftOnSecurity We should replace school buses with Uber.

via Twitter for iPhone (retweeted on 8:35 AM, Nov 14th, 2014 via Tweetbot for iΟS)

@joshgnosis @bengrubb @Steve_Dalby I am so glad I don’t have to spend time going down that rabbit hole.

via Tweetbot for iΟS in reply to joshgnosis

I always feel a secret little thrill when I get retweeted by @martindistasio

via Tweetbot for iΟS

Yesterday @gcluley made us all sing “The AntiVirus Industry Song”, and here’s a short video by @juhasaarinen et moi. youtube.com/watch?v=75amj-…

via Tweetbot for iΟS

@SnarkyPlatypus Malheureusement, Trains de Sydney n’a pas fourni une taverne d’amphétamines n ce voyage aujourd’hui.

via Tweetbot for iΟS in reply to SnarkyPlatypus

cathywilcox1 There aren’t enough women heading up major terrorist organisations.

via Twitter for iPhone (retweeted on 8:13 AM, Nov 14th, 2014 via Tweetbot for iΟS)

@SnarkyPlatypus Bonjour. Je suis en train de fatigue sans fin. Et vous?

via Janetter for Mac in reply to SnarkyPlatypus

RT @cathywilcox1: Tony takes his place on the world stage. pic.twitter.com/K2DKNYNtre [Oh Cathy…]

via Janetter for Mac in reply to cathywilcox1

“How a shirtfront became an own goal”, writes Barrie Cassidy. abc.net.au/news/2014-11-1…

via Janetter for Mac

RT @joshgnosis: Something that Turnbull actually confirmed a couple of weeks ago. zdnet.com/au/film-studio… [Oh dear, @bengrubb. Thwap!]

via Janetter for Mac in reply to joshgnosis

“Game of Thrones pirates can be prosecuted: why Turnbull and Brandis are wrong on data retention”, writes @bengrubb smh.com.au/digital-life/d…

via Janetter for Mac

“The Unavoidable Acceleration of Everything. What next for wearables and IoE?” writes @rik_ferguson blog.trendmicro.com/unavoidable-ac…

via Janetter for Mac

RT @joshgnosis: Alcatel-Lucent CEO says NBN’s multi-technology mix will be followed by other countries. zdnet.com/au/nbn-to-be-a… [3… 2… 1…]

via Janetter for Mac in reply to joshgnosis

@Security_FAQs @rik_ferguson I’m sure I don’t know what you’re talking about! Or I don’t remember. Somebody bring me my blanket.

via Janetter for Mac in reply to Security_FAQs

@Security_FAQs @rik_ferguson I think you’re only truly old if you then don’t remember that time any more.

via Janetter for Mac in reply to Security_FAQs

Fri plan: 0706 train to Sydney; AVAR conference, day 2 etouches.com/ehome/avar2014…; write for @zdnetaustralia; @5at5daily; TGIF; return train.

via Janetter for Mac

Bright spring morning. It’s already over 20C. instagram.com/p/vWjbNZiFgD/

via Instagram

I think @rik_ferguson should be ashamed of himself, @Security_FAQs. There’s not a single “cyber” in that post. It’s obscene.

via Janetter for Mac

Security_FAQs @rik_ferguson Savour the uniqueness while you can… pic.twitter.com/jNJdhP4NON

via TweetDeck (retweeted on 6:42 AM, Nov 14th, 2014 via Janetter for Mac)

@QuixoticGuy @CNN This does feel like the most assertive strategic prodding in quite some time.

via Janetter for Mac in reply to QuixoticGuy

@QuixoticGuy @CNN For those of us old enough to remember more of the Cold War, we’re a fair was off yet. But that said…

via Janetter for Mac in reply to QuixoticGuy

RT @ChipRolley: Not Kim Kardashian? MT @Independent: Angelina Jolie named the famous person most influential to politics [Kim wuz robbed.]

via Janetter for Mac in reply to ChipRolley

“How do you deradicalise returning Isis fighters?” writes @jonhenley on Denmark’s approach. theguardian.com/world/2014/nov…

via Janetter for Mac

BadAlbumCovers Recap.
Stuff the aerobics Lionel, let’s play charades. pic.twitter.com/ifpB2uqs6k

via Twitter for Android Tablets (retweeted on 6:30 AM, Nov 14th, 2014 via Janetter for Mac)

fanfiction_txt The scenario paralleled to a greater time in the golden 1930’s, when Richard Nixon stormed the GamerGate hotel in the pursuit of free porn,

via Twitter Web Client (retweeted on 6:02 AM, Nov 14th, 2014 via Janetter for Mac)

“Russia plans long-range bomber flights near US shores”, reports @CNN edition.cnn.com/2014/11/13/wor…

via Janetter for Mac

@marcuskelson I’m not sure whether to say “Lucky you” or not.

via Janetter for Mac in reply to marcuskelson

@marcuskelson It feels like it. I got back around 0130. Alarm set for 0500. Sydney’s hotels are thoroughly booked out this week.

via Janetter for Mac in reply to marcuskelson

@QuixoticGuy Yeah, there’ll be wine o’clock in there, I’m just not sure where yet.

via Janetter for Mac in reply to QuixoticGuy

@QuixoticGuy Nah, I think the stewards need to call for the screens for that one.

via Janetter for Mac in reply to QuixoticGuy

Me, on phone: “Morning, a cab at 6.45 please.” Taxi booker: “Mate, you need to get more sleep.” Me: “You’re telling me.” Ah, village life…

via Janetter for Mac

Fri plan, draft: 0706 train to Sydney; AVAR conference, day 2 etouches.com/ehome/avar2014…; write for @zdnetaustralia; @5at5daily; return train.

via Janetter for Mac

Well this is most unpleasant.

via Janetter for Mac

Friday. Hurdle. Curdle. Cucumber. Murder, girder, and number. More numb, that is. Everything will be numb. Friday.

via Janetter for Mac

And now to attempt 3.5 hours of sleep.

via Tweetbot for iΟS

Ten minutes until the train arrives at my destination.

via Plume for Android

@martindistasio This is the frightful inevitability of it all.

via Plume for Android in reply to martindistasio