CyberCure Podcast

0:00
Podcasting
25
1

Vocal Characteristics

Language

English

Voice Age

Middle Aged (35-54)

Accents

North American (General) North American (US Midwest- Chicago, Great Lakes)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
Hi, everyone. My name is Sean from Cyber Cure. Welcome to the Cyber Cure Bi weekly podcast. This podcast will give you a brief five minute summary of the latest news related to cyber intelligence and proactive cybersecurity. This podcast is aimed at professionals who are short on time or for anyone who would like to know a bit more about what is really happening out there in the cyber world. In this podcast, we will focus on the latest cyber events for non technical people. Anyone can listen and understand cybersecurity and autonomous cars is becoming more and more important. Most of the cars today are connected to networks or are able to communicate in one way or another. Last week it was published that Chinese researchers from keen security labs were able to disclose details of more than 14 different vulnerabilities in BMW cars. The vulnerabilities that were found could ultimately lead to the vehicles being hijacked remotely or having important parts compromised because of the sensitivity of the details. Most of the specifics related to the attacks are left confidential and expected to be released after the successful patching of the cars. BMW has already started to roll out fixes to car owners and is expected to finish the process during 2019. This group of researchers is also responsible for publishing multiple vulnerabilities in Tesla, the electric car company, earlier this year. Keen Security Research is part of Tencent Group, but one still can wonder what would happen if someone with different intentions will be able to exploit these vulnerabilities before they are patched. Healthcare devices are being attacked regularly and unfortunately, don't receive enough attention. Yet security researchers from Mitigate Security firm work together with Phillips to patch vulnerabilities discovered in patient monitoring devices manufactured by Philips. These vulnerabilities allow Attackers to overwrite the device memory, causing denial of service to the monitor itself or the ability to use it as a source to attack other targets We have already seen in past examples of malware that replicates itself on medical devices in order to use the computing power to perform attacks or even to mine crypto currency. Recently, the head of the UK intelligence agency went out to the public to announce that the nation had officially launched a successful offensive campaign against Isis. Jeremy Fleming, director general of the U. K's government communications headquarters, the G C H Q said in 2017 there were times when Isis found it almost impossible to spread their hate online to use their normal channels to spread their rhetoric or trust their publications. When asked if it worked, he answered, I think it did. This campaign shows how targeted and effective offensive cyber can be. So to sum it up, cyber weapons are here and here to stay, they will only become more and more common. Turkey's defense and infrastructure contractors are under cyber attacks. Lately, fake emails pretending to be from the tax collection of the Turkish government have been sent to multiple organizations targeting key people. The email asked the victims to fix problems detected in official tax forms by filing new attached forms. The attached files contained a hidden malware that gained control of the computer when executed. In addition, it also allows remote monitoring of the computers, files, camera audio and capturing screenshots, all from remote. It is unknown at this point who stands behind the targeted attack attacker decided to attack Iranian data centers that host many computers, Iran's I T minister commented on the attack. Several Iranian data centers came under cyber attacks tonight. Some of the smaller routers have been changed to factory settings. The Iranian minister chose to tweet about it and said there was an emergency meeting taking place. Twitter is not available for the general public in Iran, so it's not clear who this message was meant for. The attacker used a known vulnerability of Cisco routers, which were not patched, and as a result, he left a drawing of the American flag with the message warning. Don't mess with our elections. That's it for this podcast. I hope you found the topics covered. Interesting. Stay safe and see you at the next podcast.