Security Now 218

From The Official TWiT Wiki
Jump to: navigation, search
Security Now
Episode 218

Security Now 218: Your Questions, Steve's Answers 77

News & Errata

08:00 - 15:24

  • It was the biggest ever patch Tuesday this month (October 2009) it fixed:
  • The SMB v2 vulnerability
  • Multiple vulnerabilities in the Windows Media Runtime
  • Four critical vulnerabilities in IE
  • The ActiveX Killbits were updated
  • The Active Template Library problem
  • Multiple vulnerabilities in the .NET system
  • Multiple GDI+ vulnerabilities
  • Vulnerabilites in IIS, and its FTP server
  • A vulnerability in their indexing service
  • A Windows kernel elevation service vulnerability
  • The null byte vulnerability in SSL certificates

15:25 - 18:05

  • Adobe Acrobat reader has been updated to fix 29 security vulnerabilities

18:06 - 21:20

  • Comcast has begun alerting its users if they suspect their computers have malware
  • It involves intercepting requests to a website and modifying the reply to display an alert message to the user so is controversial

21:21 - 24:10

  • An Australian ISP, iiNet, has been taken to court by a consortium of movie companies who have sued this ISP for not disconnecting subscribers based on the movie companies' allegation of piracy

24:11 - 26:05

  • Steve will stop saying Mac OS X and will begin pronouncing it as OS 10

26:06 - 29:24

  • Microsoft security essentials replaces your host.ini file

01:18:13 - 01:19:21

  • The podcast awards are back again nominate Security Now at the Podcast Awards

Spinrite Story

29:25-33:30 Andy Kinsey (Haddington, Scotland, UK)

A PC was being used as a till at a salon. It wouldn't boot so a listener was called to look at it, he ran Spinrite for 18 hours and the PC booted once and enabled him to get a copy of the important data off it.

Questions & Answers

Question: [ 01 ]

33:40 - 35:20 Andrew Branagan (Carteret, New Jersey)
Question: If you download the Adobe Reader from their website then you get version 9.0 not the latest version which is 9.2

Answer: It is important to check for updates once you download the program

Question: [ 02 ]

35:21 - 45:45 Patrick McAuley (Guelph, near Toronto, Canada)
Question: If I am at home and connect my computer with a cable or wirelessly using WPA 2 with a strong passphrase to my router am I still vulnerable to the man in the middle attack you discussed last week?

Answer: Yes someone further down the stream from your computer could intercept the page (such as at the ISP) and modify it

Question: [ 03 ]

36:29 - 45:45 Ted Lind (Woodstock, Illinois)
Question: If I am at a Wifi hotspot but use a VPN am I still vulnerable to the man in the middle attack you discussed last week?

Answer: Yes someone further down the stream from your computer could intercept the page (such as at the ISP) and modify it

Question: [ 04 ]

45:46 - 49:30 Jean-Matthieu Bourgeot (Tarare, France)
Question: Could you make public wifi more secure if the DHCP server provided IP addresses on different subnets ?

Answer: Not really as if you had a wifi card in promiscuous mode you could still see the traffic

Question: [ 05 ]

49:31 - 53:20 Jason Learmouth (Sydney, Australia)
Question: Could a site offer a local application written in something like Java to the user that would handle all the security, authentication, and encryption through its own persistent connection without requiring a local install

Answer: Yes and this is a good idea unless there is an exploit in the program

Question: [ 06 ]

53:21 - 55:19 Dale Willer (Kansas City)
Question: Is an ARP spoofing attack a threat on a home network ?

Answer: Its unlikely but possible

Comment: [ 07 ]

55:20 - 57:48 John Clayton (Billings, Montana)
Listener Comment: Astaro has raised the number of IP addresses allowed under the free license to 50

Steve's Comment: Steve will have a look at it

Comment: [ 08 ]

57:49 - 01:02:45 Alan Goldstein (Franklin, Massachusetts)
Listener Comment: Browsers should make it more obvious if you are using SSL to connect to a server

Steve's Comment: All web browsers have options to display alert messages based on certain conditions relating to secure connections many of which are not turned on by default and you need to go and set them manually in the options.

The Broken Browser Model Revisited

01:02:46 - 01:16:45

  • Steve recaps what he discussed last with Alex for Leo
  • Notes on this can be found Security Now 217 there


Go To My PC

  • GoToMyPC-2
  • Ad Time: 0:36-0:51 and 4:56-7:55
  • Go To My PC

Production Information

  • Edited by:
  • Notes:
Info.png This area is for use by TWiT staff only. Please do not add or edit any content within this section.