SlideShare une entreprise Scribd logo
1  sur  94
Wait, wait!
Don’t pwn me!
June 2014 Security News Headlines Q&A game
Mark Miller Chris Eng
Joshua Corman Matt Tesauro
ONLINE NEWS RESOURCES
Hacker News
CSO
CNN
ars technica
The Verge
Threat Post
NetworkWorld
SANS
Brian Krebs
Pandodaily
Forbes
Tesla
FBI.gov
Star Tribune
Errata Security
THE RULES
Each correct answer to the initial question is worth 3 points
A wrong answer subtracts 2 points
A pass on the question loses 1 point
If a question is answered incorrectly, the second response is worth 1 point
A correct answer from an audience member gets allocated 2 points to panelist of choice
The moderator may arbitrarily give
or take away points at any time
SCORE KEEPER: WE NEED A VOLUNTEER!
AUDIENCE PARTICIPATION:
WARM UP
Name 2 out of 7 podcast series dedicated to
security.
What popular software security company came
out with a campaign to “Put a Monster in your
Corner”?
What popular software security company came
out with a campaign to “Put a Monster in your
Corner”?
What movie is reportedly getting rebooted
by 'Iron Man 3' director Shane Black?
What movie is reportedly getting rebooted
by 'Iron Man 3' director Shane Black?
FOR THE PANEL:
HACKS IN THE NEWS
How were two 9th graders able to gain full
system credentials on their local ATM?
How were two 9th graders able to gain full
system credentials on their local ATM?
Name 2 of 5 hardware companies that had
confirmed XSS vulnerabilities within the
past month.
Name 2 of 5 hardware companies that had
confirmed XSS vulnerabilities within the
past month.
The largest DDoS attack in history hit what
site in Hong Kong last week?
The largest DDoS attack in history hit what
site in Hong Kong last week?
A flaw has been discovered in the
motherboards manufactured by the server
manufacturer Supermicro. What was the
flaw?
A flaw has been discovered in the
motherboards manufactured by the server
manufacturer Supermicro. What was the
flaw?
Columbia University researchers developed
a tool they called PlayDrone that indexed
and analyzed what?
Columbia University researchers developed
a tool they called PlayDrone that indexed
and analyzed what?
FOR EXPERTS ONLY
Millions of LinkedIn users were at risk with
what common attack method two weeks
ago?
Millions of LinkedIn users were at risk with
what common attack method two weeks
ago?
A recently discovered trojan app encrypts
files on what type of devices and asks for
ransom?
A recently discovered trojan app encrypts
files on what type of devices and asks for
ransom?
A new, powerful banking malware called
Dyreza has emerged. What type of attack
does it use?
A new, powerful banking malware called
Dyreza has emerged. What type of attack
does it use?
Zeus has a new competitor when it comes
to banking malware. Who is it?
Zeus has a new competitor when it comes
to banking malware. Who is it?
A loophole in what company’s payment
system allows anyone to double their
money endlessly?
A loophole in what company’s payment
system allows anyone to double their
money endlessly?
AUDIENCE PARTICIPATION:
IN THE NEWS
Elon Musk did something unheard of in
modern business. What was it?
Elon Musk did something unheard of in
modern business. What was it?
Who was found not guilty in the phone
hacking trial in the News of the World case?
Who was found not guilty in the phone
hacking trial in the News of the World case?
4 of the FBI’s top 10 cybercriminals are from
which country?
4 of the FBI’s top 10 cybercriminals are from
which country?
REALLY? THAT’S UNBELIEVABLE!
A new phishing campaign says it has a tool
to remove what vulnerability from your
desktop computer?
A new phishing campaign says it has a tool
to remove what vulnerability from your
desktop computer?
Why did Germany recently drop
prosecution of the NSA?
Why did Germany recently drop
prosecution of the NSA?
According to researcher Robert Graham, of
600K servers scanned, how many are still
vulnerable to HeartBleed?
According to researcher Robert Graham, of
600K servers scanned, how many are still
vulnerable to HeartBleed?
THE BUSINESS SIDE
What restaurant chain has had a credit card
breach since Sept 2013?
What restaurant chain has had a credit card
breach since Sept 2013?
What is E. Snowden’s former employer
developing to help the government track
you?
What is E. Snowden’s former employer
developing to help the government track
you?
What company was recently put out of
business after a major hack of their AWS
account?
What company was recently put out of
business after a major hack of their AWS
account?
On June 11, Target shareholders decided to
do what with 7 of 10 board members?
On June 11, Target shareholders decided to
do what with 7 of 10 board members?
In baffling move, TrueCrypt open-source
crypto project decided to what?
In baffling move, TrueCrypt open-source
crypto project decided to what?
Researchers found large global botnet of
infected systems. What type of systems
were they?
Researchers found large global botnet of
infected systems. What type of systems
were they?
What accounts for 98 percent of worldwide
Google Play revenue?
What accounts for 98 percent of worldwide
Google Play revenue?
EVERYONE:
FINAL ROUND: LIGHTNING ROUND
Feedly and Evernote went down from DDoS
attacks. What did the attackers want?
Feedly and Evernote went down from DDoS
attacks. What did the attackers want?
Name 2 of 5 companies that were held for
ransom recently, with the attackers
demanding to be paid in BitCoin.
Name 2 of 5 companies that were held for
ransom recently, with the attackers
demanding to be paid in BitCoin.
Vimeo, Mailchimp, Shutterstock, Feedly, Evernote
Robert Scoble called it “the stupidest, most
addictive app I’ve ever seen in my life.”
Robert Scoble called it “the stupidest, most
addictive app I’ve ever seen in my life.”
What is the most pirated show in history?
What is the most pirated show in history?
“Red Button Flaw” exposes major
vulnerability in millions of what?
“Red Button Flaw” exposes major
vulnerability in millions of what?
According to Network World, what is the
next “circle of hell” for the security
community?
According to Network World, what is the
next “circle of hell” for the security
community?
Within 10%, what percentage of security
attacks are the result of human error?
Within 10%, what percentage of security
attacks are the result of human error?
According to the NSA, how loud was
Edward Snowden’s whistle?
According to the NSA, how loud was
Edward Snowden’s whistle?
What European country is used as the NSA’s
largest listening post?
What European country is used as the NSA’s
largest listening post?
Why were 5 security apps recently booted
from Google Play and Amazon?
Why were 5 security apps recently booted
from Google Play and Amazon?
Google shuts down malicious 'Google Play
Stoy' app. What did the app do?
Google shuts down malicious 'Google Play
Stoy' app. What did the app do?
A Chinese company making smartphones
ships the phones with what specialized
software pre-installed?
A Chinese company making smartphones
ships the phones with what specialized
software pre-installed?
What is the WiFi password for the Brasil
World Cup Security Center?
What is the WiFi password for the Brasil
World Cup Security Center?
What is the WiFi password for the Brasil
World Cup Security Center?
TALLY THE SCORE: WHO WON?
Mark Miller Chris Eng
Joshua Corman Matt Tesauro
Wait, wait!
Don’t pwn me!
June 2014 Security News Headlines Q&A game

Contenu connexe

Similaire à "Wait, Wait! Don't pwn Me!"- AppSec Europe 2014

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
 
KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
PECB
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
 

Similaire à "Wait, Wait! Don't pwn Me!"- AppSec Europe 2014 (20)

Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 
Network security
Network securityNetwork security
Network security
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
File000145
File000145File000145
File000145
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
12 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 201612 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 2016
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 

Plus de Sonatype

The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
Sonatype
 

Plus de Sonatype (20)

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all Equifax
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the Enterprise
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & Microservices
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen Beal
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way Forward
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward Ruiz
 
What's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris SwanWhat's My Security Policy Doing to My Help Desk w/ Chris Swan
What's My Security Policy Doing to My Help Desk w/ Chris Swan
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin Collins
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with Jenkins
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure Automation
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

"Wait, Wait! Don't pwn Me!"- AppSec Europe 2014

Notes de l'éditeur

  1. Full Disclosure http://seclists.org/fulldisclosure/2014/Jun/index.html http://www.koreaittimes.com/story/37751/household-name-lg-scores-poorly-defending-against-xss-attacks