Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
fishmech
Jul 16, 2006

by VideoGames
Salad Prong

Potato Salad posted:

Well, so was the outrage about the fact that it's difficult to set up a Google authenticator, or that it's easy for someone to accidentally install the wrong app?

Wiggly Wayne DDS is who I'm addressing w.r.t Microsoft texting you a link to the proper app. I'm inclined to agree that making it difficult to add Google auth is dumb.

so you go to add second factor authentication to your microsoft account on microsoft's site. it asks you: do you use android, ios, windows phone, or another device?

if you say android, it links you the official microsoft app directly on google's play store. if you say ios, it links you their official app in the itunes store. if you say windows phone, it links the official app in the microsoft store.



only if you say, "i have another device" does it say "idk look for an app on whatever weird store you have, here's the same standard QR code + enter your app's generated code thing you use for other apps". because they're, again, not going to go around vetting whatever weird app is available on the store for an old blackberry curve or some offbrand tizen phone or whatever.

this is precisely why wiggly wayne's post was so stupid: he showed searching the microsoft store for mobile apps, when in fact if you had a windows phone microsoft already told you, use https://www.microsoft.com/en-us/store/p/authenticator/9wzdncrfj3rj?rtc=1


Wiggly Wayne DDS posted:

yeah i was pointing out the obvious for when you literally search authenticator and go with the list of results, but that's the windows store experience really

which again, it never tells you to search the windows store in the first place soooooooooooooo

Adbot
ADBOT LOVES YOU

spankmeister
Jun 15, 2008






shut up shut up shut up

Wiggly Wayne DDS
Sep 11, 2010



a credible person steps forward:

https://twitter.com/aionescu/status/974028647307849730

Salt Fish
Sep 11, 2003

Cybernetic Crumb
What sick name did they give this vulnerability? I propose H.Y.P.E.R Venom but someone think of a good acronym for hyper.

titaniumone
Jun 10, 2001

cansecwest got some good talks so far

rip faith in TPM

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Salt Fish posted:

What sick name did they give this vulnerability? I propose H.Y.P.E.R Venom but someone think of a good acronym for hyper.
there's a few of them https://twitter.com/cynicalsecurity/status/973596410896683008

incoherent
Apr 24, 2004

01010100011010000111001
00110100101101100011011
000110010101110010

infosec aziz ansari moment

BattleMaster
Aug 14, 2000

I'm RYZENFALL

Lutha Mahtin
Oct 10, 2010

Your brokebrain sin is absolved...go and shitpost no more!

titaniumone posted:


rip faith in TPM

really? :(

Salt Fish
Sep 11, 2003

Cybernetic Crumb

BattleMaster posted:

I'm RYZENFALL

The #AMDflaws II: Ryzenfall

Wheany
Mar 17, 2006

Spinyahahahahahahahahahahahaha!

Doctor Rope
i propose SPACE LASER SKULL

Pile Of Garbage
May 28, 2007



dumb nerds are just using words they saw in video games and lazy portmanteaus

Tankakern
Jul 25, 2007


nice, you wrote "smörgåsbord" :D

if you only have a few linux boxes spread around running systemd-journald and nothing else, what's the best log aggregator?

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

This your speech? Nice, going to watch the rest later. We've been logging with ELK/Logstash.

spankmeister
Jun 15, 2008






Not mine, Lain's

Max Facetime
Apr 18, 2009

fishmech posted:

this is precisely why wiggly wayne's post was so stupid: he showed searching the microsoft store for mobile apps, when in fact if you had a windows phone microsoft already told you, use https://www.microsoft.com/en-us/store/p/authenticator/9wzdncrfj3rj?rtc=1

this is also why the idea that Microsoft shouldn’t tell users with weird devices to “search for ‘authenticator’ in your App Store” is so stupid: if that step weren’t included then even security conscious people will start searching the wrong store or even the open internet for their authenticator... as has been so amply demonstrated in this thread

Bulgogi Hoagie
Jun 1, 2012

We
it’s 2018 there should really be an authenticator app bundled with every mobile OS

titaniumone
Jun 10, 2001


physical security of tpm appears to have truly been an afterthought and MITMing many tpms is nearly trivial. the spec makes many things optional that should have been mandatory so there are quite a few mistakes.

McGlockenshire
Dec 16, 2005

GOLLOCKS!
US says Russia hacked energy grid, punishes 19 for meddling

quote:

That alert, published online by Homeland Security, said the hacking effort was a “multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks” to gain access and plant malware, which was then used to monitor activity as well as to move laterally into other, larger industrial control systems.

It also said the hackers exploited open-source material from companies’ public websites to mine seemingly innocuous information that was later used to infiltrate networks. In one case, the alert said, hackers downloaded a small image from a company’s human resources page that when blown up was actually “a high-resolution photo that displayed control systems equipment models and status information in the background.”

Hexyflexy
Sep 2, 2011

asymptotically approaching one

McGlockenshire posted:

In one case, the alert said, hackers downloaded a small image from a company’s human resources page that when blown up was actually “a high-resolution photo that displayed control systems equipment models and status information in the background.”

Haha, the good old 10 meg jpeg displayed at 100 by 100 pixels.

Pile Of Garbage
May 28, 2007



the MO of anyone allowed to post content to a sharepoint site really. also uploading images that don't have a 1:1 aspect ratio and then get squished all up and poo poo/

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
https://twitter.com/trailofbits/status/974345028498804737

Kazinsal
Dec 13, 2011

this is literally the technical bits from that "whitepaper" without any of the obvious marketing or financial gunk. nothing new.

I'm honestly impressed at how elaborate this stock scam is

Coxswain Balls
Jun 4, 2001


Audio keeps cutting out. :(

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

Kazinsal posted:

this is literally the technical bits from that "whitepaper" without any of the obvious marketing or financial gunk. nothing new.

Isn't that what a technical summary is? Take out the cruft and fluff and just leave technical information.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Kazinsal posted:

this is literally the technical bits from that "whitepaper" without any of the obvious marketing or financial gunk. nothing new.

I'm honestly impressed at how elaborate this stock scam is
i like how

their takeaway was that people were worried about about the "disclosure issues" and not the whole rest of it

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

cheese-cube posted:

pretty sure we have one resident schannel pro, i shamefully cannot remember but they posted nice cipher suite lists plus recommended ECC curve combos, was very handy
reposting that post because i can never find it when i'm looking for it

BangersInMyKnickers posted:

Crypto Config Boogaloo 2017 Edition

Server 2016:
code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Windows 10 (all builds):
code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2016/Win10 Curve order:
code:
nistP521
nistP384
nistP256
brainpoolP512r1
brainpoolP384r1
brainpoolP256r1
curve25519
2012R2:
code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win8.1:
code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2012:
code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win8:
code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2008R2:
code:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win7:
code:
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2008:
code:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Vista:
code:
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
OpenSSL 1.0.x-1.1.x
code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA

BangersInMyKnickers posted:

I'm dropping DSA/DSS ciphers from servers because TLS1.3 goes RSA-only and your CA probably isn't issuing DSA certs anyway. Still on for clients for compatibility reasons.

The channel config for Win8/8.1 dropped the P521 curves. There's a character limit you bump in to for the group policy object and I am trying to work around that. Win10 split the curve definitions out in to its own policy so you don't have the same limit issues. P521 seems to be falling out of favor for whatever reason though I still prefer it in most situations.

The Win8.1 and 2012R2 config should work on 8 and 2012 respectively without issue, there's just an extra two DHE_RSA suites included that will be ignored. But you can mange independent GPOs for each if you want.

3DES is pretty much only needed for XP/2003/IE compatibility. Feel free to drop it if you think those clients should gently caress off.

anthonypants fucked around with this message at 21:45 on Mar 15, 2018

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Good news, I am revising our AD policies this spring that will probably correspond with the spring creators update so I'll update accordingly.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

BangersInMyKnickers posted:

Good news, I am revising our AD policies this spring that will probably correspond with the spring creators update so I'll update accordingly.
:toot:

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

DH implementations aren't looking so hot these days so I'd probably drop them entirely for ECDH, there are very few clients that support DH that don't also support ECDH and if its legacy RSA is still an ok fallback. We'll see what's going on with curve availability, hopefully MS starts adding some additional modern curves instead of just x25519

Proteus Jones
Feb 28, 2013



https://www.nytimes.com/2018/03/15/us/politics/russia-cyberattacks.html

quote:

The Trump administration accused Russia on Thursday of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

United States officials and private security firms saw the attacks as a signal by Moscow that it could sabotage the West’s critical facilities in the event of a conflict.

:cripes:

spankmeister
Jun 15, 2008







they're right though

Proteus Jones
Feb 28, 2013



spankmeister posted:

they're right though

Not saying they aren't. it's just how many times does the energy sector need to warned and/or compromised before they start taking this poo poo seriously. I can remember these conversations over a decade ago.

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug
some sectors see availability as more important than security, which makes sense when you think of lost of big business security consulting/systems/products that just neglect availability (one of the CIA services) when not purposely shithousing it

Wiggly Wayne DDS
Sep 11, 2010



quote:

U.S. national security officials said the FBI, Department of Homeland Security and intelligence agencies had determined that Russian intelligence and others were behind a broad range of cyberattacks beginning a year ago that have infiltrated the energy, nuclear, commercial, water, aviation and manufacturing sectors.
good read thanks

Wiggly Wayne DDS fucked around with this message at 23:19 on Mar 15, 2018

Potato Salad
Oct 23, 2014

nobody cares


Proteus Jones posted:

Not saying they aren't. it's just how many times does the energy sector need to warned and/or compromised before they start taking this poo poo seriously. I can remember these conversations over a decade ago.

And to think nobody's holding 'em to the fire right now over operating Critical Infrastructure outside even basic safeguarding standards

Proteus Jones
Feb 28, 2013



Wiggly Wayne DDS posted:

good read thanks

Well, poo poo. I completely missed his post. Sorry for duping.

Wiggly Wayne DDS
Sep 11, 2010



it's worth reading the original report https://www.us-cert.gov/ncas/alerts/TA18-074A they include bitly links used in the campaign that show lack of compartmentalisation: https://bitly.com/2m0x8IH+ (analytics link, safe to click)

Kuvo
Oct 27, 2008

Blame it on the misfortune of your bark!
Fun Shoe
https://twitter.com/matt_odell/status/974384961603231744

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Adbot
ADBOT LOVES YOU

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Coxswain Balls posted:

Audio keeps cutting out. :(

Yeah. I am sorry. I wish it didn't. I'll be writing the slides into a blog post hopefully soon. I am in the midst of moving so I have some stuff on my plate

  • Locked thread