meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, June 3rd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 June 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. #Docker Logging; Uninstall #Lenovo Accellerator; #Android AV Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, June 3, 2016 edition of the Sandsenet Storms and a stormcast. My name is Johannes Ulrich and I am recording from Jacksonville, Florida.

0:12.6

It wasn't long ago that we had a nice diary about forensics in a Docker environment. If you're not familiar with Docker, it's a system that

0:23.9

allows you to isolate processes on Unix machines, essentially sort of halfway between a

0:30.8

change route environment and a virtual machine. But well, when it comes to forensics,

0:37.1

memory forensics and the like is nice to have,

0:40.4

but you're probably going to start by looking at your system logs. And Xavier has a nice blog

0:47.5

post today about how to configure system logs in Docker so you actually can collect them centrally. He's talking here about

0:56.5

Splunk and tools like that. So if you're thinking about implementing Docker already have done,

1:01.7

so take a look at this brief diary. Earlier this week, I talked about how many of the

1:08.3

pre-installed applications that you find on your computers are insecure in

1:13.0

particular when it comes to insecure updates. Well, Lenovo now is taking the consequences

1:20.4

from this report and suggesting that users uninstall the Lenovo accelerator application.

1:28.3

The purpose of this application is to speed up the startup of

1:33.3

Lenovo's own applications, so really not all that important in the first place,

1:39.3

and given that it does suffer from an insecure update, you're probably best of following

1:46.2

Lenovo's advice and uninstalling it.

1:49.7

And Google released another update for Chrome about a week after they leased the last one.

1:56.1

Now this new update fixes a total of seven vulnerabilities, two of which are rated high-end both are

2:03.6

cross-origin bypass vulnerabilities.

2:07.6

And just because you're using a newfangled no-seql database like MongoDB doesn't mean that

2:14.6

you're all for a sudden safe from injection attacks.

2:19.4

These databases suffer from exactly the same attacks as all other databases if you are

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.