4.9 • 696 Ratings
🗓️ 25 June 2017
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, June 26, 2017 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich, and the I'm recording from Columbia, Maryland. I think I mentioned it in Friday's podcast that we got a number of emails with fake DDoS extortions. Apparently it is very common. I haven't received one |
0:24.6 | personally yet, but we received a number of these emails. They're pretty much spam. For example, |
0:31.0 | some of them appear to be sent to the who is contacts of the respective domains, others just to random addresses. Ignore them. At this point, |
0:41.4 | there is no evidence that any of them resulted in an actual DDoS attack. And given that, |
0:47.5 | it's travel and vacation season. I wrote up some thoughts about traveling with your laptop. Looks like the laptop ban is pretty |
0:57.7 | much off the table. Haven't heard anything about this, so unless you're traveling to very specific |
1:02.4 | countries, you will be able to take your laptop with you in the airplane's cabin. But then again, |
1:09.8 | once you're at your destination, staying at a hotel, |
1:12.6 | you probably aren't going to carry the laptop around with you. So unless you're one of those |
1:19.1 | weird people that can survive without a laptop during your vacation, the diary that I wrote up |
1:25.9 | has some ideas about how to keep your data |
1:29.0 | secure while traveling. |
1:31.3 | Over the last few years, there have been a number of attacks that used what's called |
1:36.3 | a site channel attack in order to remotely extract cryptographic keys. |
1:42.3 | Typically that involves monitoring power consumption or |
1:47.0 | electromagnetic radiation emitted from a PC. Well, typically that does require quite expensive |
1:56.0 | research equipment in order to pick up these signals. Fox IT now managed to do it with essentially |
2:04.5 | relatively cheap software-defined radios, but only over a few inches distance. On the other hand, |
2:12.6 | you could still probably a mountain attack like this by, for example, mounting a sensor at the underside |
2:19.7 | of a desk or something like this, and then extract cryptographic keys from a PC or a laptop |
2:26.5 | being used on the top of the desk. How well an attack like this will work in a real-life |
2:33.4 | environment, of course, is still somewhat |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.