4.9 • 696 Ratings
🗓️ 7 June 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Tuesday, May 7, 2016 edition of the Sandinand, Storm Center's Stormcast. |
| 0:07.9 | My name is Johannes Ulrich, and the day I'm recording from Baltimore, Maryland. |
| 0:13.1 | The German government, also known as Surd, Bund, is warning that data from the LinkedIn preach that was made public recently is being used |
| 0:25.2 | for successful fishing attacks. Essentially what happens here is that the data is used to personalize |
| 0:32.9 | the emails so you will be addressed with your name and the role in your company. |
| 0:38.3 | Now, I think I have received a couple of emails like that. |
| 0:42.3 | They usually claim to include an invoice, which is then an infected vert document. |
| 0:48.3 | For the most part, I ignored them because they looked, at least to me, obviously fake, |
| 0:53.3 | but they looked a little |
| 0:55.7 | bit better when it came to sort of being more personalized in the way the email appeared. |
| 1:02.9 | The use of social networks in order to personalize phishing emails is certainly nothing new, |
| 1:08.1 | but having bulk data like it is leaked here from LinkedIn, of course, |
| 1:13.6 | makes that process easier. |
| 1:15.6 | In the past, these criminals had to then, for example, spider and screen scrape the site |
| 1:21.6 | or use APIs in such in order to retrieve the data from this site. |
| 1:28.3 | And in addition, this data dump of course may include data that the user didn't make public, |
| 1:35.3 | so a simple screen scraper so wouldn't have access to that particular data. |
| 1:42.3 | And Google released its usual monthly update for Android. |
| 1:48.8 | With this particular update, 40 vulnerabilities are being addressed. |
| 1:54.2 | Now out of these about eight are being considered critical. |
| 2:00.0 | The focus this month really appears to be |
| 2:02.7 | drivers among the critical vulnerabilities. There are four out of six |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.