Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series finale, we tackle vulnerability scans, how sharing information can be a powerful tool against cyber crime, and why itās more important than ever for cybersecurity to have more people, more eyes, and more voices, in the fight.Wietse Venema gives us the story of SATAN, and how it didnāt destroy the world as expected. Maitreyi Sistla tells us how representation helps coders build things that work for everyone. And Mary Chaney shines a light on how hiring for a new generation can prepare us for a bold and brighter future.If you want to read up on some of our research on the InfoSec community, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.Ā Ā
-------- Ā
23:18
Invisible Intruders
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threatācyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion detection. And it all began at a time when people didnāt understand the importance of cybersecurity.Ā This is a story that many in the infosec community have already heard, but the lessons from Stollās journey are still relevant. Katie Hafner gives us the background on this unbelievable story. Richard Bejtlich outlines the āhoney potā that finally cracked open the international case. And Don Cavender discusses the impact of Stollās work, and how it has inspired generations of security professionals.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.Ā Ā
-------- Ā
22:18
Ruthless Ransomers
Itās a strange situation when someone can hold something hostage from halfway around the world. Itās tragic when your own pictures and files are remotely encrypted. But when itās a hospitalās system? Ransomware becomes a problem about life or death.Ā Eddy Willems recounts his involvement in defeating an early ransomware attack that targeted AIDS researchers. At the time, there was a way to discover the encryption key. But as Moti Yung warned, asymmetric encryption would change everything. In the years since, ransomware attacks have become much more popularāthanks in part to the rise of cryptocurrencies. While criminals think itās an anonymous way to collect payment, Sheila Warren tells us that the opposite is actually true.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.Ā
-------- Ā
22:08
Menace in the Middle
All communication leaves the possibility for crossed wires. And as we become more connected, thereās a chance for those with ill intentions to steal our information and meddle in our daily livesāwith devastating results.Ā Smriti Bhatt breaks down the complexity behind machine-in-the-middle attacks. Johannes Ullrich tells us why we shouldnāt always trust that free WiFi. And the āfather of SSLā Taher Elgamal notes that while cryptography can address the increasingly sophisticated nature of malware, there are no safe bets in security.If you want to read up on some of our research on machine in the middle attacks, you can check out all our bonus material over at redhat.com/commandlineheroes.Follow along with the episode transcript.Ā Ā
-------- Ā
22:56
Dawn of the Botnets
Overwhelming numbers are scaryāeven in the best of circumstances. You can plan for them, build up your defenses, and do everything imaginable to prepare. But when that horde of zombies hits, their sheer numbers can still cause devastation.Ā Botnets are digital zombie hordes. Jamie Tomasello recounts the scale of the Bredolab botnetāand the many malicious kinds of missions it carried out. Martijn Grooten explains how botnets work, and why they can be so difficult to permanently dismantle. And Darren Mott shares some of the successes the FBI had in rounding up some of the worldās most prolific bot herders.If you want to read up on some of our research on botnets, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.Ā Ā
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is an award-winning podcast hosted by Saron Yitbarek and produced by Red Hat. Get root access to show notes, transcripts, and other associated content at https://redhat.com/commandlineheroes