Threat Wire

Malware on Macs? GnuPG is Flawed & Docker Hub Has a Problem - ThreatWire


Listen Later

Malware on macs? Yeah, it’s a thing. Apple blocks cops from using lightning ports to steal data, spoofed signatures are a problem in GnuPG, and a slew of backdoored images were found on docker hub.. All that coming up now on ThreatWire.
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆Shop → http://www.hakshop.comSubscribe → http://www.youtube.com/hak5RSS Feeds → https://www.hak5.org/subscribeSupport → http://www.patreon.com/threatwireAmazon Associates → https://amzn.to/2pHgf8T
Our Site → http://www.hak5.orgContact Us → http://www.twitter.com/hak5Threat Wire RSS → https://shannonmorse.podbean.com/feed/Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! → http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
For Business Inquiries, please use our contact forms → https://www.hak5.org/contact
Producer: Shannon Morse → https://www.youtube.com/shannonmorseEditor: Colleen CavoloHost: Shannon Morse → https://www.twitter.com/snubsHost: Darren Kitchen → https://www.twitter.com/hak5darrenHost: Mubix → http://www.twitter.com/mubix-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
MAC:https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/https://www.cnet.com/news/cybersecurity-tools-could-have-let-nasty-files-live-on-your-mac/https://threatpost.com/bypass-glitch-allows-malware-to-masquerade-as-legit-apple-files/132758/https://motherboard.vice.com/en_us/article/evkq3m/apple-macos-malware-okta-researchhttps://www.cnet.com/news/apple-iphones-usb-restricted-mode-cuts-off-police-criminal-access/https://www.theverge.com/2018/6/13/17461464/apple-update-graykey-ios-police-hackinghttps://motherboard.vice.com/en_us/article/pavwzv/cops-are-confident-iphone-hackers-have-found-a-workaround-to-apples-new-security-feature
GnuPG Flaw:https://neopg.io/blog/gpg-signature-spoof/https://thehackernews.com/2018/06/gnupg-encryption-signature.htmlhttps://arstechnica.com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/https://neopg.io/blog/enigmail-signature-spoof/https://neopg.io/blog/pass-signature-spoof/
Docker:https://threatpost.com/malicious-docker-containers-earn-crypto-miners-90000/132816/https://arstechnica.com/information-technology/2018/06/backdoored-images-downloaded-5-million-times-finally-removed-from-docker-hub/https://www.bleepingcomputer.com/news/security/17-backdoored-docker-images-removed-from-docker-hub/https://sysdig.com/blog/detecting-cryptojacking/https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-exploited-by-attackers
Photo credit:http://gizmobic.com/wp-content/uploads/2013/08/iPhone-5S-iPhone-5C-06.jpg
...more
View all episodesView all episodes
Download on the App Store

Threat WireBy Shannon Morse