{"id":4013,"date":"2014-08-29T10:00:45","date_gmt":"2014-08-29T14:00:45","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4013"},"modified":"2020-02-26T22:16:58","modified_gmt":"2020-02-26T16:46:58","slug":"august_2014_podcast","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/august_2014_podcast\/4013\/","title":{"rendered":"Kaspersky Daily News Podcast: August 2014"},"content":{"rendered":"<p>In the news this month: the world\u2019s premier security conferences, Black Hat and DEF CON, take center stage to open August; more advanced persistent threats emerge in China and elsewhere; malware is using webmail to communicate; and a bizarre tale surrounding a brief outage on Sony\u2019s PlayStation Network. Threatpost\u2019s Brian Donohue and Chris Brook review these stories and more in this August 2014 edition of the Kaspersky Daily podcast.<\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-4013-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3?_=1\"><\/source><a href=\"https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3\" target=\"_blank\" rel=\"noopener\">https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3<\/a><\/audio>\n<p>\u00a0<\/p>\n<p><em>THE SUPPLEMENTARY READING LIST<\/em><\/p>\n<p>As the Black Hat security conference transitions from a corporate-only affair to a consumer friendly one, you can expect to read more about it here on Kaspersky Daily. For a bit of context, read my thorough <a href=\"https:\/\/www.kaspersky.com\/blog\/black_hat_recap_2014\/\" target=\"_blank\" rel=\"noopener nofollow\">review of the event<\/a>. My editors at Threatpost, Dennis Fisher and Mike Mimoso, and I also recorded podcasts recapping the <a href=\"https:\/\/threatpost.com\/podcast-black-hat-news-wrap\/107667\" target=\"_blank\" rel=\"noopener nofollow\">first<\/a> and <a href=\"https:\/\/threatpost.com\/podcast-black-hat-news-wrap-day-two\/107670\" target=\"_blank\" rel=\"noopener nofollow\">second<\/a> days of Black Hat, which will provide a more in depth look at the event commonly referred to as Security Summer Camp.<\/p>\n<p>A trend seems to be emerging in the months, and now year, that has followed Edward Snowden\u2019s National Security Agency revelations: more and more of the Internet is becoming encrypted. This month was no different as <a href=\"https:\/\/threatpost.com\/yahoo-to-release-end-to-end-encryption-for-email-users\/107653\" target=\"_blank\" rel=\"noopener nofollow\">Yahoo vows to encrypt all email end-to-end by the end of the year<\/a> and Google announced it will give<a href=\"https:\/\/threatpost.com\/google-moves-to-boost-search-ranking-for-https-sites\/107682\" target=\"_blank\" rel=\"noopener nofollow\"> search preference to sites that use secure SSL connections<\/a>.<\/p>\n<p>Lots of fixes this month, however the real story is of Microsoft\u2019s patching fiasco. It released its <a href=\"https:\/\/threatpost.com\/microsoft-keeps-focus-on-ie-security-with-patch-tuesday-updates\/107729\" target=\"_blank\" rel=\"noopener nofollow\">standard patch Tuesday release<\/a>, <a href=\"https:\/\/threatpost.com\/microsoft-yet-to-deliver-fix-for-faulty-patch-tuesday-update\/107809\" target=\"_blank\" rel=\"noopener nofollow\">which broke a number of user machines<\/a>, then Microsoft eventually released <a href=\"https:\/\/threatpost.com\/microsoft-fixes-broken-security-patch-ms14-045\/107953\" target=\"_blank\" rel=\"noopener nofollow\">a new bulletin earlier this week<\/a>. As I mentioned but did not elaborate upon in the podcast, Google released a pair of updates to Chrome, which you can read about <a href=\"https:\/\/threatpost.com\/google-fixes-12-vulnerabilities-in-chrome-36\/107777\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a> and <a href=\"https:\/\/threatpost.com\/50-security-flaws-fixed-in-google-chrome\/107922\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>. And <a href=\"https:\/\/threatpost.com\/apple-patches-series-of-webkit-flaws-in-safari\/107749\" target=\"_blank\" rel=\"noopener nofollow\">Apple has some security fixes as well<\/a>.<\/p>\n<p>You\u2019ll find more in depth coverage of this month\u2019s APT findings at Threatpost, whether its <a href=\"https:\/\/threatpost.com\/epic-operation-kicks-off-multistage-turla-apt-campaign\/107612\" target=\"_blank\" rel=\"noopener nofollow\">Turla<\/a> or the Chinese crew that allegedly hacked into <a href=\"https:\/\/threatpost.com\/apt-gang-branches-out-to-medical-espionage-in-community-health-breach\/107828\" target=\"_blank\" rel=\"noopener nofollow\">Community Health Systems<\/a>. While we\u2019re on the topic of Community Health Systems, we wrote an analysis of that breach and <a href=\"https:\/\/www.kaspersky.com\/blog\/community_health_systems_breach\/\" target=\"_blank\" rel=\"noopener nofollow\">what it means for you<\/a> here on the Daily.<\/p>\n<p>On the malware front, you can read all about <a href=\"https:\/\/threatpost.com\/rat-malware-communicating-via-yahoo-mail\/107590\" target=\"_blank\" rel=\"noopener nofollow\">the new malware using Yahoo mail as a communications hub<\/a> and a new, primarily <a href=\"https:\/\/threatpost.com\/a-new-spin-on-rogue-antivirus\/107846\" target=\"_blank\" rel=\"noopener nofollow\">Web-based piece of rogue antivirus malware<\/a>.<\/p>\n<p>Don\u2019t forget to check out Chris Brook\u2019s report on Verizon\u2019s belief in the potential for using QR codes as mechanisms for authentication , and you probably want to read this very odd story about the incidents surrounding the <a href=\"https:\/\/threatpost.com\/playstation-network-back-online-following-ddos\/107894\" target=\"_blank\" rel=\"noopener nofollow\">DDoS attack that briefly took down the PlayStation Network<\/a> last weekend.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Podcast: @TheBrianDonohue and @BrokenFuses review the security and privacy news from August 2014<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2M97&amp;text=Podcast%3A+%40TheBrianDonohue+and+%40BrokenFuses+review+the+security+and+privacy+news+from+August+2014\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Brian Donohue and Chris Brook recap the month\u2019s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.<\/p>\n","protected":false},"author":42,"featured_media":4014,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2195],"tags":[483,744,779,82,43,97,527],"class_list":{"0":"post-4013","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-apt","10":"tag-black-hat","11":"tag-defcon","12":"tag-hacking","13":"tag-privacy","14":"tag-security-2","15":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/august_2014_podcast\/4013\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/august_2014_podcast\/3917\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/august_2014_podcast\/4394\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/august_2014_podcast\/4654\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/august_2014_podcast\/5858\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/august_2014_podcast\/5858\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/august_2014_podcast\/5858\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4013"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4013\/revisions"}],"predecessor-version":[{"id":19406,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4013\/revisions\/19406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4014"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}