Category Security

Keybase with Max Krohn

http://traffic.libsyn.com/sedaily/Keybase.mp3Podcast: Play in new window | Download Public key encryption allows for encrypted, private messages. A message sent from Bob to Alice gets encrypted using Alice’s public key. Public key encryption also allows for signed messages–so that when Alice signs a message, Alice uses her private key and Bob can verify it if Bob has her public key. In both cases, Bob needs Alice’s public key! If Bob gets that

Continue reading…

Smart Contract Security with Emin Gün Sirer

http://traffic.libsyn.com/sedaily/SmartContractSecurity.mp3Podcast: Play in new window | Download A smart contract is a program that allows for financial transactions. Smart contracts are usually associated with the Ethereum platform, which has a language called Solidity that makes it easy to program smart contracts. Someday, we will have smart contracts issuing insurance, processing legal claims, and executing accounting transactions. Smart contracts involve money, and they are likely to transact with cryptocurrencies. That makes

Continue reading…

Advertiser Trust with Marc Goldberg

http://traffic.libsyn.com/sedaily/TrustMetrics.mp3Podcast: Play in new window | Download Despite all the problems with online advertising, ads are not going away. Advertising is fundamental to the modern Internet economy. In previous episodes of Software Engineering Daily, we have mostly dissected the problems of adtech–bots, tracking, fraud, brand safety. We have talked about some solutions–for example, JavaScript tags that you can put on a page to identify a bot before you serve it

Continue reading…

Static Analysis with Paul Anderson

http://traffic.libsyn.com/sedaily/StaticAnalysis.mp3Podcast: Play in new window | Download Static analysis is the process of evaluating code for errors, memory leaks, and security vulnerabilities. The “static” part refers to the fact that the code is not running. This differentiates it from unit tests and integration tests, which evaluate the runtime characteristics of code. If you use an IDE or a linter, you are using a basic form of static analysis all the

Continue reading…

Brave Browser with Jonathan Sampson

http://traffic.libsyn.com/sedaily/Brave.mp3Podcast: Play in new window | Download Online advertising enables free content and services of the Internet. One of the free services that is powered by advertising is the browser. 60% of web browsing is done through Chrome, which is owned by Google, which is powered by advertising. The application that most of us use to explore the web is made by a company that relies on ads, so it

Continue reading…

Attack Attribution with John Davis

http://traffic.libsyn.com/sedaily/AttackAttribution.mp3Podcast: Play in new window | Download When a cyber attack occurs, how do we identify who committed it? There is no straightforward answer to that question. Even if we know Chinese hackers have infiltrated our power grid with logic bombs, we might not be able to say with certainty whether those hackers were state actors or rogue Chinese hackers looking for an offensive asset to sell to their government.

Continue reading…

Car and IoT Security with Chris Craig

http://traffic.libsyn.com/sedaily/SecurityChrisCraig.mp3Podcast: Play in new window | Download Ransomware and DDoS attacks happen all the time. Sometimes they affect large swaths of users. WannaCry ransomware froze the computer systems in hospitals. Mirai botnet DDoS attacks took down a DNS provider, making Netflix and Twitter inaccessible for a short period of time. These are innocent attacks compared to what we could face from a world where cars, heart rate monitors, and other

Continue reading…

QA Testing with Jonathan Alexander

http://traffic.libsyn.com/sedaily/QATesting.mp3Podcast: Play in new window | Download Quality assurance testing is a form of testing that closely mirrors user behavior. Sometimes it is manual, sometimes it is automated. Automated QA tests are scripts that validate correct data representation as the application mechanically runs through high-level workflows–like a login page. Manual QA testers act out use cases of an application to see if there are any bugs that were missed during

Continue reading…

MRuby and Language Security with Daniel Bovensiepen

http://traffic.libsyn.com/sedaily/mruby.mp3Podcast: Play in new window | Download Shopify is a company that helps customers build custom online storefronts. Shopify has built upon the same Ruby on Rails application since the founding of their business 12 years ago starting with Rails 0.5 and moving all the way to Rails 5.   MRuby is a lightweight implementation of the Ruby language. Shopify made the decision to use mruby to allow customers to

Continue reading…

Fighting Fraud at Coinbase with Soups Ranjan

http://traffic.libsyn.com/sedaily/SoupsPresentation.mp3Podcast: Play in new window | Download A cryptocurrency exchange faces a uniquely difficult fraud problem. A hacker who steals my credentials can initiate a transfer of all my bitcoin to another wallet, and it is a non-reversible, non-identifiable payment. So it is really important to prevent those kinds of fraudulent transactions. At the third Software Engineering Daily Meetup, Coinbase director of data science Soups Ranjan explained how Coinbase stays

Continue reading…

Ransomware with Tim Gallo and Allan Liska

http://traffic.libsyn.com/sedaily/Ransomware.mp3Podcast: Play in new window | Download Ransomware uses software to extort people. A piece of ransomware might arrive in your inbox looking like a PDF, or a link to a website with a redirect. Ransomware is often distributed using social engineering. The email address might resemble someone you know, or a transactional email from a company like Uber or Amazon. Tim Gallo and Allan Liska are authors of the

Continue reading…

Ad Fraud In Our Own Backyard with Shailin Dhar

http://traffic.libsyn.com/sedaily/ezanga.mp3Podcast: Play in new window | Download The online advertising industry is a giant casino. Giant technology companies are the casino owners, online publishers are the casino employees, the brand advertisers are the victims who keep returning to the casino to lose their money, and the small adtech companies are the sharks who make lots of money exploiting the inefficiencies of the system. One of these smaller adtech companies is

Continue reading…

Web Tracking with Bill Budington

http://traffic.libsyn.com/sedaily/panopticlick_edited.mp3Podcast: Play in new window | Download The Internet is decreasing in privacy and increasing in utility. Under some conditions, this tradeoff makes sense. We publicize our profile photo so that people know what we look like. Under other conditions, this tradeoff does not make sense. We do not want a television that costs less to purchase because it is silently recording all of the conversations that take place in

Continue reading…

Cloudbleed and SHA-1 Collision with Max Burkhardt

http://traffic.libsyn.com/sedaily/CloudbleedwithHaseeb.mp3Podcast: Play in new window | Download Thursday February 23rd was a big day in security news: details were published about the Cloudbleed bug, which leaked tons of plaintext requests from across the Internet into plain view. On the same day, the first collision attack against SHA-1 was demonstrated by researchers at Google, foretelling the demise of SHA-1 as a safe hashing function. What does this mean for the average

Continue reading…

Security Language with Jean Yang

http://traffic.libsyn.com/sedaily/SecureProgramming.mp3Podcast: Play in new window | Download Security vulnerabilities are an important concern in systems. When we specify that we want certain information hidden, for example our phone number or our date of birth, we expect the system to hide the information. However, this doesn’t always happen due to human error in the code because programmers have to write checks and filters across the program. In this episode, Edaena Salinas

Continue reading…

Cyber Warfare with Jared Smith

http://traffic.libsyn.com/sedaily/websecurity_edited.mp3Podcast: Play in new window | Download Vulnerabilities exist in every computer system. As a system gets bigger, the number of vulnerabilities magnifies. The web is the biggest, most complex computer system we have–but fortunately, the steps we can take to secure our web applications are often quite simple. Jared Smith is a cyber security research scientist with Oak Ridge National Laboratory. He joined me on the show to discuss

Continue reading…

Security Research with Samy Kamkar

http://traffic.libsyn.com/sedaily/security_edited.mp3Podcast: Play in new window | Download Every digital system has vulnerabilities. Cars can be hacked, locked computers can be exploited, and credit cards can be spoofed. Security researchers make a career out of finding these types of vulnerabilities. Samy Kamkar’s approach to security research is not just about dissection–it’s also about creativity. For many of the technologies he hacks on, Samy open-sources code that summarily describes the vulnerability he

Continue reading…

Ad Fraud Research with Augustine Fou

http://traffic.libsyn.com/sedaily/adfraudresearch_edited.mp3Podcast: Play in new window | Download A huge percentage of online advertisements are never seen by humans. They are viewed by bots–automated scripts that are opening web pages in a browser and pretending to be a human. Advertising scammers set up web pages, embed advertisements on those pages, and then pay for bot traffic to come and view those advertisements. This aspect of the internet is bizarre and alarming.

Continue reading…

Ad Fraud Everywhere with Shailin Dhar

http://traffic.libsyn.com/sedaily/adfraudeverywhere_edited_2.mp3Podcast: Play in new window | Download Advertising fraud is easy, legal, and extremely profitable. A fraudster can set up a website, scrape content from the internet, and run programmatic advertisements against that website. The fraudster can then purchase bot traffic. Those bots will visit the page, consume advertisements, and return profit to the owner of the page. In a past life, Shailin Dhar worked for a company that set

Continue reading…

Botnet Facebook Likes with Derek Muller

http://traffic.libsyn.com/sedaily/likefraud_edited.mp3Podcast: Play in new window | Download Botnets have a massive influence on the Internet. As we have seen recently with the Mirai Botnet, IOT bots can take down companies as big as Netflix. In our recent episodes about advertising fraud, we’ve talked about how bots are being used to take billions of dollars of revenue from advertisers. Derek Muller is one of those advertisers who has spent money on

Continue reading…

  • 1 2