• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

PRISM Update & Java Patch – WSWiR Episode 67

June 21, 2013 By Corey Nachreiner

Huge Java Patch, More PRISM News, and Crazy McAfee Video

Every week I highlight the big Infosec stories from the past seven days, and this week is no exception. Today’s episode covers the big Java update, the latest on the PRISM snooping scandal, news on new security camera hacks, and a weird video starring John McAfee. Watch below for the full scoop, and check out the Reference section for extras.

Thanks for watching, and see you next week.

(Episode Runtime: 8:19)

Direct YouTube Link: https://www.youtube.com/watch?v=MzopsxsmwIQ

Episode References:

  • Oracle’s June Java update – WGSC
  • Apples OS X Java update – Apple
  • Facebook and Microsoft share details about government disclosures – News Factor
  • Microsoft accused of sharing 0day with NSA – Ars Technica
  • Obama interview about PRISM and more – YouTube
  • Google wants to share PRISM disclosures; Gov. says no – CNN
  • ex-NSA researcher to disclose security camera hacks at Blackhat – Reuters
  • PirateBay co-founder jailed two years for hacking – The Register
  • Microsoft releases EMET 4.0 – Microsoft blogs
  • How to uninstall McAfee (mature content, no link provided) – YouTube

Extras:

  • Snowden’s latest leaks (and here)- Geek Wire
  • UK’s GCHQ are snooping too – Computing
  • Project Chess: Skype snooping – NYT
  • Trojan uses fake Adobe certificate – Symantec
  • Microsoft bug bounty program to pay for exploits – PC World
  • Temporary Linkedin outage due to DDoS – Softpedia
  • Wallstreet to perform simulated cyber attack exercise – Help Net Security
  • Nettraveler malware uses PRISM story as bait – ThreatPost
  • iOS built in tether uses weak auto-generated passwords – Techeye
  • Aaron’s law proposes changes to Computer Fraud and Abuse Act – Independent

— Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Adobe, Edward Snowden, Google, Hacking, Infosec news, Malware, NSA, Prism, Software vulnerabilities, Updates and patches

Comments

  1. hawaiian cruise vacation says

    October 3, 2013 at 6:43 am

    Greetings! Very useful advice in this particular
    article! It’s the little changes that will make the
    most important changes. Thanks a lot for sharing!

    Reply
  2. web trading says

    October 7, 2013 at 1:58 am

    Yes! Finally something about uk forex.

    Reply
  3. rage video game says

    October 17, 2013 at 3:05 pm

    Having read this I thought it was rather informative. I appreciate you
    spending some time and effort to put this informative article together.
    I once again find myself personally spending a significant amount of time both reading and leaving comments.

    But so what, it was still worth it!

    Reply
  4. Kathie says

    November 9, 2013 at 1:10 am

    Hey I am so grateful I found your weblog, I really found you by accident, whie I was browsing on Aol for something else, Anyhow I am
    here now and would just like to say kudos for a marvelous post annd a alll roud thrilling blog
    (I also love tthe theme/design), I don’t have time to look over it all at the moment but
    I have saved itt and also added your RSS feeds, so wben I have tim I willl bbe baack tto
    read a lot more, Please do keep up the ggreat b.

    Reply
  5. Hiram says

    March 23, 2014 at 3:32 pm

    Because the adjin off this website is working, no hesitastion very soon
    it will be well-known, due to its feature contents.

    Reply
  6. dark avengers hack says

    March 28, 2014 at 12:21 am

    This article tells you how to beat very hard in MVC3.
    Follow the Shadow Era cheats which shows you the complete
    Shadow Era heros list. Each member of this solid ensemble
    gets free reign to dive into their characters and take risks.

    Reply
  7. Marissa says

    July 12, 2014 at 6:15 am

    hello!,I like your writing so much! proportion we be in cobtact extra about yur ost on AOL?
    I require a specdialist in this house to unravell my problem.
    Maay be that is you! Taking a look ahead to peer you.

    Reply
  8. tumblr.com says

    August 8, 2014 at 12:06 pm

    Hey there! I just wanted to ask if you ever have any issues with
    hackers? My last blog (wordpress) was hacked and I ended
    up losing many months of hard work due to no backup. Do you have
    any solutions to stop hackers?

    Reply
    • Corey Nachreiner says

      August 14, 2014 at 2:19 pm

      Lots of issues with WordPress comment spam… no hacks yet (knock on wood)… But this is WordPress hosted. The main issues with WordPress is when ppl do it themselves, and don’t patch or uses vulnerable plugins. WordPress hosted patches for you.

      Reply
  9. ice cream birthday party Phoenix says

    September 20, 2014 at 6:16 pm

    Hey There. I discovered your blog the use of msn. That is a really well written article.
    I will make sure to bookmark it and return to learn extra of your useful info.
    Thanks for the post. I will definitely comeback.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • An Update on Section 230

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use