{"id":3917,"date":"2014-08-29T10:00:24","date_gmt":"2014-08-29T14:00:24","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3917"},"modified":"2020-02-26T18:58:58","modified_gmt":"2020-02-26T14:58:58","slug":"august_2014_podcast","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/august_2014_podcast\/3917\/","title":{"rendered":"Kaspersky Daily News Podcast: August 2014"},"content":{"rendered":"<p>In the news this month: the world\u2019s premier security conferences, Black Hat and DEF CON, take center stage to open August; more advanced persistent threats emerge in China and elsewhere; malware is using webmail to communicate; and a bizarre tale surrounding a brief outage on Sony\u2019s PlayStation Network. Threatpost\u2019s Brian Donohue and Chris Brook review these stories and more in this August 2014 edition of the Kaspersky Daily podcast.<\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-3917-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3?_=1\"><\/source><a href=\"https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3\" target=\"_blank\" rel=\"noopener\">https:\/\/kasperskydaily.com\/global\/files\/2014\/08\/August-2014-Kaspersky-Daily-Monthly-News-Podcast1.mp3<\/a><\/audio>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111617\/monthly-news-podcast-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5859\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111617\/monthly-news-podcast-1.png\" alt=\"monthly-news-podcast\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><em>THE SUPPLEMENTARY READING LIST<\/em><\/p>\n<p>As the Black Hat security conference transitions from a corporate-only affair to a consumer friendly one, you can expect to read more about it here on Kaspersky Daily. For a bit of context, read my thorough <a href=\"https:\/\/www.kaspersky.com\/blog\/black_hat_recap_2014\/\" target=\"_blank\" rel=\"noopener nofollow\">review of the event<\/a>. My editors at Threatpost, Dennis Fisher and Mike Mimoso, and I also recorded podcasts recapping the <a href=\"https:\/\/threatpost.com\/podcast-black-hat-news-wrap\/107667\" target=\"_blank\" rel=\"noopener nofollow\">first<\/a> and <a href=\"https:\/\/threatpost.com\/podcast-black-hat-news-wrap-day-two\/107670\" target=\"_blank\" rel=\"noopener nofollow\">second<\/a> days of Black Hat, which will provide a more in depth look at the event commonly referred to as Security Summer Camp.<\/p>\n<p>A trend seems to be emerging in the months, and now year, that has followed Edward Snowden\u2019s National Security Agency revelations: more and more of the Internet is becoming encrypted. This month was no different as <a href=\"https:\/\/threatpost.com\/yahoo-to-release-end-to-end-encryption-for-email-users\/107653\" target=\"_blank\" rel=\"noopener nofollow\">Yahoo vows to encrypt all email end-to-end by the end of the year<\/a> and Google announced it will give<a href=\"https:\/\/threatpost.com\/google-moves-to-boost-search-ranking-for-httpss-sites\/107682\" target=\"_blank\" rel=\"noopener nofollow\"> search preference to sites that use secure SSL connections<\/a>.<\/p>\n<p>Lots of fixes this month, however the real story is of Microsoft\u2019s patching fiasco. It released its <a href=\"https:\/\/threatpost.com\/microsoft-keeps-focus-on-ie-security-with-patch-tuesday-updates\/107729\" target=\"_blank\" rel=\"noopener nofollow\">standard patch Tuesday release<\/a>, <a href=\"https:\/\/threatpost.com\/microsoft-yet-to-deliver-fix-for-faulty-patch-tuesday-update\/107809\" target=\"_blank\" rel=\"noopener nofollow\">which broke a number of user machines<\/a>, then Microsoft eventually released <a href=\"https:\/\/threatpost.com\/microsoft-fixes-broken-security-patch-ms14-045\/107953\" target=\"_blank\" rel=\"noopener nofollow\">a new bulletin earlier this week<\/a>. As I mentioned but did not elaborate upon in the podcast, Google released a pair of updates to Chrome, which you can read about <a href=\"https:\/\/threatpost.com\/google-fixes-12-vulnerabilities-in-chrome-36\/107777\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a> and <a href=\"https:\/\/threatpost.com\/50-security-flaws-fixed-in-google-chrome\/107922\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>. And <a href=\"https:\/\/threatpost.com\/apple-patches-series-of-webkit-flaws-in-safari\/107749\" target=\"_blank\" rel=\"noopener nofollow\">Apple has some security fixes as well<\/a>.<\/p>\n<p>You\u2019ll find more in depth coverage of this month\u2019s APT findings at Threatpost, whether its <a href=\"https:\/\/threatpost.com\/epic-operation-kicks-off-multistage-turla-apt-campaign\/107612\" target=\"_blank\" rel=\"noopener nofollow\">Turla<\/a> or the Chinese crew that allegedly hacked into <a href=\"https:\/\/threatpost.com\/apt-gang-branches-out-to-medical-espionage-in-community-health-breach\/107828\" target=\"_blank\" rel=\"noopener nofollow\">Community Health Systems<\/a>. While we\u2019re on the topic of Community Health Systems, we wrote an analysis of that breach and <a href=\"https:\/\/www.kaspersky.com\/blog\/community_health_systems_breach\/\" target=\"_blank\" rel=\"noopener nofollow\">what it means for you<\/a> here on the Daily.<\/p>\n<p>On the malware front, you can read all about <a href=\"https:\/\/threatpost.com\/rat-malware-communicating-via-yahoo-mail\/107590\" target=\"_blank\" rel=\"noopener nofollow\">the new malware using Yahoo mail as a communications hub<\/a> and a new, primarily <a href=\"https:\/\/threatpost.com\/a-new-spin-on-rogue-antivirus\/107846\" target=\"_blank\" rel=\"noopener nofollow\">Web-based piece of rogue antivirus malware<\/a>.<\/p>\n<p>Don\u2019t forget to check out Chris Brook\u2019s report on Verizon\u2019s belief in the potential for using QR codes as mechanisms for authentication , and you probably want to read this very odd story about the incidents surrounding the <a href=\"https:\/\/threatpost.com\/playstation-network-back-online-following-ddos\/107894\" target=\"_blank\" rel=\"noopener nofollow\">DDoS attack that briefly took down the PlayStation Network<\/a> last weekend.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Podcast: @TheBrianDonohue and @BrokenFuses review the security and privacy news from August 2014<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2yRx&amp;text=Podcast%3A+%40TheBrianDonohue+and+%40BrokenFuses+review+the+security+and+privacy+news+from+August+2014\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Brian Donohue and Chris Brook recap the month\u2019s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.<\/p>\n","protected":false},"author":42,"featured_media":3918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1485],"tags":[477,740,775,82,43,97,521],"class_list":{"0":"post-3917","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-apt","10":"tag-black-hat","11":"tag-defcon","12":"tag-hacking","13":"tag-privacy","14":"tag-security-2","15":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/august_2014_podcast\/3917\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/august_2014_podcast\/4013\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/august_2014_podcast\/4394\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/august_2014_podcast\/4654\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/august_2014_podcast\/5858\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/august_2014_podcast\/5858\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/august_2014_podcast\/5858\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3917"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3917\/revisions"}],"predecessor-version":[{"id":15902,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3917\/revisions\/15902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3918"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}