This week Christian and Jim dive into the “doomsday” (dramatic much?) cyber event of 2019 — escaping Docker containers! Formally known as CVE-2019-5736, we dive deep on the technical research undertaken by Dragon Sector to take advantage of Linux namespaces in order to reveal the larger discovery and exploit and what it means for the industry. We cover it from the average guy angle as well, and include discussions on use cases for classic virtualization strategies compared to containerization. We leave some food for thought for next time on how machine learning techniques are impairing methodologies for scientific validation of original research.
This week on Cyber Frontiers we catch up on the lingo defining the technology frontier word cloud in 2019. Everyday we increasingly hear the phrase “we can do this now because of artificial intelligence (AI).” It’s showing up in product literature, super bowl ads, you name it! But is it really AI? How did we get to the new hype curve so quickly? We parse out the journey of the buzz from the year of cyber (2017), to the year of machine learning (2018), to what is rapidly shaping up as the year of artificial intelligence (2019). We hop on the buzzword express to usher in the new year and take the plunge into what society deems the course for artificial machines and intelligence.
This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood, while re-tracing how it enabled blockchain technology to gain stronger visibility in the eyes of technologists. From here we discuss the fundamental advancements in computer science that enabled blockchain to succeed, and discuss its future in shaping the internet over the next 10 to 25 years. We also discuss other use cases blockchain is likely to expand into, and provide some initial forecasts for what Blockchain may ultimately become.
This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which jobs seem best tailored with-in the field for these backgrounds. As demand for these positions continues to grow, we also discuss the ways in which the job is evolving itself with the advancement of automation and cloud computing, which is letting developers at companies focus more on core business systems and less on infrastructure pasta. We wrap up with a quick discussion on remote desktop solutions for the average guy in response to our listener questions received.
This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2, and Webauthn standards and how these platforms and standards will usher in the next phase of improved cybersecurity for enterprises as well as the average guy. We talk about some of the historical implications of protocols that haven’t evolved over the last thirty years, and what these technologies bring to the table to augment existing internet infrastructure. We also briefly veer into the latest Apple announcements with the release of OSX Mojave and iOS 12, because who doesn’t want to know what awaits them in Apple’s latest software platform? Strap in while we take you to the edge of the frontier and back.
This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports, and driverless cars in the Uber and Lyft fleets. We weigh in on what empirical methods are available for validating these use cases in AI, and the socioeconomic impacts that these technologies will create for the average guy in the next five to ten years.
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors.