Cyber Frontiers

Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age – CF032

Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at This week on Cyber Frontiers Jim and Christian pause to reflect on 9/11 (the day of recording), and how cybersecurity has impacted our nation’s wellbeing over the past decade. From here we branch into some of the many challenges associated with the future of information warfare, and introduce research concepts that are being pioneered for thwarting the evolving threats of our time. We uncover some interesting themes and conclude the show with a discussion of useful tools that any cyber researcher should know about for studying malware and its footprint on systems and networks. Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

DEFCON 24 – CF031

Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at This week on Cyber Frontiers Christian Recaps DEFCON 24 and walks through highlights and observations from the conference proceedings. We talk about what it means to be a Jittery MacGyver (building a bionic hand from a coffee maker), manipulating airline boarding passes, hotel point of sale systems, reverse engineering, Java runtime exploitation, that pesky Windows Schannel library and more! This year’s conference was hosted at Bally’s in Vegas. Approximately fifteen to twenty thousand of the world’s hacking elite attended for three days of fun. With 240 dollars cash paid at the door, electronic hacker badges, and no information required at registration – security evangelists from many different perspectives and communities were in attendance. We saw a variety of presenters international and domestic from universities, security companies, independent consultants, etc. give interesting talks throughout the security space. All of the presentations for DEFCON 24 have now been posted to: Audio and video for the conference should eventually start to be uploaded and published from DEFCON (the folders on the media drive are at least showing as of publishing this show). If you attended DEFCON or are interested in having us cover one of the presentations in depth on a future podcast, shoot us a note and we’ll be happy to give you a deep dive analysis on the topic of your choosing! Hedberg — The Bionic Hand Made from One Keurig Coffee Maker   ;feature=   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

IPv6 and What is Coming in the Future – CF030

Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at Full show notes and video at IPV6 Adoption in 2016 #tab=per-country-ipv6-adoption&tab=per-country-ipv6-adoption Waruna What is IPV6 New internet protocol Ability to many more devices due to 128 vs 32 bit of ipv4 IPV6 Benefits End to end connectivity No private address collisions Efficient routing Simpler header, less extraneous data Easier administration Less information to be processed by router Fewer information in header New Extension Headers The IPv6 specification currently defines 6 Extension Headers: Routing Header – Similar to the source routing options in IPv4. Used to mandate a specific routing. Authentication Header (AH) – A security header which provides authentication and integrity. Encapsulating Security Payload (ESP) Header – A security header which provides authentication and encryption. Fragmentation Header – The Fragmentation Header is similar to the fragmentation options in IPv4. Destination Options Header – This header contains a set of options to be processed only by the final destination node. Mobile IPv6 is an example of a Destination Options Header. Hop-by-Hop Options Header – A set of options needed by routers to perform certain management or debugging functions Drawbacks No NATS No drawbacks in security The firewall provides security not NAT itself Not backwards compatible Security differences IPV6 IPSEC – built in Using IPSec, participating peers (computers or machines) can achieve data confidentiality, data integrity, and data authentication at the network layer ( Layer 3 of the Open Systems Interconnection 7-layer networking model). Encryption – symmetric Certificate authorities Encryption that can be deployed in standalone environments between clients, routers, and firewalls With IPsec, data can be sent across a public network without observation, modification, or spoofing. IPsec functionality is similar in both IPv6 and IPv4; however, site-to-site tunnel mode only is supported in IPv6. In IPv6, IPsec is implemented using the AH authentication header and the ESP extension header. The authentication header provides integrity and authentication of the source. It also provides optional protection against replayed packets. The authentication header protects the integrity of most of the IP header fields and authenticates the source through a signature-based algorithm. The ESP header provides confidentiality, authentication of the source, connectionless integrity of the inner packet, antireplay, and limited traffic flow confidentiality. Offers end to end encryption SEND Protocol – secure neighbor discovery Cryptographic confirmation of host at connection time Privacy The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet. In this approach each device on the network has a unique address globally reachable directly from any other location on the Internet. Drawbacks Deployment and configuration is an issue Proper deployment and configuration is a serious issue. Trying to deploy IPv6 the same way IPv4 was done guarantees problems. IT administrators must learn a whole new approach to networking, from simple network troubleshooting to configuring firewalls and monitoring security logs. There are many opportunities for confusion and mistakes. Lack of support The risk today is the lack of IPv6 security knowledge. Enterprises must invest time and money in IPv6 security training upfront, before deploying. That or risk compromise and spending more time and more money on security later to plug the holes. Network security is more effective as part of the planning stage rather than after deployment. This is not an area to skimp on. According to Scott Hogg, IPv6 Security author and CTO of GTRI, “All security practitioners should learn about IPv6 now because all organizations have IPv6-capable and enabled operating systems in their environments. Failure to secure the IPv6 systems is like allowing a huge back-door to exist.” Security device bypass via unfiltered IPv6 and tunneled traffic. Only a lack of knowledge is considered a bigger risk than the security products themselves. Conceptually it’s simple, security products need to do two things – recognize suspicious IPv6 packets and apply controls when they do. However in practice this is hardly possible in v4 let alone an environment that may have rogue or unknown tunnel traffic. Reputation based protection – Many security software vendors use the reputation of IP addresses to filter out malicious websites that are known sources of malware. While reputation systems for IPv4 addresses already exist, it’s a bit of a chicken-and-egg situation when it comes to IPv6. No one has established an IPv6 reputation database, so no one is using reputation-based security with IPv6 addresses — and therefore no one is building a reputation database. It’s something the security industry will surely eventually adopt, but for now it’s a missing piece in the security puzzle. Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Hands on with the Anonabox Pro – CF029

Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at This week we pick up on our conversation on anonymity, Tor, and the dark web by reviewing one of the hot and trending hardware appliances powering the anonymous internet world – the Anonabox PRO! Features: Ability to uplink or downlink via ethernet or WiFi Direct passthrough – works as a regular router when anonymity is not turned on. Pocket sized, runs off USB power (will showcase running in my lab) Supports anonymity through Tor, or premium VPN services like HMA. Uses embedded DD-WRT kernel / intuitive web interface. Easy instructions packaged w/ product Background: Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security – CF027

Listen Mobile: This week on Cyber Frontiers Christian and Jim are joined by special guest Jeremy Krach to provide the 2016 cybersecurity forecast. We first wrap-up 2015 by discussing the latest hack challenges and cybersecurity breaches, and then dive into what tools, technologies, and challenges will shape the evolution of cybersecurity over the next year. We also look at how the cybersecurity threat space will change and whether or not corporations and individuals are prepared to combat it. It’s a holiday special you won’t want to miss! Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Holiday Hack Latest and greatest from SANS annual Holiday Hack team SkidNP Hacker group takes down Steam on Christmas Heavy traffic or actual attack? Caching issue allows viewing of other accounts More details 5 key takeaways from from Cybersecurity Act 2015 Emerging Threats in Cybersecurity – Data Integrity in Large Scale Systems James Clapper, the director of national intelligence, said the biggest emerging threat to national security is “cyber operations that will change or manipulate electronic information in order to compromise its integrity instead of deleting or disrupting access to it.” –Thanks for the heads up Randy Cantrell Biggest cybersecurity threats in 2016 -Rise of machine to machine attacks -Use of ghostware to conceal attacks -The emergence of “headless” malware 2016 Emerging Cyber Threats Report The privacy tug-of-war between individuals and organizations has become a tug with no war. Exponential growth in the Internet of Things over the past two years creates a larger cyberattack surface, but consumers have yet to prove they want or will pay for a more secure IoT device The digital economy is growing more complex while a lack of highly trained security workers persists worldwide Cyber espionage shows no sign of abating 5 cybersecurity trends to watch for in 2016, part one -Strategic data manipulation and disruption -Increasing attacks on application service providers -Hacktivism and the attack surface -Industrial control systems pushed to the breaking point -Shake-out of the security industry Report: 191M voter records exposed online   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Home Gadget Geeks

5 Years of Home Gadget Geeks Podcasting, Kangaroo Mobile Desktop Computer – HGG239

Listen Mobile: Christian Johnson and Andrew Morris(@unrealshots)  joins Jim Collison  and Mike Wieger from for show #239 of Home Gadget Geeks brought to you by the Average Guy Network, part of community. Please leave a REVIEW (iPhone or iPad) at ;type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: or if you are in Canada, use WANT TO SUBSCRIBE? Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at HT001 – Jim, Christian, Brian and John Z (Andrew joins at HT011) First Video Show was HT050 – Guest was Chris Lux and we used LiveStream HT100 was in a very new Hangouts HT150 was Jan 4, 2014 and followed today’s format HGG206 Added Mike Wieger Sometime in 2013, Andrew Pod-Died… Was there a Pod-Funeral? Update on the Kangaroo Micro PC On Newegg – At the Microsoft Store – Christian’s Corner A Half a Decade Flashes By: Where has technology grown since the start of the podcast, and where are we headed: 12/26/2010 – The average guy laments over the end of WHS V1 drive extender, and starts to wonder if we should be putting more content in the cloud. There wasn’t a clear consensus from the masses on this at the time. 3/19/2011 – The average guy starts getting interested in “super routers” like pfsense which at the time users were anticipating the release of the brand new release series. Today, pfsense is at version , and was at version before the major turnaround. 8/27/2011 – The world watches as Steve Job finally announces his resignation as CEO of Apple He died several months later on 10/5/2011 – and the world remembered his impact and the “man behind Jobs” in many different ways. 10/3/2011 – The first talk of network based cable tuner cards makes its way into the show – with the HD HomeRun PRIME being on the list of talking points for the show. Today these boxes are in most home media enthusiasts homes, and 3/17/2012 – Rumblings of the Windows 8 consumer preview come screeching into the podcast – all out war is waged over whether or not it is the next Vist Apparently this really started on 3/5/2012 – with Christian also announcing his first internship at NASA How the times have changed. 5/20/2012 – The Windows Phone enthusiasts hold dear to their Nokia devices and Windows Phone 7 operating systems, but we all know how this story ends. 6/1/2012 – The world is mesmerized by the world’s first $35 dollar computer, the Raspberry Pi A – Today we can get the same for $8 12/08//2012 – The beginning of the home server community enthusiasm around the HP microserver (the NL40) – a device that would dominate the conversation in a post mediasmart world until home server finally reached its eventual death and became Server Essentials. 4/21/2013 – It was the gift that kept on giving more conversation … 9/7/2013 – Christian’s first podcast from the University of Maryland – where along the way we brought tech fused with financial aid discussing how students can make it to these types of institutions. 12/7/2013 – The world starts to benefit from Watson in the enterprise – and big data technologies in general. If only Jim Collison knew this was the precursor event to Christian losing his mind to the topics that began Cyber Frontiers. 2/18/2014 – We begin the exploration of big data and cybersecurity from an academic perspective as Cyber Frontiers is launched with a pilot episode on HGG. 6/7/2014 – One of Christian’s last regular airtime shows with HGG before getting more involved with Cyber Frontiers. 6/28/2014 – The world scratches their heads at Heartbleed – and we arm the citizens with the tools needed to keep their machines safe (LastPass coming in with growing popularity). 9/21/2014 – Quadcopters are such an average guy thing at this point that we talk about them on the podcast 2/1/2015 – We’ve reached the point where we have to decide between 3TB and 4TB drives – when we started the show if it wasn’t a 2TB drive you just weren’t cool   Get the Home Gadget Geeks Mobile Apps at is powered by Maplegrove Partners web hosting. Get secure, reliable, high-speed hosting from people you know and trust. For more information visit Catch all the subscription links at Facebook Group: Jim’s Twitter: #!/jcollison Contact the show at Find this and other great Podcasts from the Average Guy Network at
Continue Reading »