SlideShare a Scribd company logo
Wait, wait!
Don’t pwn me!
August 2014 Security News Headlines Q&A game
INTRODUCTIONS: THE PANEL
ONLINE NEWS RESOURCES
Hacker News
CSO
CNN
ars technica
The Verge
Threat Post
NetworkWorld
SANS
Brian Krebs
Pandodaily
Forbes
Tesla
FBI.gov
Star Tribune
Errata Security
Twitter: #BlackHat #WaitWait
THE RULES
Each correct answer to the initial question is worth 3 points
A wrong answer subtracts 2 points
A pass on the question loses 1 point
If a question is answered incorrectly, the second response is worth 1 point
A correct answer from an audience member gets allocated 2 points to panelist of choice
The moderator may arbitrarily give
or take away points at any time
SCORE KEEPER: WE NEED A VOLUNTEER!
AUDIENCE PARTICIPATION:
WARM UP
Who is retiring as Executive Director of OWASP?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
According to the project evaluation
committee findings, what is the most active
project in OWASP?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
FOR THE PANEL:
HACKS IN THE NEWS
In Sydney Australia, hackers turned an ATM into
one, gigantic game player. What game to they did
they put on the machine?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
According to Karsten Nohl, what common
portable device can be used in a new type of
attack?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Microsoft was recently ordered by the United
States government to turn over email that
resided in what country’s servers?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Aircraft satellite communication systems can be
hacked via what, according to Ruben
Santamarta?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Feds’ Silk Road investigation broke “what”,
defendant tells court?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Name one of two major applications that use a
vulnerable version of Apache Cordova.
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Visit the wrong website, and what government
agency could end up in your computer?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Godzilla Hacker took down 43 major website of
what government?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Anonymous Group took down whose website
over the Gaza conflict?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
The Russian government asked Apple to hand
over what?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Attackers breached Tor’s system to reveal what?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
What scam did a 24 year old many use to steal
$309,768 from Apple?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
BY THE NUMBERS
Within 100,000, how many passwords did a
Russian criminal group lift from 420,000
websites?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Credit Card Breach Confirmed At 33 restaurant
locations. Which restaurant chain was it?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
What popular developer network accidently
exposed thousands of developers emails and
password?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
On average, how many vulnerabilities did
researchers find per Internet of Things device?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Within 5%, what percent of employees xpose
critical corporate data by mistake?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Within 5%, how many Critical Infrastructure
Providers were breached last year?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
REALLY? THAT’S UNBELIEVABLE!
EZ-Pass was hit with what kind of scheme to
defraud users?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
A warrant authorized the FBI to Track and do
what to people’s computers?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Android malware SandroRAT disguises itself as
what?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Scientists reconstruct “what” by watching a bag
of potato chips?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
THE BUSINESS SIDE
Google fixed what security hole in Android?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
What should be of high concern for travelers
using business centers at the hotel?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
LIGHTNING ROUND
NOTHING BUT OWASP
Within 5000, how many listens has the OWASP
24/7 Podcast had within the past 9 months?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Within 10, how many projects are currently
under evaluation by the Johanna and the
evaluation committee?
141 Projects
In the OWASP Top 10, what does section A9
cover?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
What very popular project does Colin Watson
run?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
How many days until AppSec USA 2014?
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
TALLY THE SCORE: WHO WON?
THANK YOU TO THE PANEL
A NEW OWASP PROJECT: THE WAIT WAIT GAME
Mark.Miller@OWASP.org
Wait, wait!
Don’t pwn me!
August 2014 Security News Headlines Q&A game

More Related Content

PPTX
"Wait, Wait! Don't pwn Me!"- AppSec Europe 2014
PPTX
How to know if your iPhone is hacked? Check these 5 points now!
PPTX
The Next Cyber Warfare Wave: AR and VR Worlds
PDF
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
PPTX
You said it? How mis- and disinformation tweets surrounding the Corona-5G-con...
PDF
The dark side of IA
PDF
Weaponizing data science for social engineering: automate E2E spear phishing ...
"Wait, Wait! Don't pwn Me!"- AppSec Europe 2014
How to know if your iPhone is hacked? Check these 5 points now!
The Next Cyber Warfare Wave: AR and VR Worlds
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
You said it? How mis- and disinformation tweets surrounding the Corona-5G-con...
The dark side of IA
Weaponizing data science for social engineering: automate E2E spear phishing ...

Viewers also liked (20)

PPTX
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
PPTX
Aligning Your Team and Your Powers for Success
PPTX
Kim Zetter - The Year in Hacks 2015
PPTX
Rugged DevOps: Aligning Your Team and Your Powers for Success
PPTX
Create Rugged Applications: Managing Your Software Supply Chain
PDF
What We Learned from Three Years of Sciencing the Crap Out of DevOps
PPTX
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
PPTX
Leveraging Nexus Repository Manager at the Heart of DevOps
PDF
Building Security Controls around Attack Models
PPTX
Rugged DevOps at Scale with Rich Mogull
PPTX
Applying DevOps Principles to Address Dynamic Changes in Cyber Security
PDF
Guns, Germs and Microservices w/ John Willis and Josh Corman
PDF
What We Learned from Three Years of Sciencing the Crap Out of DevOps
PDF
Release Engineering and Rugged DevOps: An Intersection?
PPTX
Lean Security
PPTX
The Journey to DevSecOps
PPTX
Security War Games
PDF
Silver Lining for Miles: DevOps for Building Security Solutions
PPTX
The R.O.A.D to DevOps
PDF
DevSecOps - Building Rugged Software
Lisa Conference 2014: DevOps and AppSec - Who is Responsible
Aligning Your Team and Your Powers for Success
Kim Zetter - The Year in Hacks 2015
Rugged DevOps: Aligning Your Team and Your Powers for Success
Create Rugged Applications: Managing Your Software Supply Chain
What We Learned from Three Years of Sciencing the Crap Out of DevOps
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
Leveraging Nexus Repository Manager at the Heart of DevOps
Building Security Controls around Attack Models
Rugged DevOps at Scale with Rich Mogull
Applying DevOps Principles to Address Dynamic Changes in Cyber Security
Guns, Germs and Microservices w/ John Willis and Josh Corman
What We Learned from Three Years of Sciencing the Crap Out of DevOps
Release Engineering and Rugged DevOps: An Intersection?
Lean Security
The Journey to DevSecOps
Security War Games
Silver Lining for Miles: DevOps for Building Security Solutions
The R.O.A.D to DevOps
DevSecOps - Building Rugged Software
Ad

Similar to Black Hat 2014 - Wait! Wait! Don't Pwn Me! (20)

PPTX
APT in the Financial Sector
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
Android malware overview, status and dilemmas
PDF
A Joint Study by National University of Singapore and IDC
PDF
Hacking 10 2010
PDF
News Bytes by Jaskaran Narula - Null Meet Bhopal
PPTX
DevNexus 2016: Wait! Wait! Don't pwn me!
PPTX
Cyber war
PDF
Avast Q1 Security Report 2015
PDF
Perform a search on the Web for articles and stories about social en.pdf
PPT
PPTX
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
PDF
Smart Matching for Screening Webinar - May 2020
PDF
Stealth Mango and the Prevalence of Mobile Surveillanceware
PDF
How to hack. Cyprus meetup
PPTX
Cybersecurity awareness _20241220_223916_0000.pptx
PDF
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PDF
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
APT in the Financial Sector
Jason Samide - State of Security & 2016 Predictions
Android malware overview, status and dilemmas
A Joint Study by National University of Singapore and IDC
Hacking 10 2010
News Bytes by Jaskaran Narula - Null Meet Bhopal
DevNexus 2016: Wait! Wait! Don't pwn me!
Cyber war
Avast Q1 Security Report 2015
Perform a search on the Web for articles and stories about social en.pdf
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Smart Matching for Screening Webinar - May 2020
Stealth Mango and the Prevalence of Mobile Surveillanceware
How to hack. Cyprus meetup
Cybersecurity awareness _20241220_223916_0000.pptx
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
Cyber espionage nation state-apt_attacks_on_the_rise
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
Ad

More from SeniorStoryteller (18)

PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PPTX
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
PPTX
Making Security Agile - Oleg Gryb
PDF
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
PDF
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
PDF
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
PDF
Ops Happens: DevOps Beyond Deployment - Damon Edwards
PDF
Building Security In - A Tale of Two Stories - Laksh Raghavan
PDF
Breaking Bad Equilibruim - John Willis
PPTX
NuGet Package Management Done Right
PPTX
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PPTX
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
PDF
Heroes’ Journey: Learning from Successful DevOps Transformations
PDF
Ops Happen: Improve Security Without Getting in the Way
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Implementing DevOps in a Regulated Environment - DJ Schleen
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Making Security Agile - Oleg Gryb
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Building Security In - A Tale of Two Stories - Laksh Raghavan
Breaking Bad Equilibruim - John Willis
NuGet Package Management Done Right
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
The End of Security as We Know It - Shannon Lietz
Safely Removing the Last Roadblock to Continuous Delivery
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Heroes’ Journey: Learning from Successful DevOps Transformations
Ops Happen: Improve Security Without Getting in the Way

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Understanding Forklifts - TECH EHS Solution
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
AI in Product Development-omnex systems
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Digital Strategies for Manufacturing Companies
PPTX
Transform Your Business with a Software ERP System
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
top salesforce developer skills in 2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
ai tools demonstartion for schools and inter college
PPTX
Operating system designcfffgfgggggggvggggggggg
Design an Analysis of Algorithms II-SECS-1021-03
Nekopoi APK 2025 free lastest update
2025 Textile ERP Trends: SAP, Odoo & Oracle
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Wondershare Filmora 15 Crack With Activation Key [2025
Understanding Forklifts - TECH EHS Solution
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Odoo Companies in India – Driving Business Transformation.pdf
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Digital Strategies for Manufacturing Companies
Transform Your Business with a Software ERP System
Online Work Permit System for Fast Permit Processing
Odoo POS Development Services by CandidRoot Solutions
Design an Analysis of Algorithms I-SECS-1021-03
How to Migrate SBCGlobal Email to Yahoo Easily
top salesforce developer skills in 2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
ai tools demonstartion for schools and inter college
Operating system designcfffgfgggggggvggggggggg

Black Hat 2014 - Wait! Wait! Don't Pwn Me!

Editor's Notes

  • #4: The resources used for selection of the news events.
  • #6: The rules… which may change at any time, even during the game.
  • #11: Podcasts for DevOps admins http://thepracticalsysadmin.com/podcasts-for-devops-admins/ In my experience I have found that podcasts are one of the absolute best ways to consume information, whether it be on a morning commute or viewing the show live, good podcasts are one of the best learning tools around.  So for today’s post, I have compiled a list of some good shows related to DevOps that I hope others find to be useful.
  • #15: http://mashable.com/2014/07/28/hackers-atm-doom/
  • #17: http://articles.economictimes.indiatimes.com/2014-07-31/news/52285103_1_usb-chips-software
  • #19: http://www.bbc.com/news/technology-28601788
  • #21: http://www.itpro.co.uk/security/22828/aircraft-satellite-comms-systems-can-be-hacked-via-in-flight-wi-fi-claims-researcher#ixzz39dnITM7W
  • #25: http://www.securityweek.com/apache-cordova-vulnerabilities-expose-android-apps Amazon or Skype
  • #27: http://www.wired.com/2014/08/operation_torpedo/
  • #29: http://thehackernews.com/2014/08/godzilla-hacker-takes-down-several_1.html
  • #31: http://thehackernews.com/2014/07/anonymous-group-takes-down-mossads_31.html
  • #33: http://thehackernews.com/2014/07/russian-government-asks-apple-to-hand_30.html
  • #35: http://pando.com/2014/07/30/attackers-have-breached-tors-system-to-reveal-the-identities-of-its-users/
  • #38: http://www.forbes.com/sites/jaymcgregor/2014/07/29/a-24-year-old-man-stole-309768-from-apple-with-an-unbelievably-simple-scam/?ss=Security
  • #41: http://venturebeat.com/2014/08/05/russian-gangs-take-1-2b-passwords-500m-email-addresses-in-biggest-web-heist-ever/
  • #43: http://www.forbes.com/sites/katevinton/2014/08/06/data-breach-bulletin-credit-card-breach-confirmed-at-33-p-f-changs-locations/?ss=Security
  • #45: http://thehackernews.com/2014/08/thousands-of-mozilla-developers-emails_3.html
  • #47: http://blogs.computerworld.com/cybercrime-and-hacking/24215/researchers-find-about-25-security-vulnerabilities-internet-things-device
  • #49: http://www.esecurityplanet.com/network-security/68-percent-of-employees-expose-critical-corporate-data-by-mistake.html
  • #51: http://www.esecurityplanet.com/network-security/67-percent-of-critical-infrastructure-providers-were-breached-last-year.html
  • #56: http://thehackernews.com/2014/08/warrant-authorized-fbi-to-track-and_16.html
  • #58: http://www.scmagazine.com/android-malware-sandrorat-disguised-as-mobile-security-app/article/364455/
  • #63: http://www.zdnet.com/google-fixes-androids-fake-id-security-hole-7000032108/
  • #65: http://krebsonsecurity.com/2014/07/beware-keyloggers-at-hotel-business-centers/
  • #68: https://soundcloud.com/owasp-podcast