{"id":45086,"date":"2020-10-24T03:55:39","date_gmt":"2020-10-24T07:55:39","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption-security-boulevard.php"},"modified":"2020-10-24T03:55:39","modified_gmt":"2020-10-24T07:55:39","slug":"trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption-security-boulevard","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption-security-boulevard.php","title":{"rendered":"TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption &#8211; Security Boulevard"},"content":{"rendered":"<p><p>In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and Zooms rollout of end-to-end encryption.<\/p>\n<p>** Links mentioned on the show **<\/p>\n<p>The Social Dilemma A Conversation about the Pros and Cons of Social Mediahttps:\/\/sharedsecurity.net\/2020\/10\/12\/the-social-dilemma\/<\/p>\n<p>Microsoft and others orchestrate takedown of TrickBot botnethttps:\/\/blogs.microsoft.com\/on-the-issues\/2020\/10\/12\/trickbot-ransomware-cyberthreat-us-elections\/<\/p>\n<p>Hackers used VPN flaws to access US govt elections support systemshttps:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-283a<\/p>\n<p>Zoom to roll out end-to-end encrypted (E2EE) callshttps:\/\/blog.zoom.us\/zoom-rolling-out-end-to-end-encryption-offering\/<\/p>\n<p>** Watch this episode on YouTube **<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/c\/SharedSecurityPodcast\" rel=\"nofollow\">https:\/\/www.youtube.com\/c\/SharedSecurityPodcast<\/a><\/p>\n<p>** Thank you to our sponsors! **<\/p>\n<p>Silent Pocket<\/p>\n<p>Visit <a href=\"https:\/\/silent-pocket.com\" rel=\"nofollow\">https:\/\/silent-pocket.com<\/a> to check out Silent Pockets amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code sharedsecurity.<\/p>\n<p>Click Armor<\/p>\n<p>To find out how gamification of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armors gamified awareness training platform, visit: <a href=\"https:\/\/clickarmor.ca\/sharedsecurity\" rel=\"nofollow\">https:\/\/clickarmor.ca\/sharedsecurity<\/a><\/p>\n<p>** Help support the show **<\/p>\n<p>Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link: <a href=\"http:\/\/www.privateinternetaccess.com\/pages\/buy-vpn\/sharedsecurity\" rel=\"nofollow\">http:\/\/www.privateinternetaccess.com\/pages\/buy-vpn\/sharedsecurity<\/a><\/p>\n<p>** Subscribe and follow the show **<\/p>\n<p>Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors: <a href=\"http:\/\/eepurl.com\/dwcc8D\" rel=\"nofollow\">http:\/\/eepurl.com\/dwcc8D<\/a><\/p>\n<p>Subscribe on your favorite podcast app: <a href=\"https:\/\/sharedsecurity.net\/subscribe\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/subscribe<\/a><\/p>\n<p>Contact us: <a href=\"https:\/\/sharedsecurity.net\/contact\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/contact<\/a><\/p>\n<p>Website: <a href=\"https:\/\/sharedsecurity.net\" rel=\"nofollow\">https:\/\/sharedsecurity.net<\/a><\/p>\n<p>Twitter: <a href=\"https:\/\/twitter.com\/sharedsec\" rel=\"nofollow\">https:\/\/twitter.com\/sharedsec<\/a><\/p>\n<p>Facebook: <a href=\"https:\/\/facebook.com\/sharedsec\" rel=\"nofollow\">https:\/\/facebook.com\/sharedsec<\/a><\/p>\n<p>Instagram: <a href=\"https:\/\/instagram.com\/sharedsecurity\" rel=\"nofollow\">https:\/\/instagram.com\/sharedsecurity<\/a><\/p>\n<p>YouTube: <a href=\"https:\/\/www.youtube.com\/c\/SharedSecurityPodcast\" rel=\"nofollow\">https:\/\/www.youtube.com\/c\/SharedSecurityPodcast<\/a><\/p>\n<p>The post TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption appeared first on The Shared Security Show.<\/p>\n<p>Recent Articles By Author<\/p>\n<p>*** This is a Security Bloggers Network syndicated blog from The Shared Security Show authored by Tom Eston. Read the original post at: <a href=\"https:\/\/sharedsecurity.net\/2020\/10\/19\/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption\/\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/2020\/10\/19\/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption\/<\/a> <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityboulevard.com\/2020\/10\/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption\/\" title=\"TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption - Security Boulevard\" rel=\"noopener noreferrer\">TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption - Security Boulevard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and Zooms rollout of end-to-end encryption. ** Links mentioned on the show ** The Social Dilemma A Conversation about the Pros and Cons of Social Mediahttps:\/\/sharedsecurity.net\/2020\/10\/12\/the-social-dilemma\/ Microsoft and others orchestrate takedown of TrickBot botnethttps:\/\/blogs.microsoft.com\/on-the-issues\/2020\/10\/12\/trickbot-ransomware-cyberthreat-us-elections\/ Hackers used VPN flaws to access US govt elections support systemshttps:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-283a Zoom to roll out end-to-end encrypted (E2EE) callshttps:\/\/blog.zoom.us\/zoom-rolling-out-end-to-end-encryption-offering\/ ** Watch this episode on YouTube ** <a href=\"https:\/\/www.youtube.com\/c\/SharedSecurityPodcast\" rel=\"nofollow\">https:\/\/www.youtube.com\/c\/SharedSecurityPodcast<\/a> ** Thank you to our sponsors! ** Silent Pocket Visit <a href=\"https:\/\/silent-pocket.com\" rel=\"nofollow\">https:\/\/silent-pocket.com<\/a> to check out Silent Pockets amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code sharedsecurity<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-45086","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/45086"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=45086"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/45086\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=45086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=45086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=45086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}