Break And Enter Dropbox - Amazon Key Gets Hacked - ThreatWire




Threat Wire show

Summary: <p>Amazon’s Key has another vulnerability, Apple’s source code gets leaked, and cryptomining hits government sites. All that coming up now on ThreatWire.</p><br> <p>Special thanks to MG for contributing to this episode! <a href="https://twitter.com/_MG_/">https://twitter.com/_MG_/</a> </p><br> <p>-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆<br>Shop → <a href="http://www.hakshop.com">http://www.hakshop.com</a> <br>Subscribe → <a href="http://www.youtube.com/hak5">http://www.youtube.com/hak5</a> <br>RSS Feeds → <a href="https://www.hak5.org/subscribe">https://www.hak5.org/subscribe</a> <br>Support → <a href="http://www.patreon.com/threatwire">http://www.patreon.com/threatwire</a> </p><br> <p>Our Site → <a href="http://www.hak5.org">http://www.hak5.org</a> <br>Contact Us → <a href="http://www.twitter.com/hak5">http://www.twitter.com/hak5</a> <br>Threat Wire RSS → <a href="https://shannonmorse.podbean.com/feed/">https://shannonmorse.podbean.com/feed/</a> <br>Threat Wire iTunes → <a href="https://itunes.apple.com/us/podcast/threat-wire/id1197048999">https://itunes.apple.com/us/podcast/threat-wire/id1197048999</a> </p><br> <p>Help us with Translations! → <a href="http://www.youtube.com/timedtext_cs_panel?tab=2&amp;c=UC3s0BtrBJpwNDaflRSoiieQ">http://www.youtube.com/timedtext_cs_panel?tab=2&amp;c=UC3s0BtrBJpwNDaflRSoiieQ</a> </p><br> <p>For Business Inquiries, please use our contact forms → <a href="https://www.hak5.org/contact">https://www.hak5.org/contact</a> </p><br> <p>Producer: Shannon Morse → <a href="https://www.youtube.com/shannonmorse">https://www.youtube.com/shannonmorse</a> <br>Editor: Colleen Cavolo<br>Host: Shannon Morse → <a href="https://www.twitter.com/snubs">https://www.twitter.com/snubs</a> <br>Host: Darren Kitchen → <a href="https://www.twitter.com/hak5darren">https://www.twitter.com/hak5darren</a> <br>Host: Mubix → <a href="http://www.twitter.com/mubix">http://www.twitter.com/mubix</a> <br>-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆</p><br> <p><br>https://twitter.com/_MG_/status/960269383774842881<br>https://medium.com/@_MG_/amazon-key-burglary-as-a-service-b296820a20d0<br>http://www.zdnet.com/article/after-dismissing-security-flaw-amazon-patches-key-smart-lock-anyway/</p><br> <p>https://motherboard.vice.com/en_us/article/a34g9j/iphone-source-code-iboot-ios-leak<br>https://github.com/github/dmca/blob/master/2018/2018-02-07-Apple.md<br>https://www.cnet.com/news/apple-calls-leaked-iphone-source-code-outdated/</p><br> <p>https://scotthelme.co.uk/protect-site-from-cryptojacking-csp-sri/<br>https://twitter.com/Scott_Helme/status/962684239975272450<br>https://publicwww.com/websites/browsealoud.com%2Fplus%2Fscripts%2Fba.js/<br>https://www.texthelp.com/en-gb/company/corporate-blog/february-2018/data-security-investigation-underway-at-texthelp/<br>https://www.troyhunt.com/the-javascript-supply-chain-paradox-sri-csp-and-trust-in-third-party-libraries/</p><br> <p><br>Youtube Thumbnail credit:<br>https://medium.com/@_MG_/amazon-key-burglary-as-a-service-b296820a20d0 </p>