<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 03:47:29 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Android Malware”</title>
    <link>https://techsnap.systems/tags/android%20malware</link>
    <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 361: It's All in the Log</title>
  <link>https://techsnap.systems/361</link>
  <guid isPermaLink="false">60c0569a-55b4-446f-bf42-6d017d933f4f</guid>
  <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/60c0569a-55b4-446f-bf42-6d017d933f4f.mp3" length="24152919" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
</itunes:subtitle>
  <itunes:duration>32:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 352: Stop Using apt-get </title>
  <link>https://techsnap.systems/352</link>
  <guid isPermaLink="false">a35e6ff5-f699-4f4a-b6dd-3f01fff2a445</guid>
  <pubDate>Mon, 22 Jan 2018 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a35e6ff5-f699-4f4a-b6dd-3f01fff2a445.mp3" length="26958801" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
</itunes:subtitle>
  <itunes:duration>36:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
Plus the news of the week that could impact your systems, feedback, and more. 
</description>
  <content:encoded>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
