Podchaser Logo
Home
Encore: endpoint (noun) [Word Notes]

Encore: endpoint (noun) [Word Notes]

Released Tuesday, 21st May 2024
Good episode? Give it some love!
Encore: endpoint (noun) [Word Notes]

Encore: endpoint (noun) [Word Notes]

Encore: endpoint (noun) [Word Notes]

Encore: endpoint (noun) [Word Notes]

Tuesday, 21st May 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:02

You're listening to the CyberWire Network

0:04

powered by N2K. The

0:16

word is endpoint. Spelled

0:22

E as in email, N as

0:24

in noob, D as in device,

0:27

P as in ping, O as

0:29

in ope. Overflow, I as in

0:32

infinite, N as in

0:34

noop, and T as in Thomas.

0:43

Definition 1. A hardcore punk band

0:45

out of Louisville. Definition

0:47

2. A recursive definition. A

0:50

device connected to a network

0:52

that accepts communications from other

0:54

endpoints like laptops, mobile devices,

0:56

IoT equipment, router switches, and

0:58

any tool on the security

1:00

stack. Example

1:06

sentence. Most organizations have

1:08

a large number of endpoints connected in

1:11

their networks. Origin

1:20

and context. In the early

1:22

days of computing, the first endpoints were

1:24

big mainframes. By the

1:26

1970s, researchers began experimenting with self-replicating

1:28

code distributed to those endpoints via

1:31

their common networks, like the creeper

1:33

worm written by Bob Thomas in

1:35

1971. By

1:38

the 1980s, personal computers had entered the market,

1:40

and in 1986, the Brain Boot sector virus

1:44

started to propagate. According

1:47

to Daniel Snyder at InfoCarnivore, Brain

1:49

Boot came with contact information for the

1:51

authors who created it. It

1:54

was a simpler time. By the late 1980s,

1:57

the first antivirus programs started appearing

1:59

as freeways. or shareware tools.

2:01

Between 1987 and 1989, researchers

2:04

used a bulletin board chat group

2:06

called Virus L to exchange information,

2:09

tools, and shareware for the purpose

2:11

of removing virus infections. By

2:13

the early 1990s, personal computers, the

2:16

new endpoints, became common office

2:18

tools and commercial antivirus vendors catered

2:20

both to the home user and

2:23

business IT shops. But it

2:25

was clear at this point that endpoints

2:27

must be protected in cyberspace. Cybersecurity

2:35

nerd lore. One of

2:37

the Virus L bulletin board chat group

2:39

members was John McAfee. In

2:42

1989, McAfee started his own endpoint

2:44

protection company, McAfee Associates, and in

2:47

a few short years became one

2:49

of the most famous and eventually

2:51

infamous cybersecurity personalities ever. In

2:54

1992, he launched a marketing campaign

2:56

that warned the world of the

2:58

Michelangelo virus that he claimed could

3:00

already be infecting up to 5

3:02

million PCs worldwide. He predicted

3:05

that on 6th March of that year, it

3:07

would destroy the data on all those infected

3:09

hard drives. Sales, boom. According

3:12

to Andrew Kaus at the website Digital

3:14

Trends, by that March, at least half

3:16

the Fortune 500 companies had

3:19

deployed the McAfee Associates antivirus

3:21

product. But on 7th March,

3:23

nothing happened. Security pundits

3:25

accused Mr. McAfee of fabricating the entire

3:27

thing. But 1994,

3:30

Mr. McAfee's reputation was so bad that the

3:32

board forced him out of his company with

3:34

a whopping $100 million

3:36

severance package. After

3:39

that, he dabbled into a few

3:41

other businesses, became a yoga guru,

3:43

and enthusiastically embraced the sport of

3:45

aero-treking, an insane sport which, according

3:47

to Clouts, involves soaring through the

3:49

air on a half-motorcycle, half-hang glider

3:51

contraption called a kite plane. After

3:54

an accident where two people died, Mr. McAfee

3:56

fled the Belize to escape a lawsuit. where

4:00

the real craziness kicked in. With

4:02

alleged paranoia, a harem of

4:05

allegedly underaged women, alleged drugs,

4:07

alleged mercenaries, and potentially alleged

4:09

murder. Allegedly. Oh,

4:12

also libertarian politics and YouTube

4:14

videos flagging this former tragedy.

4:33

Hi everybody, it's Maria Varmazis here,

4:35

your host over at T-Minus Space

4:37

Daily, and sometimes a guest on

4:40

Hacking Humans 2. We

4:42

here at N2K CyberWire work hard to

4:44

bring you concise, intelligence-driven news

4:47

and commentary, and we'd

4:49

like to know how we're doing. Please

4:51

take a few minutes to complete

4:53

our audience survey and share your

4:55

feedback to help us continue to

4:57

grow and meet your needs. Visit

5:01

cyberwire.com/survey. That's

5:04

cyberwire.com/survey to

5:06

get started.

5:09

Thanks so much for your input as we reach

5:11

for the stars. It means the universe to us.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features