Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:02
You're listening to the CyberWire Network
0:04
powered by N2K. The
0:16
word is endpoint. Spelled
0:22
E as in email, N as
0:24
in noob, D as in device,
0:27
P as in ping, O as
0:29
in ope. Overflow, I as in
0:32
infinite, N as in
0:34
noop, and T as in Thomas.
0:43
Definition 1. A hardcore punk band
0:45
out of Louisville. Definition
0:47
2. A recursive definition. A
0:50
device connected to a network
0:52
that accepts communications from other
0:54
endpoints like laptops, mobile devices,
0:56
IoT equipment, router switches, and
0:58
any tool on the security
1:00
stack. Example
1:06
sentence. Most organizations have
1:08
a large number of endpoints connected in
1:11
their networks. Origin
1:20
and context. In the early
1:22
days of computing, the first endpoints were
1:24
big mainframes. By the
1:26
1970s, researchers began experimenting with self-replicating
1:28
code distributed to those endpoints via
1:31
their common networks, like the creeper
1:33
worm written by Bob Thomas in
1:35
1971. By
1:38
the 1980s, personal computers had entered the market,
1:40
and in 1986, the Brain Boot sector virus
1:44
started to propagate. According
1:47
to Daniel Snyder at InfoCarnivore, Brain
1:49
Boot came with contact information for the
1:51
authors who created it. It
1:54
was a simpler time. By the late 1980s,
1:57
the first antivirus programs started appearing
1:59
as freeways. or shareware tools.
2:01
Between 1987 and 1989, researchers
2:04
used a bulletin board chat group
2:06
called Virus L to exchange information,
2:09
tools, and shareware for the purpose
2:11
of removing virus infections. By
2:13
the early 1990s, personal computers, the
2:16
new endpoints, became common office
2:18
tools and commercial antivirus vendors catered
2:20
both to the home user and
2:23
business IT shops. But it
2:25
was clear at this point that endpoints
2:27
must be protected in cyberspace. Cybersecurity
2:35
nerd lore. One of
2:37
the Virus L bulletin board chat group
2:39
members was John McAfee. In
2:42
1989, McAfee started his own endpoint
2:44
protection company, McAfee Associates, and in
2:47
a few short years became one
2:49
of the most famous and eventually
2:51
infamous cybersecurity personalities ever. In
2:54
1992, he launched a marketing campaign
2:56
that warned the world of the
2:58
Michelangelo virus that he claimed could
3:00
already be infecting up to 5
3:02
million PCs worldwide. He predicted
3:05
that on 6th March of that year, it
3:07
would destroy the data on all those infected
3:09
hard drives. Sales, boom. According
3:12
to Andrew Kaus at the website Digital
3:14
Trends, by that March, at least half
3:16
the Fortune 500 companies had
3:19
deployed the McAfee Associates antivirus
3:21
product. But on 7th March,
3:23
nothing happened. Security pundits
3:25
accused Mr. McAfee of fabricating the entire
3:27
thing. But 1994,
3:30
Mr. McAfee's reputation was so bad that the
3:32
board forced him out of his company with
3:34
a whopping $100 million
3:36
severance package. After
3:39
that, he dabbled into a few
3:41
other businesses, became a yoga guru,
3:43
and enthusiastically embraced the sport of
3:45
aero-treking, an insane sport which, according
3:47
to Clouts, involves soaring through the
3:49
air on a half-motorcycle, half-hang glider
3:51
contraption called a kite plane. After
3:54
an accident where two people died, Mr. McAfee
3:56
fled the Belize to escape a lawsuit. where
4:00
the real craziness kicked in. With
4:02
alleged paranoia, a harem of
4:05
allegedly underaged women, alleged drugs,
4:07
alleged mercenaries, and potentially alleged
4:09
murder. Allegedly. Oh,
4:12
also libertarian politics and YouTube
4:14
videos flagging this former tragedy.
4:33
Hi everybody, it's Maria Varmazis here,
4:35
your host over at T-Minus Space
4:37
Daily, and sometimes a guest on
4:40
Hacking Humans 2. We
4:42
here at N2K CyberWire work hard to
4:44
bring you concise, intelligence-driven news
4:47
and commentary, and we'd
4:49
like to know how we're doing. Please
4:51
take a few minutes to complete
4:53
our audience survey and share your
4:55
feedback to help us continue to
4:57
grow and meet your needs. Visit
5:01
cyberwire.com/survey. That's
5:04
cyberwire.com/survey to
5:06
get started.
5:09
Thanks so much for your input as we reach
5:11
for the stars. It means the universe to us.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More