In 1961, the digital future was just starting to come to fruition. And the Bell System had a number of products that had either just come onto the market, or were incipient, that implemented these new computer technologies. In December 1960, AT&T had just announced an investment of $2.5 billion for satellite communications and improving the network for data services and computer communication.
In 1958, AT&T had just announced its first modem. Springing from technologies used for the computerized navigation of missiles, the modem, i.e. the Data-Phone, was rolled out in a few markets in the midwest. It would be made commercially available throughout the network by 1960. The Data-Phone could transmit at up to a bit-rate of 110 bits per second.
This film breaks into approximately two parts — part I: the problems of the present, and part II: the way those problems could be solved by the technology of the future. This film not only serves as almost the birth of the information age, it also projects that technology far into the future.
The commercial products that would allow this connected, computer-communicating network? They're basic, but at the time seemed radical:
* The wireless Bellboy Pager, which was introduced commercially in 1962 * The Data-phone, which was supposed to revolutionize business communications * The videophone—shown as a credit-card-reading vertical two-way television * The card-reading phone or automatic dialer, which would dial a number from small plastic punch cards, introduced in 1961 * Oh, and package delivery via rocket (which had just been tested in 1959).
Producer: Henry Strauss Productions Writer: Jerome Alden Director: Robert Wilmot
Henry Strauss made a number of films for the Bell System, including Family Affair, and Manmade Troubles.
Footage Courtesy of AT&T Archives and History Center, Warren, NJ
In 1961, the digital future was just starting to come to fruition. And the Bell System had a number of products that had either just come onto the market, or were incipient, that implemented these new computer technologies. In December 1960, AT&T had just announced an investment of $2.5 billion for satellite communications and improving the network for data services and computer communication.
In 1958, AT&T had just announced its first modem. Springing from technologies used for the computerized navigation of missiles, the modem, i.e. the Data-Phone, was rolled out in a few markets in the midwest. It would be made commercially available throughout the network by 1960. The Data-Phone could transmit at up to a bit-rate of 110 bits per second.
This film breaks into approximately two parts — part I: the problems of the present, and part II: the way those problems could be solved by the technology of the future. This film not only serves as almost the birth of the information age, it also projects that technology far into the future.
The commercial products that would allow this connected, computer-communicating network? They're basic, but at the time seemed radical:
* The wireless Bellboy Pager, which was introduced commercially in 1962 * The Data-phone, which was supposed to revolutionize business communications * The videophone—shown as a credit-card-reading vertical two-way television * The card-reading phone or automatic dialer, which would dial a number from small plastic punch cards, introduced in 1961 * Oh, and package delivery via rocket (which had just been tested in 1959).
Producer: Henry Strauss Productions Writer: Jerome Alden Director: Robert Wilmot
Henry Strauss made a number of films for the Bell System, including Family Affair, and Manmade Troubles.
Footage Courtesy of AT&T Archives and History Center, Warren, NJFIDO2: Hardware Token or Users Device? | AT&T ThreatTraqAT&T Tech Channel2023-05-23 | Brian Rexroad and Mel Dale of the AT&T Chief Security Office discuss the FIDO2 authentication standard and which devices could deliver the best user experience for an enterprise or consumer.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comCyber Skills You May Already Have | AT&T ThreatTraqAT&T Tech Channel2023-04-24 | Tony Tortorici and Matt Keyser of the AT&T Chief Security Office discuss innovative paths for a career in cybersecurity with Jenai Marinkovic, Executive Director of GRC for Intelligent Ecosystem (GRCIE).
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comCybersecurity Predictions for 2023 | AT&T ThreatTraqAT&T Tech Channel2023-01-23 | Brian Rexroad, Jon Gannon and Jennifer Morovitz of the AT&T Chief Security Office discuss predictions for 2023 about developments in the regulatory environment and vulnerability management.
Originally recorded on December 12, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comPhishing, Smishing and Vishing | AT&T ThreatTraqAT&T Tech Channel2022-10-24 | Ganesh Kasina and George Graziano of the AT&T Chief Security Office review the dangers of phishes, smishes and vishes and give advice on how to avoid falling for them.
Originally recorded on October 18, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comBlack Hat & DEF CON 2022: The Hacker Summer Camp | AT&T ThreatTraqAT&T Tech Channel2022-08-22 | John Markley and Matt Keyser of the AT&T Chief Security Office discuss interesting presentations from this year’s events.
Originally recorded on August 16, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comUpdated Traffic Light Protocol (TLP) | AT&T ThreatTraqAT&T Tech Channel2022-08-16 | David Yelavich and Jim Clausing of the AT&T Chief Security Office discuss FIRST’s updated Traffic Light Protocols (TLP) for the sharing of potentially sensitive information.
Originally recorded on August 8, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comIndustrial Control System (ICS) Vulnerabilities | AT&T ThreatTraqAT&T Tech Channel2022-08-09 | Chris DeRocco, Jim Clausing and Matt Keyser of the AT&T Chief Security Office discuss potential security vulnerabilities in Industrial Control Systems and how to protect them.
Originally recorded on August 2, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comBest Security Practices for Azure Kubernetes Service (AKS) | AT&T ThreatTraqAT&T Tech Channel2022-07-25 | Chris DeRocco and Kim Withers of the AT&T Chief Security Office explore the best security practices for Azure Kubernetes Service (AKS)
Originally recorded on July 6, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comWhat’s on 17000/TCP?| AT&T ThreatTraqAT&T Tech Channel2022-07-13 | Ganesh Kasina and George Graziano of the AT&T Chief Security Office explore the latest activity around port 17000/TCP.
Originally recorded on June 28, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comA Deep Dive into Symbiote Linux Malware| AT&T ThreatTraqAT&T Tech Channel2022-06-20 | Ganesh Kasina and George Graziano of the AT&T Chief Security Office explore the latest activity around Symbiote Linux malware.
Originally recorded on June 14, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comIs it UDP in the End?| AT&T ThreatTraqAT&T Tech Channel2022-06-13 | David Yelavich and Jim Clausing of the AT&T Chief Security Office give an intro to the next generation web protocol, HTTP/3.
Originally recorded on June 8, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comBest Practices for Securing IDs in the Cloud | AT&T ThreatTraqAT&T Tech Channel2022-06-03 | Chris deRocco and Ken Walsh from AT&T Chief Security Office discuss the best practices developers should take to secure their IDs in the cloud.
Originally recorded on April 24, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2021 AT&T Security Conference HighlightsAT&T Tech Channel2022-06-01 | The 2021 AT&T Security Conference gave us all a chance to explore what we can do to help Secure the Everything. Experts from industry and government shared their perspectives on today's threat landscape and offered techniques we can use to protect what matters most.
Register for the 2022 AT&T Security Conference at security-conference.att.comTop 5 Security Mistakes Developers Should Avoid | AT&T ThreatTraqAT&T Tech Channel2022-05-19 | Andy Benavides, Matt Keyser and Daniel O’Hern of the AT&T Chief Security Office discuss the 5 security mistakes developers sometimes make and how to avoid them.
Originally recorded on May 10, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comStorm Brewing on Port 389/UDP and the Meris Botnet | AT&T ThreatTraqAT&T Tech Channel2022-05-05 | Stan Nurilov and Manish Jain of the AT&T Chief Security Office discuss activity on Port 389/UDP and what it could be telling us. They also analyze the Meris Botnet.
Originally recorded on April 26, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comBreaking Down Cyclops Blink | AT&T ThreatTraqAT&T Tech Channel2022-04-21 | Ganesh Kasina and George Graziano of the AT&T Chief Security Office discuss the traffic changes on associated C2 ports caused by the Cyclops Blink malware. thehackernews.com/2022/04/fbi-shut-down-russia-linked-cyclops.html
The Episode follows ports: 636 : LDAPS 989 : FTPS Protocol (DATA) 990: FTPS Protocol (CONTROL) 992: TELNET Protocol over TLS/SSL 994: ircs [Secure IRC] 995: pop3s [POP3 over TLS/SSL] 3269: msft-gc-ssl [Microsoft Global Catalog with LDAP/SSL] 8443: Pcsync HTTPS [ Common alternate HTTPS port]
Originally recorded on April 12, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comWhat You Can Learn from Log4J | AT&T ThreatTraqAT&T Tech Channel2022-04-19 | Jason Neidecker, Katie Alvarez, Michael Stair, and Tony Tortorici of the AT&T Chief Security Office look back at the Log4J vulnerability and discuss lessons learned about how to respond to incidents like this in the future.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comWhat are Hackers Doing on Your Server? | AT&T ThreatTraqAT&T Tech Channel2022-04-08 | Jim Clausing, John Markley and Matt Keyser of the AT&T Chief Security Office discuss a demo of simple tools used to find suspicious activity on a server.
Matt shares some interest port activity on Internet Weather: Port 52869/TCP (Realtek SDK Miniigd UPnP SOAP) Port 55555/TCP (UPnP?)
Originally recorded on April 5, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comContainerize This! How to Dockerize your JVM AppsAT&T Tech Channel2022-03-23 | Yaniv Nahoum of AT&T discusses efforts to dockerizing image size and build-time, increasing image security and tune the Java virtual machine software to your needs aimed for software developers and DevOps engineersFive PowerShell Practical One Liners| AT&T ThreatTraqAT&T Tech Channel2022-03-23 | David Yelavich, along with his colleagues, Manny Ortiz and Matt Keyser of the AT&T Chief Security Office, demos five PowerShell commands you may not know exist but can come in handy for incident response. Also, the Internet Weather covers these ports: Port 9010/TCP (HikVision Ezviz) Port 5555/TCP (Android Remote Debug)
Originally recorded on March 15, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2/17/22 Internet Weather Report| AT&T ThreatTraqAT&T Tech Channel2022-02-17 | Ports • Port 139/TCP (NetBIOS) • Port 443/TCP (HTTPS) • Port 445/TCP (SMB) • Port 2323/TCP (Telnet alternate)
Matt Keyser, Brian Rexroad and Manish Jain of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on February 17, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2/17/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-02-17 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Originally recorded on February 17, 2022. AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com.Crypto Users Lose Funds After BGP Hijack| AT&T ThreatTraqAT&T Tech Channel2022-02-17 | https://therecord.media/klayswap-crypto-users-lose-funds-after-bgp-hijack/
Hackers steal $1.9 million in KLAYswap attack. Matt Keyser, Brian Rexroad and Manish Jain of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Spambots are rampant in social media. How do they work? How can you stop them? Matt Keyser, Brian Rexroad and Manish Jain of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on February 17, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2/10/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-02-10 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Originally recorded on February 8, 2022. AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com.2/10/22 Internet Weather Report| AT&T ThreatTraqAT&T Tech Channel2022-02-10 | Ports Meris Botnet SOCKS Proxy
Stan Nurilov, Tony Tortorici and George Graziano of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on February 8, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comPoisoned Productivity Tool Searches| AT&T ThreatTraqAT&T Tech Channel2022-02-10 | Batloader and Atera Agent malware target professionals searching for productivity tools. Stan Nurilov, Tony Tortorici and George Graziano of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Microsoft announced they will make it difficult to enable VBA macros. Stan Nurilov, Tony Tortorici and George Graziano of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
IRS will transition away from using facial recognition to help authenticate people creating new online accounts. Stan Nurilov, Tony Tortorici and George Graziano of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
North Korean hackers are using a Windows update to infect PCs with malware. Ganesh Kasina, Andy Benavides and Chris deRocco of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on February 1, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2/3/22 Internet Weather Report| AT&T ThreatTraqAT&T Tech Channel2022-02-03 | Ports Port 389/udp Port 18888/tcp
Ganesh Kasina, Andy Benavides and Chris deRocco of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on February 1, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com2/3/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-02-03 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
LockBit Ransomware evolves to target Linux Systems. Ganesh Kasina, Andy Benavides and Chris deRocco of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
More than 45,000 devices have been compromised in a widely distributed UPnP NAT injection campaign. Ganesh Kasina, Andy Benavides and Chris deRocco of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
How to assess and prioritize vulnerabilities. John Hogoboom and Manny Ortiz of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 26, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com1/28/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-01-28 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Originally recorded on January 26, 2022. AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com.1/28/22 Internet Weather Report| AT&T ThreatTraqAT&T Tech Channel2022-01-28 | Ports Protocol 47 (GRE) Ports 2375/tcp and 2376/tcp (Docker) Port 8883/tcp (alternate http)
John Hogoboom and Manny Ortiz of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
A memory corruption vulnerability found in polkit’s pkexec allows any unprivileged user to gain full root privileges on a vulnerable host. John Hogoboom and Manny Ortiz of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 26, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com1/20/22 Internet Weather Report | AT&T ThreatTraqAT&T Tech Channel2022-01-20 | Ports Port 5555/TCP (Android Remote Debug Bridge) Port 389/UDP (LDAP)
Matt Keyser and Jim Clausing of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 18, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com1/20/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-01-20 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Researchers outline vulnerabilities that commonly occur in kernel drivers. Matt Keyser and Jim Clausing of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 18, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comHospital Stops Ransomware Attack with Quick Thinking | AT&T ThreatTraqAT&T Tech Channel2022-01-20 | How quick thinking stopped a ransomware attack from crippling a Florida hospital - CNNPolitics
Hospital stops ransomware within hours of the attack by quick thinking and good planning. Matt Keyser and Jim Clausing of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 18, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comUndetected RAT - Until Now | AT&T ThreatTraqAT&T Tech Channel2022-01-20 | Malware detected that was written from scratch for systems running Windows, macOS, or Linux. Matt Keyser and Jim Clausing of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 18, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com1/13/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-01-14 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Originally recorded on January 11, 2022. AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com.1/13/22 Internet Weather Report | AT&T ThreatTraqAT&T Tech Channel2022-01-14 | Ports: Port 389/udp Port 20005/tcp Port 8291/tcp and 8728/tcp
Stan Nurilov, John Markley and Michael Klepper of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Norton 360 now ships with a program which lets customers make money mining virtual currency. Stan Nurilov, John Markley and Michael Klepper of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 11, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.comThe Markley Quiz| AT&T ThreatTraqAT&T Tech Channel2022-01-14 | The analysts dissect a common smishing text message. Stan Nurilov, John Markley and Michael Klepper of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
A vulnerability found in smart home iOS app that can exploited to crash iOS devices. Stan Nurilov, John Markley and Michael Klepper of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Attackers could remotely exploit a high severity flaw in KCodes NetUSB to execute code in the kernel. Stan Nurilov, John Markley and Michael Klepper of the AT&T Chief Security Office discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network.
Originally recorded on January 11, 2022.
AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com1/6/22 ThreatTraq Essentials| AT&T ThreatTraqAT&T Tech Channel2022-01-06 | AT&T ThreatTraq Producer Don Heatley reviews everyday cybersecurity lessons that can be learned from this week’s stories.
Originally recorded on January 4, 2022. AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com.