Archive for July, 2011

July 25, 2011 – Episode 223

Posted in Court Cases, darkweb, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on July 25, 2011 by datasecurityblog

Episode 223 of  The CyberJungle is about 31 minutes long.  You may hear it by clicking on the flash player below. The interview begins at about 15min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show, including a direct link to our audio feeds.

To listen to Episode 223 via the flash player:

Interviews

Imperva CTO, Amichai Shulman on the web app attack preso you won’t see at BlackHat Las Vegas.  As a part of their ongoing Hacker Intelligence Initiative, Imperva has compiled a Web Application Attack Report (WAAR) that gives a new insight into attacks against the top 30 web applications based on more than 10 million individual attacks over the last 6 months.  WAAR outlines the frequency, type and geography of origin of each attack.  Surprisingly a little known type of attack has become very common. Blog.Imperva.com was the link mentioned in the segment

Our Take On This Week’s News

The CyberJungle Radio’s take on this Las Vegas Review Journal news story: Providing Wi-Fi as a perk has a price for businesses

Mac battery cyberflaw exposes explosive risk?

Wrap

No Soup For You! No over the air updates for jailbroken iOS5 powered devices, according to the ZDNet posting


Conference Coverage

The CyberJungle goes to BlackHat Las Vegas and DefCon19  week. Get the reports in Conference Notes starting the middle of next week.

July 19, 2011 – Episode 222

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 18, 2011 by datasecurityblog

Episode 222 of  The CyberJungle is about 35 minutes long, the interview starts at ~16:00 minutes.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 222 via the flash player:

Interview

What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric.

Our Take On This Week’s News

Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? Read the complete NSSLabs Report

Smashing hard drive leads to conviction for obstruction under SOX

Tales From the Dark Web

Crowd-sourcing the reporting of webmail hijacks

July 11, 2011 – Episode 221

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 10, 2011 by datasecurityblog

Episode 221 of  The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. The  interview starts at about 14:00 into the show. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 221 via the flash player:

Interview

T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use the techniques he learned while working in US Counter Intelligence. Bill Boni is the author of this book mentioned in the interview -  Netspionage: The Global Threat to Information

Our Take On This Week’s News

Hewlett Packard’s Laptop Lock Takes Only Seconds To Crack. Read the story, and see the video, in Marc Weber Tobias’ Forbes Column, TravelGeek.

Prosecutors Demanding Encryption Keys a Violation of The 5th Amendment?  EFF Urges Court to Uphold Privilege Against Self-Incrimination

Tales From The Dark Web

Android malware spies on your SMS messages – but is it part of the Zeus family?

Wrap

Picking the Lock of Google’s Local Search

July 05, 2011 – Episode 220

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 5, 2011 by datasecurityblog

Episode 220 of  The CyberJungle is about 34 minutes long. You can hear it by clicking on the flash player below. The interview begins at about 19min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 220 via the flash player:

Interview

Yaron Dycian, Trusteer VP: Will Fed’s new regs block banking trojans?

Our Take On This Week’s News

Bill could block some mobile device forensic captures

FoxNews’ Twitter account hijacked, what are the lessons learned?

Tales From The Dark Web

The malware detected by Kaspersky Anti-Virus as TDSS is the most sophisticated threat today

Wrap

MyMaxSpeed smartphone app could provide the evidence to fight speeding tickets


Conference Coverage

The CyberJungle went to the 2011 Gartner Security Summit this week. Get the reports in Conference Notes.

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers