Archive for January, 2012

Jan 31, 2012, Episode 246

Posted in darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 31, 2012 by datasecurityblog

Episode 246 of  The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Ros with Labdoo.org begins at about 12min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 246 via the flash player:

Interview

Jordi Ros is an executive with Labdoo.org. The goal of Labdoo is to use grassroots, decentralized, social networking tools to efficiently bring excess laptops, preloaded with Linux,  to the children in the developing world. Find out more at Labdoo.org .

Tales From The Dark Web

Iframe shop spins hijacked traffic. Read more at SCMagazine.

Our Take on This Weeks News

Warning: Driveby Spam Infects PCs When E-Mail Is Opened

Stealing smartphone crypto keys using plain old radio. Read more at ITWorld.

Wrap

Meet Bill Gates, the Man Who Changed Open Source Software. Read The Wired Story.

Jan 24, 2012, Episode 245

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on January 24, 2012 by datasecurityblog

Episode 245  of  The CyberJungle is about 27 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Tantry CEO of FoxTechnology on server protection after the Zappos Breach starts at about 15min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 245 via the flash player:

Interview

Subhash Tantry, CEO of FoxT on server access security in the wake of the Zappos Breach. More of the FoxT ServerControl app mentioned in the interview can be found here.

Tales From The Dark Web

Why malware, keylogging, webcams and young women don’t mix: The Hacker (sic) is Watching, from GQ magazine

Our Take on This Weeks News

Ira Victor appeared on The Tom Sullivan TV program on Fox Business TV on January 21, 2011 about the InfoSec impact of SOPA/PIPA. Here is an excerpt from The Tom Sullivan nationally syndicated radio program.

Judge: Americans can be forced to decrypt their laptops. Read the coverage from Declan McCullagh at cnet.

Wrap

BBC Worldwide set to launch major new Doctor Who game: The Eternity Clock

January 17, 2011 – Episode 244

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on January 17, 2012 by datasecurityblog

Episode 244  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  M1ster_E on the CyberMilitia begins at about 16min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 244 via the flash player:

Interview

M1ster_E on the CyberMilitia. Join this Reddit area to help fight members of the Dark Web

Our Take On This Week’s News

Zappos Breach Illustrate the Need for Stronger Password Rules

Malware stole City College of San Francisco data for years

Tales From The Dark Web

Spam Emails Link To QR Codes

Wrap

The Qualcomm Tricorder X PRIZE

Jan 10, 2012, Episode 243: InfoSec Coverage at CES2012

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on January 10, 2012 by datasecurityblog

Episode 243  of  The CyberJungle is about 31 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Nixon an engineer from OnStar begins at about 15min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 243 via the flash player:

Interview

Tim Nixon Executive Director for Infotainment and OnStar Engineering, talks data security and digital forensics from the floor of CES2012 in Las Vegas. The communications contact at OnStar is: Scott Fossguard, scott.fosgard (at) gm.com  or phone him on 1-313-665-3142

Tales From The Dark Web

New attack uses AJAX to by-pass anti-malware

Our Take on This Weeks News

A new major flaw in consumer-grade WiFi routers. Read more on ArsTechnica, and LifeHacker

Stratfor breach might lead to leap-frog enterprise breaches . Matthijs R. Koot’s email forensic analysis of the pre-breach vs. fake vs. post breach authentic Stratfor email may be found here.

Did a California city order staff to commit spoliation?

Wrap

Shot in the arm for LinuxMint

Follow

Get every new post delivered to your Inbox.

Join 1,140 other followers