Archive for February, 2012

Feb 28, 2012, Episode 250

Posted in Conference Coverage, Court Cases, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on February 28, 2012 by datasecurityblog

Episode 250 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Dr. Catlett a futurist and economist that keynoted HIMSS2012 in Las Vegas, begins at about 15min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 250 via the flash player:

Interview

Dr. Lowell Catlett is a Regent’s Professor/Dean and Chief Administrative Officer at New Mexico State University’s College of Agricultural, Consumer and Environmental Sciences. An exciting futurist, his knowledge of technologies and their implications on the way we will live and work is addressed in his varied and upbeat presentations. You may email him using this address: lcatlett (at) nmsu.edu

Tales From The Dark Web

Email ‘Termination of your CPA license’ campaign serving client-side exploits

Our Take on This Weeks News

Tesla Motors’ Devastating Design Problem

“It’s A Brick” – Tesla Motors’ Devastating Design Proble

Multimodal Finger Vein and Fingerprint Technology from Safran

Wrap

Five Best PowerPoint Alternatives

Feb 20th 2012, Episode 249

Posted in Breach, Court Cases, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , on February 19, 2012 by datasecurityblog

Episode 249  of  The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Denis Foo Kane, a PhD candidate, and security researcher, begins at about 10:30; the interview with David Ting, the CTO of multifactor authentication systems provider Imprvata begins at about 20:50.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 249 via the flash player:

Interviews

Denis Foo Kune is a PhD candidate at the University of Minnesota, and co-author of the study Location leaks on the GSM air interface

David Ting, the CTO of Imprivata, and has more than 20 years of experience in developing advanced imaging software and systems for high security, high-availability systems. Prior to founding Imprivata he developed biometric applications for government programs and web-based applications for secure document exchange.  David blogs for Imprivata here.

Tales From The Dark Web

No Tales from The Dark Web this week, as we expand coverage for HIMSS2012 with the David Ting segment.

Our Take on This Weeks News

Electronic Frontier Foundation: Google Circumvents Safari Privacy Protections .

He doesn’t want to just read your mail, he wants reads everyone’s mail, he’s The Gmail Man.

Scott Cleland, author of the book, Search and Destroy, Why You Can’t Trust Google Inc., spoke with the CyberJungle in May 2011 about Google’s privacy practices.

Wrap

#nerdflix, partial list, the twitter-based list

Feb 14, 2012, Episode 248

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on February 14, 2012 by datasecurityblog

Episode 248 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Hadnagy a specialist in countering Social Engineering begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 248 via the flash player:

Interview

Chris Hadnagy is an expert in countering Social Engineering. The Social-Engineer.com Social Engineering Penetration Testers program is a 5-day immersion into the world of a professional social engineer. Find out more about the course here.

Tales From The Dark Web

How To Fight Anonymous: With Sarcasm.

Our Take on This Weeks News

Google disables prepaid cards in wake of Google Wallet exploit; Common smartphone PINs Ira spoke about.

Would smartphone remote shutdowns reduce robberies?

 

Feb 7, 2012, Episode 247

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on February 6, 2012 by datasecurityblog

Episode 247  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Dmitry Sumin the CEO of Passware begins at about 20min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 247 via the flash player:

Interview

Passware CEO Dmitry Sumin on a forensic tool to break Mac Encrypted FileVault and Encrypted KeyChain. Visit the Passware site and read the news release.

Tales From The Dark Web

Cybercriminals target law firms for their client’s data. Read the Bloomberg story.

Our Take on This Weeks News

Walled Gardens: What Commons Do We Wish For? How Facebook uses you as their product; click here for a version of the NYTimes story Ira Victor talked about, but without a paywall.

Updates:  Mal-mail research results and settings adjustments; and Marriott Attacker

Wrap

HIMSS National Conference Feb 20-24 2012 in Las Vegas. “Shelter from the Coming Malpractice Storm.” Co-presented by  Ira Victor. Will include research done on 100 hospitals, and cover the preemptive use of forensic tools to reduce medical malpractice litigation and settlement costs.

Follow

Get every new post delivered to your Inbox.

Join 1,100 other followers