Archive for April, 2012

April 23, 2012, Episode 256, Show Notes

Posted in Breach, criminal forensics, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , on April 23, 2012 by datasecurityblog

Episode 256 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 256 via the flash player:

Interview

Exclusive: David Espinosa, a geek runs for the State House. His web site and Twitter Feed.

Tales From The Dark Web

Pardon the audio quality as we upgrade to a new studio; Tales from The Dark Web is on a break.

Our Take on This Weeks News

Trojans attack point of sale systems.

CypherDocs helps you encrypt cloud files.

Wrap

Is that an Altoids in your pocket or are you trying to attack us?

Thin Ice and social engineering

April 17, 2012, Episode 255, Show Notes

Posted in Breach, Court Cases, criminal forensics, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on April 17, 2012 by datasecurityblog

Episode 255 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 255 via the flash player:

Interview

Exclusive: James Bologna from Thomson Reuters on security process

Tales From The Dark Web

Pardon the audio quality as we upgrade to a new studio; Tales from The Dark Web is on a break.

Our Take on This Weeks News

Email snooping by IT administrators

Apple posts separate Flashback removal tool

Is Google invading privacy with ReCAPTHA RePurposing?

 

Wrap

FBI track Anonymous hacker using his girlfriend’s boobs

April 11, 2012, Episode 254, Show Notes

Posted in Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on April 11, 2012 by datasecurityblog

Episode 254 of The CyberJungle is about 28 minutes long.  Pardon the audio quality as we upgrade to a new studio. You can hear it by clicking on the flash player below.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 254 via the flash player:

Interview

“Mikeyy the Twitter Attacker”

Tales From The Dark Web

Due to our temporary studio digs, Tales from the Dark Web will not appear this week.

Our Take on This Weeks News

GAO takes IRS to task – again – over information security lapses

How do you know if you are infected with the Mac FlashbackTrojan

Your AT&T wireless bill may link to malware

Wrap

Mercedes-Benz Will Soon Be Able To Upgrade [The Software On] Your Car Remotely

April 4, 2012, Episode 253, Show Notes

Posted in Conference Coverage, Court Cases, criminal forensics, Legislation, Show Notes, The CyberJungle with tags , , , on April 4, 2012 by datasecurityblog

Episode 253 of The CyberJungle is about 23 minutes long.  You can hear it by clicking on the flash player below. We are in a temporary studio, as the main studio undergoes an upgrade. We apologize for the weaker audio quality. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 253 via the flash player:

Interview

From ISC West conference 2012, we talk with Kevin Kjosa, Assistant Director, The Center for Infrastructure Assurance at UT Austin

Tales From The Dark Web

On a break as we transition to a new studio

Our Take on This Weeks News

Cell Phone Location Tracking Public Records Request, from the ACLU

ATT violating its own policy when selling data to LE?

OnStar Lets You [and Law Enforcement] Track You and Your Spouse

Apple [Dropbox, box.net, others,] holds the master decryption key when it comes to….security, privacy

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers