Archive for May, 2012

May 24, 2012, Episode 260, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 24, 2012 by datasecurityblog

Episode 260 of The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Rick Comeau, Center for Internet Security (CIS) begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 260 via the flash player:

Interview

David Cowen, on Anti Anti Digital Forensics. Here is his blog.

Tales From The Dark Web

Social Media + Social Engineering + Malware = Bad News

Our Take on This Weeks News

Trojan attempts to defeat multi-factor authentication . Here is the free liveCD that will by-pass these attacks, Lightweight Portable Security.

Eugene Kaspersky frustrated by Apple’s iOS AV ban

UK Attacker infiltrated the Facebook page of pop star Justin Bieber’s girlfriend — and threatened to publish their private emails.

Wrap

The Zenith Flash-Matic wireless remote creator, dies

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 17, 2012 by datasecurityblog

Episode 259 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. The interview with Chester Wisniewski Apple Expert at Sophos Security begins at about 13:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 259 via the flash player:

Interview

From the floor of Interop Las Vegas: Chester Wisniewski Apple Expert at Sophos Security

Tales From The Dark Web

If you’re seeing ads on Wikipedia, your computer is probably infected with malware

Our Take on This Weeks News

ElcomSoft Helps Investigate Crime Providing Yet Another Way to Break into iOS with iCloud Attack

Apple posts twin security updates for OS X Leopard

Wrap

Heavy sleeper? Tired of snoozing past your alarm? Use the ‘smartphone in a cup’ trick to crank the volume!

May 7, 2012, Episode 257, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on May 7, 2012 by datasecurityblog

Episode 258 of The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Rick Comeau, Center for Internet Security (CIS) begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 258 via the flash player:

Interview

From  Interop Las Vegas, we talk with Rick Comeau, Center for Internet Security, Mitigation Strategies Crosswalk

Tales From The Dark Web

PHP web server flaw, patch ineffective

Our Take on This Weeks News

FBI wants backdoors openned into VoIP, IM, more

OS X encryption flaw, made worse by Apple?

Wrap

Blueseed pirate developer’s ship

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on May 1, 2012 by datasecurityblog

Episode 257 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with the Hon. Paul Chertoff, begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 257 via the flash player:

Interview

From the floor of the Forensic Expert Witness Association, we talk with Judge Paul Chertoff.

Tales From The Dark Web

Hotmail Password Fix Arrives Too Late For Many

Our Take on This Weeks News

NYTimes: Data Harvesting at Google Not a Rogue Act, Report Finds

The Hill: Lawmakers push bill to ban bosses from asking for Facebook passwords

The Reg: Win Phone 7 not ready for security role

Wrap

Buy Followers Your Social Networking Account!

Follow

Get every new post delivered to your Inbox.

Join 1,126 other followers