Archive for July, 2012

August 1, 2012, Episode 267, Sin City Security Confabs

Posted in Breach, Conference Coverage, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 30, 2012 by datasecurityblog

Episode 267 of The CyberJungle is about 34 minutes long.  You can hear it by clicking on the flash player below. The interview with Moxie Marlinspike on PPTP VPN flaws, begins at about 8min. The interview with FX on router flaws begins at about 12min. The interview with David Kennedy on attacks that by-pass nearly every data defence begins at  about 23min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 267 via the flash player:

Interview

Moxie Marlspike on PPTP VPN flaws. Link to CloudCracker, ChapCrack, and Moxie’s site and projects.

FX talked about Huawei Router flaws.

CYBERJUNGLE RADIO EXCLUSIVE LIVE FROM SecurityBSides Las Vegas 2012 – David Kennedy on a Super Stealthy Attack That By-Passes Nearly All CyberDefences

Tales From The Dark Web

On a break this week. Rumors are that Tales From The Dark Web was spotted in the Lockpicking Village at DefCon

Our Take on This Weeks News

Apple Jury to Learn of Samsung Document Destruction

Elinor Mills’ story: NSA director finally greets Defcon hackers

Holman Jenkins’ story, including another take on the NSA: Can Data Mining Stop the Killing?

Wrap

Just about anything can happen at DefCon. Just ask this unlucky smartphone user.

July 24, 2012, Episode 266, Show Notes

Posted in Breach, Conference Coverage, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on July 24, 2012 by datasecurityblog

Episode 266 of The CyberJungle is about 29 minutes long.  You can hear it by clicking on the flash player below. The interview with Josh Sokol on “Symbiotic Security,” begins at about 16min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 266 via the flash player:

Interview

Exclusive: From SecurityBSidesLV, Josh Sokol on “Symbiotic Security”

Tales From The Dark Web

Tales From The Dark Web: Gaming Site Breach Reveals Attacker Tactics

Our Take on This Weeks News

Warning to HR Departments Using SocialMedia

ASLR in Android to Help Thwart Malware

Easy Attack on Hotel Door Locks

Wrap

Follow Ira Victor on Twitter for updates from BlackHat, SecurityBSides, and DefCon. As news warrants, content may appear in CyberJungle Conference Notes.

June 17, 2012, Episode 265, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on July 17, 2012 by datasecurityblog

Episode 264 of The CyberJungle is about 44 minutes long.  You can hear it by clicking on the flash player below. The interview with Billy Rios on the weaknesses in Industrial Control Systems begins at about 12:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 265 via the flash player:

Interview

Billy Rios’ weekend research led to a DHS Alerts on building control systems. Here is his blog, as mentioned in the segment.

Tales From The Dark Web

Malware Turning Smartphones into a Botnet?

Our Take on This Weeks News

Anonymous hackers target oil industry giants, more than 1,000 email credentials exposed

Links to the hashed data buckets

Wrap

Secondary market signals huge drop in MacBook values.

July 11, 2012, Episode 264, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 11, 2012 by datasecurityblog

Episode 264 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 264 via the flash player:

Interview

F. Michael Maloof: China: ‘Pervasive access’ to 80% of telecoms ; G2 Bulletin

Tales From The Dark Web

USB Drive, Malware and Industrial Control Systems. Read the CERT Report.

Our Take on This Weeks News

Uncovering Privacy Issues With Mobile App Advertising

Patch Tuesday: Microsoft pushes nine fixes for 16 flaws

Anon in Buenos Ares Argentina?

Wrap

A Twitter client for Mac System 6? Oh Yea!

Follow

Get every new post delivered to your Inbox.

Join 1,121 other followers