Archive for August, 2012

August 27 2012, Episode 271, Show Notes

Posted in Breach, Court Cases, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 27, 2012 by datasecurityblog

Episode 271 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Patent Attorney Ben Langlotz about digital forensics and infosec an the Apple v Samsung case, begins at about 14:30minmin.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 271 via the flash player:


Interview

Patent Attorney Ben Langlotz about digital forensics and infosec an the Apple v Samsung case. To reach Ben Langlotz, contact him on patent [at symbol] langlotz.com

Tales From The Dark Web

How Child Porn And The Other Awfulest Things Ever Get Scrubbed [From Social Networks]

Our Take on This Weeks News

Onity’s Plan To Mitigate Hotel Lock Hack

Dropbox to add two factor authentication. From Businessinsider.com:

“Two-step verification is optional but we recommend you enable it for added protection.

To add two-step to your account:

  1. Head to www.dropbox.com and sign into the website
  2. Click on your name in the upper-right to open your account menu.
  3. Next, click Settings from the account menu and select the Security tab.
  4. Under the Account sign in section, next to Two-step verification, turn the feature on.”

Wrap

Top 10 Clever Uses for Dropbox

August 21 2012, Episode 270, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, Vulnerabilities, web server security with tags , , , , on August 20, 2012 by datasecurityblog

Episode 270 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. The interview with Ken Westin on mobile device forensics begins at about 18:30min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 270 via the flash player:


Interview

Ken Westin is the founder of ActiveTrak Inc, Developers of GadgetTrak Software. He also helped develop a digital forensic service enabling web searches via device serial number for photos taken with that one unique camera.

Tales From The Dark Web

Investigating China’s Online Underground Economy, download the report

Our Take on This Weeks News

“When my data died, it was the cloud that killed it…”

Dear Apple: Please set iMessage free

Wrap

Tony Scott, Director, Enemy of the State , RIP

August 15 2012, Episode 269, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Show Notes, Vulnerabilities with tags , , , , , , on August 15, 2012 by datasecurityblog

Episode 268 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Skip Duckwall from Pass The Hash blog begins at about 16min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 269 via the flash player:


Interview

Skip Duckwall from Still Passing The Hash. Demos from his BlackHat2012 talk.  Plus info on the tool’s addition to the Backtrack tool kit.

Tales From The Dark Web

Medical records held hostage by cyber attackers

Our Take on This Weeks News

Fake SocialNetworking

Smartphone-based attack wreaks havoc on Android and iOS smartphones

Wrap

Mark Zuckerberg Topless; Photo Was on Facebook

August 9 2012, Episode 268, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Show Notes, Vulnerabilities with tags , , , , , , on August 9, 2012 by datasecurityblog

Episode 268 of The CyberJungle is about 49 minutes long.  You can hear it by clicking on the flash player below. The interview with Kevin Mitnick begins at about 6:30min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 268 via the flash player:


Interview

Kevin Mitnick is an American computer security consultant, author, convicted criminal, and old school hacker.

Tales From The Dark Web

Still on a break. Word is that Tales From The Dark Web drank a bit much at DefCon parties, and has one heck of a hangover.

Our Take on This Weeks News

Cybercriminals destroy a reporters digital life

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers