Archive for the ediscovery Category

Mar 11 2014, Episode 331, Show Notes

Posted in criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle with tags , , , on March 11, 2014 by datasecurityblog

Episode 331 of The CyberJungle is about 33 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 331 via the flash player:


su root Edition

Special drill down on the $189 privacy and security smartphone with Scott Bendar, CTO of FreedomPop. Link mentioned in the episode for the PrivacyPhone.

Wrap

Thou shalt NOT charge for freeware, thunders Mozilla Firefox lawyers

Please support our sponsors, as they support The CyberJungle

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

Feb 19 2014, Episode 329, Show Notes

Posted in Annoucements, Conference Coverage, criminal forensics, ediscovery, Podcast, Show Notes, The CyberJungle with tags , , , , on February 19, 2014 by datasecurityblog

Episode 329 of The CyberJungle is about 33 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 329 via the flash player:


su root Edition

Brian Carrier, creator of open source Autopsy, VP Basis Technology

Peter Allor, IBM Security Strategist on new NIST Framework for Improving Critical Infrastructure Cybersecurity . The link for Peter’s blog postings will be updated here as we receive it.

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

Dec 20 2013, Episode 323, Show Notes

Posted in Breach, Conference Coverage, Court Cases, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , , on December 20, 2013 by datasecurityblog

Episode 323 of The CyberJungle is about 30 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 323 via the flash player:


Interviews

Exclusive From InsideBitCoin Conference 2013: Alan Reiner, core developer and CEO, Bitcoin Armory; Justus Ranvier, Bitcoin blogger and activist, Bitcoinism Blog.

Our Take on This Week’s News

Copycat ransomware demands cash to unscramble files

Lawsuit accuses IBM of hiding China risks amid NSA spy scandal

Tales From The Dark Web

No Tales this week, due to extended coverage from Inside BitCoin Conference

Wrap

The New Armor That Lets You Sense Surveillance Cameras

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

Dec 9th 2013, Episode 322, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle with tags , , on December 9, 2013 by datasecurityblog

Episode 322 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 322 via the flash player:


Our Take on This Week’s News

Bitcoin fraud and cybercrimes: Inside BitCoin Conference; In the Murky World of Bitcoin, Fraud Is Quicker Than the Law; Buying a Tesla with bitcoin? Not so fast

Does LE have a new approach to fighting cyber crime? 13 members of the criminal community, “gained” via Internet virus about 70 million rubles were arrested; Russia charges ‘criminal organization’ behind Blackhole malware kit

Tales From The Dark Web

RICO used in Cybercrime Conviction

Wrap

Luxury toilet users warned of hardware flaw

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. * File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

Find out more at Atola.com

 

Nov 27 2013, Episode 321, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on November 27, 2013 by datasecurityblog

Episode 321 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 321 via the flash player:


Interviews

Amber Schroader, CEO of Paraben Forensics

Our Take on This Week’s News

Ground-breaking cyber crime case, and the Gmail flaw talked about in the segment

Malware predictions for 2014

Tales From The Dark Web

CryptoLocker surge led by drop in value in IDs?

Wrap

New technique for late night IT work?

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases:

* Excellent disk imaging speed up to 180 MB/s

* Checksum calculation: MD5, SHA (1, 224, 256, 384, 512)

* Forensic data erasure methods including DoD 5220.22-M, Security Erase, NIST 800-88, Pattern Erase

* Case management system

* ATA Password removal

* File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

* High performance of the multi-pass imaging for damaged drives

* Authentic Atola HDD diagnostics that creates a detailed report in minutes.

Find out more at Atola.com

 

May 28th 2013, Episode 302, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on May 28, 2013 by datasecurityblog

Episode 302 of The CyberJungle is about 38 minutes long.  The interview with the Dr. Eric Cole, SANS Fellow begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 303 via the flash player:

Download: thecyberjungle_302.mp38

Interview

Links mentioned  in the interview with Dr. Eric Cole; Author, Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization; and SecureAnchor

Tales From The Dark Web

Security lapse discovered by reporters exposes data

Our Take On This Week’s News

Iran fingered for attacks on US power firms; Syrian group tried to disrupt Haifa water system

Clearwire limiting Huawei footprint

Experts give their take on Twitter’s 2FA

Wrap

Corporate Security’s Weak Link: Click-Happy CEOs [subscription required]

 

Please support our sponsors, as they support The CyberJungle

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

May 16th 2013, Episode 301, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on May 15, 2013 by datasecurityblog

Episode 301 of The CyberJungle is about 32 minutes long.  The interview with the Dr. Kerry Nemovicher on Washington State Court System Breach begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 301 via the flash player:

Download: thecyberjungle_301.mp38

Interview

Dr. Kerry Nemovicher on Washington State Court System Breach

Tales From The Dark Web

Anatomy of TheOnion Breach

Our Take On This Week’s News

OJ Hearing Focuses on Lack of Digital Forensics Experts

$45mil Bank Breach Could Land Banks and Processors in Civil Court

Adding Honeywords to Password Databases

Wrap

Saudi Telcom Seeks Mobile App Eavesdropping

Please support our sponsors, as they support The CyberJungle

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 27 2013, Episode 295, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 27, 2013 by datasecurityblog

Episode 295 of The CyberJungle is about 35 minutes long.  The interview with the Founder of Stop the Hackers begins at about the 20min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 295 via the flash player:


Interview

Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s thesis research includes well over twenty published papers in the areas of internet security, measurements and web technology.

Tales From The Dark Web

Industrial espionage is ripping off SA firms

Our Take On This Week’s News

South Korea bank attacks should prompt rethink in U.S.

Of 1,800 serious malware NSS Labs tested, some always managed to get through — no matter what combination of protection was used

What You Didn’t Post, Facebook May Still Know

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 19 2013, Episode 294, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 19, 2013 by datasecurityblog

Episode 294 of The CyberJungle is about 30 minutes long.  The interview with James Elste on privacy and Trusted Identities begins at about the 15min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 294 via the flash player:


Interview

James Elste, information security expert, talks privacy and NIST’s Trusted Identities effort. Here are the links from the segment:

www.idecosystem.org

NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE

Making Online Transactions Safer, Faster, and More Private

Tales From The Dark Web

Ira talked about the credit reporting agency break ins, and how Federal law made the attacks easier

Our Take On This Week’s News

Huawei USB modems vulnerable

How will you know who’s recording? Google Glass protestors set up campaign group to censor the high-tech eyewear

Wrap

Ohio judge calls speed cameras ‘scam’

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 06 2013, Episode 293, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle with tags , , , , , , on March 6, 2013 by datasecurityblog

Episode 293 of The CyberJungle is about 25 minutes long.  The interview with Dr. Larry Ponemon on the Post Breach Boom report, begins at about the 10min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 293 via the flash player:


Interview

Dr Larry Ponemon speaks with Ira about the reports, The Post Breach Boom, and Risk of Insider Fraud: Second Annual Study.

Tales From The Dark Web

Evernote: We’re Adding Two-Factor Authentication

Tales Our Take On This Week’s News

Dating Websites Providing More Divorce Evidence Says Survey: Nation’s Top Matrimonial Lawyers Cite Match.com as Most Common Source

New Samsung Galaxy phone might be controlled by your eyes

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers