Archive for the eMail Security Category

July 11th, 2014, Episode 343, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 10, 2014 by datasecurityblog

Episode 343 of The CyberJungle is about 34 minutes long. Carl Wright, of TrapX starts at about 6:50min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 343 via the flash player:

Interview

Carl Wright, of TrapX . Here is a link to the report.

Our Take on This Week’s News

Android re-sets do not wipe data properly.

Tales from The Dark Web

Microsoft Macro attacks are back.

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 26, 2014, Episode 341, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on June 25, 2014 by datasecurityblog

Episode 341 of The CyberJungle is about 30 minutes long. Dr. Larry Ponemon, of The Ponemon Institute starts at about 16min, a new twist on WiFi attacks in Tales from the Dark Web, Dropbox Bank Trojans, and Miscrosoft’s new threat sharing initiatives, and the IRS email scandal in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 341 via the flash player:

Interview

Threat Sharing; Dr. Ponemon, the Ponemon Institute. Email mentioned in the segment: research@ponemon.org .

Our Take on This Week’s News

Microsoft launches Interflow, a security and threat information exchange platform

Dropbox+Bank Trojan=Perfect Business User Storm?

Tales from The Dark Web

New WiFi attack

App mentioned in the segment: OperaMax

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 11th 2013, Episode 304, Show Notes

Posted in Conference Coverage, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on June 10, 2013 by datasecurityblog

Episode 304 of The CyberJungle is a break from our usual format and is about 48 minutes long.  The interview with Susan Landau about CALEA II  begins at about the 11:15min mark. The interview with Martha Hampel from StopBigBrother.org. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 304 via the flash player: http://dataclonelabs.com/security_talkworksfollowingTalesfromTheDarkWebhop/thecyberjungle_304.mp38

Interviews

Susan Landau works in the areas of cybersecurity, privacy, and public policy. CALEA II: Risks of Wiretap Modifications to Endpoints

Martha Hampel, grass roots organizer with stopbigbrother.org

Our Take On This Week’s News

Christopher Soghoian: Analyzing Yahoo’s PRISM non-denial;  And from 2009: 8 Million Reasons for Real Surveillance Oversight

Whistleblower’s NSA warning: ‘Just the tip of the iceberg

Wrap

Rules on Privacy Could Be Revisited

Please support our sponsors, as they support The CyberJungle

HTCIA International Conference and Training Expo 2013

HTCIA International Conference and Training Expo 2013

The High Technology Crime Investigation Association (HTCIA) Annual conference is committed to bringing its participants – members or non-members — the best training, tools and networking the industry has to offer.

We rely on the generosity of our sponsors, who take a vested interest in working with us to develop a conference that exemplifies what the HTCIA organizations stands for. By fostering the exchange of investigation-related information and ideas, we bring together a community of professionals who help one another understand and adapt to our rapidly evolving industry–to everyone’s benefit.

The 2013 conference is being held from September 8-11, 2013 in Las Vegas, NV [Summerlin is the western side of Las Vegas, 15min from Downtown via freeway].

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

 

June 4th 2013, Episode 303, Show Notes

Posted in Breach, Conference Coverage, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on June 3, 2013 by datasecurityblog

Episode 303 of The CyberJungle is about 41 minutes long.  The interview with the Kevin Fiscus begins at about the 24min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 303 via the flash player: http://dataclonelabs.com/security_talkworkshop/thecyberjungle_303.mp38

Interview

Links mentioned  in the interview with Kevin Fiscus, SANS Institute Instructor, and principal with Cyber Defense Advisors

Tales From The Dark Web

Oracle Tackles Java Security Holes

Our Take On This Week’s News

BT has dumped Yahoo! as email provider to its six million broadband customers following months of customer complaints over breaches

Beginning the week of June 3, 2013, older versions of Yahoo! Mail (including Yahoo! Mail Classic) will no longer be available

Yahoo Shuts Down Mail Classic, Forces Switch To New Version That Scans Your Emails

StartMail, the private email service being developed by StartPage

Evernote Adds Basic Two-Factor Authentication, Other Security Features After Hack Attempt

Wrap

Seat of Power: the computer workstation for the person with everything

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 19 2013, Episode 294, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 19, 2013 by datasecurityblog

Episode 294 of The CyberJungle is about 30 minutes long.  The interview with James Elste on privacy and Trusted Identities begins at about the 15min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 294 via the flash player:

Interview

James Elste, information security expert, talks privacy and NIST’s Trusted Identities effort. Here are the links from the segment:

www.idecosystem.org

NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE

Making Online Transactions Safer, Faster, and More Private

Tales From The Dark Web

Ira talked about the credit reporting agency break ins, and how Federal law made the attacks easier

Our Take On This Week’s News

Huawei USB modems vulnerable

How will you know who’s recording? Google Glass protestors set up campaign group to censor the high-tech eyewear

Wrap

Ohio judge calls speed cameras ‘scam’

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

November 15 2012, Episode 281, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 15, 2012 by datasecurityblog

Episode 281 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Conrad Constantine of Alien Vault, begins at about the 19min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 281 via the flash player:

Interview

Gregory Kipper, Futurist and Author

Tales From The Dark Web

Drive-by Downloads targeting un-patched IE and Word users.

Our Take on This Weeks News

Ira’s take CIA Director Petraeus scandal

The U.S.-China Economic and Security Review Commission has released its 2012 Annual Report to Congress.

“This year’s report covers recent developments in the U.S.-China trade and economic relationship; the role of state-owned enterprises in China, the U.S.-China trade and investment relationship, recent developments in China’s military, China’s cyber capabilities, developments in China’s nuclear and strategic abilities, China in the South China Sea, Taiwan, Hong Kong, China in Europe, China’s demand and control of global resources, China’s efforts to become a more innovative society, and the Chinese political transition.”

Wrap

Ira’s take on tracking John McAffe

August 21 2012, Episode 270, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, Vulnerabilities, web server security with tags , , , , on August 20, 2012 by datasecurityblog

Episode 270 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. The interview with Ken Westin on mobile device forensics begins at about 18:30min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 270 via the flash player:

Interview

Ken Westin is the founder of ActiveTrak Inc, Developers of GadgetTrak Software. He also helped develop a digital forensic service enabling web searches via device serial number for photos taken with that one unique camera.

Tales From The Dark Web

Investigating China’s Online Underground Economy, download the report

Our Take on This Weeks News

“When my data died, it was the cloud that killed it…”

Dear Apple: Please set iMessage free

Wrap

Tony Scott, Director, Enemy of the State , RIP

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 17, 2012 by datasecurityblog

Episode 259 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. The interview with Chester Wisniewski Apple Expert at Sophos Security begins at about 13:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 259 via the flash player:

Interview

From the floor of Interop Las Vegas: Chester Wisniewski Apple Expert at Sophos Security

Tales From The Dark Web

If you’re seeing ads on Wikipedia, your computer is probably infected with malware

Our Take on This Weeks News

ElcomSoft Helps Investigate Crime Providing Yet Another Way to Break into iOS with iCloud Attack

Apple posts twin security updates for OS X Leopard

Wrap

Heavy sleeper? Tired of snoozing past your alarm? Use the ‘smartphone in a cup’ trick to crank the volume!

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on May 1, 2012 by datasecurityblog

Episode 257 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with the Hon. Paul Chertoff, begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 257 via the flash player:

Interview

From the floor of the Forensic Expert Witness Association, we talk with Judge Paul Chertoff.

Tales From The Dark Web

Hotmail Password Fix Arrives Too Late For Many

Our Take on This Weeks News

NYTimes: Data Harvesting at Google Not a Rogue Act, Report Finds

The Hill: Lawmakers push bill to ban bosses from asking for Facebook passwords

The Reg: Win Phone 7 not ready for security role

Wrap

Buy Followers Your Social Networking Account!

April 17, 2012, Episode 255, Show Notes

Posted in Breach, Court Cases, criminal forensics, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on April 17, 2012 by datasecurityblog

Episode 255 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 255 via the flash player:

Interview

Exclusive: James Bologna from Thomson Reuters on security process

Tales From The Dark Web

Pardon the audio quality as we upgrade to a new studio; Tales from The Dark Web is on a break.

Our Take on This Weeks News

Email snooping by IT administrators

Apple posts separate Flashback removal tool

Is Google invading privacy with ReCAPTHA RePurposing?

 

Wrap

FBI track Anonymous hacker using his girlfriend’s boobs

Follow

Get every new post delivered to your Inbox.

Join 1,106 other followers