Archive for the Exclusive News Category

July 23rd, 2014, Episode 345, Show Notes

Posted in Breach, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , on July 23, 2014 by datasecurityblog

Episode 345 of The CyberJungle is about 26 minutes long. This is a special su root edition where we do a deep technical dive. This su root edition is an exclusive on a new countermeasure to Zues Trojan, and Enterprise Attacks, with Egemen Tas, Comodo VP of Engineering. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 345 via the flash player:

Interview

Exclusive: Egemen Tas, Comodo VP of Engineering,  Link to the software.

 

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Dec 9th 2013, Episode 322, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle with tags , , on December 9, 2013 by datasecurityblog

Episode 322 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 322 via the flash player:

Our Take on This Week’s News

Bitcoin fraud and cybercrimes: Inside BitCoin Conference; In the Murky World of Bitcoin, Fraud Is Quicker Than the Law; Buying a Tesla with bitcoin? Not so fast

Does LE have a new approach to fighting cyber crime? 13 members of the criminal community, “gained” via Internet virus about 70 million rubles were arrested; Russia charges ‘criminal organization’ behind Blackhole malware kit

Tales From The Dark Web

RICO used in Cybercrime Conviction

Wrap

Luxury toilet users warned of hardware flaw

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. * File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

Find out more at Atola.com

 

Nov 27 2013, Episode 321, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on November 27, 2013 by datasecurityblog

Episode 321 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 321 via the flash player:

Interviews

Amber Schroader, CEO of Paraben Forensics

Our Take on This Week’s News

Ground-breaking cyber crime case, and the Gmail flaw talked about in the segment

Malware predictions for 2014

Tales From The Dark Web

CryptoLocker surge led by drop in value in IDs?

Wrap

New technique for late night IT work?

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases:

* Excellent disk imaging speed up to 180 MB/s

* Checksum calculation: MD5, SHA (1, 224, 256, 384, 512)

* Forensic data erasure methods including DoD 5220.22-M, Security Erase, NIST 800-88, Pattern Erase

* Case management system

* ATA Password removal

* File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

* High performance of the multi-pass imaging for damaged drives

* Authentic Atola HDD diagnostics that creates a detailed report in minutes.

Find out more at Atola.com

 

December 19, 2011 – Episode 242

Posted in Annoucements, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on December 19, 2011 by datasecurityblog

Episode 242 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics begins at about 13min.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 242 via the flash player:

Interview

Sean Morrissey of Katana Forensics launches LaternLite iOS Forensics tool this week

Our Take On This Week’s News

Forensic innovator Jonathan Grier has developed tools that use statistical analysis of file access data to reconstruct timelines. According to Mr. Gerier, his method can be used to determine what, if data was exfiltrated from the system. Read more in: Detecting data theft using stochastic forensics.

Excellent work by c|net’s Elinor Mills on the software by CarrierIQ that some have labeled as an illegal “root kit.” Read: Sprint disabling Carrier IQ on phones.

Tales From The Dark Web

Passwords hard coded into industrial control systems – What could possibly go wrong?

Wrap

New job opportunity for those with Photoshop forensics skills? US watchdog bans photoshopping in cosmetics ads. Wow, and I thought all those models had perfect faces and perfect bodies all of the time…

October 24, 2011 – Episode 235

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on October 24, 2011 by datasecurityblog

Episode 235  of  The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 12min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 235 via the flash player:

Interview

EXCLUSIVE: Does ‘Son of Stuxnet’ hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take

Our Take On This Week’s News

Another online video breach victim: Microsoft . Read more at Geekwire.

iPad Smart Cover Security Flaw. Read more at PCWorld

Tales From The Dark Web

NASDAQ attackers target business executives. Read more at the Chicago Tribune.

Wrap

What if, two years before the 9/11 attacks the U.S. had been given complete digital forensic access to al-Qaeda and Taliban calls and data? Read more in the long, but very worthwhile, Vanity Fair story.


Michigan TrackerGate: ACLU Speaks To CyberJungle Radio

Posted in criminal forensics, ediscovery, Exclusive News, The CyberJungle with tags , , on April 21, 2011 by datasecurityblog

The row continutes between the Michigan ACLU and the Michigan Law Enforcment tonight. The Michigan ACLU leveled the charge earlier this week that Michigan Law Enforement was asking for hundreds of thousands for dollars for records related to the possible forensic imaging of mobile devices using the well-known Cellebrite UFED.  Michigan Law Enforcement has responded.  In a statement, The Michigan State Police said, “The DEDs [Digital Extraction Devices] are not being used to extract citizens’ personal information during routine traffic stops.” The Michgan State Police also said that there are been no claims that law enforcement has broken any laws in the use of these DEDs.

I interviewed ACLU Staff Attorney Mark Fancher today for a segment in next week’s CyberJungle Radio.  Mark Fancher is with the Racial Jucstice Project at the Michigan ACLU.  The CyberJungle felt it was too important to hold this interview until Monday’s scheduled release at part of the next episode of CyberJungle Radio.

You can hear the interview by clicking on the flash player below. You may download the file directly – great for listening on many smartphones.

To listen to the CyberJungle Radio interview with Mark Fancher of the Michigan ACLU, via the flash player:

Members of the media, please credit CyberJungleRadio.com

by Ira Victor, G2700, GCFA, GPCI, GSEC, ISACA-CGEIT. Ira Victor is a forensic analyst with Data Clone Labs, He is also Co-Host of CyberJungle Radio, the news and talk on security, privacy and the law. Ira is President of Sierra-Nevada InfraGard, and a member of The High Tech Crime Investigator’s Association (HTCIA). Follow Ira’s security and forensics tweets: @ira_victor .

Pwn2Own Update: Charlie Miller Changes Course, Now Headed to “Hacker” Contest

Posted in Conference Coverage, Exclusive News with tags , , on March 7, 2011 by datasecurityblog

Charlie Miller has changed his mind and he will now attend CanSecWest and the Pwn2Own contest. CyberJungle Radio just talked with Charlie Miller, the only three times in a row winner of the CanSecWest “hacker conference.” The CyberJungle broke the story last week that Charlie had decided to stay home this year, due to a disagreement over the contest rules.  CyberJungle Radio is running an interview with Charlie Miller on Episode 203. Following the posting of that interview, Charlie Miller told CyberJungle Radio that he has changed course again, and he will now attend the conference. Although he still disagrees with the rules, for the good of the security community, he has decided to attend this week’s events in Vancouver, British Columbia. Charlie said that he did not speak with the conference organizer regarding his decision.

Follow

Get every new post delivered to your Inbox.

Join 1,139 other followers