Archive for the Exclusive Category

January 30 2013, Episode 290, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on January 30, 2013 by datasecurityblog

Episode 290 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Tony Berman about Antigua and business liability for copyrights begins at the 21:00min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 290  via the flash player:


Interview

Tony Berman, Intellectual Property Attorney, on Antigua and business liability for copyrights.

Tales From The Dark Web

Twitter Account Takeover Attack

Our Take on This Weeks News

Backdoor root login found in Barracuda gear – and Barracuda is OK with this
Show off Your Security Skills: Pwn2Own and Pwnium 3

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

December 10 2012, Episode 285, Show Notes

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 12, 2012 by datasecurityblog

Episode 285 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Tom Scholtz from Gartner, begins at about the 13min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 285 via the flash player:


Interview

Gartner Expert Tom Scholtz on greater security through fewer controls

Mentioned in the interview: Hans Monderman (1945 – 2008), a Dutch traffic engineer.

Tales From The Dark Web

Rolling Stone – The Rise and Fall of Jeremy Hammond: Enemy of the State

The Verge Summary of the Rolling Stones story

A rare moment in DefCon history (from 2004): A speaker named Jeremy Hammond gets his talk pulled by “The Pope” of DefCon. Is this the same Jeremy Hammond?

Our Take on This Weeks News

From ABC News: Calif. Sues Delta Airlines Over Mobile App Privacy

From FoxNews:  Hack the Hackers? Companies Itching To Go On Cyber Offense

 

December 05 2012, Episode 284, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on December 4, 2012 by datasecurityblog

Episode 284 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Andrew Walls and Perry Carpenter, both from Gartner, begins at about the 18min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 284 via the flash player:


Interview

Gartner Experts Andrew Walls and Perry Carpenter on “Security Awareness”

Mentioned in the interview: Dr. BJ Fogg’s site behaviormodel.org

Tales From The Dark Web

Due to the longer Interview segment, the Dark Web segment is on a break

Our Take on This Weeks News

FTC ruling on breached companies, read more at HabeasHardDrive.com blog

School district has strange response to bank takeover attack

Wrap

The smartphone turns 20

November 29 2012, Episode 283, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on November 28, 2012 by datasecurityblog

Episode 283 of The CyberJungle is about 40 minutes long, due to the extended interview with lock expert Marc Weber Tobias on the Onity hotel lock breaches.  You can hear the entire program it by clicking on the flash player below. The interview with Marc Weber Tobias , begins at about the 19:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 283 via the flash player:


Interview

Lock expert and attorney, Marc Weber Tobias

Tales From The Dark Web

Yahoo! email! hijack! exploit!… Yours! for! $700!

Our Take on This Weeks News

DNS Attacks at Pakistan’s PKNIC, GoDaddy, and Romania

IDC: iPhone, Android to overtake BlackBerry in enterprise market for first time

Wrap

No wrap due to the extended interview segement

November 19 2012, Episode 282, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , on November 19, 2012 by datasecurityblog

Episode 282 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Ben Lemere of Berla Corp, begins at about the 18min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 282 via the flash player:


Interview

Ben Lemere with Berla Corp on Motor Vehicle/GPS forensics

Tales From The Dark Web

Bank accounts emptied by phone Trojan that targets user of smartphone-based two factor authentication

Our Take on This Weeks News

Israeli government websites under mass cyberwar attack

Anonymous leaks personal information of 5,000 Israeli officials

The age of the password is over. We just haven’t realized it yet.

Wrap

Will We Finally See A 1TB Optical Disc In 2015?

November 15 2012, Episode 281, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 15, 2012 by datasecurityblog

Episode 281 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Conrad Constantine of Alien Vault, begins at about the 19min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 281 via the flash player:


Interview

Gregory Kipper, Futurist and Author

Tales From The Dark Web

Drive-by Downloads targeting un-patched IE and Word users.

Our Take on This Weeks News

Ira’s take CIA Director Petraeus scandal

The U.S.-China Economic and Security Review Commission has released its 2012 Annual Report to Congress.

“This year’s report covers recent developments in the U.S.-China trade and economic relationship; the role of state-owned enterprises in China, the U.S.-China trade and investment relationship, recent developments in China’s military, China’s cyber capabilities, developments in China’s nuclear and strategic abilities, China in the South China Sea, Taiwan, Hong Kong, China in Europe, China’s demand and control of global resources, China’s efforts to become a more innovative society, and the Chinese political transition.”

Wrap

Ira’s take on tracking John McAffe

November 7 2012, Episode 280, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 7, 2012 by datasecurityblog

Episode 280 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Hon. Matthew Sciarrino begins at about 14:30, and the interview with James Wiebe begins at about 23:00 mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 280 via the flash player:


Interviews This Week Are From The Paraben Forensics Innovator’s Conference

Hon. Matthew Sciarrino, on social media, security and forensics

James Wiebe, CEO of WiebeTech on SSD forensics

Tales From The Dark Web Is Still Helping In The Sandy Recovery This Week

Our Take on This Weeks News

Did Unreported Breach Impact Coca-Cola China Buy Out?

Report: China is “the most threatening actor in cyberspace

Wrap

PFIC Comments

September 26 2012, Episode 274, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on September 26, 2012 by datasecurityblog

Episode 274 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Attorney Benjamin Write begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 274 via the flash player:


Interview

Benjamin Wright, Attorney in Private Practice,  SANS Instructor: Law of Data Security and Investigations. See the forensics from the cloud videos Benjamin talked about. Follow Mr. Wright on Twitter.

Tales From The Dark Web

Over 9 million PCs infected – ZeroAccess botnet uncovered

Our Take on This Weeks News

Wells Fargo website hit by access issues amid cyber threats

Microsoft Security Bulletin MS12-063 – Critical

FTC: Rented computers spied on customers

Wrap

‘Operation ID’ helps take a bite out of smartphone crime

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers