Archive for the Legislation Category

December 10 2012, Episode 285, Show Notes

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 12, 2012 by datasecurityblog

Episode 285 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Tom Scholtz from Gartner, begins at about the 13min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 285 via the flash player:

Interview

Gartner Expert Tom Scholtz on greater security through fewer controls

Mentioned in the interview: Hans Monderman (1945 – 2008), a Dutch traffic engineer.

Tales From The Dark Web

Rolling Stone – The Rise and Fall of Jeremy Hammond: Enemy of the State

The Verge Summary of the Rolling Stones story

A rare moment in DefCon history (from 2004): A speaker named Jeremy Hammond gets his talk pulled by “The Pope” of DefCon. Is this the same Jeremy Hammond?

Our Take on This Weeks News

From ABC News: Calif. Sues Delta Airlines Over Mobile App Privacy

From FoxNews:  Hack the Hackers? Companies Itching To Go On Cyber Offense

 

April 4, 2012, Episode 253, Show Notes

Posted in Conference Coverage, Court Cases, criminal forensics, Legislation, Show Notes, The CyberJungle with tags , , , on April 4, 2012 by datasecurityblog

Episode 253 of The CyberJungle is about 23 minutes long.  You can hear it by clicking on the flash player below. We are in a temporary studio, as the main studio undergoes an upgrade. We apologize for the weaker audio quality. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 253 via the flash player:

Interview

From ISC West conference 2012, we talk with Kevin Kjosa, Assistant Director, The Center for Infrastructure Assurance at UT Austin

Tales From The Dark Web

On a break as we transition to a new studio

Our Take on This Weeks News

Cell Phone Location Tracking Public Records Request, from the ACLU

ATT violating its own policy when selling data to LE?

OnStar Lets You [and Law Enforcement] Track You and Your Spouse

Apple [Dropbox, box.net, others,] holds the master decryption key when it comes to….security, privacy

March 26, 2012, Episode 252, Show Notes

Posted in Court Cases, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on March 25, 2012 by datasecurityblog

Episode 252 of The CyberJungle is about 27 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Thibadeau of Wave Systems begins at about 17:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 252 via the flash player:

Interview

From the floor of RSA Security Conference, we talk with Dr. Robert Thibadeau of Wave Systems about the challenges of data wiping and digital forensics on solid state drives (SSD)

Tales From The Dark Web

We take a break from our format this week, and therefore no Tales from The Dark Web

Our Take on This Weeks News

Facebook Threatens Legal Action Against Employers Asking for Your Password

Facebook responds to workplace password releases

Report: Some GSM networks can be easily breached

Seattle Startup Offers Solution for Apps Rejected by Apple for Using UDID

Wrap

Web 0.2: Today I Learned Buick “Created A Website” Before There Was Even A Web

March 4, 2012, Episode 251, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on March 4, 2012 by datasecurityblog

Episode 251 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Dave Porcello of Pwnie Express begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 251 via the flash player:

Interview

From the floor of RSA Security Conference, we talk with Dave Porcello, CEO of Pwnie Express. After the interview, Ira ran into Robert McMillan, a reporter for Wired. Robert was looking for Dave Porcello to do an interview for Wired. Here is Robert’s excellent take on the Pwnie Express news story for Wired: The Little White Box That Can Hack Your Network.

Tales From The Dark Web

Anonymous Supporters Tricked into Installing Zeus Trojan. Read the Symantec posting for code details.

Our Take on This Weeks News

“Feds crack suspect’s encrypted drive, avoid Constitution meltdown; Digital age plays havoc with 5th Amendment” Read details in the Register story.

Ira spoke about an email from Thales eSecurity.

Wrap

How One Bureaucrat Almost Succeeded in Banning Car Radios

October 10, 2011 – Episode 233

Posted in Breach, Court Cases, criminal forensics, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on October 10, 2011 by datasecurityblog

Episode 233 of  The CyberJungle is about 37 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 233 via the flash player:

Interview

Ever wonder when you’re watching CSI about the scientific process for matching crime scene DNA to the suspect? We talked with Dr. Arthur Eisenberg, Co-Director of the Center for Human Identification a the University of North Texas. Dr. Eisenberg was also employee number 20 in the company that pioneered DNA analysis for the purpose of identifying criminals. (Hired in 1984, incidentally. For whatever that’s worth.)


Our Take On This Week’s News

Wired Story: Computer Virus Hits U.S. Drone Fleet [Note: These planes actually are Unmanned Aerial Vehicles, not Drones].  But, one information security researcher speculates has an alternate theory and ponders if the software might not be malware.   An excellent essay on UAVs, and the future of warfare, from Kenneth Anderson at the well-respected The Volokh Conspiracy blog

Claim from the Chaos Computer Club: “The largest European hacker club, “Chaos Computer Club” (CCC), has reverse engineered and analyzed a “lawful interception” malware program used by German police forces. It has been found in the wild and submitted to the CCC anonymously. The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.” Read more here.

Tales From The Dark Web

Most complex passwords cracked by cheap consumer hardware

Wrap

A portable GPS device with real personality

October 3, 2011 – Episode 232

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on October 3, 2011 by datasecurityblog

Episode 232  of  The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 232 via the flash player:

Interview

Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses. Aaron D. Crews is a member of Littler Mendelson’s e-Discovery Practice Group

Our Take On This Week’s News

Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More. Read the story at AndroidPolice.com.

Kindle Fire: the tablet that knows your next move. Jeff Bezos’s announcement of Amazon’s assault on the tablet market comes with an added twist. Read The Guardian story.

Tales From The Dark Web

Malicious QR Codes Pushing Android Malware

Wrap

1977 Star Wars Celica: Have You Seen This Car?

August 22, 2011 – Episode 226

Posted in Breach, Conference Coverage, Court Cases, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 21, 2011 by datasecurityblog

Episode 226 of  The CyberJungle is about 27 minutes long this week.  You can hear it by clicking on the flash player below. The interview begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 226 via the flash player:

Interview

Hotel VoIP system open to serious attack? Interview with Jason Ostrum of ViperLab.net . Get the latest open source VoIP Hooper tool. According to the site, “VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop security test. VoIP Hopper is a VoIP infrastructure security testing tool but also a tool that can be used to test the (in)security of VLANs”

Our Take On This Week’s News

Smartphone monitoring or malware: it’s all in the intent. Read the TrendMicro blog on the topic.

Can schools control private teacher/student digital conversations?

Microsoft has committed itself to encouraging young women to enter tech, as part of that effort, they host an event called Digigirlz, around the world.

Tales From The Dark Web

New wave of malware targets the desktops of web site publishers.

Wrap

The 20th anniversary of Linux Open Source Software. Here is the video mentioned in the segment

Follow

Get every new post delivered to your Inbox.

Join 1,121 other followers