Archive for the web server security Category

April 29 2013, Episode 299, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on May 7, 2013 by datasecurityblog

Episode 299 of The CyberJungle is about 33 minutes long.  The interview with the Matt Landrock, CEO of Cryptomathic, on mobile app sec begins at about the 19:30min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 299 via the flash player:

Interview

Matt Landrock, CEO of Cryptomathic

Tales From The Dark Web

Why LivingSocial’s 50-million password breach is graver than you may think

Our Take On This Week’s News

Senate Won’t Vote On CISPA, Deals Blow To Controversial Cyber Bill

CISPA Is Dead. Now Let’s Do a Cybersecurity Bill Right

Is The iPhone 5S Fingerprint Reader Worth The Wait?

Please support our sponsors, as they support The CyberJungle

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 16 2013, Episode 298, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 16, 2013 by datasecurityblog

Episode 298 of The CyberJungle is about 26 minutes long.  The interview with Steve Roylance of GlobalSign on browser SSL changes begins at about the 14:30 mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 298 via the flash player:

Interview

Steve Roylance of GlobalSign. Read this blog posting for more insight into “mixed” SSL browser messages

Tales From The Dark Web

Blog site attacks. Three links were mentioned in the segment: 1. CloudFlare WAF, 2. WordPress anti-brute force plug-in, 3. Two factor authentication for log in

Our Take On This Week’s News

Ex police union lawyer sues LE for privacy violations

South Korea IDs cyber attacker; and creates “air gap” in nuke power plant controller network

Wrap

Is CISPA back? Google and Yahoo Execs support it, EFF and DuckDuckGo.com oppose

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 8 2013, Episode 297, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on April 8, 2013 by datasecurityblog

Episode 297 of The CyberJungle is about 35 minutes long.  The interview with the Toby Rush, CEO and Founder of EyeVerify begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 297 via the flash player:

Interview

Toby Rush, CEO and Founder of EyeVerify

Tales From The Dark Web

Online tracking firm surreptitiously siphons personal data, changes security settings on computers, suit alleges

Our Take On This Week’s News

Untappable Apple or DEA Disinformation?

First Person Shooter: Taser’s new cop-cam takes aim at perps and privacy

Wrap

SpyDialer Reverse Cell Phone Search

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 2 2013, Episode 296, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 2, 2013 by datasecurityblog

Episode 296 of The CyberJungle is about 35 minutes long.  The interview with the Givonn Jones of SiteLock begins at about the 24min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 296 via the flash player:

Interview

From the floor of the Parallels conference in Las Vegas: Givonn Jones of SiteLock

Tales From The Dark Web

SpamHaus group under attack from cyber-vandals in Geneva; US-CERT Alert (TA13-088A), DNS Amplification Attacks

Our Take On This Week’s News

Why is China reading your email, and should you care?

Apple and the security of your data

How Private Data Became Public on Amazon’s Cloud

Wrap

Electronic road signs breach in Illinois

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 27 2013, Episode 295, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 27, 2013 by datasecurityblog

Episode 295 of The CyberJungle is about 35 minutes long.  The interview with the Founder of Stop the Hackers begins at about the 20min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 295 via the flash player:

Interview

Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s thesis research includes well over twenty published papers in the areas of internet security, measurements and web technology.

Tales From The Dark Web

Industrial espionage is ripping off SA firms

Our Take On This Week’s News

South Korea bank attacks should prompt rethink in U.S.

Of 1,800 serious malware NSS Labs tested, some always managed to get through — no matter what combination of protection was used

What You Didn’t Post, Facebook May Still Know

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

December 05 2012, Episode 284, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on December 4, 2012 by datasecurityblog

Episode 284 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Andrew Walls and Perry Carpenter, both from Gartner, begins at about the 18min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 284 via the flash player:

Interview

Gartner Experts Andrew Walls and Perry Carpenter on “Security Awareness”

Mentioned in the interview: Dr. BJ Fogg’s site behaviormodel.org

Tales From The Dark Web

Due to the longer Interview segment, the Dark Web segment is on a break

Our Take on This Weeks News

FTC ruling on breached companies, read more at HabeasHardDrive.com blog

School district has strange response to bank takeover attack

Wrap

The smartphone turns 20

November 29 2012, Episode 283, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on November 28, 2012 by datasecurityblog

Episode 283 of The CyberJungle is about 40 minutes long, due to the extended interview with lock expert Marc Weber Tobias on the Onity hotel lock breaches.  You can hear the entire program it by clicking on the flash player below. The interview with Marc Weber Tobias , begins at about the 19:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 283 via the flash player:

Interview

Lock expert and attorney, Marc Weber Tobias

Tales From The Dark Web

Yahoo! email! hijack! exploit!… Yours! for! $700!

Our Take on This Weeks News

DNS Attacks at Pakistan’s PKNIC, GoDaddy, and Romania

IDC: iPhone, Android to overtake BlackBerry in enterprise market for first time

Wrap

No wrap due to the extended interview segement

November 19 2012, Episode 282, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , on November 19, 2012 by datasecurityblog

Episode 282 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Ben Lemere of Berla Corp, begins at about the 18min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 282 via the flash player:

Interview

Ben Lemere with Berla Corp on Motor Vehicle/GPS forensics

Tales From The Dark Web

Bank accounts emptied by phone Trojan that targets user of smartphone-based two factor authentication

Our Take on This Weeks News

Israeli government websites under mass cyberwar attack

Anonymous leaks personal information of 5,000 Israeli officials

The age of the password is over. We just haven’t realized it yet.

Wrap

Will We Finally See A 1TB Optical Disc In 2015?

November 15 2012, Episode 281, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 15, 2012 by datasecurityblog

Episode 281 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Conrad Constantine of Alien Vault, begins at about the 19min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 281 via the flash player:

Interview

Gregory Kipper, Futurist and Author

Tales From The Dark Web

Drive-by Downloads targeting un-patched IE and Word users.

Our Take on This Weeks News

Ira’s take CIA Director Petraeus scandal

The U.S.-China Economic and Security Review Commission has released its 2012 Annual Report to Congress.

“This year’s report covers recent developments in the U.S.-China trade and economic relationship; the role of state-owned enterprises in China, the U.S.-China trade and investment relationship, recent developments in China’s military, China’s cyber capabilities, developments in China’s nuclear and strategic abilities, China in the South China Sea, Taiwan, Hong Kong, China in Europe, China’s demand and control of global resources, China’s efforts to become a more innovative society, and the Chinese political transition.”

Wrap

Ira’s take on tracking John McAffe

Follow

Get every new post delivered to your Inbox.

Join 1,114 other followers