Archive for 5th Amendment

March 4, 2012, Episode 251, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on March 4, 2012 by datasecurityblog

Episode 251 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Dave Porcello of Pwnie Express begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 251 via the flash player:

Interview

From the floor of RSA Security Conference, we talk with Dave Porcello, CEO of Pwnie Express. After the interview, Ira ran into Robert McMillan, a reporter for Wired. Robert was looking for Dave Porcello to do an interview for Wired. Here is Robert’s excellent take on the Pwnie Express news story for Wired: The Little White Box That Can Hack Your Network.

Tales From The Dark Web

Anonymous Supporters Tricked into Installing Zeus Trojan. Read the Symantec posting for code details.

Our Take on This Weeks News

“Feds crack suspect’s encrypted drive, avoid Constitution meltdown; Digital age plays havoc with 5th Amendment” Read details in the Register story.

Ira spoke about an email from Thales eSecurity.

Wrap

How One Bureaucrat Almost Succeeded in Banning Car Radios

July 11, 2011 – Episode 221

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 10, 2011 by datasecurityblog

Episode 221 of  The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. The  interview starts at about 14:00 into the show. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 221 via the flash player:

Interview

T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use the techniques he learned while working in US Counter Intelligence. Bill Boni is the author of this book mentioned in the interview -  Netspionage: The Global Threat to Information

Our Take On This Week’s News

Hewlett Packard’s Laptop Lock Takes Only Seconds To Crack. Read the story, and see the video, in Marc Weber Tobias’ Forbes Column, TravelGeek.

Prosecutors Demanding Encryption Keys a Violation of The 5th Amendment?  EFF Urges Court to Uphold Privilege Against Self-Incrimination

Tales From The Dark Web

Android malware spies on your SMS messages – but is it part of the Zeus family?

Wrap

Picking the Lock of Google’s Local Search

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers