Archive for China

Dec 20 2013, Episode 323, Show Notes

Posted in Breach, Conference Coverage, Court Cases, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , , on December 20, 2013 by datasecurityblog

Episode 323 of The CyberJungle is about 30 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 323 via the flash player:

Interviews

Exclusive From InsideBitCoin Conference 2013: Alan Reiner, core developer and CEO, Bitcoin Armory; Justus Ranvier, Bitcoin blogger and activist, Bitcoinism Blog.

Our Take on This Week’s News

Copycat ransomware demands cash to unscramble files

Lawsuit accuses IBM of hiding China risks amid NSA spy scandal

Tales From The Dark Web

No Tales this week, due to extended coverage from Inside BitCoin Conference

Wrap

The New Armor That Lets You Sense Surveillance Cameras

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

April 2 2013, Episode 296, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 2, 2013 by datasecurityblog

Episode 296 of The CyberJungle is about 35 minutes long.  The interview with the Givonn Jones of SiteLock begins at about the 24min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 296 via the flash player:

Interview

From the floor of the Parallels conference in Las Vegas: Givonn Jones of SiteLock

Tales From The Dark Web

SpamHaus group under attack from cyber-vandals in Geneva; US-CERT Alert (TA13-088A), DNS Amplification Attacks

Our Take On This Week’s News

Why is China reading your email, and should you care?

Apple and the security of your data

How Private Data Became Public on Amazon’s Cloud

Wrap

Electronic road signs breach in Illinois

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

November 15 2012, Episode 281, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 15, 2012 by datasecurityblog

Episode 281 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Conrad Constantine of Alien Vault, begins at about the 19min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 281 via the flash player:

Interview

Gregory Kipper, Futurist and Author

Tales From The Dark Web

Drive-by Downloads targeting un-patched IE and Word users.

Our Take on This Weeks News

Ira’s take CIA Director Petraeus scandal

The U.S.-China Economic and Security Review Commission has released its 2012 Annual Report to Congress.

“This year’s report covers recent developments in the U.S.-China trade and economic relationship; the role of state-owned enterprises in China, the U.S.-China trade and investment relationship, recent developments in China’s military, China’s cyber capabilities, developments in China’s nuclear and strategic abilities, China in the South China Sea, Taiwan, Hong Kong, China in Europe, China’s demand and control of global resources, China’s efforts to become a more innovative society, and the Chinese political transition.”

Wrap

Ira’s take on tracking John McAffe

July 11, 2012, Episode 264, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 11, 2012 by datasecurityblog

Episode 264 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 264 via the flash player:

Interview

F. Michael Maloof: China: ‘Pervasive access’ to 80% of telecoms ; G2 Bulletin

Tales From The Dark Web

USB Drive, Malware and Industrial Control Systems. Read the CERT Report.

Our Take on This Weeks News

Uncovering Privacy Issues With Mobile App Advertising

Patch Tuesday: Microsoft pushes nine fixes for 16 flaws

Anon in Buenos Ares Argentina?

Wrap

A Twitter client for Mac System 6? Oh Yea!

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers