Archive for Do Not Track

May 31, 2011 – Episode 215

Posted in Breach, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on May 30, 2011 by datasecurityblog

Episode 215 of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 17:30 mark.

To listen to Episode 215 via the flash player:


Interview

Checklist Compliance vs. Security, with Lila Kee of GlobalSign. A new study reveals that up that some healthcare providers spend 100% of their data security efforts on compliance, rather than actual risk reduction.

Our Take on The Week’s News

Privacy: Users aren’t turning on Do Not Track browser featuresAs reported by Consumer Reports

Become a “Hacker” in 15 Minutes or Less: In a controlled experiment a small group of volunteers with limited technological knowledge followed a online tutorial to hack into a computer network

Tales from the Dark Web

Lockheed and PBS Join the Roster of Recent Victims as Motives Expand; Almost Anyone Is a Target

Verizon 2011 Data Breach Investigations Report: Cyber Criminals Shifting to Smaller, More Opportunistic Attacks; External Attacks, Especially Hacking, on Rise . Read the important security essentials near the bottom of the news release.

Wrap

Dualboot MeeGoLinux or WIN7 On New Asus ultraslim portable computer

March 21, 2011 – Episode 205

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Legislation, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 20, 2011 by datasecurityblog

Episode 205 of  The CyberJungle is about 43 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 30:30 mark.

To listen to Episode 205 via the flash player:


Interview

Interview: Peter Schlampp, VP Product Management, Solara Networks on the RSA SecureID breach and network forensics

Our Take on The Week’s News

Web browser anti-tracking: Read, “Do not track tools push firms to crossroad,” by James Temple in the SF Gate.

RSA SecureID breach: An Analytical Brief by NSS Labs

Does transparency webapp threaten citizen data when authenticating users? Read “Big Brother Has Been Watching

Civil court action used to take down evil botnet: Read “With Rustock, a New Twist on Fighting Internet Crime” by IDG’s Robert McMillan. CORRECTION: FireEye worked on this takedown, not eEye, as stated by Ira.

Ghostery allows you to block scripts from companies that you don’t trust, delete local shared objects, and even block images and iframes. Ghostery.com.

BetterPrivacy is a Firefox plug-in which protects from usually not deletable LSOs.

Tales from the Dark Web: What do you get when you stir up a pot full of natural disasters, social media alerts, Java exploits and rogue anti-virus? Read the M86 analysis.

Wrap

Supreme Court To Hear Arguments in ID Search Case: The case concerns an unlawful police stop. Defendant asserts that police had no basis for pulling his car over and then running his license.  EPIC’s amicus brief.

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers