Archive for Forensics

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 17, 2012 by datasecurityblog

Episode 259 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. The interview with Chester Wisniewski Apple Expert at Sophos Security begins at about 13:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 259 via the flash player:

Interview

From the floor of Interop Las Vegas: Chester Wisniewski Apple Expert at Sophos Security

Tales From The Dark Web

If you’re seeing ads on Wikipedia, your computer is probably infected with malware

Our Take on This Weeks News

ElcomSoft Helps Investigate Crime Providing Yet Another Way to Break into iOS with iCloud Attack

Apple posts twin security updates for OS X Leopard

Wrap

Heavy sleeper? Tired of snoozing past your alarm? Use the ‘smartphone in a cup’ trick to crank the volume!

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on May 1, 2012 by datasecurityblog

Episode 257 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with the Hon. Paul Chertoff, begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 257 via the flash player:

Interview

From the floor of the Forensic Expert Witness Association, we talk with Judge Paul Chertoff.

Tales From The Dark Web

Hotmail Password Fix Arrives Too Late For Many

Our Take on This Weeks News

NYTimes: Data Harvesting at Google Not a Rogue Act, Report Finds

The Hill: Lawmakers push bill to ban bosses from asking for Facebook passwords

The Reg: Win Phone 7 not ready for security role

Wrap

Buy Followers Your Social Networking Account!

January 17, 2011 – Episode 244

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on January 17, 2012 by datasecurityblog

Episode 244  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  M1ster_E on the CyberMilitia begins at about 16min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 244 via the flash player:

Interview

M1ster_E on the CyberMilitia. Join this Reddit area to help fight members of the Dark Web

Our Take On This Week’s News

Zappos Breach Illustrate the Need for Stronger Password Rules

Malware stole City College of San Francisco data for years

Tales From The Dark Web

Spam Emails Link To QR Codes

Wrap

The Qualcomm Tricorder X PRIZE

November 29, 2011 – Episode 239

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on November 29, 2011 by datasecurityblog

Episode 239  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Karen Paullet on being a cyber expert witness begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 239 via the flash player:

Interview

Dr. Karen Paullet on being a cyber expert witness

Our Take On This Week’s News

He Said She Said: The battle of the SCADA experts in water pump row

A new, low-cost way to find open wifi connections

How to keep your access point slightly more private

Tales From The Dark Web

Social Engineering used to catch a cybercriminal

Wrap

Pirated software hard drive as art?

November 23, 2010 – Episode 188

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, The CyberJungle, Vulnerabilities with tags , , , , on November 23, 2010 by datasecurityblog

Episode 188:

This week’s regular episode of  The Cyberjungle  is 40 minutes long. You can hear it by clicking on the flash player below, or you can go to the listening options page and browse for other ways to hear the show.

To listen to Episode 188 via the flash player:

Interview

Interview with Kevin Ripa, a forensics expert with Computer Evidence Recovery, on the mis-handling of computer forensic data.. Recorded at The Paraben Forensic Innovator’s Conference in Park City Utah.

Our Take On This Week’s News

CCTVs, public schools, and forensic data: What should the due process rules be for the viewing and management of this type of forensic data? Read more here.

New layers of security for Adobe PDF users: Adobe launches a ‘sandboxed’ edition of it’s popular PDF reader: Reader X.  Invincea’s take on Reader X, and how it compares

Major security flaw (still) on over 90 million ATT wireless accounts: Easy disconnect for lost or stolen phones. ATT says the flaw is “fixed.” But is it?  What could go wrong? Maybe using the last four digits of someone’s Social Security Number is not really secure?

Tales from the Dark Web

Members of the Dark Web target common web-cams - Another reason for users to take security more seriously.

Wrap

National opt-out day at airports across the US.

Follow

Get every new post delivered to your Inbox.

Join 1,141 other followers