Archive for IRS

July 15th 2013, Episode 308, Show Notes

Posted in Breach, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 15, 2013 by datasecurityblog

Episode 308 of The CyberJungle is about 30 minutes long.  The interview with Lance James on DDOS attacks begin at about the 17min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 308 via the flash player:

Interviews

Lance James speaks on DDOS attacks on Thursday August 1st, 5pm at Black Hat Las Vegas

Tales From The Dark Web

DefCon Bounces the Feds?

Our Take On This Week’s News

New Windows 8.1 “Feature” allows Microsoft to track your desktop searches

Another botched Windows patch: MS13-057/KB 2803821/KB 2834904

WellPoint fined for exposing health data

Please support our sponsors, as they support The CyberJungle

HTCIA International Conference and Training Expo 2013

HTCIA International Conference and Training Expo 2013

The High Technology Crime Investigation Association (HTCIA) Annual conference is committed to bringing its participants – members or non-members — the best training, tools and networking the industry has to offer.

We rely on the generosity of our sponsors, who take a vested interest in working with us to develop a conference that exemplifies what the HTCIA organizations stands for. By fostering the exchange of investigation-related information and ideas, we bring together a community of professionals who help one another understand and adapt to our rapidly evolving industry–to everyone’s benefit.

The 2013 conference is being held from September 8-11, 2013 in Las Vegas, NV [Summerlin is the western side of Las Vegas, 15min from Downtown via freeway].

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

 

 

July 11th 2013, Episode 307, Show Notes

Posted in Breach, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 11, 2013 by datasecurityblog

Episode 307 of The CyberJungle is about 30 minutes long.  The interview with Jeff Hudson of Venefi begins at about the 17min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 307 via the flash player:

Interviews

Jeff Hudson, CEO of Venefi. Here is the link to the Vendfi blog.  Security disclosure mentioned in the interview.

Tales From The Dark Web

US agency baffled by modern technology, destroys mice to get rid of viruses. More in-depth reporting at Federal Radio News.

Our Take On This Week’s News

Keep your pants on: A reality check about this latest Android malware scare

IRS releases thousands of Social Security numbers

Please support our sponsors, as they support The CyberJungle

HTCIA International Conference and Training Expo 2013

HTCIA International Conference and Training Expo 2013

The High Technology Crime Investigation Association (HTCIA) Annual conference is committed to bringing its participants – members or non-members — the best training, tools and networking the industry has to offer.

We rely on the generosity of our sponsors, who take a vested interest in working with us to develop a conference that exemplifies what the HTCIA organizations stands for. By fostering the exchange of investigation-related information and ideas, we bring together a community of professionals who help one another understand and adapt to our rapidly evolving industry–to everyone’s benefit.

The 2013 conference is being held from September 8-11, 2013 in Las Vegas, NV [Summerlin is the western side of Las Vegas, 15min from Downtown via freeway].

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

 

April 11, 2012, Episode 254, Show Notes

Posted in Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on April 11, 2012 by datasecurityblog

Episode 254 of The CyberJungle is about 28 minutes long.  Pardon the audio quality as we upgrade to a new studio. You can hear it by clicking on the flash player below.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 254 via the flash player:

Interview

“Mikeyy the Twitter Attacker”

Tales From The Dark Web

Due to our temporary studio digs, Tales from the Dark Web will not appear this week.

Our Take on This Weeks News

GAO takes IRS to task – again – over information security lapses

How do you know if you are infected with the Mac FlashbackTrojan

Your AT&T wireless bill may link to malware

Wrap

Mercedes-Benz Will Soon Be Able To Upgrade [The Software On] Your Car Remotely

Episode 126 and 127 – April 10, 2010

Posted in Breach, Court Cases, criminal forensics, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on April 11, 2010 by datasecurityblog

Interviews:  Peter Schlampp, VP of Marketing and New Products, from Solera Networks, who discussed a new approach to uncovering the source of attacks:  network forensics.  Stuart Staniford Chief Scientist from FireEye, who discussed research to help counter the attacks that bypass firewalls and antivirus.  And world famous white-hat hacker Charlie Miller talks with us about Apple Security, how he won the CanSec West PWNtoOwn contest… and the security implications of Apple’s announcement about location-aware advertising, and  multitasking on the iPhone OS 4 platform. Dr. Miller is also a researcher at Security Evaluators. The full show can be streamed with via the Flash player here:

Download the Episode 127 MP3 file here or visit the Listening Options page for more ways to hear the program.

Episode 126 is the su root version of The CyberJungle.  It features only these three unedited versions of the interviews with these three men. We have also featured partial versions of the interview along with all the other regular content  in the full version of the show. Listen via the Flash player here:

Download the Episode 126 MP3 file here or visit the Listening Options page for more ways to hear the program.

Our Take on This Week’s News

Class action suit against Countrywide Financial: Plaintiffs ask $20 million after Countrywide employee stole and sold tens of thousands (or millions?) of customer records.

Another inside job: Bank of America Employee Charged With Planting Malware on ATMs.

German Government Pays Hacker For Stolen Bank Account Data Gov pays cybercriminals for data stolen from banks in tax haven countries, and uses the info to catch tax cheats.

Computer Hacker Sentenced to 37 Months in Prison in Manhattan Federal Court for Scheme to Steal and Launder Money from Brokerage Accounts.  This guy got three years for perpetrating something that sounds like the Zeus attack… in addition to credit card fraud and other counts.  No wonder cybercrime is proliferating.

Phishing Attacks on Taxpayers Rise in the Weeks Leading up to April 15th IRS Tax Filing. Sonic wall offers an online quiz to test your phishing IQ.  Ten questions. It’s actually harder than you think, but it’s fun. We recommend you give this quiz to employees, bosses, family… anyone who might benefit from learning the difference between legitimate email and a phishing attack.

Looking for Tiger Woods’ Nike advert could lead to users  into visiting malicious sites.

Sierra Nevada Infragard announcement:

InfraGard Sierra Nevada April Lunch Event

KEYNOTER: Stuart Staniford, Chief Scientist with security firm FireEye has a long history in the intrusion detection field, starting in the research arena at UC Davis back in 1994. He was conducting a variety of research projects with government contractor Silicon Defense before joining FireEye.

WHERE: The Washoe County Regional Public Safety Training Center, 5190 Spectrum Blvd. Room 105, in Reno, Nevada.

WHEN: Thursday, April 15, 2010; 11:15am-1PM, includes lunch

DONATION: $10 for InfraGard members with advanced purchase before April 13th, 2010;

$15 at the door and for non-members.

To register for the Infragard lunch event, please follow this link

If you heard Ira Victor live on The John Sanchez Show (the live program that follows The CybeJungle on KKOH.com), Ira mentioned the web site to report phishing and other scams:

Data Security Podcast Episode 50 – Apr 27 2009

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Podcast, Vulnerabilities with tags , , , , , , on April 26, 2009 by datasecurityblog

The Data Security Podcast is the place for 30 minutes of news every week on data security, privacy, and the law.

This weeks program – RSA Security confab report; A new way to protect against piracy: two-factor authentication. And, our take on this week’s news

–> Stream, subscribe or download Episode 50 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.  Tune in or subscribe via our page at Podcast.com.

This week’s show is sponsored by Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .

The Show Notes Page for Episode 50 of The Data Security Podcast

-From The News: Your tax dollars at work… paying a non-PCS compliant company to process your tax dollars. Here’s a copy of Uncle Sam’s contract with RBS Worldpay, which announced a major data breach in December, and which Visa has declared to be non-compliant.

- From The News: Rogue WiFi hotspots at RSA Security, according to scans by AirPatrol.

-> RSA Security confab links: Yubico, BehavioSec, NetworkIntercept, MokaFive, AlertEnterprises.

Parabens Wireless StrongHold Bag

Paraben CEO, Amber Schroader, shows us the Parabens Wireless StrongHold Bag at RSA San Francisco

-Tales From The Dark Web: How a cybergang operates a network of 1.9 million infected computers.

-Conversation: Ira talks two factor authentication for software, music and movies with Stina Ehrensvärd of Yubico.

Data Security Podcast Episode 48 – Apr 13 2009

Posted in Breach, criminal forensics, darkweb, Legislation, Podcast, Vulnerabilities, web server security with tags , , , , , , , , on April 12, 2009 by datasecurityblog

The Data Security Podcast is the place for 30 minutes of news every week on data security, privacy, and the law.

This weeks program: Twitter worm a case study in web app security; Will Congress give sweeping cyber authority to the White House?  And our take on the news.

–> Stream, subscribe or download Episode 48 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

This week’s show is sponsored by  DeviceLock Removable Media Security Software.

The Show Notes Page for Episode 48 of The Data Security Podcast

-From The News: Patch those third party apps, not just the OS! That’s the takeaway from the latest edition of The Microsoft Security Intelligence Report.

- From The News: IRS to Boost Oversight of Security, Accuracy of E-Filings, as posted in the Washington Post

- From The News: FTC’s attempt to fight fraud with the so-called “Red Flags Rules” Here is a link to the FTC’s How-To Guide for Business. Physicians are on the list of many types of business that need to comply.

-Tales From The Dark Web: We covered XSS and web application security. OWASP is an excellent resource for free, standards-based web application security information.

-Conversation:  Ira speaks with Lee Tien of the Electronic Frontier Foundation. Read more about the Cybersecurity Bill of 2009, including a link to the EFF blog posting on the issue.

- Wrap up:  HOWTO: Protect Yourself On Twitter (Lessons Learned From The StalkDaily Twitter Hack)

Follow

Get every new post delivered to your Inbox.

Join 1,106 other followers