Archive for Linux

February 25 2013, Episode 292, Show Notes

Posted in Exclusive, Show Notes, The CyberJungle with tags , , , , , on February 25, 2013 by datasecurityblog

Episode 292 of The CyberJungle is about 36 minutes long.  The interview with Alex Doll, CEO of OneID, on two factor authentication using elliptical curve cryptography begins at about the 21min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 292 via the flash player:

Interview

Alex Doll, CEO of OneID, on their approach to using two factor authentication with elliptical curve cryptography. The company says the primary purpose of OneID as a digital identity provider. Here’s their blog.

Tales From The Dark Web

Reuters – Analysis: The near impossible battle against hackers [sic] everywhere

Tales Our Take On This Week’s News

Google’s Android Reborn as Network-Hacking Kit

EdgeWave ‘Social Security

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

February 11 2013, Episode 291, Show Notes

Posted in Conference Coverage, Exclusive, Show Notes, The CyberJungle with tags , , , on February 11, 2013 by datasecurityblog

Episode 291 of The CyberJungle is about 32 minutes long. We break with our normal format this week, with exclusive interviews on cloud security from the Paralells Summit in Las Vegas.  You can hear it by clicking on the flash player below. The interview with Brian Spector, CEO of Cetivox, on two factor authentication begins at about the 2:45min mark. The interview with CloudLinux CEO Igor Seletskiy, begins at about the 19min mark. The interview with Randal Skipper VP with SilverSky on legal issues with email archiving begins at about the 27min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 291 via the flash player:

Interviews

Brian Spector, CEO of Certivox, on a new development in 2FA. Here’s their blog.

CloudLinux CEO Igor Seletskiy, gives a new take to server linux. Link to their blog here.

Randal Skipper VP with SilverSky on legal issues and email archiving. Blog site here

Wrap

From Fox Business News: Forensics Analyst Ira Victor and Mashable’s Lance Ulanoff on the growing number of cyber-attacks on businesses and government

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Jan 31, 2012, Episode 246

Posted in darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 31, 2012 by datasecurityblog

Episode 246 of  The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Ros with Labdoo.org begins at about 12min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 246 via the flash player:

Interview

Jordi Ros is an executive with Labdoo.org. The goal of Labdoo is to use grassroots, decentralized, social networking tools to efficiently bring excess laptops, preloaded with Linux,  to the children in the developing world. Find out more at Labdoo.org .

Tales From The Dark Web

Iframe shop spins hijacked traffic. Read more at SCMagazine.

Our Take on This Weeks News

Warning: Driveby Spam Infects PCs When E-Mail Is Opened

Stealing smartphone crypto keys using plain old radio. Read more at ITWorld.

Wrap

Meet Bill Gates, the Man Who Changed Open Source Software. Read The Wired Story.

August 22, 2011 – Episode 226

Posted in Breach, Conference Coverage, Court Cases, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 21, 2011 by datasecurityblog

Episode 226 of  The CyberJungle is about 27 minutes long this week.  You can hear it by clicking on the flash player below. The interview begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 226 via the flash player:

Interview

Hotel VoIP system open to serious attack? Interview with Jason Ostrum of ViperLab.net . Get the latest open source VoIP Hooper tool. According to the site, “VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop security test. VoIP Hopper is a VoIP infrastructure security testing tool but also a tool that can be used to test the (in)security of VLANs”

Our Take On This Week’s News

Smartphone monitoring or malware: it’s all in the intent. Read the TrendMicro blog on the topic.

Can schools control private teacher/student digital conversations?

Microsoft has committed itself to encouraging young women to enter tech, as part of that effort, they host an event called Digigirlz, around the world.

Tales From The Dark Web

New wave of malware targets the desktops of web site publishers.

Wrap

The 20th anniversary of Linux Open Source Software. Here is the video mentioned in the segment

September 12, 2010- Episode 171

Posted in Court Cases, criminal forensics, darkweb, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on September 12, 2010 by datasecurityblog

Episode 171:

This week’s regular episode of  The Cyberjungle  is 1 hour and 14 minutes long. You can hear it by clicking on the flash player below, or you can go to the listening options page and browse for other ways to hear the show.

To listen to Episode 171 via the flash player:

Interview

Nathan Burchfiel from the Center for Media and Culture. Topic: The Craigslist Adult Services section takedown.  Ira mentioned this story on the topic by Nathan Burchfiel’s associate, Alana Goodman.

Tales from the Dark Web

Remember the “please rob me” and the “i can stalk you” sites designed to point out the folly of broadcasting your whereabouts?  The petty criminals have discovered the target-rich environments provided by Foursquare, Facebook, Twitter and others that have an integrated location-based service. Read more here from the New Hampshire Union Leader newspaper.

Our Take on This Week’s News

Is a Cyber Jihad group linked to ‘Here You have’ worm?

An appeals court in Virginia upholds warrantless GPS tracking of criminal suspects.  The issue has been appealed three times, with different outcomes.  The D.C. Circuit Court decided against law enforcement, and San Francisco’s Ninth Circuit recently upheld it in a decision that drew a blistering dissent. Supreme Court in 2011? Probably.

Will Andriod will replace Windows? One Security Start-up is betting the farm on it.

Law enforcement in North Carolina wants to rifle through your medicine cabinet, virtually speaking, as the sheriff requests access to a state database of prescriptions.

Adobe Reader zero day attack contains a scary new booby-trap impacting all computer users.

A new survey by anti-virus maker Norton examines the emotional impact of cycbercrime, calling it a “silent epidemic” that’s affected two-thirds of internet users around the globe.

The cybercriminal shopping list… it’s not that expensive to get into the business.

CyberJungle FAQ

After upgrading her business computers, Claire wants to know if she can continue to use her old clunkers safely for web-based activity. Ira recommends LinuxMint.com, or VectorLinux.com.

Robert wants an alternative to Adobe PDF products.  Adobe PDF Reader and Acrobat alternatives: Foxitsoftware.com , CutePDF.com , and gPDF.

For those who don’t wish to tackle problems alone, Ira recommends Friendly Computers of Reno. They come to your home or business, and they also do support via remote access. They listen to our program, so they know what we’re recommending. Why call a geek when you can call a friend?

To Win A Netbook

See how enter to win a dual-boot friendly netbook, compliments of Lightwave Security, visit The CyberJungle Expert’s Guide.

Follow

Get every new post delivered to your Inbox.

Join 1,121 other followers