Archive for lockpicking

July 11, 2011 – Episode 221

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 10, 2011 by datasecurityblog

Episode 221 of  The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. The  interview starts at about 14:00 into the show. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 221 via the flash player:


Interview

T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use the techniques he learned while working in US Counter Intelligence. Bill Boni is the author of this book mentioned in the interview -  Netspionage: The Global Threat to Information

Our Take On This Week’s News

Hewlett Packard’s Laptop Lock Takes Only Seconds To Crack. Read the story, and see the video, in Marc Weber Tobias’ Forbes Column, TravelGeek.

Prosecutors Demanding Encryption Keys a Violation of The 5th Amendment?  EFF Urges Court to Uphold Privilege Against Self-Incrimination

Tales From The Dark Web

Android malware spies on your SMS messages – but is it part of the Zeus family?

Wrap

Picking the Lock of Google’s Local Search

Data Security Podcast Episode 64 – Aug 4 2009

Posted in Breach, Conference Coverage, darkweb, eMail Security, Exclusive, Podcast, Vulnerabilities, web server security with tags , , , , , , , , , , , on August 4, 2009 by datasecurityblog

30 minutes every week on data security, privacy, and the law….(plus or minus five)

On this week’s program:

SPECIAL DEFCON17 Coverage From Las Vegas

* Is YOUR tax return sitting out there on the Internet? Maybe not yours, but Larry Pesce tells us about the tax returns — and the other stuff he found without much effort.

* Breaching the new “personal WiFi” hot spots, is it child’s play? We’ll find out…. On a special Tales From The Dark Web segment … with David Maynor from Errata Security.

* Our take on the DefCon news.

–>NEW! Stream This Week’s Show with our Built-In Flash Player:


This week’s show is 34 minutes.

–> Stream, subscribe or download Episode 64 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 64 of the Data Security Podcast

* Conversation: Ira talks with Larry Pesce, of PaulDotCom, about the downright scary information he easily found while sifting through a file sharing network.

* Tales From The Dark Web:  Ira talks with David Maynor of Errata Security about the security threats associated with personal WiFi devices.  The photo below is of David:

David Mayner with personal WiFi devices

David Maynor holding the Clear personal WiFi device (left) and the Verizon/MiFi personal Wifi device (right)

* From the News:  SSL Certificates Trust attack;  Mike Sussman from Intrepidusgroup.com.

*From the News: Cross Site Request Forgery attacks; Mike Bailey’s from skeptikal.org.

*From the News:  Justin Samuel from the RequestPolicy.com Firefox plug-in team.

*From the News: Tony Flick from Fyrmassociates.com on the electric smart grid security threats.

* Wrap: DIFRWear.com RFID protection products

Michael Aiello, CEO of DIFRWear RFID Protection

Michael Aiello, CEO of DIFRWear RFID Protection

* Wrap: BumpMyLock.com, locks, lock penetration testing supplies, and how to bump open a lock:

BumpMyLock Booth at DefCon17

BumpMyLock Booth at DefCon17

PLUS:

In the Lockpicking Village, Selestius tries to pick her way out of a set of handcuffs. Although the photo is blurry, there is a very slim, long, lockpick in Selestius’ right hand:

Lockpicking handcuffs

Lockpicking handcuffs

Hacking Session Floor Space

Some sessions got so crowded, there was no where to sit.  Sometimes the side isle standing room would fill up.  Due to fire rules, sitting on the floor of the center isle was a hazard.  Faced with not getting to see a hot session, Thomas from LA thought of an original floor hack: He bought a small, $10 folding camping chair. He pulled it next to a hotel chair,  and got a  seat in the center isle of every crowded session! Thomas tells the Data Security Podcast that the “Goons” (DefCon staff) appreciated his innovative approach to crowded sessions.

http://security.talkworkshop.com/images/floor_hacking.jpg

Hacking Floor Space

Data Security Podcast Episode 11 – July 28 2008

Posted in Podcast with tags , , , , on July 28, 2008 by datasecurityblog

The Data Security Podcast is the place for 30 minutes of news every week on data security, privacy, and the law.

In this week’s episode: Interview with of Marc Tobias, white hat lockpicker and lawyer;
Coreflood botnet stealing enterprise passwords; and the latest data security news

–> Stream, subscribe or download Episode 11Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

This week’s show is sponsored by DeviceLock

Program Notes for Episode 11

News:

1. Finally, some actual information on the Childs case. Excellent reports from Paul Venezia, at InfoWorld.

2. COPA – Children Online Protection Act; ACLU v. Mukasey – Opinion of the Court

3. Security firm Promisec announced findings from security audits of more than 100,000 corporate endpoints. See more details from Ira’s blog posting about this of earlier today.

Interview Notes:

Marc Weber Tobias, Esq., author of, THE COMPROMISE OF MEDECO® HIGH SECURITY LOCKS: New Techniques of Forced, Covert, and Surreptitious Entry

Preview Marc’s upcoming talk at DefCon, Aug. 2008: Open in 30 Seconds: Cracking One of the Most Secure Locks in America

Tales From The Dark Web:

Password-stealing Trojan is spreading like a worm – and targeted directly at the enterprise. Read the details in the DarkReading.com story by Tim Wilson, and the comments David Jevans, Chairman of the Anti-Phishing Working Group

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers