Archive for Marc Weber Tobias

January 1 2013, Episode 287, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 31, 2012 by datasecurityblog

Episode 287 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Marc Weber Tobias on insider fraud, begins at about the 15:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 287  via the flash player:


Interview

Marc Weber Tobias mentioned two columns he wrote for Forbes on insider fraud:

How Do You Spot The Thief Inside Your Company?

A Snitch In Time Can Save Employers a Lot of Money

Mentioned in the segment: Redline Solutions

Tales From The Dark Web

0Day web attack impacts Microsoft IE8,7, and some Outlook users. Read Microsoft Security Advisory (2794220). And more from the FireEye Blog.

Our Take on This Weeks News

Still putting your crypto-protected PC in hibernate? $300 app can hack it  And, the ElcomSoft blog posting mentioned in the segment.

How Anybody Can Secretly Save Your Snapchat Videos Forever

 

July 11, 2011 – Episode 221

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 10, 2011 by datasecurityblog

Episode 221 of  The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. The  interview starts at about 14:00 into the show. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 221 via the flash player:


Interview

T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use the techniques he learned while working in US Counter Intelligence. Bill Boni is the author of this book mentioned in the interview -  Netspionage: The Global Threat to Information

Our Take On This Week’s News

Hewlett Packard’s Laptop Lock Takes Only Seconds To Crack. Read the story, and see the video, in Marc Weber Tobias’ Forbes Column, TravelGeek.

Prosecutors Demanding Encryption Keys a Violation of The 5th Amendment?  EFF Urges Court to Uphold Privilege Against Self-Incrimination

Tales From The Dark Web

Android malware spies on your SMS messages – but is it part of the Zeus family?

Wrap

Picking the Lock of Google’s Local Search

Follow

Get every new post delivered to your Inbox.

Join 1,064 other followers