Archive for photo forensics

May 24, 2011 – Episode 214

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, ediscovery, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on May 23, 2011 by datasecurityblog

Episode 214 of  The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 14:30 mark.

To listen to Episode 214 via the flash player:

Interview

Seven questions to ask before signing a CloudComputing contract, with Chuck Kellner of D4.

Lee Reiber, Director of Mobile Forensics with AccessData, to get his take on the Android ClientLogin Protocol Flaw.

Here are the links Lee Reiber mentioned in the interview:

Mobile Forensics Blog

Lee Reiber’s Twitter feeds: @celldet, and @MFItraining

Cookie flaw leaves LinkedIn accounts vulnerable

Our Take on The Week’s News

Many small firms learn the hard way that they’re not ” too small” to be hit by cyber attack

Tales from the Dark Web

Tales from the Dark Web is out on assignment this week

Wrap

Salesforce.com and Toyota Build ‘Toyota Friend’ Social Network for Toyota Customers and Their Cars

May 1, 2011 – Episode 211

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, web server security with tags , , , , on May 1, 2011 by datasecurityblog

Episode 211 of  The CyberJungle is about 35 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 14:30 mark.

To listen to Episode 211 via the flash player:

Interview

Vladimir Katalov, CEO of Elcomsoft: ElcomSoft Discovers Vulnerability in Nikon’s Image Authentication System. Here are some sample faked photos that Elcomsoft claims could be “authenticated” as real. Vladimir Katalov’s blog posting on this discovery.  Elcomsoft’s main web site.

Our Take on The Week’s News

Sony sued for PlayStation Network data breach: This is probably one of many suits related to the SonyPSN breach.

ThreatMatrix and the Ponemon Institute have released the findings of their joint study on Consumers and their awareness and appreciation of online fraud. Hat tip: Brian Pennington

Tales from the Dark Web

Zeus Trojan adds investment fraud to its bag of tricks

Wrap

Verizon says it will put location warning labels on mobiles

Follow

Get every new post delivered to your Inbox.

Join 1,121 other followers