Archive for Playbook

March 28, 2011 – Episode 206

Posted in Breach, criminal forensics, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on March 27, 2011 by datasecurityblog

Episode 206 of  The CyberJungle is about 48 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 38:05 mark.

To listen to Episode 206 via the flash player:

Interview

RIM caves in. Blackberry maker bows to political pressure and removes the DUI checkpoint app. The app maker says the app will save lives by scaring people out of their cars when they have been drinking. We talk to Joe Scott, the CEO of Phantom Alert.

Our Take on The Week’s News

Big Brother crawls up your nose: The state’s war on cold medicine continues, driven by the federal effort to curb its use as an ingredient in methamphetamine. Read more about how law enforcement and the drug companies have teamed up to database everyone who purchases decongestants. Read more  at the Reasonable Reporter.

Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get? Detecting Certificate Authority compromises and web browser collusion. How-to guide for browser changes to block revoked digital certificates.

Have the inmates have taken over the asylum at RIM?

Tales from the Dark Web: This ain’t logistics. That shipping alert in your email might have more than a tracking number. How a successful old attack is making a comeback. An excellent, detailed dissection of the attack on the WebRoot blog.

March 7, 2011 – Episode 203

Posted in Breach, Business Continuity, Court Cases, criminal forensics, ediscovery, Exclusive News, Legislation, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , , , , , on March 7, 2011 by datasecurityblog

Episode 203 of  The CyberJungle is about 53 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 25:30 mark.

To listen to Episode 203 via the flash player:

Interviews

Charlie Miller, 3x Pwn2Own “hacking” contest winner stays home; response by Dragos, Founder of CanSecWest . Follow Charlie on Twitter.

Tales From The Dark Web

Exactly what is the “boy-in-the-browser attack?”

Our Take on The Week’s News

Lawsuit accuses Amazon of capturing and sharing customer information without permission by tricking Microsoft Internet Explorer

Google Android in app malware flap, iPad2 security, and Blackberry Playbook running Android apps + better security? Interview on Playbook security Ira Victor mentioned in this segment. You may download the segment, or listen to the conversation here:

Via the flash player:

More mobile security news, Keeping Tabs on Android Smartphone Activity.

Proof once again that disgruntled employees are among the most dangerous cybercriminals… Texas man sentenced after breaching former employer’s network and deleting critical business files.

Wrap

OtterBox Cases for slider Smartphones: Samantha and Ira give a new OtterBox the field test

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers