Archive for SCADA

April 16 2013, Episode 298, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 16, 2013 by datasecurityblog

Episode 298 of The CyberJungle is about 26 minutes long.  The interview with Steve Roylance of GlobalSign on browser SSL changes begins at about the 14:30 mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 298 via the flash player:

Interview

Steve Roylance of GlobalSign. Read this blog posting for more insight into “mixed” SSL browser messages

Tales From The Dark Web

Blog site attacks. Three links were mentioned in the segment: 1. CloudFlare WAF, 2. WordPress anti-brute force plug-in, 3. Two factor authentication for log in

Our Take On This Week’s News

Ex police union lawyer sues LE for privacy violations

South Korea IDs cyber attacker; and creates “air gap” in nuke power plant controller network

Wrap

Is CISPA back? Google and Yahoo Execs support it, EFF and DuckDuckGo.com oppose

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Dec 2, 2011, Episode 238: A blackeye for Download.com? Nmap developer Fyodor says site bundling malware with his security software

Posted in Breach, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on December 5, 2011 by datasecurityblog

Episode 240  of  The CyberJungle is about 37 minutes long.  You can hear it by clicking on the flash player below. The first interview with Fyodor, creator of NMAP begins at about 6:45min. The second interview with Joe Weiss of Applied Control Software begins at about 20:00min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 240 via the flash player:

Tales From The Dark Web

A blackeye for Download.com? Nmap developer Fyodor says site bundling malware with his security software.  By-pass download.com by getting Nmap here.

Our Take on This Weeks News (abbreviated due to a longer Tales From The Dark Web)

Security Research by Dan Rosenberg – CarrierIQ: The Real Story

Interview

Joe Wiess, Managing Partner with Applied Control Systems. Read his blog postings on the alleged SCADA services vendor breach at the ControlGlobal.com blog.

November 29, 2011 – Episode 239

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on November 29, 2011 by datasecurityblog

Episode 239  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Karen Paullet on being a cyber expert witness begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 239 via the flash player:

Interview

Dr. Karen Paullet on being a cyber expert witness

Our Take On This Week’s News

He Said She Said: The battle of the SCADA experts in water pump row

A new, low-cost way to find open wifi connections

How to keep your access point slightly more private

Tales From The Dark Web

Social Engineering used to catch a cybercriminal

Wrap

Pirated software hard drive as art?

Follow

Get every new post delivered to your Inbox.

Join 1,151 other followers