Archive for Social Engineering

May 24, 2012, Episode 260, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 24, 2012 by datasecurityblog

Episode 260 of The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Rick Comeau, Center for Internet Security (CIS) begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 260 via the flash player:

Interview

David Cowen, on Anti Anti Digital Forensics. Here is his blog.

Tales From The Dark Web

Social Media + Social Engineering + Malware = Bad News

Our Take on This Weeks News

Trojan attempts to defeat multi-factor authentication . Here is the free liveCD that will by-pass these attacks, Lightweight Portable Security.

Eugene Kaspersky frustrated by Apple’s iOS AV ban

UK Attacker infiltrated the Facebook page of pop star Justin Bieber’s girlfriend — and threatened to publish their private emails.

Wrap

The Zenith Flash-Matic wireless remote creator, dies

Feb 14, 2012, Episode 248

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on February 14, 2012 by datasecurityblog

Episode 248 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Hadnagy a specialist in countering Social Engineering begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 248 via the flash player:

Interview

Chris Hadnagy is an expert in countering Social Engineering. The Social-Engineer.com Social Engineering Penetration Testers program is a 5-day immersion into the world of a professional social engineer. Find out more about the course here.

Tales From The Dark Web

How To Fight Anonymous: With Sarcasm.

Our Take on This Weeks News

Google disables prepaid cards in wake of Google Wallet exploit; Common smartphone PINs Ira spoke about.

Would smartphone remote shutdowns reduce robberies?

 

January 17, 2011 – Episode 244

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on January 17, 2012 by datasecurityblog

Episode 244  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  M1ster_E on the CyberMilitia begins at about 16min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 244 via the flash player:

Interview

M1ster_E on the CyberMilitia. Join this Reddit area to help fight members of the Dark Web

Our Take On This Week’s News

Zappos Breach Illustrate the Need for Stronger Password Rules

Malware stole City College of San Francisco data for years

Tales From The Dark Web

Spam Emails Link To QR Codes

Wrap

The Qualcomm Tricorder X PRIZE

November 29, 2011 – Episode 239

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on November 29, 2011 by datasecurityblog

Episode 239  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Karen Paullet on being a cyber expert witness begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 239 via the flash player:

Interview

Dr. Karen Paullet on being a cyber expert witness

Our Take On This Week’s News

He Said She Said: The battle of the SCADA experts in water pump row

A new, low-cost way to find open wifi connections

How to keep your access point slightly more private

Tales From The Dark Web

Social Engineering used to catch a cybercriminal

Wrap

Pirated software hard drive as art?

October 7, 2011 – Episode 237

Posted in Breach, Conference Coverage, Interview Only Edition, Show Notes, The CyberJungle with tags , on November 6, 2011 by datasecurityblog

Episode 237  of  The CyberJungle is about 36 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 237 via the flash player:

We break with our normal programming schedule. With the release of the DefCon Social Engineering Report, we have special extended coverage with Chris Hadnagy of Social-Engineer.com.

Here is the link to the DefCon Social Engineering Report mentioned in this segment. 

Data Security Podcast Episode 76, Nov 02 2009

Posted in Annoucements, Breach, Court Cases, criminal forensics, darkweb, ediscovery, Legislation, Podcast, Vulnerabilities with tags , , , , , , , , , , , on November 1, 2009 by datasecurityblog

30 minutes every week on data security, privacy, and the law…..(plus or minus ten)

On this week’s program:

* Placing an online bet for the World Series? Employees of online betting sites might be selling customer data online.

* Google Book Search: What data is Google storing about readers of online books?

* Our take on this week’s news.

–> Stream This Week’s Show with our Built-In Flash Player:

–> Scroll down to see links and show notes for this week’s show

–> Stream, subscribe or download Episode 76 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 76 of the Data Security Podcast

* Conversation:  Samantha talks with Rebecca Jeschke  of the Electronic Frontier Foundation (EFF). There are lots of privacy objections to the Google book search settlement… EFF is leading the way on the privacy objections. Read about it here. And here’s the legal document filed by EFF… the settlement hearing has been indefinitely postponed.

* Tales From The Dark Web:  Are online casinos leaking information about their customers? Hard to say, as we saw the original web posting about this is only available in the Google Cache. Here is a story from TightPoker.com about the original posting. That story lists the original site at AustralianGambling.au, but the URL should be AustralianGambling.com.au .

* From Our Take on The News:  Lobbyists beware: judge rules metadata is public record. This story also talks about the Google metadata leak.

* From Our Take on The News: A MUST READ – Samantha writes at the ReasonableReporter.com about social engineering and how the technique is used in real life, and in the new movie Law Abiding Citizen:

* Wrap: Ira talked about the launch of Digital Forensics Magazine.

Follow

Get every new post delivered to your Inbox.

Join 1,141 other followers