Archive for Social Media

March 06 2013, Episode 293, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle with tags , , , , , , on March 6, 2013 by datasecurityblog

Episode 293 of The CyberJungle is about 25 minutes long.  The interview with Dr. Larry Ponemon on the Post Breach Boom report, begins at about the 10min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 293 via the flash player:

Interview

Dr Larry Ponemon speaks with Ira about the reports, The Post Breach Boom, and Risk of Insider Fraud: Second Annual Study.

Tales From The Dark Web

Evernote: We’re Adding Two-Factor Authentication

Tales Our Take On This Week’s News

Dating Websites Providing More Divorce Evidence Says Survey: Nation’s Top Matrimonial Lawyers Cite Match.com as Most Common Source

New Samsung Galaxy phone might be controlled by your eyes

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

November 7 2012, Episode 280, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on November 7, 2012 by datasecurityblog

Episode 280 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Hon. Matthew Sciarrino begins at about 14:30, and the interview with James Wiebe begins at about 23:00 mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 280 via the flash player:

Interviews This Week Are From The Paraben Forensics Innovator’s Conference

Hon. Matthew Sciarrino, on social media, security and forensics

James Wiebe, CEO of WiebeTech on SSD forensics

Tales From The Dark Web Is Still Helping In The Sandy Recovery This Week

Our Take on This Weeks News

Did Unreported Breach Impact Coca-Cola China Buy Out?

Report: China is “the most threatening actor in cyberspace

Wrap

PFIC Comments

July 24, 2012, Episode 266, Show Notes

Posted in Breach, Conference Coverage, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on July 24, 2012 by datasecurityblog

Episode 266 of The CyberJungle is about 29 minutes long.  You can hear it by clicking on the flash player below. The interview with Josh Sokol on “Symbiotic Security,” begins at about 16min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 266 via the flash player:

Interview

Exclusive: From SecurityBSidesLV, Josh Sokol on “Symbiotic Security”

Tales From The Dark Web

Tales From The Dark Web: Gaming Site Breach Reveals Attacker Tactics

Our Take on This Weeks News

Warning to HR Departments Using SocialMedia

ASLR in Android to Help Thwart Malware

Easy Attack on Hotel Door Locks

Wrap

Follow Ira Victor on Twitter for updates from BlackHat, SecurityBSides, and DefCon. As news warrants, content may appear in CyberJungle Conference Notes.

Follow

Get every new post delivered to your Inbox.

Join 1,138 other followers