Archive for Tracking

April 4, 2012, Episode 253, Show Notes

Posted in Conference Coverage, Court Cases, criminal forensics, Legislation, Show Notes, The CyberJungle with tags , , , on April 4, 2012 by datasecurityblog

Episode 253 of The CyberJungle is about 23 minutes long.  You can hear it by clicking on the flash player below. We are in a temporary studio, as the main studio undergoes an upgrade. We apologize for the weaker audio quality. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 253 via the flash player:

Interview

From ISC West conference 2012, we talk with Kevin Kjosa, Assistant Director, The Center for Infrastructure Assurance at UT Austin

Tales From The Dark Web

On a break as we transition to a new studio

Our Take on This Weeks News

Cell Phone Location Tracking Public Records Request, from the ACLU

ATT violating its own policy when selling data to LE?

OnStar Lets You [and Law Enforcement] Track You and Your Spouse

Apple [Dropbox, box.net, others,] holds the master decryption key when it comes to….security, privacy

Feb 20th 2012, Episode 249

Posted in Breach, Court Cases, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , on February 19, 2012 by datasecurityblog

Episode 249  of  The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Denis Foo Kane, a PhD candidate, and security researcher, begins at about 10:30; the interview with David Ting, the CTO of multifactor authentication systems provider Imprvata begins at about 20:50.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 249 via the flash player:

Interviews

Denis Foo Kune is a PhD candidate at the University of Minnesota, and co-author of the study Location leaks on the GSM air interface

David Ting, the CTO of Imprivata, and has more than 20 years of experience in developing advanced imaging software and systems for high security, high-availability systems. Prior to founding Imprivata he developed biometric applications for government programs and web-based applications for secure document exchange.  David blogs for Imprivata here.

Tales From The Dark Web

No Tales from The Dark Web this week, as we expand coverage for HIMSS2012 with the David Ting segment.

Our Take on This Weeks News

Electronic Frontier Foundation: Google Circumvents Safari Privacy Protections .

He doesn’t want to just read your mail, he wants reads everyone’s mail, he’s The Gmail Man.

Scott Cleland, author of the book, Search and Destroy, Why You Can’t Trust Google Inc., spoke with the CyberJungle in May 2011 about Google’s privacy practices.

Wrap

#nerdflix, partial list, the twitter-based list

May 16, 2011 – Episode 213

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle with tags , , , , , on May 15, 2011 by datasecurityblog

Episode 212 of  The CyberJungle is about 38 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The first interview start at about the 9min mark lasts about 11min. The second interview starts at about the 25min mark, and it’s about 12 minutes long.

To listen to Episode 212 via the flash player:

Interviews

Scott Cleland, author of  Search and Destroy, Why You Can’t Trust Google Inc.  And for the other links mentioned in the interview, look on the right column here.

Alyn Hockey, Director of Product Management at security firm Clearswift. Here is their blog.

Our Take on The Week’s News

PCI Compliance Risks for Small Merchants and where they are failing: Excellent summary, with actionable information, from Brian Pennington’s blog about IT security and compliance.

Additional Information Mentioned On The Show

TechEd Atlanta 2011:  Large Microsoft technical conference

CEIC Forensics Conference: Digital Investigations Show, Orlando, Florida

AccessData 2011 Las VegasDigital Forensics Conference

Feb 8, 2011 – Episode 199

Posted in Court Cases, criminal forensics, darkweb, ediscovery, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on February 8, 2011 by datasecurityblog

Episode 199 of  The CyberJungle  is 27 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great or listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interview is about 8 minutes long and it starts at about the 17:30 mark.

To listen to Episode 199 via the flash player:

Interviews

Google Tracks You…We Don’t” – A new web site takes on Google, by NOT tracking you. We talk with Gabriel Weinberg of DuckDuckGo.com .

Tales From The Dark Web

Milwaukee has beer, San Jose has software, and Las Vegas has Casinos. In our Tales from the Dark Web segment, we tell you about a city where the #1 industry is CyberCrime.

Our Take on The Week’s News

Judge orders juror to reveal private Facebook postings in California criminal case

What NASDAQ is and isn’t saying about another high-profile cyber attack

Surge in Adobe PDF attacks impacting Windows, Mac and Linux users

Texas AG pushes for new anti-sexting law – but with a twist

Ira heads to RSA San Francisco 2011. Ira will post reports in Conference Notes. Reports sponsored by LogLogic – The IT Data Management company. Meet Ira in the LogLogic booth #828 during Tuesday night’s RSA pub crawl and drink some Travis Smith’s 510 nano-brew, served fresh in the booth.

Follow

Get every new post delivered to your Inbox.

Join 1,106 other followers