Archive for Two Factor Authentication

Apr 14 2014, Episode 334, Show Notes

Posted in Breach, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on April 13, 2014 by datasecurityblog

Episode 334 of The CyberJungle is about 42 minutes long.  This su root edition focuses on Heartbleed, with Dr. Kerry Nemovicher, cryptographer. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 334 via the flash player:

su root edition on the Heartbleed flaw

Dr. Kerry Nemovicher, cryptographer. You can email Dr. Kerry by “decoding” this email address: kerry [insert the at symbol here] c-kerry.com

Testing for “reverse” Heartbleed

Please support our sponsors, as they support The CyberJungle

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

The leading provider of software solutions for extracting meaningful intelligence from multilingual text

———————————————————————————————————————————————————-

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

June 4th 2013, Episode 303, Show Notes

Posted in Breach, Conference Coverage, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on June 3, 2013 by datasecurityblog

Episode 303 of The CyberJungle is about 41 minutes long.  The interview with the Kevin Fiscus begins at about the 24min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 303 via the flash player: http://dataclonelabs.com/security_talkworkshop/thecyberjungle_303.mp38

Interview

Links mentioned  in the interview with Kevin Fiscus, SANS Institute Instructor, and principal with Cyber Defense Advisors

Tales From The Dark Web

Oracle Tackles Java Security Holes

Our Take On This Week’s News

BT has dumped Yahoo! as email provider to its six million broadband customers following months of customer complaints over breaches

Beginning the week of June 3, 2013, older versions of Yahoo! Mail (including Yahoo! Mail Classic) will no longer be available

Yahoo Shuts Down Mail Classic, Forces Switch To New Version That Scans Your Emails

StartMail, the private email service being developed by StartPage

Evernote Adds Basic Two-Factor Authentication, Other Security Features After Hack Attempt

Wrap

Seat of Power: the computer workstation for the person with everything

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

May 28th 2013, Episode 302, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on May 28, 2013 by datasecurityblog

Episode 302 of The CyberJungle is about 38 minutes long.  The interview with the Dr. Eric Cole, SANS Fellow begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 303 via the flash player: http://dataclonelabs.com/security_talkworkshop/thecyberjungle_302.mp38

Interview

Links mentioned  in the interview with Dr. Eric Cole; Author, Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization; and SecureAnchor

Tales From The Dark Web

Security lapse discovered by reporters exposes data

Our Take On This Week’s News

Iran fingered for attacks on US power firms; Syrian group tried to disrupt Haifa water system

Clearwire limiting Huawei footprint

Experts give their take on Twitter’s 2FA

Wrap

Corporate Security’s Weak Link: Click-Happy CEOs [subscription required]

 

Please support our sponsors, as they support The CyberJungle

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 29 2013, Episode 299, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on May 7, 2013 by datasecurityblog

Episode 299 of The CyberJungle is about 33 minutes long.  The interview with the Matt Landrock, CEO of Cryptomathic, on mobile app sec begins at about the 19:30min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 299 via the flash player:

Interview

Matt Landrock, CEO of Cryptomathic

Tales From The Dark Web

Why LivingSocial’s 50-million password breach is graver than you may think

Our Take On This Week’s News

Senate Won’t Vote On CISPA, Deals Blow To Controversial Cyber Bill

CISPA Is Dead. Now Let’s Do a Cybersecurity Bill Right

Is The iPhone 5S Fingerprint Reader Worth The Wait?

Please support our sponsors, as they support The CyberJungle

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 16 2013, Episode 298, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 16, 2013 by datasecurityblog

Episode 298 of The CyberJungle is about 26 minutes long.  The interview with Steve Roylance of GlobalSign on browser SSL changes begins at about the 14:30 mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 298 via the flash player:

Interview

Steve Roylance of GlobalSign. Read this blog posting for more insight into “mixed” SSL browser messages

Tales From The Dark Web

Blog site attacks. Three links were mentioned in the segment: 1. CloudFlare WAF, 2. WordPress anti-brute force plug-in, 3. Two factor authentication for log in

Our Take On This Week’s News

Ex police union lawyer sues LE for privacy violations

South Korea IDs cyber attacker; and creates “air gap” in nuke power plant controller network

Wrap

Is CISPA back? Google and Yahoo Execs support it, EFF and DuckDuckGo.com oppose

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 8 2013, Episode 297, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on April 8, 2013 by datasecurityblog

Episode 297 of The CyberJungle is about 35 minutes long.  The interview with the Toby Rush, CEO and Founder of EyeVerify begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 297 via the flash player:

Interview

Toby Rush, CEO and Founder of EyeVerify

Tales From The Dark Web

Online tracking firm surreptitiously siphons personal data, changes security settings on computers, suit alleges

Our Take On This Week’s News

Untappable Apple or DEA Disinformation?

First Person Shooter: Taser’s new cop-cam takes aim at perps and privacy

Wrap

SpyDialer Reverse Cell Phone Search

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

February 11 2013, Episode 291, Show Notes

Posted in Conference Coverage, Exclusive, Show Notes, The CyberJungle with tags , , , on February 11, 2013 by datasecurityblog

Episode 291 of The CyberJungle is about 32 minutes long. We break with our normal format this week, with exclusive interviews on cloud security from the Paralells Summit in Las Vegas.  You can hear it by clicking on the flash player below. The interview with Brian Spector, CEO of Cetivox, on two factor authentication begins at about the 2:45min mark. The interview with CloudLinux CEO Igor Seletskiy, begins at about the 19min mark. The interview with Randal Skipper VP with SilverSky on legal issues with email archiving begins at about the 27min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 291 via the flash player:

Interviews

Brian Spector, CEO of Certivox, on a new development in 2FA. Here’s their blog.

CloudLinux CEO Igor Seletskiy, gives a new take to server linux. Link to their blog here.

Randal Skipper VP with SilverSky on legal issues and email archiving. Blog site here

Wrap

From Fox Business News: Forensics Analyst Ira Victor and Mashable’s Lance Ulanoff on the growing number of cyber-attacks on businesses and government

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Follow

Get every new post delivered to your Inbox.

Join 1,140 other followers