Archive for Zero Day

July 23rd, 2014, Episode 345, Show Notes

Posted in Breach, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , on July 23, 2014 by datasecurityblog

Episode 345 of The CyberJungle is about 26 minutes long. This is a special su root edition where we do a deep technical dive. This su root edition is an exclusive on a new countermeasure to Zues Trojan, and Enterprise Attacks, with Egemen Tas, Comodo VP of Engineering. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 345 via the flash player:

Interview

Exclusive: Egemen Tas, Comodo VP of Engineering,  Link to the software.

 

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

July 11th, 2014, Episode 343, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 10, 2014 by datasecurityblog

Episode 343 of The CyberJungle is about 34 minutes long. Carl Wright, of TrapX starts at about 6:50min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 343 via the flash player:

Interview

Carl Wright, of TrapX . Here is a link to the report.

Our Take on This Week’s News

Android re-sets do not wipe data properly.

Tales from The Dark Web

Microsoft Macro attacks are back.

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Data Security Podcast Episode 63 – July 27 2009

Posted in Breach, Conference Coverage, darkweb, ediscovery, eMail Security, Podcast, Vulnerabilities with tags , , , , , , , on July 27, 2009 by datasecurityblog

30 minutes each week on data security, privacy, and the law….(plus or minus five)

On this week’s program:

* iPhone Security. Is that an oxymoron?

* Google Chrome Browser uses sandboxing for security.  We talk to a security engineer that says his firm has built a better sandbox.

* Our take on this week’s news.

–>NEW! Stream This Week’s Show with our Built-In Flash Player:

This week’s show is 30 minutes.

–> Stream, subscribe or download Episode 63 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 63 of the Data Security Podcast

* Conversation: Ira talks with Matt Hite, an engineer with Check Point security, about sandbox security software,  and how they are trying to leapfrog the sandbox security software included in Google’s Chrome Browser.

* Tales From The Dark Web:  iPhone Security. Is that an oxymoron? Take a look at this video by Jonathan Zdziarksi from the extensive write-up in at Wired.

* Tales From The Dark Web: Finjan’s Malicious Code Research Center (MCRC) has detected yet another case of a 0-day attack “in the wild”. This time, hackers are exploiting a vulnerability (CVE-2009-1862) in Adobe Acrobat/Reader and Flash player. By exploiting this vulnerability, the hackers can download and execute malicious code on the victim’s PC. Patch due from Adobe on July 31, 2009. Get ready now to roll out the patch(es).

* From the News: Advance notification by Microsoft for emergency patches for release tomorrow, July 28th, 2009. Get ready now to roll out the patch(es).

* From the News:  Exposed: Repair Shops Hack Your Laptops.

* Wrap: Ira will be traveling to DefCon, the World’s Largest Hacker Event, this weekend. DefCon is held in Las Vegas, Nevada. Ira will be tweeting from the show, you can follow his comments at his Twitter site, http://twitter.iravictor.net . If you plan to attend DefCon, follow his tweets,  find him, and say hello.

* Correction:  When Ira spoke about iPhone security, he did not credit Jonathan Zdziarski for the comments about screen captures and keylogging. We apologize for the mistake.

Follow

Get every new post delivered to your Inbox.

Join 1,138 other followers