Archive for Zues

July 23rd, 2014, Episode 345, Show Notes

Posted in Breach, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , on July 23, 2014 by datasecurityblog

Episode 345 of The CyberJungle is about 26 minutes long. This is a special su root edition where we do a deep technical dive. This su root edition is an exclusive on a new countermeasure to Zues Trojan, and Enterprise Attacks, with Egemen Tas, Comodo VP of Engineering. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 345 via the flash player:

Interview

Exclusive: Egemen Tas, Comodo VP of Engineering,  Link to the software.

 

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

April 23, 2012, Episode 256, Show Notes

Posted in Breach, criminal forensics, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , on April 23, 2012 by datasecurityblog

Episode 256 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 256 via the flash player:

Interview

Exclusive: David Espinosa, a geek runs for the State House. His web site and Twitter Feed.

Tales From The Dark Web

Pardon the audio quality as we upgrade to a new studio; Tales from The Dark Web is on a break.

Our Take on This Weeks News

Trojans attack point of sale systems.

CypherDocs helps you encrypt cloud files.

Wrap

Is that an Altoids in your pocket or are you trying to attack us?

Thin Ice and social engineering

March 4, 2012, Episode 251, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on March 4, 2012 by datasecurityblog

Episode 251 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Dave Porcello of Pwnie Express begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 251 via the flash player:

Interview

From the floor of RSA Security Conference, we talk with Dave Porcello, CEO of Pwnie Express. After the interview, Ira ran into Robert McMillan, a reporter for Wired. Robert was looking for Dave Porcello to do an interview for Wired. Here is Robert’s excellent take on the Pwnie Express news story for Wired: The Little White Box That Can Hack Your Network.

Tales From The Dark Web

Anonymous Supporters Tricked into Installing Zeus Trojan. Read the Symantec posting for code details.

Our Take on This Weeks News

“Feds crack suspect’s encrypted drive, avoid Constitution meltdown; Digital age plays havoc with 5th Amendment” Read details in the Register story.

Ira spoke about an email from Thales eSecurity.

Wrap

How One Bureaucrat Almost Succeeded in Banning Car Radios

July 11, 2011 – Episode 221

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on July 10, 2011 by datasecurityblog

Episode 221 of  The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. The  interview starts at about 14:00 into the show. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 221 via the flash player:

Interview

T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use the techniques he learned while working in US Counter Intelligence. Bill Boni is the author of this book mentioned in the interview –  Netspionage: The Global Threat to Information

Our Take On This Week’s News

Hewlett Packard’s Laptop Lock Takes Only Seconds To Crack. Read the story, and see the video, in Marc Weber Tobias’ Forbes Column, TravelGeek.

Prosecutors Demanding Encryption Keys a Violation of The 5th Amendment?  EFF Urges Court to Uphold Privilege Against Self-Incrimination

Tales From The Dark Web

Android malware spies on your SMS messages – but is it part of the Zeus family?

Wrap

Picking the Lock of Google’s Local Search

March 1, 2011 – Episode 202

Posted in Breach, Court Cases, criminal forensics, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on March 1, 2011 by datasecurityblog

Episode 202 of  The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly- great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interview is about 8 minutes long and it starts at about the 18:25 mark.

To listen to Episode 202 via the flash player:

Interviews

Interview: Brett Kingstone, The author of The Real War Against America, on industrial espionage featuring Chinese spies paying American employees to steal intellectual property.

Tales From The Dark Web

Zues Trojan meets Crank Yankers in a social engineering scheme to drain bank accounts by phone

Our Take on The Week’s News

Police Department officer indicted on federal wire fraud and identity theft charges

London Stock Exchange and Morgan Stanley: Added to the list of financial services companies breached by cyber criminals

A woman in a child custody battle with her ex decided it might help if she had recordings of everything

Is that a RAT in your Mac, or have you just been pwnd?

Follow

Get every new post delivered to your Inbox.

Join 1,141 other followers