Feb 25, 2015, Episode 360, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on February 25, 2015 by datasecurityblog

Episode 360 of The CyberJungle is about 27 minutes long.  The interview with Heather Wilde begins at about 15:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 360 via the flash player:

Interview

Heather Wilde, from ROCeteer

Our Take on This Week’s News

Security software found using Superfish-style code, as attacks get simpler

Komodia.com, home to the SSL interception module at the heart of the Superfish adware dustup, hit by DDOS attacks

14-Year-Old Hacks Connected Cars With Pocket Money

California tries (once again) to protect digital information

Tales from The Dark Web

Psst, hackers. Just go for the known vulnerabilities

Wrap

Netgear invited to address the flaw Heather Wilde discovered

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

 

 

 

Feb 2, 2015, Episode 359, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on February 1, 2015 by datasecurityblog

Episode 359 of The CyberJungle is about 27 minutes long.  The interview with Gregory Nevan, IBM Researcher begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 359 via the flash player:

Interview

Gregory Nevan, IBM Researcher. Identity Mixer allows for privacy-preserving user authentication. If the personal data is never collected, it cannot be stolen

Our Take on This Week’s News

Many BMWs open to remote attacks for over 4yrs?

Peerlyst to offer infosec pros free training/testing of security solutions. Details here.

 

Tales from The Dark Web

DarkWeb: How “sophisticated hackers” made simple error that got them nabbed.

Wrap

WW2 crypto with a twist

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Jan 17, 2015, Episode 358, Show Notes

Posted in darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security, Zero Day Project with tags , , , , on January 17, 2015 by datasecurityblog

Episode 358 of The CyberJungle is about 29 minutes long.  The interview with Sara Andrabi on infosec academic research versus industry research begins at about 17min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 358 via the flash player:

Interview

Sara Andrabi on infosec academic research vs. industry research. Find her on Peerlyst.com .

Our Take on This Week’s News

Mobile users encountered malware 75% more often in 2014 compared to 2013

Google won’t fix bug hitting 60 percent of Android phones

Secret US cybersecurity report: encryption and two factor authentication vital to protect private data

Tales from The Dark Web

CryptoWall ransomware is back with new version after two months of silence

Researchers at Cisco’s Talos group published an analysis of a new variant of Cryptowall ransomware that implements new features

Wrap

Cotton coated with microscopic metal wires traps 80% of body heat – and can even be used like an electric blanket via USB

 

Jan 5, 2015, Episode 357, Show Notes

Posted in Breach, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on January 5, 2015 by datasecurityblog

Episode 357 of The CyberJungle is about 27 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 357 via the flash player:

Interview

The Interview took a holiday break, here are the links mentioned in the segment:

Ditto Forensic FieldStation , the interview with James  Wiebe of CRU on remote digital forensics.

The Imitation Game

Our Take on This Week’s News


Got a new Android phone? Here’s how to properly get rid of your old one

Five ways to repurpose (or sell!) unwanted tech

Strings messaging service lets you take back what you sent

Diabetes Patients Are Hacking Their Way Toward a Bionic Pancreas

 

Tales from The Dark Web

Age-old VBScript tactic is BACK in biz attack

Wrap

More embarrassing than a bad movie: Sony-shaming and Korea blaming

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Dec 18, 2014, Episode 356, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 18, 2014 by datasecurityblog

Episode 356 of The CyberJungle is about 29 minutes long.  The interview with Ben LeMere, CEO, Berla begins at about 10:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 356 via the flash player:

Interview

Ben LeMere, CEO, Berla . The Infiniti commercial mentioned in the segment.

Our Take on This Week’s News

Ripples effect of the Sony Breach?

Is Uber’s rider database a sitting duck for data breaches?

Shellshock flaw hits network storage systems

Next-gen ransomeware by-passing vm analysis

Tales from The Dark Web

Tales took a break this week for our extended coverage of digital vehicle forensics

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Dec 3, 2014, Episode 355, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on December 3, 2014 by datasecurityblog

Episode 355 of The CyberJungle is about 27 minutes long.  The interview with Sean Morrissey, CEO Katana Forensics begins at about 17:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 355 via the flash player:

Interview

Sean Morrissey, CEO Katana Forensics

Our Take on This Week’s News


Details Emerge on Malware Used in Sony Breach

Is Uber’s rider database a sitting duck for data breaches?

 

Tales from The Dark Web

Cheapest Tablets Pose Biggest Security Risks

Wrap

The wrap is out Christmas shopping

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Nov 17, 2014, Episode 354, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on November 17, 2014 by datasecurityblog

Episode 354 of The CyberJungle is about 29 minutes long.  The interview with James Wiebe of CRU on remote digital forensics starts at about 21min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 354 via the flash player:

Interview

Interview with James Wiebe of CRU on remote digital forensics. Here is the Ditto box he talked about.

Our Take on This Week’s News

Cyphort Report: TargetDepot attacks NOT sophisticated

Privacy backlash cracking GoogleGlass

Tales from The Dark Web

ATM attackers hit kiosks

Wrap

BlueLounge Soba

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,187 other followers