30 minutes each week on data security, privacy, and the law….(plus or minus five)
On this week’s program:
* iPhone Security. Is that an oxymoron?
* Google Chrome Browser uses sandboxing for security. We talk to a security engineer that says his firm has built a better sandbox.
* Our take on this week’s news.
–>NEW! Stream This Week’s Show with our Built-In Flash Player:
This week’s show is 30 minutes.
–> Stream, subscribe or download Episode 63 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.
–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.
–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.
Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:
- Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .
- GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
- SonicWall; Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing Magazine. Data Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
- DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.
Show Notes for Episode 63 of the Data Security Podcast
* Conversation: Ira talks with Matt Hite, an engineer with Check Point security, about sandbox security software, and how they are trying to leapfrog the sandbox security software included in Google’s Chrome Browser.
* Tales From The Dark Web: Finjan’s Malicious Code Research Center (MCRC) has detected yet another case of a 0-day attack “in the wild”. This time, hackers are exploiting a vulnerability (CVE-2009-1862) in Adobe Acrobat/Reader and Flash player. By exploiting this vulnerability, the hackers can download and execute malicious code on the victim’s PC. Patch due from Adobe on July 31, 2009. Get ready now to roll out the patch(es).
* From the News: Advance notification by Microsoft for emergency patches for release tomorrow, July 28th, 2009. Get ready now to roll out the patch(es).
* From the News: Exposed: Repair Shops Hack Your Laptops.
* Wrap: Ira will be traveling to DefCon, the World’s Largest Hacker Event, this weekend. DefCon is held in Las Vegas, Nevada. Ira will be tweeting from the show, you can follow his comments at his Twitter site, http://twitter.iravictor.net . If you plan to attend DefCon, follow his tweets, find him, and say hello.
* Correction: When Ira spoke about iPhone security, he did not credit Jonathan Zdziarski for the comments about screen captures and keylogging. We apologize for the mistake.