July 4th, 2010 – Episode 151
You can hear Episode 151 by clicking on the flash player below, or you can go to our listening options page, and find other ways to receive the show. Episode 151 is one hour and ten minutes long.
Interview – Laptop security – it’s part psychology, part technology. Dr. Larry Ponemon from the Ponemon Institute shares his research on laptop theft. The interview is about ten minutes long, and it starts about 54 minutes into the show.
Interview – David Thompson is co-author of Wild West 2.0, a book that explains what’s happening as the wild web matures, and becomes civilized. The book takes a historical approach, by drawing parallels between the internet and the wild American frontier, and the disruptions to society as “gentrification” occured — and newbies began to inhabit those spaces.
Event Announcement- Sierra Nevada Infragard
Get smart about smart phone policy in the workplace:
The InfraGard Sierra Nevada Members Alliance is holding its summer meeting on Thursday, July 15, 2010, on the topic of an urgent workplace hazard: Employee-Owned Smartphones—Accessing Workplace Email and Data. A panel of data security and legal experts will cover the technology, human resource, and legal issues related to smartphones in the workplace.
This is a lunch-time event. Donation is $8 buys a light lunch and the admission. The location is: The Regional Public Safety Training Center, 5190 Spectrum Boulevard, Room #102A, Reno, Nevada
Our Take on This Week’s News
America is riddled with politically motivated surveillance,or so reports the American Civil Liberties Union. Here’s the ACLU report on police infiltration and monitoring of citizen activity in 33 states and the District of Columbia.
Don’t think about lying in family court… divorce lawyers are finding out the real scoop on facebook.
Best Buy tries to fire employee for satire. The employee was worked three years selling mobile phones for Best Buy. But the company didn’t appreciate it when its mobile phone expert created a video poking fun at the irrational appetite for iPhone. WARNING: Do not listen to this at work without headphones; potty mouth alert!
Voice mail hacking – an example of an app that allows CallerID spoofing. Anyone can get into many voice mail accounts without a password, and can listen to messages, alter settings, or even create a new voice mail greeting.
Growing risks of advanced attack threats — eighty percent of businesses have been hit.
The government of India has ordered Skype, RIM (Blackberry) and Google to provide a way for its security agencies to intercept messages. Why is this important? Two reasons: 1) we all do business with India in some indirect fashion. Someone you are doing business with is doing business with companies in India. 2) Giving a back door to the Indian government is, in effect, giving it to the world. The companies have 15 days to comply with the order or be banned from doing business in India.
FBI’s Internet Crime Complaint Center (IC3) reports a spam attack that appears to come from one of your friends who is stuck overseas without money or passport. Needs help.
The accused Russian Spies had an interesting bag of tricks that included the use of steganography. That’s the art and science of hiding messages in plain site, by embedding the information in the text of another document, or in a photo or a piece of art. It’s not just a tool for spies. You, too, can use steganography to protect your privacy.