Archive for March, 2013

March 27 2013, Episode 295, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 27, 2013 by datasecurityblog

Episode 295 of The CyberJungle is about 35 minutes long.  The interview with the Founder of Stop the Hackers begins at about the 20min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 295 via the flash player:

Interview

Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s thesis research includes well over twenty published papers in the areas of internet security, measurements and web technology.

Tales From The Dark Web

Industrial espionage is ripping off SA firms

Our Take On This Week’s News

South Korea bank attacks should prompt rethink in U.S.

Of 1,800 serious malware NSS Labs tested, some always managed to get through — no matter what combination of protection was used

What You Didn’t Post, Facebook May Still Know

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Advertisements

March 19 2013, Episode 294, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 19, 2013 by datasecurityblog

Episode 294 of The CyberJungle is about 30 minutes long.  The interview with James Elste on privacy and Trusted Identities begins at about the 15min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 294 via the flash player:

Interview

James Elste, information security expert, talks privacy and NIST’s Trusted Identities effort. Here are the links from the segment:

www.idecosystem.org

NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE

Making Online Transactions Safer, Faster, and More Private

Tales From The Dark Web

Ira talked about the credit reporting agency break ins, and how Federal law made the attacks easier

Our Take On This Week’s News

Huawei USB modems vulnerable

How will you know who’s recording? Google Glass protestors set up campaign group to censor the high-tech eyewear

Wrap

Ohio judge calls speed cameras ‘scam’

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

March 06 2013, Episode 293, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle with tags , , , , , , on March 6, 2013 by datasecurityblog

Episode 293 of The CyberJungle is about 25 minutes long.  The interview with Dr. Larry Ponemon on the Post Breach Boom report, begins at about the 10min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 293 via the flash player:

Interview

Dr Larry Ponemon speaks with Ira about the reports, The Post Breach Boom, and Risk of Insider Fraud: Second Annual Study.

Tales From The Dark Web

Evernote: We’re Adding Two-Factor Authentication

Tales Our Take On This Week’s News

Dating Websites Providing More Divorce Evidence Says Survey: Nation’s Top Matrimonial Lawyers Cite Match.com as Most Common Source

New Samsung Galaxy phone might be controlled by your eyes

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.