Archive for April, 2013

April 16 2013, Episode 298, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 16, 2013 by datasecurityblog

Episode 298 of The CyberJungle is about 26 minutes long.  The interview with Steve Roylance of GlobalSign on browser SSL changes begins at about the 14:30 mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 298 via the flash player:

Interview

Steve Roylance of GlobalSign. Read this blog posting for more insight into “mixed” SSL browser messages

Tales From The Dark Web

Blog site attacks. Three links were mentioned in the segment: 1. CloudFlare WAF, 2. WordPress anti-brute force plug-in, 3. Two factor authentication for log in

Our Take On This Week’s News

Ex police union lawyer sues LE for privacy violations

South Korea IDs cyber attacker; and creates “air gap” in nuke power plant controller network

Wrap

Is CISPA back? Google and Yahoo Execs support it, EFF and DuckDuckGo.com oppose

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

Advertisements

April 8 2013, Episode 297, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on April 8, 2013 by datasecurityblog

Episode 297 of The CyberJungle is about 35 minutes long.  The interview with the Toby Rush, CEO and Founder of EyeVerify begins at about the 20min mark, following Tales from The Dark Web. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 297 via the flash player:

Interview

Toby Rush, CEO and Founder of EyeVerify

Tales From The Dark Web

Online tracking firm surreptitiously siphons personal data, changes security settings on computers, suit alleges

Our Take On This Week’s News

Untappable Apple or DEA Disinformation?

First Person Shooter: Taser’s new cop-cam takes aim at perps and privacy

Wrap

SpyDialer Reverse Cell Phone Search

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

April 2 2013, Episode 296, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 2, 2013 by datasecurityblog

Episode 296 of The CyberJungle is about 35 minutes long.  The interview with the Givonn Jones of SiteLock begins at about the 24min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 296 via the flash player:

Interview

From the floor of the Parallels conference in Las Vegas: Givonn Jones of SiteLock

Tales From The Dark Web

SpamHaus group under attack from cyber-vandals in Geneva; US-CERT Alert (TA13-088A), DNS Amplification Attacks

Our Take On This Week’s News

Why is China reading your email, and should you care?

Apple and the security of your data

How Private Data Became Public on Amazon’s Cloud

Wrap

Electronic road signs breach in Illinois

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.