Archive for the Breach Category

April 26, 2016, Episode 379, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on April 26, 2016 by datasecurityblog

Episode 379 of The CyberJungle is about 22 minutes long.  The interview with Sergei Belokamen begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 379 via the flash player:

Interviews

Bugcrowd raises cash because of the power of the people. We replay out interview with Sergei Belokamen of Bugcrowd at DefCon in 2013

Our Take on This Week’s News

Bangladesh bank attackers breached SWIFT software

BlackBerry is pivoting from phones to enterprise software

Sirin Labs blasts into the secure smartphone space with a $72 million seed round

Tales from The Dark Web

Guess what’s ‘easily hacked’? Yes, that’s right: Smart city transport infrastructure

Wrap

The sound in your skull could be the ultimate password you’ll never forget

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

March 16, 2016, Episode 378, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on March 17, 2016 by datasecurityblog

Episode 378 of The CyberJungle is about 33 minutes long.  The interview with Senior Phishme Researcher Ron Tokazowski begins at about 2:10. The interview with Avvo Chief Legal Council Josh King begins at about 11:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 378 via the flash player:

Interviews

Senior Phishme Researcher Ron Tokazowski excellent blog entry, Ransomware Rising – Criakl, OSX, and others – PhishMe Tracks Down Hackers, Identifies Them and Provides Timeline of Internet Activities.

Avvo Chief Legal Council Josh King. Link to Lawyernomics Conference April 7th-9th 2016 in Las Vegas. Read his blog Social Awkward.

Ira talked about the following Las Vegas infosec and digital forensics conferences over the next few months, in this segment:

CEIC Enfuse 2016, May 23th-26th

BlackHat USA 2016, July 30th-August 4th

Bsides Las Vegas 2016, August 2nd-August 3rd

DefCon24 Las Vegas 2016, August 4th-August 7th

Our Take on This Week’s News

Preempted in this episode

Tales from The Dark Web

Preempted in this episode

Wrap

Preempted in this episode

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

Jan 22 2016, Episode 376 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 22, 2016 by datasecurityblog

Episode 376 of The CyberJungle is about 28 minutes long. The special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks begins at about 7min 45sec.  The interview with Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos begins at 21min 20sec. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 376 via the flash player:

Interview

Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos

Link from the segment: GetMonument.com

 

Our Take on This Week’s News

* Major Linux and Android exploit went undetected for three years

* Android malware steals one-time passcodes to hijack accounts protected by two-factor authentication

 

Tales from The Dark Web

Special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks . Elastica’s blog.

Wrap

The Wrap is one winter break.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Oct 2nd 2015, Episode 373 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on October 2, 2015 by datasecurityblog

Episode 373 of The CyberJungle is about 24 minutes long. The interview with David Dohl from SpiderOak on a more secure alternative to Slack begins at about 13:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 373 via the flash player:

Interview

David Dahl from SpiderOak on a more secure alternative to Slack The interview was recorded up the Las Vegas strip at DefCon.  Links mentioned in the segment: Github.com/cryton,  @deezthugs .

Our Take on This Week’s News

* Stagefright2.0, but how many will apply patch?

* DHS CISO wants security enforcement

* VW and the DMCA

Tales from The Dark Web

Dridex malware attacks bank customers while Cuckoo Miner malware attacks the banks via staffer PCs

Wrap

Time for Mac El Capitan?

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Aug 22th 2015, Episode 370 Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 12, 2015 by datasecurityblog

Episode 370 of The CyberJungle is about 22 minutes long. The interview with Blackphone CTO John Callas on Android patching and the second generation Blackphone begins at about 14:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 370 via the flash player:

Interview

Blackphone CTO John Callas on Android patching . Correction: In the interview, Ira Victor said he was recording John Calla at BlackHat. The interview was recorded up the Las Vegas strip at DefCon.

Our Take on This Week’s News

Elastica Discloses Script Injection Vulnerability in Salesforce . More coverage at BetaNews.

SEC: CyberGang stole secrets for up to $100 million insider-trading profit

Researchers: Another critical car attack

 

Tales from The Dark Web

Ubiquiti Networks victim of $39 million social engineering attack

Wrap

Check out Conference Notes and Ira’s Twitter timeline for our takes on BSidesLV, PasswordHack2015, and DEF CON 23

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 27th 2015, Episode 369 Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on July 27, 2015 by datasecurityblog

Episode 369 of The CyberJungle is about 32 minutes long. The interview with Richard Stiennon, author of “There Will Be Cyberwar,” begins at about 17:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 369 via the flash player:

Interview

Exclusive: Richard Stiennon, author of “There Will Be Cyberwar

Our Take on This Week’s News

John McAfee: The Ashley Madison hack is the death knell of secrets

Is He Cheating on You?

Fiat Chrysler in consent degree for recall process failures

Progressive Insurance Snapshot Manufacturer Breached

Tales from The Dark Web

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware

Wrap

Black hat coffee hacker

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Follow

Get every new post delivered to your Inbox.

Join 1,373 other followers