Archive for the Breach Category

March 28 2017, Episode 389, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 28, 2017 by datasecurityblog

Episode 389 of The CyberJungle is about 30 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 389 via the flash player:

Our Take On Changeable Biometrics

As hackers learn to imitate the body’s unique features, scientists might turn to brainwaves and genomics to verify people’s identities

Our Take on This Week’s News

LastPass tackles zero day discoveries

The sad state of Android patches

Deceptive security on a budget

Healthcare looks to cloud to improve security

Tales from The Dark Web

BCE attacker steals over $100m from businesses

The investigation into the Bangladesh Bank heist continues

Wrap

US Supreme Court to rule: Who controls used ink cartridges?

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

https://www.paraben.com/images/home-slider/paraben-logo.png

January 25 2017, Episode 387, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on January 25, 2017 by datasecurityblog

Episode 387 of The CyberJungle is about 26 minutes long.  The interview with Leon Kuperman from CujoThe interview with Dr. Fred Cohen, begins at about 10:30., begins at about 15:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 387 via the flash player:

Interview

Leon Kuperman from Cujo , enter CES at checkout for the discount mentioned in the segment

Our Take on This Week’s News

Charger mobile ransomware

Cisco WebEx extension opens Chrome users to drive-by malware attacks

Already on probation, Symantec issues more illegit HTTPS certificates

Chrome dev explains how modern browsers make secure UI just about impossible

The 5 Gotchas Of Cyber Incidents

How did Private Manning get caught, if WikiLeaks doesn’t reveal sources?

Tales from The Dark Web

Financial Cyberattacks Rose 22.49 Percent Q4 2016

November 30 2016, Episode 386, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on November 30, 2016 by datasecurityblog

Episode 386 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 386 via the flash player:

Commentary

New Details Suggest Rogue Government Agent Deleted Evidence in Silk Road Case

Our Take on This Week’s News

Ira talked about the comments by Javvad Malik, security advocate at AlienVault, about the SF Muni breach

IPhone users hit by ‘calendar spam

Mirai botnet attack hits thousands of home routers, throwing users offline

US-CERT updates cybersecurity incident notification guidelines

Hunted: CBS game show contestants to flee surveillance

Tales from The Dark Web

‘Dronejacking’ may be the next big cyber threat

Tech support scams evolve, borrow tricks from ransomware creators

Wrap

This $1,500 Toaster Oven Is Everything That’s Wrong With Silicon Valley Design

October 31 2016, Episode 385, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on October 31, 2016 by datasecurityblog

Episode 385 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 385 via the flash player:

Commentary

Contrarian approach to a more secure smartphones. Links here and here

Our Take on This Week’s News

Cyberattack on 911 Critical Infrastructures

Password not accepted: are biometric checks the answer?

TouchID comes to Macbook OS X Sierra

Blockchain is empowering the future of insurance

Tales from The Dark Web

Defenseless internet ‘paying the price’ for ignoring security

Twitter Account Shows Mirai Botnets Using Your Security Camera In Cyber Turf War

 HackForums delete “Server Stress Testing” amidst links with Dyn DDoS Attack

September 29 2016, Episode 384, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on September 29, 2016 by datasecurityblog

Episode 384 of The CyberJungle is about 33 minutes long.  The interview with Dr. Fred Cohen, begins at about 10:30.   The interview with Brian Carrier, creator of open source forensic tools, begins about 26:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 384 via the flash player:

Interview

Exclusive: Dr. Fred Cohen, new approaches to infosec ; Brian Carrier, creator of open source forensic tools Autopsy

Our Take on This Week’s News

Your users have porous passwords? Blame yourself, IT.

Swift CEO reveals three more failed attacks on banking network

Sofacy APT Targeting OS X Machines with Komplex Trojan

 

Tales from The Dark Web

On a break this episode

 

 

July 20 2016, Episode 382, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 20, 2016 by datasecurityblog

Episode 382 of The CyberJungle is about 26 minutes long.  The interview with Steve Whalen, CEO and Co-Founder, Sumuri (say sue-more-e), begins at about 15:50.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 382 via the flash player:

Interview

Exclusive: Steve Whalen, CEO and Co-Founder, Sumuri. Links to The Paladin Forensic Software, Carbon Virtual Forensics Tool, and the Sumuri Blog

Our Take on This Week’s News

Security software that uses ‘code hooking’ opens the door to hackers

Thanks, script kiddies: 100Gbps DDoS attacks now commonplace

5 Lessons From The FDIC’s Breach Disclosure Debacle

Beazley sees hacking and malware threat growing for financial institutions

Tales from The Dark Web

Trojan danger where you might least expect it – your remote desktop application. More coverage here

Please support our sponsors, as they help make The CyberJungle possible:

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016The Desmond

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

July 02, 2016, Episode 381, Show Notes

Posted in Breach, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on July 2, 2016 by datasecurityblog

Episode 381 of The CyberJungle is about 27 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 381 via the flash player:

Our Take on This Week’s News

Tesla Faces Backlash Over Autopilot Technology in Wake of Crash

Stealth startup Zoox lands $200m for its secretive self-driving car

High-severity bugs in 25 Symantec/Norton products imperils millions

Windows ‘BadTunnel’ Attack Hijacks Network Traffic

Widespread Attack on Office 365 Corporate Users with Zero-day Ransomware Virus

Hackers Can Exploit LibreOffice Flaw With RTF Files

Foxit Patches RCE Flaws in Reader, PhantomPDF

Dating site Muslim Match data breach can actually get people killed

Clicking With The Enemy

SWIFT hackers nick $10m from Ukraine bank

Tales from The Dark Web

Over 100 DDoS botnets built using Linux malware for embedded devices

Mobile ransomware use jumps, blocking access to phones

Wrap

Browse free or die? New Hampshire library is at privacy fore

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!