Archive for the Breach Category

July 27th 2015, Episode 369 Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on July 27, 2015 by datasecurityblog

Episode 369 of The CyberJungle is about 32 minutes long. The interview with Richard Stiennon, author of “There Will Be Cyberwar,” begins at about 17:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 369 via the flash player:

Interview

Exclusive: Richard Stiennon, author of “There Will Be Cyberwar

Our Take on This Week’s News

John McAfee: The Ashley Madison hack is the death knell of secrets

Is He Cheating on You?

Fiat Chrysler in consent degree for recall process failures

Progressive Insurance Snapshot Manufacturer Breached

Tales from The Dark Web

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware

Wrap

Black hat coffee hacker

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 6th 2015, Episode 368, su root edition, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , on July 4, 2015 by datasecurityblog

Episode 368 of The CyberJungle is about 35 minutes long.  It’s an su root edition, where we go in-depth on a topic. The interview with Dr. Mansur Hasib, on why CEOs need to be fired for poor information security, begins at about 6:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 368 via the flash player:

Interview

Exclusive: Dr. Mansur Hasib : To Improve Cybersecurity, Fire Some CEOs

More from Dr. Hasib:

Fire CEOs who don’t see cyberattacks as a business risk

Technology not a fix-all for cybersecurity

Dr. Hasib’s book, Cybersecurity Leadership, which will benefit leaders as they try to understand these issues

The book is also available in audio format narrated by Dr. Hasib

Our Take on This Week’s News

Cardinals fire scouting director as hacking investigations continue

Baseball club boots out director as details on database compromise surface

Tales from The Dark Web

No Dark Web so that we can bring you an extended segment with Dr. Hasib

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 04 2015, Episode 366, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 20 2015, Episode 365, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on May 20, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 30 minutes long.  The interview with Ashish Laravie from Cyber Reason begins at about 13:30.  The interview with WolfGang Kandis, CTO of Qualys begins at about 21:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 365 via the flash player:

Interview

Exclusive: Ashish Laravie from Cyberreason

WolfGang Kandis, CTO of Qualys

Our Take on This Week’s News

Feds Say That Banned Researcher Commandeered a Plane

NHTSA Aims To Speed Implementation Of Vehicle-To-Vehicle Communication

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 4, 2015, Episode 364, Show Notes

Posted in Breach, Conference Coverage, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on May 4, 2015 by datasecurityblog

Episode 364 of The CyberJungle is about 23 minutes long.  The interview with digital forensic researcher Dr. Fred Cohen begins at about 10:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 364 via the flash player:

Interview

Exclusive: Digital forensic researcher Dr. Fred Cohen . Mentioned in the segment: All.net, and the link to the digital book mentioned in the segment

Our Take on This Week’s News

Testing bodies AV‐Comparatives, AV‐TEST and Virus Bulletin comment on allegations AV company tried to rig test

Ford scraps plan to build car seat that detects heart attack

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

Major London rail station reveals system passwords during TV documentary

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

March 15, 2015, Episode 363, Show Notes

Posted in Breach, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on April 14, 2015 by datasecurityblog

Episode 363 of The CyberJungle is about 31 minutes long.  The interview with David Duncan from Webroot begins at about 16:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 363 via the flash player:

Interview

David Duncan from Webroot on fighting ransomeware. Mentioned in the segment: The Webroot Blog

Our Take on This Week’s News

18yo Zero Day Strikes Windows Users

OSX Flaw Strikes Non-Yosemite Users

Tales from The Dark Web

Smart Cities Open Doors to Cyber Attacks? Get the IOActive report here

Wrap

No time for the wrap this week

 

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Follow

Get every new post delivered to your Inbox.

Join 1,259 other followers