Archive for the Conference Coverage Category

Aug 23rd 2015, Episode 371 Show Notes

Posted in Conference Coverage, Exclusive, Exclusive News, Interview Only Edition, Podcast, Show Notes, The CyberJungle with tags , , , , on August 23, 2015 by datasecurityblog

Episode 371 of The CyberJungle is about 33 minutes long. This special episode has two newsmaker interviews from DEFCON23 and one newsmaker interview from BSidesLV 2015.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 371 via the flash player:

Interviews

Exclusive: Daniel Ayoub is the founder of ITUS Networks, the makers open source-based firwalls and now WiFi access points.  The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: Dutch economist Rene Mahieu spoke with us in the DEF CON Crypto & Privacy Village about upcoming research on the business of privacy. Mahieu and research partners at Princeton are hoping to discover the reasons the market for privacy enhancement products is sluggish. They’d like to hear from privacy entrepreneurs who are willing to share their experiences and insights. Contact renemahieu (at) riseup.net if you have stories to share. The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: David Porco is the developer of a new open source Windows Live Artifacts Acquisition Script project, called AChoir.

Our Take on This Week’s News

Our take on this week’s news is out on a fact finding mission.

Tales from The Dark Web

Tales from the dark web is out trolling TOR this week.

Wrap

The Ashley Madison breach and blackmailing users.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Aug 22th 2015, Episode 370 Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 12, 2015 by datasecurityblog

Episode 370 of The CyberJungle is about 22 minutes long. The interview with Blackphone CTO John Callas on Android patching and the second generation Blackphone begins at about 14:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 370 via the flash player:

Interview

Blackphone CTO John Callas on Android patching . Correction: In the interview, Ira Victor said he was recording John Calla at BlackHat. The interview was recorded up the Las Vegas strip at DefCon.

Our Take on This Week’s News

Elastica Discloses Script Injection Vulnerability in Salesforce . More coverage at BetaNews.

SEC: CyberGang stole secrets for up to $100 million insider-trading profit

Researchers: Another critical car attack

 

Tales from The Dark Web

Ubiquiti Networks victim of $39 million social engineering attack

Wrap

Check out Conference Notes and Ira’s Twitter timeline for our takes on BSidesLV, PasswordHack2015, and DEF CON 23

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 04 2015, Episode 366, Show Notes

Posted in Vulnerabilities, Podcast, darkweb, Breach, criminal forensics, Exclusive, Conference Coverage, The CyberJungle, Show Notes with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 20 2015, Episode 365, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on May 20, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 30 minutes long.  The interview with Ashish Laravie from Cyber Reason begins at about 13:30.  The interview with WolfGang Kandis, CTO of Qualys begins at about 21:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 365 via the flash player:

Interview

Exclusive: Ashish Laravie from Cyberreason

WolfGang Kandis, CTO of Qualys

Our Take on This Week’s News

Feds Say That Banned Researcher Commandeered a Plane

NHTSA Aims To Speed Implementation Of Vehicle-To-Vehicle Communication

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 4, 2015, Episode 364, Show Notes

Posted in Breach, Conference Coverage, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on May 4, 2015 by datasecurityblog

Episode 364 of The CyberJungle is about 23 minutes long.  The interview with digital forensic researcher Dr. Fred Cohen begins at about 10:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 364 via the flash player:

Interview

Exclusive: Digital forensic researcher Dr. Fred Cohen . Mentioned in the segment: All.net, and the link to the digital book mentioned in the segment

Our Take on This Week’s News

Testing bodies AV‐Comparatives, AV‐TEST and Virus Bulletin comment on allegations AV company tried to rig test

Ford scraps plan to build car seat that detects heart attack

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

Major London rail station reveals system passwords during TV documentary

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Dec 3, 2014, Episode 355, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on December 3, 2014 by datasecurityblog

Episode 355 of The CyberJungle is about 27 minutes long.  The interview with Sean Morrissey, CEO Katana Forensics begins at about 17:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 355 via the flash player:

Interview

Sean Morrissey, CEO Katana Forensics

Our Take on This Week’s News


Details Emerge on Malware Used in Sony Breach

Is Uber’s rider database a sitting duck for data breaches?

 

Tales from The Dark Web

Cheapest Tablets Pose Biggest Security Risks

Wrap

The wrap is out Christmas shopping

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,308 other followers