Archive for the Conference Coverage Category

September 29 2016, Episode 384, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on September 29, 2016 by datasecurityblog

Episode 384 of The CyberJungle is about 33 minutes long.  The interview with Dr. Fred Cohen, begins at about 10:30.   The interview with Brian Carrier, creator of open source forensic tools, begins about 26:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 384 via the flash player:

Interview

Exclusive: Dr. Fred Cohen, new approaches to infosec ; Brian Carrier, creator of open source forensic tools Autopsy

Our Take on This Week’s News

Your users have porous passwords? Blame yourself, IT.

Swift CEO reveals three more failed attacks on banking network

Sofacy APT Targeting OS X Machines with Komplex Trojan

 

Tales from The Dark Web

On a break this episode

 

 

August 15 2016, Episode 383, Show Notes

Posted in Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle on August 14, 2016 by datasecurityblog

Episode 383 of The CyberJungle is about 40 minutes long.  The interview with Mike Fong, CEO of Privoro, begins at about 14:30. The interview with Arnold Reinhold of the Diceware project, begins at about 29:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 383 via the flash player:

Interview

Exclusive: Steve Whalen, CEO and Co-Founder, Sumuri. Links to The Paladin Forensic Software, Carbon Virtual Forensics Tool, and the Sumuri Blog

Our Take on Hacker Summer Camp 2016:

DefCon24: Cyber Grand Challenge, InfoSec and AI, SE Village
* BlackHatUSA2016: CEO of Privoro, Mike Fong
* BSidesLV2016: Arnold Reinhold, Diceware/Rocksalt Password Projection Project
* Wrap: Cell Carrier’s USB drives carry malware

 

Please support our sponsors, as they help make The CyberJungle possible:

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016The Desmond

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience! SPECIAL DISCOUNT CODE: T3AMBLU ; Save $99 with this code

 

May 30, 2016 Episode 380, Show Notes

Posted in Conference Coverage, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on May 29, 2016 by datasecurityblog

Episode 380 of The CyberJungle is about 38 minutes long.  The interview with Heather Mahalik, Sr. SANS Instructor begins at 8:00.  The interview with Arron Higbee, CTO of Phishme, begins at 17:50. The interview with David Cowen begins at 28:50.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 380 via the flash player:

Interview

Heather Mahalik, Sr. SANS Instructor, Senior Scientist, Ocean’s Edge, and Author of Practical Mobile Forensics 2nd Edition

Arron Higbee, CTO Phisme, and contributor to the Phisme Blog

David Cowen, Author Hacking Exposed, Computer Forensics, hecf blog site, The Learn Forensics site on YouTube .

 

Ira’s Take on Enfuse 2016

Leveraging Multiple Skills to Analyze Evidence

Changing the Dialogue about Preservation and Spoliation

Creating Human-Friendly Security and Privacy Systems

 

 

Please support our sponsors, as they help make The CyberJungle possible:

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

Jan 22 2016, Episode 376 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 22, 2016 by datasecurityblog

Episode 376 of The CyberJungle is about 28 minutes long. The special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks begins at about 7min 45sec.  The interview with Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos begins at 21min 20sec. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 376 via the flash player:

Interview

Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos

Link from the segment: GetMonument.com

 

Our Take on This Week’s News

* Major Linux and Android exploit went undetected for three years

* Android malware steals one-time passcodes to hijack accounts protected by two-factor authentication

 

Tales from The Dark Web

Special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks . Elastica’s blog.

Wrap

The Wrap is one winter break.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Oct 2nd 2015, Episode 373 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on October 2, 2015 by datasecurityblog

Episode 373 of The CyberJungle is about 24 minutes long. The interview with David Dohl from SpiderOak on a more secure alternative to Slack begins at about 13:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 373 via the flash player:

Interview

David Dahl from SpiderOak on a more secure alternative to Slack The interview was recorded up the Las Vegas strip at DefCon.  Links mentioned in the segment: Github.com/cryton,  @deezthugs .

Our Take on This Week’s News

* Stagefright2.0, but how many will apply patch?

* DHS CISO wants security enforcement

* VW and the DMCA

Tales from The Dark Web

Dridex malware attacks bank customers while Cuckoo Miner malware attacks the banks via staffer PCs

Wrap

Time for Mac El Capitan?

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Aug 23rd 2015, Episode 371 Show Notes

Posted in Conference Coverage, Exclusive, Exclusive News, Interview Only Edition, Podcast, Show Notes, The CyberJungle with tags , , , , on August 23, 2015 by datasecurityblog

Episode 371 of The CyberJungle is about 33 minutes long. This special episode has two newsmaker interviews from DEFCON23 and one newsmaker interview from BSidesLV 2015.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 371 via the flash player:

Interviews

Exclusive: Daniel Ayoub is the founder of ITUS Networks, the makers open source-based firwalls and now WiFi access points.  The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: Dutch economist Rene Mahieu spoke with us in the DEF CON Crypto & Privacy Village about upcoming research on the business of privacy. Mahieu and research partners at Princeton are hoping to discover the reasons the market for privacy enhancement products is sluggish. They’d like to hear from privacy entrepreneurs who are willing to share their experiences and insights. Contact renemahieu (at) riseup.net if you have stories to share. The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: David Porco is the developer of a new open source Windows Live Artifacts Acquisition Script project, called AChoir.

Our Take on This Week’s News

Our take on this week’s news is out on a fact finding mission.

Tales from The Dark Web

Tales from the dark web is out trolling TOR this week.

Wrap

The Ashley Madison breach and blackmailing users.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com