Archive for the Court Cases Category

Apr 30 2018, Episode 400, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on April 30, 2018 by datasecurityblog

Episode 400 of The CyberJungle is about 24 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 400 via the flash player:

Last Private Place

Amazon has fixed a bug that allowed hackers to listen in on Alexa devices.

Our Take on This Week’s News

Win 7, Server 2008 ‘Total Meltdown’ exploit lands, pops admin shells

SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies

Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach; Agrees To Pay $35 Million

Tales from The Dark Web

Don’t rush to deploy 5G if you want IoT security, agency warns

Wrap

You could be flirting on dating apps with paid impersonators

PLEASE SUPPORT OUR SPONSOR – PFIC: Paraben Forensic Innovations 2018

This 2-day event brings together industry experts on a variety of topics in both lectures and labs. The best part of PFIC is as an attendee you get to attend 100% of the content with the unique rotating format of A and B days. One day you attend all the lectures the next you attend all the labs. Plus see Ira Victor, of the CyberJungle, speak. Register early seats are limited.

 

PFIC 2017,

 

Advertisements

Jan 15 2018, Episode 398, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on January 14, 2018 by datasecurityblog

Episode 398 of The CyberJungle is about 24 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 397 via the flash player:

In Depth

Samantha Stone on EHR litigation. FierceHealthcare.com has published a string of stories about the barrage of lawsuits against vendors of Electronic Medical Records. Notably, two EHR vendors have been dragged into court over fraudulent claims that their systems comply with federal requirements. Read the stories here and here.

Our Take on This Week’s News

Meltdown/Spectre fix freaked out some systems

Dear US taxpayers, 4.5b of your dollars were blown on unapproved IT projects

 How Antivirus Software Can Be Turned Into a Tool for Spying

Tales from The Dark Web

Toy Maker Settles Suit Over Hack of Kids’ Personal Data

Wrap

Cortana had a crappy CES

 

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

https://www.paraben.com/images/home-slider/paraben-logo.png

 

April 30 2017, Episode 390, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , , , on April 30, 2017 by datasecurityblog

Episode 390 of The CyberJungle is about 30 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 390 via the flash player:

Around The Corner

Hackers target payroll vulnerabilities with phishing attempts

Quote from the CEO of High-Tech Bridge regarding web security and the Verizon annual Data Breach Investigations Report (DBIR)

Ransomware, Cyberespionage Dominate Verizon DBIR

Kali Linux can now use cloud GPUs for password-cracking

Hyundai Mobile App Patched for Car Hacking Vulnerabilities

Our Take on This Week’s News

Millions of Android phones are wide open to hackers

Another Android flagship…ends up in a class-action lawsuit

Hands-on with the BlackBerry KeyOne: The most exciting Blackberry in a long time

Oregon Red Light Ticket Objector Gets Busted For Being An Engineer Without a State License

Tales from The Dark Web

Hackers exploited Word flaw for months while Microsoft investigated

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

Wrap

No Wrap in this episdoe

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

https://www.paraben.com/images/home-slider/paraben-logo.png

April 26, 2016, Episode 379, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on April 26, 2016 by datasecurityblog

Episode 379 of The CyberJungle is about 22 minutes long.  The interview with Sergei Belokamen begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 379 via the flash player:

Interviews

Bugcrowd raises cash because of the power of the people. We replay out interview with Sergei Belokamen of Bugcrowd at DefCon in 2013

Our Take on This Week’s News

Bangladesh bank attackers breached SWIFT software

BlackBerry is pivoting from phones to enterprise software

Sirin Labs blasts into the secure smartphone space with a $72 million seed round

Tales from The Dark Web

Guess what’s ‘easily hacked’? Yes, that’s right: Smart city transport infrastructure

Wrap

The sound in your skull could be the ultimate password you’ll never forget

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

March 16, 2016, Episode 378, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on March 17, 2016 by datasecurityblog

Episode 378 of The CyberJungle is about 33 minutes long.  The interview with Senior Phishme Researcher Ron Tokazowski begins at about 2:10. The interview with Avvo Chief Legal Council Josh King begins at about 11:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 378 via the flash player:

Interviews

Senior Phishme Researcher Ron Tokazowski excellent blog entry, Ransomware Rising – Criakl, OSX, and others – PhishMe Tracks Down Hackers, Identifies Them and Provides Timeline of Internet Activities.

Avvo Chief Legal Council Josh King. Link to Lawyernomics Conference April 7th-9th 2016 in Las Vegas. Read his blog Social Awkward.

Ira talked about the following Las Vegas infosec and digital forensics conferences over the next few months, in this segment:

CEIC Enfuse 2016, May 23th-26th

BlackHat USA 2016, July 30th-August 4th

Bsides Las Vegas 2016, August 2nd-August 3rd

DefCon24 Las Vegas 2016, August 4th-August 7th

Our Take on This Week’s News

Preempted in this episode

Tales from The Dark Web

Preempted in this episode

Wrap

Preempted in this episode

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

Aug 22th 2015, Episode 370 Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 12, 2015 by datasecurityblog

Episode 370 of The CyberJungle is about 22 minutes long. The interview with Blackphone CTO John Callas on Android patching and the second generation Blackphone begins at about 14:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 370 via the flash player:

Interview

Blackphone CTO John Callas on Android patching . Correction: In the interview, Ira Victor said he was recording John Calla at BlackHat. The interview was recorded up the Las Vegas strip at DefCon.

Our Take on This Week’s News

Elastica Discloses Script Injection Vulnerability in Salesforce . More coverage at BetaNews.

SEC: CyberGang stole secrets for up to $100 million insider-trading profit

Researchers: Another critical car attack

 

Tales from The Dark Web

Ubiquiti Networks victim of $39 million social engineering attack

Wrap

Check out Conference Notes and Ira’s Twitter timeline for our takes on BSidesLV, PasswordHack2015, and DEF CON 23

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Feb 2, 2015, Episode 359, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on February 1, 2015 by datasecurityblog

Episode 359 of The CyberJungle is about 27 minutes long.  The interview with Gregory Nevan, IBM Researcher begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 359 via the flash player:

Interview

Gregory Nevan, IBM Researcher. Identity Mixer allows for privacy-preserving user authentication. If the personal data is never collected, it cannot be stolen

Our Take on This Week’s News

Many BMWs open to remote attacks for over 4yrs?

Peerlyst to offer infosec pros free training/testing of security solutions. Details here.

 

Tales from The Dark Web

DarkWeb: How “sophisticated hackers” made simple error that got them nabbed.

Wrap

WW2 crypto with a twist

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology