Archive for the Court Cases Category

Aug 22th 2015, Episode 370 Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 12, 2015 by datasecurityblog

Episode 370 of The CyberJungle is about 22 minutes long. The interview with Blackphone CTO John Callas on Android patching and the second generation Blackphone begins at about 14:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 370 via the flash player:

Interview

Blackphone CTO John Callas on Android patching . Correction: In the interview, Ira Victor said he was recording John Calla at BlackHat. The interview was recorded up the Las Vegas strip at DefCon.

Our Take on This Week’s News

Elastica Discloses Script Injection Vulnerability in Salesforce . More coverage at BetaNews.

SEC: CyberGang stole secrets for up to $100 million insider-trading profit

Researchers: Another critical car attack

 

Tales from The Dark Web

Ubiquiti Networks victim of $39 million social engineering attack

Wrap

Check out Conference Notes and Ira’s Twitter timeline for our takes on BSidesLV, PasswordHack2015, and DEF CON 23

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Feb 2, 2015, Episode 359, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on February 1, 2015 by datasecurityblog

Episode 359 of The CyberJungle is about 27 minutes long.  The interview with Gregory Nevan, IBM Researcher begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 359 via the flash player:

Interview

Gregory Nevan, IBM Researcher. Identity Mixer allows for privacy-preserving user authentication. If the personal data is never collected, it cannot be stolen

Our Take on This Week’s News

Many BMWs open to remote attacks for over 4yrs?

Peerlyst to offer infosec pros free training/testing of security solutions. Details here.

 

Tales from The Dark Web

DarkWeb: How “sophisticated hackers” made simple error that got them nabbed.

Wrap

WW2 crypto with a twist

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

July 2, 2014, Episode 342, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on July 1, 2014 by datasecurityblog

Episode 342 of The CyberJungle is about 35 minutes long. Dr. Jason Nieh of Columbia University on Android Security, starts at about 18min;  InfoSec expert or cybercriminal for hire; Microsoft’s intentional collateral damage; Corporate boards wake up to infosec; PayPal chokes another legal business. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 342 via the flash player:

Interview

Android keys to the castle, with Dr. Jason Nieh of Columbia University. Link to the tool mentioned in the segment

Our Take on This Week’s News

Microsoft’s intentional collateral damage

Corporate boards wake up to infosec?

PayPal chokes another legal business?

Tales from The Dark Web

InfoSec expert or cybercriminal for hire?  You decide.

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 26, 2014, Episode 341, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on June 25, 2014 by datasecurityblog

Episode 341 of The CyberJungle is about 30 minutes long. Dr. Larry Ponemon, of The Ponemon Institute starts at about 16min, a new twist on WiFi attacks in Tales from the Dark Web, Dropbox Bank Trojans, and Miscrosoft’s new threat sharing initiatives, and the IRS email scandal in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 341 via the flash player:

Interview

Threat Sharing; Dr. Ponemon, the Ponemon Institute. Email mentioned in the segment: research@ponemon.org .

Our Take on This Week’s News

Microsoft launches Interflow, a security and threat information exchange platform

Dropbox+Bank Trojan=Perfect Business User Storm?

Tales from The Dark Web

New WiFi attack

App mentioned in the segment: OperaMax

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 12, 2014, Episode 340, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle with tags , , , , , , on June 12, 2014 by datasecurityblog

Episode 340 of The CyberJungle is about 35 minutes long. Eric Springer, Bitcoin Vigil Founder starts at about 20min, Chinese Industrial Espionage in Tales from the Dark Web, Dropbox Ransomeware, and the 11th Circuit rules 4th Amendment applies to cellphone location data in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 340 via the flash player:

Interview

Eric Springer, Bitcoin Vigil Founder

Our Take on This Week’s News

Dropbox+Ransomeware=Perfect Business User Storm?

11th Circuit rules 4th Amendment applies to cellphone location data

Tales from The Dark Web

Chinese Industrial Espionage,

PUTTER PANDA RELEASE WAS CALCULATED DECISION, see 5th story down on this Politico page

NIST Supply Chain Risk Management

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 3 2014, Episode 339, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on June 3, 2014 by datasecurityblog

Episode 339 of The CyberJungle is about 30 minutes long. Kelly Hazelton on industrial controls security starts at about 24min, attacks on PHI surge in our Tales from The Dark Web segment, and one the scariest cyber attacks we have ever seen in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 339 via the flash player:

Interview

Kelly Hazelton on industrial controls security

Our Take on This Week’s News

Registry hack updates XP

ChildPorn+CryptoLocker=LegalNightmare

Cybercrime laws used to target legit infosec research?

Tales from The Dark Web

Cybercriminals target PHI

Wrap

Snowden on metadata

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,308 other followers