Archive for the eMail Security Category

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Jan 5, 2015, Episode 357, Show Notes

Posted in Breach, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on January 5, 2015 by datasecurityblog

Episode 357 of The CyberJungle is about 27 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 357 via the flash player:

Interview

The Interview took a holiday break, here are the links mentioned in the segment:

Ditto Forensic FieldStation , the interview with James  Wiebe of CRU on remote digital forensics.

The Imitation Game

Our Take on This Week’s News


Got a new Android phone? Here’s how to properly get rid of your old one

Five ways to repurpose (or sell!) unwanted tech

Strings messaging service lets you take back what you sent

Diabetes Patients Are Hacking Their Way Toward a Bionic Pancreas

 

Tales from The Dark Web

Age-old VBScript tactic is BACK in biz attack

Wrap

More embarrassing than a bad movie: Sony-shaming and Korea blaming

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Aug 30, 2014, Episode 348, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 29, 2014 by datasecurityblog

Episode 348 of The CyberJungle is about 36 minutes long.  Blackphone CEO John Calais on open-source based securephones starts at 15:45min. From BlackBerry’s Security Program Management Office, Susan Riedel,  starts at about 24min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 348 via the flash player:

Interview

Blackphone CTO John Callas on open-source based securephones

From BlackBerry’s Security Program Management Office, Susan Riedel. Blackberry’s Career Page

Our Take on This Week’s News

Belkasoft’s take on SSDForensics, 2014 Edition, 2012 Edition

Elcomsoft’s phone password breaker

Tales from The Dark Web

Our take on the JPMorgan news coverage

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

Aug 15, 2014, Episode 347, Show Notes

Posted in Business Continuity, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on August 14, 2014 by datasecurityblog

Episode 347 of The CyberJungle is about 36 minutes long.  Daniel Ayoub’s Kickstarter project for SOHO infosec starts at 13min. Adam Shostack on transparent incident response starts at about 21min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 347 via the flash player:

Interview

Daniel Ayoub’s Kickstarter project for SOHO infosec

Adam Shostack on transparent incident response

Our Take on This Week’s News

SOHOpelessly Broken SOHO router/firewall

IRA failed to perform background checks on contractors

 

Tales from The Dark Web

Urgent Adobe PDF patching, or install alternatives now

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

July 11th, 2014, Episode 343, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on July 10, 2014 by datasecurityblog

Episode 343 of The CyberJungle is about 34 minutes long. Carl Wright, of TrapX starts at about 6:50min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 343 via the flash player:

Interview

Carl Wright, of TrapX . Here is a link to the report.

Our Take on This Week’s News

Android re-sets do not wipe data properly.

Tales from The Dark Web

Microsoft Macro attacks are back.

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

June 26, 2014, Episode 341, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on June 25, 2014 by datasecurityblog

Episode 341 of The CyberJungle is about 30 minutes long. Dr. Larry Ponemon, of The Ponemon Institute starts at about 16min, a new twist on WiFi attacks in Tales from the Dark Web, Dropbox Bank Trojans, and Miscrosoft’s new threat sharing initiatives, and the IRS email scandal in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 341 via the flash player:

Interview

Threat Sharing; Dr. Ponemon, the Ponemon Institute. Email mentioned in the segment: research@ponemon.org .

Our Take on This Week’s News

Microsoft launches Interflow, a security and threat information exchange platform

Dropbox+Bank Trojan=Perfect Business User Storm?

Tales from The Dark Web

New WiFi attack

App mentioned in the segment: OperaMax

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,259 other followers