Archive for the Exclusive News Category

Jan 22 2016, Episode 376 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 22, 2016 by datasecurityblog

Episode 376 of The CyberJungle is about 28 minutes long. The special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks begins at about 7min 45sec.  The interview with Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos begins at 21min 20sec. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 376 via the flash player:

Interview

Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos

Link from the segment: GetMonument.com

 

Our Take on This Week’s News

* Major Linux and Android exploit went undetected for three years

* Android malware steals one-time passcodes to hijack accounts protected by two-factor authentication

 

Tales from The Dark Web

Special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks . Elastica’s blog.

Wrap

The Wrap is one winter break.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Aug 23rd 2015, Episode 371 Show Notes

Posted in Conference Coverage, Exclusive, Exclusive News, Interview Only Edition, Podcast, Show Notes, The CyberJungle with tags , , , , on August 23, 2015 by datasecurityblog

Episode 371 of The CyberJungle is about 33 minutes long. This special episode has two newsmaker interviews from DEFCON23 and one newsmaker interview from BSidesLV 2015.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 371 via the flash player:

Interviews

Exclusive: Daniel Ayoub is the founder of ITUS Networks, the makers open source-based firwalls and now WiFi access points.  The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: Dutch economist Rene Mahieu spoke with us in the DEF CON Crypto & Privacy Village about upcoming research on the business of privacy. Mahieu and research partners at Princeton are hoping to discover the reasons the market for privacy enhancement products is sluggish. They’d like to hear from privacy entrepreneurs who are willing to share their experiences and insights. Contact renemahieu (at) riseup.net if you have stories to share. The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: David Porco is the developer of a new open source Windows Live Artifacts Acquisition Script project, called AChoir.

Our Take on This Week’s News

Our take on this week’s news is out on a fact finding mission.

Tales from The Dark Web

Tales from the dark web is out trolling TOR this week.

Wrap

The Ashley Madison breach and blackmailing users.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 23rd, 2014, Episode 345, Show Notes

Posted in Breach, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , on July 23, 2014 by datasecurityblog

Episode 345 of The CyberJungle is about 26 minutes long. This is a special su root edition where we do a deep technical dive. This su root edition is an exclusive on a new countermeasure to Zues Trojan, and Enterprise Attacks, with Egemen Tas, Comodo VP of Engineering. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 345 via the flash player:

Interview

Exclusive: Egemen Tas, Comodo VP of Engineering,  Link to the software.

 

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Dec 9th 2013, Episode 322, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle with tags , , on December 9, 2013 by datasecurityblog

Episode 322 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 322 via the flash player:

Our Take on This Week’s News

Bitcoin fraud and cybercrimes: Inside BitCoin Conference; In the Murky World of Bitcoin, Fraud Is Quicker Than the Law; Buying a Tesla with bitcoin? Not so fast

Does LE have a new approach to fighting cyber crime? 13 members of the criminal community, “gained” via Internet virus about 70 million rubles were arrested; Russia charges ‘criminal organization’ behind Blackhole malware kit

Tales From The Dark Web

RICO used in Cybercrime Conviction

Wrap

Luxury toilet users warned of hardware flaw

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. * File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

Find out more at Atola.com

 

Nov 27 2013, Episode 321, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on November 27, 2013 by datasecurityblog

Episode 321 of The CyberJungle is about 25 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 321 via the flash player:

Interviews

Amber Schroader, CEO of Paraben Forensics

Our Take on This Week’s News

Ground-breaking cyber crime case, and the Gmail flaw talked about in the segment

Malware predictions for 2014

Tales From The Dark Web

CryptoLocker surge led by drop in value in IDs?

Wrap

New technique for late night IT work?

Please support our sponsors, as they support The CyberJungle

OUR NEWEST SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases:

* Excellent disk imaging speed up to 180 MB/s

* Checksum calculation: MD5, SHA (1, 224, 256, 384, 512)

* Forensic data erasure methods including DoD 5220.22-M, Security Erase, NIST 800-88, Pattern Erase

* Case management system

* ATA Password removal

* File recovery for NTFS (all versions), Ext 2/3/4, HFS, HFS+, HFSX, ExFAT, FAT16, FAT32

* High performance of the multi-pass imaging for damaged drives

* Authentic Atola HDD diagnostics that creates a detailed report in minutes.

Find out more at Atola.com

 

December 19, 2011 – Episode 242

Posted in Annoucements, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on December 19, 2011 by datasecurityblog

Episode 242 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics begins at about 13min.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 242 via the flash player:

Interview

Sean Morrissey of Katana Forensics launches LaternLite iOS Forensics tool this week

Our Take On This Week’s News

Forensic innovator Jonathan Grier has developed tools that use statistical analysis of file access data to reconstruct timelines. According to Mr. Gerier, his method can be used to determine what, if data was exfiltrated from the system. Read more in: Detecting data theft using stochastic forensics.

Excellent work by c|net’s Elinor Mills on the software by CarrierIQ that some have labeled as an illegal “root kit.” Read: Sprint disabling Carrier IQ on phones.

Tales From The Dark Web

Passwords hard coded into industrial control systems – What could possibly go wrong?

Wrap

New job opportunity for those with Photoshop forensics skills? US watchdog bans photoshopping in cosmetics ads. Wow, and I thought all those models had perfect faces and perfect bodies all of the time…

October 24, 2011 – Episode 235

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on October 24, 2011 by datasecurityblog

Episode 235  of  The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 12min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 235 via the flash player:

Interview

EXCLUSIVE: Does ‘Son of Stuxnet’ hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take

Our Take On This Week’s News

Another online video breach victim: Microsoft . Read more at Geekwire.

iPad Smart Cover Security Flaw. Read more at PCWorld

Tales From The Dark Web

NASDAQ attackers target business executives. Read more at the Chicago Tribune.

Wrap

What if, two years before the 9/11 attacks the U.S. had been given complete digital forensic access to al-Qaeda and Taliban calls and data? Read more in the long, but very worthwhile, Vanity Fair story.


Follow

Get every new post delivered to your Inbox.

Join 1,386 other followers