Archive for the Exclusive Category

April 26, 2016, Episode 379, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on April 26, 2016 by datasecurityblog

Episode 379 of The CyberJungle is about 22 minutes long.  The interview with Sergei Belokamen begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 379 via the flash player:

Interviews

Bugcrowd raises cash because of the power of the people. We replay out interview with Sergei Belokamen of Bugcrowd at DefCon in 2013

Our Take on This Week’s News

Bangladesh bank attackers breached SWIFT software

BlackBerry is pivoting from phones to enterprise software

Sirin Labs blasts into the secure smartphone space with a $72 million seed round

Tales from The Dark Web

Guess what’s ‘easily hacked’? Yes, that’s right: Smart city transport infrastructure

Wrap

The sound in your skull could be the ultimate password you’ll never forget

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

March 16, 2016, Episode 378, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on March 17, 2016 by datasecurityblog

Episode 378 of The CyberJungle is about 33 minutes long.  The interview with Senior Phishme Researcher Ron Tokazowski begins at about 2:10. The interview with Avvo Chief Legal Council Josh King begins at about 11:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 378 via the flash player:

Interviews

Senior Phishme Researcher Ron Tokazowski excellent blog entry, Ransomware Rising – Criakl, OSX, and others – PhishMe Tracks Down Hackers, Identifies Them and Provides Timeline of Internet Activities.

Avvo Chief Legal Council Josh King. Link to Lawyernomics Conference April 7th-9th 2016 in Las Vegas. Read his blog Social Awkward.

Ira talked about the following Las Vegas infosec and digital forensics conferences over the next few months, in this segment:

CEIC Enfuse 2016, May 23th-26th

BlackHat USA 2016, July 30th-August 4th

Bsides Las Vegas 2016, August 2nd-August 3rd

DefCon24 Las Vegas 2016, August 4th-August 7th

Our Take on This Week’s News

Preempted in this episode

Tales from The Dark Web

Preempted in this episode

Wrap

Preempted in this episode

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

Aug 23rd 2015, Episode 371 Show Notes

Posted in Conference Coverage, Exclusive, Exclusive News, Interview Only Edition, Podcast, Show Notes, The CyberJungle with tags , , , , on August 23, 2015 by datasecurityblog

Episode 371 of The CyberJungle is about 33 minutes long. This special episode has two newsmaker interviews from DEFCON23 and one newsmaker interview from BSidesLV 2015.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 371 via the flash player:

Interviews

Exclusive: Daniel Ayoub is the founder of ITUS Networks, the makers open source-based firwalls and now WiFi access points.  The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: Dutch economist Rene Mahieu spoke with us in the DEF CON Crypto & Privacy Village about upcoming research on the business of privacy. Mahieu and research partners at Princeton are hoping to discover the reasons the market for privacy enhancement products is sluggish. They’d like to hear from privacy entrepreneurs who are willing to share their experiences and insights. Contact renemahieu (at) riseup.net if you have stories to share. The interview was recorded at DEFCON 23 in Las Vegas.

Exclusive: David Porco is the developer of a new open source Windows Live Artifacts Acquisition Script project, called AChoir.

Our Take on This Week’s News

Our take on this week’s news is out on a fact finding mission.

Tales from The Dark Web

Tales from the dark web is out trolling TOR this week.

Wrap

The Ashley Madison breach and blackmailing users.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 27th 2015, Episode 369 Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on July 27, 2015 by datasecurityblog

Episode 369 of The CyberJungle is about 32 minutes long. The interview with Richard Stiennon, author of “There Will Be Cyberwar,” begins at about 17:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 369 via the flash player:

Interview

Exclusive: Richard Stiennon, author of “There Will Be Cyberwar

Our Take on This Week’s News

John McAfee: The Ashley Madison hack is the death knell of secrets

Is He Cheating on You?

Fiat Chrysler in consent degree for recall process failures

Progressive Insurance Snapshot Manufacturer Breached

Tales from The Dark Web

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware

Wrap

Black hat coffee hacker

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 6th 2015, Episode 368, su root edition, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , on July 4, 2015 by datasecurityblog

Episode 368 of The CyberJungle is about 35 minutes long.  It’s an su root edition, where we go in-depth on a topic. The interview with Dr. Mansur Hasib, on why CEOs need to be fired for poor information security, begins at about 6:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 368 via the flash player:

Interview

Exclusive: Dr. Mansur Hasib : To Improve Cybersecurity, Fire Some CEOs

More from Dr. Hasib:

Fire CEOs who don’t see cyberattacks as a business risk

Technology not a fix-all for cybersecurity

Dr. Hasib’s book, Cybersecurity Leadership, which will benefit leaders as they try to understand these issues

The book is also available in audio format narrated by Dr. Hasib

Our Take on This Week’s News

Cardinals fire scouting director as hacking investigations continue

Baseball club boots out director as details on database compromise surface

Tales from The Dark Web

No Dark Web so that we can bring you an extended segment with Dr. Hasib

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Follow

Get every new post delivered to your Inbox.

Join 1,373 other followers