Archive for the Exclusive Category

Feb 25, 2015, Episode 360, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on February 25, 2015 by datasecurityblog

Episode 360 of The CyberJungle is about 27 minutes long.  The interview with Heather Wilde begins at about 15:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 360 via the flash player:

Interview

Heather Wilde, from ROCeteer

Our Take on This Week’s News

Security software found using Superfish-style code, as attacks get simpler

Komodia.com, home to the SSL interception module at the heart of the Superfish adware dustup, hit by DDOS attacks

14-Year-Old Hacks Connected Cars With Pocket Money

California tries (once again) to protect digital information

Tales from The Dark Web

Psst, hackers. Just go for the known vulnerabilities

Wrap

Netgear invited to address the flaw Heather Wilde discovered

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

 

 

 

Feb 2, 2015, Episode 359, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on February 1, 2015 by datasecurityblog

Episode 359 of The CyberJungle is about 27 minutes long.  The interview with Gregory Nevan, IBM Researcher begins at about 14:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 359 via the flash player:

Interview

Gregory Nevan, IBM Researcher. Identity Mixer allows for privacy-preserving user authentication. If the personal data is never collected, it cannot be stolen

Our Take on This Week’s News

Many BMWs open to remote attacks for over 4yrs?

Peerlyst to offer infosec pros free training/testing of security solutions. Details here.

 

Tales from The Dark Web

DarkWeb: How “sophisticated hackers” made simple error that got them nabbed.

Wrap

WW2 crypto with a twist

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Sept 4, 2014, Episode 349, su root edtion, Show Notes

Posted in darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on September 3, 2014 by datasecurityblog

Episode 349 of The CyberJungle is about 36 minutes long.  This is an su root edition, where we go deep on one technical topic. Topic in this program: The iCloud Nude Photos Attack. Click on the Flash Player to listen below, or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 349 via the flash player:

Interview

Exclusive Interview: ElcomSoft CEO Vladimir Katalov; Were ElcomSoft forensic tools used in the nude photo breaches?

Vladimir’s iCloud Blog posting from 2013 that talked about this logic flaw.

Apple Should Be More Transparent About Security

Notes on the Celebrity Data Theft

Elcomsoft’s phone password breaker

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

Aug 30, 2014, Episode 348, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 29, 2014 by datasecurityblog

Episode 348 of The CyberJungle is about 36 minutes long.  Blackphone CEO John Calais on open-source based securephones starts at 15:45min. From BlackBerry’s Security Program Management Office, Susan Riedel,  starts at about 24min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 348 via the flash player:

Interview

Blackphone CTO John Callas on open-source based securephones

From BlackBerry’s Security Program Management Office, Susan Riedel. Blackberry’s Career Page

Our Take on This Week’s News

Belkasoft’s take on SSDForensics, 2014 Edition, 2012 Edition

Elcomsoft’s phone password breaker

Tales from The Dark Web

Our take on the JPMorgan news coverage

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

Aug 15, 2014, Episode 347, Show Notes

Posted in Business Continuity, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on August 14, 2014 by datasecurityblog

Episode 347 of The CyberJungle is about 36 minutes long.  Daniel Ayoub’s Kickstarter project for SOHO infosec starts at 13min. Adam Shostack on transparent incident response starts at about 21min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 347 via the flash player:

Interview

Daniel Ayoub’s Kickstarter project for SOHO infosec

Adam Shostack on transparent incident response

Our Take on This Week’s News

SOHOpelessly Broken SOHO router/firewall

IRA failed to perform background checks on contractors

 

Tales from The Dark Web

Urgent Adobe PDF patching, or install alternatives now

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

July 23rd, 2014, Episode 345, Show Notes

Posted in Breach, darkweb, ediscovery, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , on July 23, 2014 by datasecurityblog

Episode 345 of The CyberJungle is about 26 minutes long. This is a special su root edition where we do a deep technical dive. This su root edition is an exclusive on a new countermeasure to Zues Trojan, and Enterprise Attacks, with Egemen Tas, Comodo VP of Engineering. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 345 via the flash player:

Interview

Exclusive: Egemen Tas, Comodo VP of Engineering,  Link to the software.

 

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

July 22nd, 2014, Episode 344, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , on July 21, 2014 by datasecurityblog

Episode 344 of The CyberJungle is about 30 minutes long. Vere Software CEO Todd Shipley on TOR, starts at about 12min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 344 via the flash player:

Interview

Vere Software CEO Todd Shipley

Our Take on This Week’s News

CryptoLocker+TOR = More attacks

Researchers breach TeslaModelS

Tales from The Dark Web

Wall Street Journal’s Facebook account breached, results not pretty

Wrap

RIP James Garner. See him as Jim Rockford, master social engineer.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,187 other followers