Archive for the Vulnerabilities Category

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 04 2015, Episode 366, Show Notes

Posted in Vulnerabilities, Podcast, darkweb, Breach, criminal forensics, Exclusive, Conference Coverage, The CyberJungle, Show Notes with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 20 2015, Episode 365, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on May 20, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 30 minutes long.  The interview with Ashish Laravie from Cyber Reason begins at about 13:30.  The interview with WolfGang Kandis, CTO of Qualys begins at about 21:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 365 via the flash player:

Interview

Exclusive: Ashish Laravie from Cyberreason

WolfGang Kandis, CTO of Qualys

Our Take on This Week’s News

Feds Say That Banned Researcher Commandeered a Plane

NHTSA Aims To Speed Implementation Of Vehicle-To-Vehicle Communication

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

March 15, 2015, Episode 363, Show Notes

Posted in Breach, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on April 14, 2015 by datasecurityblog

Episode 363 of The CyberJungle is about 31 minutes long.  The interview with David Duncan from Webroot begins at about 16:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 363 via the flash player:

Interview

David Duncan from Webroot on fighting ransomeware. Mentioned in the segment: The Webroot Blog

Our Take on This Week’s News

18yo Zero Day Strikes Windows Users

OSX Flaw Strikes Non-Yosemite Users

Tales from The Dark Web

Smart Cities Open Doors to Cyber Attacks? Get the IOActive report here

Wrap

No time for the wrap this week

 

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

March 28, 2015, Episode 361, Show Notes

Posted in Breach, Exclusive, Vulnerabilities with tags , , , on March 28, 2015 by datasecurityblog

Episode 362 of The CyberJungle is about 27 minutes long. The interview with Daniel Stein, on health info use and privacy begins at about 13:40. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 362 via the flash player:

Interview

Daniel Stein, President Stewards of Change. Read more here: How Open Data Can Shape Public Policy

Our Take on This Week’s News

Cyberthreats heavy on the minds of health provider, insurer technology execs

Security Community Slams Blue Coat Claiming It ‘Pressured Security Researcher Into Cancelling Talk On Its Tech

Tales from The Dark Web

RansomWeb: emerging website threat that may outshine DDoS, data theft and defacements?

Wrap

The authorized information available the NSA HQ could be published in a single tweet

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

March 14, 2015, Episode 361, Show Notes

Posted in Breach, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 14, 2015 by datasecurityblog

Episode 361 of The CyberJungle is about 27 minutes long.  The interview with Frank Ohlhorst, IT Journalist begins at about 14:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 361 via the flash player:

Interview

Frank Ohlhorst is an IT Journalist, Author, Analyst, and Consultant. Mentioned in the segment: 2015 Shaping up to be the Year of Massive Cyber Attacks

More articles by Frank Ohlhorst:

Free identity protection from breached companies falls short

Review: Vectra X-Series Prevents Data Breaches with AI

WatchGuard Security Appliance Keeps Close Watch on Network Activity

Our Take on This Week’s News

Ad bidding network caught slinging ransomware

Digital Certificate Forensics: What Venafi TrustNet Tells Us about the Clinton Email Server

Hackers, probing Clinton server, cite security lapses

Tales from The Dark Web

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

 

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Feb 25, 2015, Episode 360, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on February 25, 2015 by datasecurityblog

Episode 360 of The CyberJungle is about 27 minutes long.  The interview with Heather Wilde begins at about 15:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 360 via the flash player:

Interview

Heather Wilde, from ROCeteer

Our Take on This Week’s News

Security software found using Superfish-style code, as attacks get simpler

Komodia.com, home to the SSL interception module at the heart of the Superfish adware dustup, hit by DDOS attacks

14-Year-Old Hacks Connected Cars With Pocket Money

California tries (once again) to protect digital information

Tales from The Dark Web

Psst, hackers. Just go for the known vulnerabilities

Wrap

Netgear invited to address the flaw Heather Wilde discovered

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 1,257 other followers