Archive for the web server security Category

Aug 22th 2015, Episode 370 Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, eMail Security, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on August 12, 2015 by datasecurityblog

Episode 370 of The CyberJungle is about 22 minutes long. The interview with Blackphone CTO John Callas on Android patching and the second generation Blackphone begins at about 14:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 370 via the flash player:

Interview

Blackphone CTO John Callas on Android patching . Correction: In the interview, Ira Victor said he was recording John Calla at BlackHat. The interview was recorded up the Las Vegas strip at DefCon.

Our Take on This Week’s News

Elastica Discloses Script Injection Vulnerability in Salesforce . More coverage at BetaNews.

SEC: CyberGang stole secrets for up to $100 million insider-trading profit

Researchers: Another critical car attack

 

Tales from The Dark Web

Ubiquiti Networks victim of $39 million social engineering attack

Wrap

Check out Conference Notes and Ira’s Twitter timeline for our takes on BSidesLV, PasswordHack2015, and DEF CON 23

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 27th 2015, Episode 369 Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on July 27, 2015 by datasecurityblog

Episode 369 of The CyberJungle is about 32 minutes long. The interview with Richard Stiennon, author of “There Will Be Cyberwar,” begins at about 17:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 369 via the flash player:

Interview

Exclusive: Richard Stiennon, author of “There Will Be Cyberwar

Our Take on This Week’s News

John McAfee: The Ashley Madison hack is the death knell of secrets

Is He Cheating on You?

Fiat Chrysler in consent degree for recall process failures

Progressive Insurance Snapshot Manufacturer Breached

Tales from The Dark Web

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware

Wrap

Black hat coffee hacker

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Jan 17, 2015, Episode 358, Show Notes

Posted in darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security, Zero Day Project with tags , , , , on January 17, 2015 by datasecurityblog

Episode 358 of The CyberJungle is about 29 minutes long.  The interview with Sara Andrabi on infosec academic research versus industry research begins at about 17min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 358 via the flash player:

Interview

Sara Andrabi on infosec academic research vs. industry research. Find her on Peerlyst.com .

Our Take on This Week’s News

Mobile users encountered malware 75% more often in 2014 compared to 2013

Google won’t fix bug hitting 60 percent of Android phones

Secret US cybersecurity report: encryption and two factor authentication vital to protect private data

Tales from The Dark Web

CryptoWall ransomware is back with new version after two months of silence

Researchers at Cisco’s Talos group published an analysis of a new variant of Cryptowall ransomware that implements new features

Wrap

Cotton coated with microscopic metal wires traps 80% of body heat – and can even be used like an electric blanket via USB

 

Apr 30 2014, Episode 336, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 30, 2014 by datasecurityblog

Episode 336 of The CyberJungle is about 30 minutes long You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 336 via the flash player:

Interview

SecureAuth’s Garret Grajeck on Enterprise 2FA . Garret’s blog postings.

Our Take on This Week’s NewsHeartbleed flaw hits Chrome and Android users

Heartbleed flaw hits Chrome and Android users

NSA weaponizing 0days

Blackphone gets good initial response

Welcome aboard ISACA members

 

Tales from The Dark Web

MISE 0Day mitigated by firewall rule? Read background on the flaw here.

Wrap

The Wrap is on a break this week

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

——————————————————————————-

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level.

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

 

Apr 20 2014, Episode 335, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on April 21, 2014 by datasecurityblog

Episode 335 of The CyberJungle is about 28 minutes long, and the interview starts at about 15:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 335 via the flash player:

Interview

Nimmy Reichenberg on the AlgoSec Report– The State of Network Security 2014: Attitudes and Opinions

Our Take on This Week’s News

Healthcare.gov users exposed to Heartbleed

Netcraft releases Heartbleed indicator for Chrome, Firefox, and Opera

Tales from The Dark Web

Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs

Wrap

OpenSSL bug hunt: Find NEXT Heartbleed, earn $$$

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

——————————————————————————-

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level.

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

 

Apr 14 2014, Episode 334, Show Notes

Posted in Breach, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on April 13, 2014 by datasecurityblog

Episode 334 of The CyberJungle is about 42 minutes long.  This su root edition focuses on Heartbleed, with Dr. Kerry Nemovicher, cryptographer. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 334 via the flash player:

su root edition on the Heartbleed flaw

Dr. Kerry Nemovicher, cryptographer. You can email Dr. Kerry by “decoding” this email address: kerry [insert the at symbol here] c-kerry.com

Testing for “reverse” Heartbleed

Please support our sponsors, as they support The CyberJungle

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

The leading provider of software solutions for extracting meaningful intelligence from multilingual text

———————————————————————————————————————————————————-

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

Apr 1 2014, Episode 333, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on March 31, 2014 by datasecurityblog

Episode 333 of The CyberJungle is about 37 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 333 via the flash player:

Tales from The Dark Web

Did Russians frame Ukrainian hacktivists for alleged leak of 7 million credit, debit cards?

Hey, Glasshole: That cool app? It has turned you into a SPY DRONE

Our Take on This Week’s News

Fandango, Credit Karma Settle FTC Charges that They Deceived Consumers By Failing to Securely Transmit Sensitive Personal Information

Capital Hill hearing: Online Data Security Breaches, take special notice at 20, and 40min into the video

N.S.A. Breached Huawei Servers

How a Chinese Tech Firm Became the NSA’s Surveillance Nightmare

 

Please support our sponsors, as they support The CyberJungle

OUR SPONSOR, ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

Follow

Get every new post delivered to your Inbox.

Join 1,308 other followers