Archive for 0Day

April 30 2017, Episode 390, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , , , on April 30, 2017 by datasecurityblog

Episode 390 of The CyberJungle is about 30 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 390 via the flash player:

Around The Corner

Hackers target payroll vulnerabilities with phishing attempts

Quote from the CEO of High-Tech Bridge regarding web security and the Verizon annual Data Breach Investigations Report (DBIR)

Ransomware, Cyberespionage Dominate Verizon DBIR

Kali Linux can now use cloud GPUs for password-cracking

Hyundai Mobile App Patched for Car Hacking Vulnerabilities

Our Take on This Week’s News

Millions of Android phones are wide open to hackers

Another Android flagship…ends up in a class-action lawsuit

Hands-on with the BlackBerry KeyOne: The most exciting Blackberry in a long time

Oregon Red Light Ticket Objector Gets Busted For Being An Engineer Without a State License

Tales from The Dark Web

Hackers exploited Word flaw for months while Microsoft investigated

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

Wrap

No Wrap in this episdoe

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

https://www.paraben.com/images/home-slider/paraben-logo.png

April 15, 2015, Episode 363, Show Notes

Posted in Breach, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on April 14, 2015 by datasecurityblog

Episode 363 of The CyberJungle is about 31 minutes long.  The interview with David Duncan from Webroot begins at about 16:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 363 via the flash player:

Interview

David Duncan from Webroot on fighting ransomeware. Mentioned in the segment: The Webroot Blog

Our Take on This Week’s News

18yo Zero Day Strikes Windows Users

OSX Flaw Strikes Non-Yosemite Users

Tales from The Dark Web

Smart Cities Open Doors to Cyber Attacks? Get the IOActive report here

Wrap

No time for the wrap this week

 

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

January 12 2013, Episode 288, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on January 12, 2013 by datasecurityblog

Episode 288 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Jeff Hudson, CEO of Venafy on SSL cert fraud, begins at about the 12:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 288  via the flash player:

Interview

Jeff Hudson, CEO of Venafy on SSL cert fraud

Tales From The Dark Web

0day Cisco VoIP flaw could cause eavesdropping without making a call

Our Take on This Weeks News

CES2012: Will Ford open telematics platform to forensic apps, and new gear to secure iPads at work
US Nuke lab tosses out Huawei gear over backdoor fears

Wrap

Microsoft hopes to patent an ‘inconspicuous mode‘ for smartphones

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

January 1 2013, Episode 287, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 31, 2012 by datasecurityblog

Episode 287 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Marc Weber Tobias on insider fraud, begins at about the 15:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 287  via the flash player:

Interview

Marc Weber Tobias mentioned two columns he wrote for Forbes on insider fraud:

How Do You Spot The Thief Inside Your Company?

A Snitch In Time Can Save Employers a Lot of Money

Mentioned in the segment: Redline Solutions

Tales From The Dark Web

0Day web attack impacts Microsoft IE8,7, and some Outlook users. Read Microsoft Security Advisory (2794220). And more from the FireEye Blog.

Our Take on This Weeks News

Still putting your crypto-protected PC in hibernate? $300 app can hack it  And, the ElcomSoft blog posting mentioned in the segment.

How Anybody Can Secretly Save Your Snapchat Videos Forever