Archive for Amazon S3

March 5 2018, Episode 399, Show Notes

Posted in Breach, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 4, 2018 by datasecurityblog

Episode 399 of The CyberJungle is about 30 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 399 via the flash player:

Interview

Now that California is about to allow testing of self-driving cars without a driver present, we re-play our interview with Abe Chen of Nio about infosec and self driving cars.

Our Take on This Week’s News

1 in 50 publicly readable Amazon buckets are also writable – and that’s a data disaster waiting to happen

Memcached DDoS Attackers Are Asking for a Ransom Demand

IRS, States and Tax Industry Warn Employers to Beware of Form W-2 Scam; Tax Season Could Bring New Surge in Phishing Scheme

Tales from The Dark Web

New 4G LTE attacks can spy on messages, track user location, and more

Wrap

23,000 HTTPS certificates axed after CEO emails private keys

PLEASE SUPPORT OUR SPONSOR – PFIC: Paraben Forensic Innovations 2018

This 2-day event brings together industry experts on a variety of topics in both lectures and labs. The best part of PFIC is as an attendee you get to attend 100% of the content with the unique rotating format of A and B days. One day you attend all the lectures the next you attend all the labs. Plus see Ira Victor, of the CyberJungle, speak. Register early seats are limited.

 

PFIC 2017,

 

Advertisements

April 2 2013, Episode 296, Show Notes

Posted in Breach, Conference Coverage, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 2, 2013 by datasecurityblog

Episode 296 of The CyberJungle is about 35 minutes long.  The interview with the Givonn Jones of SiteLock begins at about the 24min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 296 via the flash player:

Interview

From the floor of the Parallels conference in Las Vegas: Givonn Jones of SiteLock

Tales From The Dark Web

SpamHaus group under attack from cyber-vandals in Geneva; US-CERT Alert (TA13-088A), DNS Amplification Attacks

Our Take On This Week’s News

Why is China reading your email, and should you care?

Apple and the security of your data

How Private Data Became Public on Amazon’s Cloud

Wrap

Electronic road signs breach in Illinois

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.