Archive for Android

Feb 17, 2016, Episode 377, Show Notes

Posted in Podcast, Show Notes, Su Root Edition, The CyberJungle with tags , , , on February 16, 2016 by datasecurityblog

Episode 377 of The CyberJungle is about 29 minutes long.  This is an Su Root edition, where we go indepth on a topic. We interview  Jacquie McNish, author of new book on Blackberry: “Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry.” You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 377 via the flash player:

Interview

Jacquie McNish, author of new book on Blackberry: “Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry

Follow Jacquie on Twitter: @jacquiemcnish

Our Take on This Week’s News

This is an Su Root Edition, no Our Take on This Week’s news, Tales from the Dark Web, or Wrap this episode.

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

Advertisements

Jan 22 2016, Episode 376 Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on January 22, 2016 by datasecurityblog

Episode 376 of The CyberJungle is about 28 minutes long. The special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks begins at about 7min 45sec.  The interview with Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos begins at 21min 20sec. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 376 via the flash player:

Interview

Ercan Erciyes of GetMonument, on Low Cost Private Cloud Device for Photos

Link from the segment: GetMonument.com

 

Our Take on This Week’s News

* Major Linux and Android exploit went undetected for three years

* Android malware steals one-time passcodes to hijack accounts protected by two-factor authentication

 

Tales from The Dark Web

Special Tales From the Dark Web interview with Elastica’s Director of Security, Adi Sood, on Ukraine Grid Attacks . Elastica’s blog.

Wrap

The Wrap is one winter break.

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 2, 2014, Episode 342, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on July 1, 2014 by datasecurityblog

Episode 342 of The CyberJungle is about 35 minutes long. Dr. Jason Nieh of Columbia University on Android Security, starts at about 18min;  InfoSec expert or cybercriminal for hire; Microsoft’s intentional collateral damage; Corporate boards wake up to infosec; PayPal chokes another legal business. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 342 via the flash player:

Interview

Android keys to the castle, with Dr. Jason Nieh of Columbia University. Link to the tool mentioned in the segment

Our Take on This Week’s News

Microsoft’s intentional collateral damage

Corporate boards wake up to infosec?

PayPal chokes another legal business?

Tales from The Dark Web

InfoSec expert or cybercriminal for hire?  You decide.

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

Apr 30 2014, Episode 336, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on April 30, 2014 by datasecurityblog

Episode 336 of The CyberJungle is about 30 minutes long You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 336 via the flash player:

Interview

SecureAuth’s Garret Grajeck on Enterprise 2FA . Garret’s blog postings.

Our Take on This Week’s NewsHeartbleed flaw hits Chrome and Android users

Heartbleed flaw hits Chrome and Android users

NSA weaponizing 0days

Blackphone gets good initial response

Welcome aboard ISACA members

 

Tales from The Dark Web

MISE 0Day mitigated by firewall rule? Read background on the flaw here.

Wrap

The Wrap is on a break this week

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

——————————————————————————-

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level.

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

 

Mar 11 2014, Episode 331, Show Notes

Posted in criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle with tags , , , on March 11, 2014 by datasecurityblog

Episode 331 of The CyberJungle is about 33 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 331 via the flash player:

su root Edition

Special drill down on the $189 privacy and security smartphone with Scott Bendar, CTO of FreedomPop. Link mentioned in the episode for the PrivacyPhone.

Wrap

Thou shalt NOT charge for freeware, thunders Mozilla Firefox lawyers

Please support our sponsors, as they support The CyberJungle

ATOLOA TECHNOLOGIES….PLEASE VISIT THEIR SITE ATOLA.COM

Atola Insight is an all-in-one hard drive data recovery and forensic system. It offers complex data retrieval functions along with utilities for manually accessing hard drives at the lowest level. Atola Insight has several key features for data capture in forensic and e-discovery cases. Find out more at Atola.com

 

September 17 2012, Episode 273, Show Notes

Posted in Court Cases, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on September 17, 2012 by datasecurityblog

Episode 273 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Rafel Los Security Evangelist with HP, begins at about the 17min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 272 via the flash player:

Interview

Rafel Los is the Security Evangelist for HP Software. Read the blog posting, Landmark ruling- Insiders aren’t hacking if you’ve given them access. Follow Rafel Los on Twitter

Tales From The Dark Web

Your smartphone WiFi may be spilling your “bees-wax”

Our Take on This Weeks News

China’s Huawei, ZTE grilled by U.S. officials over spying concerns. The Case For Huawei in American, by Dan Steinbock

Another School Violated a Student’s First Amendment Rights by Disciplining Her For Facebook Posts — R.S. v. Minnewaska Area School Dist. No. 2149.

Wrap

Ira Victor will be tweeting from SANS Network Security 2102 in Las Vegas this week. Follow Ira Victor in Twitter @ira_victor.

August 15 2012, Episode 269, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Show Notes, Vulnerabilities with tags , , , , , , on August 15, 2012 by datasecurityblog

Episode 268 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Skip Duckwall from Pass The Hash blog begins at about 16min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 269 via the flash player:

Interview

Skip Duckwall from Still Passing The Hash. Demos from his BlackHat2012 talk.  Plus info on the tool’s addition to the Backtrack tool kit.

Tales From The Dark Web

Medical records held hostage by cyber attackers

Our Take on This Weeks News

Fake SocialNetworking

Smartphone-based attack wreaks havoc on Android and iOS smartphones

Wrap

Mark Zuckerberg Topless; Photo Was on Facebook