Archive for BlackBerry

April 30 2017, Episode 390, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , , , on April 30, 2017 by datasecurityblog

Episode 390 of The CyberJungle is about 30 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 390 via the flash player:

Around The Corner

Hackers target payroll vulnerabilities with phishing attempts

Quote from the CEO of High-Tech Bridge regarding web security and the Verizon annual Data Breach Investigations Report (DBIR)

Ransomware, Cyberespionage Dominate Verizon DBIR

Kali Linux can now use cloud GPUs for password-cracking

Hyundai Mobile App Patched for Car Hacking Vulnerabilities

Our Take on This Week’s News

Millions of Android phones are wide open to hackers

Another Android flagship…ends up in a class-action lawsuit

Hands-on with the BlackBerry KeyOne: The most exciting Blackberry in a long time

Oregon Red Light Ticket Objector Gets Busted For Being An Engineer Without a State License

Tales from The Dark Web

Hackers exploited Word flaw for months while Microsoft investigated

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

Wrap

No Wrap in this episdoe

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

https://www.paraben.com/images/home-slider/paraben-logo.png

Advertisements

October 31 2016, Episode 385, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on October 31, 2016 by datasecurityblog

Episode 385 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 385 via the flash player:

Commentary

Contrarian approach to a more secure smartphones. Links here and here

Our Take on This Week’s News

Cyberattack on 911 Critical Infrastructures

Password not accepted: are biometric checks the answer?

TouchID comes to Macbook OS X Sierra

Blockchain is empowering the future of insurance

Tales from The Dark Web

Defenseless internet ‘paying the price’ for ignoring security

Twitter Account Shows Mirai Botnets Using Your Security Camera In Cyber Turf War

 HackForums delete “Server Stress Testing” amidst links with Dyn DDoS Attack

Feb 17, 2016, Episode 377, Show Notes

Posted in Podcast, Show Notes, Su Root Edition, The CyberJungle with tags , , , on February 16, 2016 by datasecurityblog

Episode 377 of The CyberJungle is about 29 minutes long.  This is an Su Root edition, where we go indepth on a topic. We interview  Jacquie McNish, author of new book on Blackberry: “Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry.” You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 377 via the flash player:

Interview

Jacquie McNish, author of new book on Blackberry: “Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry

Follow Jacquie on Twitter: @jacquiemcnish

Our Take on This Week’s News

This is an Su Root Edition, no Our Take on This Week’s news, Tales from the Dark Web, or Wrap this episode.

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

Aug 30, 2014, Episode 348, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 29, 2014 by datasecurityblog

Episode 348 of The CyberJungle is about 36 minutes long.  Blackphone CEO John Calais on open-source based securephones starts at 15:45min. From BlackBerry’s Security Program Management Office, Susan Riedel,  starts at about 24min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 348 via the flash player:

Interview

Blackphone CTO John Callas on open-source based securephones

From BlackBerry’s Security Program Management Office, Susan Riedel. Blackberry’s Career Page

Our Take on This Week’s News

Belkasoft’s take on SSDForensics, 2014 Edition, 2012 Edition

Elcomsoft’s phone password breaker

Tales from The Dark Web

Our take on the JPMorgan news coverage

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

March 14, 2011 – Episode 204

Posted in Breach, criminal forensics, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 13, 2011 by datasecurityblog

Episode 204 of  The CyberJungle is about 39 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 30:30 mark.

To listen to Episode 204 via the flash player:

Interview

Interview: Trevor Dietrich, VP and Co-Founder of Bayalink Solutions, on a virtulization app to secure iPads + more. He’s seeking beta testers. Trevor’s Twitter Feed.

Our Take on The Week’s News

A federal district court in New Jersey has decided that a social worker and special education instructor employed by the school board are liable for violating a high school student’sprivacy… after the teacher handed out a poorly-redacted copy of the studen’t psychological evaluation as a teaching tool. Read the story here, or read the court’s decision.

Industrial Espionage at Renault, or poor forensics, or both? Some details in this Economist story.

California’s top utility regulator has given gave Pacific Gas and Electric Co. two weeks to propose a way for customers to opt out of receiving the company’s controversial wireless SmartMeters.

The iPhone 4 falls at CanSecWest Pwn2Own Contest, and Blackberry.

Tales From The Dark Web

Vehicle hacking via trojan MP3? Read the story here.


March 7, 2011 – Episode 203

Posted in Breach, Business Continuity, Court Cases, criminal forensics, ediscovery, Exclusive News, Legislation, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , , , , , on March 7, 2011 by datasecurityblog

Episode 203 of  The CyberJungle is about 53 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 25:30 mark.

To listen to Episode 203 via the flash player:

Interviews

Charlie Miller, 3x Pwn2Own “hacking” contest winner stays home; response by Dragos, Founder of CanSecWest . Follow Charlie on Twitter.

Tales From The Dark Web

Exactly what is the “boy-in-the-browser attack?”

Our Take on The Week’s News

Lawsuit accuses Amazon of capturing and sharing customer information without permission by tricking Microsoft Internet Explorer

Google Android in app malware flap, iPad2 security, and Blackberry Playbook running Android apps + better security? Interview on Playbook security Ira Victor mentioned in this segment. You may download the segment, or listen to the conversation here:

Via the flash player:

More mobile security news, Keeping Tabs on Android Smartphone Activity.

Proof once again that disgruntled employees are among the most dangerous cybercriminals… Texas man sentenced after breaching former employer’s network and deleting critical business files.

Wrap

OtterBox Cases for slider Smartphones: Samantha and Ira give a new OtterBox the field test

Feb 1, 2011 – Episode 198

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Legislation, Podcast, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , on February 1, 2011 by datasecurityblog

Episode 198 of  The CyberJungle  is 32 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 198 via the flash player:

Interviews

Hey, is that an SMS botnet in your pocket? Straight from Shmoocon 2011, Georgia Weidman tells how the most popular smartphone platforms can be silently seized by the bad guys. Major computer forensic repercussions? The CyberJungle has the first radio interview with Georgia Weidman following Shmoocon. Proof-of-concepts and slides from Shmoocon 2011. The interview starts at about the 20:20 mark.

Tales From The Dark Web

Last may, the Dow plummeted in seconds. Fat-finger error, or something more sinister?

Our Take on The Week’s News

Wired magazine in the UK has jolted some of its subscribers by sending them an issue with the most personal details about their lives on the cover.  Imagine pulling the mag out of your mailbox and there’s your name, along with comments about your latest ebay purchase, your divorce, your kids, and your new boss.

Data retention law does not help law enforcement fight crime, study reveals.

The backlash against smart meters is growing. Joining the privacy advocates and the anti-corporatists are those suffering from “electromagnetic sensitivity.”

The cost of non-compliance with security mandates can be more expensive than the cost of investing in security, says Ponemon Institute.

Slammed: An attempt to regulate computer forensics pros in the State of Virginia

Ira heads to RSA San Francisco 2011. Ira will post reports in Conference Notes. Reports sponsored by LogLogic – The IT Data Management company. Meet Ira in the LogLogic booth #828 during Tuesday night’s RSA pub crawl and drink some Travis Smith’s 510 nano-brew, served fresh in the booth. Ira mentioned the Cryto Adapter by hiddn in this segment.