Archive for botnets

September 26 2012, Episode 274, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on September 26, 2012 by datasecurityblog

Episode 274 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Attorney Benjamin Write begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 274 via the flash player:

Interview

Benjamin Wright, Attorney in Private Practice,  SANS Instructor: Law of Data Security and Investigations. See the forensics from the cloud videos Benjamin talked about. Follow Mr. Wright on Twitter.

Tales From The Dark Web

Over 9 million PCs infected – ZeroAccess botnet uncovered

Our Take on This Weeks News

Wells Fargo website hit by access issues amid cyber threats

Microsoft Security Bulletin MS12-063 – Critical

FTC: Rented computers spied on customers

Wrap

‘Operation ID’ helps take a bite out of smartphone crime

Advertisements

March 21, 2011 – Episode 205

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Legislation, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 20, 2011 by datasecurityblog

Episode 205 of  The CyberJungle is about 43 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 30:30 mark.

To listen to Episode 205 via the flash player:

Interview

Interview: Peter Schlampp, VP Product Management, Solara Networks on the RSA SecureID breach and network forensics

Our Take on The Week’s News

Web browser anti-tracking: Read, “Do not track tools push firms to crossroad,” by James Temple in the SF Gate.

RSA SecureID breach: An Analytical Brief by NSS Labs

Does transparency webapp threaten citizen data when authenticating users? Read “Big Brother Has Been Watching

Civil court action used to take down evil botnet: Read “With Rustock, a New Twist on Fighting Internet Crime” by IDG’s Robert McMillan. CORRECTION: FireEye worked on this takedown, not eEye, as stated by Ira.

Ghostery allows you to block scripts from companies that you don’t trust, delete local shared objects, and even block images and iframes. Ghostery.com.

BetterPrivacy is a Firefox plug-in which protects from usually not deletable LSOs.

Tales from the Dark Web: What do you get when you stir up a pot full of natural disasters, social media alerts, Java exploits and rogue anti-virus? Read the M86 analysis.

Wrap

Supreme Court To Hear Arguments in ID Search Case: The case concerns an unlawful police stop. Defendant asserts that police had no basis for pulling his car over and then running his license.  EPIC’s amicus brief.

Data Security Podcast Episode 17 – Sep 09 2008

Posted in Podcast with tags , , , , , on September 8, 2008 by datasecurityblog

The Data Security Podcast is the place for 30 minutes of news every week on data security, privacy, and the law.

This weeks program: Four-fold surge in botnets in the last 3 months. New email handheld with security features. Plus, the latest security news.

–> Stream, subscribe or download Episode 17 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

This week’s show is sponsored by DeviceLock

Program Notes for Episode 17

News:

1. A federal grant will expand the surveillance camera system in the greater Pittsburg area. Emergency managers say the system called ‘Threat Viewer’ will help with disasters and terrorism, but the cops will use it, too. See more in this Pittsburgh Post-Gazette story.

2. And by the way, we hope it won¹t end up being used the way the British use their terrorist surveillance cameras…See more in this The Sunday Telegraph story.

3. E-Discovery was supposed to be helpful in litigation, but the legal community says the requirement for electronic discovery is sending costs through the roof, and even keeping some cases out of court.  See the Economist story, and get the complete report from The University of Denver.

4.  Plantiff gets WHACKED for deleting e-data related to litigation. Read more in this LA Times Posting.

5. Google Chrome Anonymizers from ghacks. Tools to keep web surfing more private when using Google’s new Chrome web browser.

Tales from The DarkWeb:  The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months. Read the SANS.org posting.

Conversation: The Peek mobile email device and it’s security features. Ira speaks with Amol Sarva, CEO of Peek.