Archive for CFA

September 26 2012, Episode 274, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on September 26, 2012 by datasecurityblog

Episode 274 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Attorney Benjamin Write begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 274 via the flash player:

Interview

Benjamin Wright, Attorney in Private Practice,  SANS Instructor: Law of Data Security and Investigations. See the forensics from the cloud videos Benjamin talked about. Follow Mr. Wright on Twitter.

Tales From The Dark Web

Over 9 million PCs infected – ZeroAccess botnet uncovered

Our Take on This Weeks News

Wells Fargo website hit by access issues amid cyber threats

Microsoft Security Bulletin MS12-063 – Critical

FTC: Rented computers spied on customers

Wrap

‘Operation ID’ helps take a bite out of smartphone crime

Advertisements

September 17 2012, Episode 273, Show Notes

Posted in Court Cases, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on September 17, 2012 by datasecurityblog

Episode 273 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Rafel Los Security Evangelist with HP, begins at about the 17min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 272 via the flash player:

Interview

Rafel Los is the Security Evangelist for HP Software. Read the blog posting, Landmark ruling- Insiders aren’t hacking if you’ve given them access. Follow Rafel Los on Twitter

Tales From The Dark Web

Your smartphone WiFi may be spilling your “bees-wax”

Our Take on This Weeks News

China’s Huawei, ZTE grilled by U.S. officials over spying concerns. The Case For Huawei in American, by Dan Steinbock

Another School Violated a Student’s First Amendment Rights by Disciplining Her For Facebook Posts — R.S. v. Minnewaska Area School Dist. No. 2149.

Wrap

Ira Victor will be tweeting from SANS Network Security 2102 in Las Vegas this week. Follow Ira Victor in Twitter @ira_victor.

December 19, 2011 – Episode 242

Posted in Annoucements, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on December 19, 2011 by datasecurityblog

Episode 242 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics begins at about 13min.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 242 via the flash player:

Interview

Sean Morrissey of Katana Forensics launches LaternLite iOS Forensics tool this week

Our Take On This Week’s News

Forensic innovator Jonathan Grier has developed tools that use statistical analysis of file access data to reconstruct timelines. According to Mr. Gerier, his method can be used to determine what, if data was exfiltrated from the system. Read more in: Detecting data theft using stochastic forensics.

Excellent work by c|net’s Elinor Mills on the software by CarrierIQ that some have labeled as an illegal “root kit.” Read: Sprint disabling Carrier IQ on phones.

Tales From The Dark Web

Passwords hard coded into industrial control systems – What could possibly go wrong?

Wrap

New job opportunity for those with Photoshop forensics skills? US watchdog bans photoshopping in cosmetics ads. Wow, and I thought all those models had perfect faces and perfect bodies all of the time…

January 18, 2011 – Episode 196

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Legislation, Podcast, Show Notes with tags , , , , , , on January 17, 2011 by datasecurityblog

Episode 196 of  The CyberJungle  is 30 minutes long. You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 196 via the flash player:

Interviews

Earlier this month, while we were strolling on the floor at CES in Las Vegas, we had a chance to chat with Tony Kainuma, the Director of Navigation and Detection products at  Cobra Electronic Corporation.  We discussed Cobra’s new smartphone app that watches for red light cameras, traffic congestion and cops with radar, and relays the information to all Cobra users who subscribe.

Tales From The Dark Web

Creepy stalker uses info from  Facebook to break into email accounts and steal stuff from women.

Our Take on This Week’s News

Silliest use of the Computer Fraud and Abuse Act? We (respectfully) disagree with law professor Orin Kerr, who says Sony’s lawyers should win this prize for this argument:  You’re guilty of felony computer hacking crimes if you access your own computer in a way that violates a contractual restriction found in the fine print of the licensing restriction of the product imposed by the manufacturer. We think the honor for dopiest use of the CFAA still belongs to the prosecutors of MySpace Mom Lori Drew.

Stuxnet news: The New York Times reports the Stuxnet worm was a joint project of the U.S. and Israel, engineered to destroy the uranium centrifuges that Iran uses in it’s nuclear weapons program. As a result of this worm, the Iranian nuke program has suffered serious set-backs. All without a shot being fired.

Federal judge supports Federal Government –  Says plaintiff  EPIC did not convince him that DHS should turn over 2,000 naked images from the airport body scanners.

A proposal in congress for a law that would clarify the rights of Americans returning home from abroad, only to have their  digital devices are seized by customs agents.  Our take – for the time being, consider the  U.S border a hostile zone for  business and personal data in your laptop or smart phone.