Archive for Craigslist

September 12, 2010- Episode 171

Posted in Court Cases, criminal forensics, darkweb, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on September 12, 2010 by datasecurityblog

Episode 171:

This week’s regular episode of  The Cyberjungle  is 1 hour and 14 minutes long. You can hear it by clicking on the flash player below, or you can go to the listening options page and browse for other ways to hear the show.

To listen to Episode 171 via the flash player:


Nathan Burchfiel from the Center for Media and Culture. Topic: The Craigslist Adult Services section takedown.  Ira mentioned this story on the topic by Nathan Burchfiel’s associate, Alana Goodman.

Tales from the Dark Web

Remember the “please rob me” and the “i can stalk you” sites designed to point out the folly of broadcasting your whereabouts?  The petty criminals have discovered the target-rich environments provided by Foursquare, Facebook, Twitter and others that have an integrated location-based service. Read more here from the New Hampshire Union Leader newspaper.

Our Take on This Week’s News

Is a Cyber Jihad group linked to ‘Here You have’ worm?

An appeals court in Virginia upholds warrantless GPS tracking of criminal suspects.  The issue has been appealed three times, with different outcomes.  The D.C. Circuit Court decided against law enforcement, and San Francisco’s Ninth Circuit recently upheld it in a decision that drew a blistering dissent. Supreme Court in 2011? Probably.

Will Andriod will replace Windows? One Security Start-up is betting the farm on it.

Law enforcement in North Carolina wants to rifle through your medicine cabinet, virtually speaking, as the sheriff requests access to a state database of prescriptions.

Adobe Reader zero day attack contains a scary new booby-trap impacting all computer users.

A new survey by anti-virus maker Norton examines the emotional impact of cycbercrime, calling it a “silent epidemic” that’s affected two-thirds of internet users around the globe.

The cybercriminal shopping list… it’s not that expensive to get into the business.

CyberJungle FAQ

After upgrading her business computers, Claire wants to know if she can continue to use her old clunkers safely for web-based activity. Ira recommends, or

Robert wants an alternative to Adobe PDF products.  Adobe PDF Reader and Acrobat alternatives: , , and gPDF.

For those who don’t wish to tackle problems alone, Ira recommends Friendly Computers of Reno. They come to your home or business, and they also do support via remote access. They listen to our program, so they know what we’re recommending. Why call a geek when you can call a friend?

To Win A Netbook

See how enter to win a dual-boot friendly netbook, compliments of Lightwave Security, visit The CyberJungle Expert’s Guide.


June 6, 2010 – Episode 143

Posted in Court Cases, darkweb, Legislation, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , , , , , , , , on June 6, 2010 by datasecurityblog

Episode 143 is 71 minutes long. You can listen by clicking the flash player below, or you can click here for more listening options.

To listen to Episode 143 via the flash player:

Interview segment

We talk with Gary Biller, Executive Director of the National Motorists Association, about an Ohio Supreme Court decision that says law enforcement officers do not need to back up their vehicle speed estimate with reports from a radar reading; eyeballing it is good enough. The Ohio press reports. The interview starts about 20 minutes into Episode 143.

Tales From The Dark Web

Mac Attack: Spyware trojan hitching ride on third-party screensavers for the Mac.

Advice to those sent their questions to the CyberJungle mailbox

Site for alternative PDF readers:

Site for scrubbing hard drive before you give your computer away: Darik’s Boot And Nuke

Our take on this week’s news

Researchers from the mobile industry and academia are analyzing the detailed call and text record databases from mobile phones, along with users’ geographic movement.  Information about how and when people move about promises a handsome revenue stream for cell phone carriers.

Wall Street Journal report on smartphone attacks. MasterCard launches iPhone, iPad payment app

Fake software sales on criagslist draw attention.  Pirated software can also find its way into retail stores occasionally, too. Microsoft provides a site that helps you figure out whether your software is legit.

Federal Trade Commission settles with CyberSpy Software, LLC.  Settlement requires the company to stop instructing its customers how to send its keylogging product in a stealth email attachment. Also must notify the receiving computer that the software is about to download, and receive consent.  This will put a chill on the spying.

Hackers like the Facebook “Like” button. Only six weeks after its introduction, the Like button is being used for mischief.

Legal intrigue after Digital River  management was alerted that a big batch of the company’s data was circulating , and offered for sale on the black market. Civil and criminal law in play.

Our Tether contest – win wireless access for your BlackBerry

Thanks to Tether for providing a generous number of full-value licenses to award as prizes for listeners of The CyberJungle. We love the product, and have given away 10 licenses each in episodes 141 and 143.   You can still enter by sending an email to, and telling us which version of the BlackBerry software you’re running. (Find this by going to “settings ->options->about” on your BB.)  We award the prize to the first ten requests of the week.  Our week runs Saturday-through-Friday. If you win, we ask that you send an acknowledgment once you’ve received your key, so we know you got it. Then we will delete your email, as a gesture of respect for your privacy.

BTW — there is a :60 second Tether commercial in these shows.  We are running them as a thank-you to Tether for the software keys.  We want to acknowledge the people who created some of the components in the spot.  The Free Sound Project is an awesome organization for people like us, whose ears are bigger than our budgets when it comes to production.  The audio effects in the Tether spot cam from the site, and we thank the creative producers who post their work. Especially — someone with the handle kkz who created a file called “t-weak bass” … someone with the handle dland who created a file called “to hell with vinyl”… and someone with the handle Halleck, who created “crash reverse.”  All can be heard in the Tether spot, which airs at approximately 29:50 in episode 143.