Archive for DDOS

July 20 2016, Episode 382, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 20, 2016 by datasecurityblog

Episode 382 of The CyberJungle is about 26 minutes long.  The interview with Steve Whalen, CEO and Co-Founder, Sumuri (say sue-more-e), begins at about 15:50.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 382 via the flash player:

Interview

Exclusive: Steve Whalen, CEO and Co-Founder, Sumuri. Links to The Paladin Forensic Software, Carbon Virtual Forensics Tool, and the Sumuri Blog

Our Take on This Week’s News

Security software that uses ‘code hooking’ opens the door to hackers

Thanks, script kiddies: 100Gbps DDoS attacks now commonplace

5 Lessons From The FDIC’s Breach Disclosure Debacle

Beazley sees hacking and malware threat growing for financial institutions

Tales from The Dark Web

Trojan danger where you might least expect it – your remote desktop application. More coverage here

Please support our sponsors, as they help make The CyberJungle possible:

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016The Desmond

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

Advertisements

Feb 25, 2015, Episode 360, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on February 25, 2015 by datasecurityblog

Episode 360 of The CyberJungle is about 27 minutes long.  The interview with Heather Wilde begins at about 15:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 360 via the flash player:

Interview

Heather Wilde, from ROCeteer

Our Take on This Week’s News

Security software found using Superfish-style code, as attacks get simpler

Komodia.com, home to the SSL interception module at the heart of the Superfish adware dustup, hit by DDOS attacks

14-Year-Old Hacks Connected Cars With Pocket Money

California tries (once again) to protect digital information

Tales from The Dark Web

Psst, hackers. Just go for the known vulnerabilities

Wrap

Netgear invited to address the flaw Heather Wilde discovered

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com