Archive for digital forensics

November 30 2016, Episode 386, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on November 30, 2016 by datasecurityblog

Episode 386 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 386 via the flash player:

Commentary

New Details Suggest Rogue Government Agent Deleted Evidence in Silk Road Case

Our Take on This Week’s News

Ira talked about the comments by Javvad Malik, security advocate at AlienVault, about the SF Muni breach

IPhone users hit by ‘calendar spam

Mirai botnet attack hits thousands of home routers, throwing users offline

US-CERT updates cybersecurity incident notification guidelines

Hunted: CBS game show contestants to flee surveillance

Tales from The Dark Web

‘Dronejacking’ may be the next big cyber threat

Tech support scams evolve, borrow tricks from ransomware creators

Wrap

This $1,500 Toaster Oven Is Everything That’s Wrong With Silicon Valley Design

October 31 2016, Episode 385, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on October 31, 2016 by datasecurityblog

Episode 385 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 385 via the flash player:

Commentary

Contrarian approach to a more secure smartphones. Links here and here

Our Take on This Week’s News

Cyberattack on 911 Critical Infrastructures

Password not accepted: are biometric checks the answer?

TouchID comes to Macbook OS X Sierra

Blockchain is empowering the future of insurance

Tales from The Dark Web

Defenseless internet ‘paying the price’ for ignoring security

Twitter Account Shows Mirai Botnets Using Your Security Camera In Cyber Turf War

 HackForums delete “Server Stress Testing” amidst links with Dyn DDoS Attack

September 29 2016, Episode 384, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on September 29, 2016 by datasecurityblog

Episode 384 of The CyberJungle is about 33 minutes long.  The interview with Dr. Fred Cohen, begins at about 10:30.   The interview with Brian Carrier, creator of open source forensic tools, begins about 26:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 384 via the flash player:

Interview

Exclusive: Dr. Fred Cohen, new approaches to infosec ; Brian Carrier, creator of open source forensic tools Autopsy

Our Take on This Week’s News

Your users have porous passwords? Blame yourself, IT.

Swift CEO reveals three more failed attacks on banking network

Sofacy APT Targeting OS X Machines with Komplex Trojan

 

Tales from The Dark Web

On a break this episode

 

 

July 20 2016, Episode 382, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 20, 2016 by datasecurityblog

Episode 382 of The CyberJungle is about 26 minutes long.  The interview with Steve Whalen, CEO and Co-Founder, Sumuri (say sue-more-e), begins at about 15:50.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 382 via the flash player:

Interview

Exclusive: Steve Whalen, CEO and Co-Founder, Sumuri. Links to The Paladin Forensic Software, Carbon Virtual Forensics Tool, and the Sumuri Blog

Our Take on This Week’s News

Security software that uses ‘code hooking’ opens the door to hackers

Thanks, script kiddies: 100Gbps DDoS attacks now commonplace

5 Lessons From The FDIC’s Breach Disclosure Debacle

Beazley sees hacking and malware threat growing for financial institutions

Tales from The Dark Web

Trojan danger where you might least expect it – your remote desktop application. More coverage here

Please support our sponsors, as they help make The CyberJungle possible:

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016The Desmond

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

June 04 2015, Episode 366, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 19, 2011 – Episode 222

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 18, 2011 by datasecurityblog

Episode 222 of  The CyberJungle is about 35 minutes long, the interview starts at ~16:00 minutes.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 222 via the flash player:

Interview

What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric.

Our Take On This Week’s News

Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? Read the complete NSSLabs Report

Smashing hard drive leads to conviction for obstruction under SOX

Tales From the Dark Web

Crowd-sourcing the reporting of webmail hijacks

May 16, 2011 – Episode 213

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle with tags , , , , , on May 15, 2011 by datasecurityblog

Episode 212 of  The CyberJungle is about 38 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The first interview start at about the 9min mark lasts about 11min. The second interview starts at about the 25min mark, and it’s about 12 minutes long.

To listen to Episode 212 via the flash player:

Interviews

Scott Cleland, author of  Search and Destroy, Why You Can’t Trust Google Inc.  And for the other links mentioned in the interview, look on the right column here.

Alyn Hockey, Director of Product Management at security firm Clearswift. Here is their blog.

Our Take on The Week’s News

PCI Compliance Risks for Small Merchants and where they are failing: Excellent summary, with actionable information, from Brian Pennington’s blog about IT security and compliance.

Additional Information Mentioned On The Show

TechEd Atlanta 2011:  Large Microsoft technical conference

CEIC Forensics Conference: Digital Investigations Show, Orlando, Florida

AccessData 2011 Las VegasDigital Forensics Conference