Archive for ediscovery

July 9 2018, Episode 402, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , on July 8, 2018 by datasecurityblog

Episode 402 of The CyberJungle is about 23 minutes long.  The interview with Aaron Riley on the latest wave of phishing attacks starts at 14:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 402 via the flash player:

Newsmaker Interviews

Aaron Riley on the latest wave of phishing attacks

Our Take on This Week’s News

There’s Even More Bad News About IRS Information Security

Insurance companies sue security firm over Heartland data breach
Will NanoVMs help secure business application data?

Tales from The Dark Web

A massive cache of law enforcement personnel data has leaked

Wrap

Thunderbird gets its EFAIL patch

PLEASE SUPPORT OUR SPONSOR – PFIC: Paraben Forensic Innovations 2018

This 2-day event brings together industry experts on a variety of topics in both lectures and labs. The best part of PFIC is as an attendee you get to attend 100% of the content with the unique rotating format of A and B days. One day you attend all the lectures the next you attend all the labs. Plus see Ira Victor, of the CyberJungle, speak. Register early seats are limited.

 

PFIC 2017,

 

Advertisements

May 29 2018, Episode 401, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on May 29, 2018 by datasecurityblog

Episode 401 of The CyberJungle is about 32 minutes long.  The interview with Steve Whalen of Sumuri starts at 12:45, and the twin interviews with Jerry Kaner of Ciphertex and Jeff Hedlesky of OpenText, starts at 19:27. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 401 via the flash player:

Newsmaker Interviews

Sumuri CEO Steve Whalen on new MAC forensic tools

High speed forensic imaging and encryption with Jerry Kaner, CEO of Ciphertex and Jeff Hedlesky, Evangelist with OpenText . The link for training.

Our Take on This Week’s News

Stealthy, Destructive Malware Infects Half a Million Router

Big bimmer bummer: Bavaria’s BMW buggies battered by bad bugs
How One Recalled SUV Destroyed $45 Million In Cars, Burned A Massive Ship, And Sparked A Legal Battle Between Ford And BMW
How to turn off bold/italics/underline in HTML mail displayed as plaintext?
Efail or OpenPGP is safer than S/MIME

Tales from The Dark Web

On break due to Enfuse 2018 coverage

Wrap

10th Anniversary content coming in a future episode

PLEASE SUPPORT OUR SPONSOR – PFIC: Paraben Forensic Innovations 2018

This 2-day event brings together industry experts on a variety of topics in both lectures and labs. The best part of PFIC is as an attendee you get to attend 100% of the content with the unique rotating format of A and B days. One day you attend all the lectures the next you attend all the labs. Plus see Ira Victor, of the CyberJungle, speak. Register early seats are limited.

 

PFIC 2017,

 

December 19, 2011 – Episode 242

Posted in Annoucements, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on December 19, 2011 by datasecurityblog

Episode 242 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics begins at about 13min.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 242 via the flash player:

Interview

Sean Morrissey of Katana Forensics launches LaternLite iOS Forensics tool this week

Our Take On This Week’s News

Forensic innovator Jonathan Grier has developed tools that use statistical analysis of file access data to reconstruct timelines. According to Mr. Gerier, his method can be used to determine what, if data was exfiltrated from the system. Read more in: Detecting data theft using stochastic forensics.

Excellent work by c|net’s Elinor Mills on the software by CarrierIQ that some have labeled as an illegal “root kit.” Read: Sprint disabling Carrier IQ on phones.

Tales From The Dark Web

Passwords hard coded into industrial control systems – What could possibly go wrong?

Wrap

New job opportunity for those with Photoshop forensics skills? US watchdog bans photoshopping in cosmetics ads. Wow, and I thought all those models had perfect faces and perfect bodies all of the time…

November 29, 2011 – Episode 239

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on November 29, 2011 by datasecurityblog

Episode 239  of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Karen Paullet on being a cyber expert witness begins at about 13min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 239 via the flash player:

Interview

Dr. Karen Paullet on being a cyber expert witness

Our Take On This Week’s News

He Said She Said: The battle of the SCADA experts in water pump row

A new, low-cost way to find open wifi connections

How to keep your access point slightly more private

Tales From The Dark Web

Social Engineering used to catch a cybercriminal

Wrap

Pirated software hard drive as art?

November 15, 2011 – Episode 238

Posted in Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle with tags , , , on November 15, 2011 by datasecurityblog

Episode 238  of  The CyberJungle is about 21 minutes long.  You can hear it by clicking on the flash player below. The first interview (with Sean Morrissey of Katana Forensics) begins at about 03min. The second interview (with Ryan Washington of AR-Forensics) begins at about 10min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 238 via the flash player:

We break from our normal programming schedule. The CyberJungle went to the Paraben Forensics Innovator’s Conference last week. We have special extended coverage with Ryan Washington of AR-Forensics, on so-called “anti-forensics” techniques. And, Sean Morrissey, CEO of Katana Forensics gives us his take on Apple’s moves against a well-respected security researcher.

 

October 3, 2011 – Episode 232

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on October 3, 2011 by datasecurityblog

Episode 232  of  The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 232 via the flash player:

Interview

Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses. Aaron D. Crews is a member of Littler Mendelson’s e-Discovery Practice Group

Our Take On This Week’s News

Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More. Read the story at AndroidPolice.com.

Kindle Fire: the tablet that knows your next move. Jeff Bezos’s announcement of Amazon’s assault on the tablet market comes with an added twist. Read The Guardian story.

Tales From The Dark Web

Malicious QR Codes Pushing Android Malware

Wrap

1977 Star Wars Celica: Have You Seen This Car?

October 24, 2010 – Episode 183

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on October 23, 2010 by datasecurityblog

Episode 183:

This week’s regular episode of  The Cyberjungle  is 1 hour and 18 minutes long. You can hear it by clicking on the flash player below, or you can go to the listening options page and browse for other ways to hear the show.

To listen to Episode 183 via the flash player:

Interview

Joe Levy, Chief Technical Officer with  Solera Networks, stops by to discuss the Zeus Trojan variant that’s making its way around the IRS offices.  Joe’s  interview is 6 minutes long, and it begins about 25 minutes into Episode 183.

Tales from the Dark Web

If cybercrime were a disease, it would be a pandemic and the whole world would be sick. So says a report from Kroll and The Economist Intelligence Unit

Our Take on This Week’s News

School bus surveillance cams – School buses equipped with traffic cams.  It’s an experiment in a Maryland school district, where officials say the little darlings are in more danger as they alight from the bus than any other time, although no child in Maryland has ever been hit while alighting from a school bus.

Insurance companies view social networkers as burglary risks – Duh.  A survey by an insurance trade group indicates a significant number of Facebook and Twitter post their locations, and it’s worth considering whether to reflect this in their insurance rates.

And while we’re ragging on Facebook – Are gay users of Facebook being outed to advertisers for targeted product marketing? Duh again.

Ten oreos, two handfuls of fritos, a pint of Ben and Jerry’s – Are you aware that when you make use of web tools that allow you to keep track your personal behavior, that information could become discoverable in court? (Diet websites come to mind.)

Participants wanted– A new project to monitor BlackBerry traffic as it is sent from various countries. The results will help researchers and users understand what’s happening to the communications as RIM is pressured to cooperate with repressive governments.

More BlackBerry news –  The how and why of BlackBerry eavesdropping, and why it might not be what you think.

A new tool for good guys,- And bad guys, parents, employers, forensic investigators, and everyone who needs to keep tabs on someone.  ElcomSoft tool cracks web browser passwords.

CyberJungle FAQ

Shockwave Zero-day Attack In the Wild

Fake Microsoft Security Essentials Attack