Archive for elcomsoft

Sept 4, 2014, Episode 349, su root edtion, Show Notes

Posted in darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on September 3, 2014 by datasecurityblog

Episode 349 of The CyberJungle is about 36 minutes long.  This is an su root edition, where we go deep on one technical topic. Topic in this program: The iCloud Nude Photos Attack. Click on the Flash Player to listen below, or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 349 via the flash player:

Interview

Exclusive Interview: ElcomSoft CEO Vladimir Katalov; Were ElcomSoft forensic tools used in the nude photo breaches?

Vladimir’s iCloud Blog posting from 2013 that talked about this logic flaw.

Apple Should Be More Transparent About Security

Notes on the Celebrity Data Theft

Elcomsoft’s phone password breaker

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

Advertisements

January 12 2013, Episode 288, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on January 12, 2013 by datasecurityblog

Episode 288 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Jeff Hudson, CEO of Venafy on SSL cert fraud, begins at about the 12:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 288  via the flash player:

Interview

Jeff Hudson, CEO of Venafy on SSL cert fraud

Tales From The Dark Web

0day Cisco VoIP flaw could cause eavesdropping without making a call

Our Take on This Weeks News

CES2012: Will Ford open telematics platform to forensic apps, and new gear to secure iPads at work
US Nuke lab tosses out Huawei gear over backdoor fears

Wrap

Microsoft hopes to patent an ‘inconspicuous mode‘ for smartphones

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

January 1 2013, Episode 287, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 31, 2012 by datasecurityblog

Episode 287 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Marc Weber Tobias on insider fraud, begins at about the 15:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 287  via the flash player:

Interview

Marc Weber Tobias mentioned two columns he wrote for Forbes on insider fraud:

How Do You Spot The Thief Inside Your Company?

A Snitch In Time Can Save Employers a Lot of Money

Mentioned in the segment: Redline Solutions

Tales From The Dark Web

0Day web attack impacts Microsoft IE8,7, and some Outlook users. Read Microsoft Security Advisory (2794220). And more from the FireEye Blog.

Our Take on This Weeks News

Still putting your crypto-protected PC in hibernate? $300 app can hack it  And, the ElcomSoft blog posting mentioned in the segment.

How Anybody Can Secretly Save Your Snapchat Videos Forever

 

May 1, 2011 – Episode 211

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Report Security Flaws, Show Notes, The CyberJungle, web server security with tags , , , , on May 1, 2011 by datasecurityblog

Episode 211 of  The CyberJungle is about 35 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 14:30 mark.

To listen to Episode 211 via the flash player:

Interview

Vladimir Katalov, CEO of Elcomsoft: ElcomSoft Discovers Vulnerability in Nikon’s Image Authentication System. Here are some sample faked photos that Elcomsoft claims could be “authenticated” as real. Vladimir Katalov’s blog posting on this discovery.  Elcomsoft’s main web site.

Our Take on The Week’s News

Sony sued for PlayStation Network data breach: This is probably one of many suits related to the SonyPSN breach.

ThreatMatrix and the Ponemon Institute have released the findings of their joint study on Consumers and their awareness and appreciation of online fraud. Hat tip: Brian Pennington

Tales from the Dark Web

Zeus Trojan adds investment fraud to its bag of tricks

Wrap

Verizon says it will put location warning labels on mobiles