Archive for FBI

May 7, 2012, Episode 257, Show Notes

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on May 7, 2012 by datasecurityblog

Episode 258 of The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Rick Comeau, Center for Internet Security (CIS) begins at about 14min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 258 via the flash player:

Interview

From  Interop Las Vegas, we talk with Rick Comeau, Center for Internet Security, Mitigation Strategies Crosswalk

Tales From The Dark Web

PHP web server flaw, patch ineffective

Our Take on This Weeks News

FBI wants backdoors openned into VoIP, IM, more

OS X encryption flaw, made worse by Apple?

Wrap

Blueseed pirate developer’s ship

Advertisements

June 27, 2011 – Episode 219

Posted in Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Interview Only Edition, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on June 27, 2011 by datasecurityblog

Episode 219 of  The CyberJungle is about 55 minutes long, due to extended coverage from The Gartner Security Summit 2011.  You can hear it by clicking on the flash player below. The first interview begins at about 19min, and the second interview at about 40min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 219 via the flash player:

Interviews

John Bace, Gartner, Congress just put a bounty on your boss; how one whistleblower earned $90million

Debra Logan, Gartner, on why a judge slapped a million dollar eDiscovery-related fine on a careless company

Our Take On This Week’s News

The IRS fails a security audit (again)

Does the TSA care about your tablet getting stolen at a checkpoint?

Tales From The Dark Web

Department of Justice Disrupts International Cyber Crime Rings Distributing Scareware

Wrap

The end of the supermarket club card?


Conference Coverage

The CyberJungle went to the 2011 Gartner Security Summit this week. Get the reports in Conference Notes.

Data Security Podcast Episode 88, Jan 04 2010

Posted in Annoucements, Breach, darkweb, Legislation, Podcast, The CyberJungle with tags , , , , , , , on January 3, 2010 by datasecurityblog

30 minutes every week on data security, privacy, and the law…..(plus or minus ten)

On this week’s program:

* Bad guys buying services to evade anti-virus

* Special announcement

* Our take on this week’s news

–> Stream This Week’s Show with our Built-In Flash Player (for higher security, stream through FeedBurner, using the hyperlink below):

–> Scroll down to see links and show notes for this week’s show

–> Stream, subscribe or download Episode 88 – Use Feedburner to listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall. The shows don’t always display on chronological order on Odeo.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Award-winning Sunbelt Network Security Inspector a scalable and effective vulnerability scanner. Windows IT Pro Magazine readers chose SNSI as their Favorite Vulnerability Scanner for two years in a row. Read more here, and contact Data Clone Labs for a test drive .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 88 of the Data Security Podcast

* Tales From The Dark Web: Bad guys buying services evade anti-virus. Brian Krebs (formerly with The Washington Post) does his usual outstanding work on the topic, from his brand new blog. Read more here.

* From Our Take on The News: Body scanning machines; here’s a story from the UK that dismisses their effectiveness in cases where a guy stuffs a chemical explosive in his underwear. (But they are very effective at revealing the other junk in your underwear.) Read more here.

Meanwhile, Logan International in Boston and the Newark Liberty Airport in New Jersey will both get the body imaging machines. (Both were points of origin for the September 11 attacks.) Read more here from The Star Ledger. And read more here from Boston Globe.

* From Our Take on The News: TSA nominee misled Congress about accessing confidential records. Read more here from The Washington Post.

* From Our Take on The News:  How embarrassing! The Chairman of the FCC sends a facebook spam. Read more here from The New York Times blog.

* Special Announcement:  The Data Security Podcast will go LIVE this week as the nation’s first  call-in talk show on security, privacy and the law. You can listen on a web stream or terrestrial radio every Saturday, starting this Saturday, Jan 9th from 10 a. m. until noon Pacific Time.  Be sure to tune into the web stream of KKOH-780am, here is a link to their site, click on the’ Listen Live’ link on the upper right hand corner.

We are changing the name of the show to The CyberJungle. We will keep this site active, and we will keep the current iTunes site active for a while, as we transition to the new name and site.   We will  continue to post our interviews with security experts. The material that’s too technical for the radio will be posted here.

We want to thank all of you for  the support and feedback for the last 18 months. We are grateful that you chose to spend your time with us. Our sponsors have also been very good to us. If you enjoy the show, please try their products, and please let the know you heard about them from us.

A big thanks also to the management of KOH Radio. They “get it,” and we salute them for understanding that the time is right for this show.

KOH Call-In for The New Show

Data Security Podcast Episode 47 – Apr 06 2009

Posted in Breach, criminal forensics, darkweb, ediscovery, eMail Security, Podcast, Vulnerabilities, web server security with tags , , , , , , , , , , , on April 5, 2009 by datasecurityblog

The Data Security Podcast is the place for 30 minutes of news every week on data security, privacy, and the law.

This weeks program: New PowerPoint zero day attack; Conficker is still alive and kickin’ how do you tell if it’s on your network? And the week’s news.

–> Stream, subscribe or download Episode 47 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

This week’s show is sponsored by DeviceLock Removable Media Security Software.

The Show Notes Page for Episode 47 of The Data Security Podcast

-From The News: PowerPoint zero-day vulnerability (969136) as reported on the SANS Internet Storm Center; More on the “Microsoft Office Isolated Conversion Environment” on an interesting MSFT blog. Alternatives: OpenOffice, or StarOffice.

. – From The News: REPORT – FBI Agents Raid Dallas ISP and seize equipment for 50 companies unrelated to the raid, including an e911 system.

-From The News: Senator Rockefeller(D) and Senator Snowe(R) introduced a comprehensive cybersecurity bill that gives broad powers to the President and requires licensing of cybersecurity professionals.

-Tales From The Dark Web: As posted on the SANS Internet Storm Center: Locate Conficker infected hosts with a network scan. Plus use Snort to detect Conficker: Open Source Conficker-C Scanner/Detector Released. Then, in Part Two of the segment: Next-gen SQL injection attacks.

– Conversation: Ira talks with Matt Shanahan of AdmitOne Security about keystroke biometrics they use in AdmitOne Scout.

– Wrap Up: A very English revolt against Google Street View