Archive for ICS

June 17, 2012, Episode 265, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , on July 17, 2012 by datasecurityblog

Episode 264 of The CyberJungle is about 44 minutes long.  You can hear it by clicking on the flash player below. The interview with Billy Rios on the weaknesses in Industrial Control Systems begins at about 12:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 265 via the flash player:

Interview

Billy Rios’ weekend research led to a DHS Alerts on building control systems. Here is his blog, as mentioned in the segment.

Tales From The Dark Web

Malware Turning Smartphones into a Botnet?

Our Take on This Weeks News

Anonymous hackers target oil industry giants, more than 1,000 email credentials exposed

Links to the hashed data buckets

Wrap

Secondary market signals huge drop in MacBook values.

Advertisements

July 11, 2012, Episode 264, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 11, 2012 by datasecurityblog

Episode 264 of The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 264 via the flash player:

Interview

F. Michael Maloof: China: ‘Pervasive access’ to 80% of telecoms ; G2 Bulletin

Tales From The Dark Web

USB Drive, Malware and Industrial Control Systems. Read the CERT Report.

Our Take on This Weeks News

Uncovering Privacy Issues With Mobile App Advertising

Patch Tuesday: Microsoft pushes nine fixes for 16 flaws

Anon in Buenos Ares Argentina?

Wrap

A Twitter client for Mac System 6? Oh Yea!