Archive for iOS

November 30 2016, Episode 386, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on November 30, 2016 by datasecurityblog

Episode 386 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 386 via the flash player:

Commentary

New Details Suggest Rogue Government Agent Deleted Evidence in Silk Road Case

Our Take on This Week’s News

Ira talked about the comments by Javvad Malik, security advocate at AlienVault, about the SF Muni breach

IPhone users hit by ‘calendar spam

Mirai botnet attack hits thousands of home routers, throwing users offline

US-CERT updates cybersecurity incident notification guidelines

Hunted: CBS game show contestants to flee surveillance

Tales from The Dark Web

‘Dronejacking’ may be the next big cyber threat

Tech support scams evolve, borrow tricks from ransomware creators

Wrap

This $1,500 Toaster Oven Is Everything That’s Wrong With Silicon Valley Design

Advertisements

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

September 17 2012, Episode 273, Show Notes

Posted in Court Cases, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on September 17, 2012 by datasecurityblog

Episode 273 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Rafel Los Security Evangelist with HP, begins at about the 17min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 272 via the flash player:

Interview

Rafel Los is the Security Evangelist for HP Software. Read the blog posting, Landmark ruling- Insiders aren’t hacking if you’ve given them access. Follow Rafel Los on Twitter

Tales From The Dark Web

Your smartphone WiFi may be spilling your “bees-wax”

Our Take on This Weeks News

China’s Huawei, ZTE grilled by U.S. officials over spying concerns. The Case For Huawei in American, by Dan Steinbock

Another School Violated a Student’s First Amendment Rights by Disciplining Her For Facebook Posts — R.S. v. Minnewaska Area School Dist. No. 2149.

Wrap

Ira Victor will be tweeting from SANS Network Security 2102 in Las Vegas this week. Follow Ira Victor in Twitter @ira_victor.

August 15 2012, Episode 269, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Show Notes, Vulnerabilities with tags , , , , , , on August 15, 2012 by datasecurityblog

Episode 268 of The CyberJungle is about 28 minutes long.  You can hear it by clicking on the flash player below. The interview with Skip Duckwall from Pass The Hash blog begins at about 16min.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 269 via the flash player:

Interview

Skip Duckwall from Still Passing The Hash. Demos from his BlackHat2012 talk.  Plus info on the tool’s addition to the Backtrack tool kit.

Tales From The Dark Web

Medical records held hostage by cyber attackers

Our Take on This Weeks News

Fake SocialNetworking

Smartphone-based attack wreaks havoc on Android and iOS smartphones

Wrap

Mark Zuckerberg Topless; Photo Was on Facebook

May 1, 2012, Episode 257, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on May 17, 2012 by datasecurityblog

Episode 259 of The CyberJungle is about 22 minutes long.  You can hear it by clicking on the flash player below. The interview with Chester Wisniewski Apple Expert at Sophos Security begins at about 13:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 259 via the flash player:

Interview

From the floor of Interop Las Vegas: Chester Wisniewski Apple Expert at Sophos Security

Tales From The Dark Web

If you’re seeing ads on Wikipedia, your computer is probably infected with malware

Our Take on This Weeks News

ElcomSoft Helps Investigate Crime Providing Yet Another Way to Break into iOS with iCloud Attack

Apple posts twin security updates for OS X Leopard

Wrap

Heavy sleeper? Tired of snoozing past your alarm? Use the ‘smartphone in a cup’ trick to crank the volume!

March 26, 2012, Episode 252, Show Notes

Posted in Court Cases, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , , , on March 25, 2012 by datasecurityblog

Episode 252 of The CyberJungle is about 27 minutes long.  You can hear it by clicking on the flash player below. The interview with  Dr. Thibadeau of Wave Systems begins at about 17:30min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 252 via the flash player:

Interview

From the floor of RSA Security Conference, we talk with Dr. Robert Thibadeau of Wave Systems about the challenges of data wiping and digital forensics on solid state drives (SSD)

Tales From The Dark Web

We take a break from our format this week, and therefore no Tales from The Dark Web

Our Take on This Weeks News

Facebook Threatens Legal Action Against Employers Asking for Your Password

Facebook responds to workplace password releases

Report: Some GSM networks can be easily breached

Seattle Startup Offers Solution for Apps Rejected by Apple for Using UDID

Wrap

Web 0.2: Today I Learned Buick “Created A Website” Before There Was Even A Web

December 19, 2011 – Episode 242

Posted in Annoucements, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive News, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on December 19, 2011 by datasecurityblog

Episode 242 of The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics begins at about 13min.  You may download the file directly – great for listening on many smartphones. Or, you  may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 242 via the flash player:

Interview

Sean Morrissey of Katana Forensics launches LaternLite iOS Forensics tool this week

Our Take On This Week’s News

Forensic innovator Jonathan Grier has developed tools that use statistical analysis of file access data to reconstruct timelines. According to Mr. Gerier, his method can be used to determine what, if data was exfiltrated from the system. Read more in: Detecting data theft using stochastic forensics.

Excellent work by c|net’s Elinor Mills on the software by CarrierIQ that some have labeled as an illegal “root kit.” Read: Sprint disabling Carrier IQ on phones.

Tales From The Dark Web

Passwords hard coded into industrial control systems – What could possibly go wrong?

Wrap

New job opportunity for those with Photoshop forensics skills? US watchdog bans photoshopping in cosmetics ads. Wow, and I thought all those models had perfect faces and perfect bodies all of the time…