Archive for laptop security

October 31, 2018, Episode405, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on October 31, 2018 by datasecurityblog

Episode 405 of The CyberJungle is about 30 minutes long.  The interview with Tim Medin, Founder of Red Siege on keep it simple secure starts at  about 12:00. The interview with Joe McManus, the CISO of cloud patching start-up Automox begins at about 22:20. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 404 via the flash player:

Newsmaker Interviews

From SANS Network Security 2018: Tim Medin, Founder of Red Siege

From PFIC 2018: Joe McManus, the CISO of cloud patching management firm Automox

Our Take on This Week’s News

0day: Embedded vids in MSFTOffice docs can hide malware

Deloitte: CEO and Board Risk Management Survey

Tales from The Dark Web

Laptop-Carrying Fed Infects Gov Network

Wrap

The Wrap was getting ready for Halloween this week

 

Free Trial from Our Sponsor: Paraben Software

Try the data recovery and digital forensics software that Ira Victor from The CyberJungle uses. Now with expanded features in version 2.0. Paraben has been committed to digital forensics since 2001 and their leadership has been pioneering the field for over 20 years. They believe in creating products that allow you to optimize your time and get the most data possible. If you have not used Paraben Software, give it a try with their 15-day trial.

 

 

Advertisements

Data Security Podcast Episode 63 – July 27 2009

Posted in Breach, Conference Coverage, darkweb, ediscovery, eMail Security, Podcast, Vulnerabilities with tags , , , , , , , on July 27, 2009 by datasecurityblog

30 minutes each week on data security, privacy, and the law….(plus or minus five)

On this week’s program:

* iPhone Security. Is that an oxymoron?

* Google Chrome Browser uses sandboxing for security.  We talk to a security engineer that says his firm has built a better sandbox.

* Our take on this week’s news.

–>NEW! Stream This Week’s Show with our Built-In Flash Player:

This week’s show is 30 minutes.

–> Stream, subscribe or download Episode 63 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: http://www.testdrivevipre.com .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 63 of the Data Security Podcast

* Conversation: Ira talks with Matt Hite, an engineer with Check Point security, about sandbox security software,  and how they are trying to leapfrog the sandbox security software included in Google’s Chrome Browser.

* Tales From The Dark Web:  iPhone Security. Is that an oxymoron? Take a look at this video by Jonathan Zdziarksi from the extensive write-up in at Wired.

* Tales From The Dark Web: Finjan’s Malicious Code Research Center (MCRC) has detected yet another case of a 0-day attack “in the wild”. This time, hackers are exploiting a vulnerability (CVE-2009-1862) in Adobe Acrobat/Reader and Flash player. By exploiting this vulnerability, the hackers can download and execute malicious code on the victim’s PC. Patch due from Adobe on July 31, 2009. Get ready now to roll out the patch(es).

* From the News: Advance notification by Microsoft for emergency patches for release tomorrow, July 28th, 2009. Get ready now to roll out the patch(es).

* From the News:  Exposed: Repair Shops Hack Your Laptops.

* Wrap: Ira will be traveling to DefCon, the World’s Largest Hacker Event, this weekend. DefCon is held in Las Vegas, Nevada. Ira will be tweeting from the show, you can follow his comments at his Twitter site, http://twitter.iravictor.net . If you plan to attend DefCon, follow his tweets,  find him, and say hello.

* Correction:  When Ira spoke about iPhone security, he did not credit Jonathan Zdziarski for the comments about screen captures and keylogging. We apologize for the mistake.