Archive for malware

March 27 2013, Episode 295, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on March 27, 2013 by Habeas Hard Drive

Episode 295 of The CyberJungle is about 35 minutes long.  The interview with the Founder of Stop the Hackers begins at about the 20min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 295 via the flash player:

Interview

Dr. Anirban Banerjee is the lead Primary Investigator, the VP of Research and Development, and co-founder of StopTheHacker Inc. He graduated with his Ph.D. in Computer Science, from the University of California at Riverside in 2008. Dr. Banerjee’s thesis research includes well over twenty published papers in the areas of internet security, measurements and web technology.

Tales From The Dark Web

Industrial espionage is ripping off SA firms

Our Take On This Week’s News

South Korea bank attacks should prompt rethink in U.S.

Of 1,800 serious malware NSS Labs tested, some always managed to get through — no matter what combination of protection was used

What You Didn’t Post, Facebook May Still Know

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

June 21, 2012, Episode 263, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , on June 21, 2012 by Habeas Hard Drive

Episode 263 of The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview with Sean Morrissey of Katana Forensics. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 263 via the flash player:

Interview

Sean Morrissey of Katana Forensics

Tales From The Dark Web

IE remote code execution vulnerability being actively exploited in the wild

Our Take on This Weeks News

The Failure of Anti-Virus Companies to Catch Military Malware

Facebook Can Now Spot You in a Crowd?

LinkedIn Blew Security, Class Claims

How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn’t Matter)

Wrap

VIZIO ditches the crapware

September 05, 2011 – Episode 228

Posted in Breach, darkweb, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on September 5, 2011 by Habeas Hard Drive

Episode 228 of  The CyberJungle is about 33 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about ~17min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 228 via the flash player:

Interview

Another large scale fake SSL Certificate breach is impacting business web users. How should businesses respond? Our guest Jeff Hudson CEO of Venify recommends an SSL Certificate breach response plan. Find our more in our interview segment, a little later on the program.

Our Take On This Week’s News

Why Diginotar may turn out more important than Stuxnet. Read the posting by Roel Schouwenberg, researcher with Kaspersky. From Microsoft: Protecting yourself from attacks that leverage fraudulent DigiNotar digital certificates. More on Microsoft’s response to the DigiNotar compromise.

FireEye Advanced Threat Report, First Half of 2011.

Tales From The Dark Web

Debut Impermium Index Reveals Surprising Trends in Social Web Spam Attacks

Wrap

Should I Change My Password?