Archive for MSIE

January 1 2013, Episode 287, Show Notes

Posted in Breach, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 31, 2012 by Habeas Hard Drive

Episode 287 of The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. The interview with Marc Weber Tobias on insider fraud, begins at about the 15:30min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 287  via the flash player:

Interview

Marc Weber Tobias mentioned two columns he wrote for Forbes on insider fraud:

How Do You Spot The Thief Inside Your Company?

A Snitch In Time Can Save Employers a Lot of Money

Mentioned in the segment: Redline Solutions

Tales From The Dark Web

0Day web attack impacts Microsoft IE8,7, and some Outlook users. Read Microsoft Security Advisory (2794220). And more from the FireEye Blog.

Our Take on This Weeks News

Still putting your crypto-protected PC in hibernate? $300 app can hack it  And, the ElcomSoft blog posting mentioned in the segment.

How Anybody Can Secretly Save Your Snapchat Videos Forever

 

September 26 2012, Episode 274, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , , , on September 26, 2012 by Habeas Hard Drive

Episode 274 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Attorney Benjamin Write begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 274 via the flash player:

Interview

Benjamin Wright, Attorney in Private Practice,  SANS Instructor: Law of Data Security and Investigations. See the forensics from the cloud videos Benjamin talked about. Follow Mr. Wright on Twitter.

Tales From The Dark Web

Over 9 million PCs infected – ZeroAccess botnet uncovered

Our Take on This Weeks News

Wells Fargo website hit by access issues amid cyber threats

Microsoft Security Bulletin MS12-063 – Critical

FTC: Rented computers spied on customers

Wrap

‘Operation ID’ helps take a bite out of smartphone crime

July 19, 2011 – Episode 222

Posted in Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 18, 2011 by Habeas Hard Drive

Episode 222 of  The CyberJungle is about 35 minutes long, the interview starts at ~16:00 minutes.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 222 via the flash player:

Interview

What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric.

Our Take On This Week’s News

Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? Read the complete NSSLabs Report

Smashing hard drive leads to conviction for obstruction under SOX

Tales From the Dark Web

Crowd-sourcing the reporting of webmail hijacks

Show Notes: The CyberJungle Episodes 103 and 102 Jan 12 2010

Posted in Breach, Court Cases, criminal forensics, Exclusive News, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , , , on January 16, 2010 by Habeas Hard Drive

Two episodes this week: Episode 103 is a podcast version of the live radio program.

Episode 102 is our ‘su root’ podcast, in-depth technical interviews for the more advanced listener.

Overview of this week’s program.  More detailed notes and links provided below under “show notes.”

*Episode 103 the broadcast- Breaking News:  Do airport checkpoint whole body scanners have logging and auditing to enforce security and privacy policies?  We’re not sure after talking with a representative of one of the companies that makes the machines.  Seems the TSA may not have included an audit function in its specifications.   And, our guest tells us what happened to the “puffer machine” that would have detected the underwear bomber’s chemical payload on Christmas Day.

We also talked with an attorney from EPIC, the organization that sought and won the TSA specification documents revealing that body scanning machines are indeed capable of retaining and transmitting the naked images of the passengers they scan. This is NOT what TSA told the American public.

*Episode 102 (the su root interiews… requires above-average technology background). Click fraud is running rampant… ripping off internet advertisers. A new, more serious attack that not only steals credit for click-through purchases, but hijack’s the end user’s computer. This is a must-listen for marketing, security, and legal personnel. Discussion on the live show, with the full interview online.

*Episode 102 (the su root interviews…requires above-average technology background.) A new user credential – your cell phone calls you for a voice print… and then lets you into your email, bank account, authorizes credit card purchases or VPN remote access. Great idea? We have an exclusive audio interview with the co-founder of the company.

–> Listen This Week’s Show through our Main Site

Show Notes for Episode 103 of the CyberJungle

*ZeroDay Flaw in some versions of Microsoft Internet Explorer (MSIE) web browser.  Microsoft’s TechNet site has posted detailed information about the flaw. If you have not checked your MSIE browser version, do it now. Launch MSIE, find the Help Icon (usually the far right menu/icon, depending on the version of MSIE you are running), and select About Internet Explorer. If you are not running MSIE verson 8, you need to update your browser. Read more here. Update your browser to MSIE 8 here.

* People around the world are searching the web for the latest updates on Haiti earthquake. Members of the Dark Web use major events like this to spread their malicious code. Read more on this attack at the WebSense Security site. Ira mentioned the Google Trends site, a site that tracks hot topics on The Web.

* Samantha had a conversation with Ginger McCall, Esq., with the Electronic Privacy Information Center (EPIC). They talked  about the DHS airport body scanners, and a Freedom of Information lawsuit by EPIC. Read more at this EPIC-sponsored site.

* Samantha and Ira had a conversation Brook Miller, VP with Smiths Detection, the makers of “the puffer” machine, and the whole body scanners.

* Samantha had a conversation with Dr. Kerry Kerry Nemovicher, Ph.D. about “The Human Firewall” event by  InfraGard. This event takes place on Thursday, Jan 21st at Boomtown Casino, in Reno Nevada. This lunch event runs from 11.15am to 1.15pm. $15 donation when you reserve your ticket by Monday at 9:00am, $20 at the door.

Show Notes for Episode 102 of The CyberJungle, an ‘su root’ program, in-depth technical interviews and analysis

*Ira has a conversation with Dr. Ben Edelman, from the Harvard Business School, about a new type of online advertising “click fraud” that takes over customer’s computers. Read more on Dr. Edelman’s site. On the main site you can listen to the full, detailed, and technical conversation. Look for the “su root” podcast (Episode 102) on the main site, www.TheCyberJungle.com.

* Ira has a conversation with Steven Dispensa, CTO and co-founder of PhoneTrust, about voice print authentication. On the main site you can listen to the full, detailed, and technical conversation. Look for the “su root” podcast (Episode 102) on the main site, www.TheCyberJungle.com.