Archive for NIST

July 2 2017, Episode 392, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on July 1, 2017 by datasecurityblog

Episode 392 of The CyberJungle is about 26 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 392 via the flash player:

Ahead of the Curve

How to pwn phones with shady replacement parts

Our Take on This Week’s News

NotPetya developers may have obtained NSA exploits weeks before their public leak

Microsoft-Led Investigation Results in Arrest of Four Tech Support Scammers

Ubuntu ‘weaponised’ to cure NHS of its addiction to Microsoft Windows

NIST Cyber Advisers Anxious Over Auditing Agencies

Tales from The Dark Web

Hijacking Bitcoin: routing attacks on cryptocurrencies

Wrap

The conferences Ira mentioned in the wrap segment: Security BSides Las Vegas , BlackHat USA , DefCon25

Please support our sponsors, as they make The CyberJungle possible:

Paraben Forensic Innovations Conference – PFIC 2017

Innovation is always being able to learn and change for the adaptive environment that we live in. PFIC 2017 offers a 1-day Cyber-Symposium that focuses on this very topic. Some of the top industry speakers are coming to Pittsburgh, PA to share their latest research and techniques for popular topics such as, social media investigations, IoT data forensics, Digital Evidence Tampering, and the first conference to do a live walk through on Chip Off techniques and analysis. All of this information is coming together at Robert Morris University on August 18, 2017.

In addition to the main event agenda there are pre-conference labs that are available on request. Those details can be found in the agenda list below and requests can be made to pfic@paraben.com for enrollment in those labs. Seating is limited.

PFIC 2017

Advertisements

June 12, 2014, Episode 340, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Podcast, Show Notes, The CyberJungle with tags , , , , , , on June 12, 2014 by datasecurityblog

Episode 340 of The CyberJungle is about 35 minutes long. Eric Springer, Bitcoin Vigil Founder starts at about 20min, Chinese Industrial Espionage in Tales from the Dark Web, Dropbox Ransomeware, and the 11th Circuit rules 4th Amendment applies to cellphone location data in The News. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 340 via the flash player:

Interview

Eric Springer, Bitcoin Vigil Founder

Our Take on This Week’s News

Dropbox+Ransomeware=Perfect Business User Storm?

11th Circuit rules 4th Amendment applies to cellphone location data

Tales from The Dark Web

Chinese Industrial Espionage,

PUTTER PANDA RELEASE WAS CALCULATED DECISION, see 5th story down on this Politico page

NIST Supply Chain Risk Management

Wrap

No time for the Wrap this week.

Please support our sponsors, as they support The CyberJungle:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

 

March 19 2013, Episode 294, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Exclusive, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 19, 2013 by datasecurityblog

Episode 294 of The CyberJungle is about 30 minutes long.  The interview with James Elste on privacy and Trusted Identities begins at about the 15min mark. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 294 via the flash player:

Interview

James Elste, information security expert, talks privacy and NIST’s Trusted Identities effort. Here are the links from the segment:

www.idecosystem.org

NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE

Making Online Transactions Safer, Faster, and More Private

Tales From The Dark Web

Ira talked about the credit reporting agency break ins, and how Federal law made the attacks easier

Our Take On This Week’s News

Huawei USB modems vulnerable

How will you know who’s recording? Google Glass protestors set up campaign group to censor the high-tech eyewear

Wrap

Ohio judge calls speed cameras ‘scam’

Please support our sponsors, as they support The CyberJungle

SpectorSoft

SpectorSoft: IT professionals, Risk Officers, and HR staff have more worries than ever: insider theft, inappropriate communications, inefficient processes, employee investigations, and compliance requirements. These pressing issues demand a reliable, automated, advanced technology capable of showing user, department, and division activity no matter where the users are or what devices they are using. SPECTOR 360, the de facto corporate User Activity Monitoring solution, addresses these issues and meets this demand.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.

 

October 3 2012, Episode 275, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on October 3, 2012 by datasecurityblog

Episode 275 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Jack Daniel, begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 275 via the flash player:

Interview

Jack Daniel InfoSec Curmudgeon, Reluctant CISSP, and Amateur Blacksmith. Find him here on @jack_daniel, he works at Tenable Network Security.

Tales From The Dark Web

Even when PCs are locked down, modems and routers can still be compromised

Our Take on This Weeks News

98% of Android devices running old version of software

NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

Appeals Court ruling on CP damages to victims

Wrap

FTC Case Results in $163 Million Judgment Against “Scareware” Marketer