Archive for ransomeware

November 30 2016, Episode 386, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on November 30, 2016 by datasecurityblog

Episode 386 of The CyberJungle is about 29 minutes long.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 386 via the flash player:

Commentary

New Details Suggest Rogue Government Agent Deleted Evidence in Silk Road Case

Our Take on This Week’s News

Ira talked about the comments by Javvad Malik, security advocate at AlienVault, about the SF Muni breach

IPhone users hit by ‘calendar spam

Mirai botnet attack hits thousands of home routers, throwing users offline

US-CERT updates cybersecurity incident notification guidelines

Hunted: CBS game show contestants to flee surveillance

Tales from The Dark Web

‘Dronejacking’ may be the next big cyber threat

Tech support scams evolve, borrow tricks from ransomware creators

Wrap

This $1,500 Toaster Oven Is Everything That’s Wrong With Silicon Valley Design

July 02, 2016, Episode 381, Show Notes

Posted in Breach, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on July 2, 2016 by datasecurityblog

Episode 381 of The CyberJungle is about 27 minutes long. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 381 via the flash player:

Our Take on This Week’s News

Tesla Faces Backlash Over Autopilot Technology in Wake of Crash

Stealth startup Zoox lands $200m for its secretive self-driving car

High-severity bugs in 25 Symantec/Norton products imperils millions

Windows ‘BadTunnel’ Attack Hijacks Network Traffic

Widespread Attack on Office 365 Corporate Users with Zero-day Ransomware Virus

Hackers Can Exploit LibreOffice Flaw With RTF Files

Foxit Patches RCE Flaws in Reader, PhantomPDF

Dating site Muslim Match data breach can actually get people killed

Clicking With The Enemy

SWIFT hackers nick $10m from Ukraine bank

Tales from The Dark Web

Over 100 DDoS botnets built using Linux malware for embedded devices

Mobile ransomware use jumps, blocking access to phones

Wrap

Browse free or die? New Hampshire library is at privacy fore

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

March 16, 2016, Episode 378, Show Notes

Posted in Breach, Court Cases, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on March 17, 2016 by datasecurityblog

Episode 378 of The CyberJungle is about 33 minutes long.  The interview with Senior Phishme Researcher Ron Tokazowski begins at about 2:10. The interview with Avvo Chief Legal Council Josh King begins at about 11:50. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 378 via the flash player:

Interviews

Senior Phishme Researcher Ron Tokazowski excellent blog entry, Ransomware Rising – Criakl, OSX, and others – PhishMe Tracks Down Hackers, Identifies Them and Provides Timeline of Internet Activities.

Avvo Chief Legal Council Josh King. Link to Lawyernomics Conference April 7th-9th 2016 in Las Vegas. Read his blog Social Awkward.

Ira talked about the following Las Vegas infosec and digital forensics conferences over the next few months, in this segment:

CEIC Enfuse 2016, May 23th-26th

BlackHat USA 2016, July 30th-August 4th

Bsides Las Vegas 2016, August 2nd-August 3rd

DefCon24 Las Vegas 2016, August 4th-August 7th

Our Take on This Week’s News

Preempted in this episode

Tales from The Dark Web

Preempted in this episode

Wrap

Preempted in this episode

 

Please Support Our Sponsor: PFIC Digital Forensics Conference 2016

The Desmond

PFIC 2016

PFIC 2016 will be held September 8-9, 2016 in Albany, New York at The Desmond.  We hope you’ll be able to join us this year for the knowledge, networking, and fun that have come to be hallmarks of the PFIC experience!

 

March 28, 2015, Episode 362, Show Notes

Posted in Breach, Exclusive, Vulnerabilities with tags , , , on March 28, 2015 by datasecurityblog

Episode 362 of The CyberJungle is about 27 minutes long. The interview with Daniel Stein, on health info use and privacy begins at about 13:40. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 362 via the flash player:

Interview

Daniel Stein, President Stewards of Change. Read more here: How Open Data Can Shape Public Policy

Our Take on This Week’s News

Cyberthreats heavy on the minds of health provider, insurer technology execs

Security Community Slams Blue Coat Claiming It ‘Pressured Security Researcher Into Cancelling Talk On Its Tech

Tales from The Dark Web

RansomWeb: emerging website threat that may outshine DDoS, data theft and defacements?

Wrap

The authorized information available the NSA HQ could be published in a single tweet

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

Jan 17, 2015, Episode 358, Show Notes

Posted in darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities, web server security, Zero Day Project with tags , , , , on January 17, 2015 by datasecurityblog

Episode 358 of The CyberJungle is about 29 minutes long.  The interview with Sara Andrabi on infosec academic research versus industry research begins at about 17min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 358 via the flash player:

Interview

Sara Andrabi on infosec academic research vs. industry research. Find her on Peerlyst.com .

Our Take on This Week’s News

Mobile users encountered malware 75% more often in 2014 compared to 2013

Google won’t fix bug hitting 60 percent of Android phones

Secret US cybersecurity report: encryption and two factor authentication vital to protect private data

Tales from The Dark Web

CryptoWall ransomware is back with new version after two months of silence

Researchers at Cisco’s Talos group published an analysis of a new variant of Cryptowall ransomware that implements new features

Wrap

Cotton coated with microscopic metal wires traps 80% of body heat – and can even be used like an electric blanket via USB

 

Dec 18, 2014, Episode 356, Show Notes

Posted in Breach, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on December 18, 2014 by datasecurityblog

Episode 356 of The CyberJungle is about 29 minutes long.  The interview with Ben LeMere, CEO, Berla begins at about 10:10. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 356 via the flash player:

Interview

Ben LeMere, CEO, Berla . The Infiniti commercial mentioned in the segment.

Our Take on This Week’s News

Ripples effect of the Sony Breach?

Is Uber’s rider database a sitting duck for data breaches?

Shellshock flaw hits network storage systems

Next-gen ransomeware by-passing vm analysis

Tales from The Dark Web

Tales took a break this week for our extended coverage of digital vehicle forensics

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology