Archive for SHA-3

October 3 2012, Episode 275, Show Notes

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on October 3, 2012 by Habeas Hard Drive

Episode 275 of The CyberJungle is about 26 minutes long.  You can hear it by clicking on the flash player below. The interview with Jack Daniel, begins at about the 15min mark.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 275 via the flash player:

Interview

Jack Daniel InfoSec Curmudgeon, Reluctant CISSP, and Amateur Blacksmith. Find him here on @jack_daniel, he works at Tenable Network Security.

Tales From The Dark Web

Even when PCs are locked down, modems and routers can still be compromised

Our Take on This Weeks News

98% of Android devices running old version of software

NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

Appeals Court ruling on CP damages to victims

Wrap

FTC Case Results in $163 Million Judgment Against “Scareware” Marketer