Archive for VoIP

August 22, 2011 – Episode 226

Posted in Breach, Conference Coverage, Court Cases, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 21, 2011 by datasecurityblog

Episode 226 of  The CyberJungle is about 27 minutes long this week.  You can hear it by clicking on the flash player below. The interview begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 226 via the flash player:


Hotel VoIP system open to serious attack? Interview with Jason Ostrum of . Get the latest open source VoIP Hooper tool. According to the site, “VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop security test. VoIP Hopper is a VoIP infrastructure security testing tool but also a tool that can be used to test the (in)security of VLANs”

Our Take On This Week’s News

Smartphone monitoring or malware: it’s all in the intent. Read the TrendMicro blog on the topic.

Can schools control private teacher/student digital conversations?

Microsoft has committed itself to encouraging young women to enter tech, as part of that effort, they host an event called Digigirlz, around the world.

Tales From The Dark Web

New wave of malware targets the desktops of web site publishers.


The 20th anniversary of Linux Open Source Software. Here is the video mentioned in the segment


Swine Flu and Business Continuity Plans

Posted in Business Continuity with tags , , , on April 27, 2009 by datasecurityblog

Swine Flu is impacting locations in Mexico, the US, Canada, Asia, and Australia.  We recommend that you review your business continuity plan now. Even if the outbreak is contained, if it occurs where you have employees, your business could feel the full impact of the flu.

According to health officials at the UK NHS: “This virus is contagious and is spreading from human to human.” In the event of an outbreak in your area, many of your employees would need to become teleworkers.  The time to plan is BEFORE a disruption occurs.

The Data Security Podcast is working on stories now to help with planning. Subscribe to our RSS feed for updates.