Home  /  Podcast Directory  /  Technology  /  The CyberJungle


Last update: 2013-06-30

The CyberJungle Episode306: * Exclusive: Focusing firewalls on app security, with Nimmy Reichenberg of AlgoSec * Tales from The Dark Web: New malware variant wipes hard drive data * Industrial spies steal $800m in value from one smaller US firm * Apple

2013-06-30 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode306: * Exclusive: Focusing firewalls on app security, with Nimmy Reichenberg of AlgoSec * Tales from The Dark Web: New malware variant wipes hard drive data * Industrial spies steal $800m in value from one smaller US firm * Apple


The CyberJungle Episode305: * SnapChat photos vanish in 10seconds, right? Wrong, says our guest * Tales from The Dark Web: Giant Java Updates * Less tracking while online * NSA-gate, a turning point for tech companies? * NSA-gate ripples hitting court c

2013-06-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode305: * SnapChat photos vanish in 10seconds, right? Wrong, says our guest * Tales from The Dark Web: Giant Java Updates * Less tracking while online * NSA-gate, a turning point for tech companies? * NSA-gate ripples hitting court c


The CyberJungle Episode304: * SPECIAL EDITION, break from normal format to advance recent surveillance stories * Susan Landa, privacy expert, on Fed's desire to put backdoors in endpoint software/devices * Martha Hampel, grass roots activist gets survei

2013-06-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode304: * SPECIAL EDITION, break from normal format to advance recent surveillance stories * Susan Landa, privacy expert, on Fed's desire to put backdoors in endpoint software/devices * Martha Hampel, grass roots activist gets survei


The CyberJungle Episode303: * Exclusive: Kevin Fiscus from SANS Institute - Security? So What! * Tales from The Dark Web: Oracle Tackles Java Security Holes * Yahoo! Mail clones Gmail on privacy; Loses 6million over poor security * Evernote adds

2013-06-03 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode303: * Exclusive: Kevin Fiscus from SANS Institute - Security? So What! * Tales from The Dark Web: Oracle Tackles Java Security Holes * Yahoo! Mail clones Gmail on privacy; Loses 6million over poor security * Evernote adds


The CyberJungle Episode302: * Exclusive: Dr. Eric Cole on stopping the APT * Tales from The Dark Web: Telco goes after reporters that discovered large data leak * Iran fingered for attacks on US power firms; Syrian group tried to disrupt Haifa wa

2013-05-28 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode302: * Exclusive: Dr. Eric Cole on stopping the APT * Tales from The Dark Web: Telco goes after reporters that discovered large data leak * Iran fingered for attacks on US power firms; Syrian group tried to disrupt Haifa wa


The CyberJungle Episode301: * Exclusive: Dr. Kerry Nemovicher on Washington State Court System Breach * Tales from The Dark Web: Anatomy of TheOnion Breach * OJ Hearing Focuses on Lack of Digital Forensics Experts * $45mil Bank Breach Could Lan

2013-05-16 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode301: * Exclusive: Dr. Kerry Nemovicher on Washington State Court System Breach * Tales from The Dark Web: Anatomy of TheOnion Breach * OJ Hearing Focuses on Lack of Digital Forensics Experts * $45mil Bank Breach Could Lan


The CyberJungle Episode300: * Kurt Opsahl, Attorney with EFF, BitCoin and CyberCriminals * Tales from The Dark Web: Bitcoin Mining Malware * GoogleGlass Security Train Wreck? * MSIE8 0days Could Hit XP Users Hard * Video Poker Cheater Fightin

2013-05-07 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode300: * Kurt Opsahl, Attorney with EFF, BitCoin and CyberCriminals * Tales from The Dark Web: Bitcoin Mining Malware * GoogleGlass Security Train Wreck? * MSIE8 0days Could Hit XP Users Hard * Video Poker Cheater Fightin


The CyberJungle Episode299: * Exclusive: Matt Landrock, CEO of Cryptomathic, on mobile app sec * Tales from The Dark Web: Another giant breach, another giant downplay * CISPA stalls, time for a new approach that protects privacy? * Will iPhone5S be a b

2013-04-29 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode299: * Exclusive: Matt Landrock, CEO of Cryptomathic, on mobile app sec * Tales from The Dark Web: Another giant breach, another giant downplay * CISPA stalls, time for a new approach that protects privacy? * Will iPhone5S be a b


The CyberJungle Episode295: * Exclusive: Founder of Stop the Hackers * Tales from The Dark Web: Cyberespionage hits in unexpected locals * Fall out from South Korea attack * Facebook goes big data with physical world data

2013-04-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode295: * Exclusive: Founder of Stop the Hackers * Tales from The Dark Web: Cyberespionage hits in unexpected locals * Fall out from South Korea attack * Facebook goes big data with physical world data


The CyberJungle Episode297: * SiteLock: Complete PCI compliance? * Tales from The Dark Web: Spamhaus and DNS attacks * Why is China reading your email, and should you care? * Apple and the security of your data * FAIL: Road sign breach response

2013-04-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode297: * SiteLock: Complete PCI compliance? * Tales from The Dark Web: Spamhaus and DNS attacks * Why is China reading your email, and should you care? * Apple and the security of your data * FAIL: Road sign breach response


The CyberJungle Episode296: * SiteLock: Complete PCI compliance? * Tales from The Dark Web: Spamhaus and DNS attacks * Why is China reading your email, and should you care? * Apple and the security of your data * FAIL: Road sign breach response

2013-04-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode296: * SiteLock: Complete PCI compliance? * Tales from The Dark Web: Spamhaus and DNS attacks * Why is China reading your email, and should you care? * Apple and the security of your data * FAIL: Road sign breach response


The CyberJungle Episode294: * Exclusive: James Elste on the Fed's privacy efforts in cyberspace * Tales from The Dark Web: Law to protect consumers leads to credit report breach * Chinese 3G4G USB modems open to attack * Google Glass protest mov

2013-03-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode294: * Exclusive: James Elste on the Fed's privacy efforts in cyberspace * Tales from The Dark Web: Law to protect consumers leads to credit report breach * Chinese 3G4G USB modems open to attack * Google Glass protest mov


The CyberJungle Episode293: * Exclusive: Dr. Larry Ponemonn and the Post Breach Boom * Tales from The Dark Web: Evernote 50million password breach * Dating web site data as evidence in litigation * Samsung adding eye tracking to smartphone?

2013-03-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode293: * Exclusive: Dr. Larry Ponemonn and the Post Breach Boom * Tales from The Dark Web: Evernote 50million password breach * Dating web site data as evidence in litigation * Samsung adding eye tracking to smartphone?


The CyberJungle Episode292: * Exclusive: Alex Doll, CEO of elliptical curve crypto 2FA provider OneID * Tales from The Dark Web: Is data security now impossible? * Pwnie Express open source pen test tablet * EdgeWave "social security" has solid

2013-02-25 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode292: * Exclusive: Alex Doll, CEO of elliptical curve crypto 2FA provider OneID * Tales from The Dark Web: Is data security now impossible? * Pwnie Express open source pen test tablet * EdgeWave "social security" has solid


The CyberJungle Episode291: * Exclusive content from Paralells Cloud Conference in Las Vegas; a break in our normal format * Brian Spector, CEO of Certivox, on a new development in 2FA * CloudLinux CEO Igor Seletskiy, gives a new take to server linux *

2013-02-11 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode291: * Exclusive content from Paralells Cloud Conference in Las Vegas; a break in our normal format * Brian Spector, CEO of Certivox, on a new development in 2FA * CloudLinux CEO Igor Seletskiy, gives a new take to server linux *


The CyberJungle Episode290: * Exclusive: IP Attorney Tony Berman on Antigua and business liability for copyrights * Tales from The DarkWeb: Twitter account take-over attacks * Barracuda hard codes backdoor access; Why doesn't the fix, fix it? * Pwn2Ow

2013-01-30 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode290: * Exclusive: IP Attorney Tony Berman on Antigua and business liability for copyrights * Tales from The DarkWeb: Twitter account take-over attacks * Barracuda hard codes backdoor access; Why doesn't the fix, fix it? * Pwn2Ow


The CyberJungle Episode289: * Exclusive: Nick Cavalancia of SpectorSoft on the software dev that outsourced his job and gave a Chinese firm VPN access back to his employer's network * Tales from The DarkWeb: New attack targets mobile phone 2-factor auth

2013-01-21 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode289: * Exclusive: Nick Cavalancia of SpectorSoft on the software dev that outsourced his job and gave a Chinese firm VPN access back to his employer's network * Tales from The DarkWeb: New attack targets mobile phone 2-factor auth


The CyberJungle Episode288: * Exclusive: Jeff Hudson on a new SSL cert compromise * Tales from The DarkWeb: 0day Cisco VoIP flaw could cause eavesdropping without making a call * CES2012: Will Ford open telematics platform to forensic apps, and new gear

2013-01-11 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode288: * Exclusive: Jeff Hudson on a new SSL cert compromise * Tales from The DarkWeb: 0day Cisco VoIP flaw could cause eavesdropping without making a call * CES2012: Will Ford open telematics platform to forensic apps, and new gear


The CyberJungle Episode287: * Exclusive: Marc Weber Tobias on insider fraud attacks * Tales from The DarkWeb: 0day web attack impacts Microsoft IE8,7, and some Outlook users * Snapchat discovers digital forensics? * New digital forensic tool targets fi

2012-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode287: * Exclusive: Marc Weber Tobias on insider fraud attacks * Tales from The DarkWeb: 0day web attack impacts Microsoft IE8,7, and some Outlook users * Snapchat discovers digital forensics? * New digital forensic tool targets fi


The CyberJungle Episode286: * Exclusive: Rob Krause from Solutionary, How Execs Use Threat Reports * Tales from The DarkWeb: Massive bank attacks, or LE trap? * Landmark socialmedia legal evidence ruling * Huge security flaw in Samsung smartphones?

2012-12-18 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode286: * Exclusive: Rob Krause from Solutionary, How Execs Use Threat Reports * Tales from The DarkWeb: Massive bank attacks, or LE trap? * Landmark socialmedia legal evidence ruling * Huge security flaw in Samsung smartphones?


The CyberJungle Episode285: * Exclusive: Fewer Controls, Greater Security? Gartner Expert Tom Scholtz * Calf cracks down on data sucking apps * Is it time for security counter attacks? * Is Anon attacker same man that had his talk yanked from DefCon i

2012-12-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode285: * Exclusive: Fewer Controls, Greater Security? Gartner Expert Tom Scholtz * Calf cracks down on data sucking apps * Is it time for security counter attacks? * Is Anon attacker same man that had his talk yanked from DefCon i


The CyberJungle Episode283: * Exclusive: Mark Tobias, lock security expert, on Onity Hotel lock litigation * Tales from The DarkWeb: One cause of the frequent webmail breaches * DNS Attacks at Pakistan’s PKNIC, GoDaddy, and Romania * BlackBerry on dec

2012-12-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode283: * Exclusive: Mark Tobias, lock security expert, on Onity Hotel lock litigation * Tales from The DarkWeb: One cause of the frequent webmail breaches * DNS Attacks at Pakistan’s PKNIC, GoDaddy, and Romania * BlackBerry on dec


The CyberJungle Episode281: * Exclusive Content from PFIC Forensic Conference * Greg Kipper, Security and Forensics Futurist * General Petraeus from a digital investigation perspective * Commission issus warning on China cyberattacksnice * Tales from

2012-11-21 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode281: * Exclusive Content from PFIC Forensic Conference * Greg Kipper, Security and Forensics Futurist * General Petraeus from a digital investigation perspective * Commission issus warning on China cyberattacksnice * Tales from


The CyberJungle Episode282: * Exclusive: Vehicle Forensics with Ben LeMere of Berla Corp * Tales from The DarkWeb: Cybercriminals target smartphone-based 2 factor bank account protection * Gaza Cyberwar? * Passwords no longer enough to protect d

2012-11-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode282: * Exclusive: Vehicle Forensics with Ben LeMere of Berla Corp * Tales from The DarkWeb: Cybercriminals target smartphone-based 2 factor bank account protection * Gaza Cyberwar? * Passwords no longer enough to protect d


The CyberJungle Episode280: * Exclusive Content from PFIC Forensic Conference * Hon. Matthew "The Twitter Judge" Sciarrino, on social media, security and forensics * James Wiebe, CEO of WiebeTech on SSD forensics * Did Unreported Breach Impact C

2012-11-07 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode280: * Exclusive Content from PFIC Forensic Conference * Hon. Matthew "The Twitter Judge" Sciarrino, on social media, security and forensics * James Wiebe, CEO of WiebeTech on SSD forensics * Did Unreported Breach Impact C


The CyberJungle Episode279: * A New Approach to Incident Response: Conrad Constantine of Alien Vault * Fighting Cyber Attacks: Do We Need a Strategic Shift? * Cyber War Rooms * Hiring InfoSec Pros: Do We Need To Throw Out The Rules? * South Caroli

2012-11-01 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode279: * A New Approach to Incident Response: Conrad Constantine of Alien Vault * Fighting Cyber Attacks: Do We Need a Strategic Shift? * Cyber War Rooms * Hiring InfoSec Pros: Do We Need To Throw Out The Rules? * South Caroli


The CyberJungle Episode278: * Data Exploitation, Intelligence Gathering and Forensics: Ryan Washington from ARForensics * Tales from The Dark Web: Nat'l Weather Service breach * MobileMalware targets bank logins * MobielMalware creator arrested,

2012-10-22 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode278: * Data Exploitation, Intelligence Gathering and Forensics: Ryan Washington from ARForensics * Tales from The Dark Web: Nat'l Weather Service breach * MobileMalware targets bank logins * MobielMalware creator arrested,


The CyberJungle Episode277: * Exclusive: Vladimir Katalov, ElcomSoft CEO on a crypto flaw that could help in forensics * Tales from The Dark Web: CyberCriminals strike utility customers using auto-pay * Zynga staffers use cloud to steal senstive

2012-10-16 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode277: * Exclusive: Vladimir Katalov, ElcomSoft CEO on a crypto flaw that could help in forensics * Tales from The Dark Web: CyberCriminals strike utility customers using auto-pay * Zynga staffers use cloud to steal senstive


The CyberJungle Episode276: * Security expert John Strand tosses conventional thinking on security * Tales from The Dark Web: Blitzkrieg-like bank takeover attacks coming? * Congress: Chinese telecom firm Huawei a national security threat * ‘F

2012-10-08 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode276: * Security expert John Strand tosses conventional thinking on security * Tales from The Dark Web: Blitzkrieg-like bank takeover attacks coming? * Congress: Chinese telecom firm Huawei a national security threat * ‘F


The CyberJungle Episode275: * Security expert Jack Daniel on Android patching failures * Tales from The Dark Web: Cheap gateway equipment failures * Report: 98% of Android devices running old version of software * Introducing SHA-3 * Appeals C

2012-10-03 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode275: * Security expert Jack Daniel on Android patching failures * Tales from The Dark Web: Cheap gateway equipment failures * Report: 98% of Android devices running old version of software * Introducing SHA-3 * Appeals C


The CyberJungle Episode274: * Benjamin Wright, Esq., on a new approach to forensics and cloud data * Tales from The Dark Web: Botnet hits USA users hard * Islamists target banks * MSIE emergency update * FTC says PCs pre-loaded with secret spy

2012-09-26 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode274: * Benjamin Wright, Esq., on a new approach to forensics and cloud data * Tales from The Dark Web: Botnet hits USA users hard * Islamists target banks * MSIE emergency update * FTC says PCs pre-loaded with secret spy


The CyberJungle Episode273: * Rafel Los, HP's Security Evangelist, on a landmark insider breach case * Tales from The Dark Web: Is your smartphone WiFi telling attacker's your "bees-wax"? * Huawei: Don't Worry, Be Happy * Judge: School bullied student

2012-09-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode273: * Rafel Los, HP's Security Evangelist, on a landmark insider breach case * Tales from The Dark Web: Is your smartphone WiFi telling attacker's your "bees-wax"? * Huawei: Don't Worry, Be Happy * Judge: School bullied student


The CyberJungle Episode272: * Microsoft Patch Tuesday radically different * Tales from The Dark Web: 0Day wave may have shocking source * Laptop fingerprint readers may open large security hole * What was source of widespread GoDaddy blackout?

2012-09-12 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode272: * Microsoft Patch Tuesday radically different * Tales from The Dark Web: 0Day wave may have shocking source * Laptop fingerprint readers may open large security hole * What was source of widespread GoDaddy blackout?


The CyberJungle Episode271: * Forensic and InfoSec Lessons from Apple v Samsung * Tales from The Dark Web: Twitter password stealing attack * Hotel door key card "patch" is easy to by-pass * Dropbox adds 2FA, but misses on encryption * Interes

2012-08-27 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode271: * Forensic and InfoSec Lessons from Apple v Samsung * Tales from The Dark Web: Twitter password stealing attack * Hotel door key card "patch" is easy to by-pass * Dropbox adds 2FA, but misses on encryption * Interes


The CyberJungle Episode270: * Exclusive: Ken Westin on mobile device forensics * Tales from The Dark Web: Size and scope of the China-based Dark Web * Lessons learned from epic hack * Lessons to be learned from trusting SMS? * 'Enemy of The State' direc

2012-08-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode270: * Exclusive: Ken Westin on mobile device forensics * Tales from The Dark Web: Size and scope of the China-based Dark Web * Lessons learned from epic hack * Lessons to be learned from trusting SMS? * 'Enemy of The State' direc


The CyberJungle Episode267: * Exclusive Content from DefCon and SecurityBSides: VPN/PPTP flaws, router flaws, and more * Samsung gets stung for evidence deletion * Is the NSA intercepting emails of US Citizens or not? * One smartphone is so hot, it burn

2012-08-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode267: * Exclusive Content from DefCon and SecurityBSides: VPN/PPTP flaws, router flaws, and more * Samsung gets stung for evidence deletion * Is the NSA intercepting emails of US Citizens or not? * One smartphone is so hot, it burn


The CyberJungle Episode266: * Exclusive: From SecurityBSidesLV, Josh Sokol on "Symbiotic Security" * Tales From The Dark Web: Gaming Site Breach Reveals Attacker Tactics * Warning to HR Departments Using SocialMedia * ASLR in Android to Help Thwart

2012-07-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode266: * Exclusive: From SecurityBSidesLV, Josh Sokol on "Symbiotic Security" * Tales From The Dark Web: Gaming Site Breach Reveals Attacker Tactics * Warning to HR Departments Using SocialMedia * ASLR in Android to Help Thwart


The CyberJungle Episode265: * Exclusive: Billy Rios on How Easy it is to Attack Building Control Systems * Tales From The Dark Web: Malware Turning Smartphones into a Botnet? * Anons hit energy providers

2012-07-23 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode265: * Exclusive: Billy Rios on How Easy it is to Attack Building Control Systems * Tales From The Dark Web: Malware Turning Smartphones into a Botnet? * Anons hit energy providers


The CyberJungle Episode264: * Is the Chinese Gov't Backdooring Networks Globally? * Important Patch Tuesday, but 0Days Remain * Android Apps w/Ads Taking Personal Data, Too? * Anon in Argentina? * Tales From The Dark Web: USB drives and Industrial C

2012-07-11 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode264: * Is the Chinese Gov't Backdooring Networks Globally? * Important Patch Tuesday, but 0Days Remain * Android Apps w/Ads Taking Personal Data, Too? * Anon in Argentina? * Tales From The Dark Web: USB drives and Industrial C


The CyberJungle Episode263: * Exclusive: A forensic investigator's look at iOS6, with Sean Morrissey of Katana Forensics * Anti-virus industry is failing? * Facial recognition and BigData * Linked get sued for security failure * Tales From The Dark

2012-06-21 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode263: * Exclusive: A forensic investigator's look at iOS6, with Sean Morrissey of Katana Forensics * Anti-virus industry is failing? * Facial recognition and BigData * Linked get sued for security failure * Tales From The Dark


The CyberJungle Episode262: * Exclusive: The State of Risk Based Security, with Dwayne Melancon, Tripwire CTO * Forensic take on Apple WWDC, and a look at iOS Forensic Tools from ElcomSoft, Katana Forensics, and AccessData * Blizzard Entertainment pus

2012-06-12 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode262: * Exclusive: The State of Risk Based Security, with Dwayne Melancon, Tripwire CTO * Forensic take on Apple WWDC, and a look at iOS Forensic Tools from ElcomSoft, Katana Forensics, and AccessData * Blizzard Entertainment pus


The CyberJungle Episode261: * Emergency update required on all Microsoft Windows systems * Twitter suffers two factor auth outage * Tales From The Dark Web: New bank trojan attacks some two factor auth uses * Ubuntu Mobile OS this fall?

2012-06-04 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode261: * Emergency update required on all Microsoft Windows systems * Twitter suffers two factor auth outage * Tales From The Dark Web: New bank trojan attacks some two factor auth uses * Ubuntu Mobile OS this fall?


The CyberJungle Episode260: * Exclusive: David Cowen, on Anti Anti Digital Forensics * Trojan by-passes SMS two factor authentication * Is iOS ripe for cyber attack? * CyberStalking with a twist * Tales From The Dark Web: Social Networked, Social Engine

2012-05-23 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode260: * Exclusive: David Cowen, on Anti Anti Digital Forensics * Trojan by-passes SMS two factor authentication * Is iOS ripe for cyber attack? * CyberStalking with a twist * Tales From The Dark Web: Social Networked, Social Engine


The CyberJungle Episode259: * Chester Wisniewski Apple Expert at Sophos Security * New ElcomSoft tool access iCloud user data * OS X patch for Leopard * Tales From The Dark Web: Is Wikipedia inserting malvertising? * How to amp up a smartphone

2012-05-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode259: * Chester Wisniewski Apple Expert at Sophos Security * New ElcomSoft tool access iCloud user data * OS X patch for Leopard * Tales From The Dark Web: Is Wikipedia inserting malvertising? * How to amp up a smartphone


The CyberJungle Episode257: * We are in the new studio, thanks for your support during the switchover * Exclusive: Judge Paul Chertoff on how forensicators can be better expert witnesses * Google Execs DID know that Street View was taking private inform

2012-04-30 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode257: * We are in the new studio, thanks for your support during the switchover * Exclusive: Judge Paul Chertoff on how forensicators can be better expert witnesses * Google Execs DID know that Street View was taking private inform


The CyberJungle Episode256: * Pardon the audio quality as we upgrade to a new studio * Exclusive: David Espinosa, on being a geek running for State office * Trojans target point of sale systems * Web-based encryption tool for cloud files * Is that an

2012-04-23 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode256: * Pardon the audio quality as we upgrade to a new studio * Exclusive: David Espinosa, on being a geek running for State office * Trojans target point of sale systems * Web-based encryption tool for cloud files * Is that an


The CyberJungle Episode255: * Pardon the audio quality as we upgrade to a new studio * Exclusive: James Bologna on security process * Email snooping by IT admins * Apple posts separate Flashback removal tool * Is Google invading privacy with ReCAPTHA

2012-04-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode255: * Pardon the audio quality as we upgrade to a new studio * Exclusive: James Bologna on security process * Email snooping by IT admins * Apple posts separate Flashback removal tool * Is Google invading privacy with ReCAPTHA


The CyberJungle Episode254: * Pardon the audio quality as we upgrade to a new studio * Exclusive: Never before released audio from Mikeyy the "Twitter Hacker" * IRS continues to fail GAO Information Security Audits * Should one e-File? What about doi

2012-04-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode254: * Pardon the audio quality as we upgrade to a new studio * Exclusive: Never before released audio from Mikeyy the "Twitter Hacker" * IRS continues to fail GAO Information Security Audits * Should one e-File? What about doi


The CyberJungle Episode253: * Exclusive: Kevin Kjosa, Assistant Director, The Center for Infrastructure Assurance at UT Austin * Extensive LE cell phone tracking uncovered * Cloud storage services with full access to user data? * Why employers migh

2012-04-04 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode253: * Exclusive: Kevin Kjosa, Assistant Director, The Center for Infrastructure Assurance at UT Austin * Extensive LE cell phone tracking uncovered * Cloud storage services with full access to user data? * Why employers migh


The CyberJungle Episode252: * Exclusive: Dr. Robert Thidadeau, Chief Scientist, Wave Systems * Social media passwords and job applicants * GSM mobile: The weak crypto edition * iPhone Apps: UUID is out, device fingerprinting in?

2012-03-25 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode252: * Exclusive: Dr. Robert Thidadeau, Chief Scientist, Wave Systems * Social media passwords and job applicants * GSM mobile: The weak crypto edition * iPhone Apps: UUID is out, device fingerprinting in?


The CyberJungle Episode251: * Dave Porcello, CEO of Pwnie Express, open source software meets social engineering hardware * 5th Amendment and password showdown averted (for now) * NFC and mobile payments * Tales from the Dark Web: Is ther

2012-03-04 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode251: * Dave Porcello, CEO of Pwnie Express, open source software meets social engineering hardware * 5th Amendment and password showdown averted (for now) * NFC and mobile payments * Tales from the Dark Web: Is ther


The CyberJungle Episode250: * Exclusive: Dr. Lowell Cavlett, futurist, economist, and Keynoter at HIMSS2012 * Is automaker Tesla tracking customer locations, without prior notice? * Finger vein and fingerprint hybrid biometrics * Tales

2012-02-28 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode250: * Exclusive: Dr. Lowell Cavlett, futurist, economist, and Keynoter at HIMSS2012 * Is automaker Tesla tracking customer locations, without prior notice? * Finger vein and fingerprint hybrid biometrics * Tales


The CyberJungle Episode249: * Interview: Denis Foo Kune, PhD student, on cell phone tracking without access to the tower, or the phone * Interview: David Ting of Imprivata, a new approach to multi-factor login/logout * Google makes another privacy "mist

2012-02-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode249: * Interview: Denis Foo Kune, PhD student, on cell phone tracking without access to the tower, or the phone * Interview: David Ting of Imprivata, a new approach to multi-factor login/logout * Google makes another privacy "mist


The CyberJungle Episode248: * Exclusive: Learn the techniques of Social Engineering hands-on, with Chris Hadnagy * Google Wallet attacks, is a PIN enough to protect mobile transactions? * Will mobile phone blacklisting stop physical device thefts?

2012-02-14 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode248: * Exclusive: Learn the techniques of Social Engineering hands-on, with Chris Hadnagy * Google Wallet attacks, is a PIN enough to protect mobile transactions? * Will mobile phone blacklisting stop physical device thefts?


The CyberJungle Episode247: * Exclusive: Passware CEO Dmitry Sumin on a forensic tool to break Mac encrypted security * Social Insecurity: Are walled gardens a threat to user security? * Updates: Mal-mail and Marriott Attacker * Tales From The Dark Web

2012-02-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode247: * Exclusive: Passware CEO Dmitry Sumin on a forensic tool to break Mac encrypted security * Social Insecurity: Are walled gardens a threat to user security? * Updates: Mal-mail and Marriott Attacker * Tales From The Dark Web


The CyberJungle Episode246: * Exclusive: Jordi Ros of Labdoo.org, spreading linux laptops world-wide * Drive-by mal-mail, no clicking to get infected * New technique for stealing smartphone crypto keys * Tales From The Dark Web: Hijackin

2012-01-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode246: * Exclusive: Jordi Ros of Labdoo.org, spreading linux laptops world-wide * Drive-by mal-mail, no clicking to get infected * New technique for stealing smartphone crypto keys * Tales From The Dark Web: Hijackin


The CyberJungle Episode245: * Exclusive: Subhash Tantry, CEO of FoxT on server access security in the wake of the Zappos Breach * InfoSec take on SOPA/PIPA * Colorado Judge orders fraud defendant to cough up crypto key * Tales From The Dark

2012-01-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode245: * Exclusive: Subhash Tantry, CEO of FoxT on server access security in the wake of the Zappos Breach * InfoSec take on SOPA/PIPA * Colorado Judge orders fraud defendant to cough up crypto key * Tales From The Dark


The CyberJungle Episode244: * Exclusive: Mister_E from the White Hat CyberMilitia * Zappos Breach: A teachable momen? * City College of San Fran Breach: Non-advanced Persistant Threat? * Tales From The Dark Web: QR attacks headed to a smart phone near yo

2012-01-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode244: * Exclusive: Mister_E from the White Hat CyberMilitia * Zappos Breach: A teachable momen? * City College of San Fran Breach: Non-advanced Persistant Threat? * Tales From The Dark Web: QR attacks headed to a smart phone near yo


The CyberJungle Episode243: * From CES: A forensic and data security look at GM's new CUE Telematics system * A new major flaw in consumer-grade WiFi routers * Stratfor breach might lead to leap-frog enterprise breaches * Did a California city order

2012-01-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode243: * From CES: A forensic and data security look at GM's new CUE Telematics system * A new major flaw in consumer-grade WiFi routers * Stratfor breach might lead to leap-frog enterprise breaches * Did a California city order


The CyberJungle Episode242: * EXCLUSIVE: Interview with Sean Morrisey, the creator of a new, free iOS forensics tool * New forensics approach uses file access statistics to determine if files were accessed during a breach * CarrierIQ reveals tha

2011-12-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode242: * EXCLUSIVE: Interview with Sean Morrisey, the creator of a new, free iOS forensics tool * New forensics approach uses file access statistics to determine if files were accessed during a breach * CarrierIQ reveals tha


The CyberJungle Episode241: * New tracking intensive adware zeros in on Facebook and Google users. We talk with attorney Terry Ross about the potential legal fall-out * Cybercriminals use a new tool to recruit malware writers * Huge batch of patches from

2011-12-13 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode241: * New tracking intensive adware zeros in on Facebook and Google users. We talk with attorney Terry Ross about the potential legal fall-out * Cybercriminals use a new tool to recruit malware writers * Huge batch of patches from


The CyberJungle Episode240: A blackeye for Download.com? Nmap developer Fyodor says site bundling malware with his security software. * He Said She Said Part II: SCADA security expert Joe Weiss and THE REAL story behind the alleged water authority breac

2011-12-05 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode240: A blackeye for Download.com? Nmap developer Fyodor says site bundling malware with his security software. * He Said She Said Part II: SCADA security expert Joe Weiss and THE REAL story behind the alleged water authority breac


The CyberJungle Episode239: * He Said She Said: The battle of the SCADA experts in water pump row * A new, low-cost way to find open wifi connections; And, how to keep your access point slightly more private * Tales From The Dark Web: Social Engineering

2011-11-28 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode239: * He Said She Said: The battle of the SCADA experts in water pump row * A new, low-cost way to find open wifi connections; And, how to keep your access point slightly more private * Tales From The Dark Web: Social Engineering


The CyberJungle Episode239: * He Said She Said: The battle of the SCADA experts in water pump row * A new, low-cost way to find open wifi connections; And, how to keep your access point slightly more private * Tales From The Dark Web: Social Engineering

2011-11-28 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode239: * He Said She Said: The battle of the SCADA experts in water pump row * A new, low-cost way to find open wifi connections; And, how to keep your access point slightly more private * Tales From The Dark Web: Social Engineering


The CyberJungle Episode238: * We break from our normal programming schedule. The CyberJungle went to the Paraben Forensics Innovator's Conference last week. We have special extended coverage with Ryan Washington of AR-Forensics, on so-called "anti-forensi

2011-11-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode238: * We break from our normal programming schedule. The CyberJungle went to the Paraben Forensics Innovator's Conference last week. We have special extended coverage with Ryan Washington of AR-Forensics, on so-called "anti-forensi


The CyberJungle Episode238: * We break from our normal programming schedule. The CyberJungle went to the Paraben Forensics Innovator's Conference last week. We have special extended coverage with Ryan Washington of AR-Forensics, on so-called "anti-forensi

2011-11-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode238: * We break from our normal programming schedule. The CyberJungle went to the Paraben Forensics Innovator's Conference last week. We have special extended coverage with Ryan Washington of AR-Forensics, on so-called "anti-forensi


The CyberJungle Episode237: * We break with our normal programming schedule. With the release of the DefCon Social Engineering Report, we have special extended coverage with Chris Hadnagy of Social-Engineer.com

2011-11-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode237: * We break with our normal programming schedule. With the release of the DefCon Social Engineering Report, we have special extended coverage with Chris Hadnagy of Social-Engineer.com


The CyberJungle Episode237: * We break with our normal programming schedule. With the release of the DefCon Social Engineering Report, we have special extended coverage with Chris Hadnagy of Social-Engineer.com

2011-11-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode237: * We break with our normal programming schedule. With the release of the DefCon Social Engineering Report, we have special extended coverage with Chris Hadnagy of Social-Engineer.com


The CyberJungle Episode236: * WORM: The First Digital World War; The CyberJungle talks with author Mark Bowden * German researchers find security holes in Amazon cloud * Could Ubuntu Linux on smartphones/tablets mean improved security and privacy? * Tales

2011-10-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode236: * WORM: The First Digital World War; The CyberJungle talks with author Mark Bowden * German researchers find security holes in Amazon cloud * Could Ubuntu Linux on smartphones/tablets mean improved security and privacy? * Tales


The CyberJungle Episode236: * WORM: The First Digital World War; The CyberJungle talks with author Mark Bowden * German researchers find security holes in Amazon cloud * Could Ubuntu Linux on smartphones/tablets mean improved security and privacy? * Tales

2011-10-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode236: * WORM: The First Digital World War; The CyberJungle talks with author Mark Bowden * German researchers find security holes in Amazon cloud * Could Ubuntu Linux on smartphones/tablets mean improved security and privacy? * Tales


The CyberJungle Episode235: * EXCLUSIVE: Does 'Son of Stuxnet' hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take * Another online video breach victim: Microsoft * iPad security flaw uncovered * Tales From The Dark Web: NASDAQ

2011-10-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode235: * EXCLUSIVE: Does 'Son of Stuxnet' hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take * Another online video breach victim: Microsoft * iPad security flaw uncovered * Tales From The Dark Web: NASDAQ


The CyberJungle Episode235: * EXCLUSIVE: Does 'Son of Stuxnet' hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take * Another online video breach victim: Microsoft * iPad security flaw uncovered * Tales From The Dark Web: NASDAQ

2011-10-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode235: * EXCLUSIVE: Does 'Son of Stuxnet' hold a clue to another SSL CA breach? Jeff Hudson of Venafi give us his take * Another online video breach victim: Microsoft * iPad security flaw uncovered * Tales From The Dark Web: NASDAQ


The CyberJungle Episode234: * "Hacker Grooming?" New Imperva study indicates the seeds of tomorrow's * SAFE program takes on BlackBerry in the security market * Confirmed: The German government IS installing poorly secured, backdoor monitoring softw

2011-10-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode234: * "Hacker Grooming?" New Imperva study indicates the seeds of tomorrow's * SAFE program takes on BlackBerry in the security market * Confirmed: The German government IS installing poorly secured, backdoor monitoring softw


The CyberJungle Episode234: * "Hacker Grooming?" New Imperva study indicates the seeds of tomorrow's * SAFE program takes on BlackBerry in the security market * Confirmed: The German government IS installing poorly secured, backdoor monitoring softw

2011-10-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode234: * "Hacker Grooming?" New Imperva study indicates the seeds of tomorrow's * SAFE program takes on BlackBerry in the security market * Confirmed: The German government IS installing poorly secured, backdoor monitoring softw


The CyberJungle Episode233: * Is the Air Force's UAV system infected with malware, or is it DoD monitoring software? * Is the German government installing poorly secured, backdoor monitoring software on LE targets? * DNA crime labs and investigation

2011-10-09 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode233: * Is the Air Force's UAV system infected with malware, or is it DoD monitoring software? * Is the German government installing poorly secured, backdoor monitoring software on LE targets? * DNA crime labs and investigation


The CyberJungle Episode233: * Is the Air Force's UAV system infected with malware, or is it DoD monitoring software? * Is the German government installing poorly secured, backdoor monitoring software on LE targets? * DNA crime labs and investigation

2011-10-09 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode233: * Is the Air Force's UAV system infected with malware, or is it DoD monitoring software? * Is the German government installing poorly secured, backdoor monitoring software on LE targets? * DNA crime labs and investigation


The CyberJungle Episode231: *What is GoogleProofing and what does it have to do with the law? We talk with Gabriel Weinberg CEO of DuckDuckGo.com * What are the legal and discovery impacts of BYOD? * Critical hazard discovered in Ubuntu Linux upda

2011-10-03 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode231: *What is GoogleProofing and what does it have to do with the law? We talk with Gabriel Weinberg CEO of DuckDuckGo.com * What are the legal and discovery impacts of BYOD? * Critical hazard discovered in Ubuntu Linux upda


The CyberJungle Episode231: *What is GoogleProofing and what does it have to do with the law? We talk with Gabriel Weinberg CEO of DuckDuckGo.com * What are the legal and discovery impacts of BYOD? * Critical hazard discovered in Ubuntu Linux upda

2011-10-03 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode231: *What is GoogleProofing and what does it have to do with the law? We talk with Gabriel Weinberg CEO of DuckDuckGo.com * What are the legal and discovery impacts of BYOD? * Critical hazard discovered in Ubuntu Linux upda


The CyberJungle Episode232: * Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses * Huge HTC Android security flaw * Is Amazon Kindle Fire designed to watch EVERY web interaction? * Tales From The Dark Web: QR codes now w

2011-10-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode232: * Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses * Huge HTC Android security flaw * Is Amazon Kindle Fire designed to watch EVERY web interaction? * Tales From The Dark Web: QR codes now w


The CyberJungle Episode232: * Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses * Huge HTC Android security flaw * Is Amazon Kindle Fire designed to watch EVERY web interaction? * Tales From The Dark Web: QR codes now w

2011-10-02 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode232: * Attorney Aaron Crews: Bring Your Own Device could be a legal land mine for businesses * Huge HTC Android security flaw * Is Amazon Kindle Fire designed to watch EVERY web interaction? * Tales From The Dark Web: QR codes now w


The CyberJungle Episode230:* In-depth conversation with Dr. Cliff Stoll. Back in the 80s, a US Government research lab came under a cyber attack. There was not a rule book for the response. Dr. Cliff Stoll was assigned the task, and had to create a respon

2011-09-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode230:* In-depth conversation with Dr. Cliff Stoll. Back in the 80s, a US Government research lab came under a cyber attack. There was not a rule book for the response. Dr. Cliff Stoll was assigned the task, and had to create a respon


The CyberJungle Episode230:* In-depth conversation with Dr. Cliff Stoll. Back in the 80s, a US Government research lab came under a cyber attack. There was not a rule book for the response. Dr. Cliff Stoll was assigned the task, and had to create a respon

2011-09-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode230:* In-depth conversation with Dr. Cliff Stoll. Back in the 80s, a US Government research lab came under a cyber attack. There was not a rule book for the response. Dr. Cliff Stoll was assigned the task, and had to create a respon


The CyberJungle Episode229:* Two interviews: Attorney Nicholas Tepper about how a Toyota social marketing campaign went very VERY wrong. And, Scott Moulton, digital forensics expert, tells us about the unique challenges of conducting digital forensics on

2011-09-11 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode229:* Two interviews: Attorney Nicholas Tepper about how a Toyota social marketing campaign went very VERY wrong. And, Scott Moulton, digital forensics expert, tells us about the unique challenges of conducting digital forensics on


The CyberJungle Episode229:* Two interviews: Attorney Nicholas Tepper about how a Toyota social marketing campaign went very VERY wrong. And, Scott Moulton, digital forensics expert, tells us about the unique challenges of conducting digital forensics on

2011-09-11 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode229:* Two interviews: Attorney Nicholas Tepper about how a Toyota social marketing campaign went very VERY wrong. And, Scott Moulton, digital forensics expert, tells us about the unique challenges of conducting digital forensics on


The CyberJungle Episode228: * DigiNotar SSL breach: Jeff Hudson, CEO of Venefi on how businesses planners should respond * What to patch, how to mitigate, what about XP, Apple; the DigiNotar breach * Report: 99% of enterprises have malware infections that

2011-09-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode228: * DigiNotar SSL breach: Jeff Hudson, CEO of Venefi on how businesses planners should respond * What to patch, how to mitigate, what about XP, Apple; the DigiNotar breach * Report: 99% of enterprises have malware infections that


The CyberJungle Episode228: * DigiNotar SSL breach: Jeff Hudson, CEO of Venefi on how businesses planners should respond * What to patch, how to mitigate, what about XP, Apple; the DigiNotar breach * Report: 99% of enterprises have malware infections that

2011-09-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode228: * DigiNotar SSL breach: Jeff Hudson, CEO of Venefi on how businesses planners should respond * What to patch, how to mitigate, what about XP, Apple; the DigiNotar breach * Report: 99% of enterprises have malware infections that


The CyberJungle Episode227: * Attorney Benjamin Wright needs your help with a new study; He tells us about it in our interview segment * Taking down business competitors via cyber attack? * Understanding the simplicity of the RSASecureID attack * Tales fr

2011-08-27 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode227: * Attorney Benjamin Wright needs your help with a new study; He tells us about it in our interview segment * Taking down business competitors via cyber attack? * Understanding the simplicity of the RSASecureID attack * Tales fr


The CyberJungle Episode227: * Attorney Benjamin Wright needs your help with a new study; He tells us about it in our interview segment * Taking down business competitors via cyber attack? * Understanding the simplicity of the RSASecureID attack * Tales fr

2011-08-27 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode227: * Attorney Benjamin Wright needs your help with a new study; He tells us about it in our interview segment * Taking down business competitors via cyber attack? * Understanding the simplicity of the RSASecureID attack * Tales fr


The CyberJungle Episode226: * Hotel VoIP system open to serious attack? Interview with Jason Ostrom of ViperLab.net * Smartphone monitoring or malware: it's all in the intent * Can schools control private teacher/student digital conversations? * Micros

2011-08-21 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode226: * Hotel VoIP system open to serious attack? Interview with Jason Ostrom of ViperLab.net * Smartphone monitoring or malware: it's all in the intent * Can schools control private teacher/student digital conversations? * Micros


The CyberJungle Episode226: * Hotel VoIP system open to serious attack? Interview with Jason Ostrom of ViperLab.net * Smartphone monitoring or malware: it's all in the intent * Can schools control private teacher/student digital conversations? * Micros

2011-08-21 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode226: * Hotel VoIP system open to serious attack? Interview with Jason Ostrom of ViperLab.net * Smartphone monitoring or malware: it's all in the intent * Can schools control private teacher/student digital conversations? * Micros


The CyberJungle Episode225: * Cracking iPhone/iPad encryption; Interview with Andrey Belenko of ElcomSoft * Anonymous breaches another high profile site, posts thousands of user email addresses and passwords * Open source unmanned aerial vehicles at Def

2011-08-14 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode225: * Cracking iPhone/iPad encryption; Interview with Andrey Belenko of ElcomSoft * Anonymous breaches another high profile site, posts thousands of user email addresses and passwords * Open source unmanned aerial vehicles at Def


The CyberJungle Episode225: * Cracking iPhone/iPad encryption; Interview with Andrey Belenko of ElcomSoft * Anonymous breaches another high profile site, posts thousands of user email addresses and passwords * Open source unmanned aerial vehicles at Def

2011-08-14 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode225: * Cracking iPhone/iPad encryption; Interview with Andrey Belenko of ElcomSoft * Anonymous breaches another high profile site, posts thousands of user email addresses and passwords * Open source unmanned aerial vehicles at Def


The CyberJungle Episode224: * Interview: Brian Kennish of Disconnect.me, on tracking the web trackers * Interview: Tyler Shields of Vericode: Owning your mobile phone at every layer * DNA ruling could add thousand of innocent arrestees to national crime d

2011-08-01 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode224: * Interview: Brian Kennish of Disconnect.me, on tracking the web trackers * Interview: Tyler Shields of Vericode: Owning your mobile phone at every layer * DNA ruling could add thousand of innocent arrestees to national crime d


The CyberJungle Episode224: * Interview: Brian Kennish of Disconnect.me, on tracking the web trackers * Interview: Tyler Shields of Vericode: Owning your mobile phone at every layer * DNA ruling could add thousand of innocent arrestees to national crime d

2011-08-01 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode224: * Interview: Brian Kennish of Disconnect.me, on tracking the web trackers * Interview: Tyler Shields of Vericode: Owning your mobile phone at every layer * DNA ruling could add thousand of innocent arrestees to national crime d


The CyberJungle Episode223: * Interview: Imperva CTO, Amichai Shulman on the web app attack preso you won't see at BlackHat Las Vegas * Businesses offering WiFi, with an extra helping of liability * Mac battery cyberflaw exposes explosive risk? * iPad

2011-07-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode223: * Interview: Imperva CTO, Amichai Shulman on the web app attack preso you won't see at BlackHat Las Vegas * Businesses offering WiFi, with an extra helping of liability * Mac battery cyberflaw exposes explosive risk? * iPad


The CyberJungle Episode223: * Interview: Imperva CTO, Amichai Shulman on the web app attack preso you won't see at BlackHat Las Vegas * Businesses offering WiFi, with an extra helping of liability * Mac battery cyberflaw exposes explosive risk? * iPad

2011-07-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode223: * Interview: Imperva CTO, Amichai Shulman on the web app attack preso you won't see at BlackHat Las Vegas * Businesses offering WiFi, with an extra helping of liability * Mac battery cyberflaw exposes explosive risk? * iPad


The CyberJungle Episode222: * Interview: What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric. * Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? * Smashing hard drive leads

2011-07-18 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode222: * Interview: What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric. * Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? * Smashing hard drive leads


The CyberJungle Episode222: * Interview: What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric. * Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? * Smashing hard drive leads

2011-07-18 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode222: * Interview: What role does social engineering play in APT? We talk with Gretchen Hellman of Vormetric. * Microsoft Internet Explorer 8, 9, beats Firefox, Chrome and Safari in crucial web protection? * Smashing hard drive leads


The CyberJungle Episode221: * Interview: T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use Counter Intelligence techniques. * How safe is your laptop lock? * Could turning over your encryption key be a violation

2011-07-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode221: * Interview: T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use Counter Intelligence techniques. * How safe is your laptop lock? * Could turning over your encryption key be a violation


The CyberJungle Episode221: * Interview: T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use Counter Intelligence techniques. * How safe is your laptop lock? * Could turning over your encryption key be a violation

2011-07-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode221: * Interview: T-Mobile USA’s CISO, Bill Boni, has a different approach to fighting cybercriminals: Use Counter Intelligence techniques. * How safe is your laptop lock? * Could turning over your encryption key be a violation


The CyberJungle, Episode 220: * Interview: Yaron Dycian, Trusteer VP: Will Fed's new regs block banking trojans? * Bill could block some mobile device forensic captures * FoxNews' Twitter account hijacked, what are the lessons learned? * Viscous botne

2011-07-05 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 220: * Interview: Yaron Dycian, Trusteer VP: Will Fed's new regs block banking trojans? * Bill could block some mobile device forensic captures * FoxNews' Twitter account hijacked, what are the lessons learned? * Viscous botne


The CyberJungle, Episode 220: * Interview: Yaron Dycian, Trusteer VP: Will Fed's new regs block banking trojans? * Bill could block some mobile device forensic captures * FoxNews' Twitter account hijacked, what are the lessons learned? * Viscous botne

2011-07-05 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 220: * Interview: Yaron Dycian, Trusteer VP: Will Fed's new regs block banking trojans? * Bill could block some mobile device forensic captures * FoxNews' Twitter account hijacked, what are the lessons learned? * Viscous botne


The CyberJungle, Episode 235: * Interview: John Bace, Gartner, Congress just put a bounty on your boss; how one whistleblower earned $90million * Interview: Debra Logan, Gartner, on why a judge slapped a million dollar eDiscovery-related fine on a care

2011-06-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 235: * Interview: John Bace, Gartner, Congress just put a bounty on your boss; how one whistleblower earned $90million * Interview: Debra Logan, Gartner, on why a judge slapped a million dollar eDiscovery-related fine on a care


The CyberJungle, Episode 235: * Interview: John Bace, Gartner, Congress just put a bounty on your boss; how one whistleblower earned $90million * Interview: Debra Logan, Gartner, on why a judge slapped a million dollar eDiscovery-related fine on a care

2011-06-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 235: * Interview: John Bace, Gartner, Congress just put a bounty on your boss; how one whistleblower earned $90million * Interview: Debra Logan, Gartner, on why a judge slapped a million dollar eDiscovery-related fine on a care


The CyberJungle, Episode 218: *Interview: InfoSec researcher Casey Halverson discovers an unusual tracking "feature" in his Nissan Leaf *Interview: Marc Maiffret, CTO of eEye Digital on how the simple cyberattacks distract us from the more serious ones

2011-06-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 218: *Interview: InfoSec researcher Casey Halverson discovers an unusual tracking "feature" in his Nissan Leaf *Interview: Marc Maiffret, CTO of eEye Digital on how the simple cyberattacks distract us from the more serious ones


The CyberJungle, Episode 218: *Interview: InfoSec researcher Casey Halverson discovers an unusual tracking "feature" in his Nissan Leaf *Interview: Marc Maiffret, CTO of eEye Digital on how the simple cyberattacks distract us from the more serious ones

2011-06-19 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 218: *Interview: InfoSec researcher Casey Halverson discovers an unusual tracking "feature" in his Nissan Leaf *Interview: Marc Maiffret, CTO of eEye Digital on how the simple cyberattacks distract us from the more serious ones


The CyberJungle, Episode 217: * Interview: Mathew Prince, CEO of web security firm CloudFlare * US freezes bank accounts of large-scale scareware gang * Do work emails enjoy spousal privilege? * Tales from the Dark Web: Spanish Police arrest three in A

2011-06-13 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 217: * Interview: Mathew Prince, CEO of web security firm CloudFlare * US freezes bank accounts of large-scale scareware gang * Do work emails enjoy spousal privilege? * Tales from the Dark Web: Spanish Police arrest three in A


The CyberJungle, Episode 217: * Interview: Mathew Prince, CEO of web security firm CloudFlare * US freezes bank accounts of large-scale scareware gang * Do work emails enjoy spousal privilege? * Tales from the Dark Web: Spanish Police arrest three in A

2011-06-13 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 217: * Interview: Mathew Prince, CEO of web security firm CloudFlare * US freezes bank accounts of large-scale scareware gang * Do work emails enjoy spousal privilege? * Tales from the Dark Web: Spanish Police arrest three in A


The CyberJungle, Episode 216: * Interview: Stina Ehrensvard, CEO and Founder of Yubico on RSASecureID-related breaches * Interview: Jeff Hudson CEO of Venafia, on RSASecureID-related breaches * The wave of server breaches spread * Tales from the Dark Web:

2011-06-06 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 216: * Interview: Stina Ehrensvard, CEO and Founder of Yubico on RSASecureID-related breaches * Interview: Jeff Hudson CEO of Venafia, on RSASecureID-related breaches * The wave of server breaches spread * Tales from the Dark Web:


The CyberJungle, Episode 215: * Interview: Checklist compliance vs. security, with Lila Kee of GlobalSign * Why are users not using the built-in do-not-track browser features? * Could just about anyone be a "hacker" with 15 minutes of instruction? *

2011-05-30 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 215: * Interview: Checklist compliance vs. security, with Lila Kee of GlobalSign * Why are users not using the built-in do-not-track browser features? * Could just about anyone be a "hacker" with 15 minutes of instruction? *


The CyberJungle, Episode 214: * Interview: Seven questions to ask before signing a CloudComputing contract, with Chuck Kellner of D4 * Interview: Forensic Pro's take on the Android Token Flaw, with Lee Reiber of AccessData * Many small firms learn the har

2011-05-23 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 214: * Interview: Seven questions to ask before signing a CloudComputing contract, with Chuck Kellner of D4 * Interview: Forensic Pro's take on the Android Token Flaw, with Lee Reiber of AccessData * Many small firms learn the har


The CyberJungle, Episode 213: * Two interviews: Scott Cleland, author of "Search and Destroy, Why You Can't Trust Google Inc." And, Alyn Hocky with security firm Clearswift, on businesses responding to the Sony Playstation breach * Study: PCI compliance

2011-05-15 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 213: * Two interviews: Scott Cleland, author of "Search and Destroy, Why You Can't Trust Google Inc." And, Alyn Hocky with security firm Clearswift, on businesses responding to the Sony Playstation breach * Study: PCI compliance


The CyberJungle, Episode 212: * Interview: What went wrong at Sony? Well, it was more than a technical failure. Maybe management shrugged their shoulders at information security. We'll talk with Marc Maiffret, the co-founder of E-eye Digital Security *

2011-05-08 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 212: * Interview: What went wrong at Sony? Well, it was more than a technical failure. Maybe management shrugged their shoulders at information security. We'll talk with Marc Maiffret, the co-founder of E-eye Digital Security *


The CyberJungle, Episode 212: * Interview: What went wrong at Sony? Well, it was more than a technical failure. Maybe management shrugged their shoulders at information security. We'll talk with Marc Maiffret, the co-founder of E-eye Digital Security *

2011-05-08 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 212: * Interview: What went wrong at Sony? Well, it was more than a technical failure. Maybe management shrugged their shoulders at information security. We'll talk with Marc Maiffret, the co-founder of E-eye Digital Security *


The CyberJungle, Episode 211: * Interview: Vladimir Katalov, CEO of Elcomsoft, on the ability to forge metadata on certain digital cameras * Sony PSN breach, the lawsuits begin, and strategies for ID protection on any site * Most breach victims nev

2011-05-01 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 211: * Interview: Vladimir Katalov, CEO of Elcomsoft, on the ability to forge metadata on certain digital cameras * Sony PSN breach, the lawsuits begin, and strategies for ID protection on any site * Most breach victims nev


The CyberJungle, Episode 211: * Interview: Vladimir Katalov, CEO of Elcomsoft, on the ability to forge metadata on certain digital cameras * Sony PSN breach, the lawsuits begin, and strategies for ID protection on any site * Most breach victims nev

2011-05-01 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 211: * Interview: Vladimir Katalov, CEO of Elcomsoft, on the ability to forge metadata on certain digital cameras * Sony PSN breach, the lawsuits begin, and strategies for ID protection on any site * Most breach victims nev


The CyberJungle, Episode 210: * Interview: Alex Levinson, iPhone forensics expert on iOS TrackerGate * Interview: Mark Fancher of the Michigan ACLU on Michigan TrackerGate * Free Open Source Project (FOSS) to provide security and privacy apps for Android

2011-04-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 210: * Interview: Alex Levinson, iPhone forensics expert on iOS TrackerGate * Interview: Mark Fancher of the Michigan ACLU on Michigan TrackerGate * Free Open Source Project (FOSS) to provide security and privacy apps for Android


The CyberJungle, Episode 210: * Interview: Alex Levinson, iPhone forensics expert on iOS TrackerGate * Interview: Mark Fancher of the Michigan ACLU on Michigan TrackerGate * Free Open Source Project (FOSS) to provide security and privacy apps for Android

2011-04-24 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 210: * Interview: Alex Levinson, iPhone forensics expert on iOS TrackerGate * Interview: Mark Fancher of the Michigan ACLU on Michigan TrackerGate * Free Open Source Project (FOSS) to provide security and privacy apps for Android


The CyberJungle, Episode 209: * Interview: Mickey Boodaei, CEO of Trusteer: Why increased staff training is not enough to thwart business espionage attacks. * New Facebook trial: Forensic/ediscovery case of the year or maybe of the decade * Court rules

2011-04-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 209: * Interview: Mickey Boodaei, CEO of Trusteer: Why increased staff training is not enough to thwart business espionage attacks. * New Facebook trial: Forensic/ediscovery case of the year or maybe of the decade * Court rules


The CyberJungle, Episode 209: * Interview: Mickey Boodaei, CEO of Trusteer: Why increased staff training is not enough to thwart business espionage attacks. * New Facebook trial: Forensic/ediscovery case of the year or maybe of the decade * Court rules

2011-04-17 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 209: * Interview: Mickey Boodaei, CEO of Trusteer: Why increased staff training is not enough to thwart business espionage attacks. * New Facebook trial: Forensic/ediscovery case of the year or maybe of the decade * Court rules


The CyberJungle, Episode 208: * Interview: Brian Fox, the creator of BASH (BASH makes a lot of Linux tasks easier), is working on a brand-new project to simplify browser security. * Study: Energy and Utility Companies are NOT taking data security seri

2011-04-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 208: * Interview: Brian Fox, the creator of BASH (BASH makes a lot of Linux tasks easier), is working on a brand-new project to simplify browser security. * Study: Energy and Utility Companies are NOT taking data security seri


The CyberJungle, Episode 208: * Interview: Brian Fox, the creator of BASH (BASH makes a lot of Linux tasks easier), is working on a brand-new project to simplify browser security. * Study: Energy and Utility Companies are NOT taking data security seri

2011-04-10 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 208: * Interview: Brian Fox, the creator of BASH (BASH makes a lot of Linux tasks easier), is working on a brand-new project to simplify browser security. * Study: Energy and Utility Companies are NOT taking data security seri


The CyberJungle, Episode 223: *Interview: Rob Lee, of SANS: Defining the Advanced Persistent Threat(APT) *Our take on the Epsilon breach *News on the causes of the RSA breach *Pornwikileaks and the outing of actor HIV status *Tales from the Dark

2011-04-04 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 223: *Interview: Rob Lee, of SANS: Defining the Advanced Persistent Threat(APT) *Our take on the Epsilon breach *News on the causes of the RSA breach *Pornwikileaks and the outing of actor HIV status *Tales from the Dark


The CyberJungle, Episode 206: *Interview: Joe Scott, CEO PhantomAlert, on the "DUI App" being removed from the BlackberryAppStore *Big brother crawls up your nose *The SSL cert fiasco, and what you need to do *BlackBerry PlayBook app issues? *Tales from t

2011-03-27 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 206: *Interview: Joe Scott, CEO PhantomAlert, on the "DUI App" being removed from the BlackberryAppStore *Big brother crawls up your nose *The SSL cert fiasco, and what you need to do *BlackBerry PlayBook app issues? *Tales from t


The CyberJungle, Episode 205: *Interview: Peter Schlampp, Solara Networks on the RSA SecureID breach and network forensics *Web browser anti-tracking *RSA SecureID breach *Does transparency webapp threaten citizen data when authenticating users?

2011-03-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 205: *Interview: Peter Schlampp, Solara Networks on the RSA SecureID breach and network forensics *Web browser anti-tracking *RSA SecureID breach *Does transparency webapp threaten citizen data when authenticating users?


The CyberJungle, Episode 205: *Interview: Peter Schlampp, Solara Networks on the RSA SecureID breach and network forensics *Web browser anti-tracking *RSA SecureID breach *Does transparency webapp threaten citizen data when authenticating users?

2011-03-20 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 205: *Interview: Peter Schlampp, Solara Networks on the RSA SecureID breach and network forensics *Web browser anti-tracking *RSA SecureID breach *Does transparency webapp threaten citizen data when authenticating users?


The CyberJungle, Episode 204: *Interviews: Trevor Dietrich, on virtulization app to secure iPads + more. He's seeking beta testers. *Lawsuit: School official uses student PII data in lesson plan *Industrial Espionage at Renault, or poor forensics, or bo

2011-03-13 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 204: *Interviews: Trevor Dietrich, on virtulization app to secure iPads + more. He's seeking beta testers. *Lawsuit: School official uses student PII data in lesson plan *Industrial Espionage at Renault, or poor forensics, or bo


The CyberJungle, Episode 204: *Interviews: Trevor Dietrich, on virtulization app to secure iPads + more. He's seeking beta testers. *Lawsuit: School official uses student PII data in lesson plan *Industrial Espionage at Renault, or poor forensics, or bo

2011-03-13 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 204: *Interviews: Trevor Dietrich, on virtulization app to secure iPads + more. He's seeking beta testers. *Lawsuit: School official uses student PII data in lesson plan *Industrial Espionage at Renault, or poor forensics, or bo


The CyberJungle, Episode 203: *Interviews: Charlie Miller, 3x Pwn2Own "hacking" contest winner stays home; response by Dragos, Founder *Lawsuit: Amazon taking liberties (and more?) with user-set privacy *Google Android in app malware flap, iPad2 securi

2011-03-07 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 203: *Interviews: Charlie Miller, 3x Pwn2Own "hacking" contest winner stays home; response by Dragos, Founder *Lawsuit: Amazon taking liberties (and more?) with user-set privacy *Google Android in app malware flap, iPad2 securi


The CyberJungle, Episode 203: *Interviews: Charlie Miller, 3x Pwn2Own "hacking" contest winner stays home; response by Dragos, Founder *Lawsuit: Amazon taking liberties (and more?) with user-set privacy *Google Android in app malware flap, iPad2 securi

2011-03-07 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 203: *Interviews: Charlie Miller, 3x Pwn2Own "hacking" contest winner stays home; response by Dragos, Founder *Lawsuit: Amazon taking liberties (and more?) with user-set privacy *Google Android in app malware flap, iPad2 securi


The CyberJungle, Episode 186: Business has proprietary info potentially worth millions, stolen by an employee. Employee is caught, and during the court trial, the very proprietary info stolen could be revealed again in a public court trial. Voters across

2010-11-07 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 186: Business has proprietary info potentially worth millions, stolen by an employee. Employee is caught, and during the court trial, the very proprietary info stolen could be revealed again in a public court trial. Voters across


The CyberJungle, Episode 185: Electronic voting machine fraud: Voters report "phantom votes," officials say it's impossible for votes to be pre-selected. Who's right? And, what role should logging and forensics play in electronic voting? We break with our

2010-10-30 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 185: Electronic voting machine fraud: Voters report "phantom votes," officials say it's impossible for votes to be pre-selected. Who's right? And, what role should logging and forensics play in electronic voting? We break with our


The CyberJungle, Episode 183: The Wikileaks story you won't hear from the legacy press. School buses equipped with traffic cams? If you're tracking your diet online, or on a smartphone, could your personal habits end up in court, and become part of the pu

2010-10-23 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 183: The Wikileaks story you won't hear from the legacy press. School buses equipped with traffic cams? If you're tracking your diet online, or on a smartphone, could your personal habits end up in court, and become part of the pu


The CyberJungle, Episode 183: The Wikileaks story you won't hear from the legacy press. School buses equipped with traffic cams? If you're tracking your diet online, or on a smartphone, could your personal habits end up in court, and become part of the pu

2010-10-23 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 183: The Wikileaks story you won't hear from the legacy press. School buses equipped with traffic cams? If you're tracking your diet online, or on a smartphone, could your personal habits end up in court, and become part of the pu


The CyberJungle, Episode 181: School district settles laptop tracking suit; but what did the IT department know, and when did they know it? Our take on Pres Obama's take on cyberbullying. First there was software-as-a-service, now we’re seeing “crimew

2010-10-16 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 181: School district settles laptop tracking suit; but what did the IT department know, and when did they know it? Our take on Pres Obama's take on cyberbullying. First there was software-as-a-service, now we’re seeing “crimew


The CyberJungle, Episode 179: To all the dead people who vote: you're in! New internet voting system fails, fails, and fails some more. Smartphone Forensics: Cracking BlackBerries might be easier than it should be if the user backs up data using one very

2010-10-09 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 179: To all the dead people who vote: you're in! New internet voting system fails, fails, and fails some more. Smartphone Forensics: Cracking BlackBerries might be easier than it should be if the user backs up data using one very


The CyberJungle, Episode 179: To all the dead people who vote: you're in! New internet voting system fails, fails, and fails some more. Smartphone Forensics: Cracking BlackBerries might be easier than it should be if the user backs up data using one very

2010-10-09 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 179: To all the dead people who vote: you're in! New internet voting system fails, fails, and fails some more. Smartphone Forensics: Cracking BlackBerries might be easier than it should be if the user backs up data using one very


The CyberJungle, Episode 177: Impact of adding "back doors" to US encryption. Zues bank account takeover arrests - Will the bank crimewave stop? Should cloud providers offer bug bounties for web app flaws? We get input from two experts. News on the Stuxne

2010-10-02 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 177: Impact of adding "back doors" to US encryption. Zues bank account takeover arrests - Will the bank crimewave stop? Should cloud providers offer bug bounties for web app flaws? We get input from two experts. News on the Stuxne


The CyberJungle, Episode 175: Judge forbids wife to post ANYTHING about husband and his lawyer. Schools and RFID kid-tracking. Ira's take on the major Twitter worm that ensared the White House. Interview: Lance Spitzner from the SANS Institute “Securing

2010-09-25 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 175: Judge forbids wife to post ANYTHING about husband and his lawyer. Schools and RFID kid-tracking. Ira's take on the major Twitter worm that ensared the White House. Interview: Lance Spitzner from the SANS Institute “Securing


The CyberJungle, Episode 173: Is texting the next wave in campaign fund raising AND fraud? Google engineer repeatedly spied on communications. What are the implications for the Google's business customers? Diaspora: A new approach to social networking. Bu

2010-09-18 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 173: Is texting the next wave in campaign fund raising AND fraud? Google engineer repeatedly spied on communications. What are the implications for the Google's business customers? Diaspora: A new approach to social networking. Bu


The CyberJungle, Episode 171: Is a Jihadist Terror group behind the "Here You Have" worm attack? Microsoft Windows has been the world’s leading operating system since the first time you typed your very first memo on your workplace computer. Is there now

2010-09-12 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 171: Is a Jihadist Terror group behind the "Here You Have" worm attack? Microsoft Windows has been the world’s leading operating system since the first time you typed your very first memo on your workplace computer. Is there now


The CyberJungle, Episode 169: Is a backlash against Google reaching a new level? One consumer group thinks so, and is using a humorous video to make their point. A UN Agency head wants RIM to weaken the security Blackberry Enterprise Server (BES) users en

2010-09-05 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 169: Is a backlash against Google reaching a new level? One consumer group thinks so, and is using a humorous video to make their point. A UN Agency head wants RIM to weaken the security Blackberry Enterprise Server (BES) users en


The CyberJungle, Episode 167: The so-called "super-cookie" tracks your moves online, and can come back to life even after it's "deleted." The Feds verified a 2008 cyberattack - billed as the "most significant" breach of defense department computers ever.

2010-08-29 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 167: The so-called "super-cookie" tracks your moves online, and can come back to life even after it's "deleted." The Feds verified a 2008 cyberattack - billed as the "most significant" breach of defense department computers ever.


The CyberJungle, Episode 166: 'su root' episodes are in-depth technical interviews. The Wall Street Journal published a story this week about the love affair between businesses and the iPad. The pad is sexy, trendy and everyone loooves them. Including the

2010-08-29 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 166: 'su root' episodes are in-depth technical interviews. The Wall Street Journal published a story this week about the love affair between businesses and the iPad. The pad is sexy, trendy and everyone loooves them. Including the


The CyberJungle, Episode 165: Report reveals that the lack of info security might be related to a plane crash that killed over 150 people. The Green Police: RFID coming to your curb-side trash? Legally recording a conversation on a smartphone just got eas

2010-08-22 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 165: Report reveals that the lack of info security might be related to a plane crash that killed over 150 people. The Green Police: RFID coming to your curb-side trash? Legally recording a conversation on a smartphone just got eas


The CyberJungle, Episode 165: Report reveals that the lack of info security might be related to a plane crash that killed over 150 people. The Green Police: RFID coming to your curb-side trash? Legally recording a conversation on a smartphone just got eas

2010-08-22 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 165: Report reveals that the lack of info security might be related to a plane crash that killed over 150 people. The Green Police: RFID coming to your curb-side trash? Legally recording a conversation on a smartphone just got eas


The CyberJungle, Episode 164: 'su root' episodes are in-depth technical interviews. Ira interviews Dr. Richard Boyd, Sr. Researcher, Georgia Tech Research Institute, about low-cost graphics cards that can brute force passwords of 12 characters or less in

2010-08-22 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 164: 'su root' episodes are in-depth technical interviews. Ira interviews Dr. Richard Boyd, Sr. Researcher, Georgia Tech Research Institute, about low-cost graphics cards that can brute force passwords of 12 characters or less in


The CyberJungle, Episode 164: 'su root' episodes are in-depth technical interviews. Ira interviews Dr. Richard Boyd, Sr. Researcher, Georgia Tech Research Institute, about low-cost graphics cards that can brute force passwords of 12 characters or less in

2010-08-22 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 164: 'su root' episodes are in-depth technical interviews. Ira interviews Dr. Richard Boyd, Sr. Researcher, Georgia Tech Research Institute, about low-cost graphics cards that can brute force passwords of 12 characters or less in


The CyberJungle, Episode 163: CyberCriminals are targeting the payroll processing applications and services that businesses use. Why? It's where the bank account information is. We explain a complex Adobe Flash vulnerability. Is Google buying mini-drones

2010-08-15 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 163: CyberCriminals are targeting the payroll processing applications and services that businesses use. Why? It's where the bank account information is. We explain a complex Adobe Flash vulnerability. Is Google buying mini-drones


The CyberJungle, Episode 163: CyberCriminals are targeting the payroll processing applications and services that businesses use. Why? It's where the bank account information is. We explain a complex Adobe Flash vulnerability. Is Google buying mini-drones

2010-08-15 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 163: CyberCriminals are targeting the payroll processing applications and services that businesses use. Why? It's where the bank account information is. We explain a complex Adobe Flash vulnerability. Is Google buying mini-drones


The CyberJungle, Episode 162: 'su root' episodes are in-depth technical interviews. Ira has an extended conversation with Wayne Huang of Amorize. Wayne Huang conducted early research that helped lead to the discovery of web drive-by downloads. Wayne Huang

2010-08-15 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 162: 'su root' episodes are in-depth technical interviews. Ira has an extended conversation with Wayne Huang of Amorize. Wayne Huang conducted early research that helped lead to the discovery of web drive-by downloads. Wayne Huang


The CyberJungle, Episode 162: 'su root' episodes are in-depth technical interviews. Ira has an extended conversation with Wayne Huang of Amorize. Wayne Huang conducted early research that helped lead to the discovery of web drive-by downloads. Wayne Huang

2010-08-15 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 162: 'su root' episodes are in-depth technical interviews. Ira has an extended conversation with Wayne Huang of Amorize. Wayne Huang conducted early research that helped lead to the discovery of web drive-by downloads. Wayne Huang


The CyberJungle, Episode 161: The DefCon18 conference ended on Sunday, and the "World's Largest Hacker Conference," as many call it, didn't disappoint. We have coverage from the conference, and our take on the news that came out of it. National Science Fo

2010-08-07 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 161: The DefCon18 conference ended on Sunday, and the "World's Largest Hacker Conference," as many call it, didn't disappoint. We have coverage from the conference, and our take on the news that came out of it. National Science Fo


The CyberJungle, Episode 161: The DefCon18 conference ended on Sunday, and the "World's Largest Hacker Conference," as many call it, didn't disappoint. We have coverage from the conference, and our take on the news that came out of it. National Science Fo

2010-08-07 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 161: The DefCon18 conference ended on Sunday, and the "World's Largest Hacker Conference," as many call it, didn't disappoint. We have coverage from the conference, and our take on the news that came out of it. National Science Fo


The CyberJungle, Episode 160: 'su root' episodes are in-depth technical interviews. This is a special DefCon18 edition featuring interviews with David Bryan on building a network to withstand thousands of hackers, he has lessons for anyone building a netw

2010-08-07 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 160: 'su root' episodes are in-depth technical interviews. This is a special DefCon18 edition featuring interviews with David Bryan on building a network to withstand thousands of hackers, he has lessons for anyone building a netw


The CyberJungle, Episode 160: 'su root' episodes are in-depth technical interviews. This is a special DefCon18 edition featuring interviews with David Bryan on building a network to withstand thousands of hackers, he has lessons for anyone building a netw

2010-08-07 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 160: 'su root' episodes are in-depth technical interviews. This is a special DefCon18 edition featuring interviews with David Bryan on building a network to withstand thousands of hackers, he has lessons for anyone building a netw


The CyberJungle, Episode 159: Are victims of cyberattacks too embarrassed to come forward, and are cybercriminals profiting from the embarrassment? Cybercriminals are targeting flaws in the networks of businesses to get at checking data; What do they do w

2010-08-01 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 159: Are victims of cyberattacks too embarrassed to come forward, and are cybercriminals profiting from the embarrassment? Cybercriminals are targeting flaws in the networks of businesses to get at checking data; What do they do w


The CyberJungle, Episode 159: Are victims of cyberattacks too embarrassed to come forward, and are cybercriminals profiting from the embarrassment? Cybercriminals are targeting flaws in the networks of businesses to get at checking data; What do they do w

2010-08-01 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 159: Are victims of cyberattacks too embarrassed to come forward, and are cybercriminals profiting from the embarrassment? Cybercriminals are targeting flaws in the networks of businesses to get at checking data; What do they do w


The CyberJungle, Episode 157: GM suffers $40million loss due to poor USB security. New flaws impacting Windows and Mac users. Is Google WiFi data theft linked to US Intelligence efforts? Secret cameras get planted in woman's bedroom. Our take on this week

2010-07-31 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 157: GM suffers $40million loss due to poor USB security. New flaws impacting Windows and Mac users. Is Google WiFi data theft linked to US Intelligence efforts? Secret cameras get planted in woman's bedroom. Our take on this week


The CyberJungle, Episode 157: GM suffers $40million loss due to poor USB security. New flaws impacting Windows and Mac users. Is Google WiFi data theft linked to US Intelligence efforts? Secret cameras get planted in woman's bedroom. Our take on this week

2010-07-31 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 157: GM suffers $40million loss due to poor USB security. New flaws impacting Windows and Mac users. Is Google WiFi data theft linked to US Intelligence efforts? Secret cameras get planted in woman's bedroom. Our take on this week


The CyberJungle, Episode 155: Info of over 1,000 illegal immigrants living in Utah were leaked. There are security policy and other, broader legal questions. Bluetooth is making it easier for cybercriminals to steal debit card numbers at the gas pump. Go

2010-07-17 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 155: Info of over 1,000 illegal immigrants living in Utah were leaked. There are security policy and other, broader legal questions. Bluetooth is making it easier for cybercriminals to steal debit card numbers at the gas pump. Go


The CyberJungle, Episode 153: Senior Member of the US Congress runs an open-access, unencrypted WiFi network at home in DC. Poor security in one of the most secure banks in the world? Gunter Ollman from Damballa on how "hackers" become filthy rich with bo

2010-07-10 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 153: Senior Member of the US Congress runs an open-access, unencrypted WiFi network at home in DC. Poor security in one of the most secure banks in the world? Gunter Ollman from Damballa on how "hackers" become filthy rich with bo


The CyberJungle, Episode 153: Senior Member of the US Congress runs an open-access, unencrypted WiFi network at home in DC. Poor security in one of the most secure banks in the world? Gunter Ollman from Damballa on how "hackers" become filthy rich with bo

2010-07-10 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 153: Senior Member of the US Congress runs an open-access, unencrypted WiFi network at home in DC. Poor security in one of the most secure banks in the world? Gunter Ollman from Damballa on how "hackers" become filthy rich with bo


The CyberJungle, Episode 151: Lawyers use social network info as court evidence. Laptop security, it is part psychology, part technology. Dr. Larry Ponemon from the Ponemon Institute shares his research on laptop theft. We talk with David Thompson, the au

2010-07-03 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 151: Lawyers use social network info as court evidence. Laptop security, it is part psychology, part technology. Dr. Larry Ponemon from the Ponemon Institute shares his research on laptop theft. We talk with David Thompson, the au


The CyberJungle, Episode 151: Lawyers use social network info as court evidence. Laptop security, it is part psychology, part technology. Dr. Larry Ponemon from the Ponemon Institute shares his research on laptop theft. We talk with David Thompson, the au

2010-07-03 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 151: Lawyers use social network info as court evidence. Laptop security, it is part psychology, part technology. Dr. Larry Ponemon from the Ponemon Institute shares his research on laptop theft. We talk with David Thompson, the au


The CyberJungle, Episode 149: What do the information security experts say about the business security implications when these smartphones connect with company data? Resistance is Futile - Employees are going using social media as business communication t

2010-06-26 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 149: What do the information security experts say about the business security implications when these smartphones connect with company data? Resistance is Futile - Employees are going using social media as business communication t


The CyberJungle, Episode 149: What do the information security experts say about the business security implications when these smartphones connect with company data? Resistance is Futile - Employees are going using social media as business communication t

2010-06-26 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 149: What do the information security experts say about the business security implications when these smartphones connect with company data? Resistance is Futile - Employees are going using social media as business communication t


The CyberJungle, Episode 147: Buy a Chevy Volt – Get a Free Government Surveillance Device! Phil Lieberman, President of security company Lieberman Software, has been advising congress on the Cybersecurity Protection Act. And, David Perry of TrendMicro

2010-06-19 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 147: Buy a Chevy Volt – Get a Free Government Surveillance Device! Phil Lieberman, President of security company Lieberman Software, has been advising congress on the Cybersecurity Protection Act. And, David Perry of TrendMicro


The CyberJungle, Episode 147: Buy a Chevy Volt – Get a Free Government Surveillance Device! Phil Lieberman, President of security company Lieberman Software, has been advising congress on the Cybersecurity Protection Act. And, David Perry of TrendMicro

2010-06-19 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 147: Buy a Chevy Volt – Get a Free Government Surveillance Device! Phil Lieberman, President of security company Lieberman Software, has been advising congress on the Cybersecurity Protection Act. And, David Perry of TrendMicro


The CyberJungle, su root edition, Episode 146: Ira interviews David Perry, the Global Director of Education for TrendMicro. They have a conversation about iPhone security, web application security, and malware attacks. If you ever wanted to be a fly on th

2010-06-19 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: The CyberJungle, su root edition, Episode 146: Ira interviews David Perry, the Global Director of Education for TrendMicro. They have a conversation about iPhone security, web application security, and malware attacks. If you ever wanted to be a fly on th


The CyberJungle, su root edition, Episode 146: Ira interviews David Perry, the Global Director of Education for TrendMicro. They have a conversation about iPhone security, web application security, and malware attacks. If you ever wanted to be a fly on th

2010-06-19 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: The CyberJungle, su root edition, Episode 146: Ira interviews David Perry, the Global Director of Education for TrendMicro. They have a conversation about iPhone security, web application security, and malware attacks. If you ever wanted to be a fly on th


The CyberJungle, Episode 145: The life of a money mule. Jason Miller from Shavlik on "3rd party hazards." Google’s own WiFi investigators offer damning evidence...some are daring to call it criminal intent. And, our take on this week's news.

2010-06-12 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 145: The life of a money mule. Jason Miller from Shavlik on "3rd party hazards." Google’s own WiFi investigators offer damning evidence...some are daring to call it criminal intent. And, our take on this week's news.


The CyberJungle, Episode 145: The life of a money mule. Jason Miller from Shavlik on "3rd party hazards." Google’s own WiFi investigators offer damning evidence...some are daring to call it criminal intent. And, our take on this week's news.

2010-06-12 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 145: The life of a money mule. Jason Miller from Shavlik on "3rd party hazards." Google’s own WiFi investigators offer damning evidence...some are daring to call it criminal intent. And, our take on this week's news.


The CyberJungle, Episode 143: Malware writers are creating new apps for smartphones. Speed law attorney Casey Rascob has some comments about the "science" of estimating vehicle speed vs. technologies that track speed. FTC orders a spyware entrepreneur to

2010-06-05 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 143: Malware writers are creating new apps for smartphones. Speed law attorney Casey Rascob has some comments about the "science" of estimating vehicle speed vs. technologies that track speed. FTC orders a spyware entrepreneur to


The CyberJungle, Episode 143: Malware writers are creating new apps for smartphones. Speed law attorney Casey Rascob has some comments about the "science" of estimating vehicle speed vs. technologies that track speed. FTC orders a spyware entrepreneur to

2010-06-05 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 143: Malware writers are creating new apps for smartphones. Speed law attorney Casey Rascob has some comments about the "science" of estimating vehicle speed vs. technologies that track speed. FTC orders a spyware entrepreneur to


The CyberJungle, Episode 141: Here we go again – another easy way to break into the iPhone. "Sniper forensics – One shot, One kill" with forensic expert Chris Pogue. Cyberthieves stole more than $100K from the credit union that serves US Treasury emp

2010-05-29 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 141: Here we go again – another easy way to break into the iPhone. "Sniper forensics – One shot, One kill" with forensic expert Chris Pogue. Cyberthieves stole more than $100K from the credit union that serves US Treasury emp


The CyberJungle, Episode 141: Here we go again – another easy way to break into the iPhone. "Sniper forensics – One shot, One kill" with forensic expert Chris Pogue. Cyberthieves stole more than $100K from the credit union that serves US Treasury emp

2010-05-29 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 141: Here we go again – another easy way to break into the iPhone. "Sniper forensics – One shot, One kill" with forensic expert Chris Pogue. Cyberthieves stole more than $100K from the credit union that serves US Treasury emp


The CyberJungle, Episode 139: FTC targets privacy and security concerns on copy machines. Josh Levy is looking for 10,000 people who will pledge to simultaneously abandon Facebook; LifeLock Founder's ID successfully stolen 13 times. Privacy round-up.

2010-05-22 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 139: FTC targets privacy and security concerns on copy machines. Josh Levy is looking for 10,000 people who will pledge to simultaneously abandon Facebook; LifeLock Founder's ID successfully stolen 13 times. Privacy round-up.


The CyberJungle, Episode 139: FTC targets privacy and security concerns on copy machines. Josh Levy is looking for 10,000 people who will pledge to simultaneously abandon Facebook; LifeLock Founder's ID successfully stolen 13 times. Privacy round-up.

2010-05-22 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 139: FTC targets privacy and security concerns on copy machines. Josh Levy is looking for 10,000 people who will pledge to simultaneously abandon Facebook; LifeLock Founder's ID successfully stolen 13 times. Privacy round-up.


The CyberJungle, Episode 137: Did Facebook co-founder Mark Zuckerberg really refer to members as "dumb f**ks"? And, Google admits that they "goofed" when they vacuumed up 600gb of wifi data over a four year period. Patch Tues expert says the problems this

2010-05-15 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 137: Did Facebook co-founder Mark Zuckerberg really refer to members as "dumb f**ks"? And, Google admits that they "goofed" when they vacuumed up 600gb of wifi data over a four year period. Patch Tues expert says the problems this


The CyberJungle, Episode 137: Did Facebook co-founder Mark Zuckerberg really refer to members as "dumb f**ks"? And, Google admits that they "goofed" when they vacuumed up 600gb of wifi data over a four year period. Patch Tues expert says the problems this

2010-05-15 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 137: Did Facebook co-founder Mark Zuckerberg really refer to members as "dumb f**ks"? And, Google admits that they "goofed" when they vacuumed up 600gb of wifi data over a four year period. Patch Tues expert says the problems this


The CyberJungle, Episode 135: Did the Gov’t use military drones to track the TimesSq bomber? FBI's forensic challenges with smartphones and net-enabled gameboxes; What changes are likely in the new version of PCI creditcard standard? Plus, our take on t

2010-05-09 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 135: Did the Gov’t use military drones to track the TimesSq bomber? FBI's forensic challenges with smartphones and net-enabled gameboxes; What changes are likely in the new version of PCI creditcard standard? Plus, our take on t


The CyberJungle, Episode 133: SharePoint 0day flaw, previusly unreported facts about the Palin email "hack," reports from Interop 2010 Las Vegas. Our take on this week's news.

2010-05-01 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 133: SharePoint 0day flaw, previusly unreported facts about the Palin email "hack," reports from Interop 2010 Las Vegas. Our take on this week's news.


The CyberJungle, Episode 133: SharePoint 0day flaw, previusly unreported facts about the Palin email "hack," reports from Interop 2010 Las Vegas. Our take on this week's news.

2010-05-01 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 133: SharePoint 0day flaw, previusly unreported facts about the Palin email "hack," reports from Interop 2010 Las Vegas. Our take on this week's news.


The CyberJungle, Episode 131: McAfee flaw caused massive biz PC crashes. What are the lessons learned? A street fight is developing over your info. VC darling Blippy caught exposing user's credit card numbers, and purchases. Our take on this week's news.

2010-04-24 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 131: McAfee flaw caused massive biz PC crashes. What are the lessons learned? A street fight is developing over your info. VC darling Blippy caught exposing user's credit card numbers, and purchases. Our take on this week's news.


The CyberJungle, Episode 129: Former US cybersecurity Czar says infosec still not take seriously; Ira has a "secret admirer;" New lawsuit challenges ObamaCare on privacy rights violations; Emergency Java Patch; Plus our take on this week's news.

2010-04-17 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 129: Former US cybersecurity Czar says infosec still not take seriously; Ira has a "secret admirer;" New lawsuit challenges ObamaCare on privacy rights violations; Emergency Java Patch; Plus our take on this week's news.


The CyberJungle, Episode 127: Insider bank attacks; Charlie Miller, Apple expert, talks iPhoneOS4 security; Peter Schlampp, Solera Networks, on network forensics. German g-men pay hackers for stolen, private bank account data. Stuart Staniford, FireEye, o

2010-04-10 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 127: Insider bank attacks; Charlie Miller, Apple expert, talks iPhoneOS4 security; Peter Schlampp, Solera Networks, on network forensics. German g-men pay hackers for stolen, private bank account data. Stuart Staniford, FireEye, o


The CyberJungle, Episode 127: Insider bank attacks; Charlie Miller, Apple expert, talks iPhoneOS4 security; Peter Schlampp, Solera Networks, on network forensics. German g-men pay hackers for stolen, private bank account data. Stuart Staniford, FireEye, o

2010-04-10 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 127: Insider bank attacks; Charlie Miller, Apple expert, talks iPhoneOS4 security; Peter Schlampp, Solera Networks, on network forensics. German g-men pay hackers for stolen, private bank account data. Stuart Staniford, FireEye, o


The CyberJungle, su root, Episode 126: In-depth interviews from main program. Peter Schlampp: network forensics. Stuart Staniford: attacks that bypass firewalls/AV. Charlie Miller: security implications of Apple's iPhoneOS4.

2010-04-10 :: Ira Victor with Samantha Stone
Length: 47s

x

Share: The CyberJungle, su root, Episode 126: In-depth interviews from main program. Peter Schlampp: network forensics. Stuart Staniford: attacks that bypass firewalls/AV. Charlie Miller: security implications of Apple's iPhoneOS4.


The CyberJungle, su root, Episode 126: In-depth interviews from main program. Peter Schlampp: network forensics. Stuart Staniford: attacks that bypass firewalls/AV. Charlie Miller: security implications of Apple's iPhoneOS4.

2010-04-10 :: Ira Victor with Samantha Stone
Length: 47s

x

Share: The CyberJungle, su root, Episode 126: In-depth interviews from main program. Peter Schlampp: network forensics. Stuart Staniford: attacks that bypass firewalls/AV. Charlie Miller: security implications of Apple's iPhoneOS4.


The CyberJungle, Episode 125: The simple settings that can stop many internet attacks. Plus, Gasp! Airport body scanning machines DO store images, according to the Feds. And, our take on this week's news.

2010-04-03 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 125: The simple settings that can stop many internet attacks. Plus, Gasp! Airport body scanning machines DO store images, according to the Feds. And, our take on this week's news.


The CyberJungle, Episode 125: The simple settings that can stop many internet attacks. Plus, Gasp! Airport body scanning machines DO store images, according to the Feds. And, our take on this week's news.

2010-04-03 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 125: The simple settings that can stop many internet attacks. Plus, Gasp! Airport body scanning machines DO store images, according to the Feds. And, our take on this week's news.


The CyberJungle, Episode 123: Scareware is Big Business; Information security comes to your car's dashboard; Virtulization security checklist; Our take on this week's news.

2010-03-27 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 123: Scareware is Big Business; Information security comes to your car's dashboard; Virtulization security checklist; Our take on this week's news.


The CyberJungle, Episode 123: Scareware is Big Business; Information security comes to your car's dashboard; Virtulization security checklist; Our take on this week's news.

2010-03-27 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 123: Scareware is Big Business; Information security comes to your car's dashboard; Virtulization security checklist; Our take on this week's news.


The CyberJungle, Episode 121: Banks have a new troubled asset - their customers. 3,000 smartphones arrive "pre-loaded" with data-stealing malware. Plus our take on this week's news

2010-03-20 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 121: Banks have a new troubled asset - their customers. 3,000 smartphones arrive "pre-loaded" with data-stealing malware. Plus our take on this week's news


The CyberJungle, Episode 121: Banks have a new troubled asset - their customers. 3,000 smartphones arrive "pre-loaded" with data-stealing malware. Plus our take on this week's news

2010-03-20 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 121: Banks have a new troubled asset - their customers. 3,000 smartphones arrive "pre-loaded" with data-stealing malware. Plus our take on this week's news


The CyberJungle, su root edition, Episode 118: Joe Weiss, author of the forthcoming security book, "Protecting Industrial Control Systems from Electronic Threats." Topics: Smart Grid security and other industrial controls.

2010-03-14 :: Ira Victor
Length: 21s

x

Share: The CyberJungle, su root edition, Episode 118: Joe Weiss, author of the forthcoming security book, "Protecting Industrial Control Systems from Electronic Threats." Topics: Smart Grid security and other industrial controls.


The CyberJungle, su root edition, Episode 118: Joe Weiss, author of the forthcoming security book, "Protecting Industrial Control Systems from Electronic Threats." Topics: Smart Grid security and other industrial controls.

2010-03-14 :: Ira Victor
Length: 21s

x

Share: The CyberJungle, su root edition, Episode 118: Joe Weiss, author of the forthcoming security book, "Protecting Industrial Control Systems from Electronic Threats." Topics: Smart Grid security and other industrial controls.


The CyberJungle, Episode 119: The Electric Smart Grid - New concerns about the "system inside the system". Plus our take on this week's news.

2010-03-13 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 119: The Electric Smart Grid - New concerns about the "system inside the system". Plus our take on this week's news.


The CyberJungle, Episode 117: Exclusive RSA Security Conference coverage: Cloud Computing, SmartGrid Forensics, Healthcare, MoneyMules.

2010-03-06 :: Ira Victor with Samantha Stone
Length: 59s

x

Share: The CyberJungle, Episode 117: Exclusive RSA Security Conference coverage: Cloud Computing, SmartGrid Forensics, Healthcare, MoneyMules.


The CyberJungle, Episode 117: Exclusive RSA Security Conference coverage: Cloud Computing, SmartGrid Forensics, Healthcare, MoneyMules.

2010-03-06 :: Ira Victor with Samantha Stone
Length: 59s

x

Share: The CyberJungle, Episode 117: Exclusive RSA Security Conference coverage: Cloud Computing, SmartGrid Forensics, Healthcare, MoneyMules.


The CyberJungle, su root edition, Episode 116: Exclusive forensics interviews from RSA Security Conference: Pedro Bustamante on the Mariposa Botnet; Gerry Brown and Christopher Brown on SmartGrid incident response.

2010-03-06 :: Ira Victor
Length: 21s

x

Share: The CyberJungle, su root edition, Episode 116: Exclusive forensics interviews from RSA Security Conference: Pedro Bustamante on the Mariposa Botnet; Gerry Brown and Christopher Brown on SmartGrid incident response.


The CyberJungle, Episode 115: How easy is it to eavesdrop on cell phone conversations? What's The 'Chuck Norris' attack? Wyndam Hotel chain has third data breach in a year.

2010-02-28 :: Ira Victor with Samantha Stone
Length: 1s

x

Share: The CyberJungle, Episode 115: How easy is it to eavesdrop on cell phone conversations? What's The 'Chuck Norris' attack? Wyndam Hotel chain has third data breach in a year.


The CyberJungle, su root edition, Episode 114: Interview Simon Bransfield-Garth, on the security of cell phone voice communications; Interview with John Young of cryptome.org, about his legal trouble with Microsoft after he posted the company's "spying

2010-02-28 :: Ira Victor
Length: 23s

x

Share: The CyberJungle, su root edition, Episode 114: Interview Simon Bransfield-Garth, on the security of cell phone voice communications; Interview with John Young of cryptome.org, about his legal trouble with Microsoft after he posted the company's "spying


The CyberJungle, su root edition, Episode 114: Interview Simon Bransfield-Garth, on the security of cell phone voice communications; Interview with John Young of cryptome.org, about his legal trouble with Microsoft after he posted the company's "spying

2010-02-28 :: Ira Victor
Length: 23s

x

Share: The CyberJungle, su root edition, Episode 114: Interview Simon Bransfield-Garth, on the security of cell phone voice communications; Interview with John Young of cryptome.org, about his legal trouble with Microsoft after he posted the company's "spying


The CyberJungle, Episode 113: A spike in power grid attacks is predicted in the next 12 months. Zues and its variants are more severe and widespread than previously reported. Plus Tales from the Dark Web.

2010-02-21 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: The CyberJungle, Episode 113: A spike in power grid attacks is predicted in the next 12 months. Zues and its variants are more severe and widespread than previously reported. Plus Tales from the Dark Web.


The CyberJungle, Episode 113: A spike in power grid attacks is predicted in the next 12 months. Zues and its variants are more severe and widespread than previously reported. Plus Tales from the Dark Web.

2010-02-21 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: The CyberJungle, Episode 113: A spike in power grid attacks is predicted in the next 12 months. Zues and its variants are more severe and widespread than previously reported. Plus Tales from the Dark Web.


The CyberJungle, su root edition, Episode 112: Interview with Ben Jun from Cryptography Research, on developing applications that adapt to sweeping changes in technology.

2010-02-21 :: Ira Victor
Length: 21s

x

Share: The CyberJungle, su root edition, Episode 112: Interview with Ben Jun from Cryptography Research, on developing applications that adapt to sweeping changes in technology.


The CyberJungle, su root edition, Episode 112: Interview with Ben Jun from Cryptography Research, on developing applications that adapt to sweeping changes in technology.

2010-02-21 :: Ira Victor
Length: 21s

x

Share: The CyberJungle, su root edition, Episode 112: Interview with Ben Jun from Cryptography Research, on developing applications that adapt to sweeping changes in technology.


The CyberJungle, Episode 111: The pressure is on for business to take payments via smart phone; Macy's and Google, each in its own way this week committing unthinking - and unthinkable -- breaches of customer privacy. Plus, this week's news.

2010-02-13 :: Ira Victor with Samantha Stone
Length: 59s

x

Share: The CyberJungle, Episode 111: The pressure is on for business to take payments via smart phone; Macy's and Google, each in its own way this week committing unthinking - and unthinkable -- breaches of customer privacy. Plus, this week's news.


The CyberJungle, Episode 111: The pressure is on for business to take payments via smart phone; Macy's and Google, each in its own way this week committing unthinking - and unthinkable -- breaches of customer privacy. Plus, this week's news.

2010-02-13 :: Ira Victor with Samantha Stone
Length: 59s

x

Share: The CyberJungle, Episode 111: The pressure is on for business to take payments via smart phone; Macy's and Google, each in its own way this week committing unthinking - and unthinkable -- breaches of customer privacy. Plus, this week's news.


The CyberJungle, su root edition, Episode 110: Interview with Dr. Martin Hellman, one of the fathers of public key encryption; he is using security risk assessment to calculate nuclear threats.

2010-02-13 :: Ira Victor
Length: 27s

x

Share: The CyberJungle, su root edition, Episode 110: Interview with Dr. Martin Hellman, one of the fathers of public key encryption; he is using security risk assessment to calculate nuclear threats.


The CyberJungle, su root edition, Episode 110: Interview with Dr. Martin Hellman, one of the fathers of public key encryption; he is using security risk assessment to calculate nuclear threats.

2010-02-13 :: Ira Victor
Length: 27s

x

Share: The CyberJungle, su root edition, Episode 110: Interview with Dr. Martin Hellman, one of the fathers of public key encryption; he is using security risk assessment to calculate nuclear threats.


The CyberJungle, Episode 109: Google getting chummy with the NSA. Lifestyle Hacking - Your twenty-something employees don't like your rules and restrictions. Tales from the Dark Web, and, this week's news.

2010-02-06 :: Ira Victor with Samantha Stone
Length: 56s

x

Share: The CyberJungle, Episode 109: Google getting chummy with the NSA. Lifestyle Hacking - Your twenty-something employees don't like your rules and restrictions. Tales from the Dark Web, and, this week's news.


The CyberJungle, Episode 109: Google getting chummy with the NSA. Lifestyle Hacking - Your twenty-something employees don't like your rules and restrictions. Tales from the Dark Web, and, this week's news.

2010-02-06 :: Ira Victor with Samantha Stone
Length: 56s

x

Share: The CyberJungle, Episode 109: Google getting chummy with the NSA. Lifestyle Hacking - Your twenty-something employees don't like your rules and restrictions. Tales from the Dark Web, and, this week's news.


The CyberJungle, su root, Episode 106: Interview with Rob Lee, co-author of a new study on APT- The Advanced Persistant Threat, a new type of attack that gets into a network, and stays in.

2010-01-31 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: The CyberJungle, su root, Episode 106: Interview with Rob Lee, co-author of a new study on APT- The Advanced Persistant Threat, a new type of attack that gets into a network, and stays in.


The CyberJungle, su root, Episode 106: Interview with Rob Lee, co-author of a new study on APT- The Advanced Persistant Threat, a new type of attack that gets into a network, and stays in.

2010-01-31 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: The CyberJungle, su root, Episode 106: Interview with Rob Lee, co-author of a new study on APT- The Advanced Persistant Threat, a new type of attack that gets into a network, and stays in.


The CyberJungle, su root, Episode 104: Interview with Joe Grand, renowned hardware "hacker" and the star of "Prototype This" TV show.

2010-01-24 :: Ira Victor with Samantha Stone
Length: 23s

x

Share: The CyberJungle, su root, Episode 104: Interview with Joe Grand, renowned hardware "hacker" and the star of "Prototype This" TV show.


The CyberJungle, su root, Episode 104: Interview with Joe Grand, renowned hardware "hacker" and the star of "Prototype This" TV show.

2010-01-24 :: Ira Victor with Samantha Stone
Length: 23s

x

Share: The CyberJungle, su root, Episode 104: Interview with Joe Grand, renowned hardware "hacker" and the star of "Prototype This" TV show.


The CyberJungle, su root, Episode 102: Dr. Ben Edelman, from the Harvard Business School, "click fraud" that takes over PCs; Steven Dispensa, CTO of PhoneFactor about voice print authentication.

2010-01-16 :: Ira Victor with Samantha Stone
Length: 45s

x

Share: The CyberJungle, su root, Episode 102: Dr. Ben Edelman, from the Harvard Business School, "click fraud" that takes over PCs; Steven Dispensa, CTO of PhoneFactor about voice print authentication.


The CyberJungle, su root, Episode 102: Dr. Ben Edelman, from the Harvard Business School, "click fraud" that takes over PCs; Steven Dispensa, CTO of PhoneFactor about voice print authentication.

2010-01-16 :: Ira Victor with Samantha Stone
Length: 45s

x

Share: The CyberJungle, su root, Episode 102: Dr. Ben Edelman, from the Harvard Business School, "click fraud" that takes over PCs; Steven Dispensa, CTO of PhoneFactor about voice print authentication.


The CyberJungle, su root edition, Episode 108: The first major prosecution against a medical provider under the new HIPAA HITECH Law. Our conversation with an expert in HIPAA and encryption. How to avoid similar prosecution.

2010-01-10 :: Ira Victor
Length: 12s

x

Share: The CyberJungle, su root edition, Episode 108: The first major prosecution against a medical provider under the new HIPAA HITECH Law. Our conversation with an expert in HIPAA and encryption. How to avoid similar prosecution.


The CyberJungle, su root edition, Episode 108: The first major prosecution against a medical provider under the new HIPAA HITECH Law. Our conversation with an expert in HIPAA and encryption. How to avoid similar prosecution.

2010-01-10 :: Ira Victor
Length: 12s

x

Share: The CyberJungle, su root edition, Episode 108: The first major prosecution against a medical provider under the new HIPAA HITECH Law. Our conversation with an expert in HIPAA and encryption. How to avoid similar prosecution.


Data Security Podcast Episode 88: Bad guys buying services to evade anti-virus. Special announcement. Our take on the news.

2010-01-03 :: Ira Victor with Samantha Stone
Length: 34s

x

Share: Data Security Podcast Episode 88: Bad guys buying services to evade anti-virus. Special announcement. Our take on the news.


Data Security Podcast Episode 87: One semi-colon could expose your web server. Researcher uncovers flaw that impacts millions of web users. Our take on the news.

2009-12-27 :: Ira Victor with Samantha Stone
Length: 40s

x

Share: Data Security Podcast Episode 87: One semi-colon could expose your web server. Researcher uncovers flaw that impacts millions of web users. Our take on the news.


Data Security Podcast Episode 86: Twitter DNS hijacked. Fingerprinting credit card mag strips. Our take on the news.

2009-12-20 :: Ira Victor with Samantha Stone
Length: 39s

x

Share: Data Security Podcast Episode 86: Twitter DNS hijacked. Fingerprinting credit card mag strips. Our take on the news.


Data Security Podcast Episode 85: New surge in attacks targeting bank accounts. Data security requires physical security. Our take on the news.

2009-12-14 :: Ira Victor with Samantha Stone
Length: 31s

x

Share: Data Security Podcast Episode 85: New surge in attacks targeting bank accounts. Data security requires physical security. Our take on the news.


Data Security Podcast Episode 84: Is there is a Russian connection to the 'Climategate' attack? "Take Back Your Privacy." Our take on the news.

2009-12-07 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: Data Security Podcast Episode 84: Is there is a Russian connection to the 'Climategate' attack? "Take Back Your Privacy." Our take on the news.


Data Security Podcast Episode 84: Is there is a Russian connection to the 'Climategate' attack? "Take Back Your Privacy." Our take on the news.

2009-12-07 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: Data Security Podcast Episode 84: Is there is a Russian connection to the 'Climategate' attack? "Take Back Your Privacy." Our take on the news.


Data Security Podcast Episode 83: New highly damaging attack plays on the very fear of being attacked. Stopping insider attacks. Plus, our take on the news.

2009-11-29 :: Ira Victor with Samantha Stone
Length: 37s

x

Share: Data Security Podcast Episode 83: New highly damaging attack plays on the very fear of being attacked. Stopping insider attacks. Plus, our take on the news.


Data Security Podcast Episode 83: New highly damaging attack plays on the very fear of being attacked. Stopping insider attacks. Plus, our take on the news.

2009-11-29 :: Ira Victor with Samantha Stone
Length: 37s

x

Share: Data Security Podcast Episode 83: New highly damaging attack plays on the very fear of being attacked. Stopping insider attacks. Plus, our take on the news.


Data Security Podcast Episode 82: FBI Report: Latest target for the cybercriminal? Law Firms and PR Firms. Adobe Security Speaks. Our take on this week's news.

2009-11-22 :: Ira Victor with Samantha Stone
Length: 29s

x

Share: Data Security Podcast Episode 82: FBI Report: Latest target for the cybercriminal? Law Firms and PR Firms. Adobe Security Speaks. Our take on this week's news.


Data Security Podcast Episode 82: FBI Report: Latest target for the cybercriminal? Law Firms and PR Firms. Adobe Security Speaks. Our take on this week's news.

2009-11-22 :: Ira Victor with Samantha Stone
Length: 29s

x

Share: Data Security Podcast Episode 82: FBI Report: Latest target for the cybercriminal? Law Firms and PR Firms. Adobe Security Speaks. Our take on this week's news.


Data Security Podcast Episode 81: EXCLUSIVE InfoSec Conversation with InZero Systems on countering web drive-by downloads with a new hardware sandbox.

2009-11-20 :: Ira Victor with Samantha Stone
Length: 32s

x

Share: Data Security Podcast Episode 81: EXCLUSIVE InfoSec Conversation with InZero Systems on countering web drive-by downloads with a new hardware sandbox.


Data Security Podcast Episode 81: EXCLUSIVE InfoSec Conversation with InZero Systems on countering web drive-by downloads with a new hardware sandbox.

2009-11-20 :: Ira Victor with Samantha Stone
Length: 32s

x

Share: Data Security Podcast Episode 81: EXCLUSIVE InfoSec Conversation with InZero Systems on countering web drive-by downloads with a new hardware sandbox.


Data Security Podcast Episode 80: InfoSec Conversation: Ira talks w/Pedro Bustamante, Security Blogger and Researcher with PandaSecurity. Topic: Fighting Web Drive-by Downloads.

2009-11-19 :: Ira Victor with Samantha Stone
Length: 15s

x

Share: Data Security Podcast Episode 80: InfoSec Conversation: Ira talks w/Pedro Bustamante, Security Blogger and Researcher with PandaSecurity. Topic: Fighting Web Drive-by Downloads.


Data Security Podcast Episode 80: InfoSec Conversation: Ira talks w/Pedro Bustamante, Security Blogger and Researcher with PandaSecurity. Topic: Fighting Web Drive-by Downloads.

2009-11-19 :: Ira Victor with Samantha Stone
Length: 15s

x

Share: Data Security Podcast Episode 80: InfoSec Conversation: Ira talks w/Pedro Bustamante, Security Blogger and Researcher with PandaSecurity. Topic: Fighting Web Drive-by Downloads.


Data Security Podcast Episode 79:The odds of unknowingly logging onto an 'evil twin' of your online banking site is increasing due to new broadband hazards. A revised Google Book Settlement was submitted to the courts; It doesn’t address privacy at all.

2009-11-16 :: Ira Victor with Samantha Stone
Length: 34s

x

Share: Data Security Podcast Episode 79:The odds of unknowingly logging onto an 'evil twin' of your online banking site is increasing due to new broadband hazards. A revised Google Book Settlement was submitted to the courts; It doesn’t address privacy at all.


Data Security Podcast Episode 79:The odds of unknowingly logging onto an 'evil twin' of your online banking site is increasing due to new broadband hazards. A revised Google Book Settlement was submitted to the courts; It doesn’t address privacy at all.

2009-11-16 :: Ira Victor with Samantha Stone
Length: 34s

x

Share: Data Security Podcast Episode 79:The odds of unknowingly logging onto an 'evil twin' of your online banking site is increasing due to new broadband hazards. A revised Google Book Settlement was submitted to the courts; It doesn’t address privacy at all.


Data Security Podcast Episode 78: Why are web drive-by downloads proliferating like cockroaches? 60 Minutes just covered a data security story. We rate the coverage. And, our take on this week's news.

2009-11-08 :: Ira Victor with Samantha Stone
Length: 29s

x

Share: Data Security Podcast Episode 78: Why are web drive-by downloads proliferating like cockroaches? 60 Minutes just covered a data security story. We rate the coverage. And, our take on this week's news.


Data Security Podcast Episode 78: Why are web drive-by downloads proliferating like cockroaches? 60 Minutes just covered a data security story. We rate the coverage. And, our take on this week's news.

2009-11-08 :: Ira Victor with Samantha Stone
Length: 29s

x

Share: Data Security Podcast Episode 78: Why are web drive-by downloads proliferating like cockroaches? 60 Minutes just covered a data security story. We rate the coverage. And, our take on this week's news.


Data Security Podcast Episode 77: SPECIAL EPISODE, Conversation with Marsh Ray, discoverer of the new SSL flaw.

2009-11-05 :: Ira Victor with Samantha Stone
Length: 24s

x

Share: Data Security Podcast Episode 77: SPECIAL EPISODE, Conversation with Marsh Ray, discoverer of the new SSL flaw.


Data Security Podcast Episode 77: SPECIAL EPISODE, Conversation with Marsh Ray, discoverer of the new SSL flaw.

2009-11-05 :: Ira Victor with Samantha Stone
Length: 24s

x

Share: Data Security Podcast Episode 77: SPECIAL EPISODE, Conversation with Marsh Ray, discoverer of the new SSL flaw.


Data Security Podcast Episode 76: Placing an online bet for the World Series? Employees of online betting sites might be selling customer data online. Google Book Search: What data is Google storing about readers of online books? Plus, our take on this we

2009-11-01 :: Ira Victor with Samantha Stone
Length: 33s

x

Share: Data Security Podcast Episode 76: Placing an online bet for the World Series? Employees of online betting sites might be selling customer data online. Google Book Search: What data is Google storing about readers of online books? Plus, our take on this we


Data Security Podcast Episode 76: Placing an online bet for the World Series? Employees of online betting sites might be selling customer data online. Google Book Search: What data is Google storing about readers of online books? Plus, our take on this we

2009-11-01 :: Ira Victor with Samantha Stone
Length: 33s

x

Share: Data Security Podcast Episode 76: Placing an online bet for the World Series? Employees of online betting sites might be selling customer data online. Google Book Search: What data is Google storing about readers of online books? Plus, our take on this we


Data Security Podcast Episode 75: Everyone loves retail gift cards...they are quick and easy for consumers, and for web application "hackers." Some Time Warner cable internet users are vulnerable to serious attacks -- when will Time Warner release a fix?

2009-10-25 :: Ira Victor with Samantha Stone
Length: 31s

x

Share: Data Security Podcast Episode 75: Everyone loves retail gift cards...they are quick and easy for consumers, and for web application "hackers." Some Time Warner cable internet users are vulnerable to serious attacks -- when will Time Warner release a fix?


Data Security Podcast Episode 75: Everyone loves retail gift cards...they are quick and easy for consumers, and for web application "hackers." Some Time Warner cable internet users are vulnerable to serious attacks -- when will Time Warner release a fix?

2009-10-25 :: Ira Victor with Samantha Stone
Length: 31s

x

Share: Data Security Podcast Episode 75: Everyone loves retail gift cards...they are quick and easy for consumers, and for web application "hackers." Some Time Warner cable internet users are vulnerable to serious attacks -- when will Time Warner release a fix?


Data Security Podcast Episode 74: Now the bad guys are holding computer files for ransom if you don’t buy their phony anti-virus software; we have a workaround. Midyear elections are coming up, and the last thing the campaigns seem to think about is dat

2009-10-19 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: Data Security Podcast Episode 74: Now the bad guys are holding computer files for ransom if you don’t buy their phony anti-virus software; we have a workaround. Midyear elections are coming up, and the last thing the campaigns seem to think about is dat


Data Security Podcast Episode 74: Now the bad guys are holding computer files for ransom if you don’t buy their phony anti-virus software; we have a workaround. Midyear elections are coming up, and the last thing the campaigns seem to think about is dat

2009-10-19 :: Ira Victor with Samantha Stone
Length: 38s

x

Share: Data Security Podcast Episode 74: Now the bad guys are holding computer files for ransom if you don’t buy their phony anti-virus software; we have a workaround. Midyear elections are coming up, and the last thing the campaigns seem to think about is dat


Data Security Podcast Episode 73: Major patching in store this week, due in part to flaws revealed this summer in Las Vegas? A fresh look at a Zeus banking attack counter-measure, plus our take on this week’s news.

2009-10-11 :: Ira Victor with Samantha Stone
Length: 28s

x

Share: Data Security Podcast Episode 73: Major patching in store this week, due in part to flaws revealed this summer in Las Vegas? A fresh look at a Zeus banking attack counter-measure, plus our take on this week’s news.


Data Security Podcast Episode 73: Major patching in store this week, due in part to flaws revealed this summer in Las Vegas? A fresh look at a Zeus banking attack counter-measure, plus our take on this week’s news.

2009-10-11 :: Ira Victor with Samantha Stone
Length: 28s

x

Share: Data Security Podcast Episode 73: Major patching in store this week, due in part to flaws revealed this summer in Las Vegas? A fresh look at a Zeus banking attack counter-measure, plus our take on this week’s news.


Data Security Podcast Episode 72: Polymorphic malware - every time it attacks it has a new signature. The balance on your bank account looks find, too bad all your money's gone. Our take on this week’s news.

2009-10-04 :: Ira Victor with Samantha Stone
Length: 28s

x

Share: Data Security Podcast Episode 72: Polymorphic malware - every time it attacks it has a new signature. The balance on your bank account looks find, too bad all your money's gone. Our take on this week’s news.


Data Security Podcast Episode 72: Polymorphic malware - every time it attacks it has a new signature. The balance on your bank account looks find, too bad all your money's gone. Our take on this week’s news.

2009-10-04 :: Ira Victor with Samantha Stone
Length: 28s

x

Share: Data Security Podcast Episode 72: Polymorphic malware - every time it attacks it has a new signature. The balance on your bank account looks find, too bad all your money's gone. Our take on this week’s news.


Data Security Podcast Episode 71: $4k per day scamming fake Viagra? That's just the tip of the iceberg. Business bank accounts are the targets of attacks, businesses are responding with lawsuits against banks. Our take on this week’s news.

2009-09-27 :: Ira Victor with Samantha Stone
Length: 39s

x

Share: Data Security Podcast Episode 71: $4k per day scamming fake Viagra? That's just the tip of the iceberg. Business bank accounts are the targets of attacks, businesses are responding with lawsuits against banks. Our take on this week’s news.


Data Security Podcast Episode 71: $4k per day scamming fake Viagra? That's just the tip of the iceberg. Business bank accounts are the targets of attacks, businesses are responding with lawsuits against banks. Our take on this week’s news.

2009-09-27 :: Ira Victor with Samantha Stone
Length: 39s

x

Share: Data Security Podcast Episode 71: $4k per day scamming fake Viagra? That's just the tip of the iceberg. Business bank accounts are the targets of attacks, businesses are responding with lawsuits against banks. Our take on this week’s news.


Data Security Podcast Episode 70: Full access to anyone's Facebook account for $100? Update on confidential data case in Maricopa County, AZ. Plus, our take on this week’s news.

2009-09-20 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: Data Security Podcast Episode 70: Full access to anyone's Facebook account for $100? Update on confidential data case in Maricopa County, AZ. Plus, our take on this week’s news.


Data Security Podcast Episode 70: Full access to anyone's Facebook account for $100? Update on confidential data case in Maricopa County, AZ. Plus, our take on this week’s news.

2009-09-20 :: Ira Victor with Samantha Stone
Length: 30s

x

Share: Data Security Podcast Episode 70: Full access to anyone's Facebook account for $100? Update on confidential data case in Maricopa County, AZ. Plus, our take on this week’s news.


Data Security Podcast Episode 69: Beware the non-delivery email notice – it might really be an attack. Apple has added an anti-phishing feature to the new iphone but few people have been able to get it to work right. Our take on this week’s news.

2009-09-13 :: Ira Victor with Samantha Stone
Length: 36s

x

Share: Data Security Podcast Episode 69: Beware the non-delivery email notice – it might really be an attack. Apple has added an anti-phishing feature to the new iphone but few people have been able to get it to work right. Our take on this week’s news.


Data Security Podcast Episode 69: Beware the non-delivery email notice – it might really be an attack. Apple has added an anti-phishing feature to the new iphone but few people have been able to get it to work right. Our take on this week’s news.

2009-09-13 :: Ira Victor with Samantha Stone
Length: 36s

x

Share: Data Security Podcast Episode 69: Beware the non-delivery email notice – it might really be an attack. Apple has added an anti-phishing feature to the new iphone but few people have been able to get it to work right. Our take on this week’s news.


Data Security Podcast Episode 68: New attacks against business bank accounts.... an earth-shaking recommendation from the banking industry. Hackers say they are gearing up for winter attacks - according to a survey of hackers at DefCon 2009. Plus, our tak

2009-09-06 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 68: New attacks against business bank accounts.... an earth-shaking recommendation from the banking industry. Hackers say they are gearing up for winter attacks - according to a survey of hackers at DefCon 2009. Plus, our tak


Data Security Podcast Episode 68: New attacks against business bank accounts.... an earth-shaking recommendation from the banking industry. Hackers say they are gearing up for winter attacks - according to a survey of hackers at DefCon 2009. Plus, our tak

2009-09-06 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 68: New attacks against business bank accounts.... an earth-shaking recommendation from the banking industry. Hackers say they are gearing up for winter attacks - according to a survey of hackers at DefCon 2009. Plus, our tak


Data Security Podcast Episode 67: The security lessons from Heartland data breach. Our take on the news.

2009-08-24 :: Ira Victor with Samantha Stone
Length: 40s

x

Share: Data Security Podcast Episode 67: The security lessons from Heartland data breach. Our take on the news.


Data Security Podcast Episode 67: The security lessons from Heartland data breach. Our take on the news.

2009-08-24 :: Ira Victor with Samantha Stone
Length: 40s

x

Share: Data Security Podcast Episode 67: The security lessons from Heartland data breach. Our take on the news.


Data Security Podcast Episode 66: Like stealing candy from a baby....is Adobe making it that easy for attackers to get into computers? The Clampi Trojan is cleaning out bank accounts, and anti-virus usually doesn't see it. Our take on the news.

2009-08-16 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 66: Like stealing candy from a baby....is Adobe making it that easy for attackers to get into computers? The Clampi Trojan is cleaning out bank accounts, and anti-virus usually doesn't see it. Our take on the news.


Data Security Podcast Episode 66: Like stealing candy from a baby....is Adobe making it that easy for attackers to get into computers? The Clampi Trojan is cleaning out bank accounts, and anti-virus usually doesn't see it. Our take on the news.

2009-08-16 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 66: Like stealing candy from a baby....is Adobe making it that easy for attackers to get into computers? The Clampi Trojan is cleaning out bank accounts, and anti-virus usually doesn't see it. Our take on the news.


Data Security Podcast Episode 65: More DefCon17 Coverage: How safe are Cloud Computing applications? Melissa Hathaway is leaving her White House job as top cyber security official, why is the main stream press not spending time on this story? Our take on

2009-08-09 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 65: More DefCon17 Coverage: How safe are Cloud Computing applications? Melissa Hathaway is leaving her White House job as top cyber security official, why is the main stream press not spending time on this story? Our take on


Data Security Podcast Episode 65: More DefCon17 Coverage: How safe are Cloud Computing applications? Melissa Hathaway is leaving her White House job as top cyber security official, why is the main stream press not spending time on this story? Our take on

2009-08-09 :: Ira Victor with Samantha Stone
Length: 35s

x

Share: Data Security Podcast Episode 65: More DefCon17 Coverage: How safe are Cloud Computing applications? Melissa Hathaway is leaving her White House job as top cyber security official, why is the main stream press not spending time on this story? Our take on


Data Security Podcast Episode 64: DefCon17 Special Report: Is YOUR tax return sitting out there on the Internet? Breaching the new “personal WiFi” hot spots, is it child’s play? Our take on the DefCon news.

2009-08-04 :: Ira Victor with Samantha Stone
Length: 34s

x

Share: Data Security Podcast Episode 64: DefCon17 Special Report: Is YOUR tax return sitting out there on the Internet? Breaching the new “personal WiFi” hot spots, is it child’s play? Our take on the DefCon news.


Data Security Podcast Episode 63: iPhone Security. Is that an oxymoron? Google Chrome Browser uses sandboxing for security. We talk to a security engineer that says his firm has built a better sandbox. Our take on this week’s news.

2009-07-27 :: Ira Victor with Samantha Stone
Length: 33s

x

Share: Data Security Podcast Episode 63: iPhone Security. Is that an oxymoron? Google Chrome Browser uses sandboxing for security. We talk to a security engineer that says his firm has built a better sandbox. Our take on this week’s news.


Data Security Podcast Episode 63: iPhone Security. Is that an oxymoron? Google Chrome Browser uses sandboxing for security. We talk to a security engineer that says his firm has built a better sandbox. Our take on this week’s news.

2009-07-27 :: Ira Victor with Samantha Stone
Length: 33s

x

Share: Data Security Podcast Episode 63: iPhone Security. Is that an oxymoron? Google Chrome Browser uses sandboxing for security. We talk to a security engineer that says his firm has built a better sandbox. Our take on this week’s news.


Data Security Podcast Episode 62: EXCLUSIVE: New tool to fight web attacks, and add to your privacy. Combining data loss prevention and identity management to protect confidential business data from security breaches. Our take on this week's news, in

2009-07-26 :: Ira Victor with Samantha Stone
Length: 33s

x

Share: Data Security Podcast Episode 62: EXCLUSIVE: New tool to fight web attacks, and add to your privacy. Combining data loss prevention and identity management to protect confidential business data from security breaches. Our take on this week's news, in


The CyberJungle, Episode 202: *Interview: Brett Kingstone The author of The Real War Against America, on industrial espionage featuring Chinese spies paying American employees to steal intellectual property. *Police Department officer indicted on feder

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 202: *Interview: Brett Kingstone The author of The Real War Against America, on industrial espionage featuring Chinese spies paying American employees to steal intellectual property. *Police Department officer indicted on feder


The CyberJungle, Episode 202: *Interview: Brett Kingstone The author of The Real War Against America, on industrial espionage featuring Chinese spies paying American employees to steal intellectual property. *Police Department officer indicted on feder

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 202: *Interview: Brett Kingstone The author of The Real War Against America, on industrial espionage featuring Chinese spies paying American employees to steal intellectual property. *Police Department officer indicted on feder


The CyberJungle, Episode 201: *RSA Interview: Mobile Security with Winn Schwartau, of Mobile Active Defense *Note: Due to studio upgrades, we break with standard format this week. Episode 201 is a two-part conversation on mobile security from the RSA Sec

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 201: *RSA Interview: Mobile Security with Winn Schwartau, of Mobile Active Defense *Note: Due to studio upgrades, we break with standard format this week. Episode 201 is a two-part conversation on mobile security from the RSA Sec


The CyberJungle, Episode 201: *RSA Interview: Mobile Security with Winn Schwartau, of Mobile Active Defense *Note: Due to studio upgrades, we break with standard format this week. Episode 201 is a two-part conversation on mobile security from the RSA Sec

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 201: *RSA Interview: Mobile Security with Winn Schwartau, of Mobile Active Defense *Note: Due to studio upgrades, we break with standard format this week. Episode 201 is a two-part conversation on mobile security from the RSA Sec


The CyberJungle, Episode 200: *Interview: SecurityMan - Skipping the alarm tax/fee *RSA Conference report: CipherCloud, businesses can encrypt data on popular cloud services like Salesforce.com *RSA Conference report: Invincea has a new technology that

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 200: *Interview: SecurityMan - Skipping the alarm tax/fee *RSA Conference report: CipherCloud, businesses can encrypt data on popular cloud services like Salesforce.com *RSA Conference report: Invincea has a new technology that


The CyberJungle, Episode 200: *Interview: SecurityMan - Skipping the alarm tax/fee *RSA Conference report: CipherCloud, businesses can encrypt data on popular cloud services like Salesforce.com *RSA Conference report: Invincea has a new technology that

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 200: *Interview: SecurityMan - Skipping the alarm tax/fee *RSA Conference report: CipherCloud, businesses can encrypt data on popular cloud services like Salesforce.com *RSA Conference report: Invincea has a new technology that


The CyberJungle, Episode 199: *Interview: "Google Tracks You...We Don't" - A new web site takes on Google, by NOT tracking you. We talk with Gabriel Weinberg of DuckDuckGo.com *Judge orders a JUROR to reveal private Facebook postings in California crimi

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 199: *Interview: "Google Tracks You...We Don't" - A new web site takes on Google, by NOT tracking you. We talk with Gabriel Weinberg of DuckDuckGo.com *Judge orders a JUROR to reveal private Facebook postings in California crimi


The CyberJungle, Episode 199: *Interview: "Google Tracks You...We Don't" - A new web site takes on Google, by NOT tracking you. We talk with Gabriel Weinberg of DuckDuckGo.com *Judge orders a JUROR to reveal private Facebook postings in California crimi

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 199: *Interview: "Google Tracks You...We Don't" - A new web site takes on Google, by NOT tracking you. We talk with Gabriel Weinberg of DuckDuckGo.com *Judge orders a JUROR to reveal private Facebook postings in California crimi


The CyberJungle, Episode 198: *Interview: Hey, is that an SMS botnet in your pocket? Smartphone security researcher Georgia Weidman in her first radio interview following Shmoocon. *Wired magazine jolts subscribers with personalized covers *Data reten

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 198: *Interview: Hey, is that an SMS botnet in your pocket? Smartphone security researcher Georgia Weidman in her first radio interview following Shmoocon. *Wired magazine jolts subscribers with personalized covers *Data reten


The CyberJungle, Episode 198: *Interview: Hey, is that an SMS botnet in your pocket? Smartphone security researcher Georgia Weidman in her first radio interview following Shmoocon. *Wired magazine jolts subscribers with personalized covers *Data reten

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 198: *Interview: Hey, is that an SMS botnet in your pocket? Smartphone security researcher Georgia Weidman in her first radio interview following Shmoocon. *Wired magazine jolts subscribers with personalized covers *Data reten


The CyberJungle, Episode 197: *Interview: HP Security Evangelist Rafel Los, on Business App Security. *Record a cop, go to jail. *The Dark Web never sleeps, even when it's lights out at Fort Dix Federal Prison. *A California Appeals court has ruled that b

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 197: *Interview: HP Security Evangelist Rafel Los, on Business App Security. *Record a cop, go to jail. *The Dark Web never sleeps, even when it's lights out at Fort Dix Federal Prison. *A California Appeals court has ruled that b


The CyberJungle, Episode 197: *Interview: HP Security Evangelist Rafel Los, on Business App Security. *Record a cop, go to jail. *The Dark Web never sleeps, even when it's lights out at Fort Dix Federal Prison. *A California Appeals court has ruled that b

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 197: *Interview: HP Security Evangelist Rafel Los, on Business App Security. *Record a cop, go to jail. *The Dark Web never sleeps, even when it's lights out at Fort Dix Federal Prison. *A California Appeals court has ruled that b


The CyberJungle, Episode 196: Is the U.S. border a hostile zone for U.S. businesss and personal data on a laptop or smartphone? New York Times: Stuxnet worm was a joint project of the U.S. and Israel, engineered to destroy the uranium centrifuges, what a

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 196: Is the U.S. border a hostile zone for U.S. businesss and personal data on a laptop or smartphone? New York Times: Stuxnet worm was a joint project of the U.S. and Israel, engineered to destroy the uranium centrifuges, what a


The CyberJungle, Episode 196: Is the U.S. border a hostile zone for U.S. businesss and personal data on a laptop or smartphone? New York Times: Stuxnet worm was a joint project of the U.S. and Israel, engineered to destroy the uranium centrifuges, what a

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle, Episode 196: Is the U.S. border a hostile zone for U.S. businesss and personal data on a laptop or smartphone? New York Times: Stuxnet worm was a joint project of the U.S. and Israel, engineered to destroy the uranium centrifuges, what a


The CyberJungle, Episode 195: Our take on CES2011: Android tablets and other smart devices...are they being designed with security in mind? Our private briefing with RIM about the new BlackBerry PlayBook. And, a candid conversation with Chris Deutschen of

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 195: Our take on CES2011: Android tablets and other smart devices...are they being designed with security in mind? Our private briefing with RIM about the new BlackBerry PlayBook. And, a candid conversation with Chris Deutschen of


The CyberJungle, Episode 195: Our take on CES2011: Android tablets and other smart devices...are they being designed with security in mind? Our private briefing with RIM about the new BlackBerry PlayBook. And, a candid conversation with Chris Deutschen of

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 195: Our take on CES2011: Android tablets and other smart devices...are they being designed with security in mind? Our private briefing with RIM about the new BlackBerry PlayBook. And, a candid conversation with Chris Deutschen of


The CyberJungle, Episode 194: Has WikiLeaks caused Bank of American to examine the contents and security of it's own internal documents? Social Engineering is part of just about every cyber attack - Ira talks with Chris Hadnagy about his new book: "Social

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 194: Has WikiLeaks caused Bank of American to examine the contents and security of it's own internal documents? Social Engineering is part of just about every cyber attack - Ira talks with Chris Hadnagy about his new book: "Social


The CyberJungle, Episode 194: Has WikiLeaks caused Bank of American to examine the contents and security of it's own internal documents? Social Engineering is part of just about every cyber attack - Ira talks with Chris Hadnagy about his new book: "Social

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 194: Has WikiLeaks caused Bank of American to examine the contents and security of it's own internal documents? Social Engineering is part of just about every cyber attack - Ira talks with Chris Hadnagy about his new book: "Social


The CyberJungle, Episode 193: A commercial pilot videos a flaw in TSA security...responsible disclosure or aiding terrorist? Mom gets prosecuted for taking photos of daughter in the tub. Lynn Powell was her friend, and wrote a book about the ordeal in "Fr

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 193: A commercial pilot videos a flaw in TSA security...responsible disclosure or aiding terrorist? Mom gets prosecuted for taking photos of daughter in the tub. Lynn Powell was her friend, and wrote a book about the ordeal in "Fr


The CyberJungle, Episode 193: A commercial pilot videos a flaw in TSA security...responsible disclosure or aiding terrorist? Mom gets prosecuted for taking photos of daughter in the tub. Lynn Powell was her friend, and wrote a book about the ordeal in "Fr

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 193: A commercial pilot videos a flaw in TSA security...responsible disclosure or aiding terrorist? Mom gets prosecuted for taking photos of daughter in the tub. Lynn Powell was her friend, and wrote a book about the ordeal in "Fr


The CyberJungle, Episode 192: Researchers are shining a light on the flaws of low-cost router/firewalls. Before there was Wikileaks, there was Cryptome. We replay an earlier interview with founder John Young. What do App makers know about you, your smart

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 192: Researchers are shining a light on the flaws of low-cost router/firewalls. Before there was Wikileaks, there was Cryptome. We replay an earlier interview with founder John Young. What do App makers know about you, your smart


The CyberJungle, Episode 192: Researchers are shining a light on the flaws of low-cost router/firewalls. Before there was Wikileaks, there was Cryptome. We replay an earlier interview with founder John Young. What do App makers know about you, your smart

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 192: Researchers are shining a light on the flaws of low-cost router/firewalls. Before there was Wikileaks, there was Cryptome. We replay an earlier interview with founder John Young. What do App makers know about you, your smart


The CyberJungle, Episode 191: McBreach on the McDonalds McContest web site, resulting in McDataTheft. Gawker Media breach could have ripples and result in government break-ins. Eric Drew wins major ID Theft case against credit bureau. Dr. Larry Ponemon re

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 191: McBreach on the McDonalds McContest web site, resulting in McDataTheft. Gawker Media breach could have ripples and result in government break-ins. Eric Drew wins major ID Theft case against credit bureau. Dr. Larry Ponemon re


The CyberJungle, Episode 191: McBreach on the McDonalds McContest web site, resulting in McDataTheft. Gawker Media breach could have ripples and result in government break-ins. Eric Drew wins major ID Theft case against credit bureau. Dr. Larry Ponemon re

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 191: McBreach on the McDonalds McContest web site, resulting in McDataTheft. Gawker Media breach could have ripples and result in government break-ins. Eric Drew wins major ID Theft case against credit bureau. Dr. Larry Ponemon re


The CyberJungle, Episode 190: Wikileaks discloses private emails from a young, NYC-based, female office worker. What lessons are here for executives? Interview with Marc Maiffret, eEye CTO, on 0days, and a new free 0day detection tool. IT error exposes co

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 190: Wikileaks discloses private emails from a young, NYC-based, female office worker. What lessons are here for executives? Interview with Marc Maiffret, eEye CTO, on 0days, and a new free 0day detection tool. IT error exposes co


The CyberJungle, Episode 190: Wikileaks discloses private emails from a young, NYC-based, female office worker. What lessons are here for executives? Interview with Marc Maiffret, eEye CTO, on 0days, and a new free 0day detection tool. IT error exposes co

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 190: Wikileaks discloses private emails from a young, NYC-based, female office worker. What lessons are here for executives? Interview with Marc Maiffret, eEye CTO, on 0days, and a new free 0day detection tool. IT error exposes co


The CyberJungle, Episode 189: Virginia AG issues guidance to teachers regarding 'cyber-bullying.' No mention of proper forensics. What could go wrong? Next target for Wikileaks: businesses? Interview with Brook Miller, VP of Govt Affairs, with Smith's De

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 189: Virginia AG issues guidance to teachers regarding 'cyber-bullying.' No mention of proper forensics. What could go wrong? Next target for Wikileaks: businesses? Interview with Brook Miller, VP of Govt Affairs, with Smith's De


The CyberJungle, Episode 189: Virginia AG issues guidance to teachers regarding 'cyber-bullying.' No mention of proper forensics. What could go wrong? Next target for Wikileaks: businesses? Interview with Brook Miller, VP of Govt Affairs, with Smith's De

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 189: Virginia AG issues guidance to teachers regarding 'cyber-bullying.' No mention of proper forensics. What could go wrong? Next target for Wikileaks: businesses? Interview with Brook Miller, VP of Govt Affairs, with Smith's De


The CyberJungle, Episode 188: CCTVs, public schools, and forensic data. Adobe PDF Reader X, now with sandboxing; Invincea PDF reader in a virtual machine. How do they compare in fighting cyber attacks? Interview with Kevin Ripa, with Computer Evidence Re

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 188: CCTVs, public schools, and forensic data. Adobe PDF Reader X, now with sandboxing; Invincea PDF reader in a virtual machine. How do they compare in fighting cyber attacks? Interview with Kevin Ripa, with Computer Evidence Re


The CyberJungle, Episode 187: News from The Paraben Forensic Innovations Conference: Next gen airline security, cloud and mobile forensics. New Android mobile devices bring a new level of tracking - where you go and what you buy with your credit cards. Pl

1969-12-31 :: Ira Victor with Samantha Stone

x

Share: The CyberJungle, Episode 187: News from The Paraben Forensic Innovations Conference: Next gen airline security, cloud and mobile forensics. New Android mobile devices bring a new level of tracking - where you go and what you buy with your credit cards. Pl


The CyberJungle Episode269: * Exclusive: Skip Duckwall on breaches via stolen hashes * Tales from The Dark Web: Med records held ransom * SocialFollow fraud * Serious Android/iOS security flaw * Topless ZuckBook photos: Privacy for me, but not for thee

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode269: * Exclusive: Skip Duckwall on breaches via stolen hashes * Tales from The Dark Web: Med records held ransom * SocialFollow fraud * Serious Android/iOS security flaw * Topless ZuckBook photos: Privacy for me, but not for thee


The CyberJungle Episode268: * Exclusive: Kevin Mitnick on SocialEngineering, unofficial talk from DefCon20 * Cybercriminals destroy a reporters digital life

1969-12-31 :: Ira Victor and Samantha Stone

x

Share: The CyberJungle Episode268: * Exclusive: Kevin Mitnick on SocialEngineering, unofficial talk from DefCon20 * Cybercriminals destroy a reporters digital life


The CyberJungle

The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.

The CyberJungle


Switch to our mobile site