Jan 27 2009
Lies, damn lies, and statistics. Nothing makes us more excited than being able to correlate actual monetary losses to major breaches, and a study in Maine that does exactly that leads us off this week. (Maybe some other things excite us more, but we’re not about to talk about those on the podcast). From there we dig into the pittance of information available on the Monster.com breach, before heading off into pundit land as we discuss the White House priorities for Homeland Security, spammers and short-lived websites, and yet another idiot leaving sensitive data on portable storage (an MP3 player).
We recorded during the work day this week, so a few times you get to hear our phones in the background. We promise we didn’t just add them in there to trick all of you into thinking we really have jobs.
- Maine surveys banks to determine some of the losses associated with major data breaches. It isn’t a small number.
- Monster.com loses some data. They don’t tell us who’s data they loss, or how or why, but they definitely lost some stuff.
- The White House homeland security agenda. There’s a cyber section. Which is cool, because someone can at least spell cyber.
- Phishers change URLs. We’re not sure why this is news, but we use it as an excuse to talk about other, more important things.
- A man buys a used MP3 player in New Zealand, with personal info on US soldiers in Iraq. WTF? Maybe it was a Zune?
- Tonight’s Music: Mexicolas with Big in Japan
One Response to “Network Security Podcast, Episode 136”