Personal Pest Control: Cybersecurity Awareness Month
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate.Resources$61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a ScamPassGAN: A Deep Learning Approach for Password GuessingHistoric UK KNP transport firm collapses after ransomware attackHacker leaks account data of 12 million Zacks Investment usersResearchers Instantly Crack Simple Passwords With AILost $45k to Wire Fraud Scam on E*TRADE – Even with MFA Enabled.Send us a textSupport the showJoin our Patreon to listen ad-free!
--------
23:25
--------
23:25
AI Gone Rogue: Delusional Chats Lead to Heartbreak
AI is great for researching topics and digging up information. But what happens when people start to humanize their chatbots, and think they're talking to God? Or that they are God? Let's look at what makes AI come up with delusional theories, and why it tells people they're right even then they're wrong. ResourcesPeople Are Losing Loved Ones to AI-Fueled Spiritual FantasiesTowards Understanding Sycophancy in Language ModelsI, Robot by Isaac AsimovSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
23:11
--------
23:11
Quick Tip: Protecting Your Money With Face ID
There's a new scam going around, where a thief gets you to unlock your phone under the guise of needing to make a call, then runs off with the phone and sends themselves all your money through your apps. Learn how to protect yourself and your money with a simple smartphone trick for iPhone and Android.Send us a textSupport the showJoin our Patreon to listen ad-free!
--------
4:28
--------
4:28
Bug Bounties: Getting Paid to Hack
The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays we have Bug Bounty programs, where hackers get paid to find and disclose security flaws, and even get some cash for their work.ResourcesInternet Scanner Finds Security HolesCERIAS - Center for Education and Research in Information Assurance and SecurityA history of bug bounty programs & incentivised vulnerability disclosureWearing Many Hats: The Rise of the Professional Security HackerHacking the PentagonSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
23:29
--------
23:29
Red Team: The Best Job in Cybersecurity (Until You Get Arrested)
What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of the most notorious Red Team exercises in history, when two Coalfire employees were arrested and fought a long legal battle, just for doing their jobs. ResourcesInside the Courthouse Break-In Spree That Landed Two White-Hat Hackers in JailDarknet Diaries Episode 59: The CourthouseCoalfire Systems websiteDEF CON 22 - Eric Smith and Josh Perrymon - Advanced Red Teaming: All Your Badges Are Belong To UsHow RFID Technology Works: Revolutionizing the Supply ChainNolaCon 2019 D 07 Breaking Into Your Building A Hackers Guide to Unauthorized Physical AccessSend us a textSupport the showJoin our Patreon to listen ad-free!