Logo
    Search

    Podcast Summary

    • Uber account taken over with complex consequencesDigital life interconnections can lead to unexpected complications, requiring vigilance and protection for online accounts and personal information.

      Even the most seemingly simple tech issues can lead to complex and time-consuming investigations. In this case, our boss, Alex Blumberg, thought he was dealing with a hacked Uber account. But as the team at Reply All discovered, the issue was much more complicated. Alex's Uber account had been taken over, and the hacker was able to place rides and charge his bank account. But when Alex tried to access his account, he was treated as a new user, with no record of his previous rides or information. Despite his efforts to contact Uber for help, he was met with unresponsive emails. The team's investigation led them to discover that Alex's phone number had been ported without his knowledge, allowing the hacker to take control of his Uber account. The incident serves as a reminder that our digital lives are more interconnected than we may realize, and that even seemingly small issues can have far-reaching consequences. It's important to stay vigilant and take steps to protect our online accounts and personal information.

    • Navigating Complex Customer Service IssuesDespite digital advancements, dealing with customer service issues can still be frustrating. Persistence and resourcefulness are key to resolving complex problems, but data security concerns remain a significant challenge.

      Even in today's digital age, navigating through complex customer service issues can be frustrating and time-consuming. The speaker's experience with Uber, where they were repeatedly sent the same form letter and had to send numerous emails to get a human response, is a common occurrence for many consumers. The situation became more complicated when the speaker's account was hacked, and their personal information was erased. The speaker's persistence and resourcefulness paid off when they finally reached a human representative by calling a support number intended for critical situations. However, the incident raises concerns about data security and the ease with which personal information can be accessed and manipulated on the dark web. The speaker's experience is a reminder that consumers must remain vigilant and proactive when dealing with customer service issues and potential data breaches.

    • Dark Web Uber Accounts Selling for $4.7 EachHackers sell Uber accounts on the dark web for $4.7 each, often obtained through credential stuffing, and using the same password for multiple online services increases the risk of account breaches. Use a password manager to generate unique, strong passwords for each account.

      The dark web is a marketplace for stolen information, including Uber accounts, and password reuse is a major security risk. The reporter in this discussion came across a vendor selling Uber accounts on the dark web for as little as $4.7 each. When asked about the source of these accounts, the vendor and hackers interviewed denied any involvement in a Uber data breach. Instead, they explained that hackers use software to test stolen email and password combinations on various websites, including Uber, in a process called credential stuffing. The risk here is that people often use the same password across multiple online services, making it easier for hackers to gain access to multiple accounts. The best defense against this is to use a password manager, which generates unique, strong passwords for each online account. This incident serves as a reminder to be vigilant about password security and to avoid using the same password for multiple online services.

    • Check if your data has been breached with haveibeenpwned.comBeing notified of a data breach on haveibeenpwned.com doesn't mean all your data has been exposed, but it's a good starting point for protecting your online information. Stay vigilant and take steps to secure your accounts.

      The more we use the internet and create online accounts, the more vulnerable we become to data breaches. Troy Hunt, an internet security researcher, created the website haveibeenpwned.com to help people find out if their personal information has been exposed in data breaches. During the conversation, it was revealed that even if a person's email address is not found on the site, it doesn't necessarily mean their data hasn't been breached and leaked. In fact, in 2016, 360 million Myspace accounts were discovered on the dark web, but they had been taken in 2013 and weren't yet in Troy's database. So it's important to remember that there are unknown unknowns when it comes to data breaches. In the specific case discussed, it was discovered that the person's Uber account may not have just been deleted, but hacked, and their hacker may have also gained access to their Gmail account. This goes to show how important it is to be vigilant about online security and to take steps to protect your information.

    • Monitor email account activity logs for unauthorized accessRegularly review email account activity logs to detect and prevent unauthorized access, even with two-factor authentication enabled.

      Email accounts can be compromised even with two-factor authentication, and it's important to regularly monitor account activity logs for any suspicious access. Melanie Ensign, Uber's security representative, explained that someone had been clicking on verification links sent to Alex's email account, indicating unauthorized access. Although Alex had two-factor authentication enabled, the hacker was able to access his account from a remote location, potentially the Bahamas, as shown in the access logs. Dave Maynor, a security researcher, confirmed that such incidents are common, and hackers often sell compromised credentials in bulk. To protect against such attacks, it's crucial to regularly review account activity logs and take immediate action if any unauthorized access is detected.

    • Uber Family's Gmail Accounts Compromised: Source UnclearCybersecurity breaches can be unpredictable and difficult to trace, emphasizing the importance of ongoing vigilance and skepticism.

      Even with advanced security measures in place, it can be challenging to determine the source of a cybersecurity breach with absolute certainty. In this case, a family's Gmail accounts were compromised, and while initial suspicion fell on a Surface Pro tablet, a full scan with Windows Defender did not reveal any threats. Uber, a multibillion-dollar company, and the Bloomberg family, known for their cybersecurity savvy, were left puzzled. Despite Uber's claim of sending emails about suspicious activity, the recipients did not receive them. This incident highlights the complexity and unpredictability of cybersecurity threats and the importance of maintaining a healthy skepticism and ongoing vigilance.

    • Finding Lost Emails: A Persistent ApproachWhen important emails seem lost, explore various methods to retrieve them, such as Google's email restoration feature or using an administrator console to search email logs. Persistence and backup methods are crucial in ensuring email availability.

      Sometimes, important emails can be lost or seemingly lost, but there might be ways to retrieve them. In this case, the host of a podcast was determined to find emails that Uber allegedly sent to a colleague, but they seemed to have vanished. The host reached out to the Uber employee who had originally claimed to have the emails, but she only provided time stamps. The host then discovered a Google feature that could restore permanently deleted emails, but with a limited window. After submitting a request, the emails were restored, but they didn't contain the expected emails from Uber. Frustrated, the host contacted Google support and learned about an alternative approach: using the administrator console to search for emails in the company's email logs. This method revealed several emails, but they were all related to the colleague inquiring about unrecognized charges on his Uber account. The host then contacted Uber again, and they explained that an unauthorized person had obtained Alex's password from a data dump and used it to request trips, which might have triggered the emails the host was looking for. The incident highlights the importance of having backup methods for important emails and being persistent in searching for them. It also underscores the potential risks of data breaches and the need for strong password security.

    • Hackers intercept journalist's Uber account notificationsUsing the same password for multiple online accounts and an old, inactive email for notifications increases security risks. Keep email addresses updated and use unique passwords for each account.

      Using the same password for multiple online accounts and an old, inactive email address for account notifications can lead to serious security breaches. In this case, a journalist named Alex Bloomberg had his Uber account hacked, and the hackers were able to steal his rides by intercepting account notifications sent to his old, inactive work email address. The hackers had obtained Alex's password from a previous data breach on a different website. The investigation into the incident involved teams from Uber and Google, as well as the hosts and listeners of a podcast. The discovery that Alex's old email address was still associated with his Uber account and that he had used the same password for multiple websites highlighted the importance of using unique passwords for each account and keeping email addresses up-to-date. The incident serves as a reminder to be vigilant about online security and to take steps to protect against potential breaches.

    • Uber's Cover-up of a Major Data BreachUber's failure to disclose a 2016 data breach affecting 57 million users, which was covered up by paying hackers, underscores the significance of transparency and honesty in handling data breaches, and raises ethical concerns about bug bounty programs as a solution.

      In 2016, Uber experienced a massive data breach that affected 57 million users. The company chose to cover it up for over a year instead of disclosing the breach to the public. Hackers had gained access to Uber's servers through a GitHub account and demanded a ransom. Uber, rather than involving law enforcement, opted to enter into a "bug bounty program" with the hackers, paying them to keep quiet about the breach. This incident highlights the importance of transparency and honesty from corporations when dealing with data breaches, as well as the potential consequences of attempting to hide such incidents. It also raises questions about the ethics and effectiveness of bug bounty programs as a solution for data breaches.

    • Uber's Hidden Data Breach and Bug BountyUber paid a large bug bounty to hide a data breach affecting millions, raising concerns about their security practices and trustworthiness.

      Uber kept a significant data breach hidden for years, paying a large bug bounty to the hacker involved under the condition of confidentiality. The average bug bounty reward at Uber is relatively high, reaching $100,000 - a sum described as "ransom-like." To receive payment, hackers must provide identifying information, which Uber then receives. Uber was criticized for their handling of the breach, as they initially denied having experienced one when asked in 2015. While they eventually disclosed the hack in 2017, they faced backlash for their initial dishonesty. The hack affected millions of users, and Uber's response raised questions about their security practices and trustworthiness.

    • Uber's Handling of Data Breach Raises Concerns Over IntegrityUber's failure to inform users of a data breach and lack of transparency has raised concerns about the company's integrity. Users deserve explanations and steps to prevent future incidents.

      Transparency and accountability are crucial during data breaches. Uber's handling of the hack incident, where they did not inform affected users to change their passwords, has raised concerns about the company's integrity. The resignation of former CEO Travis Kalanick does not change the fact that Uber needs to be more forthcoming with their users. Users deserve an explanation of why the breach occurred and what steps the company is taking to prevent similar incidents in the future. Accountability and transparency are essential for rebuilding trust and maintaining a positive reputation. Uber's impunity and lack of communication have left many feeling frustrated and concerned. The incident serves as a reminder for all companies to prioritize their users' security and keep them informed during crises.

    Recent Episodes from Reply All

    Search Engine with PJ Vogt

    Search Engine with PJ Vogt
    PJ Vogt introduces his new show, Search Engine, where he digs into all kinds of questions, big and small. On this episode: why are drug dealers putting fentanyl in everything?  You can find the concluding episode of the story here.  To find more episodes of Search Engine or to submit a question to the show, go here. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    A Message About the Future of the Show

    A Message About the Future of the Show
    Some news: Emmanuel and Alex will be stepping away from making the show. And this iteration of Reply All will be ending in late June. This isn’t a decision that was made by any one person. Reply All has always been a super collaborative project which is what we’ve loved so much about making it. Ultimately, staff who have been working on this show for a long time – in some cases five, six, seven years at this point – are ready to pursue other things. Making this show has been an incredible pleasure. Thank you all so much for listening. We hope you join us for our remaining episodes, including our last one, on June 23rd. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    #91 The Russian Passenger

    #91 The Russian Passenger
    Somewhere in Russia, a man calls for a car. Somewhere in New York City, a stranger's phone buzzes. Email us at replyall@gimletmedia.com and use the subject "theory" if you think you can provide us additional information. Further reading haveibeenpwned.com A good article on how and why you should use password managers, and the best password managers out there. Further listening Simplicity by Macroform Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Bringing Departments Together in Harmony | Gabe Larson

    Bringing Departments Together in Harmony |  Gabe Larson
    Today it’s just Gabe sharing an interesting experience he had this past week through which he learned some useful lessons. Sometimes leaders can go over a line with how they treat other leaders, which is exactly what Gabe witnessed recently and discusses. We cannot be successful without the various moving parts that make up a business, such as the technology and operations team, or the customer service team. Being able to communicate effectively is essential to overall company harmony and growth.

    Working through a customer transformation project with a company 0:51
    A bit of advice for all operations professionals 1:25
    Structure and process 4:06
    Solving a problem together 8:31

    “This is not a problem that can be solved just by an ops person. This cannot just be solved by a CX person. You really need the combination to come together and see if they can map this out in a way that doesn’t feel so disjointed.” 8:41

    Managing Remote Workers | Working with COVID-19

    Managing Remote Workers | Working with COVID-19
    A Stanford University study found that productivity actually increases among remote workers. They claim that it was close to an extra day per person per week while workers were at home. Especially with recent events, including COVID-19, more companies are being forced to have more remote workers. This brings new challenges and possibilities for productivity, but how do we effectively manage a remote team during this time? In this episode, we will be going over 20 ideas for how to effectively manage our workers during this time.

    Working Remotely 0:10
    Start of 20 Tips 2:54

    “Top 3 issues...when working remotely were 1. Unplugging After Work 2. Loneliness 3. Communication or Collaboration.” 1:46

    How I Built Resilience: Jennifer Neundorfer of January Ventures

    How I Built Resilience: Jennifer Neundorfer of January Ventures
    January Ventures is an investment firm that is trying to address the unique challenges and biases faced by entrepreneurs often under-represented in business, including women and people of color. The firm's co-founder and managing partner Jennifer Neundorfer says that despite more attention in the recent months, great ideas from these diverse groups have always been there. These conversations are excerpts from our How I Built Resilience series, where Guy talks online with founders and entrepreneurs about how they're navigating turbulent times.

    Order the How I Built This book at:
    https://smarturl.it/HowIBuiltThis

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    How to Create GREAT Customer Experience?

    How to Create GREAT Customer Experience?
    For many organizations, the promise of great experience and service is an elusive and challenging goal. In this conversation, Oracle’s Senior Vice President of Global Marketing, Nate Skinner, explains how your company can create unforgettable customer experiences.

    In this video, you will learn about these topics:
    -- Customer experience at Oracle
    -- What is customer experience (CX)?
    -- How you can create excellent customer experiences
    -- Technology and personalization to enable customer experience
    -- Future of customer experience: Machine learning and AI

    About Nate Skinner: For over 20 years, Nate has been building, executing, and leading marketing & sales programs for B2B technology companies, including Oracle, Salesforce, Amazon Web Services, Campaign Monitor, Embarcadero Technologies, and Borland Software.