Logo
    Search

    Hong Kong Deepfake Heist + Three Million Toothbrush Botnet + Hacked Canada

    enMarch 15, 2024

    Podcast Summary

    • Separating Fact from Fiction in Tech and CybersecurityFact-checking and critical thinking are crucial in the tech and cybersecurity world to separate truth from fiction.

      While there are many intriguing and seemingly far-fetched stories in the world of technology and cybersecurity, not all of them are true. The speakers in this discussion touched on various topics, from toothbrush botnets to deep fake heists, and even Craig Wright's claim to be Satoshi Nakamoto. While some stories were confirmed as true, others were debunked. The importance of fact-checking and critical thinking was emphasized. Additionally, the speakers shared their excitement for upcoming episodes of the Hacked podcast, including a tour of Canadian hacking stories and interviews with authors Douglas Coupland and Zeke Fox. The podcast also took a moment to thank their patrons for their support.

    • Chatbot Liability: Air Canada CaseChatbots can't make up info customers act on without company liability. Air Canada lost a lawsuit due to incorrect chatbot info on bereavement policy.

      The use of inaccurate chatbots on company websites can lead to costly mistakes and potential legal issues. This was demonstrated in a case where a Canadian man, Jake Moffett, successfully sued Air Canada after their chatbot provided incorrect information about their bereavement travel policy. Despite the chatbot also providing a link to the correct information, Air Canada argued that the chatbot was a separate entity and not their responsibility. However, this argument was dismissed by the tribunal, leading to a ruling in Moffett's favor. This case sets an important precedent that chatbots cannot make up information that customers can act upon without the company being held liable. The incident highlights the need for better training and boundaries for chatbots to prevent such incidents from occurring. It also serves as a reminder of the potential consequences of replacing human customer service with chatbots that lack an internal model of the world.

    • Chatbots vs Human Agents: Accountability and LiabilityWhile chatbots offer cost savings and impressive results, their lack of accountability and liability compared to human agents could lead to misinformation, compromised systems, and potential legal issues.

      While AI chatbots like ChatGPT can convincingly mimic human conversation, they lack the accountability and reliability that comes with human agents. Enterprising individuals have been pitching these chatbots as a replacement for human customer service, promising cost savings and impressive results. However, the potential for misinformation and compromised systems poses significant risks. Unlike human agents, chatbots do not have established liability structures, and their training and actions are fundamentally different. The consequences of a chatbot's errors can be severe, particularly when customers rely on the information provided to make decisions. The speaker shared personal experiences of receiving incorrect information from companies and successfully reclaiming losses due to recorded calls with human agents. This accountability is a crucial aspect of the customer-company relationship, and its absence in chatbots could lead to a lack of trust and potential legal issues. Another example of potentially misused technology is the Flipper Zero device. While it holds exciting possibilities for hobbyists and professionals, its use in unintended ways could lead to negative consequences. It is essential to consider the ethical implications and potential risks associated with adopting new technologies, especially those capable of mimicking human interaction.

    • Proposed ban on Flipper 0 in Canada for potential car system vulnerabilitiesThe Flipper 0, a versatile device for interacting with various wireless signals, faces a proposed ban in Canada due to potential car system vulnerabilities, but it's more than just a hacking tool and has educational and fun uses.

      The Flipper 0, a device marketed as a hacking tool, is facing a proposed ban in Canada due to its ability to run a WiFi server and potentially expose security vulnerabilities in certain car systems. However, the Flipper 0 is more than just a tool for malicious activities. It's a beginner-friendly device that allows users to interact with various wireless signals, including RFID, NFC, WiFi, Bluetooth, and standard radio. It's an extensible platform that can be used for a variety of fun and educational projects. Despite its potential for misuse, the Flipper 0 lacks the capabilities to bypass modern car anti-theft protections. Car theft is a significant issue in Canada, but the proposed ban seems misguided as there are other devices available that can be used for malicious purposes without being banned. The Flipper 0 community has developed extensively around this device, making it a popular choice for hobbyists and enthusiasts. If you're interested in purchasing a Flipper 0 before it potentially gets banned, it's recommended to do so as soon as possible.

    • Focusing on banning tools may not be the most effective solutionInstead of banning specific tools, enhance security measures and implement stricter regulations for anti-theft measures in cars, and approach digital issues with meaningful, technical solutions.

      While there are concerns about car theft and security vulnerabilities, particularly with regards to Tesla, focusing on banning specific tools or gadgets may not be the most effective solution. Instead, efforts should be made to enhance security measures in ports and implement stricter regulations for anti-theft measures in cars. Meanwhile, in the digital realm, a proposed bill in Canada to mandate age verification for adult content raises concerns about potential data breaches and the feasibility of implementing secure age verification systems. It's crucial to approach these issues with a focus on meaningful, technical solutions rather than performative gestures.

    • Discussion on keeping minors safe from adult content onlineStrengthen hardware and platform protections to keep minors from accessing inappropriate content, including child accounts with filters, content identification and removal tools, and parental education.

      The issue of minors' exposure to adult content on the internet is a complex problem that requires a multi-faceted solution. While there are concerns about the prevalence of adult content on social media and the need for stronger content filters, the discussion highlighted that this is a hardware level problem as well. Most minors don't have the means to purchase devices or access the internet without parental supervision. Therefore, the focus should be on strengthening hardware and platform protections to keep minors from accessing inappropriate content. This could include enabling child accounts with content filters, developing extensions that automatically identify and remove adult content, and educating parents about technology and online safety. Ultimately, the goal is to create a safe and secure online environment for minors while allowing for the legitimate adult content industry to thrive.

    • Shopify: From Online Shops to Real-Life StoresShopify is a versatile commerce platform that supports businesses from their online shop stage to their first physical store and beyond, offering an all-in-one e-commerce solution and in-person point of sale system. Despite the increasing threat of deepfakes, Shopify's award-winning help supports businesses in staying secure.

      Shopify is a comprehensive global commerce platform that helps businesses grow from their online shop stage to their first real-life store and beyond. With an all-in-one e-commerce platform and in-person point of sale system, Shopify covers various selling scenarios and integrates with numerous other platforms. Shopify powers over 10% of all e-commerce in the US and has helped renowned brands like Allbirds, Rothy's, and Brooklyn grow. The platform's award-winning help supports businesses every step of the way. An intriguing news story highlights the evolving threat of deepfake technology. A large multinational company fell victim to a deepfake conference call, resulting in a HK$200,000,000 (approximately $25,000,000 USD) transfer to hackers. This marked the first known deepfake case in Hong Kong, where hackers deepfaked an entire team of people, making the attack even more sophisticated and concerning. This incident serves as a reminder of the increasing sophistication of cybercrime and the importance of staying vigilant against such threats.

    • Exploiting Emotional Vulnerabilities in Phishing ScamsPhishing scams exploit emotional vulnerabilities, using fake calls or messages to manipulate victims into sending money or revealing sensitive information.

      Emotional vulnerabilities, whether in personal or corporate contexts, can be exploited through sophisticated scams. In the discussed example, a phishing scheme involving a fake WhatsApp call resulted in a significant financial loss for a family. The scammer pretended to be a loved one in need, exploiting the emotional bond to manipulate the victim into sending money. This level of deception can be more successful than one might imagine, especially when considering the ease of access to technology and the desire to avoid embarrassment or failure in a corporate environment. The prevalence of these scams underscores the need for improved technological solutions to identify and prevent such emotional manipulation, especially as messaging services become increasingly popular targets for scammers.

    • The scale of scamming requires more than just human vigilanceTechnical solutions and awareness campaigns are necessary to combat cybersecurity threats, as individual measures are not enough to address the vast and constantly evolving threat landscape.

      Personal security measures, such as hanging up and calling back before sending money, are effective but not intuitive in our daily communication. The scale of scamming, as discussed in relation to a potential Interpol conversation and a 200,000-person scam factory operation, is massive and requires more than just human vigilance. Technical solutions and awareness campaigns are necessary to combat these threats. An example of this is the recent reference to scams in True Detective, which highlights the prevalence of such schemes in popular culture. However, the threat landscape is vast and constantly evolving, as shown by the seemingly unrelated incident of 3,000,000 hacked internet-connected toothbrushes causing damages worth $1,000,000. These incidents underscore the importance of a multi-faceted approach to cybersecurity, with both individuals and organizations playing crucial roles in staying informed and protected.

    • Misunderstandings and falsehoods can go viralMisinformation, even if unintentional, can spread rapidly and have serious consequences, especially in the tech and security space. Always fact-check and verify claims before sharing them.

      The spread of misinformation, even if it's based on a misunderstanding or a falsehood, can go viral and reach a massive audience in a short amount of time. This was demonstrated in a recent incident where a cybersecurity firm's hypothetical scenario about a toothbrush botnet was mistranslated and published as fact by a Swiss newspaper, leading to widespread media coverage and public fascination. The incident highlights the importance of fact-checking and the potential consequences of misinformation, especially in the tech and security space. It also raises questions about the authenticity of claims made by individuals or organizations, as seen in the ongoing trial of Craig Wright, who claims to be Satoshi Nakamoto, the creator of Bitcoin. Despite the uncertainties and potential misinformation surrounding the case, the outcome could have significant implications for ongoing legal disputes related to Bitcoin's intellectual property.

    • Craig Wright's Satoshi Claim: Strange Proceedings in CourtCraig Wright's ongoing court case for his claim to be Satoshi Nakamoto has unusual proceedings and lacks concrete proof, leaving many skeptical. Potential implications for lawsuits against crypto platforms if he wins.

      The ongoing court case involving Craig Wright's claim to be Satoshi Nakamoto carries significant implications for the crypto industry. If Wright wins, he could potentially gain an advantage in his ongoing lawsuits against cryptocurrency platforms. However, the case has been unusual, with Wright presenting anecdotal evidence and his sister testifying about seeing him dressed as a ninja when she was young. The lack of concrete proof, such as accessing the original Bitcoin wallets, has left many skeptical. Despite the intrigue, the case has been criticized for its strange proceedings. If Wright were to appear on the podcast and share his story firsthand, it could provide new insights into the mystery of Satoshi Nakamoto's identity. Regardless of the outcome, the case continues to fuel speculation and fascination within the crypto community.

    • Potential Value of Discovering Bitcoin's Origin CodeThe discovery of Bitcoin's original code or Easter eggs might be intriguing, but the true value of cryptocurrencies lies in their decentralized, open-source nature and potential for innovation and financial freedom.

      The origin code and proof of concept for the creation of cryptocurrencies like Bitcoin and blockchain, including any hidden "Easter eggs," could potentially hold significant value in establishing authenticity and ownership. However, without definitive evidence, such as access to the original wallets or code, it's unlikely that a court would be able to definitively prove that a particular individual is the true creator. The open-source nature of cryptocurrencies, as intended by their creators, is a key component of their value proposition. While the idea of discovering an Easter egg or original code might be intriguing, it's essential to remember that the true value of cryptocurrencies lies in their decentralized, open-source nature and the potential for innovation and financial freedom they offer to users.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    L'état des ransonwares en 2022

    L'état des ransonwares en 2022

    Tout les ans Sophos publie une étude qui présente les expériences réelles des professionnels de
    l’informatique, qui sont en première ligne dans le monde entier, face aux ransonwares. L’enquête jette notamment un nouvel éclairage sur le lien entre ransomware et cyberassurance, et sur le rôle joué par l’assurance dans l’évolution des cyberdéfenses. Christophe Pepin, responsable des partenaire stratégique de Sophos France nous présente les points les plus frappants de cette étude.

    54 - STOLEN- Scams Ransomware Phishing and Social Engineering with Farshad Abasi

    54 - STOLEN- Scams Ransomware Phishing and Social Engineering with Farshad Abasi

    Staying protected online in a digital age is not easy, but there are things you can do to stay safe. Listen to our new episode to find out how you can keep your data secured and what to do in case of an attack.

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"
    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    Contenuto sponsorizzato

    Massimo Carlotti, pre sale team leader di CyberArk, è di nuovo al microfono per un podcast realizzato con il supporto di Radio IT. Insieme a Igor, parla della "piaga tecnologica" più diffusa durante il lockdown (il phishing), di sicurezza perimetrale e dei suoi limiti, dell'impatto sulle critical app (quelle senza le quali il business dell'azienda di blocca).

    E poi parla dei CISO, i Chief Information Security Officer (o direttori della sicurezza informatica), e di come troppo spesso in azienda il loro compito - fornire informazioni importanti per non avere problemi - sia spesso frainteso, e loro vengano visti come dei guastafeste.

    Un podcast ricco di spunti: buon ascolto!

    Altri contenuti su www.radioit.it

    What You Need to Know about Cybersecurity

    What You Need to Know about Cybersecurity

    Today's special episode features audio from a webinar that we had earlier this year. In the audio you will hear from Jordan and our special guest, CEO of Mapletronics, Wes Hershberger. We and Jordan discuss current cybersecurity threats and how you can begin to protect yourself and your business. 

    Discussion includes: email safety, phishing protection, educating employees, strong password policies, data encryption, geofencing, online shopping safety, and more. 

    Navigating the Chatbot Jungle: Cyber Mindful Conversations

    Navigating the Chatbot Jungle: Cyber Mindful Conversations
    Unveil the fascinating world of AI chatbots with Sandra Estok on this enlightening episode of Cyber Mindful Podcast. From the promises of time-saving interactions to the potential pitfalls of data exploitation, Sandra navigates the intricate landscape of artificial intelligence. Real-life stories underscore the importance of responsible usage and safeguarding personal data.

    Join the conversation as Sandra demystifies AI chatbots, likening them to interactive companions within our devices. Explore the benefits and frustrations of these digital assistants, gaining insights into their vast potential and occasional limitations. The narrative takes a cautionary turn with stories of data exploitation, emphasizing the need for mindful and intentional engagement in the digital realm.

    In this episode, Sandra equips listeners with practical tips for secure chatbot interactions. From verifying platform legitimacy to avoiding oversharing, these rock-solid guidelines ensure a safer and more intentional digital experience.

    Sandra Estok is the founder of Way2Protect™, author of the international bestselling “Happily Ever Cyber!™” book, and the Cyber Literacy series for children. With over 25 years of experience in Cybersecurity, IT, and Data Privacy, Sandra is a Keynote Speaker and Corporate Trainer. Her mission is to empower women to take charge of their cyber safety and have Peace of Mind Online.

    Connect with Sandra:
    Website SandraEstok.com
    Social media handle: @Way2Protect

    Watch Sandra Estok's TEDx talk “What an identity theft victim can teach about cybercrime”: here. Or copy this link directly into your browser: https://www.ted.com/talks/sandra_estok_what_an_identity_theft_victim_can_teach_us_about_cybercrime