Logo
    Search

    Podcast Summary

    • University systems with weak security measures allow unauthorized access using SSNsUniversity systems and other organizations handling sensitive information must prioritize robust security measures to prevent unauthorized access using SSNs or other personal data.

      Many university systems, including those used for enrollment verification, may have weak security measures in place, potentially allowing unauthorized access to sensitive information using just a person's Social Security number. This was illustrated in the caller's story, where they were able to obtain someone else's transcript by inputting the wrong Social Security number. This issue has wider implications, as demonstrated by a similar incident involving an MLA in Alberta, Canada, who also discovered a vulnerability in a COVID certification system. The ease with which such vulnerabilities can be found raises concerns about the security of personal data stored in these databases. It's important for organizations to prioritize security measures, especially when dealing with sensitive information.

    • Outdated systems and vulnerabilities in forms can lead to data breachesOutdated systems, rigid Social Security number generation, and lack of security checks can make forms vulnerable to data breaches. Be aware and take steps to secure your systems, especially when dealing with sensitive information.

      The lack of security in a form or system can lead to serious data breaches, even without the use of advanced hacking techniques like SQL injection. The speaker shared an experience where a form at a school was vulnerable, allowing anyone to access records with potentially similar Social Security numbers. This issue was due to the outdated system of generating Social Security numbers, which had a rigid structure and limited the total possible numbers. War dialing, a method of discovering connected devices on a network, was mentioned as a potential tool to exploit this vulnerability. The speaker also drew parallels to the movie "The Social Network," where a character hacks a campus network. It's important for organizations to be aware of such vulnerabilities and take steps to secure their systems, especially when dealing with sensitive information like personal data.

    • Thinking creatively can lead to significant savings or even free accessCreative problem-solving can unlock opportunities for personal gain, from fake parking tickets to free tennis passes

      Creativity and resourcefulness can lead to significant savings or even free access to desirable services or events, as demonstrated by the caller's experience of getting free parking for an extended period by creating fake tickets, and his desire to replicate a similar hack for tennis tournament passes. This not only showcases the power of thinking outside the box but also highlights the often overlooked opportunities for personal gain through simple, low-risk methods. The caller's story also touches upon the theme of accessibility and exclusivity, as well as the human tendency to desire better experiences, even if they come with a higher price tag. The caller's reflection on his past experiences, including photoshopping bus passes in high school, adds depth to the discussion and emphasizes the importance of always looking for opportunities to hustle and improve one's situation.

    • Discovering potential and moral compass at a young ageThrough unconventional experiences, young people can discover their abilities and moral compass, shaping their future decisions.

      Even at a young age, people can discover their skills and resourcefulness, sometimes through unconventional means. The speaker shares his experience of working as a 13-year-old parking attendant during a carnival exhibition, where he was later given more responsibility and discovered the potential for making extra money. He admits to feeling guilty but also felt a sense of accomplishment. This experience shaped his understanding of his abilities and his moral compass, which he has carried with him throughout his life. Despite having a strong sense of justice, he acknowledges his desire to bend the rules for personal gain but ultimately chooses not to. This anecdote highlights the importance of personal growth, learning from experiences, and making ethical choices.

    • Shopify makes platform switching easy with intuitive features, trusted apps, and powerful analyticsShopify offers a user-friendly experience for businesses looking to switch commerce platforms, with access to reliable apps and comprehensive analytics, even during a trial period for $1 a month

      Shopify simplifies the process of switching commerce platforms, offering intuitive features, trusted apps, and powerful analytics used by leading brands. For a trial period of $1 per month, businesses can sign up at shopify.com/tech. Meanwhile, podcast advertising through Lipson Ads allows businesses to reach engaged listeners across top podcasts, with options for host endorsements or running reproduced ads. The "Air Traffic Out of Control" podcast offers intriguing recordings of pilot conversations. As for the caller's story, beware. Discord servers labeled as "family" might be thirst traps, exploiting hormones and potentially leading to financial scams. Stay informed and be cautious.

    • Discord users warned of verification bot scamsUsers should never scan a QR code inside Discord for verification and be cautious of suspicious links or messages, even if related to popular franchises.

      Discord users should be cautious of verification bots requesting QR code scans, as these bots are often used in scams to gain unauthorized access to accounts. The discussion also highlighted a recent incident where a hacker used a fake verification bot to gain access to a victim's Discord account and linked PayPal account, resulting in unauthorized purchases. The hacker used the victim's Discord profile to purchase Discord Nitro, which could then be resold or gifted to others. The incident serves as a reminder that users should never scan a QR code using the QR code scanner inside the Discord app itself, as it is typically used for verification purposes. Instead, users should manually enter the verification code if necessary. Additionally, users should be wary of clicking on links or messages that seem suspicious, even if they are related to popular franchises like Fast and the Furious. The caller shared their personal experience of trying to go after scammers in the past, emphasizing the importance of cybersecurity awareness and best practices.

    • A scam baiter infiltrates scammers' computers to expose their schemesScammers collaborate across types and borders, making it crucial to share knowledge and work together to combat cybercrime

      A scam baiter named [Name] used remote access software like AnyDesk to infiltrate scammers' computers, gaining access to their tools and endpoints. He collaborated with other YouTube scam baiters and together they targeted various types of scammers, including Indian call center scammers and crypto scammers. The crypto scammers were primarily based in Nigeria and Cyprus, where many Nigerian scammers have fled due to persecution. One crypto scammer's friend's computer was hacked, and it turned out that the friend was an email scammer. Email scams often involve pretending to be a CEO or a business and requesting payments. This is considered mail fraud and is now likely email fraud as well. [Name] discovered that sending mass invoices is a form of fraud, assuming that some companies will pay them without question. While on the email scammer's computer, [Name] had been observing the scammer for weeks. This story illustrates the complex and interconnected nature of cybercrime and the importance of collaboration and knowledge sharing in the fight against it.

    • Infiltrating a scammer's system reveals the complexity of online fraudOnline scams involve various levels of criminals and require constant vigilance against email, call center, and other types of fraudulent activities.

      The world of online scams is more complex than it seems, with various levels of scammers and organized crime involvement. The speaker, in an attempt to help businesses, infiltrated a scammer's system and discovered the difficulty of reaching high-level executives when their emails have been compromised. Despite the risks, the speaker continued to investigate until they were discovered, leading to a dangerous situation. This incident sheds light on the intricacy of online scams and the importance of cybersecurity measures. Additionally, the speaker's experience showcases the hierarchy of scammers, from call center scammers to email scammers, highlighting the need for constant vigilance against various types of fraudulent activities.

    • Email hacks in business: A common tactic for sophisticated fraud schemesStrengthen IT security to prevent email hacks, be cautious when sharing cybersecurity info, and always go through the IT department.

      Email hacking is a common method used in sophisticated fraud schemes, particularly in the accounting and payroll departments of businesses. These scams often involve hacking into executive emails to fabricate expenses and force staff to pay them. The perpetrators behind these scams are often organized crime groups based in Eastern Europe and Asia. Once an email is compromised, it can be difficult to detect and prevent the fraudulent activity. It's crucial for businesses to have strong IT security measures in place to protect against email hacks. The caller in the discussed scenario attempted to warn a company about a potential email hack, but the receptionist unintentionally revealed the warning to the hacker, highlighting the importance of proper communication and understanding of cybersecurity threats within an organization. If you find yourself in a situation where you have important cybersecurity information to share with a company, it's best to go through the IT department rather than trying to contact executives directly.

    • Exploring the World of Scambaiting and Its Role in IT SecurityScambaiters use tactics like forged documents and social engineering to expose online scammers, IT departments play a crucial role in handling such situations, and the importance of robust IT security and strong database designs cannot be overstated.

      The world of scambaiting, where individuals intentionally engage with online scammers to expose and disrupt their activities, is a complex and intriguing field. IT departments play a crucial role in handling such situations, often taking swift action to protect their organizations. Scambaiters like Jim Browning and Kit Boga are well-known figures in this community, using various tactics such as forged documents and social engineering to outmaneuver scammers. An intriguing story emerged about an investigation in Cyprus, which could potentially yield valuable insights into scamming operations. The importance of robust IT security and the potential risks associated with weak database designs were also emphasized. Overall, the discussion highlighted the cat-and-mouse game between scambaiters and scammers, showcasing the importance of staying vigilant and informed in the digital age.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    This week in the Enterprise News, Mission Secure Announces Series B, Akamai Technologies Acquires Inverse, for Microsoft, Security is a $10 Billion Business, Sontiq acquires Cyberscout, IRONSCALES improves the ability to detect phishing attacks, Imperva updates its WAAP and Data Security offerings, SonicWall Confirms A Zero-Day Vulnerability with NO other details, Arista intros Multi-Domain Macro-Segmentation Service (I don't know what it means, but its provocative), & more!

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    This week in the Enterprise News, Mission Secure Announces Series B, Akamai Technologies Acquires Inverse, for Microsoft, Security is a $10 Billion Business, Sontiq acquires Cyberscout, IRONSCALES improves the ability to detect phishing attacks, Imperva updates its WAAP and Data Security offerings, SonicWall Confirms A Zero-Day Vulnerability with NO other details, Arista intros Multi-Domain Macro-Segmentation Service (I don't know what it means, but its provocative), & more!

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw215

    Nemours Use Of RSA Archer To Manage Compliance Risk - Kevin Haynes - SCW #22

    Nemours Use Of RSA Archer To Manage Compliance Risk - Kevin Haynes - SCW #22

    Customer perspective on the three topics discussed with RSA in first segment Also: -What is your view of security vs. compliance vs. risk? -What drives your security program initiatives? -What are the biggest challenges in administering a security program?

     

    To learn more about RSA Security, visit: https://securityweekly.com/RSAsecurity

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/SCWEpisode22

    Fraud, Scams, and Other Assorted Awfulness - Jorij Abraham, Global Anti-Scam Alliance

    Fraud, Scams, and Other Assorted Awfulness - Jorij Abraham, Global Anti-Scam Alliance

    Many of us have fallen victims to scams.  Most of us know someone else who has.  Fraud did not start with the Internet, but it has unfortunately become an integral part of the online experience.

    Jorij Abraham is Managing Director of the Global Anti-Scam Alliance (GASA), a non-profit organization based in Amsterdam and a partner to CyAN.  

    In today's Secure-in-Mind episode, we talk about GASA's mission fighting scams of all sorts.  What is a scam?  What types of scams are most common around the world, who are the victims, and who are the major perpetrators?  

    Jorij shares his experience in helping to fight abuse, whether it involves fake work visa promises, business email compromise, as well as subscription, romance, crypto, and many other scams that defraud innocent victims of their money.  How are we working with law enforcement?  What are tech companies doing to fight scams?   And, as always, we ask Jorij his views on what the future will bring.

    CyAN strongly endorses GASA's mission; visit them at https://gasa.org, as well as their https://scamadviser.com service where you can check whether something is a known scam.  

    Consider also register for GASA's annual summit in Lisbon, Portugal, on Oct 18-19 2023 - https://www.gasa.org/event-details/4th-global-anti-scam-summit-2023

    You can find Jorij on LinkedIn at https://www.linkedin.com/in/jorijabraham/

    The Cybersecurity Advisors Network lives at https://cybersecurityadvisors.network -

    This episode is available as a video at https://youtu.be/XidPnG6SmaY

    All our various media channels are here: https://cybersecurityadvisors.network/media

    Intro/outro music courtesy of Studio Kolomna via Pixabay: https://pixabay.com/users/studiokolomna-2073170/