Logo
    Search

    Podcast Summary

    • History of malicious advertising (malvertising) on the internetThe internet's economic foundation leaves room for malicious actors to exploit advertising networks, leading to significant security risks such as malware distribution through malicious ads.

      The internet's economic foundation, which relies heavily on advertising networks, can be exploited, leading to significant security risks. In 2013, Yahoo experienced a major breach where malware was delivered to users through malicious ads served by networks like Rubicon. This resulted in millions of users being exposed to ransomware, generating thousands of dollars daily for the cybercriminals. Malvertising, or malicious advertising, has been a growing concern since at least 2007, with criminals using online ads to install unwanted or malicious software. Initially, these ads were just simple images, but they have since evolved to become more sophisticated and harder to detect. The basic economic model of the internet, which involves websites selling their visitors' eyeballs to advertisers through networks, leaves room for vulnerabilities. Understanding the history and techniques of malvertising is crucial to staying protected in today's digital landscape.

    • The shift from Flash to HTML5 in online advertising and the renewed focus on securing HTML5 adsOnline advertising's evolution brought sophisticated attacks, with Flash being a significant contributor. Now, with HTML5, there's a renewed focus on securing these ads against potential exploits, depending on the display network's regulation.

      The evolution of online advertising has led to increasingly sophisticated attack vectors, with Flash being a significant contributor to early malvertising attacks due to its ability to deliver and execute code. Now, with the rise of HTML5 animations, which function as mini web pages, there is a renewed focus on securing these ads against potential exploits. The level of security depends on the display network, with major players like Google taking extensive precautions, while smaller, less regulated networks may be more vulnerable to attacks. The death of Flash marked a turning point in the industry, but the potential for malicious code in HTML5 ads remains a concern.

    • Malvertising: Two Levels of RiskMalvertising can exploit pre-existing vulnerabilities to install malware or trick users into downloading unwanted files, putting your computer at risk. Stay informed and practice safe browsing habits to protect against these threats.

      Malvertising, or malicious advertising, comes in different forms and can pose significant risks to computer users. Scott's hierarchy of malvertising includes two main levels. At level 1, malvertising attacks exploit pre-existing vulnerabilities in your browser or computer to install malware. This can happen through force click ads that lead to bad websites or clones. At level 2, ads deliver downloadable files that you don't want, which can trigger malware installation if clicked or opened accidentally. It's important to note that in today's world, malvertising often requires a known exploit or a 0-day vulnerability to execute malware onto a viewer's computer. Ads on the internet consist of two parts: what you see and where it takes you when clicked. Malicious ads can take you to executable files that download malware. Force click ads, which require manual interaction to remove, can download multiple executable files if clicked. Staying informed about potential threats and practicing safe browsing habits can help protect against malvertising attacks.

    • Hackers exploiting human trust and vulnerabilitiesStay informed and take steps to protect against social engineering and ad network vulnerabilities, including keeping software updated and being cautious of unsolicited communications.

      Hackers are constantly finding new ways to exploit vulnerabilities, and these vulnerabilities can be found not only in technology but also in human behavior. In the case of the New York Times hack, the hackers exploited the trust of the newspaper by posing as legitimate advertisers and swapping out legitimate ads with scam ads. This is an example of social engineering, where the vulnerability is the viewer's lack of knowledge or comfort. More recently, hackers have targeted ad networks, exploiting vulnerabilities in the network itself to take over and change the ads being served. This type of attack gives hackers the ability to bypass rules and restrictions and insert their own ads. It's important to stay informed about these types of threats and take steps to protect yourself, such as keeping your software up to date and being cautious of unsolicited emails or phone calls. Overall, the landscape of cybersecurity is constantly evolving, and it's essential to stay vigilant and adapt to new threats as they emerge.

    • Potential Consequences of Unchecked AdsUnchecked ads can bypass ad policies, reach large audiences, and cause harmless marketing to serious democratic manipulation. Ad blockers offer a defense, but can also prevent legitimate ads from being displayed.

      Controlling an ad network without any checks and balances could lead to widespread distribution of misleading or malicious ads. This discussion highlighted the potential for unchecked ads to bypass even the most rigorous ad policies and reach large audiences, with consequences ranging from harmless marketing to serious democratic manipulation. Ad blockers represent a common defense against such ads, functioning by recognizing and hiding the HTML code of unwanted ads, including those carrying malicious code. However, this also means that ad blockers can inadvertently prevent legitimate ads from being displayed, impacting the revenue streams of websites and content creators. Ultimately, the ad industry must strike a balance between allowing free and targeted advertising while maintaining transparency and preventing malicious activity.

    • The Complex Relationship Between Online Ads and Content ConsumersAdvertising is a primary source of funding for online content, but trust in ads is low due to intrusiveness and potential maliciousness. Content creators may need to find alternative ways to monetize if trust wanes, leading to a more fragmented media landscape.

      The relationship between content consumers and online advertisements is complex and evolving. Many legitimate websites are now using technology to detect and prevent ad blockers, appealing to users to allow ads in order to support the content they consume. This social pressure is a response to the fact that advertising is a primary source of funding for online content, from news sites to streaming platforms. However, the trust in ads is low due to their intrusiveness and potential maliciousness, and people are increasingly wary of clicking on links in emails. The shift towards online content funding through advertising is significant, and if trust in ads were to wane, the media landscape would change dramatically. Content creators would need to find alternative ways to monetize their work, which could lead to a more fragmented and diverse online media ecosystem. Ultimately, the balance between the need for funding and the desire for a non-intrusive user experience is a delicate one that requires ongoing dialogue and innovation.

    • New Hack podcast release scheduleThe Hack podcast team is changing their release schedule to put out a news update every two weeks and a high-quality episode on the last Tuesday of each month, giving them more time and resources for the in-depth episodes.

      The team behind the Hack podcast is making some changes to their release schedule. Instead of putting out a news update every week and a big episode every month, they will now be releasing a news update every two weeks and a high-quality, in-depth episode on the last Tuesday of each month. This decision was made to allow the team more time, energy, and love to put into the big episodes, ensuring they deliver the best possible content for their listeners. So, if you're a fan of the Hack podcast, mark your calendars for the last Tuesday of each month for the next level podcast experience. And don't worry, you'll still get your weekly dose of news updates every other week. Thank you for tuning in, and we'll catch you here on the next episode of Hack.

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Capsula TecnoCasters Proteja sus cuentas de Gmail y Facebook de ser Hackeadas

    Capsula TecnoCasters Proteja sus cuentas de Gmail y Facebook de ser Hackeadas

    Capsula TecnoCasters.

    Proteja sus cuentas de Gmail y Facebook de ser Hackeadas.

    Quiere usted proteger su correo electrónico o cuenta de Facebook de ser hackeado?.

    Facebook y Gmail tienen una opción de seguridad que una vez activado, requiere que agregue dos claves de acceso es decir, su clave de seguridad mas un código que las compañias le envían a su móvil para que así usted pueda accesar a su cuenta. Este paso extra es un pequeño inconveniente pero bien vale la pena pues hace que su cuenta sea mas difícil de hackear. Para hacer eso en gmail, hay que dar click en cuenta y después en seguridad. En Facebook, usted tiene entrar a su cuenta  y después hacer click en el icono de configuración que esta a lado de inicio seguido de configuración de cuenta, seguridad y finalmente aprobación de acceso.

    Por: Gaby Barrionuevo.

    Productor: Abrahan Bauza.

    HN21 - Underground Market for Twitter/X Accounts; Google OAuth Backdoor for Hackers

    HN21 - Underground Market for Twitter/X Accounts; Google OAuth Backdoor for Hackers
    Welcome to another captivating episode of Exploit Brokers! In this installment, we delve deep into the ever-evolving world of cybercrime and digital security. Join us as we unravel two gripping stories that shed light on the precarious nature of our online existence.

    First up, we explore the dark corners of the internet where cybercriminals flood the dark web with stolen X/Twitter gold accounts. Verified accounts, belonging to celebrities and organizations, have become a lucrative target for crooks. Learn how they compromise these accounts, what they do with them, and how you can protect yourself from falling victim to these scams. #Cybercrime #DarkWeb #TwitterGoldAccounts #OnlineSecurity

    Next, we tackle the concerning vulnerability in Google's OAuth system. Password changes are often seen as a quick fix to account compromise, but malicious actors have found a way to circumvent this. Discover how an exploit allows hackers to regain access to your account even after you change your password. We break down the details and share tips on how to safeguard your online presence effectively. #GoogleSecurity #PasswordReset #OnlinePrivacy #cybersecurity  #DigitalThreats #Malware #Cyberattacks #OnlineSafety

    Join us as we navigate the complex web of cybercrime and digital security, arming you with the information you need to stay one step ahead of hackers and scammers. Don't forget to hit that subscribe button and ring the notification bell to stay updated on all things cybersecurity. Your online safety is our priority! #ExploitBrokers #TechNews #CybersecurityAwareness #staysafeonline #oauth #cybercrime #hackers #hackingnews

    Sources:

    Stolen Twitter/X Accounts: https://www.darkreading.com/application-security/cybercriminals-flood-dark-web-x-twitter-gold-accounts

    Google Password Vuln: https://www.theregister.com/2024/01/02/infostealer_google_account_exploit/

    Audio Security - PSW #620

    Audio Security - PSW #620

    Wes Widner is the Cloud Engineering Manager at CrowdStrike. Wes will be talking about personal voice assistants are the wave of the future. So naturally we should wonder about the unique attack vectors they pose. I'd like to discuss my research into this field and share a few tips on how you can keep yourself safe around voice assistants. Full Show Notes: https://wiki.securityweekly.com/Episode620

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Buckle Up! - Paul's Security Weekly #581

    Buckle Up! - Paul's Security Weekly #581

    This week, we welcome Aleksei Tiurin, Senior Security Researcher at Acunteix for a Technical Segment on Insecure Deserialization in Java/JVM! In our second Technical Segment, we welcome Matt Toussain, Security Analyst at Black Hills Information Security to talk about RAS! In the security news, Bleedingbit Vulnerabilities, Cisco Zero-Day exploited in the wild, Researchers find Flaws in chips used in hospitals, US Governments network infected with Russian Malware, and the Weird Trick that turns your Google Home Hub into a Doorstep!

     

    Full Show Notes: https://wiki.securityweekly.com/Episode581

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    →Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!!

    →Follow us on Twitter: https://www.twitter.com/securityweekly

    →Like us on Facebook: https://www.facebook.com/secweekly