Logo
    Search

    Podcast Summary

    • The Power of Owning a Valuable Domain NameOwning a valuable domain name can grant access to vast amounts of data and control over digital identities, but it also comes with significant risks and responsibilities.

      The ownership of a domain name, specifically corp.com, holds significant power due to a technical issue called Name Space Collision. This issue allows the owner to gain access to a vast amount of passwords, emails, and proprietary data from thousands of major companies worldwide. Mike O'Connor, who has owned corp.com since 1994, refused to sell it for 26 years due to its dangerous potential. This year, Mike, now 70, decided to sell it, but the selling price remains unknown. This story highlights the importance of domain ownership and the potential risks and rewards it carries. Before the establishment of ICANN in 1998, the Internet and domain buying were chaotic, and individuals like Mike could buy up valuable one-word domains for future use. The value of these domains has significantly increased over time, with some being worth millions. However, the story of corp.com serves as a reminder of the uneasy power that comes with such ownership and the potential consequences if it falls into the wrong hands.

    • Understanding DNS vulnerabilities and their impactDefault 'Corp' setup in older Microsoft Active Directory servers can lead to security risks if not properly configured, emphasizing the importance of DNS security awareness and best practices.

      DNS (Domain Name System) plays a crucial role in our digital world by translating human-friendly domain names into machine-friendly IP addresses. Corp.com, like any other domain name, is vulnerable due to a configuration issue in early Microsoft Active Directory servers. Major corporations that use Microsoft products for their infrastructure, including Active Directory, have a default setup with the name "Corp." However, this name can be overwritten by the internal DNS system of a corporation. This discussion emphasizes the importance of understanding DNS and the potential vulnerabilities that come with it. For instance, the default "Corp" setup in older Microsoft Active Directory servers can lead to security risks if not properly configured. It's essential to be aware of these issues and take necessary steps to secure your digital infrastructure. Stay informed about the latest cybersecurity trends and best practices to protect your organization from potential threats.

    • Misconfigurations in IT setup can lead to long-term vulnerabilitiesMisconfigurations in IT setup can expose businesses to long-term vulnerabilities, even in small to medium organizations. The Center for Internet Security (CIS) offers best practices and resources to help businesses meet security and compliance requirements, despite limited resources.

      Misconfigurations in IT setup, even in small to medium businesses, can lead to long-term vulnerabilities. This was evident in the case of Microsoft's example corporation named "Corp," where IT admins adopted the setup and inadvertently routed all traffic to a random DNS owned by an attacker. This issue arose during the early days of VPNs and the shift from local networks to remote access. Today, businesses face even more challenges with rapidly changing technology, daily cyber threats, and increasing regulations. The Center for Internet Security (CIS) can help by providing security best practices and resources, enabling organizations to meet their security and compliance requirements despite limited IT resources. By joining the CIS community, businesses can collaborate and innovate to create a safer world in the connected world. Visit cisecurity.org to learn more and play your part.

    • Securing essential internet infrastructure with CISJoin CIS to contribute to a safer digital world, collaborate with IT professionals, and secure critical internet infrastructure against potential vulnerabilities and consequences.

      The Center for Internet Security (CIS) plays a crucial role in enhancing cybersecurity for individuals, businesses, and governments by providing consensus-driven best practices and resources. This community-driven organization collaborates with IT professionals and volunteers worldwide, helping save time, money, and effort in implementing effective security measures. Furthermore, CIS works with US public sector organizations to share vital information, fostering collective strength. The analogy provided in the discussion highlights the importance of securing critical internet infrastructure. If a rogue domain, acting as a default password, had been sold to the highest bidder, the consequences could have been severe. Microsoft, or any other major organization, would have taken measures to prevent such a vulnerability from falling into the wrong hands. The case of the rogue domain serves as a reminder of the significance of securing essential internet infrastructure and the potential repercussions of neglecting it. Joining the Center for Internet Security is an excellent way to contribute to a safer connected world. By visiting cisecurity.org, individuals and organizations can play their part in creating confidence in the digital landscape.

    • Microsoft Acquires Epik to Secure DNS SystemMicrosoft acquired Epik, a domain name registry, to secure its DNS system and mitigate potential vulnerabilities. Epik's DNS short handles pose a risk, as they can create perpetual vulnerabilities by automatically appending .com to search queries. Microsoft's acquisition aims to lock down this system and prevent potential risks.

      Microsoft has acquired the domain name registry, Epik, following concerns over potential security vulnerabilities. Epik's DNS short handles pose a risk, as they can create perpetual vulnerabilities by automatically appending .com to search queries. Microsoft's acquisition aims to secure and lock down this system. The speaker expresses relief that Microsoft, rather than a potentially risky bidder like a Russian state organization, has taken over. This acquisition is an example of the importance of securing critical digital infrastructure and mitigating potential vulnerabilities. The discussion also touches on the altruistic image of Mike O'Connor, Epik's founder, and the potential consequences for him regarding the sale. The hacked podcast team promises an interesting update next week and encourages listeners to follow them on Twitter or support them on Patreon.

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    EP2.34: La ciberseguridad, clave para una FinTech exitosa

    EP2.34: La ciberseguridad, clave para una FinTech exitosa

    ¡Aprende SecTY!

    La ciberseguridad, clave para una FinTech exitosa

    Como parte de la era de la digitalización, el sector financiero ha sido uno de los que ha aprovechado los avances tecnológicos para que el mercado salga a flote. ¿Como? Con la llegada de las Fintech las cuales han cambiado el concepto de los métodos tradicionales de las finanzas. Pero, hay un detalle muy importante en esta nueva manera de realizar transacciones, y es el internet, y de lo que está detrás del internet, están los riesgos cibernéticos. Hoy te menciono como la ciberseguridad es clave para que una Fintech sea exitosa.  

    Regístrate para el taller “Como hacer backup en la nube de manera segura utilizando MS OneDrive”:

    Cuando: jueves 28 de julio de 2022 a las 7:00PM hora de Puerto Rico.

    Regístrate AQUI à https://us06web.zoom.us/meeting/register/tZMoc-2trDkvHNyWmzC-NIm9goWdnaBvPqw6

    NOTA Importante: Debes estar pendiente a las carpetas de Junk Mail o Spam de tu correo electrónico para que no te pierdas de los comunicados y notificaciones que estamos realizando.

    Si deseas capacitar a tus empleados sobre seguridad de información en tu negocio, escríbeme a itsec@sectycs.com para poder ayudarte porque ofrecemos capacitación de seguridad a grupos de usuarios para pequeños negocios.

    Recuerda:

    Entra a nuestra página de Aprende SecTY https://www.aprendesecty.com  para que puedas obtener las guías, tips y pasos que ya he compartido anteriormente de manera GRATIS.

    Síguenos en Facebook, Instagram, Twitter y LinkedIN como: @SecTYCS

    SUSCRIBETE en nuestro canal de YouTube Aprende SecTY: https://www.youtube.com/channel/UC1E9yilgLf5HZMQVDf_ViRw

    Envíame tus preguntas o recomendaciones a: itsec@sectycs.com

    Deja tu reseña en iTunes/Apple Podcast y compártelo con personas que necesiten mejorar la seguridad en su negocio y en su vida.

    Puedes escucharnos también por medio de: iTunes/Apple Podcast, Spotify, Stitcher, Google Podcast, Amazon Music y iHeartRadio.

    Digitale Partnerschaft. Erfolgsmodell für die Zukunft. (Gesponsert)

    Digitale Partnerschaft. Erfolgsmodell für die Zukunft. (Gesponsert)
    Gisela Strnad spricht mit 4 Kollegen und Kolleginnen von Micromata über Digitalisierungsprojekte und darüber, dass Individualsoftware oftmals die bessere Alternative zu Standardsoftware sein kann. Das vor 25 Jahren gegründete Softwarehaus Micromata entwickelt passgenaue Softwarelösungen für Industrie und Handel und Kunden aus allen Branchen. Der Auftraggeber bekommt genau das, was er tatsächlich braucht – und keinen mittelmäßigen Kompromiss. Dabei verfolgt Micromata das Prinzip „Alles aus einer Hand“.

    #101 ANGRIFFSLUSTIG – Interview mit Alexander Rehbeck von SH POWER

    #101 ANGRIFFSLUSTIG – Interview mit Alexander Rehbeck von SH POWER
    Die Energieversorgungsbranche ist immer wieder ein polarisierendes Gesprächsthema, wenn es um den Schutz vor Cyberattacken geht. In dieser Folge führt Sandro Müller ein Interview mit Alexander Rehbeck dem CISO von SH POWER. SH POWER betreibt unter anderem ein Flusskraftwerk in der Schweiz. Alexander gibt uns spannende Einblicke in seinen Alltag und seine aktuellen Herausforderungen.

    Ep. 85 – After the Acquisition With Michael Einbinder-Schatz

    Ep. 85 – After the Acquisition With Michael Einbinder-Schatz

    If you are thinking about selling your IT company chances are you have come full circle. The majority of MSPs are tech turned owner operators that grew a respectable businesses and now are done and want out. They can now take that long overdue vacation, treat themselves to something nice, pay back that line of credit and finally have some REAL money in the bank as they think about retirement and what they are going to do next.

    Think of it... to sell or not to sell? To buy or not to buy? Joining Barb is Michael Einbinder-Schatz, to talk about life after the acquisition of his MSP – Jobecca Technology Group.

    0:00 – Barb's Introduction

    2:05 – Who is Michael Einbinder-Schatz and his MSP, Jobecca Technology Group?

    7:44 – Why did Michael sell? How did he find the buyer?

    17:23 – What did Michael do to prepare his customers for the transition?

    27:53 – Does Michael have any regrets selling his business?

    29:11 – What is Michael doing now?

    39:27 – What is the most important thing Michael has ever learned?

    This podcast has been brought to you by CDNTechnologies.com. Canada's first and only certified outsourced IT Company where we provide IT Service, IT Support and Cyber Security to businesses all throughout North America from out worldwide headquarters in Oakville, Ontario.

    Technology and threats change daily, so shift the stress of managing your technology to us, as we're direct to tech 24/7/365. Our mission is to bring you User Friendly, Hands Free, Technology Peace. Call us at 905-542-9759.

    EP3.32 Spoofing – Engaño que se esconde detrás de una máscara de confianza cibernética

    EP3.32 Spoofing – Engaño que se esconde detrás de una máscara de confianza cibernética

    ¡Aprende SecTY!

    EP3.32 Spoofing – Engaño que se esconde detrás de una máscara de confianza cibernética

    Spoofing ocurre cuando los actores maliciosos y los ciberdelincuentes actúan como contactos humanos confiables, marcas, organizaciones y otras entidades o dispositivos para que puedan acceder a los sistemas e infectarlos con malware, robar datos y causar daños e interrupciones.

    Este episodio es presentado por AeroNet. Empresa de tecnología 100% puertorriqueña, líder en soluciones de conectividad para negocios y residencias en Puerto Rico. Go Faster, Go Save. AeroNet Wireless - Reliable High Speed Internet (aeronetpr.com)

    Episodios recomendados:

    Episodio 2.26 Usa el sentido común para no caer en un phishing: https://aprendesecty.libsyn.com/ep226-usa-el-sentido-comn-para-no-caer-en-un-phishing 

    Si deseas orientación o evaluación sobre ciberseguridad para tu negocio o capacitar a tus empleados sobre seguridad de información en tu negocio, escríbeme a itsec@sectycs.com para poder ayudarte porque ofrecemos capacitación de seguridad a grupos de usuarios para pequeños negocios.

    Recuerda: Síguenos en Facebook, Instagram, Twitter y LinkedIN como: @SecTYCS

    SUSCRIBETE en nuestro canal de YouTube Aprende SecTY: https://www.youtube.com/channel/UC1E9yilgLf5HZMQVDf_ViRw

    Envíame tus preguntas o recomendaciones a: itsec@sectycs.com

    Deja tu reseña en iTunes/Apple Podcast y compártelo con personas que necesiten mejorar la seguridad en su negocio y en su vida.

    Puedes escucharnos también por medio de: iTunes/Apple Podcast, Spotify, Google Podcast, Amazon Music y iHeartRadio.