Logo
    Search

    News Update - The Return of Miss Madison

    enApril 21, 2020

    Podcast Summary

    • Data breaches have severe consequencesData breaches can expose personal information leading to public humiliation, sextortion scams, and even suicides. Be vigilant and take data security seriously to prevent harm.

      Data breaches can have devastating consequences beyond just the loss of personal information. The 2015 Ashley Madison data breach exposed the real names, addresses, phone numbers, and credit card information of 32 million users, leading to public humiliation campaigns, sextortion scams, and even suicides. Hackers continue to use this information, along with passwords and other details, to manipulate and extort individuals. The emails they send often include additional lies to add credibility to their threats. This incident serves as a reminder that even a small piece of leaked information can be used to cause significant harm. It's essential to take data security seriously and be vigilant against potential threats.

    • User tables are common targets in data breachesProtect your online security by using strong, unique passwords and regularly checking if your email address has been involved in any data breaches

      The security of our personal information is under constant threat due to data breaches and hacking incidents. These breaches result in large databases of user information being leaked online, including usernames, passwords, and contact details. Hackers then use this data to make false claims and extort money from individuals. The user table, which is a database of user information, is a common target in these breaches. This table often contains sensitive information such as passwords, which can be used to gain access to other accounts. It's important to note that old passwords, which may no longer be in use, can still be a risk if they are leaked. Password crackers can be used to decipher these passwords over time, and once deciphered, they can be used to gain unauthorized access to accounts. It's crucial to use strong, unique passwords and to avoid using the same password across multiple accounts. Additionally, regularly checking websites like "haveibeenpwned.com" to see if your email address has been involved in any data breaches can help keep you informed and proactive about protecting your online security.

    • The Ashley Madison breach: From encrypted passwords to scamsThe Ashley Madison breach highlights the need to secure data at all levels, from the structure to individual passwords, to prevent unauthorized access and potential scams.

      Data breaches, like the one that occurred with Ashley Madison, can result from both a failure to secure the data itself and the structure of the data being compromised. The passwords in the Ashley Madison breach were encrypted, but the table itself should have remained confidential. Hackers are often highly skilled individuals who obtain this sensitive information, while scammers then use this data to carry out attacks, such as Bitcoin scams. In the case of Ashley Madison, the scammers likely obtained the data when it was publicly available and used encrypted passwords to attempt to validate threats. This process, known as password cracking, involves using powerful tools and large word lists to decrypt passwords. The ease of this process is a concern, as many people use weak passwords. The Ashley Madison breach serves as a reminder of the importance of securing data at all levels, from the structure of the data to the encryption of individual passwords.

    • Data breaches can lead to extortion emailsData breaches can result in threatening emails demanding Bitcoin, use strong passwords and delete suspicious emails.

      The aftermath of data breaches like Ashley Madison's can lead to various malicious activities. The original hackers may sell the data to scammers who then send threatening emails to extort Bitcoin from victims. The decryption process, which turns encrypted passwords into readable ones, can be carried out by either the hackers or the scammers. This process involves encrypting common words and comparing them against the encrypted passwords until a match is found. For individuals receiving such emails, hitting the delete key is the best course of action. However, it's essential to consider if other accounts might have used the same compromised password and change them accordingly. If the email instills fear due to the use of a current password, then further investigation and action may be necessary. Businesses and organizations face numerous cybersecurity challenges as technology evolves, threats emerge, and regulations increase. The Center for Internet Security (CIS) offers resources to help organizations maintain security best practices and collaborate with others to create a safer digital world. Podcasters can reach a large and engaged audience by partnering with Lipson Ads for podcast advertising. They can choose from top podcasts with host endorsements or run reproduced ads across thousands of shows to reach their target demographic.

    • Exploiting Old Data Breaches for ScamsCybercriminals utilize old data breaches to scam people with threats and crises, targeting a large number of victims due to their effectiveness.

      Cybercriminals continue to exploit old data breaches and use fear tactics to scam people. Despite being several years old, the information from past data leaks remains valuable to scammers. They target individuals with threats and crises, tricking some into giving up sensitive information. These scams are quantity-driven, with criminals seeking as many victims as possible. The reason for their persistence is simple: these tactics work. As for the podcast, the team is considering focusing less on weekly news updates and more on structured storytelling in their monthly episodes, with occasional updates as needed. They value listener feedback and encourage engagement on social media or Patreon.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    'Sextortion' Documentary May Leave Viewers With Exaggerated Sense Of Risk To Children

    'Sextortion' Documentary May Leave Viewers With Exaggerated Sense Of Risk To Children
    A new documentary called Sextortion: The Hidden Pandemic has gained attention at screenings hosted by universities, police departments and even the Pentagon. But many of the claims made in the film are poorly supported and overhyped.

    The film warns parents about the dangers of sexually coercive crimes online and suggests that strangers are targeting potentially millions of minors - pressuring them into sharing revealing content and, often, extorting them for money.

    But NPR has found the documentary could leave viewers with an incomplete and exaggerated sense of the risk by relying upon statistics that lack context. Experts fear it could hinder harm reduction efforts by skewing public perception.

    NPR's Lisa Hagen, who covers how false and misleading information spreads, shares her reporting into the documentary and its filmmakers.

    In participating regions, you'll also hear a local news segment to help you make sense of what's going on in your community.

    Email us at considerthis@npr.org.

    Learn more about sponsor message choices: podcastchoices.com/adchoices

    NPR Privacy Policy

    106: @Tennessee

    106: @Tennessee
    How much online abuse are you willing to take before you decide to let your abuser have what they want? Unfortunately, this is a decision that many people have to ask themselves. If someone can threaten you physically, it bypasses whatever digital security you have in place. Thanks to https://twitter.com/jw for sharing this harrowing story with us. Affiliate links to books: The Smart Girl’s Guide to Privacy: https://www.amazon.com/gp/product/1593276486/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1593276486&linkCode=as2&tag=tunn01-20&linkId=0a8ee2ca846534f77626757288d77e00 Extreme Privacy:https://www.amazon.com/gp/product/B0898YGR58/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B0898YGR58&linkCode=as2&tag=tunn01-20&linkId=575c5ed0326484f0b612f000621b407f Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET. Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/. View all active sponsors. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Account Takeover IS Your Problem

    Account Takeover IS Your Problem

    Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy! Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now. 

    SolarWinds® TechPod episode host Brandon Shopp, VP of product strategy, security, compliance, and tools discusses the threat landscape and what can we do about it, with Chris LaConte, chief strategy officer at SpyCloud. 

    This podcast is provided for informational purposes only.
    © 2019 SolarWinds Worldwide, LLC. All rights reserved.

    Three Steps to Cybersecurity

    Three Steps to Cybersecurity

    Peggy and Lance Spitzner, director, SANS Security Awareness, talk about the three key steps to follow to secure you at home. He says we have to become our own security teams because bad guys take advantage of our current sense of urgency.

    They also discuss:

    • The top ways cyber criminals are getting in.
    • Two security challenges in the era of COVID-19.
    • The steps to protecting online for both work and home: you, password, and updating.

    sans.org

    (04.21.20 - #664)

    IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G cloud, sustainability, future of work, podcast

    52 - Why You Should Fear Cybercrime

    52 - Why You Should Fear Cybercrime

    Gabriel Custodiet explains how the $10 trillion cybercrime industry operates and a few concepts that can protect you from it. Learn more at hackproofcourse.com

     

    Watchman Privacy
    → https://watchmanprivacy.com (newsletter, consultation requests)
    → https://twitter.com/watchmanprivacy
    → https://www.amazon.com/Watchman-Guide-Privacy-Financial-Lifestyle/dp/B08PX7KFS2

     

    Privacy Courses
    → https://rpf.gumroad.com/l/privatebitcoin
    → https://rpf.gumroad.com/l/hackproof

     

    Monero Donation Address (If you can't see the whole string, double click in the middle to select all)
    →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy

     

    Please subscribe to and rate this podcast wherever you can to help it thrive. Thank you!