Logo
    Search

    Podcast Summary

    • Phishing Scam Targets Swedish PublisherPublishers must prioritize robust security measures, employee training, and vigilance to protect sensitive pre-publication content from piracy and unauthorized access.

      The publishing industry, like many others, faces significant security challenges, particularly when it comes to protecting pre-publication content from piracy and unauthorized access. The case of the phishing scam targeting Norstedt, the Swedish publisher of a posthumous sequel to The Girl With the Dragon Tattoo, highlights the sophistication and scale of these threats. The scammer, posing as a publisher's editor, managed to infiltrate the communication channels of various publishers, requesting access to manuscripts using fake identities. Norstedt used Hushmail, an encrypted email service, and delivered the passwords separately via phone to enhance security. However, the scammer successfully tricked some individuals into revealing the passwords, leading to a significant breach. This incident underscores the importance of robust security measures, employee training, and vigilance in protecting sensitive information. Despite the lack of evidence of any books being pirated, the motivation behind such an extensive and long-term operation remains unclear, adding to the intrigue of this peculiar case.

    • Exploring the World of Bibliophile Hackers and Missed Patreon NotificationsDiscovered a 'bibliophile hacker' who loves books so much they hack systems for early access, and addressed missed Patreon notifications, encouraging supporters to join us on the platform

      We discussed the concept of a "bibliophile hacker," a person who loves books so much that they hack systems to gain early access. This intriguing character raises complex motivations and questions about the power of knowledge and personal gain. Additionally, during the conversation, we discovered that not all Patreon notifications are being received, potentially causing us to miss supporters. This revelation led to an apology and a call for missed supporters to join us on Patreon. The term "bibliofile" was also introduced, meaning a person who collects or has great love for books. We also touched upon the topic of book piracy and its impact on the media industry. While some argue that easier access to content reduces piracy, others believe that piracy can lead to increased consumption of free content. Overall, the conversation explored various aspects of book love, hacking, and the importance of communication with supporters.

    • Why publishing industry experiences less piracy than film industryThe publishing industry's smaller size, the unique appeal of physical books, and the industry's ability to adapt to digital age have contributed to less piracy compared to the film industry.

      While the film industry experiences a significant amount of piracy, representing a large portion of the industry's revenue, the publishing industry, which is much smaller in size, experiences relatively less piracy. This disparity can be attributed to various factors, including the ease of consumption and the popularity of physical books. Despite the digital age, books continue to hold a unique place in our society, with many people still preferring the tactile experience of reading a physical book. The publishing industry, though smaller than the film industry, has managed to adapt to the digital age and monetize its content through various means. However, the cost of producing physical books remains high, making it a challenge for publishers to fully transition to digital. Overall, the impact of piracy on different industries varies greatly, and understanding these differences can provide valuable insights into the changing landscape of media consumption and monetization.

    • The digital revolution transformed content consumption in publishingPiracy decreased with digital distribution channels, but leaked books remain an issue, and fans still buy physical copies. Motivations for piracy vary, and it's an ethical concern. Cybersecurity is crucial in the digital age.

      The digital revolution has significantly transformed content consumption, particularly in the publishing industry. With the rise of digital platforms, content that was once static, like books, has evolved into immersive experiences, such as YouTube cooking videos or e-books. This shift has led to a decrease in piracy, as legitimate digital distribution channels became available before pirates could seize the initiative. However, there's a unique subset of piracy in the publishing world: leaked books before their official launch. Despite this, fans often still buy the physical copy, as owning the book is a significant part of the experience for many. The motivations for piracy differ between wanting the physical book and supporting the author. While some piracy might be driven by a "cute love affair" for the content, it's essential to remember that piracy remains an ethical issue. The discussion also highlighted an instance of a spoofed email targeting books, emphasizing the importance of cybersecurity in the digital age.

    • Hacker Impersonates Literary Scout to Steal BooksAn insider in the publishing industry, possibly a literary scout, used their knowledge and connections to gain access to early copies of books and stole multiple titles, potentially for resale.

      The hacker in this case may have been an insider in the publishing industry, specifically a literary scout. These individuals have access to early copies of books and work behind the scenes to help make deals by cultivating relationships with publishers. The hacker used this knowledge to gain access to valuable intellectual property by impersonating a legitimate figure in the industry and trading books through unsuspecting intermediaries. This allowed them to steal multiple books and potentially sell them for profit. The hacker's ability to use industry-specific lingo and knowledge of the publishing process made their scam more convincing, making this an intriguing and complex case.

    • Social engineering in publishing industrySocial engineering and targeted manipulation can be effective even in the publishing industry, with one hacker going undetected for years, manipulating individuals and obtaining advanced book copies for unknown reasons.

      Social engineering and targeted manipulation can be incredibly effective, even in the publishing industry. The book hacker, who managed to infiltrate the industry by posing as various publishers and agents, demonstrated this by manipulating individuals for years, often going undetected. Despite the large number of potential targets, the hacker's quality over quantity approach proved to be highly effective. As the hacker's activities became more public before the pandemic, the publishing industry began to take notice and take action, but the hacker remained elusive. The hacker's obsession shifted to obtaining advanced copies of highly anticipated books, such as "The Testaments," but the reasons for this obsession remained unclear. It wasn't about rights or piracy, as those avenues had already been explored and exploited. The true motivation behind the hacker's actions remains a mystery, but the incident serves as a reminder of the potential risks and impact of targeted manipulation in any industry.

    • Mysterious bibliophile hacker steals unpublished manuscriptsA bibliophile hacker stole unpublished manuscripts for years, but during the pandemic, their behavior became erratic and threatening, leading to their eventual arrest at JFK Airport.

      A mysterious hacker, believed to be a bibliophile, had been stealing unpublished manuscripts from publishers for years. Despite their sophisticated methods, the hacker's primary motivation seemed to be obtaining the latest books before anyone else. However, during the COVID-19 pandemic, the hacker's behavior became more erratic and threatening. Several publishers had suspected a specific individual, but it wasn't until January 2023 that the FBI arrested a man at JFK Airport, who turned out to be the elusive manuscript thief. The case highlights the lengths some individuals will go to obtain valuable information and the challenges in identifying and apprehending cybercriminals.

    • An Unexpected Turn in an Ordinary Life: The Cybercrime Case of Filippo BernardiniA seemingly ordinary individual's past actions and access to sensitive information led to a cybercrime, highlighting the importance of cybersecurity in today's digital age.

      The life of a seemingly ordinary individual, Filippo Bernardini, took an unexpected turn when he was arrested by the FBI for suspected cybercrimes. Bernardini, who published a book under a pseudonym as a teenager, pursued a career in publishing and gained access to advanced copies of books from renowned authors. In 2016, he interned at a literary agency, but was not offered a full-time position. Shortly after, the company's website was hacked, and personal information was exposed. While the details of how Bernardini was caught are not known, his past and actions leading up to the hack raised suspicions. The incident serves as a reminder of the importance of cybersecurity in today's digital age, where threats are constantly emerging and resources are limited. Organizations like The Center for Internet Security can help businesses and governments create a safer connected world through collaboration and innovation.

    • Confident job seeker allegedly hacked into publishing companiesA determined job seeker, despite allegedly hacking into publishing companies, couldn't advance his career or make money, highlighting the importance of honesty and integrity in job market

      The Nuremberg hacker, identified as Filippo Bernardini, showed remarkable confidence and determination during his job hunting journey in the publishing industry, even as he was allegedly attempting to hack into the same companies where he was applying for jobs. Despite years of rejections and struggling to make a name for himself, Bernardini continued to pursue his dream of working in publishing. However, it seems his alleged hacking activities didn't help him in any way, as he never made any money or advanced his career through it. Instead, he was eventually caught and charged with wire fraud and identity theft. The harm caused by his actions appears to have been relatively low, but the moral implications and potential penalties for such behavior are still intriguing. Bernardini's case serves as a reminder of the importance of honesty and integrity in the job market, even in the face of frustration and setbacks.

    • A bookseller's obsession with pre-publication manuscriptsContext and intentions behind actions can impact sentence outcomes. Bookseller's obsession led to impersonation and identity theft, but absence of monetary gain or harm influenced leniency of sentence.

      The motivation behind an individual's actions, especially when it comes to intellectual property theft, can be complex and driven by a deep-rooted passion or obsession. Filippo Bernardini, a bookseller, was sentenced to time served, a 3-year supervised release, and deportation for illegally obtaining and selling pre-publication manuscripts. He explained in his own words that he wanted to feel like a publishing professional and had a special connection with the authors. His actions began with a simple email impersonation, which snowballed into an obsession. Despite the severity of his actions, the leniency of his sentence may have been influenced by the judge's understanding of his motivations. The case serves as a reminder that the context and intentions behind an action can greatly impact the outcome. While impersonation and identity theft are criminal acts, the absence of monetary gain or harm to the companies involved may have played a role in the leniency of the sentence.

    • Filippo Bernardini's Compelling Story: A Banished Publisher's Path to RedemptionA banned publisher, Filippo Bernardini, could potentially find success as an author using his alter ego 'b', despite legal consequences, due to public interest and industry demand.

      The story of Filippo Bernardini, a publishing professional who was effectively banned from the industry after being exposed for hacking into authors' emails, presents an intriguing opportunity for a memoir or exposé. Despite the legal consequences he faced, Filippo could potentially have a successful career as an author, given the public interest in his actions. The irony lies in the fact that Filippo b, the author persona he used to publish his first book, could be the key to his future success. The publishing industry, driven by revenue and shareholder return, may find it difficult to resist the allure of such a compelling story. The potential for a movie adaptation is also high, given the extensive media coverage of the incident. The complex web of relationships and betrayals involved in the case could make for a captivating narrative. Ultimately, the success of Filippo's potential future career would depend on his ability to control his compulsions and make the decision to license or self-publish the story.

    • Complex relationships in The Big ShortThe intricate connections between characters in The Big Short mirror real-life relationships, highlighting themes of interdependence and complexity.

      There seems to be a complex and intricate relationship between the characters in "The Big Short," much like a real-life friendship or even love. This was a common observation made during our discussion. The storyline involves multiple interconnected elements, which can leave one feeling like there's a "big short vibe" to it. If someone else, such as Michael Lewis, were to tell this story, it might offer a different perspective. Filippo Basile, author of "Bullies," once said, "There is a relationship between tormentors and victims. Something close to a real friendship, or even love. A person cannot live without the other, just as the tormentor cannot live without his victim." While we may not fully agree with this quote, it certainly resonates with the themes of interdependence and complex relationships present in "The Big Short."

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    ISC StormCast for Tuesday, April 2nd 2019

    ISC StormCast for Friday, September 28th 2018

    059: Warum ist Cyber Security Chefsache, Nico Werner (All-in Digital & CloudCommand)?

    059: Warum ist Cyber Security Chefsache, Nico Werner (All-in Digital & CloudCommand)?
    In der heutigen Interview-Folge des Tech-Podcasts "Blue Screen" begrüßen wir Nico Werner als unseren Gast. Nico ist ein bekannter Podcaster und beschäftigt sich mit dem Thema "Cyber Security ist Chefsache". Da wir uns beide mit IT- und OT-Themen, insbesondere Industrie 4.0, beschäftigen, ist es eine spannende Gelegenheit, uns auszutauschen.

    🔴 May 5's Top Cyber News NOW! - Ep 360

    🔴 May 5's Top Cyber News NOW! - Ep 360

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.

    Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance
    https://barricadecyber.com.

    Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Assessments!
    https://panoptcy.com/

    Discover the most critical threats and tips on how to overcome remediation fatigue with XM Cyber’s 2023 State of Exposure Management report https://bit.ly/3KS0uWs

    Gerald’s practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com

    💥Get 30% off ITPro from ACI Learning with coupon code “SIMPLYCYBER30” Binge-worthy cybersecurity education ! https://go.itpro.tv/simplycyber

    Join the Simply Cyber Discord  https://SimplyCyber.io/Discord

    Podcast in stream is from cisoseries.com.