My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!
Join BrightTALK and check out this informative panel discussion featuring myself along with panelists Nathan Wenzler and Kowsik Guruswamy.
This slideshow requires JavaScript.
A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.
We discuss:
– What is the Google Docs email scam?
– How is this scam different from other phishing scams?
– What’s the deal with Eugene Pupov?
– Who’s at risk and how can you avoid being a victim?
– What can we expect in the future?
Moderator:
– Vince Tocce, Vince in the Bay Podcast
Speakers:
– Nathan Wenzler, Chief Security Strategist at AsTech Consulting
– Kowsik Guruswamy, CTO for Menlo Security
This episode my guest is Laurie Segall senior technology correspondent for CNN and editor-at-large for CNN Tech.
Laurie is host of CNN’s first CNNgo original, Mostly Human with Laurie Segall, a 6-part investigative docuseries, exploring sex, love, death & humanity through the lens of tech.
Mostly Human follows Laurie around the world as she tackles the uncomfortable questions about our increasingly complicated relationship with technology. She examines the power modern technology holds, while exposing the darker side.
The full Mostly Human series streams exclusively on CNNgo.
You can access the series for free through CNNgo on Apple TV, Roku, Amazon FireTV, and Android TV.
It is also available on CNN.com, and CNN’s iOS and Android apps.
Using thousands of texts, tweets and Facebook posts, a woman creates a digital version of her best friend … after he died. Artificial intelligence and years of social media data allowed her to create a bot that responds like her best friend, jokes like him, and blurs the lines between man and machine. This is death in the digital age.
An investigation into the first person deemed dangerous enough to kill… because of his ability to tweet. We explore the life and death of Junaid Hussain, the ISIS hacker who ushered in a new era of terror, mainly due to his social media celebrity. We infiltrate hacker circles in Vegas, explore undercover operations, and have a dangerous run-in outside his hometown, to understand how he went from computer nerd to third most dangerous member of ISIS.
Westworld, or real world? From people falling in love with robots to sex dolls who now have, “AI brains,” our relationship with tech is getting…complicated. We explore a sexual assault in the virtual world and Minority Report technology being used in a high security psychiatric ward. It’s too controversial for the US and will blow your mind.
Dig into the myth of Silicon Valley – where heroes are hailed and success celebrated. Silicon Valley has a secret they don’t want you to know about. Much of the creative genius, the brainiac success stories are also associated with depression and bi-polar disorder. Is there a price to creative genius?
Explore the human impact of a hack that exposed 36 million potential cheaters. Behind the hack, there were suicides, broken families. We introduce you to the human impact of Ashley Madison and take our viewers inside the War Room of Ashley Madison where there were millions of dollars on the table, death threats, and a ticking time bomb that would explode with society’s secrets. We’ll also look at the company’s secret: their ability to program algorithms that would make you more likely to click-for-affair.
A look at why the most powerful people in tech are stepping away from the products they’ve built. In a place where algorithms play god, we explore the soul searching Silicon Valley is doing. The biggest CEO’s are raising the alarm bells and wondering – have we entered the singularity? Who’s in control… man or machine?
This episode is dedicated to my experience attending the infamous hacker conference known as DEFCON in Las Vegas. DEFCON 24 flew by way too fast, but I managed to interview several attendees.
DEFCON luminary Ryan “1o57” Clarke (pronounced “Lost”) spoke with me about the badge challenge which he helms each year. In the video above 1o57 shows off one of the custom made “Uber Badges” awarded to winners of several contests at DEFCON 24.
My DEFCON 24 badge, which I was convinced was emitting a RF signal. Possibly communicating with our benevolent robot overlords? Alas, no RF detected.
He joins Vince to discuss attribution in the wake of the DNC email leaks which are being attributed to cyber espionage by Russian intelligence agencies. Jeff recently wrote a medium post in response to attribution of the DNC hacks to the Russian government.
TOPICS INCLUDE:
Coastguard radioman :: stylistic analysis :: Shlomo Argamon :: Attribution :: Sony Pictures hack :: North Korea :: Russian hackers :: language analysis :: DNC leak/hack :: Thomas Rid :: Crowdstrike :: Fire Eye :: APTs :: cyber espionage :: Ukraine :: Swift on Security
Mano ‘dash4rk’ Paul is a security researcher and author. He is co-founder of Hackformers, a non-profit Christian hacker collective based in Austin, TX. His son Reuben ‘RAPst4r’ Paul attends the Harmony School of Science, in Austin. Reuben was once voted America’s most beautiful baby and he is also the youngest person to achieve a black belt in Shaolin-Do Kung Fu, at the age of 7 years old. Reuben is also the CEO of Prudent Games and co-founder, with his dad, of the non-profit educational platform Cyber Shaolin. Cyber Shaolin aims to promote and improve the awareness and education of cyber security and technology to kids and adults.
Below is a “Hashing” video by Reuben Paul, one of several educational videos offered for free on the Cyber Shaolin “Lessons” page.
NOTE: This interview was conducted prior to Reuben’s speaking appearance at the GroundZero Summit in India. Here is a recording of the talk he references on the podcast:
Four years ago HECTOR XAVIER MONSEGUR, an Anonymous computer hacker better know by the online pseudonym “Sabu”, pleaded guilty in a U.S. District Court to 12-counts of computer hacking and other crimes. A conviction that was kept secret from the public.
At the time, many activists, supporters and participants involved with Anonymous were unaware that months prior Mr. Monsegur had agreed to cooperate with the FBI who were investigating the criminal activity of hackers operating within the Anonymous collective.
Mr. Monsegur became public enemy number one by Anonymous once it was revealed he had cooperated with law enforcement as they located and arrested Anonymous hackers. Most notably, the arrest of a hacker known online as “Anarchaos” and later unmasked as Mr. Jeremy Hammond.