Podcasts about hacking tools

  • 53PODCASTS
  • 61EPISODES
  • 31mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 18, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hacking tools

Latest podcast episodes about hacking tools

David Bombal
#459: Flipper Zero vs "Proper" Hacking Tools

David Bombal

Play Episode Listen Later Mar 18, 2024 40:02


Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://Brilliant.org/davidbombal (First 200 people that sign up will get a special discount). Is the Flipper Zero just a toy? Or can it actually be used for hacking? What are better tools? What about the HackRFOne, RTL-SDR or LimeSDR? // Occupy The Web Books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Network Basics for hackers: https://amzn.to/3W1iiCQ // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw Direct links to courses: Pro Subscriber: https://davidbombal.wiki/otwprosub 3 year deal: https://davidbombal.wiki/otw3year // Product Links REFERENCE // RTL-SDR Blog V4 R 828D: https://amzn.to/43aOSFB USA and https://amzn.to/3T6KZNq UK HackRFOne: https://amzn.to/49G80hb USA and https://amzn.to/3Tr85Q5 UK LimeSDR: https://amzn.to/3v1A0Nd USA and https://amzn.to/3TrVYT0 UK // Occupy The Web SOCIAL // X: / three_cube Website: https://www.hackers-arise.com/ // YouTube Playlists mentioned // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free ... Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth... Flipper Zero: • Flipper Zero Demo: WiFi Marauder, Wir... // YouTube Video REFERENCE // Flipper Zero: Hottest hacking device of 2023?: • Flipper Zero: Hottest Hacking Device ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com flipper zero flipper flipperzero hackrf hack hacking car hacking sub 1 ghz door bell car cars honda cve alarm system rfid nfc bluetooth infrared radio gpio Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #flipperzero #hack #hacking

Phoenix Cast
Wireshark, Leaked Hacking Tools, Freaking out about Google

Phoenix Cast

Play Episode Listen Later Feb 29, 2024 48:00


In this episode of Phoenix Cast, hosts John and Kyle discuss some recents events in the news - banning Wireshark, the alleged leak of hacking tools, and Kyle finishes by providing some perspective on how Google sunsets projects.  Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts. Links: Wireshark website (donate here): https://www.wireshark.org/ SharkFest:  https://sharkfest.wireshark.org/ Hacking tool leak: https://cybernews.com/news/github-leak-exposes-chinese-cyber-ops/ Lockbit:  https://www.bbc.com/news/technology-68344987  https://www.bleepingcomputer.com/news/security/police-arrest-lockbit-ransomware-members-release-decryptor-in-global-crackdown/ https://www.reuters.com/technology/lockbit-hackers-swagger-display-after-police-leak-identities-online-2024-02-20/ Single, double, triple, quadruple extortion - https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-double-extortion-and-beyond-revil-clop-and-conti

Improve the News
February 15, 2024: Mayorkas impeachment, wanted Estonian PM and OpenAI hacking tools

Improve the News

Play Episode Listen Later Feb 15, 2024 29:36


Facts & Spins for February 15, 2024 Top Stories: The US House votes to impeach homeland security secretary Mayorkas, Russia puts Estonia's Prime Minister on the Kremlin's wanted list, South Africa urges the ICJ to consider action on Israel's Rafah assault, Indonesia's Subianto claims victory in the Presidential election, A coalition Government Selects Shehbaz Sharif as Pakistan's prime minister, Dozens of civilians are reportedly killed by Ethiopian forces in Amhara, Democrats pick up a key seat in US House in a New York special election, The US' immigration agency is considering releasing migrants due to budget shortfalls, A report claims that the Obama-era CIA recruited other nations to spy on Donald Trump, and Microsoft claims Russia, China, and others are using OpenAI tools to support hacking. Sources: https://www.verity.news/

Hashtag Trending
Hashtag Trending Jan.17- Microsoft opens copilot to companies of size; Increased visits to piracy sites; Open source and online hacking tools fueling supply chain attacks

Hashtag Trending

Play Episode Listen Later Jan 17, 2024 6:39


Microsoft drops the requirement for having 300 users or more and opens co-pilot to companies of any size, there's a huge increase in visits to “piracy sites”, Open source code and online hacking tools are fueling growth in supply chain attacks and Apple is now number 1 in smartphone sales.

INNOQ Security Podcast
Türchen #17: NSA und Ransomware - eine verhängnisvolle Affäre

INNOQ Security Podcast

Play Episode Listen Later Dec 17, 2023 4:16


Was Ransomware ist und dass die NSA einige ihrer Hacking-Tools und Zero-Days verloren hat, das habt ihr bereits hinter Türchen 9 und Türchen 15 erfahren. Heute erfahrt ihr, wie verhängnisvoll beides zusammenhängt.

The Audit
Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools

The Audit

Play Episode Listen Later Nov 13, 2023 43:30 Transcription Available


The Audit - Episode 30 - Join us as we speak with cybersecurity expert and hacking hardware enthusiast Cameron Birkland, who introduces us to the world of the Flipper Zero. The brainchild of a successful Kickstarter campaign in 2020, the Flipper Zero might look cute with its dolphin avatar, but it's a potent tool capable of manipulating control systems like RFID and NFC tags, radio remotes, and digital access keys. What would you do if your garage door opener could be hacked? Cameron walks us through how this is possible with his own garage door opener. Don't forget, if you prefer video, check out every episode of The Audit on our YouTube channel. 

Percepticon.de
38 10 Jahre Snowden Leaks und die Cyber Security

Percepticon.de

Play Episode Listen Later Jun 1, 2023 44:23


Die NSA Leaks von Edward Snowden jähren sich im Juni 2023 zum 10. Mal. Zeit, zu rekapitulieren, was wir seitdem gelernt haben. Ich beginne mit einem Rückblick auf die Nachrichten im Juni 2013, als die ersten Enthüllungen ans Licht kamen. Dabei werden wir Prism, XKeyscore und Bullrun genauer betrachten - geheime Programme, die durch die Snowden-Leaks enthüllt wurden und das Ausmaß der staatlichen Massenüberwachung verdeutlichten. Des Weiteren werden wir einen Blick auf Tempora werfen und weitere Programme werfen. Im zweiten Teil befassen wir uns mit der Relevanz der Snowden Leaks für die Cyber-Sicherheit. Wir schauen uns Hacking Tools und Programme wie Quantum Insert, Stuxnet, Regin, QWERTY, Duqu & Flame sowie Operation Shotgiant anschauen, den Hack von Huawei. Im dritten Kapitel beleuchten wir die politischen Reaktionen auf die Leaks und was in 10 Jahren Snowden so passiert ist. Dabei werden die Reaktionen von Australien, dem Vereinigten Königreich, Neuseeland, Kanada, Frankreich und Deutschland im Zusammenhang mit den Enthüllungen untersucht. Außerdem werfen wir einen Blick auf die Entwicklung der Geheimdienstbudgets in den USA, dem Vereinigten Königreich, Australien und Deutschland. Im abschließenden vierten Kapitel ziehen wir eine Bilanz aus den vergangenen 10 Jahren Snowden und betrachten die erlangten Erkenntnisse in Bezug auf Privatsphäre und Verschlüsselung. Wir diskutieren die Gefahren von Insider-Bedrohungen, die Sichtbarkeit von Nachrichtendiensten und das Phänomen des Nachahmens. Zusätzlich gehen wir auf Themen wie Pattern of Life Analysis, Palantir, Social Scoring Systeme, Cloud-Technologien und die Zusammenfassung der besprochenen Inhalte ein. Für die heutige Folge habe ich mal wieder tief in die Recherche und Trickkiste gegriffen. Viel Spaß damit! Shownotes Tagesthemen 10.6.2013 https://www.youtube.com/watch?v=PfaFf6EvP3I PRISM und Co, Zeit Online, https://www.zeit.de/digital/datenschutz/2013-06/nsa-prism-faq?utm_referrer=https%3A%2F%2Fwww.google.com%2F Snowden Archive, https://github.com/iamcryptoki/snowden-archive Projekt Bullrun, Netzpolitik, https://netzpolitik.org/2013/projekt-bullrun-westliche-geheimdienste-knacken-und-umgehen-verbreitete-verschluesselungs-technologien/ Snowden on XKeyscore: https://www.youtube.com/watch?v=K9yHAQtVNME Merkel Handyüberwachung, Spiegel, https://www.spiegel.de/netzwelt/netzpolitik/angela-merkel-soll-in-handy-ueberwachung-nur-pr-problem-gesehen-haben-a-1253403.html Detecting Quantum Insert, Youtube, https://www.youtube.com/watch?v=sUhourxa58g Interview mit Edward Snowden, Spiegel,  https://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html Stuxnet, Ralph Langner, https://www.youtube.com/watch?v=CS01Hmjv1pQ Regin Malware, Spiegel Online, https://www.spiegel.de/international/world/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html Regin Kaspersky, https://www.kaspersky.de/resource-center/threats/regin-platform-malware NSA Preps America for Future Battle, Spiegel, https://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html Duqu and Stuxnet: https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/throwback-attack-duqu-one-of-the-most-skilled-mysterious-and-powerful-apt-groups/ Duqu and Flame, wired, https://www.wired.com/beyond-the-beyond/2015/06/flamestuxnetduqu-attacking-kaspersky/ Duqu: Analysis, Detection and Lessons learned, https://www.crysys.hu/publications/files/BencsathPBF12eurosec.pdf Symantec on Duqu, https://www.youtube.com/watch?v=XpdazjRx3NM CGTN, Youtube, https://www.youtube.com/watch?v=LRGXPVw0LIo Huawei, https://www.ft.com/content/6b6d5a08-cabf-11e3-ba95-00144feabdc0 Huawei, Techcrunch, https://techcrunch.com/2014/03/23/latest-snowden-allegations-nsa-hacks-huawei/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlL...

InfosecTrain
Top Ethical Hacking Tools Trending In 2023

InfosecTrain

Play Episode Listen Later May 5, 2023 5:27


When it comes to preventing fraudulent cybercrimes, data breaches, and identity theft due to the increasing Internet security concerns, enterprises' security professionals and Ethical Hackers use ethical hacking tools. Ethical hacking tools are computer programs and scripts that assist Ethical Hackers in gaining access to computer systems and identifying potential vulnerabilities in computer operating systems, web applications, servers, and networks to protect their organizations. However, ethical hacking tools are employed by many employers, not just in corporations but also in other sectors, particularly the banking and medical, to protect their data from being breached or stolen by cybercriminals. There are different types of ethical hacking tools available on the market that are frequently used to prevent unauthorized users or hackers from accessing systems or networks and hacking them. Ethical hacking tools are available for open-source or commercial use. View More: Top Ethical Hacking Tools Trending In 2023

Paul's Security Weekly TV
No Pr0nHub 4 U, HTTP Lock Status, Selling Hacking Tools, & Chrome Drops HTTP Lock - PSW #783

Paul's Security Weekly TV

Play Episode Listen Later May 4, 2023 107:31


This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783 

Paul's Security Weekly (Video-Only)
No Pr0nHub 4 U, HTTP Lock Status, Selling Hacking Tools, & Chrome Drops HTTP Lock - PSW #783

Paul's Security Weekly (Video-Only)

Play Episode Listen Later May 4, 2023 107:31


This week in the Security News: 5-year old vulnerabilities, hijacking packages, EV charging apps that could steal stuff, do we even need software packages, selling hacking tools and ethics, I hate it when vendors fix stuff, HTTPS lock status, no pornhub for you!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw783 

InfosecTrain
Introduction to Wireless Networks | Types of Wireless Encryption | Wireless Hacking Tools

InfosecTrain

Play Episode Listen Later Apr 11, 2023 89:53


InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this video, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

InfosecTrain
Top Tools Covered in CEH v12

InfosecTrain

Play Episode Listen Later Nov 30, 2022 5:19


Ethical hacking is the process of finding weaknesses and security flaws in systems and programs by impersonating the reasons and activities of cybercriminals. Ethical hacking tools are just computer scripts and programs that help professionals find and take advantage of vulnerabilities in computer systems, networks, and web apps. What are Hacking Tools? The software and techniques used by hackers to discover vulnerabilities in IT system's operating systems, various web applications, servers, and networks are nothing more than computer programs or a sophisticated form of script created by developers. These days, many organizations use ethical hacking methods to protect their data from intruders. Ethical hacking tools can be purchased or downloaded in open source or commercial solutions. Top CEH v12 Tools This article tries to be more than just a list of all tools as they appear in the CEH v12, but also to organize them according to the phase of hacking to which they would belong.

Cancelled Culture TODAY
Hacking tools Question for Hackers : What Is The Budapest Convention On Cybercrime ?.

Cancelled Culture TODAY

Play Episode Listen Later Sep 14, 2022 6:41


Bitcoin, Blockchain, and the Technologies of Our Future
10 HACKING tools you MUST know about!

Bitcoin, Blockchain, and the Technologies of Our Future

Play Episode Listen Later Aug 19, 2022 12:27


https://youtu.be/6F7EHO4niCwhttps://open.lbry.com/@NaomiBrockwell:4/hacking-tools:5You may find a phone charger lying around, and not realize that it's actually a nefarious computer itself.I just got back from DefCon where I explored all kinds of hacking tools that are disguised as everyday items you might regularly use.I go through 10 important hacking tools you NEED to know about, so that you can better protect yourself!The takeaways:Don't borrow cords from strangersTurn off WiFi when you're not using itDon't auto-join WiFi networks00:00 Intro01:35 1. Rubber Ducky02:08 2. OMG Cable02:39 3. LAN Turtle03:05 4. Bash Bunny04:12 5. Key Crock04:39 6. Screen Crab05:04 7. Shark Jack06:04 8. WiFi Pineapple07:55 9. WiFi Pineapple Enterprise08:18 10. WiFi Coconut09:55 How To Protect Yourself10:29 How To Tell If A Cable Is MaliciousThanks to Darren Kitchen from Hak5 for showing us his gear!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

The Philip DeFranco Show
PDS 7.14 PewDiePie JackSepticEye Backlash, Johnny Depp Wins Again, AOC Harassed, & Today's News

The Philip DeFranco Show

Play Episode Listen Later Jul 14, 2022 11:49


Go to https://displate.com/promo/philipdefranco?art=62bb0a81e4c51 and order 1-2 Displates to get 25% off or 30% off when you order 3+ on your Displate today! News You Might Have Missed: https://youtu.be/K0Wxwx6229c TEXT ME! +1 (813) 213-4423 Get More Phil: https://linktr.ee/PhilipDeFranco – TIMECODES: 00:00 - Animal Rescue Groups Working to Rehome 4,000 Beagles 02:55 - Amber Heard's Mistrial Request Rejected 05:37- sponsor 06:33 - AOC Heckled by Troll on Capitol Steps 09:00 - CIA Whistleblower Convicted for Leaking Documents on Hacking Tools – ✩ TODAY'S STORIES ✩ Animal Rescue Groups Working to Rehome 4,000 Beagles: https://www.npr.org/2022/07/14/1111394875/envigo-animal-rescue-beagles Amber Heard's Mistrial Request Rejected: https://ew.com/celebrity/amber-heard-mistrial-motion-johnyy-depp-trial-denied/ AOC Heckled by Troll on Capitol Steps: https://www.businessinsider.com/aoc-wanted-to-deck-man-lewd-comments-about-her-body-2022-7 CIA Whistleblower Convicted for Leaking Documents on Hacking Tools: https://roguerocket.com/2022/07/14/cia-joshua-schulte/ ✩ STORIES NOT IN TODAY'S SHOW ✩ Britney Spears' Father to Give Deposition in the Next Month: https://roguerocket.com/2022/07/14/jamie-spears-deposed/ —————————— Produced by: Cory Ray Edited by: James Girardier, Maxwell Enright, Julie Goldberg Art Department: Brian Borst, William Crespo Writing/Research: Philip DeFranco, Brian Espinoza, Maddie Crichton, Lili Stenn, Ben Wheeler, Chris Tolve Production Team: Emma Leid ———————————— #DeFranco #PewDiePie #JohnnyDepp ————————————

My Precious Data
De hacking tools van de digitale onderwereld!

My Precious Data

Play Episode Listen Later Feb 28, 2022 25:41


Bloodhound, Cobalt Strike, LaZagne, MimiKatz of Powershell? Dit zijn slechts een aantal tools die cybercriminelen gebruiken om hun aanvallen uit voeren. Hoe kunnen we voorkomen dat dergelijke tools worden gebruikt door de verkeerde personen? In deze podcast vertelt security evangelist Eddy Willems welke tools cybercriminelen gebruiken, wat ‘living off the land‘ technieken zijn, hoe cybercriminelen aan tools komen om te hacken, welke tools het meeste worden gebruikt en hoe cybercriminelen deze toepassen. 

Cyber Work
High-tech hacking tools and how to defend against them | Cyber Work Podcast

Cyber Work

Play Episode Listen Later Dec 20, 2021 40:02


Bentsi Ben-Atar of Sepio Systems talks about some truly scary high-tech hacking weapons and techniques, from Raspberry Pis in your mouse or keyboard to charging cables that can exfiltrate data from a mile away. What do we do? How do we prepare? – Join the monthly challenge: https://www.infosecinstitute.com/challenge – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro 3:18 - Getting into cybersecurity4:30 - Career highlights 5:50 - Co-founding two companies 7:22 - Typical work day at CTO and CMO11:29 - New stealthy hacking tools13:08 - Hacking a smart copy machine17:46 - Stealing data with a Raspberry Pi26:01 - The ninja cable 32:11 - Security awareness while traveling 35:20 - How to work battling high-tech cybercrime36:35 - Exploring cybersecurity 37:47 - More about Bentsi's companies39:31 - Find more about Bentsi 39:57 - OutroAbout InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.

Finanzfluss Podcast
#235 Der Wallet-Retter: Interview mit Bruno Krauss von ReWallet

Finanzfluss Podcast

Play Episode Listen Later Nov 11, 2021 37:45


Ein Horrorszenario für alle Kryptoinvestoren: den Zugang zur Wallet zu verlieren. Das Start-Up ReWallet zieht alle Register, um dabei zu helfen, die Wallet zu knacken. Im Gespräch mit Ana erzählt Gründer Bruno Krauss, welche Hacking-Tools er dafür einsetzt, wie hoch die Chance liegt, so eine Wallet zu knacken und wo auch er an Grenzen stößt.

c't uplink (HD-Video)
Hacking-Tools für Heim und Handwerk | c't uplink 40.2

c't uplink (HD-Video)

Play Episode Listen Later Oct 23, 2021


Landläufig gelten Hacker als Kapuzenpullis tragende Kriminelle, die ohne Erlaubnis in fremde Computersysteme einbrechen. Doch viele Hacker nutzen ihr technisches Können dazu, die IT-Sicherheit zu verbessern. Entweder in ihrer Freizeit, oder als angeheuerte Sicherheitsexperten, klopfen sie Software und Computer-Systeme auf Sicherheitslücken ab. Ganz gleich, ob aus edlen oder verwerflichen Motiven: Hacker bedienen sich vieler praktischer Werkzeuge, die ihnen ihre Arbeit erleichtern und Angriffe automatisieren. Viele der Tools sind Open-Source-Software. Sie sind frei erhältlich und laufen oft auch unter Windows. Warum also nicht in den Hacker-Werkzeugkasten greifen und selbst damit die eigenen Systeme prüfen oder das vergessene Passwort einer geschützten Datei knacken? Außerdem lernt man sehr viel über den eigenen Computer. Welche Hacking-Tools es gibt und was es bei ihrem Einsatz zu beachten gilt, darüber sprechen c't-Redakteure Alexander Königstein und Sylvester Tremmel mit Moderator Keywan Tonekaboni. Sie berichten zudem von eigenen Erfahrungen, welche Tools sie am liebsten mögen und wie man mit Hacking auch Spaß haben kann. Links zur Sendung: Hinweise an das Heise Investigativ-Team anonym melden https://www.heise.de/investigativ/ Hacking-Wettbewerb Try Hack Me [https://tryhackme.com/room/picklerick c't-Schwerpunkt Hacking-Tools: Die Werkzeuge der Hacker als Problemlöser https://www.heise.de/hintergrund/Die-Werkzeuge-der-Hacker-als-Problemloeser-6221357.html === Anzeige / Sponsorenhinweis === Diese Ausgabe des c't uplink ist gesponsert von Dell Technologies. Besuchen Sie uns online unter: Dell.de/KMU-Beratung === Anzeige / Sponsorenhinweis Ende ===

c't uplink (SD-Video)
Hacking-Tools für Heim und Handwerk | c't uplink 40.2

c't uplink (SD-Video)

Play Episode Listen Later Oct 23, 2021


Landläufig gelten Hacker als Kapuzenpullis tragende Kriminelle, die ohne Erlaubnis in fremde Computersysteme einbrechen. Doch viele Hacker nutzen ihr technisches Können dazu, die IT-Sicherheit zu verbessern. Entweder in ihrer Freizeit, oder als angeheuerte Sicherheitsexperten, klopfen sie Software und Computer-Systeme auf Sicherheitslücken ab. Ganz gleich, ob aus edlen oder verwerflichen Motiven: Hacker bedienen sich vieler praktischer Werkzeuge, die ihnen ihre Arbeit erleichtern und Angriffe automatisieren. Viele der Tools sind Open-Source-Software. Sie sind frei erhältlich und laufen oft auch unter Windows. Warum also nicht in den Hacker-Werkzeugkasten greifen und selbst damit die eigenen Systeme prüfen oder das vergessene Passwort einer geschützten Datei knacken? Außerdem lernt man sehr viel über den eigenen Computer. Welche Hacking-Tools es gibt und was es bei ihrem Einsatz zu beachten gilt, darüber sprechen c't-Redakteure Alexander Königstein und Sylvester Tremmel mit Moderator Keywan Tonekaboni. Sie berichten zudem von eigenen Erfahrungen, welche Tools sie am liebsten mögen und wie man mit Hacking auch Spaß haben kann. Links zur Sendung: Hinweise an das Heise Investigativ-Team anonym melden https://www.heise.de/investigativ/ Hacking-Wettbewerb Try Hack Me [https://tryhackme.com/room/picklerick c't-Schwerpunkt Hacking-Tools: Die Werkzeuge der Hacker als Problemlöser https://www.heise.de/hintergrund/Die-Werkzeuge-der-Hacker-als-Problemloeser-6221357.html === Anzeige / Sponsorenhinweis === Diese Ausgabe des c't uplink ist gesponsert von Dell Technologies. Besuchen Sie uns online unter: Dell.de/KMU-Beratung === Anzeige / Sponsorenhinweis Ende ===

c’t uplink
Hacking-Tools für Heim und Handwerk | c't uplink 40.2

c’t uplink

Play Episode Listen Later Oct 23, 2021 44:33


Landläufig gelten Hacker als Kapuzenpullis tragende Kriminelle, die ohne Erlaubnis in fremde Computersysteme einbrechen. Doch viele Hacker nutzen ihr technisches Können dazu, die IT-Sicherheit zu verbessern. Entweder in ihrer Freizeit, oder als angeheuerte Sicherheitsexperten, klopfen sie Software und Computer-Systeme auf Sicherheitslücken ab. Ganz gleich, ob aus edlen oder verwerflichen Motiven: Hacker bedienen sich vieler praktischer Werkzeuge, die ihnen ihre Arbeit erleichtern und Angriffe automatisieren. Viele der Tools sind Open-Source-Software. Sie sind frei erhältlich und laufen oft auch unter Windows. Warum also nicht in den Hacker-Werkzeugkasten greifen und selbst damit die eigenen Systeme prüfen oder das vergessene Passwort einer geschützten Datei knacken? Außerdem lernt man sehr viel über den eigenen Computer. Welche Hacking-Tools es gibt und was es bei ihrem Einsatz zu beachten gilt, darüber sprechen c't-Redakteure Alexander Königstein und Sylvester Tremmel mit Moderator Keywan Tonekaboni. Sie berichten zudem von eigenen Erfahrungen, welche Tools sie am liebsten mögen und wie man mit Hacking auch Spaß haben kann. Links zur Sendung: Hinweise an das Heise Investigativ-Team anonym melden https://www.heise.de/investigativ/ Hacking-Wettbewerb Try Hack Me [https://tryhackme.com/room/picklerick c't-Schwerpunkt Hacking-Tools: Die Werkzeuge der Hacker als Problemlöser https://www.heise.de/hintergrund/Die-Werkzeuge-der-Hacker-als-Problemloeser-6221357.html === Anzeige / Sponsorenhinweis === Diese Ausgabe des c't uplink ist gesponsert von Dell Technologies. Besuchen Sie uns online unter: Dell.de/KMU-Beratung === Anzeige / Sponsorenhinweis Ende ===

DIGITAL LEADERSHIP | GENIUS ALLIANCE
Meine 3 neuesten Growth Hacking Tools

DIGITAL LEADERSHIP | GENIUS ALLIANCE

Play Episode Listen Later Oct 21, 2021 20:48


Buche jetzt deinen kostenfreien Strategie-Callhttps://calendly.com/geniusalliance/vorgespraechShownotes zu dieser Podcast Folgehttps://university.genius-alliance.com/Schenke uns deine Bewertunghttps://www.provenexpert.com/genius-alliance/dy2b/Alles andere findest du hier:https://linktr.ee/geniusallianceSupport the show (https://www.provenexpert.com/genius-alliance/dy2b/)

Growth Hacker Space
Here's the ultimate growth hacking tools list 2021

Growth Hacker Space

Play Episode Listen Later Jul 29, 2021 7:30


Growth hacking tools are tools that aid in the expansion of your firm. There are a variety of growth hacking tools on the market. Big data an increasing number of businesses by 2021. Marketing tools are an excellent method to mine data and gain new prospects. Here are a few examples of growth hacking tools used often. Slack was first used by marketers in 2020. LinkedIn designed it as an online collaboration platform. With yearly premium subscriptions, marketers may upgrade, raise their profile, and broaden their reach. Marketers can use Slack to schedule call-outs, email auto-responses, generate headlines, and more with the aid of an automation tool. BuildSmart is one of the free automation solutions available to marketers. It aids in the automation of tasks, procedures, and the creation of reports. As you can see, growth hacking tools are the wheels to a growth hacker. Everyone needs a belt of growth hacking tools in their growth hacking campaigns. Here we talk about the 9 growth hacking tools that will help your business expand.

Cybersecurity FOREVER
Day-281: What Are The Main Categories Of Hacking Tools In Kali Linux?

Cybersecurity FOREVER

Play Episode Listen Later May 8, 2021 6:35


Today I will discuss: 1. What is the use of Kali Linux? 2. What are the main categories of tools in Kali Linux? Watch

International HD
Lauschangriff – Made in Israel

International HD

Play Episode Listen Later Apr 17, 2021 26:16


Israel vollbringt spitzentechnologische Höchstleistungen, das kleine Land gehört zu den führenden Nationen im Bereich Cybersoftware. Doch die ausgeklügelten Hacking-Tools gelangen auch in Länder, die keine Rechtsstaaten sind und Oppositionelle aushorchen. Kurz nach der Jahrtausendwende kamen die ersten richtigen Smartphones auf den Markt. Seither setzten Geheimdienste in aller Welt darauf, in diese einzudringen, sagt Yotam Gutman, der Vermarktungschef der israelischen Firma «Sentinel One». Sie ist eine von vielen Cyberfirmen der selbsternannten Start-up-Nation. «Sentinel One» arbeitet nicht am digitalen Angriff, sondern an der Verteidigung: Die Firma schützt Unternehmen auf der ganzen Welt vor Hackerangriffen. Es gibt andere, die stehen auf der offensiven Seite: Firmen, die Software programmieren oder Hardware herstellen, welche Cyberangriffe ermöglichen. Dass das kleine Israel in der Cyberbranche weltweit führt, sei nicht Zufall sondern Notwendigkeit, sagt Gutman: «In unserer Konfliktregion mussten wir schlicht solche Instrumente entwickeln, um die Oberhand zu gewinnen.» Das Land verfügt über exzellente Universitäten; eine Schlüsselrolle bei der Entwicklung der Technologie spielt aber auch die israelische Armee, deren Cybereinheiten jungen Israelis hochspezialisierte Ausbildung vermitteln. Die Hacking-Tools helfen Ermittlungsbehörden weltweit im Kampf gegen die Kriminalität. Allerdings, sie stossen auf Interesse auch bei repressiven Regimes, die Oppositionelle verfolgen, kritische Journalistinnen und Menschenrechtsaktivisten zum Schweigen bringen wollen.

International
Lauschangriff – Made in Israel

International

Play Episode Listen Later Apr 17, 2021 26:16


Israel vollbringt spitzentechnologische Höchstleistungen, das kleine Land gehört zu den führenden Nationen im Bereich Cybersoftware. Doch die ausgeklügelten Hacking-Tools gelangen auch in Länder, die keine Rechtsstaaten sind und Oppositionelle aushorchen. Kurz nach der Jahrtausendwende kamen die ersten richtigen Smartphones auf den Markt. Seither setzten Geheimdienste in aller Welt darauf, in diese einzudringen, sagt Yotam Gutman, der Vermarktungschef der israelischen Firma «Sentinel One». Sie ist eine von vielen Cyberfirmen der selbsternannten Start-up-Nation. «Sentinel One» arbeitet nicht am digitalen Angriff, sondern an der Verteidigung: Die Firma schützt Unternehmen auf der ganzen Welt vor Hackerangriffen. Es gibt andere, die stehen auf der offensiven Seite: Firmen, die Software programmieren oder Hardware herstellen, welche Cyberangriffe ermöglichen. Dass das kleine Israel in der Cyberbranche weltweit führt, sei nicht Zufall sondern Notwendigkeit, sagt Gutman: «In unserer Konfliktregion mussten wir schlicht solche Instrumente entwickeln, um die Oberhand zu gewinnen.» Das Land verfügt über exzellente Universitäten; eine Schlüsselrolle bei der Entwicklung der Technologie spielt aber auch die israelische Armee, deren Cybereinheiten jungen Israelis hochspezialisierte Ausbildung vermitteln. Die Hacking-Tools helfen Ermittlungsbehörden weltweit im Kampf gegen die Kriminalität. Allerdings, sie stossen auf Interesse auch bei repressiven Regimes, die Oppositionelle verfolgen, kritische Journalistinnen und Menschenrechtsaktivisten zum Schweigen bringen wollen.

Growth Hacking by Hendrik Lennarz
#162 - Unsere 10 Growth Hacking Tools

Growth Hacking by Hendrik Lennarz

Play Episode Listen Later Apr 8, 2021 17:19


Am 21.4. um 17 Uhr ist es soweit. Ask me anything about Growth - Special "Tools for Growth" - Sicher dir dein kostenloses Ticket solang noch welche da sind: https://www.eventbrite.de/e/ask-me-anything-tools-you-need-for-growth-tickets-145439299861

NDR Info - Das Forum
Hacking Made in Israel. Ein Land exportiert den Lauschangriff

NDR Info - Das Forum

Play Episode Listen Later Feb 4, 2021 24:14


Israelische IT-Unternehmen sind führend in der Entwicklung von Hacking-Tools. Offensiv eingesetzt kann das Demokratien zerstören. Auf der Welt sind mehr als drei Milliarden Smartphones in Gebrauch. Wir tragen die Geräte fast immer bei uns. Häufig liegen sie sogar neben uns, wenn wir schlafen. Wir telefonieren mit den Smartphones, wir schreiben, spielen, fotografieren und hören. Wir recherchieren, flirten, streiten. Wir teilen sehr viele Informationen mit diesen Geräten.  Das macht Smartphones so wertvoll. Auch für Geheimdienste und Ermittlungsbehörden. Ein Smartphone zu infiltrieren, ist technisch eine komplexe Aufgabe. Nur wenige Cyber-Unternehmen auf der Welt bieten dafür Dienstleistungen an. Sie machen das teilweise im Verborgenen, teilweise recht offen. Über die Details ihrer Angebote und ihre Kunden sprechen sie grundsätzlich nicht. Die erfolgreichsten Firmen – die den Lauschangriff aufs Smartphone verkaufen – kommen aus Israel. Die „NSO-Group“ hat „Pegasus“ entwickelt. Mit der Software kann ein Handy gehackt werden. Weitgehend unbemerkt vom Nutzer können Daten ausgelesen, Telefonate ausgelauscht oder Fotos gemacht werden. Wie alle Unternehmen der offensiven Cyber-Branche geben sie an, dass mit ihrer Hilfe Verbrechen bekämpft, potentielle Attentäter ausgespäht und damit Leben gerettet werden kann. All das stimmt.  Aber die Hacking-Tools „Made in Israel“ gelangen auch in Länder, die keine Rechtsstaaten sind. Länder, die Oppositionelle verfolgen. Kritische Journalist*innen. Menschenrechtsaktivist*innen. 

B5 Reportage
Made in Israel - Hacking-Tools für den Lauschangriff

B5 Reportage

Play Episode Listen Later Jan 29, 2021 21:57


Die Betreiber der großen Smartphone-Betriebssysteme werben damit, dass sie ihre Kunden vor Cyber-Angriffen schützen. In einem Bürogebäude in Herzliya nördlich von Tel Aviv dürften die Mitarbeiter über diese Aussage schmunzeln. Die NSO-Group - gegründet von ehemaligen israelischen Elitesoldaten - hat "Pegasus" entwickelt. Mit der Software könnte so ziemlich jedes Handy gehackt werden, heißt es.

Cyber Security For All
Top 10 Hacking Tools For You

Cyber Security For All

Play Episode Listen Later Jan 22, 2021 25:57


Apetech Website: https://www.apetech.me/social https://anchor.fm/apetech/message Email: letschat@apetech.me Twitter: @apetechda Did you know there are over 125 cyber security tools out there? In this episode, I discuss the top 10. I go over some details and share my opinions about each tool. If you want to check them out for yourself, head on over to sectools.org. Here are the tools we discussed in this episode. Wireshark Metasploit Nessus Aircrack Snort Cain and Abel BackTrack Netcat tcpdump John the Ripper --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/apetech/message Support this podcast: https://anchor.fm/apetech/support

Helping You Tech
What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and expl

Helping You Tech

Play Episode Listen Later Jul 21, 2020 22:45


ONAPI
Ethical Hacking Tools

ONAPI

Play Episode Listen Later Jun 8, 2020 13:53


In this chapter we will discuss in brief some of various tools that are widely used to prevent hacking and getting unauthorized access to a computer network. Check www.metasploit.com. If you liked it dont forget to send your reviews telling us how you feel about our sessions, thank you.❤️

chycho
Whispering Wikileaks' Vault 7 "Year Zero": CIA Hacking Tools Revealed [ASMR Reading]

chycho

Play Episode Listen Later May 18, 2020 41:18


WikiLeaks' Vault 7 "Year Zero": CIA Hacking Tools Revealed https://wikileaks.org/ciav7p1/ WikiLeaks' CIA Organizational Chart https://wikileaks.org/ciav7p1/files/org-chart.png Video on YouTube: https://youtu.be/RdlMCh2idHI Video on BitChute: https://www.bitchute.com/video/HoxVDk5oSJV1/ Website: http://www.chycho.com Patreon: https://www.patreon.com/chycho Paypal: https://www.paypal.me/chycho Subscribe Star: https://www.subscribestar.com/chycho YouTube: https://www.youtube.com/user/chychochycho BitChute: https://www.bitchute.com/channel/chycho Twitch: https://www.twitch.tv/chycholive Discord: https://discord.gg/MXmS7B9 Minds: https://www.minds.com/chycho Gab: https://gab.ai/chycho Ello: https://ello.co/chycho Vk: https://vk.com/id580910394 Twitter: https://twitter.com/chycho SoundCloud: https://soundcloud.com/chycho

Chill Chill Security
EP252 - Security Article - Latest web hacking tools, Q1 2020 by Portswigger

Chill Chill Security

Play Episode Listen Later Apr 9, 2020 6:11


Sponsor by SEC Playground Music by https://www.bensound.com/ --- Support this podcast: https://anchor.fm/chillchillsecurity/support

Growth Hacking Series
How To Select The Top Growth Hacking Tools // Growth Hacking Series Podcast // Nader Sabry

Growth Hacking Series

Play Episode Listen Later Apr 7, 2020 3:42


What are the best growth hacking tools to get you started. A deep dive into what are the best type of tools needed for growth hacking. These growth hacking tools http://nadersabry.com/blog/growth/wha...You've already heard about growth hacking and how it can help your startup go from zero to profitable in less time than you might think. However, while reading about success stories and understanding the mechanics of growth hacking is vital, that kind of knowledge can only get you part of the way there. If you're interested in hacking your way to growth, then you need to utilize the right tools and the proper mindset to get to where you want to be. Fortunately, because we live in a digital age, there are a plethora of tools available. Today we're going to be looking at the top growth hacking tools, as well as discussing how they work and how to make sure that you're utilizing them effectively. Growth hacking tool checklistWhen researching and testing tools for growth hacking consider the following:0:01:10 -- Does this tool directly help me solve my growth problem?0:01:26 -- Are special expertise needed to use this tool I don't have?0:01:41 -- Is this tool cost effective?0:01:52 -- When I scale is this tool still cost effective?0:02:00 -- Does this tool have integrations with other tools?0:02:23 -- Can I start using this tool right now?0:02:54 -- Can I get basic results within 7 days?These seven checkpoints allow you to evaluate any given tool within 5 minutes. The purpose isn't a thorough review, as you will need to shift through several tools but rather for short-listing purposes. This checklist is best done within teams where multiple views can be taken into account. Ideally teams with cross-functional capabilities will give the best outcomes. If you don't have a team like that find some friends or other experts who you can barter time and expertise with. _______The original blog post is here for further reading and a list of actual online growth hacking courses that can help youhttp://nadersabry.com/blog/growth/wha..._______Growth Hacking Series ----------------------------------------------------------------------ALSO WATCH more about Growth Hacking What is Growth Hacking https://youtu.be/W3MJsn-X-O8Why Growth Hacking https://youtu.be/JJFM1F8N15QHow Growth Hacking Works https://youtu.be/aqJZI16EE9gLessons from the superstars of Growth Hacking https://youtu.be/wbkxnODX5WcLearn When Growth Hack Is Best For You https://youtu.be/b6NEUxUYVwQTop Growth Hacking Courses https://youtu.be/j1n5CCwAH2YHow To Select The Top Growth Hacking Tools https://youtu.be/F4GFa5rYEuk----------------------------------------------------------------------ALSO visit my website and social media accountsFor more information on Growth, Innovation and Entrepreneurship Nader Sabry | Website http://nadersabry.com/Nader Sabry | Instagram https://www.instagram.com/_nadersabry/Nader Sabry | Linkedin https://www.linkedin.com/in/nadersabry/Nader Sabry | Medium https://medium.com/@nadersabryNader Sabry | Twitter https://twitter.com/Naddd----------------------------------------------------------------------Please subscribe and press the bell for all future updates https://www.youtube.com/channel/UCtJs...----------------------------------------------------------------------#business #podcast #businessideasThanks for watching How To Select The Top Growth Hacking Tools // Growth Hacking Series Podcast // Nader Sabry

Info Risk Today Podcast
Analysis: Russian Hackers Hijack Iranian Hacking Tools

Info Risk Today Podcast

Play Episode Listen Later Oct 25, 2019


Data Breach Today Podcast
Analysis: Russian Hackers Hijack Iranian Hacking Tools

Data Breach Today Podcast

Play Episode Listen Later Oct 25, 2019


Techmeme Ride Home
Tue. 05/07 - All The Headlines From Google I/O

Techmeme Ride Home

Play Episode Listen Later May 7, 2019 16:06


All the news that I could possibly grab from Google’s I/O keynote, again, Alexa IS spying on you, Cruise Automation raises a big round... and will we ever actually see the Galaxy Fold? Sponsors: Lightstream.com/ride Metalab.co Links: THE PIXEL 3A PUTS GOOGLE’S PHENOMENAL CAMERA IN A $400 PHONE (The Verge) Alexa has been eavesdropping on you this whole time (The Washington Post) Check your Alexa recording archive here Study: Voice Assistants Far From Hot Marketplace For Buying (MediaPost) GM’s self-driving division Cruise raises another $1.15 billion (The Verge) How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks (NYTimes) Samsung Electronics says no anticipated shipping date yet for Galaxy Fold (Reuters) Subscribe to the Premium Ad-Free Feed right here!

Kurz informiert – die IT-News des Tages von heise online
Hacking-Tools, Win10 Datenschutz, Minister-PR, Minecraft AR, | Kurz informiert vom 7.5.2019

Kurz informiert – die IT-News des Tages von heise online

Play Episode Listen Later May 6, 2019


China schon vor den Shadow Brokers im Besitz von Hacking-Tools der NSA Mutmaßlich chinesischen Hackern in Staatsdiensten ist es offenbar gelungen, der NSA Hacking-Werkzeuge zu entwenden und diese gegen Ziele in Europa und Asien einzusetzen – schon lange vor der aufsehenerregenden Versteigerung des Tools durch die Hackergruppe Shadow Brokers in 2016. Das jedenfalls behaupten Sicherheitsforscher des US-Softwareunternehmens Symantec. Wenn es dem chinesischen Staat tatsächlich gelungen sein sollte, NSA-Werkzeuge abzugreifen und selbst gegen Ziele einzusetzen, würde das sehr deutlich machen, welche Gefahr von staatlichen Hackern auch in westlichen Demokratien ausgeht. Microsoft verspricht Verbesserungen beim Datenschutz Microsofts Datensammelei in Windows 10 und Office steht in der Kritik. Nun will das Unternehmen Änderungen hinsichtlich der Telemetriedatenerfassung vornehmen, um die Transparenz sowie die Kontrolle der erhobenen Daten durch die Nutzer zu verbessern – allerdings nur unter Windows 10 und Office 365. Unklar ist, ob diese Maßnahmen ausreichen, um die europäischen Datenschützer zu beschwichtigen. Journalistenverband moniert Minister-PR im Internet Der Deutsche Journalistenverband ist besorgt darüber, dass Kabinettsmitglieder ihre Außendarstellung und politischen Botschaften immer mehr über soziale Medien steuern. "Pressestellen verbreiten selbstproduzierte Inhalte über die sozialen Netzwerke, in denen Minister grinsend Hände schütteln und Vorzeigeprojekte besuchen", sagte DJV-Chef Frank Überall der Neuen Osnabrücker Zeitung. Zugleich würden die Pressestellen zunehmend ihrer Auskunftspflicht nicht nachkommen; Anfragen von Journalisten versandeten oder würden nur ungenügend beantwortet. Überall hält diesen Trend für äußerst bedenklich. Minecraft kommt aufs Handy Microsoft veröffentlicht Minecraft als AR-Handyspiel. Das hat das Unternehmen auf der Entwicklerkonferenz Build angekündigt. Bisher gibt es vom Minecraft im Pokemon-Go-Stil nicht mehr als einen kurzen Teaser. Darin ist zu sehen, wie die Klötzchen-Grafiken auf dem Bildschirm in den Kamera-Feed der Umgebung eingebettet werden. Weitere Details will Microsoft am 17. Mai bekanntgeben – dann wird Minecraft zehn Jahre alt. Diese und weitere aktuelle Nachrichten finden Sie ausführlich auf heise.de

Quorum With Q
E119 - Memory Hacking and Hacking Tools

Quorum With Q

Play Episode Listen Later Mar 2, 2019 71:27


Memory hacking tools like Spiros Tool, Visual Studio and dbgx64

Craig Peterson's Tech Talk
Deep Look At New Law Concerning Equifax - New Hacking Tools: AS HEARD ON: WTAG

Craig Peterson's Tech Talk

Play Episode Listen Later Sep 18, 2018 12:44


In the wake of the Equifax data breach one year ago, an estimated 145 million consumers’ personal information was stolen from the credit agency. Craig talks with Jim Polito in depth about the Equifax hack and the changes that will take effect this week. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 09/18/2018 Deep Look At New Law Concerning Equifax - New Hacking Tools Craig Peterson: [00:00:00] Hi guys. Craig Peterson here this morning with Jim Polito I talked about two things one I wouldn't do a bit of depth here on the whole Equifax hack and the changes that go into effect this week. That's right. New laws in place signed by President Trump a couple of months back. And this is a real game changer. So all of the pain people went through. It's going to be a little easier here in the future. And then I also just took a couple of minutes and explained a whole new piece that ran somewhere out there and how the bad guys are using it. And in fact a whole new category of business in the bad guys' field. So there's lots going on and here we go with Jim. [00:00:53] This is the man with all the answers the guy we turn to all the time. [00:00:58] Is it a national I.T. professionals day. He's far above and I.T. professional but you know he was at one time. Joining us now the man the sheriff of the Internet Craig Peterson. [00:01:12] Good morning sir. Good morning. Yes I am. You are t.  [00:01:19] Hey you helped us out when we had that whole Equifax data breach and you have done a lot of people for free. By the way for free on your own time which impacted about 145 million customers that personal information was stolen from this credit agency. So the advice was Hey get out there freeze your credit you get paid to do it but freeze your credit. Now you're saying that it may be soon that you don't have to pay that transaction fee for each of the three agencies that it will be free. [00:01:58] Here's what happened and of course a lot of people were very upset with what happened then and understandably so. [00:02:04] Equifax I still can't believe that they're still in business and they are they have a license to print money. The three credit firms have a license to print money. You and I should have gotten in on that. [00:02:19] Well they didn't lose my license right there. That's right. It's just it's the implication is if you screw up it's over. Right. Pull your license. Yeah. They've got it. They smuggled in the printing press the same way they put it. That's exactly what they're doing. And you know Jim I did it for 100 listeners. OK. [00:02:44] I monitored the credit stuff in the dark web for a while and I'm probably next month going to start doing something going to offer it for small businesses as well to see if your small business information is out there OK. But I did it for a couple of hundred listeners absolutely free. And some reports. And part of the report that I put together were OK if you were hacked with Equifax would say most people were frankly or if something new shows up on the dark web. Here's what you should do and it involves a whole bunch of different things you have to do because frankly if they hacked your information nobody cares right. [00:03:29] You can't call up. You know I work with the FBI. Yes yes. And the FBI is there you know it's come on. You're one of how many. [00:03:41] 145 million consumers. Is the right [00:03:48] Word. Trying to a while anyway. So yeah. So they don't really care but if someone had stolen your information and then you're dead then you have to talk to the police department. You had to go the next step and the course now file that report with all of your you know credit card companies that maybe the information was used to steal money from the credit card people had the cars that were purchased using their name and their credit for they had to prove now that they never bought that new car that goes on and on. [00:04:25] Right. [00:04:25] At a minimum if your information is stolen and the bad guys use that word talk to them Jim I'm a nightmare because what I just talked about you have to call the bank right or you still do. Right. [00:04:38] This stuff is still happening. Right. And when you have to call a bank during working hours right because that's when they're open. Right. [00:04:48] When do you have to reach out to all of these different agencies the police department everything. Yeah the police and the banks are there 24/7. But there are fraud bureaus are the people who are handling this thing are only there nine to. When you do your homework. [00:05:06] Most people work 9:00 to 5:00. [00:05:09] So we're talking about on average if your data is stolen and someone then tries to impersonate you. We're talking an average of three hundred hours of your time writing letters chasing down documentation sending it off to all of these different credit agencies places where your name was used in order to try and get your good name back. [00:05:36] And those are 300 hours out of a working here. That's two thousand hours right your normal working here is 24 hours. Right. [00:05:44] So we're talking about you know what is it about 20 percent of your year. You can't work because you are running around trying to take care of all of this stuff. [00:05:56] So on top of all of that what you have to do is in most states here you have to pay a fee of between five and ten dollars on top of all of that to freeze your credit. [00:06:11] Yeah. [00:06:12] So now it's it's just it's a nightmare when it happens to people and that's why I spent so much time and my staff. I had five people working full time on all of this dark web stuff for our listeners here. [00:06:25] That was great period of three weeks OK. It was just crazy. Now that and so what that means is if you want to free the credit it's five to ten bucks for every one of those three agencies on top right now if you want to use your credit you have to pay another five or 10 bucks to get your credit unfrozen to get it right. So here's what's happened now. The president Trump has signed a bill that was part of the economic growth regulatory relief and Consumer Protection Act. So just starting on the 21st. So that's very sweet. Yep the law now that President Trump signed abolishes those fees. So all of those fees associated with freezing and freezing your credit which by the way that even if you freeze your credit it's only good for maximum three months. So all of those fees are gone. And that's a really good thing because the aquifer. [00:07:30] Yeah. After the Equifax hack Jim about 20 percent now of consumers got a freeze. But most of those phrases ended up expiring. So this is a great thing. I wish Equifax wasn't in business. I wish you didn't have to deal with me. [00:07:46] And you know I'm not calling for regulation here by any stretch but how the heck are these people not sitting in jail somewhere. Yeah we're responsible for something as simple as not doing enough data to third party software in other words they updated you update your Windows machine. OK. That's all well and good. And you got to do that. But on top of your Windows machine you have your Chrome browser you have Firefox to house whatever other tools and they didn't know [00:08:21] What it was. [00:08:22] Ok. And they're still walking around. Oh yeah couple of people lost their jobs. [00:08:27] That's about all of that. [00:08:30] And it cost Americans millions. In fact there are some people who are critical of this saying hey listen look at the money Equifax made because they quote lost unquote 145 million consumers personal information and then they charge five to ten bucks every time someone wanted to freeze and freeze. We're talking about them or tentatively here having made at least 50 million dollars of their script. [00:08:57] We're talking with Craig Peterson. At the end of the segment. We're going to give you a number and if you text my name you'll get this information plus a lot of other information standard data and text rates apply. Quickly before we go I do want to talk about this new ransomware that has arrived and Ransomware is that you know comes in and says hey your computer is locked and we'll unlock it. We can fix the virus if you pay us. So there's a new one out there. [00:09:29] Yeah this is. This is an interesting one because the ransom that's out there right now has been automatically morphine itself. So it changes it's also your standard antivirus software test is not going to catch that. We've now found something new and it's called the path. It just appeared last month for the first time we finally saw this stuff out there. But it has a module in it that allows attackers to customize the attack and how it's attacked. And the encryption key that text doesn't know everything else. Now we have we have a customer Jim and this is just not so. But it's true who has a business as a law firm and the law firm had apparently been losing documents that had to be filed with the court and then all of a sudden it started losing pictures of the owner's family. All of these pictures and stuff got stolen. It looks like what might have happened years that the guy hired hacked or he's not the guy by the bad guy which was in this case probably his ex-wife had hired a they got onto the computers and made some changes let's say to the files deleted things everything else. And apparently, it cost thirty-five dollars to hire this hacker to try and destroy this small law firm. Thirty-five bucks that's what it's going for right now. So and it's really kind of an interesting case. At any rate what we're talking about now is new type of ransomware completely remotely controllable completely customizable. Perfect for hacker as a service. That's a new business out there. Hacking has a service for thirty-five dollars. You as you can have someone hack your former business partner and your wife or maybe some company that you know has some money and you want to get that money out of that bank account 35 bucks is what it's going for. [00:11:48] You see now this is why Craig Peterson is with us all the time because you get this information and then if you want more information you are more in-depth than you want to be on his list if there's another massive hacker breach or something. It's very simple. All you have to do is text my name Jim to this number. [00:12:05] 855-385-5553. That's 855-385-5553.  [00:12:20] Standard data and text rates apply. Craig Peterson will not sell you down the river he will not yield he won't do anything like that. That's the bottom line and he's here every Tuesday. Craig thank you so much for your time buddy. [00:12:37] Hey thanks, Jim. Take care. [00:12:38] You too. Craig Peterson, a great resource. OK when we return a final word.   --- Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating! Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year!  More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Thriving Launch
Growth Hacking Tools For Sales - Max Altschuler

Thriving Launch

Play Episode Listen Later Jul 17, 2018 15:23


Utilizing growth hacking tools can help companies grow their revenue despite having less financial and human capital resources. On this episode, we are here with Max Altschuler. He's the founder of Sales Hacker, a media company that helps companies figure out how to really thrive with sales. Max explains what sales hacking is and how it can help start-ups grow and scale their businesses. He also shares what software companies can use to leverage automation in their sales processes. Get all the resources for this episode and listen to more at https://www.thrivinglaunch.com

Stolendroids Podcast
Fare Thee Well, Paint

Stolendroids Podcast

Play Episode Listen Later Aug 1, 2017 59:43


No, no, no little one; MS Paint and the iPod aren't dead . . . we just sent them to live with some nice people on a farm upstate!Trump says Apple is building the best factories ever in the USA and it's because of him, but Trump doesn't know what he's talking about. Pokémon Go Fest was such a bust that people are suing them over it. For its part, Niantic is offering them some free Poké Balls and incense. Which, you know, okay... whatever. And Twitter's popularity may have stalled out. We're not sure if it's because of competing platforms or how associated it's become with a certain President though.Headlines:WhatsApp reaches over One Billion Active UsersTwitter isn't growing so well. Or at allTrump says Apple will Build 'three big plants, beautiful plants' in the USApple says goodbye to the iPodHuawei refocuses on the high endMS Paint no longer nativeWaze joins Google Maps on Android AutoYouTube Red & Google Play Music will Merge and Form New Service3 New CIA-developed Hacking Tools for MacOS & Linux ExposedNokia 3310 in 3G form at the FCCPokemon Go Fest attendees file lawsuit against NianticComcast’s ‘Instant TV’ service for cord cutters could launch by year-endSamsung reportedly in talks to expand Samsung Pay to non-Samsung phonesFitbit now works with Windows' CortanaZuke’s Favorite: Lisa Foiles is perfectZohner’s Favorite: LEGO NINJAGO Movie looks amazing See acast.com/privacy for privacy and opt-out information.

Onward Nation
Episode 528: Top sales hacking tools, with Cole Fox.

Onward Nation

Play Episode Listen Later Jul 5, 2017 43:33


Cole Fox is a passionate believer in sales and entrepreneurship. He started his career in the wine industry and then immediately founded a vodka company. Then during the 2008 economic meltdown, he shifted his career into sales…full-gear…he sold office supplies, door-to-door. And that wasn’t easy Onward Nation…so he soon discovered the magic of technology and was lucky enough to be among the first hired at LinkedIn. From there, he became passionate about startups and has recently been a ‘resident sales hacker’ at many venture-backed tech startups. He now runs sales for a sales hacking tool called LeadIQ. What you’ll learn about in this episode How bio-hacking can contribute to your success How LeadIQ works The top preparation and time-saving tools that Cole uses and highly recommends A tough lesson that taught Cole to take logic into play Mastering the essential skill of sales in order to thrive in business today Filling in the holes in your business development and sales pipeline The main challenge that business owners face Why you should focus on continually improving yourself a small amount every single day The importance of implementing a list-building tool as part of your business development plan Getting outside of your head and the way you view the world How to best connect with Cole: Website: leadiq.com LinkedIn: www.linkedin.com/in/colejfox

Fault Lines
NSA Hacking Tools Used for Another Massive Cyber Attack

Fault Lines

Play Episode Listen Later Jun 28, 2017 56:48


Garland and Lee discuss the worldwide Eternalblue cyber-attack that was based on NSA hacking tools.Garland and Lee discuss General Mattis's claims of thwarting a theoretical Syrian chemical attack.Garland and Lee interview Steven Gordon regarding Project Veritas's latest undercover video of CNN talking head Van Jones.

Craig Peterson's Tech Talk
Clone a Security Badge - Windows Users Turn off Your Computers this Weekend - People Who Fall Prey to Identify Theft, Phishing, and Hacks - What Does Win 10 Collect from Your PC - Symantec Connects 40 Cyber Attacks to CIA Hacking Tools - Shield Yourself F

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 15, 2017 45:12


What is cyberattack, and what are these attacks all about? Who are being attacked? What are the reasons for the cyberattacks? Just recently, WikiLeaks have published over 8,700 confidential documents and information from different government and private organizations. And now, Windows users are even advised to turn off their computers over the weekend as there were threats of hacking. How can this be stopped? How can we keep our data safe? These and more only on CraigPeterson.com. --- Related articles: What kinds of people fall prey to identity theft, phishing, and hacks? It’s not who you think http://craigpeterson.com/radio-show/what-kinds-of-people-fall-prey-to-identity-theft-phishing-and-hacks-its-not-who-you-think/12240 Microsoft Finally Reveals What Data Windows 10 Collects From Your PC http://craigpeterson.com/radio-show/microsoft-finally-reveals-what-data-windows-10-collects-from-your-pc/12243 Symantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks http://craigpeterson.com/radio-show/symantec-connects-40-cyber-attacks-to-cia-hacking-tools-exposed-by-wikileaks/12246 Congress Just Made It Harder for You to Shield Yourself From Internet Discrimination http://craigpeterson.com/radio-show/congress-just-made-it-harder-for-you-to-shield-yourself-from-internet-discrimination-2/12250 How to clone a security badge in seconds http://craigpeterson.com/radio-show/how-to-clone-a-security-badge-in-seconds/12252 Windows users might want to turn off their computers this weekend, warns security researcher who’s only being ‘somewhat glib’ http://craigpeterson.com/radio-show/windows-users-might-want-to-turn-off-their-computers-this-weekend-warns-security-researcher-whos-only-being-somewhat-glib/12257  --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Geeksters - Podnutz
Geeksters #187 – Where Is Vault 1 Through 6?

Geeksters - Podnutz

Play Episode Listen Later Mar 19, 2017


Geeksters Episode 186 Show Notes Title — Where is vault 1 through 6? Hosts: Martin Obando * WikiLeaks Dumps Docs on CIA’s Hacking Tools https://krebsonsecurity.com/2017/03/wikileaks-dumps-docs-on-cias-hacking-tools/ * WikiLeaks: We’ll Work With Software Makers on Zero-Days https://krebsonsecurity.com/2017/03/wikileaks-well-work-with-software-makers-on-zero-days/ * 7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files https://thehackernews.com/2017/03/cia-wikileaks-hacking.html * Smashing Security http://www.stitcher.com/podcast/smashing-security * Amazon Echo […]

Risk & Repeat
Risk & Repeat: Leak of CIA hacking tools creates confusion

Risk & Repeat

Play Episode Listen Later Mar 15, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the confusion around WikiLeaks' release of government documents regarding CIA hacking tools.

news risk cia confusion cybersecurity creates repeat leak wikileaks hacking tools searchsecurity healthcare security & compliance
Risk & Repeat
Risk & Repeat: Leak of CIA hacking tools creates confusion

Risk & Repeat

Play Episode Listen Later Mar 15, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the confusion around WikiLeaks' release of government documents regarding CIA hacking tools.

Craig Peterson's Tech Talk
Wikileaks Releases NSA Hacking Tools – What’s the Impact on You?

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 10, 2017 11:04


Wikileaks announced that they have their hands on the CIA’s hacking tools, and they are putting it on their website in what they call "Vault 7". They’ve exposed something called "Weeping Angel", from 7,800 plus pages with 943 attachments of confidential documents. These documents were from the CIA's Center for Cyber Intelligences dating back 2013, and this is the largest publication of confidential documents on the agency. Together with the documents were tools as well. Find out more today! --- Related articles: WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents http://craigpeterson.com/computers/wikileaks-releases-trove-of-alleged-c-i-a-hacking-documents/11936 --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
Should Government Keep Their Hacking Tools Secret? And How You Can Be Hacked from Miles Away

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 17, 2017 15:17


Did you realize that it's entirely possible for someone to hack your fingerprints and use them even if they are thousands of miles away from you? Was NSA hacked again, and what are the tools they are using. --- Related stories: How flashing a peace sign can set you up for identity theft http://craigpeterson.com/news/how-flashing-a-peace-sign-can-set-you-up-for-identity-theft/11421 The FBI Is Apparently Paying Geek Squad Members To Dig Around In Computers For Evidence Of Criminal Activity http://craigpeterson.com/news/the-fbi-is-apparently-paying-geek-squad-members-to-dig-around-in-computers-for-evidence-of-criminal-activity/11386 --- More stories and tech updates at:www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

The BradCast w/ Brad Friedman
'BradCast' 8/23/2016 (Princeton's Andrew Appel on stolen NSA hacking tools and concerns about manipulated e-voting systems)

The BradCast w/ Brad Friedman

Play Episode Listen Later Aug 23, 2016 58:45


The BradCast w/ Brad Friedman
'BradCast' 8/23/2016 (Princeton's Andrew Appel on stolen NSA hacking tools and concerns about manipulated e-voting systems)

The BradCast w/ Brad Friedman

Play Episode Listen Later Aug 23, 2016 58:45


DEF CON 23 [Audio] Speeches from the Hacker Convention
Craig Young - How to Train Your RFID Hacking Tools

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 15, 2015


Materials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf Whitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-WP-UPDATED.pdf Extras: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-Extras.rar How to Train Your RFID Hacking Tools Craig Young Security Researcher, Tripwire VERT With insecure low frequency RFID access control badges still in use at businesses around the world and high frequency NFC technology being incorporated into far more consumer products, RFID hacking tools are invaluable for penetration testers and security researchers alike. Software defined radio has revolutionized this field with powerful devices like Proxmark3 and RFIDler available for a modest price. 3D printing has also presented new opportunities for makers to create custom antennas and cases to fit specific tasks. While there is a lot of great information out there about how people use these tools, there is relatively little more than source code available for learning how to develop new firmware to equip these devices with purpose-built logic. This presentation will discuss the overall architecture of the Proxmark3 and RFIDler tools and provide tutorial style examples for enhancing the firmware. Proxmark3 development will be demonstrated by upgrading the stand-alone mode to support NFC operations. For the new kid on the block, RFIDler, we will take a look at how to tweak the system for optimal reliability using 3D printing and enhanced diagnostic tools. Craig Young (@CraigTweets) is a computer security researcher with Tripwire's Vulnerability and Exposures Research Team (VERT). He has identified and responsibly disclosed dozens of vulnerabilities in products from Google, Amazon, IBM, NETGEAR, Adobe, HP, and others. His research has resulted in numerous CVE assignments and repeated recognition in the Google Application Security Hall of Fame. Craig's presentations on Google authentication weaknesses have led to considerable security improvements for all Google users. Craig won in track 0 and track 1 of the first ever SOHOpelessly Broken contest at DEF CON 22 by demonstrating 10 0-day flaws in SOHO wireless routers. Craig has more recently turned his attention to a different part of the wireless spectrum with research into home automation products as well as RFID/NFC technology. Twitter: @CraigTweets

Paul's Security Weekly
Hack Naked TV - Favorite Hacking Tools

Paul's Security Weekly

Play Episode Listen Later Sep 2, 2015 12:27


This week on Hack Naked TV, Beau talks about his top 5 favorite pentest and hacking tools as seen at BlackHat/DefCon/B-Sides.   tinyurl.com/HNTV-EMPIRE tinyurl.com/HNTV-SSTI tinyurl.com/HNTV-BLEKEY tinyurl.com/HNTV-NETRIPPER tinyurl.com/HNTV-CRACKLORD   Also, be on the lookout for Chrome pausing all flash-based ads on September 1, 2015. You can read the full article at tinyurl.com/HNTV-FLASH-KILLER.

chrome hacking tools hacknaked hack naked tv
Paul's Security Weekly TV
Hack Naked TV - Favorite Hacking Tools

Paul's Security Weekly TV

Play Episode Listen Later Aug 31, 2015 12:27


This week on Hack Naked TV, Beau talks about his top 5 favorite pentest and hacking tools as seen at BlackHat/DefCon/B-Sides.   tinyurl.com/HNTV-EMPIRE tinyurl.com/HNTV-SSTI tinyurl.com/HNTV-BLEKEY tinyurl.com/HNTV-NETRIPPER tinyurl.com/HNTV-CRACKLORD   Also, be on the lookout for Chrome pausing all flash-based ads on September 1, 2015. You can read the full article at tinyurl.com/HNTV-FLASH-KILLER.

chrome hacking tools hacknaked hack naked tv