POPULARITY
By now, most people know how to recognize the signs of a phishing e-mail – poor spelling and grammar, strange sender e-mail addresses, and of course, an instruction to click on a link, where you're asked to put in your banking or login credentials. But these scams are becoming more sophisticated and politically motivated.Last week, Citizen Lab at the University of Toronto uncovered what they're calling the River of Phish campaign, which uses sophisticated social engineering practices to target people, including a former U.S. ambassador to Ukraine. The Globe's telecom reporter Alexandra Posadzki is on the show to talk about what Citizen Lab found, how the scheme works, and what we know about the Russia-linked group behind it.Questions? Comments? Ideas? Email us at thedecibel@globeandmail.com
1. SHORT STORY: FBI Disrupts Russian Hacking Campaign; White House Confirms Russia's Development of Anti-Satellite Nuclear Weapon for Space (1:11) 2. SHORT STORY: Here's What Happened on Day One of the Fani Willis/Nathan Wade Disqualification Hearing (7:54)3. QUICK HITTERS: House Impeaches DHS Secretary Mayorkas (12:06); Epstein Victims Sue FBI (15:35); Jack Smith Files Response with Supreme Court (17:14), Democrats Flip Seat Santos' Seat in House (19:21), Clearing Up Headlines Re: Travis Kelce Film (19:10)4. ONE-LINERS (21:44)5. NOT EVERYTHING IS BAD: Good News of the Week (23:01)If you enjoyed this episode, please leave me a review and share it with those you know that also appreciate unbiased news!Watch this episode on YouTube.Follow Jordan on Instagram and TikTok.All sources for this episode can be found here.
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie: HEARTBREAKERS Rick's clip from the movie: Star Trek: The Wrath of Khan Dave's Second clip: Russian Restaurant Dave's Third clip: Funny scene 3
In this episode:
This week on Hacker And Fed we discuss Twitter's data leak, explaining APIs and how to better protect ourselves. We also touch on the Russian hacking crew "Cold River" and answer some listener questions. -- For more information on Chris and his current work visit naxo.com Follow Hector @hxmonsegur
Is persuasion dead? Does the left have a bigger persuasion problem than the right? What happens to democracy when we stop trying to persuade each other, and only condemn and write each other off? Anand Giridharadas discusses his book, "The Persuaders: At the Front Lines of the Fight for Hearts, Minds, and Democracy," the American mid-term elections, and why we actually need to persuade people instead of just yelling at them.See omnystudio.com/listener for privacy information.
Hour 1: Mark and Sue discuss pets and the rabies vaccine. then, Chief Pollset and founder of the Trafalgar Group says that polling is often incorrect and will surprise the Dems. Later, George Rosenthal, an owner of Throttlenet, shares on the Russian hackers who took down US airport websites and how criminals are able to hack into home security systems
Today - A landmark loss for big Tech in the European Union Given the president setting nature of GDPR, is the US Next? Then, Russian Hacking and Microsoft Bribes…. I'm Laura Fitton, and this is Future Forward I'm Steven Rosenbaum, Let's Launch - Big Tech Legal Battles Brewing Big Tech attacks tough EU measures aimed […]
https://youtu.be/ffkZukAL2Rk Indeed, international establishment has long drooled over the prospect of a "Cyber 9/11." It would be a single catalyzing event to usher in the pre-planned response: a "Digital Patriot Act." If successful, this event could forever change the internet as we know it. As tensions are soaring over Ukraine, the US is accusing Russia of planning "False Flag" attacks against Kiev. Could a Cyber attack ignite the conflict? What would the fallout be? Episode 200 of the Liberty Weekly Podcast is Brought to you by: Join Liberty Weekly and tons of your favorite creators on Rokfin for one low subscription fee! Liberty Weekly Subscribestar Rakuten Cash Back Referral Link Liberty Weekly Substack The Liberty Weekly Patreon Page: help support the show and gain access to tons of bonus content! Become a patron today! Liberty Weekly on Flote. Patreon Bonuses for Crypto! Show Notes: Eastern Ukraine Separatists Warn Kyiv Preparing Offensive in Donbas - News From Antiwar.com Ukraine Slams US Embassy Drawdown, Says Security Situation Hasn't Changed - News From Antiwar.com What war with Russia over Ukraine would really look like – Responsible Statecraft UKRAINE CRISIS: US 'Toolboxes' Are Empty - Consortium News Blinken Hypes Threat of Russian Invasion in Ukraine Visit - News From Antiwar.com White House Claims Russia Could Attack Ukraine 'at Any Point' - News From Antiwar.com White House Claims Russia Planning 'False Flag' as Pretext to Invade Ukraine - News From Antiwar.com Russia Wants Written Response From US on NATO Expansion By Next Week - News From Antiwar.com White House Claims Russia Planning 'False Flag' as Pretext to Invade Ukraine - News From Antiwar.com Russia takes down REvil hacking group at U.S. request - FSB (yahoo.com) US Intel Agencies Claim Russia Was 'Likely' Behind SolarWinds Hack - News From Antiwar.com Senators Liken Hack to Russian Invasion Despite Lack of Proof Moscow Was Involved - News From Antiwar.com A Pandemic of 'Russian Hacking' - Antiwar.com Original Bracing for “Cyber 9/11” : The Corbett Report Awaiting Cyber 9/11 (ndu.edu) The Next 9/11 Will Be A Cyber Attack (cybersecurityintelligence.com) WhisperGate: Russia Responsible For Cyber Attacks On Ukraine (cybersecurityintelligence.com) Opinion | We're sleepwalking toward a cyber 9/11 - The Washington Post The Global Risks Report 2021 | World Economic Forum (weforum.org) Are You Ready for a Driver's License for the Internet? (govtech.com) UN chief calls for treaty to prevent cyber war (smh.com.au) U.N. chief urges global rules for cyber warfare | Reuters A New UN Cybercrime Treaty? The Way Forward for Supporters of an Open, Free, and Secure Internet | Council on Foreign Relations (cfr.org) Explainer: Who is Yevhen Murayev, named by UK as Kremlin's Ukraine pick? | Reuters (archive.fo) US Government has prepared a "Patriot Act" for the Internet - YouTube
Haiti President Jovenel Moise and First Lady Martine Moise we're shot and killed after gunmen that included foreign elements attacked their home Wednesday at 1:00 am.Kweku Lumumba, external relations coordinator for KOSSA and Green Party chair for Georgia, joins us to discuss the assassination of Haitian President Jovenel Moise and First Lady Martine Moise. The attack occurred Wednesday at 1:00am at the President's private residence. Prime Minister Claude Joseph called the killings an "odious, barbaric" act.Professor Danny Shaw, author, activist and professor of Latin American studies, joins us to talk about the calls for Brazilian President Bolsonaro's impeachment. Protests over Bolsonaro's mishandling of the covid crisis are now added to recent articles in UOL which detail Bolsonaro's past involvement in an alleged kickback scheme known there as 'rachadinha.' In this scenario, employees pay part of their salaries to their bosses.Ted Rall, political cartoonist and syndicated columnist, joins us to discuss the projected win of Brooklyn Borough President Eric Adams as the victor of New York's Democratic mayoral primary. Adams has placed first in all counts since the June 22 primary, but his lead narrowed in the ensuing days. A new projection by the Associated Press was announced yesterday after updated results from absentee ballots were released.Chris Garaffa, web developer and technologist, joins us to discuss the latest reports of Russian hacking. Recent reports quote the US Republican National Committee as denying that Russian hackers accessed data during a breach of a third-party provider last week. The RNC said an investigation by Microsoft found that no RNC data had been accessed from a hack of Synnex Corp, the third-party provider.KJ, Noh, writer and peace activist, joins us to talk about a Medium.com article by Ghazanfar Sultan. The article gives a Muslim's perspective on the Uyghur narrative. According to the author, the Uyghur narrative is "a case of literally unbelievable propaganda."Dr. Gerald Horne, professor of history at the University of Houston, author, historian, and researcher joins us to discuss the Conference of Presidents of Major Jewish Organizations' plans to host Reza Pahlavi, the heir apparent to the last Shah of Iran for an "off the record, special leadership briefing" tomorrow. The move, by this umbrella group that represents various Jewish American and pro-Israel organizations, brings questions and condemnations by both other pro-Isreal groups and Iranian American groups.Medea Benjamin, co-founder of Code Pink, joins us to talk about economic warfare. A recent report by The Wall Street Journal says the Biden administration is planning to overhaul the use of broad-based sanctions. However, the new strategy will likely only affect certain sanctions programs, while leaving others, like those towards North Korea and Venezuela, unchanged.
What does it really mean when Biden tells Putin critical US infrastructure is “off limits”, details on a recent survey which shows ransomware payments create repeat attacks, and how cyber safe is your drinking water? ** Links mentioned on the show ** Biden Tells Putin Critical Infrastructure Sectors ‘Off Limits' to Russian Hacking https://beta.darkreading.com/threat-intelligence/biden-tells-putin-critical-infrastructure-sectors-off-limits-to-russian-hacking Ransomware […] The post Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water appeared first on The Shared Security Show.
This episode is also available as a blog post: http://donnyferguson.com/2017/06/07/reality-l-winner-8-things-to-know-about-the-nsa-contractor-accused-of-leaking-classified-info-on-russian-hacking/ --- Send in a voice message: https://anchor.fm/donny-ferguson/message
[As heard on WTAG, WHYN, WHJJ 2021-06-15] Hey, we've got this meeting between Presidents Biden and Putin, and I have some serious words for our President. I've got some opinions about our federal bureaucracy when it comes to cybersecurity and Mr. Jim Polito pulled them out of me this morning. [00:00:18] Jim Polito: [00:00:18] So here we go. Hey, every week on Tuesday, we have the honor of my next guest. [00:00:26] And he is the tech talk guru, as far as I'm concerned, Craig Peterson an all around great guy here, just in time, Craig to save Joe Biden, you're going to be the advisor to Joe Biden. How do you like that? [00:00:44] Craig Peterson: [00:00:44] I already have a good job. I don't want to work. [00:00:48] Jim Polito: [00:00:48] Listen. I know that Canada day is just two weeks away and you're preparing, you're stocking up on Molson and Labatt's and moose head. [00:00:57] I know you're stocking up on all of that, and I know you've got a lot going on, but you could give Joe Biden some advice. He's going to sit across. And look into the eyes of Latta mere Putin. And as far as I'm concerned, Vladimir Putin knows exactly what the cyber hackers in his country are doing. So what does Joe Biden say to the man who's at the top of the cyber hacking, uh, pyramid. [00:01:33] Craig Peterson: [00:01:33] By the way I am sending out an email today, I put together a little video training for everyone. Who's on my email list on how to stop these Russian hackers. It's 95%. Effective. Okay. But the here's the advice I would give him. First of all, he needs to pull back what he said to the bladder, because just a couple of days ago where president Putin came out and said, Hey, listen, you know, we'd be more than glad to extradite these people to the U S you just need to extradite terminals back to Russia as well. [00:02:06] And Joe Biden seems to have given us tacit approval for that. The reason I say that is if you look at what we've done here in the us, We have indicted Chinese military officials for hacking into our computer systems. So when you hear president Putin say things like that, you are sure he has in the back of his mind. [00:02:31] The same thing that we did, which is I'm going to ask you to extradite your military hackers, because we do have them, every branch of service had Packers. Absolutely. So I think what the president Biden should do when he's talking with gluten is say, Hey, listen, I'm going to reopen the Keystone pipeline over all the guy who was doing it says I've given up now. [00:02:58] It's ridiculous. And I am going to continue to put pressure on Merkel and others to not allow oil. From Russia into their countries because it is war. We are at war we can continue or continue to just capitulate to these people. No, [00:03:17] Jim Polito: [00:03:17] we're talking with Craig Peterson, a tech talk guru. And, um, while I said it in a joking way, I knew he would take it seriously. [00:03:24] Yeah. Um, This trade of, I, I brought it up earlier, a trade of prisoners. I mean, Biden is running circles around him by, by bringing [00:03:35] Craig Peterson: [00:03:35] that up. Yeah. Putin has really, really out of played a president Biden. It's very, very unfortunate. And when you look at a war, for instance, there's skirmishes, you have battles here and there and. [00:03:51] People die. You are really trying to hurt the economy. Uh, I, I hate to say it, but that's why you shoot someone with a small caliber weapon. You want to wound the, the opponent so that they now have to have three to five people behind the lines to get that opponent back to help that soldier. Well, what happens here in the us, we lost, we were colonial pipeline for a week and say, goodness, near in the Northeast, we didn't really feel it because we had just, I mean, just had all of our tanks filled up by colonial. [00:04:28] Down in New Jersey. Cause the way they do it, as they staged deliveries, the south didn't do that. So how much did they hurt us and our economy by doing that? I would say they heard us more than many of the skirmishes we've had over the years. Not in depth in lives loss, which of course is just completely incalculable, but certainly the damaged door. [00:04:53] Yeah. [00:04:54] Jim Polito: [00:04:54] I mean, it's been, it's been terrible. And so you see the thing is that, you know, and I know I'm asking you to step out of the tactical world into the world of international diplomacy, but you've got a guy sitting there who you and I both know has. Control over these individuals who Putin wanted them to stop. [00:05:17] He could make them disappear, like, like, like that could make them disappear. So how do you, how do we just quietly? Behind the scenes continue to strengthen our offensive abilities as cyber attackers, and that we encourage all of our private industry to harden themselves to cyber attacks. [00:05:46] Craig Peterson: [00:05:46] All right, here we go. [00:05:48] Hopefully you're still sitting down Jaya. [00:05:54] Here's the, here's the really big issue as I see it, I strongly suspect cause I've been watching what our government does and you know, I have a little bit of an insight track, not my battle. And that, that helps me to understand a little bit about what's going on. Is he, if the Biden administration can continue to literally approve of some of these hacks, let's just play this game through a little bit, a war games. [00:06:26] If we are all worried that we're going to be attacked. And we're not seeing the software that does not protect you. People like, you know, the McAfee and the Norton antivirus, et cetera. It's not going to protect you enough. We've got Microsoft conditioned us now to the point where we don't want to install up. [00:06:49] Because it's finished mess up her computer and we're going to be down for a week or two or three or four while we try and figure it out. Right. So if they can get us to the point where we're saying, this is a huge problem, and we've already been conditioned that if it's a big problem, it must be a federal government problem. [00:07:07] Because it's a big problem. Yeah. So now we need this federal government to step in and take over all of our networks, take over all of our security monitor. Exactly what's going on because here's what I do. I write these, you know, I do cybersecurity and I am tied in with Cisco. That's, who we use. They are the best out there for so many things. [00:07:31] And Cisco's looking at almost a trillion. Transactions a day. We're talking about emails, website visits, et cetera, et cetera. And the reason they're so effective is because they can take all of this data that they're gathering from their customers. Now, Cisco doesn't send any of your data, just sends what are called check sums up, but it's looking at what's going on across all of these networks. [00:07:56] And it says, okay, Here's what's up right now. And it immediately tells all of the equipment, the Cisco equipment all over the country. Okay. Block this. Now, if you have the right system come in and it's blocked. So what would happen is if we get to the point where we're on bended knee and, and asking you, please president Biden protect us and they now decide, okay, well, we're going to propose. [00:08:20] Correct. You quote unquote, they're going to have to provide robes that live on our computers, Jim, that computer there in your studio, the computer that's in front of everyone out there right now, even people listening on the iHeart radio app or whatever app or whatever website, those mobile devices are going to have federal government software on them. [00:08:44] Wow. Where do you think that leaves us? [00:08:48] Jim Polito: [00:08:48] Yeah, it leads us to more vulnerability. [00:08:53] Craig Peterson: [00:08:53] More vulnerability. Yes, exactly. From maybe, maybe you trust president and Biden, but how about the next administration or the next illustration? Right. It's win, win. And I hate to bring up the national socialists in Germany, but when the national socialists took over, there were already lists of people who would have been prepared by the prior government that had guns that could defend themselves that were trained and they were rounded up. [00:09:19] First, right? Yep. So the officials put into place. It makes it, so now we have a potential real big problem. So let's look at what's happened with China and Russia when it comes to very valuable information. For instance, wouldn't you, if you were a foreign adversary like China, what didn't you love to have all of the information from all of the background checks of every federal employee. [00:09:46] Wouldn't you love to know who works for who, where they are, their family situation, everything, uh, China stole it from us already. Yeah, they have it. Okay. And, and that's the sort of thing that the bad guys go for. So if we don't pull up our socks ourselves, yeah. It's not going to change. So let's look at colonial. [00:10:09] How long you were paid, how much ransom [00:10:11] Jim Polito: [00:10:11] was it? 5 million, I think where you're talking about in Bitcoin. Yeah, [00:10:16] Craig Peterson: [00:10:16] absolutely. It was like a four and a half give or take $5 million. Absolutely. Right. Yeah. And the meat Packers, you know, they paid about 11 million. Yeah. I read [00:10:25] Jim Polito: [00:10:25] that. I read that. Yup. And which is, as you have said, that's the worst thing you can do cause you just painted a, a, um, a bullseye [00:10:35] Craig Peterson: [00:10:35] on your back. [00:10:36] And the Trump administration said, you pay ransoms, you are supporting terrorism, and we're going to come after you with the justice department. The byte administration says [00:10:48] what's 5 million. Yeah. Look at an equation that of that of a perverted person would have in their heads. Uh, the equation is okay. So cost colonial, let's say $5 million plus obviously time and materials to get everything back in order. So that's call it 10 million. Okay. Uh, and if they were to put. The proper stuff in place. [00:11:13] I'm not just talking about hardware and software for cybersecurity. I'm talking about the people to monitor, keep it up to date, keep the desktop up to et cetera. It would cost them easily, 20 to $30 million a year, cheaper to pay a ransom, keep your fingers crossed or to do cybersecurity properly. That's the same equation, the same equation we're seeing again and again, and again, look at the Equifax breach. [00:11:44] Look at TJX to all of these big breaches in every one of them. There's been fingers pointed at C-level bean counters that said, well, it's just, it's cheaper. To pay the price when we're hacked the not to. And at the same time, we, as a people, our information is being stolen. We're being cheated. Our retirements are being stolen and we're seeing this. [00:12:07] We've seen operating accounts and small businesses completely emptied, and we are starting to beg the federal government. To come in and fix this. This is a real problem. So I think Biden should tell Putin to take a hike a long one off a short pier and make sure he realizes we're taking this very seriously and do what the federal government was instituted for, which has helped to ensure our common defense. [00:12:44] Jim Polito: [00:12:44] I just was waiting for the perfect moment. I think it's perfect. I think what you said today is spot on. And of course this will be podcasted because I hope that somebody. From the administration here is, it says you should listen to what Craig Peterson said on the Jim Polito show. And, um, you're absolutely right. [00:13:07] It has to be done. And, uh, Craig, I know you said you're getting out that information about how to protect yourself from a Russian hack, which involves that virtual Russian keyboard. So how can folks get more information from Craig [00:13:22] Craig Peterson: [00:13:22] Peterson? All right. If you sign up before this afternoon, they'll set up by noon today. [00:13:28] Right now, go to Craig peterson.com/subscribe. Craig peterson.com/subscribe. I'm planning on sending it out when probably early the afternoon today. And it tells you exactly what you need to do and shows you how to do it for installing that keyboard. That's going to keep these Russian hackers out 99% of the time. [00:13:51] And of course I have my weekly newsletter and everything else too, but this is critical. [00:13:56] Jim Polito: [00:13:56] Right, right. Craig, excellent segment as usual. And I know you'll be watching the next 24 hours and maybe we'll be talking about this again next week or sooner. Great. Thank you, Craig. Craig Peterson. Everybody was a great asset to the show.
Radio Sweden brings you a round-up of the main news in Sweden on April 13th, 2021. Presenter: Ulla Engberg Producer: Sujay Dutt
Mr. Mike Shelah is the Director of Business and Marketing for Advantage Industries Inc. A Cyber Security company that helps businesses find vulnerabilities and keep you and your customers safe from aggressive hackings on a global scale. Mike Shelah is the Director of Marketing & Business Development for Advantage Industries Inc. a Cyber Security, Compliance and Managed Service Provider In Columbia MD. Since 1999, Mike has worked with business owners in the Mid-Atlantic region to help them solve their technology problems. A self-proclaimed “LinkedIn Nerd,” Mike has also spoken in front of thousands of college students and business professionals about leveraging the power of LinkedIn for sales and the job market. Mike is also a husband and father. In the community, Mike volunteers with multiple associations and currently serves on the Board of Directors with Pathfinders For Autism.
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: DPRK offers free 0day to researchers, with a pretty significant catch SonicWall gets owned because it runs SonicWall gear. Big mistake. Chinese trains didn’t stop running because Flash died :( Dominion to sue Rudy Giuliani for $1.3bn over insecurity claims The sudo bug. Lol. This week’s show is brought to you by Cmd Security, the Linux security company. Its focus has traditionally been on restricting the type of bash commands users can enter. It’s like a control plane for Linux systems. But some of its customers manage their Linux endpoints through different, non-bash entry points. So they’ve added some features to their product to deal with that, which has also resulted in them having an IDR capability. It’s all pretty sensible stuff though, and Cmd co-founder and CEO Jake King will be along to talk us through all of that. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that’s your thing. Show notes New campaign targeting security researchers Fake Twitter personas, bogus blog delivered North Korea-linked malware to researchers As Adobe Flash stops running, so do some railroads in China | Apple Daily Flash Is Dead—but Not Gone | WIRED South African government releases its own browser just to re-enable Flash support | ZDNet SonicWall says it was hacked using zero-days in its own products | ZDNet Former LulzSec Hacker Releases VPN Exploit Used to Hack Hacking Team Ransomware hackers launder bitcoin through just a handful of locations, researchers find No decisions yet on any changes to TikTok or Huawei cases, White House says Dominion files $1.3 billion defamation suit against Giuliani over election security claims FBI tracking cell phones, Capitol riots | wusa9.com Technologists Use Facial Recognition on Parler Videos DIA uses purchased phone location data without warrants Biden Orders Sweeping Assessment of Russian Hacking, Even While Renewing Nuclear Treaty - The New York Times FSB warns of US cyberattacks after Biden administration comments | ZDNet Cyber ‘Deterrence’: A Brexit Analogy - Lawfare Hacker leaks data of 2.28 million dating site users | ZDNet Intel says financial graphic was 'hacked,' forcing early release of 2020 report Reuters accused of hack attack | ZDNet DDoSers are abusing Microsoft RDP to make attacks more powerful | Ars Technica Apple fixes another three iOS zero-days exploited in the wild | ZDNet Hackers actively scanning for vulnerable SAP systems after exploit gets dropped on GitHub | The Daily Swig MrbMiner crypto-mining operation linked to Iranian software firm | ZDNet Details of YouTube viewing history exposure bug made public | The Daily Swig TikTok Flaw Lay Bare Phone Numbers, User IDs For Phishing Attacks | Threatpost Bot Lets Hackers Easily Look Up Facebook Users' Phone Numbers Australian orgs exposed to Accellion vulnerability CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | Qualys Security Blog A deeper dive into our May 2019 security incident - Stack Overflow Blog
Youngme, Felix, and Rawi discuss Twitter and Facebook banning Trump from their platforms, as well as Apple, Google, and Amazon banning the Parler app. They also discuss the alleged Russian hacking of U.S. government and military systems.
The Risk Roundtable gang kicks off 2021 with two events that ended 2020 - the Christmas Day bombing in Nashville and the Solar Winds cyber event. Andy, Jen and Dave go through the incidents and look at the responses in each instance as well as what may come of it moving forward in 2021 though maybe no lizard people (Shoutout to "V"!). Then in the Roundtable Roulette, Dave brings up how to deal with dis/misinformation while Jen reminds everyone that new year doesn't mean that we can forget about our stable of cyber threats, most notably Ransomware which continued to evolve throughout the year. Finally, with it being a new year, the gang looked at personal and professional goals such as Dave's desire to read more, Jen completing her "she-shed" and Andy's desire to be more like Dave. Andy's reference to Russian Hacking: https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html
It's been quite the buzz around the launch of Cyberpunk 2077. Unfortunately, most of it hasn't been great news. On top of that, the numerous U.S. Government agencies were hacked by the Russians. The gang talk about all of it including a big announcement from David! You don't wanna miss it! Follow The Black Techies! Twitter: @theblacktechies FB: fb.com/theblacktechiespodcast Donate to David and his wife's adoption fundraiser: http://adopttogether.org/families/?fundraiser=matthewsfamilyadoption&fbclid=IwAR2-gTJr2ajp7SlonWPBKxgrdS81I0euRLvcalMhXdTkefH2ET7maVs5yiI Enter to win free games: https://getwrecktechsupport.com/2020/12/11/whos-ready-for-some-free-stuff/?fbclid=IwAR1kU7zsDoA2owrQSqbLyL8zZrABVNf-mro9n2HmChsm673zFJ5Uw8mn0fY
Барри и Ангелос возвращаются, чтобы повеселиться на своем регулярном подкасте. See acast.com/privacy for privacy and opt-out information.
This episode concludes Section III of Volume I of the Mueller Report: "Russian Hacking and Dumping Operations." Narration of this episode will cover the second half of the section, which is comprised of the fourth and final subsection D: "Trump Campaign and the Dissemination of the Hacked Materials." --- Send in a voice message: https://anchor.fm/the-mueller-report/message Support this podcast: https://anchor.fm/the-mueller-report/support
This episode, Episode 5, Part I, will cover sections A, B, and C, which are respectively subtitled: “GRU Hacking Directed at the Clinton Campaign”, “Dissemination of the Hacked Materials”, and “Additional GRU Cyber Operations”. These three sections cover 14 pages and include 81 footnotes. This section begins to outline the who and what of the Russian government's interference in the 2016 elections in the United States. --- Send in a voice message: https://anchor.fm/the-mueller-report/message Support this podcast: https://anchor.fm/the-mueller-report/support
Trump compared to Russian hacking, man tries to kill Repub. candidate and Taco Bell voted bast Mexican restaurant in country?
The FBI is sounding the warning that we are all at risk of Russian hackers. The cyber attack groups are zeroing in on the router in our homes to use against us. But there are steps you can take to prevent yourself from becoming a victim of these organized cyber crooks. Listen to my Komando On Demand podcast for more on what the hackers are after and how you can stop them. You'll want to share this important information with your family and friends. Learn more about your ad choices. Visit megaphone.fm/adchoices
In April it was widely reported, throughout worldwide news outlets, that Russian hackers were working to infiltrate as many wi-fi networks throughout the world as possible; for the general public as well as businesses, organizations and government networks. News outlets in the UK indicated that over 100,000 wi-fi routers were compromised. Worldwide government security researchers warned that millions of wi-fi routers had been compromised by Russian nation-state intelligence officers; those in addition to the already large amount of attempts being made daily by cyber criminals. Why are Russian, and other countries', nation state hackers looking to get into the home wi-fi network of folks throughout the world, as well as every type of business and organization wi-fi network that is vulnerable? And what types of code and data do they want to load onto those networks? What harms can they do? In this episode I discuss these topics with my guest, Tom Eston, who is a wi-fi security expert!
Hacking from Russia, China and other nation states has been going on for a very long time. And, it will continue to be in the news as more types of tech creates more ways to hack, and as more data is created to give insights into personal lives and activities. It is important to consider the history of nation state hacking, how it has evolved over the years, and what is currently occurring. Christopher will describe his experiences in the CIA, how he's seen hacking methods change since he first started working in this area, current and future threats, and what everyone needs to keep in mind when considering hacking attempts from other countries.
Let a Winner Win Michael Flynn. This week we bring you allegations of Russian Hacking and Lobbying for foreign governments with our Host Michael Flynn...in the form of Intricate Dialect. Enjoy soundscapes of russian Jazz and Timo 1-2 beats. Made by Intricate Dialect and Sun Hammer. please follow, rate, and review for booking or questions about anything including life, contact intricate dialect@gmail.com --- Support this podcast: https://anchor.fm/thelumpodcast/support
The investigation into the hacking of Democratic National Committee computers during the US election campaign continues to haunt international politics. Was Russia responsible for the hack? The US Secret Services say this is now beyond doubt. Just before he left office President Obama hit back with a series of retaliatory measures against Russia. Those measures included a range of sanctions against institutions and people: two intelligence agencies, four senior intelligence officials, 35 diplomats, three tech companies. They also targeted a man who was infamous in tech security circles. His trade name is Slavik. Ed Butler hears the remarkable story behind Slavik's years spent attacking and compromising the servers of international banks and what it all reveals about Russian cyber-espionage.(Picture: An employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow. Credit: KIRILL KUDRYAVTSEV/AFP/Getty Images)
Marvelous Monday with Dr. Shirley McKellar and Bishop L.J. Guillory is always the way to start the week! In the post President Obama future we will have to make some important decisions about how we can best and most effectively work together to influence and guide the direction of our country in a way that makes the lives of American people and families better. It is our civic responsibility to stay informed on the issues, pay close attention to the actions and decisions of our elected officials, and educate ourselves and others about the importance of VOTING in every election! Let's work together toward these shared goals on Marvelous Monday!
Tune in to Eyes Wide Open: DemBlogTalk on BlogTalk USA (and visit DemBlogNews) for current events in the news and politics! Tonight Michael and Rheana will review the most consequential headlines from month one of the Trump presidency, including the timeline and details of the investigation into possible ties between the Trump 2016 presidential campaign and election tampering and manipulation by Russia at the direction of Vladmir Putin.
Congressman Mark Sanford Discusses Obama-Care Replacement, The Boeing No Union Vote and the Russian Hacking
Listen to The Michael Imhotep Show, Tuesday, Jan. 24th, 2017, 4pm-6pm EST (1pm-3pm PST) with host Michael Imhotep founder of The African History Network. 1) Trump claims he lost the popular vote because of millions of “illegal immigrants” who voted with NO evidence but says nothing about Russian Hacking, FBI Director James Comey and Voter Suppression helped him win. 2) A new study shows that African American millennials don't think we will do well under a Trump Administration but they had the lowest turnout to vote. 3) Part 2: President Obama's Legacy and how his policies impacted African Americans. 4) This date in African American History. CALL IN WITH Questions/Comments at 1-888-669-2281. POST YOUR COMMENTS. WE MAY READ THEM ON AIR. Listen to The Michael Imhotep Show, Mon.-Fri. 4pm-6pm EST online at http://tunein.com/radio/Empowerment-Radio-Network-s199313/ or by downloading the "TuneIn Radio" app to your smartphone and search for "Empowerment Radio Network" or at www.AfricanHistoryNetwork.com for more info and podcasts and DVDs by Michael Imhotep.
Listen to The Michael Imhotep Show, Friday, Jan. 13th, 2017, 4pm-6pm EST (1pm-3pm PST) with host Michael Imhotep founder of The African History Network. 1) DOJ Report proves that the Chicago Police Department routinely violated people's rights. 2) Rep. John Lewis says "I don't see Trump as a Legitimate President" because of the Russian Hacking. 3) For the first time in history a Black Woman will be on U.S. Currency on a $100 coin. Was the Statue of Liberty of an African Woman originally? 4) Donald Trump keeps misstating how many people are unemployed. He doesn't understand the Labor Force Participation Rate. DETROIT: FREE EVENT - Sat. Jan. 14th, 2017, 3pm-7pm EST, Michael Imhotep founder of The African History Network and host of The African History Network Show on 910 AM Superstation Detroit is doing a Double Presentation discussing, “The Distortion of the Legacy of Dr. Martin Luther King Jr.: The Revolutionary Will NOT be Televised” & “Malcolm X 50 Years Later Why Is He Still Relevant”. This is taking place at The Jungle Juice Bar, 14929 Charlevoix St., Grosse Point Park MI, (Across the street from Detroit). Donations Accepted. Visit www.AfricanHistoryNetwork.com (Watch Video) https://www.youtube.com/watch?v=NIpwCStWAuc&feature=youtu.be Listen to The Michael Imhotep Show, Mon.-Fri. 4pm-6pm EST online at http://tunein.com/radio/Empowerment-Radio-Network-s199313/ or by downloading the "TuneIn Radio" app to your smartphone and search for "Empowerment Radio Network" or at www.AfricanHistoryNetwork.com for more info and podcasts and DVDs by Michael Imhotep.
Listen to The Michael Imhotep Show, Wednesday, Jan. 11th, 2017, 4pm-6pm EST (1pm-3pm PST) with host Michael Imhotep founder of The African History Network. 1) Coretta Scott King's letter opposing Jeff Sessions in 1986 is haunting him in 2017 during his AG confirmation hearings. 2) Pres. Obama delivers his farewell speech in Chicago. 3)Intel chiefs compiled unsubstantiated info on Trump with claims of Russian efforts to compromise him. 4) This date in African American History. CALL IN WITH Questions/Comments at 1-888-669-2281. POST YOUR COMMENTS. WE MAY READ THEM ON AIR. Listen to The Michael Imhotep Show, Mon.-Fri. 4pm-6pm EST online at http://tunein.com/radio/Empowerment-Radio-Network-s199313/ or by downloading the "TuneIn Radio" app to your smartphone and search for "Empowerment Radio Network" or at www.AfricanHistoryNetwork.com for more info and podcasts and DVDs by Michael Imhotep.
Carlos and Bob read the declassified version of the 25-page report issued by the US intelligence community on the alleged intentions and interventions of the Russian government in the US election. As it turns out, there's not much there. Cynics still have every right to be skeptical of this whole enterprise to convince Americans that "Putin picked our president."Mentioned in this episode: The official intelligence report: https://www.dni.gov/files/documents/ICA_2017_01.pdf DNI Chief James Clapper says Assange not credible: http://www.nbcnews.com/news/us-news/sen-mccain-russia-s-election-meddling-unprecedented-attack-n700981 Same James Clapper caught lying to Congress in 2013 about NSA spying on Americans: http://www.politifact.com/truth-o-meter/article/2014/mar/11/james-clappers-testimony-one-year-later/ Murphy to speak on his book *Choice* for Heartland Institute near Chicago on January 18: https://www.heartland.org/events/events/choice-cooperation-enterprise-and-human-action Nelson Nash, Lara, and Murphy to present IBC Seminar for the general public in Birmingham, AL on February 11. (Use Discount Code LMSHOW for 50% off). http://events.r20.constantcontact.com/register/event?oeidk=a07ed9svsqba14b85f4&llr=z88o8ecab
Four black young adults have been charged with hate crimes for abducting and torturing a mentally disabled white teen while live-streaming on Facebook. Their lawyers, pleading bail, tried to make the case the four were responsible people with jobs, going to school and one looked after a sibling confined to a wheel chair. Their bail was denied. What allows four individuals to simultaneously abduct and torture another person for perhaps 48 hours in a planned and vicious manner? Why wouldn't one or more of the four have cautioned to stop along the way? Guest: Dr. Frank Farley, past president of the American Psychological Association - After the Fort Lauderdale terror attack yesterday, what can and should you do to protect yourself and/or family and friends when at a public venue? Guest: Ross McLean, of Ross McLean Security and former Toronto police officer, now security expert who set up security for the world's largest technology distribution company - Alberta has introduced a provincial carbon tax and Ontario has introduced a cap and trade scheme. Many in the provinces are unhappy and concerned that businesses will flee and jobs will disappear. How will Canada's business community respond to higher taxes and more expensive goods and services, as well as massively increasing electricity billing? Guest: Tom Caldwell, chairman of Caldwell Securities in Toronto and past governor of Toronto Stock Exchange - Did Russian hackers – under the direct orders of Russian president Vladimir Putin – conspire to assist Donald Trump win the U.S. election? Guest: Fran Coombs, managing editor of Rasmussen Reports, is polling this question - Following the apparent murders/suicide of military veteran Lionel Desmond and his wife, daughter and mother, as Desmond struggled with PTSD following a deployment to Afghanistan, we're joined by two former and one current member of Canada's military. Guests: Sgt Major Barry Westholm, retired from the military and defends & works with military veterans & current CAF members battling PTSD A former CAF member A current CAF member (both wish to remain anonymous) See omnystudio.com/listener for privacy information.
The Capital Research Center's Dr. Steven J. Allen and Matthew Vadum discuss the worst news stories from the week of 12/11/16.
On this week's review show we welcome back to the…
Sam Seder and Mike Papantonio talk about Trump's Transition Team and why they are off to such a bad start. And Andrew Cockburn from Harper's Magazine will join Pap to discuss the media's reports on Russian Hacking, and whether those reports are valid, or are we looking at the beginning of a new “Red Scare”.
Edward Snowden has been living in Russia for over three years under political asylum after leaking classified documents about American surveillance practices. Ironically, Russia's policies on surveillance are hardly libertarian. Snowden recently spoke out against so-called “Big Brother” legislation introduced in the Duma, Russia's legislature. On cybersecurity, Russian hacking has dominated the American news cycle, especially around electoral politics. Evan is joined by Russian native and TechFreedom Legal Fellow Ashkhen Kazaryan. They discuss hacking, surveillance, and the tenuous relationship between Cold War foes. For more, see Ashkhen's op-ed.