POPULARITY
Hosted byRhetta ChappellConversation withBrad Carr andDr Tom VerhelstJoin us for our season 4 opening episode featuring Brad Carr, Principal of Preparing Futures and Founding Director of the Australian Digital Trust Community.Drawing from his extensive professional experience including his time as NAB's former Chief Innovation Officer, and his personal interests which included studying Futurism at the University of Houston, Brad provides insights into:Building a secure, inclusive and diverse digital identity ecosystemAI's role in detecting and combating fraudTackling deepfakes and safeguarding online trustShow Notes:Nicole Perlroth's book:This Is How They Tell Me the World EndsThe Bank of England's 'Future of Finance' report of June 2019, page 60:Future of Finance: Review on the outlook for the UK financial systemThe Bank for International Settlements (BIS)'s Bulletin 42 in May 2021:Whom do consumers trust with their data? US survey evidenceHSBC UK provides support for survivors of human traffickingHSBC bank accounts for people without a fixed address now available in over 100 branchesConnect ID and Hold Access White Paper:Identity in Crisis - Addressing the Gaps for Aboriginal and Torres Strait Islander PeoplesIdentity Solutions for Indigenous Australia, with Jason-Urranndulla Davis by NAB Digital NextDavid Birch and Victoria Richardson's book:Money In The MetaverseVisa Verified stats for online fraud compared to BankID in Norway from chart shown in Rod Boothby's video:Rod Boothby on LinkedIn: #bankID #ecommerce #profits #simpleisbetter #banks"99% of Norwegians aged 20-60 use BankID" from:NAB Digital Next: DigitalID - lessons from the Nordics - NAB News"Norwegians use BankID an average of 220 times per year" from:Signicat | The state of digital identity in the Nordics 2021Forbes "AI will have an estimated 21% net increase on the United States GDP by 2030":22 Top AI Statistics & Trends In 2025 – Forbes AdvisorDeepfakes and cheap fakes from NAB Digital Next Podcast:Brad Carr on LinkedIn: Key takeaways from Deloitte's Tech Trends 2024 report...Hong Kong deepfake CFOFinance worker pays out $25 million after video call with deepfake 'chief financial officer' | CNNZoom Bank of America verification:Rod Boothby on LinkedIn: How do you prove that you are really you on Zoom?Airport Economist:Tim Harcourt - WikipediaGames Venue BNE & SurroundsGames Venue GC
Democrats keep winning and Republicans keep struggling-is the GOP just too crazy for the majority of voters? But is the public aware of Biden's many accomplishments? Plus - Thom reads from "This Is How They Tell Me the World Ends"Book by Nicole Perlroth.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Rick Howard, N2K's CSO and The CyberWire's Chief Analyst and Senior Fellow, interviews Nicole Perlroth about her 2023 Cybersecurity Canon Hall of Fame book: “This Is How They Tell Me the World Ends.”
Have you ever wondered why cyberattacks are becoming more and more prevalent in today's digital age?In this episode with Tom Kirkham, we explore the importance of law firms paying attention to cyberattacks and defining what ransomware is.We'll dive into the consequences of becoming a victim of a ransomware attack and examine how networks are created on the dark web.Plus, we'll provide practical tips on how to protect yourself from ransomware and how to buy and install software to keep you safe online.We'll also discuss the significance of ongoing website maintenance and security updates and why they're essential in preventing cyberattacks from happening to you. Tom Kirkham, founder and CEO of IronTech Security provides cybersecurity defense systems and focuses on educating and encouraging organizations to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks. Kirkham brings more than three decades of software design, network administration, computer security, and cybersecurity knowledge to organizations around the country. Tom is a 2x Amazon Best Seller, and his new book is titled: Hack the Rich - A Cybersecurity Parable.Tom gives listeners actionable tips on: [2:00] Tom's ISIS Kill List [10:30] Why cyberattacks are important for law firms to pay attention to [12:00] What is ransomware [15:10] What happens when you become the victim of a ransomware attack [19:00] How networks are created on the dark web [21:40] How to protect yourself from ransomware [27:20] How to buy and install software to protect you online [32:40] Why ongoing website maintenance and security updates are important [41:40] How to prevent cyberattacks from happening to you [47:00] Tom's book review [57:35] Breaches in security Resources mentioned in this episode: This Is How They Tell Me the World Ends by Nicole Perlroth Books: https://www.amazon.com/stores/Tom-Kirkham/author/B0B6WP3XDQ?ref=aprdr&storeref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true Connect with Tom here: https://twitter.com/tomkirkham https://www.linkedin.com/in/tomkirkham/ https://www.facebook.com/irontechsec https://tomkirkham.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
Have you ever wondered why cyberattacks are becoming more and more prevalent in today's digital age? In this episode with Tom Kirkham, we explore the importance of law firms paying attention to cyberattacks and defining what ransomware is. We'll dive into the consequences of becoming a victim of a ransomware attack and examine how networks are created on the dark web. Plus, we'll provide practical tips on how to protect yourself from ransomware and how to buy and install software to keep you safe online. We'll also discuss the significance of ongoing website maintenance and security updates and why they're essential in preventing cyberattacks from happening to you. Tom Kirkham, founder and CEO of IronTech Security provides cybersecurity defense systems and focuses on educating and encouraging organizations to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks. Kirkham brings more than three decades of software design, network administration, computer security, and cybersecurity knowledge to organizations around the country. Tom is a 2x Amazon Best Seller, and his new book is titled: Hack the Rich - A Cybersecurity Parable. Tom gives listeners actionable tips on: [2:00] Tom's ISIS Kill List [10:30] Why cyberattacks are important for law firms to pay attention to [12:00] What is ransomware [15:10] What happens when you become the victim of a ransomware attack [19:00] How networks are created on the dark web [21:40] How to protect yourself from ransomware [27:20] How to buy and install software to protect you online [32:40] Why ongoing website maintenance and security updates are important [41:40] How to prevent cyberattacks from happening to you [47:00] Tom's book review [57:35] Breaches in security Resources mentioned in this episode: This Is How They Tell Me the World Ends by Nicole Perlroth Books: https://www.amazon.com/stores/Tom-Kirkham/author/B0B6WP3XDQ?ref=aprdr&storeref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true Connect with Tom here: https://twitter.com/tomkirkham https://www.linkedin.com/in/tomkirkham/ https://www.facebook.com/irontechsec https://tomkirkham.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
Have you ever wondered why cyberattacks are becoming more and more prevalent in today's digital age? In this episode with Tom Kirkham, we explore the importance of law firms paying attention to cyberattacks and defining what ransomware is. We'll dive into the consequences of becoming a victim of a ransomware attack and examine how networks are created on the dark web. Plus, we'll provide practical tips on how to protect yourself from ransomware and how to buy and install software to keep you safe online. We'll also discuss the significance of ongoing website maintenance and security updates and why they're essential in preventing cyberattacks from happening to you. Tom Kirkham, founder and CEO of IronTech Security provides cybersecurity defense systems and focuses on educating and encouraging organizations to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks. Kirkham brings more than three decades of software design, network administration, computer security, and cybersecurity knowledge to organizations around the country. Tom is a 2x Amazon Best Seller, and his new book is titled: Hack the Rich - A Cybersecurity Parable. Tom gives listeners actionable tips on: [2:00] Tom's ISIS Kill List [10:30] Why cyberattacks are important for law firms to pay attention to [12:00] What is ransomware [15:10] What happens when you become the victim of a ransomware attack [19:00] How networks are created on the dark web [21:40] How to protect yourself from ransomware [27:20] How to buy and install software to protect you online [32:40] Why ongoing website maintenance and security updates are important [41:40] How to prevent cyberattacks from happening to you [47:00] Tom's book review [57:35] Breaches in security Resources mentioned in this episode: This Is How They Tell Me the World Ends by Nicole Perlroth Books: https://www.amazon.com/stores/Tom-Kirkham/author/B0B6WP3XDQ?ref=aprdr&storeref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true Connect with Tom here: https://twitter.com/tomkirkham https://www.linkedin.com/in/tomkirkham/ https://www.facebook.com/irontechsec https://tomkirkham.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
Nicole Perlroth, who covered digital espionage and sabotage for the New York Times, gives us a lot to think about in her book about the realities. The title does not inspire hope: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race."
Nicole Perlroth's book This Is How They Tell Me the World Ends is a masterpiece on the topic of cyberwar and the zero-day hacks that make it deadly. Join us as we explore with Perlroth a cyberscape where mistakes are weaponized, backdoors abound and we all have zero degrees of separation from spies and the people they spy on. Learn more about your ad choices. Visit megaphone.fm/adchoices
A lifelong hacker, Katie Moussouris's reputation is legion in cybersecurity. She was the pioneering creator of Microsoft's bug bounty program, as chronicled in Nicole Perloth's bestseller, This Is How They Tell Me the World Ends: The Cyber Weapons Arm Race. She helped the Department of Defense create its first bug bounty program, and previously served as Chief Policy Officer at HackerOne. In this episode, this powerhouse duo touch on:Origins of bug bounty programsTaking a hacker mindset to your careerThe pay equity gapIncreasing reliance on technology that we're having trouble securingFollow Katie Hanahan on LinkedInFollow Katie Moussouris on Twitter, LinkedIn
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [March 27, 2023] 00:00 - Intro 00:18 - Patrick Laverty Intro 01:01 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 05:02 - David Sherry Intro 07:25 - Today's Topic: How to Develop a Culture of Top-Down Security 11:42 - The Weakest Link 14:03 - It's All About the "Report" 17:37 - Culture is Everything 20:28 - Zero to Sixty! 23:27 - Make it Personal 25:55 - MVP: Most Valuable People 27:33 - Empowerment through Education 37:11 - The Chicken or the Egg? 39:32 - Book Recommendations - Project Zero Trust - George Finney - Race After Technology - Ruha Benjamin - This Is How They Tell Me the World Ends - Nicole Perlroth - The Indispensables - Patrick K. O'Donnell 43:02 - Find David Sherry Online - Twitter: twitter.com/CISOatPrinceton - LinkedIn: linkedin.com/in/davidsherry - Website: informationsecurity.princeton.edu 44:17 - Next Month: The History of VISHING 44:43 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy - Patrick Laverty - Twitter: @plaverty9 - LinkedIn: linkedin.com/in/plaverty9
Nicole Perlroth spent a decade as the lead cybersecurity, digital espionage and sabotage reporter for The New York Times. Her new book is "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race."
In Nicole Perlroth's blockbuster 2021 book, “This Is How They Tell Me the World Ends,” the former New York Times journalist conveys cybersecurity experts' mounting anxiety about increasingly dangerous digital threats. From spyware to ransomware, the black market for cyber tools that skirt the law is lucrative and often poorly understood. Nicole points to catastrophic cyberattacks like NotPetya, a 2017 ransomware look-alike that attempted to obliterate Ukraine's critical infrastructure before causing billions of dollars in damages worldwide. But even with geopolitical tensions now at a fever pitch, Nicole, now a cybersecurity advisor and investor, explains why “mutually assured digital destruction” has so far helped stave off major attacks on U.S. critical infrastructure. ---------Also covered in the podcast: * The importance of educating board members about cybersecurity * What constitutes a cyber weapon* Why Nicole is optimistic about the future of ransomware
Research indicates that 25% of the workforce is engaged. What about the other 75%? Tom Peters believes we should put people first, and success will follow. This isn't new information. From Tom's first book in 1982, In Search of Excellence, to his latest book Excellence Now: Extreme Humanism, Tom shares his thoughts on leadership excellence. It is more than process and spreadsheets; it is focusing on the growth of the people you lead. As a bonus, Tom asks Kevin some questions. Key Points Tom Peters shares his thoughts on the importance of EQ, culture and remote work, and the importance of front-line leaders. Meet Tom Name: Tom Peters His Story: Tom is the author of Excellence Now: Extreme Humanism. He has a civil engineering degree from Cornell and an MBA and Ph.D. from the Stanford Graduate School of Business. He served in the US Navy, deployed in Vietnam and at the Pentagon, was a policy advisor to the White House, and became a partner at McKinsey & Co. In 1981 he founded three companies and has continued to influence leaders ever since. Worth Mentioning: https://excellencenow.com/ https://www.linkedin.com/in/tompeters-excellence This episode is brought to you by... Remarkable Masterclasses. Each masterclass is designed to help you become the remarkable leader and human you were born to be. Details on how to get on board for a specific skill or get discounts each month can be found on our website. Book Recommendations Tom Peters' Compact Guide to Excellence by Tom Peters, & Nancy Green Quiet: The Power of Introverts in a World That Can't Stop Talking by Susan Cain This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth Related Episodes The Excellence Dividend with Tom Peters Creative Acts for Curious People with Sarah Stein Greenberg Empowering the Next Generation of Leaders with Bill George
Rick Howard, the CyberWire's CSO and Chief Analyst, chats with Steve Winterfeld, the Akamai Advisory CISO, and Errol Weiss, the Health-ISAC CSO, about recommended sources of infosec content that they found valuable in 2021. Links to content mentioned in the show: Documentaries “Kill Chain: The Cyber War on America's Elections,” by Harri Hursti, Published by HBO, 26 March 2020. “The Perfect Weapon.” by David Sanger, Published by HBO, 16 October 2020. Podcasts “Darknet Diaries – True Stories from the Dark Side of the Internet,” by Darknetdiaries.com, 25 January 2022. “The Lazarus Heist,” BBC, 2021. Books “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Published by Doubleday, 7 May 2019. “This Is How They Tell Me the World Ends the Cyberweapons Arms Race,” by Nicole Perlroth, Published by Bloomsbury Publishing 9 February 2021. Author Interviews “A Conversation with Nicole Perlroth, Author of ‘This Is How They Tell Me the World Ends,'” American Writers Museum, YouTube, 2 March 2021. “Andy Greenberg - Sandworm: Lessons from the Cyberwar,” by CS3STHLM, YouTube, 25 October 2021. “Bonus: Cybersecurity Canon Hall of Fame Interview with Andy Greenberg,” By Rick Howard, The CyberWire, 12 July 12 2021. “‘Sandworm' Author Andy Greenberg,” by David Bittner, The CyberWire, 11 November 2019. Video Content “LockPickingLawyer.” YouTube, 2022. “RSA Conference.” YouTube, 2022. Twitter Subject Matter Experts Phil Venables (@philvenables) Bonus - Gate 15 / Andy Jabbour (@Gate_15_Analyst) Errol Weiss (@errolw65) Rick Howard (@raceBannon99) News and Topic Summaries “Daily Briefing.” The CyberWire, 2022. “SmartBrief.” SmartBrief, 2018. For a complete reading list and even more information, check out Rick's more detailed essay on the topic.
Nicole is a cyber security journalist and has covered many high-profile cases, such as the Russian hacking of nuclear power plants, North Korea's attacks on movie studios, and Chinese government-sanctioned cyber-attacks around the globe. She is also the author of This Is How They Tell Me the World Ends, which provides readers with details about the most secretive, government-backed market in the world, cyberweapons. In this conversation, we learn why cybersecurity is such an essential topic for non-technical people, cyber security threats that exist within global supply-chain markets, and the definition of cyber hygiene. Hear some examples of high-profile cyber attacks, steps companies should take regarding cyber security, why cyber security stories rarely make headlines, and the human-behaviour element behind the problem. We also learn ways in which society and governments can act to overcome the challenges of cyber security, and what advancements are needed within the space. Tune in to learn everything you need to know about the undercover cyber threat and what you can do about it, with expert Nicole Perlroth!
Need some summer reading that is actually useful? Get away from those trashy novels that waste your time, and check out this MacVoices Briefing about to entertaining and informative books: After Steve: How Apple Became a Trillion-Dollar Company and Lost its Soul by Trip Mickle and This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth. Find out why both deserve your attention, and earn a MacVoices recommendation from Chuck. Kolide is an endpoint security solution for teams that want to meet their compliance goals without sacrificing privacy. Learn more here. Show Notes: Links: After Steve: How Apple Became a Trillion-Dollar Company and Lost its Soul by Trip Mickle Audible:https://amzn.to/3d6n6Ed Amazon - Hardcoverhttps://amzn.to/3SoUF4O Amazon - Paperbackhttps://amzn.to/3Sn99SG Kindle:https://amzn.to/3zVpzdF This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth Audible:https://amzn.to/3d0kx6N Hardcover:https://amzn.to/3vEZAVD Kindle:https://amzn.to/3JuNrrO Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Need some summer reading that is actually useful? Get away from those trashy novels that waste your time, and check out this MacVoices Briefing about to entertaining and informative books: After Steve: How Apple Became a Trillion-Dollar Company and Lost its Soul by Trip Mickle and This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth. Find out why both deserve your attention, and earn a MacVoices recommendation from Chuck. Kolide is an endpoint security solution for teams that want to meet their compliance goals without sacrificing privacy. Learn more here. Show Notes: Links: After Steve: How Apple Became a Trillion-Dollar Company and Lost its Soul by Trip Mickle Audible:https://amzn.to/3d6n6Ed Amazon - Hardcoverhttps://amzn.to/3SoUF4O Amazon - Paperbackhttps://amzn.to/3Sn99SG Kindle:https://amzn.to/3zVpzdF This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth Audible:https://amzn.to/3d0kx6N Hardcover:https://amzn.to/3vEZAVD Kindle:https://amzn.to/3JuNrrO Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Topic 1: Hospital Robots Are Helping Combat a Wave of Nurse Burnout Moxi and other delivery-focused assistants have become even more critical as the Covid-19 pandemic has pushed health care workers to their limits. https://www.wired.com/story/moxi-hospital-robot-nurse-burnout-health-care/ Topic 2: DHS investigators say they foiled cyberattack on undersea internet cable in Hawaii https://www.cyberscoop.com/undersea-cable-operator-hacked-hawaii/ https://thisishowtheytellmetheworldends.com/ https://www.audible.com/pd/This-Is-How-They-Tell-Me-the-World-Ends-Audiobook/1635577179 Topic 3: The DTC model is failing to generate proSts, and founders are rushing to partner with big-box retailers like Target after years of shunning them https://www.businessinsider.com/dtc-brands-wholesale-partnerships-are-key-on-path-to-profitability-2022-4 -- -- -- Sponsor Memo: Egynte is back with their 2022 MSP Summit. Hear what's new at Egnyte from the Senior Leadership team. Learn from an open discussion with a panel of your peers. Choose from a variety of sessions with experts, including Tiffani Bova, Chief Growth Evangelist at Salesforce. The event is May 12, 2022, Win prizes, network with peers, all in a half day online event. Register for free right at engyte.com/mspradio :-)
I interview a hacker about the hackers hacking Russia in the current Ukraine cyberwar. He shares his manifesto and why he thinks it's important for you to learn hacking in 2022. Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. Next interview: If you are a hacker based in Russia and want to be interviewed, please contact me and let's try to set up an interview. Is this how the world ends? Another book to look at: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" by Nicole Perlroth: https://amzn.to/3JqK1Wp // MENU // 00:00 ▶️ Introduction 00:36 ▶️ Occupy The Web Introduction + background 03:05 ▶️ Hacking Russia 04:09 ▶️ Cyber-war 06:45 ▶️ Hacking accomplishments 09:12 ▶️ DDos Russian websites 10:18 ▶️ Russian "Iron Curtain" 11:27 ▶️ Hackers Arise DDos tutorial 13:45 ▶️ What is a white hat hacker? 16:40 ▶️ Urgency of stopping Putin 17:16 ▶️ Responsibility of hackers 18:00 ▶️ Hackers Arise manuals 19:36 ▶️ Using SDR to jam communications 20:10 ▶️ Ukrainian government asking hackers for help 21:43 ▶️ What Russians think 23:12 ▶️ Risk of being visited by a government agency 25:58 ▶️ Russian back doors 28:23 ▶️ Vulnerable systems in Russia 29:51 ▶️ Russian hackers escalation 33:52 ▶️ Linux basics for hackers book 37:53 ▶️ Opinion about CEH 39:00 ▶️ Advice for young hackers 41:59 ▶️ Opinion on OSCP 42:38 ▶️ Other certs CompTIA Security+ or eJPT 44:40 ▶️ Has the West been asleep 47:26 ▶️ Germany on the frontlines 49:18 ▶️ Russian/Ukraine war escalating cyber-security 53:05 ▶️ How to stay anonymous online 59:17 ▶️ Occupy The Web history 01:01:20 ▶️ Install Linux on hardware? What version of Linux? Kali? 01:05:09 ▶️ "Am I too old for hacking?" 01:09:13 ▶️ Hacker Arise courses 01:12:53 ▶️ Occupy The Web twitter and others 01:14:27 ▶️ Closing thoughts and manifesto // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Occupy The Web / Hackers Arise Website // Website: https://www.hackers-arise.com/ What is a White Hat Hacker: hhttps://davidbombal.wiki/whitehatarise Putin's Windows XP Computer: https://davidbombal.wiki/putinxp SDR Signals: https://davidbombal.wiki/SDRSignals Using OSINT to find Yachts: https://davidbombal.wiki/osintyachts // Recommended Twitter Accounts // Lesley Carhart: https://twitter.com/hacks4pancakes Dave Kennedy: https://twitter.com/HackingDave Evacide: https://twitter.com/evacide // In the News // BBC: https://www.bbc.co.uk/news/technology... The Guardian: https://www.theguardian.com/world/202... Reuters: https://www.reuters.com/world/exclusi... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ukraine #russia #cyberwar
On 'current history', or what might be going on out there. Subscribe at: paid.retraice.com Details: what's GOOT; current history; hypotheses [and some predictions]; What's next? Complete notes and video at: https://www.retraice.com/segments/re17 Air date: Monday, 7th Mar. 2022, 4 : 20 PM Eastern/US. 0:00:00 what's GOOT; 0:01:35 current history; 0:04:30 hypotheses [and some predictions]; 0:13:38 What's next? References: Allison, G. (2018). Destined for War: Can America and China Escape Thucydides's Trap? Mariner Books. ISBN: 978-1328915382. Searches: https://www.amazon.com/s?k=9781328915382 https://www.google.com/search?q=isbn+9781328915382 https://lccn.loc.gov/2017005351 Andrew, C. (2018). The Secret World: A History of Intelligence. Yale University Press. ISBN in paperback edition printed as "978-0-300-23844-0 (hardcover : alk. paper)". Searches: https://www.amazon.com/s?k=978-0300238440 https://www.google.com/search?q=isbn+978-0300238440 https://lccn.loc.gov/2018947154 Baumeister, R. F. (1999). Evil: Inside Human Violence and Cruelty. Holt Paperbacks, revised ed. ISBN: 978-0805071658. Searches: https://www.amazon.com/s?k=9780805071658 https://www.google.com/search?q=isbn+9780805071658 https://lccn.loc.gov/96041940 Bostrom, N. (2011). Information Hazards: A Typology of Potential Harms from Knowledge. Review of Contemporary Philosophy, 10, 44-79. Citations are from Bostrom's website copy: https://www.nickbostrom.com/information-hazards.pdf Retrieved 9th Sep. 2020. Bostrom, N. (2019). The vulnerable world hypothesis. Global Policy, 10(4), 455-476. Nov. 2019. https://nickbostrom.com/papers/vulnerable.pdf Retrieved 24th Mar. 2020. Bostrom, N., & Cirkovic, M. M. (Eds.) (2008). Global Catastrophic Risks. Oxford University Press. ISBN: 978-0199606504. Searches: https://www.amazon.com/s?k=978-0199606504 https://www.google.com/search?q=isbn+978-0199606504 https://lccn.loc.gov/2008006539 Brockman, J. (Ed.) (2015). What to Think About Machines That Think: Today's Leading Thinkers on the Age of Machine Intelligence. Harper Perennial. ISBN: 978-0062425652. Searches: https://www.amazon.com/s?k=978-0062425652 https://www.google.com/search?q=isbn+978-0062425652 https://lccn.loc.gov/2016303054 Chomsky, N. (1970). For Reasons of State. The New Press, revised ed. ISBN: 1565847946. Originally published 1970; this revised ed. 2003. Searches: https://www.amazon.com/s?k=1565847946 https://www.google.com/search?q=isbn+1565847946 https://catalog.loc.gov/vwebv/search?searchArg=1565847946 Chomsky, N. (2017). Requiem for the American Dream: The 10 Principles of Concentration of Wealth & Power. Seven Stories Press. ISBN: 978-1609807368. Searches: https://www.amazon.com/s?k=978-1609807368 https://www.google.com/search?q=isbn+978-1609807368 https://lccn.loc.gov/2016054121 Cirkovic, M. M. (2008). Observation selection effects and global catastrophic risks. (pp. 120-145). In Bostrom & Cirkovic (2008). de Grey, A. (2007). Ending Aging: The Rejuvenation Breakthroughs That Could Reverse Human Aging in Our Lifetime. St. Martin's Press. ISBN: 978-0312367060. Searches: https://www.amazon.com/s?k=978-0312367060 https://www.google.com/search?q=isbn+978-0312367060 https://lccn.loc.gov/2007020217 Deary, I. J. (2001). Intelligence: A Very Short Introduction. Oxford. ISBN: 978-0192893215. Searches: https://www.amazon.com/s?k=978-0192893215 https://www.google.com/search?q=isbn+978-0192893215 https://lccn.loc.gov/2001269139 Diamond, J. (1997). Guns, Germs, and Steel: The Fates of Human Societies. Norton. ISBN: 0393317552. Searches: https://www.amazon.com/s?k=0393317552 https://www.google.com/search?q=isbn+0393317552 https://catalog.loc.gov/vwebv/search?searchArg=0393317552 Dolan, R. M. (2000). UFOs and the National Security State Vol. 1: An Unclassified History. Keyhole, 1st ed. ISBN: 0967799503. Searches: https://www.amazon.com/s?k=0967799503 https://www.google.com/search?q=isbn+0967799503 https://catalog.loc.gov/vwebv/search?searchArg=0967799503 Dolan, R. M. (2009). UFOs and the National Security State Vol. 2: The Cover-Up Exposed, 1973-1991. Keyhole. ISBN: 978-0967799513. Searches: https://www.amazon.com/s?k=978-0967799513 https://www.google.com/search?q=isbn+978-0967799513 Durant, W., & Durant, A. (1968). The Lessons of History. Simon and Schuster. No ISBN. Searches: https://www.amazon.com/s?k=lessons+of+history+durant https://www.google.com/search?q=lessons+of+history+durant https://lccn.loc.gov/68019949 Dyson, G. (2015). Analog, the revolution that dares not speak its name. (pp. 255-256). In Brockman (2015). Dyson, G. (2020). Analogia: The Emergence of Technology Beyond Programmable Control. Farrar, Straus and Giroux. ISBN: 978-0374104863. Searches: https://www.amazon.com/s?k=9780374104863 https://www.google.com/search?q=isbn+9780374104863 https://catalog.loc.gov/vwebv/search?searchArg=9780374104863 Dyson, G. B. (1997). Darwin Among The Machines: The Evolution Of Global Intelligence. Basic Books. ISBN: 978-0465031627. Searches: https://www.amazon.com/s?k=978-0465031627 https://www.google.com/search?q=isbn+978-0465031627 https://lccn.loc.gov/2012943208 Frank, R., & Bernanke, B. (2001). Principles of Economics. Mcgraw-Hill. ISBN: 0072289627. Searches: https://www.amazon.com/s?k=0072289627 https://www.google.com/search?q=isbn+0072289627 https://catalog.loc.gov/vwebv/search?searchArg=0072289627 Frankfurt, H. G. (1988). The Importance of What We Care About. Cambridge. ISBN: 978-0521336116. Searches: https://www.amazon.com/s?k=978-0521336116 https://www.google.com/search?q=isbn+978-0521336116 https://lccn.loc.gov/87026941 Gawande, A. (2014). Being Mortal: Medicine and What Matters in the End. Metropolitan Books. ISBN: 978-0805095159. Searches: https://www.amazon.com/s?k=9780805095159 https://www.google.com/search?q=isbn+9780805095159 https://catalog.loc.gov/vwebv/search?searchArg=9780805095159 Grabo, C. M. (2002). Anticipating Surprise: Analysis for Strategic Warning. Center for Strategic Intelligence Research. ISBN: 0965619567 https://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf Retrieved 7th Sep. 2020. Griffiths, P. J. (1971). Vietnam, Inc.. Phaidon, 2nd ed. ISBN: 978-0714846033. Originally published 1971. This edition 2006. Link and searches: http://philipjonesgriffiths.org/photography/selected-work/vietnam-inc/ Retrieved 10 Mar. 2022. https://www.amazon.com/s?k=978-0714846033 https://www.google.com/search?q=isbn+978-0714846033 https://lccn.loc.gov/2006283959 Hamming, R. W. (2020). The Art of Doing Science and Engineering: Learning to Learn. Stripe Press. ISBN: 978-1732265172. Searches: https://www.amazon.com/s?k=9781732265172 https://www.google.com/search?q=isbn+9781732265172 Hawking, S. (2018). Brief Answers to the Big Questions. Bantam. ISBN: 978-1984819192. Searches: https://www.amazon.com/s?k=9781984819192 https://www.google.com/search?q=isbn+9781984819192 https://catalog.loc.gov/vwebv/search?searchArg=9781984819192 Herrnstein, R. J., & Murray, C. (1996). The Bell Curve: Intelligence and Class Structure in American Life. Free Press. ISBN: 978-0684824291. Searches: https://www.amazon.com/s?k=9780684824291 https://www.google.com/search?q=isbn+9780684824291 https://catalog.loc.gov/vwebv/search?searchArg=9780684824291 Johnson, S. (2014). How We Got to Now: Six Innovations That Made the Modern World. Riverhead Books. ISBN: 978-1594633935. Searches: https://www.amazon.com/s?k=9781594633935 https://www.google.com/search?q=isbn+9781594633935 https://lccn.loc.gov/2014018412 Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux. ISBN: 978-0374533557. Searches: https://www.amazon.com/s?k=978-0374533557 https://www.google.com/search?q=isbn+978-0374533557 https://lccn.loc.gov/2012533187 Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Simon & Schuster. ISBN: 978-1476763255. Searches: https://www.amazon.com/s?k=9781476763255 https://www.google.com/search?q=isbn+9781476763255 https://catalog.loc.gov/vwebv/search?searchArg=9781476763255 Kelleher, C. A., & Knapp, G. (2005). Hunt for the Skinwalker: Science Confronts the Unexplained at a Remote Ranch in Utah. Paraview Pocket Books. ISBN: 978-1416505211. Searches: https://www.amazon.com/s?k=978-1416505211 https://www.google.com/search?q=isbn+978-1416505211 https://lccn.loc.gov/2005053457 Keyhoe, D. (1950). The Flying Saucers Are Real. Forgotten Books. ISBN: 978-1605065472. Originally published 1950; this edition 2008. Searches: https://www.amazon.com/s?k=9781605065472 https://www.google.com/search?q=isbn+9781605065472 https://lccn.loc.gov/50004886 Kilcullen, D. (2020). The Dragons And The Snakes: How The Rest Learned To Fight The West. Oxford University Press. ISBN: 978-0190265687. Searches: https://www.amazon.com/s?k=9780190265687 https://www.google.com/search?q=isbn+9780190265687 https://catalog.loc.gov/vwebv/search?searchArg=9780190265687 Lazar, B. (2019). Dreamland: An Autobiography. Interstellar. ISBN: 978-0578437057. Searches: https://www.amazon.com/s?k=9780578437057 https://www.google.com/search?q=isbn+9780578437057 Lee, K.-F. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt. ISBN: 978-1328546395. Searches: https://www.amazon.com/s?k=9781328546395 https://www.google.com/search?q=isbn+9781328546395 https://catalog.loc.gov/vwebv/search?searchArg=9781328546395 Mitter, R. (2008). Modern China: A Very Short Introduction. Oxford University Press, kindle ed. ISBN: 978-0199228027. Searches: https://www.amazon.com/s?k=9780199228027 https://www.google.com/search?q=isbn+9780199228027 https://catalog.loc.gov/vwebv/search?searchArg=9780199228027 Nouri, A., & Chyba, C. F. (2008). Biotechnology and biosecurity. (pp. 450-480). In Bostrom & Cirkovic (2008). O'Donnell, P. K. (2004). Operatives, Spies, and Saboteurs: The Unknown Story of the Men and Women of World War II's OSS. Free Press / Simon & Schuster. ISBN: 074323572X. Edition and searches: https://archive.org/details/operativesspiess00odon https://www.amazon.com/s?k=074323572X https://www.google.com/search?q=isbn+074323572X https://catalog.loc.gov/vwebv/search?searchArg=074323572X Ord, T. (2020). The Precipice: Existential Risk and the Future of Humanity. Hachette. ISBN: 978-0316484916. Searches: https://www.amazon.com/s?k=978-0316484916 https://www.google.com/search?q=isbn+978-0316484916 https://lccn.loc.gov/2019956459 Orlov, D. (2008). Reinventing Collapse: The Soviet Example and American Prospects. New Society. ISBN: 978-0865716063. Searches: https://www.amazon.com/s?k=9780865716063 https://www.google.com/search?q=isbn+9780865716063 https://catalog.loc.gov/vwebv/search?searchArg=9780865716063 Osnos, E. (2020/01/06). The Future of America's Contest with China. The New Yorker. https://www.newyorker.com/magazine/2020/01/13/the-future-of-americas-contest-with-china Retrieved 22 April, 2020. Perlroth, N. (2020). This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury. ISBN: 978-1635576054. Searches: https://www.amazon.com/s?k=978-1635576054 https://www.google.com/search?q=isbn+978-1635576054 https://lccn.loc.gov/2020950713 Phoenix, C., & Treder, M. (2008). Nanotechnology as global catastrophic risk. (pp. 481-503). In Bostrom & Cirkovic (2008). Pillsbury, M. (2015). The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower. St. Martin's Griffin. ISBN: 978-1250081346. Searches: https://www.amazon.com/s?k=9781250081346 https://www.google.com/search?q=isbn+9781250081346 https://lccn.loc.gov/2014012015 Pinker, S. (2011). The Better Angels of Our Nature: Why Violence Has Declined. Penguin Publishing Group. ISBN: 978-0143122012. Searches: https://www.amazon.com/s?k=978-0143122012 https://www.google.com/search?q=isbn+978-0143122012 https://lccn.loc.gov/2011015201 Pogue, D. (2021). How to Prepare for Climate Change: A Practical Guide to Surviving the Chaos. Simon & Schuster. ISBN: 978-1982134518. Searches: https://www.amazon.com/s?k=9781982134518 https://www.google.com/search?q=isbn+9781982134518 https://catalog.loc.gov/vwebv/search?searchArg=9781982134518 Putnam, R. D. (2015). Our Kids: The American Dream in Crisis. Simon & Schuster. ISBN: 978-1476769905. Searches: https://www.amazon.com/s?k=9781476769905 https://www.google.com/search?q=isbn+9781476769905 https://lccn.loc.gov/2015001534 Rees, M. (2003). Our Final Hour: A Scientist's Warning. Basic Books. ISBN: 0465068634. Searches: https://www.amazon.com/s?k=0465068634 https://www.google.com/search?q=isbn+0465068634 https://lccn.loc.gov/2004556001 Rees, M. (2008). Foreword to Bostrom & Cirkovic (2008). (pp. iii-vii). Reid, T. R. (2017). A Fine Mess: A Global Quest for a Simpler, Fairer, and More Efficient Tax System. Penguin Press. ISBN: 978-1594205514. Searches: https://www.amazon.com/s?k=9781594205514 https://www.google.com/search?q=isbn+9781594205514 https://catalog.loc.gov/vwebv/search?searchArg=9781594205514 Retraice (2020/09/07). Re1: Three Kinds of Intelligence. retraice.com. https://www.retraice.com/segments/re1 Retrieved 22nd Sep. 2020. Retraice (2020/11/10). Re13: The Care Factor. retraice.com. https://www.retraice.com/segments/re13 Retrieved 10th Nov. 2020. Romm, J. (2016). Climate Change: What Everyone Needs to Know. Oxford University Press. ISBN: 978-0190250171. Searches: https://www.amazon.com/s?k=9780190250171 https://www.google.com/search?q=isbn+9780190250171 https://catalog.loc.gov/vwebv/search?searchArg=9780190250171 Russell, S., & Norvig, P. (2020). Artificial Intelligence: A Modern Approach. Pearson, 4th ed. ISBN: 978-0134610993. Searches: https://www.amazon.com/s?k=978-0134610993 https://www.google.com/search?q=isbn+978-0134610993 https://lccn.loc.gov/2019047498 Salter, A. (2003). Predators. Basic Books. ISBN: 978-0465071732. Searches: https://www.amazon.com/s?k=978-0465071739 https://www.google.com/search?q=isbn+978-0465071739 https://lccn.loc.gov/2002015846 Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Broadway Books. ISBN: 978-0451497901. Searches: https://www.amazon.com/s?k=9780451497901 https://www.google.com/search?q=isbn+9780451497901 https://catalog.loc.gov/vwebv/search?searchArg=9780451497901 Sapolsky, R. M. (2018). Behave: The Biology of Humans at Our Best and Worst. Penguin Books. ISBN: 978-0143110910. Searches: https://www.amazon.com/s?k=9780143110910 https://www.google.com/search?q=isbn+9780143110910 https://lccn.loc.gov/2016056755 Shirer, W. L. (1959). The Rise and Fall of the Third Reich: A History of Nazi Germany. Simon & Schuster, 50th anniv. ed. ISBN: 978-1451651683. Originally published 1959; this ed. 2011. Searches: https://www.amazon.com/s?k=9781451651683 https://www.google.com/search?q=isbn+9781451651683 https://lccn.loc.gov/60006729 Shorrocks, A., Davies, J., Lluberas, R., & Rohner, U. (2019). Global wealth report 2019. Credit Suisse Research Institute. Oct. 2019. https://www.credit-suisse.com/about-us/en/reports-research/global-wealth-report.html Retrieved 4 July, 2020. Simler, K., & Hanson, R. (2018). The Elephant in the Brain: Hidden Motives in Everyday Life. Oxford University Press. ISBN: 9780190495992. Searches: https://www.amazon.com/s?k=9780190495992 https://www.google.com/search?q=isbn+9780190495992 https://lccn.loc.gov/2017004296 Spalding, R. (2019). Stealth War: How China Took Over While America's Elite Slept. Portfolio. ISBN: 978-0593084342. Searches: https://www.amazon.com/s?k=9780593084342 https://www.google.com/search?q=isbn+9780593084342 https://catalog.loc.gov/vwebv/search?searchArg=9780593084342 Stephens-Davidowitz, S. (2018). Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey Street Books. ISBN: 978-0062390868. Searches: https://www.amazon.com/s?k=9780062390868 https://www.google.com/search?q=isbn+9780062390868 https://lccn.loc.gov/2017297094 Sternberg, R. J. (Ed.) (2020). The Cambridge Handbook of Intelligence (Cambridge Handbooks in Psychology) (2 vols.). Cambridge University Press, 2nd ed. ISBN: 978-1108719193. Searches: https://www.amazon.com/s?k=9781108719193 https://www.google.com/search?q=isbn+9781108719193 https://lccn.loc.gov/2019019464 Vallee, J. (1979). Messengers of Deception: UFO Contacts and Cults. And/Or Press. ISBN: 0915904381. Different edition and searches: https://archive.org/details/MessengersOfDeceptionUFOContactsAndCultsJacquesValle1979/mode/2up https://www.amazon.com/s?k=0915904381 https://www.google.com/search?q=isbn+0915904381 https://catalog.loc.gov/vwebv/search?searchArg=0915904381 Walter, B. F. (2022). How Civil Wars Start. Crown. ISBN: 978-0593137789. Searches: https://www.amazon.com/s?k=978-0593137789 https://www.google.com/search?q=isbn+978-0593137789 https://lccn.loc.gov/2021040090 Walter, C. (2020). Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever. National Geographic. ISBN: 978-1426219801. Searches: https://www.amazon.com/s?k=9781426219801 https://www.google.com/search?q=isbn+9781426219801 https://catalog.loc.gov/vwebv/search?searchArg=9781426219801 Zubrin, R. (1996). The Case for Mars: The Plan to Settle the Red Planet and Why We Must. Free Press. First published in 1996. This 25th anniv. edition 2021. ISBN: 978-0684827575. Searches: https://www.amazon.com/s?k=978-0684827575 https://www.google.com/search?q=isbn+978-0684827575 https://lccn.loc.gov/2011005417 Zubrin, R. (2019). The Case for Space: How the Revolution in Spaceflight Opens Up a Future of Limitless Possibility. Prometheus Books. ISBN: 978-1633885349. Searches: https://www.amazon.com/s?k=978-1633885349 https://www.google.com/search?q=isbn+978-1633885349 https://lccn.loc.gov/2018061068 Copyright: 2022 Retraice, Inc. https://retraice.com
This Is How They Tell Me the World Ends is a chilling book about the danger hackers pose to all of us. It is also a title with a super unclear pronoun. What is “this” referring to? The cause of the world ending? Or the way she's being told? Until we get answers, we unfortunately cannot recommend this book...Also, Dave has some cybersecurity tips that will only take you 10 minutes, and that you still will not do. And Kellen loved the Stuxnet virus.*TheBookPilePodcast@gmail.com*Kellen Erskine has appeared on Conan, Comedy Central, Jimmy Kimmel Live!, NBC's America's Got Talent, and the Amazon Original Series Inside Jokes. He has garnered over 50 million views with his clips on Dry Bar Comedy. In 2018 he was selected to perform on the “New Faces” showcase at the Just For Laughs Comedy Festival in Montreal, Quebec. Kellen was named one of TBS's Top Ten Comics to Watch in 2017. He currently tours the country www.KellenErskine.com*David Vance's videos have garnered over 1 billion views. He has written viral ads for companies like Squatty Potty, Chatbooks, and Lumē, and sketches for the comedy show Studio C. His work has received two Webby Awards, and appeared on Conan. He currently works as a writer on the sitcom Freelancers.
0:00 Stan na teraz 1:00 Wprowadzenie 4:48 Styczeń: pierwszy w 2022 r. cyberatak na Ukrainę 13:02 Estonia 2007 18:17 Gruzja 2008 19:40 Rosyjska dezinformacja 29:10 Największy w historii cyberatak Rosji 41:50 Pierwszy i drugi atak na sieć energetyczną 50:20 Cyberszpiedzy inwigilują Polskę 56:29 Świat a sprawa ukraińska Aktywność Rosji na polu wojny hybrydowej jest coraz większa. Dziś najsilniej obserwujemy ją wokół Ukrainy, ale tak naprawdę te działania są znacznie szersze. Sporo opublikowano już analiz i dezinformacji o rosyjskim nacechowaniu i działania tzw. trolli z Petersburga, ale i po prostu ataków cybernetycznych najprawdopodobniej powiązanych z Kremlem. Chcącym poszerzyć wiedzę polecamy: Książki: “Sandworm. Nowa era cyberwojny i polowanie na najbardziej niebezpiecznych hakerów Kremla” Andy Greenberg, Wydawnictwo Naukowe PWN O kulisach ataku NotPetya z 2017 roku. "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" Nicole Perlroth Dziennikarka New York Times opisuje rozwój metod i środków stosowanych w cyberpotyczkach. "Trolle Putina. Prawdziwie historie z frontów rosyjskiej wojny informacyjnej", Jessikka Aro. Śledztwo finlandzkiej dziennikarki, która po tym jak zajęła się tematem trolli z Petersburga została tak zaszczuta w swojej ojczyźnie, że musiała ją opuścić. Materiały, które wspominamy w tym odcinku: O tym, jak Rosja atakowała Olimpiadę: https://www.nbcnews.com/tech/security/olympics-are-guard-favorite-target-russian-hackers-rcna1422 O wojnie hybrydowej na Ukrainie: https://theconversation.com/russia-has-been-at-war-with-ukraine-for-years-in-cyberspace-176221 O tym jakie są geopolityczne zamierzenia Rosji w ramach wojny hybrydowej: https://spidersweb.pl/plus/2022/02/rosja-ukraina-cyberataki-dezinformacja-wojna-hybrydowa O tym, jak mogą wyglądać cyberataki na Ukrainę: https://www.mandiant.com/resources/ukraine-crisis-cyber-threats O ataku NotPetya: https://wyborcza.pl/7,75399,21803502,potezny-cyberatak-na-szpitale-na-calym-swiecie-placowki-odsylaja.html?_ga=2.260455437.1874131622.1644766071-1389896801.1625993101 O tym jak działają Trolle Putina: https://spidersweb.pl/plus/2020/09/rosyjskie-trolle-dezinformacja-wybory-fake-news O tym jak amerykański wywiad oskarżył serwis Zero Hedge o sianie dezinformacji: https://apnews.com/article/russia-ukraine-coronavirus-pandemic-health-moscow-media-ff4a56b7b08bcdc6adaf02313a85edd9
In today's episode, Jim and Tyson chat with the CEO of Iron Tech Security, Tom Kirkham! They dive into the journey of cyber security defense systems and educate and encourage organizations to establish a security-first environment with cyber security training programs to prevent successful attacks. If you've been thinking about how secure your law firm is, check out this week's episode.With over 40 years of experience, Tom is the creator of Iron Tech Security. A managed services provider offering IT services to law firms. It's an all-in type of service providing a maximum relentless cyber security program.3:03 structure7:27 security team9:55 Ransome wear attack16:10 encrypted email service19:49 recognize your threats20:13 cost to protect your law firm22:12 protect your privacy24:20 be proactiveJim's Hack: Check out the Book, Soundtracks: The Surprising Solution to Overthinking by Jonathan Acuff. It's all about the messages we repeat to ourselves over and over.Tom's Tip: If you want a deep dive into the topic of cyber security, check out these two books. This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth and my book, The Cyber Pandemic Survival Guide, that you can pre-order now.Tyson's Tip: Check out Tile. It's one of the easiest ways to find lost items. Never lose anything. Tile can locate items like your cell phone quickly.Watch the podcast here.Join the Guild: www.maxlawguild.comMaxLawCon 2022 Tickets are Live: www.maxlawcon2022.com
From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel. --- Send in a voice message: https://anchor.fm/pbliving/message Support this podcast: https://anchor.fm/pbliving/support
In this episode of Big Tech, Taylor Owen speaks with Nicole Perlroth, New York Times cybersecurity journalist and author of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race.Nicole and Taylor discuss how that the way in which nation-states go about acquiring cyber weapons through underground online markets creates an incentive structure that enables the entire cyberwarfare complex to thrive while discouraging these exploits from being patched. “So they don't want to tell anyone about their zero-day exploits, or how they're using them, because the minute they do, that $3 million investment they just made turns to mud,” Perlroth explains. As Perlroth investigated the world of cyberwarfare, she noticed how each offensive action was met with a response in kind, the United States is under constant attack. The challenge with countering cyber-based attacks is the many forms they can take and their many targets, from attacks on infrastructure such as the power grid, to corporate and academic espionage, such as stealing intellectual property or COVID-19 vaccine research, to ransomware. “The core thesis of your book,” Taylor reflects, “is for whatever gain the US government might get from using these vulnerabilities, the blowback is both an unknowable and uncontrollable uncontainable.”Early on, Perlroth was concerned about the infrastructure attacks, the ones that could lead to a nuclear power plant meltdown. However, the main focus of cyberattacks is on intelligence and surveillance of mobile phones and internet-connected devices. There is a tension between Silicon Valley's efforts to encrypt and secure user data and law enforcement's search for tools to break that encryption. Several jurisdictions are looking to force tech companies to build back doors into their products. Certainly, providing access to devices to aid in stopping terrorist attacks and human trafficking would be beneficial. But back doors, like other vulnerabilities found in code, can be weaponized and used by authoritarian regimes to attack dissidents or ethnic minorities.Cybersecurity is a multi-faceted issue that needs to be addressed at all levels, because the nature of cyberwarfare is that we can no longer protect just our physical borders. “We have no choice but to ask ourselves the hard questions about what is in our network and who's securing it — and where is this code being built and maintained and tested, and are they investing enough in security?” says Perlroth.
Following Bruegel's end-of-year tradition, Giuseppe Porcaro invites Maria Demertzis, André Sapir and Guntram Wolff to review 2021 in economic policy and beyond, especially in pandemic preparedness, inflation as well as geopolitics. The guests also each introduce a book that has marked them this year and finally, their hopes and wishes for the upcoming 2022. Book list: Graeber, D. and David W. (2021) The Dawn of Everything: A New History of Humanity. Farrar, Straus and Giroux. Henrich, J. (2021) The Weirdest People in the World: How the West Became Psychologically Peculiar and Particularly Prosperous. Penguin. Perlroth, N. (2021) This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury Publishing. Ridley, M. (2020) How Innovation Works. HarperCollins.
Will the next war be waged online? Ed Butler talks to Nicole Perlroth, winner of the 2021 Financial Times Business Book of the Year for This Is How They Tell Me the World Ends - an investigation into the how governments, spies, criminals and corporations are dealing with - and exploiting - the risks associated with doing business in the digital era.
Find out more on our website: https://bit.ly/3sHu091 Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar—first thousands, and later millions of dollars—to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. In this webinar, Nicole Perlroth will be taking us through her new book This Is How They Tell Me the World Ends. Based on years of reporting and hundreds of interviews, she will lift the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel. Speaker: Nicole Perlroth covers cybersecurity and digital espionage for The New York Times. She has covered Russian hacks of nuclear plants, airports, and elections, North Korea's cyberattacks against movie studios, banks and hospitals, Iranian attacks on oil companies, banks and the Trump campaign and hundreds of Chinese cyberattacks, including a months-long hack of The Times. Her first book, “This Is How They Tell Me The World Ends,” about the global cyber arms race, was published in February 2021. The book, and several of her Times articles, have been optioned for television, with Ms. Perlroth producing. A Bay Area native, Ms. Perlroth is also a guest lecturer at the Stanford Graduate School of Business and a graduate of Princeton University and Stanford University.
C3 AI talks to Nicole Perlroth, who covers cybersecurity and digital espionage for The New York Times. She has covered Russian hacks of nuclear plants and elections, North Korea's cyberattacks against movie studios, and Iranian attacks on oil companies. Her first book – This Is How They Tell Me the World Ends – came out earlier this year and has been optioned for television. In this podcast you will learn: Why cyber and ransomware attacks have escalated. How “zero-day” exploits became a multi-billion-dollar industry globally. Which critical industries are most vulnerable to cyber attacks. Whether attacks are state-sponsored or merely tolerated by host countries. What governments and companies must do to mitigate the attacks.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by: Nicole Perlroth Everything is F*cked: A Book About Hope by: Mark Manson Never Split the Difference: Negotiating as if Your Life Depended on It by: Chris Voss Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore by: Michele Wucker Golden Sonby: Pierce Brown Red Rising: Sons of Ares – Volume 1 and 2 (Graphic Novels): By: Pierce Brown The Bear by: Andrew Krivak The Phoenix Exultant by: John C. Wright A History of North American Green Politics: An Insider View by: Stuart Parker Rube Goldberg Machines: Essays in Mormon Theology by: Adam S. Miller
Nicole Perlroth (@nicoleperlroth) is an award-winning cybersecurity journalist for The New York Times and bestselling author of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. What We Discuss with Nicole Perlroth: The startlingly simple reasons why most nation-states now resort to using cyberwarfare tactics before conventional weaponry in acts of aggression -- to increasingly devastating effect. How industries are so interconnected that there's almost no way for a cyberattack to target one victim without endangering countless others on all sides of a conflict (which is why you may have Putin to blame if there's a Cadbury chocolate egg shortage next Easter). Why leaving the security of 85 percent of its critical infrastructure up to privatization makes the United States especially vulnerable to cyberwarfare attacks. The massive amount of intellectual property that's been lost to hackers -- from the formula for Coca-Cola to information that would allow China and other rival nations to catch up with the United States in the nuclear arms race. What Nicole believes the US should do to push back against these threats and the governments that perpetrate them -- and ensure that it's not inadvertently one of them. And much more... Full show notes and resources can be found here: jordanharbinger.com/542 Sign up for Six-Minute Networking -- our free networking and relationship development mini course -- at jordanharbinger.com/course! Like this show? Please leave us a review here -- even one sentence helps! Consider including your Twitter handle so we can thank you personally!
Ann Johnson, Corporate Vice President, Security, Compliance, and Identity at Microsoft welcomes The New York Times cybersecurity reporter and best-selling author, Nicole Perlroth, to talk about her new book, This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. They dive into the spate of recent high-profile cyber-attacks, the top security risks facing the United States, and the strategies needed to fight back. They then cap off things off by talking about the process of writing a book.
The Whine Line is first with Dan Farrell of the St. Louis Cardinals on deck. Nicole Perlroth has written the book This Is How They Tell Me the World Ends: The Cyber-Weapons Arms Race. Nicole joins the show for the rest of the hour. See omnystudio.com/listener for privacy information.
In recent weeks, cybercriminals have increasingly targeted key players in the U.S. economy. Nicole Perlroth, cybersecurity and digital espionage reporter for The New York Times and author of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Bloomsbury Publishing, 2021), joins to discuss the future of cybersecurity in light of the recent ransomware attacks, including the most recent developments in the Colonial Pipeline situation. Plus, she helps take listener calls debating if cryptocurrency is an asset or a detriment to improving digital security.
When a government wants to break into someone's iPhone or Android device, there's a marketplace where that kind of vulnerability hacking service is bought and sold - costing sometimes as much as $2.5 million. The very fact that such a marketplace exists for cyberwarfare is an illustration of the rapidly growing field of threats we face, and also a sign of how dramatically unprepared we are to defend against these attacks. From the SolarWinds hack in 2020 which was one of the largest breaches of sensitive government data to the more recent attacks on small municipal water plants, utilities, and pipelines, there is an expanding intensity of the sophistication of cyber weapons and the United States is rapidly falling way behind the curve. Nicole Perlroth, the award-winning New York Times journalist, joins the podcast to discuss her excellent book, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race," a stunning work of investigative journalism spanning seven years of detailed research and interviews. According to Perlroth, the United States has an extremely soft underbelly of connected infrastructure which has profound exposures and no system of defense. Meanwhile, Russia is conducting targeted testing of its cyberwarfare tools all over the world, preparing for a future event. The NSA can perfect its offensive cyber-weaponry all it wants, she says, but currently there is still very little planning to prepare for the coming war. Whether or not the United States will respond in time to these threats and develop defenses is going to have a major impact on our future security.
Nicole Perlroth is an award-winning cybersecurity journalist for The New York Times. She is the author of the new book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Perlroth explains the existential threat that cyberwarfare and such digital weapons as computer viruses and “zero-day exploits” represent to an internet-connected society. She also warns that individual hackers and organizations working for countries, corporations, terrorist groups, and other organizations can easily disrupt American and other societies by extorting and otherwise interfering with banks, hospitals, municipalities, and essential infrastructure such as telephones, gas, heat, electrical power plants, and the water supply. And Perlroth shares her personal insights and experiences navigating the secretive world of hackers and cybersecurity. Chauncey DeVega continues to warn that Rep. Liz Cheney is no ally or friend to the Democrats, liberals, progressives or other pro-democracy patriots. In reality, she represents the very right-wing forces that helped to birth American neofascism and Trumpism. And Chauncey also reflects upon his experience of falling ill after the 2nd Covid vaccine shot and then suddenly feeling better and experiencing the joy of reliving his youth by watching Top Gun in the movie theater. SELECTED LINKS OF INTEREST FOR THIS EPISODE OF THE CHAUNCEY DEVEGA SHOW Liz Cheney is an enemy of democracy — just as much as the Trumpers Why the Republicans' Big Lie works so well: A sociopathic party, and a damaged country How the GOP Became the Party of Resentment The Democrats' Majority Is Hanging By a Thread. They Don't Seem to Care Editorial: Turns out condors are party animals (and poopers). That's worth celebrating WHERE CAN YOU FIND ME? On Twitter: https://twitter.com/chaunceydevega On Facebook: https://www.facebook.com/chauncey.devega My email: chaunceydevega@gmail.com HOW CAN YOU SUPPORT THE CHAUNCEY DEVEGA SHOW? Via Paypal at ChaunceyDeVega.com Patreon: https://www.patreon.com/thechaunceydevegashow Music at the end of this week's episode of The Chauncey DeVega Show is by JC Brooks & the Uptown Sound. You can listen to some of their great music on Spotify.
In her new book, This Is How They Tell Me the World Ends, New York Times cybersecurity reporter Nicole Perlroth exposes threat posed by an international market in cyberweapons For decades the US government has been collecting "zero days", a software bug that allows a hacker to break into and silently spy on a computer or device, paying hackers for their code. This has fostered a global market in computer hacks that are now being used against the country. A high profile example last year involved a foreign hack of American tech firm Solar Winds, which then spread the virus to its clients, including huge corporations, the Pentagon, and other government agencies. Nicole Perlroth covers cybersecurity and digital espionage for The New York Times. She has covered Russian hacks of nuclear plants, airports, and elections, North Korea's cyberattacks against movie studios, banks and hospitals, Iranian attacks on oil companies, banks and the Trump campaign and hundreds of Chinese cyberattacks, including a months-long hack of The Times. Perlroth is a guest lecturer at the Stanford Graduate School of Business and a graduate of Princeton University and Stanford University.
In her new book, This Is How They Tell Me the World Ends, New York Times cybersecurity reporter Nicole Perlroth exposes threat posed by an international market in cyberweapons For decades the US government has been collecting "zero days", a software bug that allows a hacker to break into and silently spy on a computer or device, paying hackers for their code. This has fostered a global market in computer hacks that are now being used against the country. A high profile example last year involved a foreign hack of American tech firm Solar Winds, which then spread the virus to its clients, including huge corporations, the Pentagon, and other government agencies. Nicole Perlroth covers cybersecurity and digital espionage for The New York Times. She has covered Russian hacks of nuclear plants, airports, and elections, North Korea's cyberattacks against movie studios, banks and hospitals, Iranian attacks on oil companies, banks and the Trump campaign and hundreds of Chinese cyberattacks, including a months-long hack of The Times. Perlroth is a guest lecturer at the Stanford Graduate School of Business and a graduate of Princeton University and Stanford University.
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
This week, AWM President Carey Cranston chats with award-winning New York Times cybersecurity reporter Nicole Perlroth about her new book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. This conversation was recorded live via Zoom on February 26th, 2021. We hope you enjoy entering the mind of a writer.
This week, AWM President Carey Cranston chats with award-winning New York Times cybersecurity reporter Nicole Perlroth about her new book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. This conversation was recorded live via Zoom on February 26th, 2021. We hope you enjoy entering the mind of a writer.
Our interview this week is with Nicole Perlroth, The New York Times reporter and author of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. It's wide-ranging, occasionally confrontational and a great tour of the issues raised in the book about 0-day exploits, U.S. responsibility for the global cyber arms race and the colorful personalities whose hard choices helped shape the cybersecurity environment we all now live in. In the news roundup, Nate Jones serves up a second helping of the SuperMicro story, a rerun of a much-maligned Bloomberg report from two years ago that SuperMicro gear had been elaborately compromised by China. This time, Nate reports, Bloomberg offers much more evidence, but probably not enough to completely satisfy the critics. Still, as we conclude, even giving the critics their due, this is a very bad story for SuperMicro—and for its customers. It seemed like a classic cybersecurity horror story, with hackers using access to the industrial control system to nearly poison Oldsmar, Florida's water supply. But Nate and I both suspect that it will turn out to be a much more mundane horror story, one where the call is always coming from inside the house—and untraceable because all the employees use the same password and no firewall. Paying for news links is suddenly all the rage among Western governments. I'd link to the Australian stories about their new law, but I'm afraid they'd want me to pay them. Mark MacCarthy says that risk is overrated, but the prospect for such payment schemes is pretty good. Not just Australia, but also the European Union is moving in this direction. And Microsoft has expressed its willingness to let Google pay such a fee in the U.S. I suggest that this is all part of restoring an establishment of “authoritative narrative shapers,” in an internet age, noting that the critical question will be which publishers can attach themselves to the flow of internet funding—a question already causing angst among French publishers. Paul Rosenzweig summarizes the work done by a lot of smart people on the question of how to think about Chinese technology platforms operating in the United States. He also summarizes the current state of litigation over Chinese technology platforms operating in the United States. In a word, it's mostly on hold, waiting for the Biden administration to run a laborious interagency review. Nate says the process has already begun for a related topic—how to secure the U.S. tech supply chain, particularly manufacturing semiconductors. Meanwhile, the U.S. Court of Appeals for the First Circuit has taken on the question of border searches of mobile phones, ruling against a coalition of cyberleft organizations. There is now a circuit conflict that could bring the Supreme Court into the fray—soon if the cyberleft losers are imprudent enough to seek cert but not much longer than that if the Solicitor General picks a favorable case to lose in the U.S. Court of Appeals for the Ninth Circuit. In short hits, I wonder at just how bad open source security has gotten, noting a clever hack that pawned many companies by providing a public (and compromised) package in a public repository, thereby trumping the companies' private packages. Luckily, NIST is all over open source security. Or not. It turns out that NIST is actually offering a host of insecure open source products with known flaws. The purpose of the products? Better computer security, naturally. The creative policing award of the week goes to the Beverly Hills cop who expresses his unhappiness with being filmed on the job by playing background snippets of songs that will get the video taken down by copyright bots if it is ever posted. In the “about time” category, a Canadian woman who defamed dozens of ordinary people in online vendettas has been arrested in Toronto. And EncroChat, the phone that promised criminals absolute security but delivered them into the hands of law enforcement has spawned a complicated debate about whether stealing messages from memory was wiretapping or hacking. Finally, either The Cyberlaw Podcast has hit a new height or the Harvard Law Review has hit a new low: Looking for a way to sum up the European Court of Justice's ruling in Schrems II , a student note in the review quotes from the podcast, characterizing Schrems II as “solipsistic Europocrisy meets judicial imperialism.” Couldn't have said it better myself! And more! Download the 349th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.