A hacker describes how he flexes his power by only communicating in person for extreme requests. However, most of the time they just talk broadly about things.
The speaker discusses his efforts to use encrypted phone apps like WhatsApp and Signal in order to keep his communication secure.
The moment you connect to a hotel's public Wi-Fi network in a potentially hostile territory, they can insert malware onto both your phone and your computer, leaving your sensitive data exposed. It's recommended to have only essential contacts and business information on your devices when traveling to reduce the risks of cyberattacks while connected to public Wi-Fi.
The speaker discusses experiencing DDoS attacks on his entrepreneurial setup, and how it went on for months. He also mentions how Periscope and Facebook Live have now made it easier for others to carry out similar attacks.
The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity. They also discuss the significance of accepting oneself even when struggling to understand certain things.
The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge. Parental controls prove inadequate for protecting children online.
The recent cyberattack on Ukraine’s power grid could be a new phase in the war between Ukraine and Russia as the latter has not been successful in winning the battle on the field. This persistent strategy might make it harder for Ukraine to sustain this war and the disruption caused could create an uneasy sense of normalcy.
Tom Johnson, an ethical hacker and social engineer, discusses how he bypasses physical and online security measures to access restricted areas and information. He dispels common security myths and provides insights on improving personal and commercial security.
The motivations, ethics, and worldviews of individuals involved in cyber attacks are discussed, including their views on good and evil, love for their community, and beliefs that attacking cybersecurity weaknesses will lead to a safer world.
The lack of laws and treaties regarding cyber security is a major issue, especially with recent events involving Russian hackers and the use of computer viruses such as Stuxnet.
The police were able to quickly apprehend a former IT worker who had hacked into his former employer's systems and targeted his supervisors and managers after receiving full cooperation from a witness who reported the intrusion.
A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.
The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information. They suggest that there are more cybersecurity measures than what they discussed in the podcast.
The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment. They mention knowing someone who works as a hacker but don't discuss his work.