goodlisten

Clip

Former Employee Still Has Access to Company's System
listen on Spotify
19:23 - 20:24 (01:01)

A former sysadmin still had access to the company's client network, two months after being fired, because his account was not disabled. This reveals a major security flaw in his former employer's system.

Similar Clips
A detective investigates a police department ransomware attack that caused 10 months of lost work and searches for the hacker's IP address for clues on their identity and motive.
36:01 - 37:47 (01:46)
listen on Spotify
Cybersecurity
Summary

A detective investigates a police department ransomware attack that caused 10 months of lost work and searches for the hacker's IP address for clues on their identity and motive.

Chapter
Mayor's Home Computer Connected to Police Department Server
Episode
96: The Police Station Incident
Podcast
Darknet Diaries
Outsourcing IT infrastructure can lead to lost credentials and difficulty in managing security risks, as well as make companies more vulnerable to intellectual property theft.
52:21 - 54:43 (02:21)
listen on Spotify
IT infrastructure
Summary

Outsourcing IT infrastructure can lead to lost credentials and difficulty in managing security risks, as well as make companies more vulnerable to intellectual property theft.

Chapter
The importance of incident response in cybersecurity
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.
05:09 - 06:50 (01:41)
listen on Spotify
Cybersecurity
Summary

A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.

Chapter
Hacker breaches children's personal data for their own protection
Episode
Ep 2: The Peculiar Case of the VTech Hacker
Podcast
Darknet Diaries
A security analyst was able to find hard-coded credentials, including a username and password, in a mobile app's plist file.
26:10 - 27:29 (01:19)
listen on Spotify
Mobile Security
Summary

A security analyst was able to find hard-coded credentials, including a username and password, in a mobile app's plist file. These credentials were then used to gain access to a server with an open manager console.

Chapter
Hacking into a Live Cam Website
Episode
130: Jason's Pen Test
Podcast
Darknet Diaries
A discussion about searching for a parody account on Twitter, including the potential consequences for the account holder if their identity is revealed.
2:17:38 - 2:19:03 (01:25)
listen on SpotifyListen on Youtube
Twitter
Summary

A discussion about searching for a parody account on Twitter, including the potential consequences for the account holder if their identity is revealed.

Chapter
Understanding the Unconventional Life of John McAfee
Episode
#288 – Sarma Melngailis: Bad Vegan
Podcast
Lex Fridman Podcast