Afleveringen
-
Cyber At Sea Session 1: Information, Access, & Control: What Hackers Want (Anatomy Of A Cyber Attack)
Streamed live from P&O Cruises Australia's "Pacific Adventure" while sailing between Singapore and Indonesia.Synopsis: Learn the lifecycle of a data breach and how hackers weaponise the data they steal - and that we give away for free - to conduct their nefarious activities. We'll explore the anatomy of a hack and how we can react and respond to meet our digital adversaries at every step of the way.A list of data breaches is available here (referenced in video): https://www.webberinsurance.com.au/data-breaches-list#twentytwo Other links from the video:IDCare: idcare.orgASD / ACSC: cyber.gov.auScamwatch: scamwatch.gov.auCybersecurity Uncensored is my way to provide content and advice on all things cyber security and hacking, with a focus on Information Security (commonly referred to as "InfoSec"), the threats posed by malware (a portmanteau of "Malicious" and "Software", and the increasing risk posed by ransomware. I provide specialised one-on-one presentations, keynotes, and services such as Ethical Hacking (via penetration testing and vulnerability assessments) as well as audit preparedness reviews for frameworks such as ISO 27001 and the ASD/ACSC Essential Eight.Please contact me any time via the contact details on this page.Stay safe out there!Humanity, Not Machinery.DISCLAIMER: I have no business association with any of the companies or products mentioned and am not paid by any of these businesses. Any brands or companies spoken of are for reference purposes only, and may be products I use personally and are my personal preference. Always do your research to work out what is best for your situation.#cybersecurity #infosec #security #tech #ransomware
-
Password managers are essential to help us manage many unique, complex passwords, but are they secure? Have password managers been hacked? How can I secure my password manager? Are there any password managers to be wary of?
Password managers, like most tools, must be used correctly and must be kept up to date like any software. Examples in this episode include the multiple breaches of LastPass, the software flaw in KeePass, the compromise of Norton LifeLock, and the attempt to phish users of 1Password and BitWarden.
Fortunately, with a secure master password and multi-factor authentication enabled, using a password manager is your best bet to manage all of your unique, complex passwords.
Other Videos In This Series:
This Video: https://youtu.be/JQSCbRO1TdY
Password Manager 1: https://youtu.be/UlUBuZ0kDd4
Password Manager 2: https://youtu.be/NoKsW3l_aFc
Password Episode: https://youtu.be/JSzV2LQIr88
Stay safe out there.
#humanitynotmachinery #password #passwords #passwordmanager #nortonlifelock #bitwarden #1password #lastpass #keepass #mfa #multifactorauthentication
-
Zijn er afleveringen die ontbreken?
-
As we move into the final weeks of the year, many of us are attending the obligatory office Christmas parties. In addition to dealing with the same work hierarchies, power dynamics, and office politics with additional stress and alcohol factored in, we may be exposing our employer to additional risks. Do you trust the staff at the venue? What about the other patrons? How about the partners of colleagues? Even people from other parts of the business may see and hear things they have no business being exposed to, and some of your conversations may even be recorded by accident or on purpose.
The busiest day of the year for HR may be the day after the company party, but with a bit of thinking, you can keep it from being the busiest day of the year for your cyber team!
Enjoy, but be mindful of what you share and with whom you're sharing
Stay safe out there.
Video Link: https://youtu.be/XsS74pzVzV4
#humanitynotmachinery #cyberuncensored #cybersecurityuncensored #christmasparty #workparty #workfunction #privacy #confidentiality
-
On November 8, 2023, the entire Optus network crashed, leaving millions of customers and thousands of businesses unable to comminicate or transact on landline, broadband, or mobile services, even impacting emergency services. To some degree, the closure of bank branches and the erosion of in-branch services and a transition to online services and a cashless society contributed to our frustration and presented a real barrier.
In this video, I provide a few tips that we as individuals as well as businesses can use to try and stay connected and transacting during an outage. These few things can help us no matter which carrier goes down. How did you manage during the Optus outage? Do you have any advice you can share?
Stay safe out there.
Video Link: https://youtu.be/xPdWqTq4UwU
#telecommunications #telco #optus #telstra #vodafone #bank #banking #cash
-
While we're all screaming for blood from Optus (well, really just some bloody compensation) we must ask if we're owed anything, and if so, how much? Who should be compensated and who should only get the bare minimum Optus offers, if anything? How do we determine how much to demand in compensation? And knowing this will happen again, what are some things we as individuals and businesses can do to prepare? Please note this is an opinion piece only and I don't have all the answers, but would love to work with you to figure them out. This also does not touch on the fact how emergency services and healthcare and the like was impacted as I feel that would be best addressed by the authorities.
Stay safe out there!
Video Link: https://youtu.be/BEHhUvSyxJQ
#humanitynotmachinery #optus #telco #telecommunications #systemfailure #systemoutage #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Our emotions are weaponised against us. When you are upset and angry, or otherwise stressed, you can be manipulated by cybercriminals into reacting in their favour by clicking links, installing software, and giving away your personal information. The recent Optus outage, followed by the wave of scams seeking to capitalise on your outrage is only the most recent example of how being in am emotional state is used against us. Our education and awareness training for cybersecurity is good, but it lacks a critical element and that's dealing with how humans react and respond to emotional manipulation by cybercriminals. In this video, I provide a few examples and pos a question about how can we improve our security by improving how we train for and react to situations.
Videos on Information, Access, and Control: https://youtube.com/playlist?list=PL4vhlTTyVuauNqKl3BqO5EWn6Dyj2dEZw&si=26XTvcMra4kkUdOO
#emotional #manipulation #anger #reaction #optus #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
The challenge with managing unique, complex passwords for every account is how to remember them. Coupled with a solid password strategy and multi-factor authentication, a solid password manager can make life so much easier, and WAY more secure.
This Video: https://youtu.be/NoKsW3l_aFc
Password Video: https://youtu.be/JSzV2LQIr88
Password Reuse, Overuse, and Abuse Video: https://youtu.be/ZRaD6KNwnOE
Credential Stuffing Video: https://youtu.be/NUTawpZY0qY
#password #passwordmanager #credentials #1password #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
When an attacker inserts themselves into a "private" conversation, they can cause all kinds of mayhem. From overhearing confidential information like financial details and passwords, to "replaying" the information to gain access, to "relaying" the information with modifications or even to another attacker, we must be aware of our surreoundings and connections. We never know who or what is watching and listening. Evesdropping attacks, like relay and replay attacks, are still common, even with encryption, and when combined with sophisticated phishing attacks, skilled attackers can gain access to your confidential communications.
https://youtu.be/qkwai_ScwD0
#relay #replay #evesdropping #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
You have secure, unique, complex passwords and Multi-Factor Authentication enabled. Surely you must be secure! Not so fast! Cybercriminals are evolving and finding ways around our defences and a lot require tricking us using new twists and combinations of old-school attacks. Combining phishing with adversary-in-the-middle techniques, cybercriminals are skilled at tricking us out of our login credentials and even our MFA codes. In this video, we share a bit about how these work and give some tips on what can be done.
Video Link: https://youtu.be/3PnhEyukK88
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Passwords are the keys to our kingdoms, so wy are we so bad at managing them? Excessive use of the same password across accounts opens us up to credential stuffing where one breach can equal everything breached. We use weak passwords that are easily guessable and easily crackable. We share passwords in plain sight on sticky notes, insecure files, and sent via email and text, often together. In this video, I offer up my view of passwords and what we can do to make them secure and manageable.
Video Link: https://youtu.be/JSzV2LQIr88
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
We all do it even though we know we shouldn't! Password reuse can get us into a ton of trouble in a hurry no matter how good the password is. If we use the same password everywhere, from work, school, and home, and on every account we own, a criminal only needs to compromise one account to gain access to every account. Valid credentials, used everywhere by criminals, is Credential Stuffing. In this video, I discuss what password use is, why it's bad, and what you can go to stay safe online.
Video Link: https://youtu.be/ZRaD6KNwnOE
Credential Stuffing Video: https://youtu.be/NUTawpZY0qY
Phishing Video Playlist:https://www.youtube.com/playlist?list=PL4vhlTTyVuavzWRsEvoFNirg8NDf8ogcx
Have I Been Pwned: https://haveibeenpwned.com/
#password #passwords #passwordreuse #passwordabuse #login #credentials #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Merry Scam-mas! The holidays are just around the corner, and so is the inevitable tsunami of criminal activity looking to take advantage of your goodwill, kindness, and generous nature. In reality, criminals are scouring the internet for every bit of information they can to exploit you and your desperation for the perfect holiday. From the must-have hot-ticket items, to the need to travel, to the lonely among us, criminals are looking to exploit us with phishing, spambots, FOMOScamming, and more, hoping to catch you in a moment of weakness. In this episode of Cybersecurity Uncensore, I take a look at some holiday scams, and make you aware these happen year round for any special occasion, and some tips on what to do. Stay safe out there!
Video Link: https://youtu.be/8FKgjzJXuYM
#spambots #fomoscamming #cyberuncensored #humanitynotmachinery #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Do you want exclusive access to Taylor Swift tickets? Sounds like the deal of a lifetime, doesn't it? These things are in high demand, but there are deals to be had! What about some exclusive, insider information of the hottest #cryptocurrency that guarantees a big win and a massive profit from a tiny investment? Maybe some insider advice on #forex on how to earn financial freedom and live the lifestyle you've always dreamed of? How about the opportunity of a lifetime to access the hottest technology just in time for christmas and get the latest toys your kids are craving?
Any and all of these can be scams, and cybercriminals feed off our desperation to gain something ahead of others, be exclusive, and to look goon in front of our peers. Welcome to FOMOScamming!
Video Link: https://youtu.be/X-V7PkIaRQ0
#fomo #fomoscamming #scam #tylorswift #tickets #scalping #exclusive #emotionalengineering #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Spyware is a sneaky way for cybercriminals to get your information by hiding in plain site as part of a "utility" or quietly running in the backgroud. What originally started out with the best of intentions quickly became invasive and a violation of our privacy. Businesses, schools, and parents use forms of spyware under the guide of producitivity, safety, and security but often mishandle the data. Spyware's use is widespread, but poorly understood by those with the best of intentions but the worst of executions.
Video Link: https://youtu.be/96-F3zJY6c0
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Moustrapping is a scam technique once used by sketchy advertisers and now by cybercriminals to for you to stay on theur dodgy website and do as they wish. At one time, it was a means to force you to view ads but now mousetrapping deliberately tries to trick you into clicking on links and downloading malicious software just so you can escape. In this video, I discuss mousetrapping and what we can do if we find ourselves unable to leave a website.
Video Link: https://youtu.be/1wCf6bqiYGs
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud #mousetrapping
-
Typosquatting is the nefarious act of registering domains that are similar to target domains by using deliberate mis-spelling, different domains, manipulated URLs, and appended words. These can range from a nuisence to downright diabolical and seek to profit from, disrupt, or discredit well-known and legitimate domains belonging to businesses and well-known individuals. Motivations and mathods vary, but this is another spiteful way cybercriminals seek to exploit us directly and indirectly leveraging phishing, malware, and holding domain owners to ransom.
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud #typosquatting
-
Ever see loads of unrelated comments on social media posts? Receive tons of unsolicited messages on messaging platforms? See one of your "friends" begin messaging everyone about an amazing deal? Odds are you have encountered a Spambot! Cheap, unsophisticated, and high-volume messaging services designed to push ads to as many people as possible are now being leveraged by cybercriminals to compromise us. In this video, I cover some highlights about spambots, what they are, and what we can do.
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud #spambot #scambot
-
Spamouflage sounds harmless and funny although it is anything but. Large-scale misinformation campaigns run on behalf of foreign (and at times domestic) entities seek to disrupt and divide by interfering in our domestic affairs. Referendums and elections are big targets by this highly-sophisticated, prolific, and pervasive approach that seek to promote their own agenda and tear apart our social fabric of trust and support for one another. Millions of clones and fake accounts mimic a central theme and message while social media companies do little, and can do even less to combat this scourge. Our best defence is becoming informed, spotting the fake narratives and rhetoric, and keeping an eye out for the undercurrents of crime and advanced threat actors.
#spamouflage #spam #foreignintelligence #foreigninterference #espionnage #manipulation #influence #referendum #election #Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud
-
Arbitrary Code Execution is the way an attacker can manipulate your system into executing malicious commands, granting themselves elevated privileges, and extracting sensitive information. Among the more common vulnerabilities in our software and hardware, cybercriminals can inject code via insecure forms, manipulate the program's execution order, and cause it to behave at their will or crash it altogether. Arbitrary (or Remote) Code Execution is a common threat but one few of us understand. In this video, I provide a high level overview of what it is and what we can do about it.
#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud #arbitrarycodeexecution #remotecodeexecution
-
Advanced Persistent Threat (APT) threat actors are highly skilled, highly motivated, and incredibly adaptable threat actors who run clandestine cyber operations, often with the support of nation states. APT groups will often integrate with intelligence operations, and can often operate in the dark... not just the shadows... around the world. This is a very high-level introduction to what APT is and how it operates as a lot is unknown and what is, is not broadly shared.#Cybersecurity #Cybercrime #Phishing #SocialEngineering #Security #Education #Awareness #Hacker #DataBreach #Exploit #Compromise #IncidentManagement #IncidentResponse #Malware #Ransomware #Cryptolocker #Cloudsecurity #Deepfake #VoiceCloning #AI #Hacking #Password #MFA #NetworkSecurity #Privacy #SocialMedia #technology #infosec #ethicalhacking #tech #cyber #hackers #informationsecurity #cyberattack #cybersecurityawareness #datasecurity #dataprotection #hack #it #computerscience #pentesting #informationtechnology #business #cloud #apt
- Laat meer zien