Комментарии:
First
ОтветитьExcellent essay, Frost
ОтветитьFrost and his gang of Nice-Cubes are such a wonderful way to illustrate the video topics.
ОтветитьHumans are frequently the weakest link in the chain. Social engineering has been around for thousands of years, in different names and forms. But ultimately, running a con on the human operator is more reliable and often safer and easier than trying to pick or break a lock, hack a program or server, etc. It's so endemic that I'd say it's equal to that saying about data - there are two kinds of people, those that have fallen for a con and those that will.
Ответитьturbogigachad
ОтветитьSomeone let this man cook again!!!!
Ответитьfucking appaling to lock up an autistic teenager without trial. no matter what hes done thats against any standard of equality that the us pretends to maintain
not to mention that hes a minor
❤️🕹️👾🎮❤️
ОтветитьThe cyberpunk future is way less cool than Mike Pondsmith made it look like it would be
ОтветитьHow many times would you have to get the prompt "is this you? " busy to day yes?
ОтветитьImagine not downloading a car if given the opportunity.
Ответитьdespite the damage he caused, i feel bad for the situation Kurtaj ended up in. as far as i can tell, he basically has an indefinite sentence because he got the better of a corporation. maybe im missing details but it doesnt seem right
Ответитьi love LOVE this guy is just like young Morgan Freeman.
LIKE VERY UNCANNY
I like this series, looking forward for future episodes
ОтветитьTbh all of pop culture has made it really weird to hear about hackers holding megacorps to ransom and them not being the good guys. Not that they're good, but the megacorps are worse.
ОтветитьGenuine question. GTA V came out in 2013, what's the harm of the source code being released 9 years later? I don't mean what are the ethical issues and I'm not saying anyone had the right to distribute code that doesn't belong to them. I just wonder why Rockstar wouldn't want it out there if it's been so long since it came out?
ОтветитьI’m certain that he’s not wasting his hacking potential inside a mental hospital for the rest of his life, no he’s serving an unofficial indefinite life sentence working for the FBI’s cybercrime unit. He’s the modern day equivalent of a Tony Stark building a miniaturised Ark Reactor in a cave, with box of scraps. Why would Government allow such gifted potential to be wasted when they can exploit it & make him disappear when they’re done..
Just like every other famous hacker that got past a very very advanced security system’s the FBI doesn’t like to waste potential talent so they make them disappear from the public eye so that they are ever failed to do their jobs, outlived their usefulness & or would have accumulated soo much sensitive data throughout their time serving the Government to the point where they become way too dangerous to be left alive & quietly silenced & buried in an unmarked grave..
They shared photos of him fishing or phishing?
Ответитьif you throw enough balls at enough coconuts eventually you win a fish.
Ответитьthe irony of charging the guy with severe autism when his main hacking tool is social engineering
Ответитьhacker "please let me in" Rockstar "no!" hacker "please let me in times 1000" Rockstar "oh I can't be arsed with this fine" is how I will always remember this drama now
ОтветитьNext time a family member complains they got hacked I'm showing them this video. I love them but they just don't listen!
ОтветитьYea uh no I dont think the autism made him do that.
The violent tendencies and his desire to do bad things made him do that.
I'm still looking for the link to download a car.
ОтветитьJust go to the bank and knock on the vault door for a couple hours. Eventually someone will let you in
ОтветитьHonestly, if he didn't release people's personal info, then I would applaud his efforts and ingenuity.
ОтветитьThe correct is data, if you are british, and data, if you are american.
Ответитьmost ... corporate espionage? (not quite what i mean but its late and i cant remember the actual term)
is caused by someone exploiting a physical fault in security
a common one that security testers use is cold calling people at the company and seeing if they can get the info for where they eat lunch
if its outside of the company then more than likely they have a card that can be read on them then all it takes is sitting in that lunch location and just cloning card signals
this is a commonly known method and basically the first one anyone tries so most companies that use card locking systems know about it and have training for it in place
"Indefinite hospital order due to severe autism, violent tendencies, and cyber crime"
Maybe there's legitimate reasoning for this, but it sounds like just "we can't put him in a prison so we're gonna make up a way to lock him away forever"
I love this series
ОтветитьI think the idea that age is a huge factor in understanding how these systems work is a bit of an illusion.
It’s much easier to get access to a companies slack and steal some data than it is to actually pull off converting that stolen data into cash. The group of people reckless enough to try and bridge that gap is almost entirely comprised of teenagers and professional criminals. The pros don’t do high profile hacks so you only really hear about the teenagers in most media(with occasional cameos from Russian and NK state actors).
If you look at security researchers and pen testers though the high level ones tend to skew towards the typical mid-career 20-40 age bracket just like most technical fields.
Fun fact: Gen Z is apparently less tech literate than Baby Boomers ON AVERAGE since they grew up with all this "Just Working" at least/especially when it comes to scams. However, this has ALSO led to "hyper-tech-literate" people like this hacker. Where they just naturally get it all so well that even the best current security experts can only reconstruct what they did after the fact. This arms race will only continue, and like every evolutionary arms race, my money is on the attackers long term
ОтветитьGa min, g
ОтветитьThe idea of a fatigue attack working is baffling to me. If your 2FA keeps going off because someone is using your password, how is anyone's reaction to confirm the login rather than to change their password?
ОтветитьSo does no one just think to go to the original site link not through email and double check your password and 2FA?
Ответитьa fun fact about that old anti piracy ad; they didnt actually have permission from the copyright holder to use the music in it
Ответитьif you say data like that again imma stage a coup d'état
ОтветитьI got 2FA spammed once, so I changed my password and voila, it stopped. I have no idea why anyone wouldn’t just do that
ОтветитьIronically, that "Piracy is a crime" clip (advert? PSA? I just recall it being on every DVD for several years) actually pirated the music that they used
ОтветитьHonestly, this should be added to cybersecurity curriculums as a real-world example of why social engineering awareness is the most important part of your defense.
ОтветитьUntil we start handing out ACTUAL punishments for cyber crimes things will only get worse for all law abiding citizens.
ОтветитьI really liked stuff of legends and im glad frost can still tell me bedtime stories😊
ОтветитьSo disappointed that the ad at the end wasn’t a vpn
Ответить...if you're getting repeated 2fa messages change your password
Yeesh
Didn't the person in question get put in a psych ward for this? (Or something along those lines)
ОтветитьOne of the silly ones at work, a non-techie (I won't call him a luddite) was listening to spotify, clicked somewhere and got a rogue pop-up leading to his computer getting infected. Every single person in our company needs to use a computer, and fortunately we re-install Windows all the time, so it was a scolding, but I don't think people realize how a small intrusion on one system, combined with bugs, insecure credentials, and lack of permissions discipline, can lead to so, so much more damage.
ОтветитьUh... any more of these coming down the pipe anytime soon?
Ответитьwhy did you stop doing these?
Ответить