Securing Your Digital Life
As more and more parts of our lives are stored and managed through online accounts, it is critical to understand how to keep those accounts secure. Ian R Buck sits down with Elena Machkasova, computer science professor, to talk about what attackers are after, how they try to gain access, and what we can do to protect ourselves.
0:00 / 1:03:5959.5 MB
Hosts: Ian R Buck
Guests: Elena Machkasova
Fringe episode: tf505
Episode Summary
- 00:00:00 | Intro
- 00:02:32 | Things Attackers Might Be After
-
- Credit card numbers
- Bank accounts
- Ransom
- Data about you (or entire accounts) they can sell
- Accounts with OG usernames
#130 The Snapchat Thief by Reply All from Gimlet Media - Accounts that own valuable stuff
- Impersonating you to other people who trust you
- Adding your devices to a botnet
- Intimidation
- Doxxing
- Swatting
- Eavesdropping, blackmail
Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic - The Verge
- 00:12:02 | Methods of Attack
-
- The Extra Dimension #9: Encryption › The Nexus
- Hackers & Cyber Attacks: Crash Course Computer Science #32 - YouTube
- Social engineering
- Phishing
- Pretexting - call someone at a company and pretend to be from the IT department
- Protocol attacks
- Brute force
- Certificate signing
- Man-in-the-middle attacks
- Data leaks
- Taking advantage of unpatched exploits
- 00:32:26 | Tools to Protect Yourself
- 00:32:35 | Create Strong, Unique Passwords
- 00:38:00 | Use a Password Manager
- 00:43:20 | Two-Factor Authentication
- 00:44:38 | Use Services That Do Security Right
- 00:48:42 | Use Devices That Do Security Right
- 00:49:54 | Consumer Reports Privacy Guide
- 00:50:10 | Have I Been Pwned
- 00:50:29 | Non-Public Recovery Email
- 00:51:03 | 10 Minute Mail
- 00:51:24 | Encrypt Your Storage and Connections
- 00:52:23 | Shred Sensitive Paper Documents
- 00:52:51 | Judicious Use of Browser Extensions
- 00:54:08 | Judicious Use of App Permissions
- 00:54:38 | Judicious Use of Third-Party Integrations
- 00:55:12 | Virus Protection
- 00:56:10 | Recognize Warnings
- 00:56:46 | Don't Dox Yourself
- 00:57:08 | Ad Blocking
- 00:57:40 | Beware Open Wifi
- 00:58:19 | Use a VPN
- 00:59:07 | Put On Political Pressure Regarding Security
- 01:01:01 | Outro