Episode Summary
- 00:00:00 | Intro
- 00:02:32 | Things Attackers Might Be After
-
- Credit card numbers
- Bank accounts
- Ransom
- Data about you (or entire accounts) they can sell
- Accounts with OG usernames
#130 The Snapchat Thief by Reply All from Gimlet Media - Accounts that own valuable stuff
- Impersonating you to other people who trust you
- Adding your devices to a botnet
- Intimidation
- Doxxing
- Swatting
- Eavesdropping, blackmail
Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic - The Verge
- 00:12:02 | Methods of Attack
-
- The Extra Dimension #9: Encryption › The Nexus
- Hackers & Cyber Attacks: Crash Course Computer Science #32 - YouTube
- Social engineering
- Phishing
- Pretexting - call someone at a company and pretend to be from the IT department
- Protocol attacks
- Brute force
- Certificate signing
- Man-in-the-middle attacks
- Data leaks
- Taking advantage of unpatched exploits
- 00:32:26 | Tools to Protect Yourself
- 00:32:35 | Create Strong, Unique Passwords
- 00:38:00 | Use a Password Manager
- 00:43:20 | Two-Factor Authentication
- 00:44:38 | Use Services That Do Security Right
- 00:48:42 | Use Devices That Do Security Right
- 00:49:54 | Consumer Reports Privacy Guide
- 00:50:10 | Have I Been Pwned
- 00:50:29 | Non-Public Recovery Email
- 00:51:03 | 10 Minute Mail
- 00:51:24 | Encrypt Your Storage and Connections
- 00:52:23 | Shred Sensitive Paper Documents
- 00:52:51 | Judicious Use of Browser Extensions
- 00:54:08 | Judicious Use of App Permissions
- 00:54:38 | Judicious Use of Third-Party Integrations
- 00:55:12 | Virus Protection
- 00:56:10 | Recognize Warnings
- 00:56:46 | Don't Dox Yourself
- 00:57:08 | Ad Blocking
- 00:57:40 | Beware Open Wifi
- 00:58:19 | Use a VPN
- 00:59:07 | Put On Political Pressure Regarding Security
- 01:01:01 | Outro