What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

Cyber insurance
The more you can do to safeguard your company against cyberattacks and employee error, the better you will fare in the coming years. Cyber insurance is still evolving, and as such you can still get good deals even if your cybersecurity is not completely up to snuff. But for those who get in front of the issues facing companies...
homograph
If you are moving fast as we tend to do during the workday, the following four web addresses may not look so different from each other: Google.com Google.сom Googɩe.cоm Ɡoogle.com Google.cоm While some examples are more noticeable than others, in each version of the above URL address one letter or character has been replaced with a letter from non-Latin, or...
Zoombomb
Video conferencing platform Zoom has been crowded with the spread of the Covid-19 pandemic and the adoption of social distancing measures. Criminal cyber activity has grown alongside Zoom’s burgeoning user base. By far the most common issue for those attending virtual meetings is something called “Zoombombing,” where rowdy meeting crashers create chaos during meetings, letting loose a barrage of NSFW...
Marriott Breach
Marriott International announced a data breach that may have exposed the information of 5.2 million guests. Among the information potentially compromised are names, birthdates, mailing addresses, phone numbers, email addresses, and birthdates. This is the second major data breach that Marriott has experienced in recent years; in 2018, the company announced that the information of 327 million customers of subsidiary...
In the latest episode of Third Certainty, Adam Levin explains the danger of voice deepfakes.
Cybersecurity vendor
Businesses across the country have had to adjust to their employees working from home. For many it was a last-minute scramble to adjust to what has become "the new normal" in the face of the coronavirus pandemic. As businesses and their employees settle into what could be for many a span of several weeks or months with a mandatory or recommended work from home...
E-Skimming
Researchers at the cybersecurity firm Sucuri have uncovered a new set of e-skimming attacks targeting websites using the WordPress WooCommerce e-commerce plugin. E-skimming attacks typically use injected code on websites to intercept customer data as it is being entered by customers. This allows hackers to bypass otherwise secure encryption and steal credit card and personal information.  The best-known e-skimming campaigns have...
Email quarantine
The Covid-19 pandemic created an opportunity for hackers to target the newly remote workforce. Hospitals have been targeted by ransomware (despite initial assurances to the contrary), phishing scams are using pandemic-related scare tactics, and video conferencing apps have become the new go-to for everything from domain-spoofing attacks to zoombombing. Even NASA has reported a 100% increase in phishing and...
What the Hack
Two critical zero-day exploits for the Zoom video conferencing platform just hit the market. The alleged exploits take advantage of vulnerabilities in Zoom’s Windows and MacOS applications, allowing hackers to spy on calls, and in some cases, take control of Windows machines. Zero-day exploits are vulnerabilities that are discovered by hackers before they can be identified and patched by software companies,...
A newly released program allows users to create real-time deepfakes on video conferencing platforms including Zoom, and Skype. Avatarify is an open-source program that can instantly transform the appearance of users during a video conference. Its developer, Ali Aliev, unveiled the software earlier this month on Youtube where he swapped his face with the likes of Steve Jobs, Eminem, Albert...