Episode Summary
00:00:00 | Intro
00:02:32 | Things Attackers Might Be After
Credit card numbersBank accountsRansomData about you (or entire accounts) they can sellAccounts with OG usernames
#130 The Snapchat Thief by Reply All from Gimlet Media
Accounts that own valuable stuffImpersonating you to other people who trust youAdding your devices to a botnetIntimidationDoxxingSwattingEavesdropping, blackmail
Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic - The Verge
00:12:02 | Methods of Attack
The Extra Dimension #9: Encryption › The NexusHackers & Cyber Attacks: Crash Course Computer Science #32 - YouTubeSocial engineeringPhishingPretexting - call someone at a company and pretend to be from the IT departmentProtocol attacksBrute forceCertificate signingMan-in-the-middle attacksData leaksTaking advantage of unpatched exploits00:32:26 | Tools to Protect Yourself
Security Checklist00:32:35 | Create Strong, Unique Passwords
00:38:00 | Use a Password Manager
No boundaries for user identities: Web trackers exploit browser login managersSecond Opinion #54: Password Managers Roundup00:43:20 | Two-Factor Authentication
Password breach teaches Reddit that, yes, phone-based 2FA is that bad | Ars Technica00:44:38 | Use Services That Do Security Right
Google's 'Advanced Protection' Locks Down Accounts Like Never Before | WIRED00:48:42 | Use Devices That Do Security Right
Security Economics of the Internet of Things - Schneier on Security00:49:54 | Consumer Reports Privacy Guide
66 Ways to Protect Your Privacy Right Now - Consumer Reports00:50:10 | Have I Been Pwned
Have I Been Pwned00:50:29 | Non-Public Recovery Email
00:51:03 | 10 Minute Mail
10 Minute Mail - Temporary E-Mail00:51:24 | Encrypt Your Storage and Connections
The Extra Dimension #9: Encryption › The Nexus00:52:23 | Shred Sensitive Paper Documents
00:52:51 | Judicious Use of Browser Extensions
“Stylish” extension with 2M downloads banned for tracking every site visit | Ars Technica00:54:08 | Judicious Use of App Permissions
00:54:38 | Judicious Use of Third-Party Integrations
00:55:12 | Virus Protection
00:56:10 | Recognize Warnings
00:56:46 | Don't Dox Yourself
00:57:08 | Ad Blocking
The Extra Dimension #11: The Complex World of Ad Blocking › The Nexus00:57:40 | Beware Open Wifi
00:58:19 | Use a VPN
00:59:07 | Put On Political Pressure Regarding Security
The need for a Digital Geneva Convention - Microsoft on the IssuesFive-Eyes Intelligence Services Choose Surveillance Over Security - Schneier on Security01:01:01 | Outro
Connect With The Nexus
Discuss this episode on our Subreddit
Support us on PatreonAttributions
Kevin MacLeod [Official] - Inspired - incompetech.com - YouTubeCopyright
The Extra Dimension is released under a Creative Commons — Attribution 4.0 International license. Feel free to use any or all of it as long as you link back to http://thenexus.tv/ted38/.