State of Cybercrime

When Hackers Behave Like Ghosts


Listen Later

We’re a month away from Halloween, but when a police detective aptly described a hotel hacker as a ghost, I thought it was a really clever analogy! It’s hard to recreate and retrace an attacker’s steps when there are no fingerprints or evidence of forced entry.

Let’s start with your boarding pass. Before you toss it, make sure you shred it, especially the barcode. It can reveal your frequent flyer number, your name, and other PII. You can even submit the passenger’s information on the airline’s website and learn about any future flights. Anyone with access to your printed boarding pass could do harm and you would never know who your perpetrator would be.

Next, let’s assume you arrive at your destination and the hotel is using a hotel key with a vulnerability. In the past, when hackers reveal a vulnerability, companies step up to fix it. But now, when systems need a fix and a software patch won’t do, how do we scale the fix for millions of hardware on hotel keys?

Other articles discussed:

  • Make metrics and influence people
  • Keylogging with an iphone and android
  • Tool of the week: Gost: Build a local copy of Security Tracker. 

    Panelists: Cindy Ng, Kilian Englert, Forrest Temple, Mike Buckbee

    Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrime

    More from Varonis ⬇️ 

    Visit our website: https://www.varonis.com

    LinkedIn: https://www.linkedin.com/company/varonis

    X/Twitter: https://twitter.com/varonis

    Instagram: https://www.instagram.com/varonislife/

    ...more
    View all episodesView all episodes
    Download on the App Store

    State of CybercrimeBy Varonis, Matt Radolec, David Gibson

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    137 ratings


    More shows like State of Cybercrime

    View all
    WSJ What’s News by The Wall Street Journal

    WSJ What’s News

    4,334 Listeners

    Hacked by Hacked

    Hacked

    181 Listeners

    Malicious Life by Malicious Life

    Malicious Life

    927 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,865 Listeners

    Cyber Security Headlines by CISO Series

    Cyber Security Headlines

    129 Listeners