Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools
May 8, 2018
Hosted by Rebecca Herold
[Download MP3] [itunes] [Bookmark Episode]
Most think of cybercrooks coming from far-away places through the internet. But what many don’t consider is HOW they got a pathway into our computing devices & networks. Often those pathways were established through direct contact with their victims, and their cyber victims often didn’t even know it at the time. So how can such an obvious and out-in-the-open type of hack be accomplished? Well, if you find a USB thumb drive in a library, in your hotel room, or at a restaurant on the table you were just seated at, what would you do with it? Research studies show that most people will plug them into their computers. My guest for this episode created the types of studies that Google, and other large tech company researchers, have replicated in recent years for honey sticks and honey pots to replicate cybercrook tactics. Hear the results of these intriguing research studies that look at the methods cybercrooks commonly use to siphon the data from, and control, victim’s computing devices.
Data Security and Privacy with the Privacy Professor
New shows the first Saturday of each month at 8 AM Pacific Time on VoiceAmerica Business Channel
There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.
Rebecca has 25-plus years of systems engineering, information security, privacy and compliance experience, is CEO of The Privacy Professor(R) consultancy she founded in 2004, and Co-Founder/CEO of Privacy Security Brainiacs online services, where Rebecca engineered the systems and created all the content, including automated risk assessments and training courses. Rebecca has authored 20 books, contributed to dozens of other books, and published hundreds of articles. Rebecca led the NIST Smart Grid Privacy Subgroup for 7 years, a member of the NIST Privacy Framework development team, and is a NIST Cybersecurity for IoT Program team member. Rebecca has provided expert witness services for HIPAA compliance, IoT security, privacy and location tracking, retirement community members’ personal data misuse, and other cases. Rebecca was co-founder and officer of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group, and is on numerous advisory boards. Rebecca was Adjunct Professor for the Norwich University MSISA program for 9 years. Rebecca has received numerous awards, including named as a Top 100 Women Fighting Cybercrime and a Cybersecurity Woman of the Year. Rebecca has provided keynotes on 5 continents and is frequently interviewed on TV and in international publications. Rebecca holds the following certifications: FIP, CDPSE, CISSP, CISA, CISM, CIPT, CIPM, CIPP/US, FLMI. Ponemon Privacy Fellow. Rebecca is based in Des Moines, Iowa, USA.