SIGN-UP NOW! Click to become a The VoiceAmerica Talk Member for Free!
voiceamerica-business radio logo
Apple logo Google Play Store Kindle store
Data Security and Privacy with the Privacy Professor

Data Security and Privacy with the Privacy Professor

New shows the first Saturday of each month at 8 AM Pacific

May 8th 2018: Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools

Most think of cybercrooks coming from far-away places through the internet. But what many don’t consider is HOW they got a pathway into our computing devices & networks. Often those pathways were established through direct contact with their victims, and their cyber victims often didn’t even know it at the time. So how can such an obvious and out-in-the-open type of hack be accomplished? Well, if you find a USB thumb drive in a library, in your hotel room, or at a restaurant on the table you were just seated at, what would you do with it? Research studies show that most people will plug them i

Read more
Download PDF DOWNLOAD PDF
Get Code GET CODE

Tune in

New shows the first Saturday of each month at 8 AM Pacific Time on VoiceAmerica Business Channel
LISTEN LIVE
EPISODE ON DEMAND
VIEW HOST PAGE
Questions? Comments?
Call In Live!
Toll Free: 1-866-472-5790
Intl: 001-480-398-3352

Featured Guest

Guest Image

Scott Wright

Scott Wright, President and CEO at Security Perspectives Inc., is a Cyber Security coach and consultant, based in Ottawa, Canada.
Read more

Share This Episode

facebook Share On Facebook
twitter Share On Twitter
Linkedin Share On LinkedIn
Share Email Share this E-mail
https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor 21/03/2024 04:00 21/03/2024 05:00 Data Security and Privacy with the Privacy Professor https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor Most think of cybercrooks coming from far-away places through the internet. But what many don’t consider is HOW they got a pathway into our computing devices & networks. Often those pathways were established through direct contact with their victims, and their cyber victims often didn’t even know it at the time. So how can such an obvious and out-in-the-open type of hack be accomplished? Well, if you find a USB thumb drive in a library, in your hotel room, or at a restaurant on the table you were just seated at, what would you do with it? Research studies show that most people will plug them into their computers. My guest for this episode created the types of studies that Google, and other large tech company researchers, have replicated in recent years for honey sticks and honey pots to replicate cybercrook tactics. Hear the results of these intriguing research studies that look at the methods cybercrooks commonly use to siphon the data from, and control, victim’s computing devices. VoiceAmerica | Talk Radio | Online Talk Radio studio@voiceamerica.com false DD/MM/YYYY Add to Calendar
Email Host Email the Host

Connect with VoiceAmerica

Download our mobile apps
App store Google play Blackberry store
Facebook Twitter Linkedin Social Media
presspass-banner