Danny Hutson

100 thoughts on “James Lyne: Everyday cybercrime — and what you can do about it

  1. The more someone knows about you, the higher is the risk of identity stealing. Search for keywords: 'Frank Abagnale Guardian', you'll find interesting interview regarding modern techniques of identity stealing.

  2. identity stealing is not a problem of having too much personal information publicly available, it's a security problem of the organizations that are targeted. if security was proper (IE if you need some password that only you know (or better a dual authentication with something you know (password) and something you have (a card)) to access any of the things that identity thieves manage to access.) no amount of personal info could get you access to a persons unique rights.

  3. … my family IE knows a lot about me, yet they cannot access my bank account with that info. the same level of security should be for all other services that allow one to steal from another.

  4. Hmmm, that's not always so straight. Quite often Identity Thieves use different modus operandi and they (for example) can use all your personal data gathered to fool your contacts, pretending to be you and begging for urgent financial assistance. The more they know about you, the more plausible can they make 'the legend', the more productive can be the scheme. Do not underestimate them, there are enough assholes out there, knowing their methods will only make your life safer…

  5. Hey there, there is a follow on ebook coming with more of these details. The talk was supposed to raise awareness and get those who normally ignore the topic to care. It would have been nice if they were released in closer proximity but unfortunately worked out that way. I'll drop you a reply with the link shortly ๐Ÿ™‚

  6. Thank you, really glad you enjoyed it. We need to build up more discussion in this area as it is starting to affect our society more and more.

  7. so this was really just an advertising for the ebook and the title saying 'what you can do about it' is buy the book. The true title is 'New and Exciting Information About Cybercrime!

  8. I very easily get over 3500 dollars every month just by responding to basic questionnaires at home.
    This site shows every detail how EARN88.COM

    I never desire to converse with a man who has written more than he has read.

  9. I find it Ironic that this bot found it appropriate to post that comment on a video titled "James Lyne: Everyday cybercrime — and what you can do about it"

  10. I'm hoping they did, and the laughter just isn't audible for some reason. I'd hate to think this good a talk was wasted on a deadpan audience!

  11. I don't think we should ever put our phone numbers on the Internet! Ever! They can lead to our addresses, that's just too scary! ๐Ÿ™ Youtube, facebook, etc, use to give security excuses to ask for our personal numbers, and that's is just wrong!!! ๐Ÿ™ I feel terrible because of this…I wish they didn't ask for phone numbers like never!!! Too personal and private!! Just improve the codes for security, no need for personal stuff, too dangerous!!! >:(

  12. Hey there, let me clarify. The device in question LOOKS like a USB key but is actually a small programmable keyboard. The idea is to bypass exactly the control you describe. The device plugs in and then types out the malicious payload rather than running it as a file. This means it can run on a system even where autorun is disabled. There are a few of these devices but they don't cost much to make or acquire. Hope that makes more sense now ๐Ÿ™‚

  13. I didn't, but that would have been a fine way to produce it! I used the old Rubber Ducky and a text file payload I put together for a test. I love the SE Toolkit, awesome awesome work by WhiteHat Sec.

  14. The basics are just not be a dummy on the net download anti virus anti spyware update ur comp stay away from sketchy things

  15. Wouldn't always work. We use Lumension to lock down USB ports which block this. However, I have heard the Rubber Ducky people are close to by-passing the likes of Lumension now.

  16. I'm an IT engineer, just discovered James today on TED. Really good talk because it's nice and easy for none tech people to understand. Also liked the point about phones, ipads, Androids etc giving away previously connected WIFI APs when they are scanning. You didn't seem to take this further though? I assume time reasons. Explaining that people can then setup a fake AP with the same name, so if you're in the area, you're connect to the rough AP rather than the genuine one.

  17. cyber crime in Chennai is a fast growing crime involving cell phone malware as welll an organized syndicate known as gangstalking

  18. Scare tactics don't impress me much. Instead of becoming a cyber criminal to find information about people, why don't you just go to the yellow pages or white pages and search using the person's name? You can find out a person's phone number and their address in all of 5 minutes. You can pay to have anyone's social security number for only $10. Why spend years of your life learning to do this when you can just spend $10? You can find out anything on anyone. So What?!? This has always been the case and always will be, yet the earth keeps on spinning and we keep using the internet.

  19. Very good presentation! It was delivered with humor, but yet the seriousness of the issues facing us all in protecting our data was heard loud and clear. I am sharing the link to this with many family members who don't quite understand the seriousness behind logical protection.

  20. This stuff is scary, because we do not know what will come next. I am so glad that I have my computer secured due to being a victim of cyber thief, I thought my computer was protected because I decided to get top virus protection, however I was unaware that virus protection was not enough and I needed a keylogger blocker, it stops HACKERS find out more about it here and how to protect yourself.ย  www.cyberwealth7.com/mistyire

  21. Kind of awkward when he's making all of these jokes with no reaction. I found myself sharply exhaling through my nose. Great talk.

  22. 2:53 Noooooowwwww I understand why naming my old router's SSID as "Virus Test Bed" didn't deter the hacker who hacked me less than 24 hours after naming it… I guess I don't do 'geek' very well! =(

  23. Tremenda conferencia; muy informativa, practica y aterrizada en la actualidad del cibercrimen; gracias TED!!

  24. I hate "scareware" or fake privacy protection. For me, it's just plain annoying. I will never install something that pops up and I just have to kill the program since it won't close.

  25. my name is James Peter Aviles ive been trying to get a hold of some to help me and i see u know all about these thiings i dont my girlfriend n her family has hacked my smartphone n more need help write back

  26. oh my god… setting those thing is really really easy… just have to portfowarding something and then use terminal to steal the file… but believe me… auto.run won't work on linux so we can't do that on linux

  27. Great video .. but i have a small question my WiFi is hidden and on 1/1/2017 i used fing app for iPhone its scan my network and show to me how many devices are connected to the my network i found stranger device called ( Hon Hai Precision ) first seen in 1/1/2017 ) and after i search about the mac address and the name (Hon Hai Precision ) its device made by foxconncom but i donot have this device i just have 2 persons in my wifi used it with me but hon hai is stranger i donot know how this devices connected to my WiFi and my frinds said they never gives the password to any one according many sites this company mad some parts of device like iPad WiFi prat and many parts to some company like HP and Samsung , blackberry , xbox , etc but i donot have Xbox or any device contain parts mad by foxconncom also my frinds or you can call say there are my brothers to be clear with you . after 10 hours i found the next device i added it to the black list then i found 2 android devices stranger ! also added to black list then changed the WiFi name and password also my frinds swears to me they never shared my WiFi detail's i think there are honest but i disconnected them from my WiFi but when i search on the internet i found this problem happen with many people by the sam name and company im a fried because they may spy on me long time ago but there is something happen when i try to add them to the black list router added them and kicked me out i try to login again but i cannot until i restart my computer also when i added the device to black list the internet disconnected from me to and com again when i restart my computer so i think this parts from my laptop HP ? and my brothers are honest please i want any expert tell me and im sorry for my bad English i hop you understand me my router is huawei hg532n please i need any expert tell me what is that and why when i try to add the device to black list mac filtering the internet disconnected from and come again after restart my lap top and now after i changed the name of WiFi and password i donot see any new devices just me and my phone , tablet only

  28. I think you are confused about the legal position for restricted UEFI control by microsoft.

    Microsoft is not an independent regulator and therefore attempting to
    use its market position to gain a private monopoly or carlet with
    intependent hardware suppliers. This is illegal in the EU and until the
    regulator has yet to make a ruling it is not known to be in the US.

    It is a national security issue for all nation states using microsoft
    that the US has control over software within another soveign state.

    Microsoft could be broken up shortly what would you do if a chinease
    state company bought the software and threaten your national security
    globally ?

    Consolidation of a nation state on one software type will mean cyber
    activity will become more effective against that nation.

    Monoploy by one vendor holds back innovation to keep cyber crime at
    bay…it has been likened to dropping a atomic weapon on the US homeland
    y ISIS.

    Diversity is the best defense against attack.

    Every man women and child pays financially for this….The UK has
    already put in motion to partition the EU authorities who are still
    wagging a finger at microsoft after the internet explorer case which
    essentially tried top do the same thing.

  29. He has a lot of good information. It's scary to think that anyone can get the information he got from the audience. Following the security measures will help keep data safe.

  30. There is big issue that most physical infrastructure/fiber cables and ac power for example is NOT secured even with a padlock, just manhole cover…

  31. It's serious thing that cyber crime is increasing! Today Bit coin is rapidly emerging. There is a crime that handle this coin.

  32. Savetheworldfree was hacked by a New York banker Fbi are on it! lol They are lucky they had a VPS with SaveNatureFree.org

  33. Sometimes reality is stranger than fiction.
    The science fiction book Nineteen Eighty-Four, often published as 1984, tell the story about an omnipresent government surveillance. The movie Terminator is a 1984 American science-fiction action film post-apocalyptic future with cyborg assassins skynet/AI-artificial intelligence is alive. The movie Matrix a dystopian future in which reality as perceived by most humans is actually a simulated reality called "the Matrix".

  34. To personalise PIN and password all banks have to do to is provide us smart key size thumbprint activated memory stick with PIN stored on it. Call this electronic complex alpha numeric pin EPIN which if we wish will change to new value after each transaction. Personalised EPIN will be activated at retail outlets, ATMs and even online as password using contactless technology. Along with combating card fraud and cybercrime this system will make data breaches, use of skimmed cards with micro-cameras and hacking meaningless because PIN and passwords are isolated from computer thus making it impossible for the criminals to pick them. Would personalised password not stop cybercrime?

  35. Ido realize how late in sending this but can someone tell me how he made that usb hacking prank work and what application did he use. Thanks

  36. I really don't think his suggestions are going to be implemented , I m very interested on what the same audience's statistics would look like in the next talk.

Leave a Reply

Your email address will not be published. Required fields are marked *