Into the Breach by IBM podcast

Your private information is probably being sold on the dark web. How can criminals use it?

0:00
27:54
15 Sekunden vorwärts
15 Sekunden vorwärts

Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks. Stephanie Caruthers—known online as “Snow,’ is a professional hacker herself and has a solid working theory on how the attacks happened. Stephanie’s take: the criminal may have purchased already stolen credentials of users off the dark web, used that data to research the target victims, and then combine those sources of information to engineer highly targeted attacks.Which raises the question: Is your information out on the dark web, and how can it be used by a criminal?Let’s find out. Join us as we venture, Into the Breach.


Things to listen for:

  • [00:05 - 01:36] Introduction
  • [01:55 - 02:30] The genesis of online name Snow
  • [05:42 - 06:41] Spearfishing vs. social engineering
  • [07:21 - 08:21] What Snow knows about Uber and Rockstar hacks
  • [08:45 - 10:37] Snow's thoughts on TeaPot purchasing credentials from the dark web for who they were targeting
  • [11:04 - 12:20] What Snow looks for to find information from a social media perspective
  • [19:37 - 22:43] Advice on how to avoid being attacked
  • [21:00 - 22:43] How the attacks happened
  • [23:38 - 24:38] For the average citizen: What to do or not to do

Weitere Episoden von „Into the Breach by IBM“