How Hackers Get Into Computers, Baby Monitors, Appliances and Everything ElseSubmitted by Reby Advisors | Certified Financial Planners | Danbury, CT on November 15th, 2018
Presented by Adam Levin, November 16, 2018
As you know, everything is online these days. Daycare centers and schools stream video so that parents can check in on their kids from their phones. Cameras on the inside of refrigerators make it easy to check which groceries we need, even if we're already at the store. And we can log in any time to check our finances.
All of this technology adds convenience, but it also presents opportunities for hackers. In this video, cybersecurity specialist Mark Levin shares a story about a "grey hat hacker" friend of his who used his knowledge of his neighbor's fondness of cats to gain access to the financial records of a multinational oil corporation.
Any piece of information that a cyber criminal has on us can be used against us if we're not careful. The damage may manifest itself in unexpected ways because this new wave of criminals can be highly creative and resourceful.
The video above is a short clip from an event we recently hosted. To watch the full presentation, follow this link here: www.rebyadvisors.com/live-events-videos
If you have any questions, call us at (203) 790-4949.
For instance, a friend of mine is a gray hat hacker. He lives in Switzerland and he wanted to prove a point and he knew there was a woman who lived on a street that was a cat lover. He also knew that her husband was the CFO of a multinational oil company and he also knew the husband worked a lot at home. How he found out all of this, nobody knows, but gossip, neighborhood stuff, whatever.
So he sends lots of pictures of cats and and finally said, you know, click on this picture of my cat, it's so cute. Look at my cat. Does silly cat tricks. So she clicked on the link, had no idea that he has just inserted malware into her computer, into her home network, and that malware worked its way in and when her husband logged in in order to log into his company, that malware followed him right in and he gained access to all the financial records of this multinational oil company.
And then he sent a note to the husband going want your financial records back? Now, he didn't do anything with it, but it was one of those awkward conversations.
So here are the rules of the road and this is based on, I wrote a book called Swiped, which I know a number of you have taken. They're available for you free. And the great news is you don't have to take a note about anything tonight. It's in the book. I am happy to inscribe any book that anyone wants to inscribe and we'll have some fun with that tonight.
But it's, we talk about when I call the three Ms. It would be great to believe that we can prevent identity theft.
And there were some companies that used to float around out there, they still do, and they were in the past promising we can prevent identity theft. They can't, this is not preventable and that's because people will be people because you are dealing with highly sophisticated, very intelligent, persistent hackers and they are incredibly creative.
And remember, for them there is a pot of gold at the end of every rainbow, just like you don't think your Social Security Number's important. You think you don't have great credit. I had one fellow we worked with who said, you know what, I didn't have such great credit, but the guy that stole my identity has great credit. I'm going to stick with him.
But instead of saying I'm going to prevent it, you know, this is one of those things were faced with reality. Reality is that we are exposed because we are surrounded by billions. That's Dr. Evil Pinky to the lips B billions of internet of things devices. And those devices are televisions, computers, baby monitors, HVAC systems, security systems, printers. The list goes on and on and on. Coffee pots, refrigerators.
If your refrigerators starts looking at you strangely be careful, but the truth is that which gives us the convenience of being in the supermarket and be able to look into our refrigerator to see what we don't have so that we know what to get is the same thing that allows a hacker to basically crawl into our lives and then do what they will, whether they're compromising email or they're attempting to steal some other kinds of information.