Headlines

In Memoriam: Honoring the Visionaries of the Crypto Revolution

In Memoriam: Honoring the Visionaries of the Crypto Revolutioncryptorevolution,visionaries,honoring,memoriam

S3 Ep148: Remembering Crypto Heroes

Introduction

In the latest episode of the Naked Security podcast, hosts Doug Aamoth and Paul Ducklin discuss various topics including the use of Native American languages in military cryptography, FBI warnings about mobile beta-testing scams, ATM card skimming, and the takedown of a bulletproof hosting service used by ransomware attackers. This episode explores the intersection of technology, crime, and security.

The use of Native American languages in military cryptography

The podcast hosts begin their discussion by highlighting the historical significance of Native American code talkers during World War II. They explain how the Navajo Nation utilized their language in coded form to help speed up the Allied victory. The use of Navajo language as a cleartext code was effective in confusing the enemy, as it had not been widely studied by anyone in Europe or Japan. The hosts emphasize the bravery and skill of these individuals who were not only skilled code operators but also US Marines.

FBI warnings about mobile beta-testing scams

The hosts then turn their attention to the FBI’s warning about scams that lure people in as mobile beta-testers. They discuss the tactics used by scammers, particularly targeting iPhone users who may feel a false sense of security due to the App Store’s strict app review process. The discussion delves into the techniques used by scammers, such as pretending to be part of a new company or exclusive beta-testing program. The hosts caution listeners to be vigilant and avoid falling for these scams, emphasizing the importance of downloading apps only from trusted sources.

ATM card skimming

The podcast hosts discuss the ongoing issue of ATM card skimming, where criminals attach devices to ATM machines to steal card information and PIN numbers. They highlight the challenges of detecting skimming devices, as they can be cleverly concealed or appear as legitimate parts of the ATM. The hosts provide advice on how to protect oneself, such as checking for any suspicious attachments and shielding the PIN while entering it. They also mention the shift towards chip-and-PIN technology, which has reduced the prevalence of card skimming.

Takedown of a bulletproof hosting service used by ransomware attackers

The hosts discuss the recent takedown of a bulletproof hosting service, lolekhosted.net, which was used by the NetWalker ransomware gang to carry out attacks, particularly targeting hospitals during the COVID-19 pandemic. While the main suspect behind the hosting service remains at large, the takedown demonstrates the efforts made by law enforcement agencies to combat cybercrime. The hosts highlight the importance of cooperation between law enforcement and financial institutions in identifying and shutting down criminal operations.

Editorial and Advice

Cybercrime and the challenges of law enforcement

The discussion of various cybercrime incidents highlights the complexities and challenges faced by law enforcement agencies in combating cybercriminals. The hosts address a listener’s comment about the time it takes to apprehend criminals and emphasize that the illegal nature of these operations makes them difficult to tackle. They stress the importance of support from the public, cooperation between law enforcement and financial institutions, and continuous efforts to improve cybersecurity measures.

Protecting oneself from cyber threats

Throughout the podcast, the hosts provide practical advice on protecting oneself from cyber threats. They emphasize the significance of being aware of one’s surroundings while using ATMs and avoiding suspicious attachments or requests for personal information. They also urge listeners to only download apps from trusted sources and be cautious of requests to join exclusive beta-testing programs.

Emerging technologies and cybersecurity

The podcast’s discussion highlights the ongoing challenge of adapting cybersecurity measures to emerging technologies. The hosts warn about the vulnerabilities associated with new and untested technologies, such as mobile beta-testing apps. They stress the importance of staying updated on the latest security practices and being cautious when adopting new technologies.

Conclusion

The latest episode of the Naked Security podcast explores the intersection of technology, crime, and cybersecurity. Through discussions on Native American code talkers, mobile beta-testing scams, ATM card skimming, and the takedown of a bulletproof hosting service, the hosts highlight the challenges faced by individuals, law enforcement agencies, and financial institutions in protecting against cyber threats. The episode serves as a reminder of the ongoing need for awareness, vigilance, and cooperation in the face of evolving cybersecurity risks.

Innovation-cryptorevolution,visionaries,honoring,memoriam


In Memoriam: Honoring the Visionaries of the Crypto Revolution
<< photo by Pixabay >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !