4.9 • 696 Ratings
🗓️ 28 February 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, February 28, 2023 edition of the Sands and its Storms, Stormcast. |
0:09.5 | My name is Johannes Ulrich and today I am recording from Jacksonville, Florida. |
0:16.1 | Quick diary today by Xavier. |
0:19.0 | Xavier came across a zip file that contained lots and lots of |
0:24.8 | phishing pages, essentially HTML pages, ready to go in order to impersonate many important |
0:32.6 | brands and then submit credentials to a collection site. He mentioned that not all of the collection sites were actually still valid or completely |
0:41.3 | configured, but this is sort of the kind of fishing kit that someone would then use in order |
0:48.4 | to quickly create multiple lookalike sites. |
0:53.2 | And a full list of impersonated brands can be found in the diary that Xavier wrote. |
1:00.8 | And the Wall Street Journal had an article that was heavily quoted and reposted about some |
1:07.7 | thefts that apparently are first observing the victim entering a pin or other |
1:14.4 | a password into a mobile device to unlock it, and then later after they observed the victim, |
1:20.6 | they will then steal the device, of course, giving them full access to the device. |
1:25.6 | Well, aside of all the commentary out here, I think one of the big stories here is also |
1:31.5 | that your mobile device often is essentially the gateway to your digital life. |
1:38.5 | So if an attacker does obtain access to your device, they often have access to all of your documents, financial accounts, and more even identity |
1:50.4 | documents and the like. |
1:52.3 | While these cases still are somewhat rare, it's something that you may want to think about |
1:58.4 | if you, for example, completely rely on cloud storage for all of your |
2:03.2 | personal information, maybe having an on-premise copy of some of the more important data, |
2:10.8 | also being able to quickly change things like passwords for banking accounts, maybe something to consider here as a backup, |
2:20.3 | as it's probably not really possible to perfectly secure a mobile device that you keep carrying around with you. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.