CyberSecurity PodCast - Issues in the industry - With Daniel Ellebæk

Security in mind
30 Jul 202410:14

Summary

TLDRIn this video, the speaker addresses the prevalent issue of hardware hacking and the security vulnerabilities within various industries. They discuss the common oversights such as improperly configured Wi-Fi routers and wireless devices susceptible to attacks like mouse jacking. The speaker emphasizes the need for better security practices, lamenting the focus on speed and cost-cutting over secure implementations. They express frustration with the lack of attention given to security experts' advice within companies and advocate for more investment in security measures. The video also touches on the challenges of educating employees about security and the ineffectiveness of some security training programs, urging a more professional approach to security within business plans.

Takeaways

  • 💻 The speaker discusses the importance of hardware hacking and security in the tech industry.
  • 🔒 System administrators are often good at their jobs, but the real issues lie in human error and improperly configured devices.
  • 🐭 The example of a vulnerable wireless mouse highlights how simple devices can pose significant security risks.
  • 🏢 Industries sometimes prioritize speed and cost-saving over security when implementing new hardware devices.
  • 👨‍🎓 There's a societal trend where young people aim for high salaries and titles rather than focusing on doing their jobs well, which can affect security.
  • 💡 The speaker emphasizes the need for better security practices and investment, despite the common mindset of 'it won't happen to us'.
  • 📚 Education on security is crucial, and the speaker hopes it will be taken more seriously in business plans.
  • 💼 Security is foundational to business operations; without it, there's no business to protect.
  • 📈 Budgeting for security is challenging, and companies often struggle to allocate resources effectively.
  • 📊 The speaker criticizes the use of gamified educational programs for security training, arguing they are ineffective.
  • 🗣️ The speaker calls for more listening to security experts and implementing their recommendations to prevent attacks like ransomware.

Q & A

  • What is the main focus of the video?

    -The video focuses on hardware hacking devices and the challenges in maintaining security within the industry. It discusses common security vulnerabilities, human errors, and the need for better security practices in companies.

  • What are some examples of hardware devices mentioned that can pose security risks?

    -Examples of hardware devices mentioned include Wi-Fi routers, wireless mice (specifically the Logitech M85), and various IoT devices. These devices, when improperly configured or outdated, can introduce vulnerabilities.

  • Why does the speaker emphasize the importance of configuring hardware correctly?

    -The speaker stresses that improperly configured devices can introduce significant security risks. They note that organizations often implement new devices quickly without considering the security implications, which can lead to vulnerabilities.

  • What are the main human errors highlighted in the video?

    -The speaker highlights human errors such as failing to update devices, neglecting security practices, and underestimating the importance of educating employees about cybersecurity. These errors can leave a company vulnerable to attacks.

  • Why do many companies fail to take security seriously, according to the speaker?

    -The speaker believes that companies prioritize saving money and completing tasks quickly over implementing proper security measures. They often focus on speed and cost-efficiency rather than ensuring secure practices.

  • What are mouse jacking attacks, and why does the speaker warn about them?

    -Mouse jacking attacks exploit vulnerabilities in wireless mice, allowing hackers to inject keystrokes or commands into the connected device. The speaker warns about them because devices like the Logitech M85 are highly susceptible to these attacks.

  • How does the speaker view the current state of security awareness in companies?

    -The speaker believes that many companies do not take security awareness seriously. Employees often dismiss security recommendations, and companies may invest in ineffective security training programs that do little to improve the overall security posture.

  • What is the speaker's stance on external security consultants and programs?

    -The speaker is critical of external security consultants and educational programs that rely on gamified or simplified training modules, arguing that these methods are ineffective. They suggest that companies should focus on more practical and in-depth security education.

  • Why does the speaker think it's important to invest more in security?

    -The speaker believes that companies should invest more in security because without proper protection, they risk exposing their business to attacks such as ransomware. Investing in security is crucial for protecting the core operations of the business.

  • What solution does the speaker offer for improving security practices in companies?

    -The speaker suggests that companies should allocate more resources to internal security experts and allow them to take a more active role in educating employees and securing the infrastructure. They also mention the importance of using proper tools like the Flipper Zero or CrazyRadio for testing vulnerabilities.

Outlines

00:00

💻 Hardware Hacking and Security Concerns

The speaker begins by discussing the topic of hardware hacking and the various devices that can be exploited. They mention their previous videos on the subject and emphasize the importance of security in the industry. The speaker points out that while system administrators are often competent, the real issues arise from new devices being improperly implemented and human error. They give an example of a vulnerable wireless mouse and discuss how such devices can be exploited. The speaker also touches on societal issues, such as the lack of attention to detail and the desire for quick results over secure practices, which can lead to security vulnerabilities.

05:03

📢 The Neglect of Security in Companies

In the second paragraph, the speaker shares their personal experiences working in a company where security concerns are often overlooked. They express frustration that their advice is not taken seriously, and that同事们 often dismiss the potential threats. The speaker recounts a ransomware attack on a school and how having a backup infrastructure saved them. They stress the importance of security being an integral part of business operations and the need for companies to prioritize it in their budgets. The speaker also criticizes the use of ineffective security training programs and suggests that companies should instead invest in proper education and awareness. They conclude by encouraging viewers to engage in a dialogue about security and to subscribe to the channel for more content.

Mindmap

Keywords

💡Hacking

Hacking refers to the practice of exploiting weaknesses in a computer system or network to gain unauthorized access to data or to perform malicious actions. In the context of the video, hacking is discussed as a potential threat to devices and systems, with the speaker sharing insights on how hardware hacking can occur and the importance of being aware of such vulnerabilities.

💡Hardware hacking

Hardware hacking involves manipulating or altering hardware devices to perform actions outside of their intended design, often for malicious purposes. The video discusses various devices that can be susceptible to hardware hacking, such as Wi-Fi routers or wireless mice, emphasizing the need for secure configuration and updates.

💡Security industry

The security industry encompasses professionals and companies that specialize in protecting computer systems, networks, and data from attacks, damage, or unauthorized access. The speaker mentions the security industry in the context of discussing the current state of device security and the challenges faced by system administrators.

💡Mouse jacking

Mouse jacking is a type of attack where an unauthorized user gains control of a wireless mouse, potentially leading to unauthorized actions on the connected computer. The video uses the example of a Lock Tech m85 wireless mouse to illustrate how susceptible some devices are to mouse jacking attacks, highlighting the importance of device security.

💡Wi-Fi router

A Wi-Fi router is a device that provides wireless access to the internet. The video script mentions the potential risks associated with improperly configured Wi-Fi routers, which could be a gateway for hackers to access a network, emphasizing the need for secure setup and management.

💡Human error

Human error refers to mistakes made by people that can lead to security breaches or other unintended consequences. The speaker discusses how human error, such as forgetting to update devices or not following security protocols, can lead to security vulnerabilities within an organization.

💡IoT device

An IoT (Internet of Things) device is any object that can connect to the internet and send or receive data. The video mentions IoT devices as potential points of vulnerability if not properly secured, as they can be easily exploited if they are not updated or if their security is overlooked.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. The video uses ransomware as an example of a serious security threat that can have severe consequences for businesses, highlighting the importance of having robust security measures and backup systems in place.

💡Security guy

The 'security guy' in the video refers to the individual or team responsible for implementing and maintaining an organization's security measures. The speaker expresses frustration with the lack of attention given to security professionals' advice, suggesting that this can lead to overlooked vulnerabilities and potential attacks.

💡Budget

In the context of the video, budget refers to the financial resources allocated to a company or project. The speaker discusses the challenge of securing a budget for security measures, as companies may prioritize cost-saving measures over security, which can lead to a false economy and increased risk.

💡Education

Education, as mentioned in the video, is crucial for raising awareness about security issues and training individuals to handle them effectively. The speaker hopes that educational institutions will start to prioritize security in their curricula, recognizing its importance in the digital age.

Highlights

The video discusses hacking devices and the security industry.

System administrators are often good at following security advice.

Devices like the Flipper Zero can't be dangerous on their own without additional vulnerabilities.

Wireless mice can be susceptible to mouse jacking attacks.

New devices or human errors can pose significant security risks.

People often prioritize getting things done quickly over security.

There's a tendency among younger generations to aim for high salaries and titles over doing a good job.

Security is often overlooked in favor of faster, cheaper solutions.

The importance of spending money on security is emphasized.

Testing for vulnerabilities requires specialized devices like the Flipper Zero.

People often don't listen to security advice, even from experts.

Ransomware attacks are a real threat, and not listening to security advice can be costly.

Education on security should be taken more seriously in business plans.

Security is essential for the foundation of any business.

Budgeting for security is a challenge that needs to be addressed.

External consultants or educational programs are sometimes ineffective.

The speaker offers to take on security education within his company but is declined.

The video aims to raise awareness about security issues in the industry.

The speaker invites viewers to engage with the content and share their thoughts.

A call to action for viewers to subscribe to the channel.

Transcripts

play00:00

all right so it's been a while and I I

play00:03

want to talk about you know this video

play00:05

is going to be more like a talk I want

play00:07

to talk about the hacking devices and

play00:09

and this and that you know I've been

play00:12

doing quite a videos a bunch of videos

play00:15

about different kind of Hardware hacking

play00:18

devices and stuff you can get and these

play00:21

days there are in the security industry

play00:24

we're going to talk about what to do and

play00:27

how do we recommend people to

play00:30

be more secure in the industry what do

play00:32

they do how do they manage it and why

play00:36

are hackers still successful

play00:39

now the actual problem isn't that much

play00:43

of the server for example of the the

play00:46

office you know most system

play00:47

administrators are quite good and Keen

play00:50

to listen to the advice that's are given

play00:52

you know right that are given to them so

play00:55

if you just you know take up to an

play00:57

office go to an office and say oh this

play00:59

is a flip

play01:00

Ser yeah that's great but you cannot

play01:03

really do

play01:04

anything potentially dangerous with the

play01:07

flipper Ser itself you need to you need

play01:10

to have a potentially bad Wi-Fi network

play01:17

or some Wireless mice for example this

play01:20

one right here which is a lock Tech uh

play01:25

m85 wireless mouse you have those you

play01:27

know throw out your window it's horrible

play01:31

it's uh it's susceptible to a mouse

play01:35

jacking attack Al created videos about

play01:37

it how easy it is so there are many

play01:39

problems you know the actual issue with

play01:43

you know Industries these days is that

play01:46

they sometimes Implement new devices to

play01:50

their

play01:51

infrastructure and that could be stuff

play01:54

like you know just a brand new Wi-Fi

play01:56

router that isn't configured correctly

play01:59

it could also be human errors you know

play02:01

so we if we are minimizing the the

play02:03

issues to some human error or some newly

play02:07

implemented Hardware device it could be

play02:10

many different kind of things understand

play02:12

that but we need to understand that the

play02:16

the actual implementation of a hardware

play02:20

device can

play02:22

be quite tedious for many people because

play02:25

they just want it done and that is a

play02:28

problem in the Society these days if we

play02:31

see um newly educated people you know

play02:35

just you know plaing around you know

play02:38

with the nose really you know ahead want

play02:41

to get high salaries and titles and you

play02:45

know all these kind of things that come

play02:47

with

play02:48

that um instead of actually doing a good

play02:53

job I I see that tendency even on my own

play02:58

educational faculty y that you know

play03:02

young people they tend to aim for Higher

play03:05

Goals that they actually can do and they

play03:08

feel like a failure if they cannot

play03:11

fulfill that goal which is very sad um

play03:15

so what really happens Down The Bard

play03:17

there is that if you if you give

play03:20

Hardware devices could be basically

play03:22

anything as as again as I mentioned

play03:24

could be a Wi-Fi router could be just be

play03:26

router it could be many things

play03:29

be a new you know thing you put on the

play03:32

internet some new iot device you

play03:35

implement it could be you know you buy

play03:38

new laptops you forgot forget about some

play03:41

updates you

play03:43

know you hire new people forget about

play03:46

you know back to human erors again the

play03:48

the the Casual you know how to be secure

play03:52

in the in the company intro calls you

play03:55

know um there so many different kind of

play03:58

things in that area and I I just still

play04:01

fail to

play04:02

see uh Industries taking it seriously

play04:05

because they think about money they

play04:07

think about how they can save money how

play04:09

they can use less money and still get

play04:12

the job done what is the fastest route

play04:15

from a to c that is what I

play04:18

see it isn't so much about how we can

play04:21

securely do it or how we can do it in

play04:23

the best way so we are secure no no it's

play04:26

just the fastest way you know with nose

play04:29

ahead and just full Full Throttle you

play04:33

know and and and that is probably the

play04:36

the the baddest way of doing it the most

play04:39

horrible idea I I I would love to

play04:44

see I would just love to see more people

play04:48

you know really believing in in in let's

play04:51

spend money and security and this

play04:54

is this is where we can use small

play04:58

devices such as the the M5 stick that I

play05:02

talked about before we can get the the

play05:06

larger devices of the M5 the larger

play05:09

devices that are also clickable with

play05:11

with color screens and we can

play05:13

get other kind of things but when we get

play05:15

to the to the part where you're going to

play05:18

test for susceptible M jacking you need

play05:20

a crazy radio or flip a zero for example

play05:23

and and the problem there is I what I

play05:26

want to mention one more time is that

play05:29

people people just don't listen you know

play05:31

I I I work in a company and no one

play05:33

listen to what I say you know I

play05:36

I I do share my knowledge and insights

play05:40

but they

play05:40

are a bit loopy SL jumpy about it

play05:44

they're like yeah yeah but Daniel hey

play05:46

who would do that here you know

play05:50

that's that's how they do it and and I I

play05:53

just you

play05:54

know know that that is how it works in

play05:56

most companies they look at the security

play05:59

guy they think well you've what about a

play06:02

tin foil hat right you have a tin foil

play06:04

hat on it's

play06:05

like really I I I don't I don't think so

play06:08

because I actually worked another school

play06:11

and it's not that many years ago they

play06:12

were attacked by ransomware and luckily

play06:15

they had the backup infrastructure great

play06:17

so they saved

play06:19

themsel

play06:21

however not all do that and when you are

play06:26

hit you know that you did listen

play06:30

probably not listen enough to the

play06:32

security

play06:33

guy I'm as I'm of course assuming right

play06:36

now someone didn't listen and of course

play06:38

assuming that didn't do what was

play06:40

required and I am assuming that the

play06:42

security guy there hired knows what he

play06:44

she is talking about and basically

play06:46

recommended the right things it is of

play06:49

course always possible to be hit by

play06:51

something like ransomware because we

play06:52

cannot really um be safe against

play06:55

anything um I really hope that

play07:00

educations will begin to take stuff like

play07:05

you know security

play07:08

more

play07:10

uh see

play07:13

professionally in their business plan

play07:16

you know because the foundation of the

play07:19

the business is the the business itself

play07:22

the what what do the business do they

play07:24

sell shoes for

play07:26

example without any shoes in the

play07:28

production line you're not having any

play07:29

business and security is not really

play07:31

needed right so so this the the business

play07:34

will carry the security and and and and

play07:36

that is the most important part security

play07:39

people have to remember is that if

play07:41

there's no business there no need for

play07:42

security right no need to secure

play07:44

anything there's no need for to have

play07:46

running and and and this is this is

play07:49

where we need to remember that there's

play07:50

always a budget and me this is the

play07:52

problem is how to budge tize budge tize

play07:56

security so we have the most benefit

play07:59

official amount of configurations

play08:01

knowledge inhouse educated employees and

play08:04

so on how we do that and that this is

play08:06

the problem with security these days is

play08:09

that it's it's rather difficult to uh

play08:12

get everything um

play08:15

because it's not possible and this this

play08:18

is this is this is where people

play08:21

companies they hire some external

play08:23

consultant or some program not not not

play08:27

not like a computer program but some

play08:28

sort of you know educational program

play08:30

from a company that live of creating

play08:33

these horrible horrible programs where

play08:36

they create some cartoon cly daily

play08:39

gamification stuff like and you just sit

play08:41

and think who is going to learn anything

play08:44

from that you know we have in a company

play08:46

that I work in and it's just horrible

play08:49

horrible and I'm not going to mention

play08:51

anything by name but let me just say

play08:54

that I haven't seen a single person

play08:59

talking about security since they

play09:01

implemented that horrible program I

play09:03

actually told them well why don't you

play09:05

just hire me and I make it a part of my

play09:08

job I'm already paid from it so why not

play09:11

just give me some hours for it you know

play09:14

that's really why not but they didn't do

play09:17

it you know they they

play09:19

they yeah I I I could talk about this

play09:23

topic forever and this is just me

play09:26

bringing some inside awareness to you

play09:30

about you know one of the problems there

play09:32

are that I see I really hope that you

play09:35

you know could learn my perspective you

play09:37

could s you can learn something from my

play09:39

pers perspective from on this and and if

play09:41

so you know please consider you know

play09:43

getting back to me and some some sort

play09:45

you know reply to my my um my video here

play09:48

I'm going to get back to you as soon as

play09:50

I can and if you're not subscribed you

play09:52

know please click subscribe button would

play09:55

help me a lot to grow this Channel and

play09:57

stay on YouTube for a long long time see

play10:01

you out there have a really nice day

play10:04

[Music]

Rate This

5.0 / 5 (0 votes)

Related Tags
Hardware HackingCybersecuritySecurity AwarenessWi-Fi SecurityHuman ErrorRansomwareEducational InsightsIndustry PracticesBudget PrioritiesSecurity Consultancy