The Audit presented by IT Audit Labs
The Audit presented by IT Audit Labs
  • 192
  • 57 850
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on a deserted island, setting the stage for a lively and insightful conversation.
From RFID shields to OMG cables, we unpack practical tips for protecting your digital and personal safety while traveling. Learn how to navigate risks like compromised USB ports, hidden cameras in hotel rooms, and data privacy challenges across borders. With advice on VPNs, securing SIM cards, managing passwords, and safeguarding luggage, this episode is packed with essential strategies to ensure your travel experiences remain secure and worry-free.
00:00 Introduction
06:10 Airlines to sync AirTags for luggage location
07:57 Tech tips for travel
08:47 RFID Cards and wallets
09:38 The dangers of charging devices in USB ports
12:54 Personal protection gear while traveling
14:03 Government regulations for tech abroad
16:00 Travel tips for businesspeople carrying tech and working abroad
16:56 Organizational policies around traveling with tech
18:27 Are hotel safes safe?
19:46 How a CISO connects to work on vacation
20:25 BitWarden vs. Apple Password manager
24:12 NFC chips for security
25:34 Hak5 Pineapple threats while traveling
27:00 Bluetooth travel tips
28:09 CISO travel tips
32:21 International travel state department app
32:45 A case for using AirTags in your luggage
35:14 Are you making yourself a soft travel target?
36:21 Security responsibility lies with the traveler
37:44 Outro
// Full Audio Podcast //
🔗 Apple Podcasts: tinyurl.com/3bjh5c3p
🔗 Spotify: tinyurl.com/2hbkpjr9
// Learn More About IT Audit Labs //
🔗 IT Audit Labs on LinkedIn: /it-audit-labs
🔗 IT Audit Labs Official Website: www.itauditlabs.com/
Thanks for tuning into The Audit. Subscribe on Spotify, Apple Podcasts, or UA-cam to stay informed on the latest in cybersecurity. Don’t forget to follow us on social media and share with your network!
#CybersecurityNews #TravelTIps #TravelTech #RFID #AirTags #Hak5Pineapple #HolidayTravel #HolidayTravelGuide
Переглядів: 18

Відео

Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
Переглядів 1821 день тому
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms-like the legality of Bengal cats-to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts to streamlining in...
Why Online Privacy Still Matters: Our IT Security Experts Weigh In
Переглядів 16Місяць тому
Welcome to The Audit Extras, our special edition series where we bring you unique discussions outside the regular episode lineup. In this installment, we tackle a thought-provoking Mashable op-ed: "My Private Data Is Probably Out There, But I'm Not Worried About It." Hosts Joshua Schmidt, Eric Brown, and Nick Melam unpack the implications of this mindset, exploring how personal privacy apathy c...
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
Переглядів 27Місяць тому
What does hands-on hacking, AI governance, and deepfake detection have in common? They’re redefining the landscape of cybersecurity, and we’re here to explore it all. In this episode of The Audit, we unpack key takeaways from a cybersecurity event that brought together experts, practitioners, and enthusiasts alike. From the challenges of hacking IoT devices and bypassing RFID systems to the eth...
AI & Emerging Tech for a Better Future with Marsha Maxwell
Переглядів 19Місяць тому
AI & Emerging Tech for a Better Future with Marsha Maxwell
Building Resilient, Secure Software: Lessons from DevSecOps Experts
Переглядів 522 місяці тому
Building Resilient, Secure Software: Lessons from DevSecOps Experts
Real-World Cybersecurity: Need to Know Now Insights from a CISO
Переглядів 562 місяці тому
Real-World Cybersecurity: Need to Know Now Insights from a CISO
Safety Science Meets Cybersecurity: Lessons for Risk Management
Переглядів 283 місяці тому
Safety Science Meets Cybersecurity: Lessons for Risk Management
Microsoft Vulnerabilities 2011-2024: A Month-by-Month Analysis
Переглядів 233 місяці тому
Microsoft Vulnerabilities 2011-2024: A Month-by-Month Analysis
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
Переглядів 3233 місяці тому
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
Переглядів 334 місяці тому
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
Переглядів 694 місяці тому
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
Переглядів 844 місяці тому
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
Переглядів 1805 місяців тому
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
Переглядів 586 місяців тому
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
Quantum Computing's Impact on Cybersecurity with Bernie Leung
Переглядів 276 місяців тому
Quantum Computing's Impact on Cybersecurity with Bernie Leung
IoT Security Risks Exposed: Uncovering Hidden Vulnerabilities with Eric Johansen
Переглядів 837 місяців тому
IoT Security Risks Exposed: Uncovering Hidden Vulnerabilities with Eric Johansen
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
Переглядів 247 місяців тому
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
Building the Future: AI and Cybersecurity in Construction
Переглядів 308 місяців тому
Building the Future: AI and Cybersecurity in Construction
Cybersecurity News: Water Systems & IoT Devices Under Threat
Переглядів 398 місяців тому
Cybersecurity News: Water Systems & IoT Devices Under Threat
Key Indicators of a Phishing Attempt
Переглядів 38 місяців тому
Key Indicators of a Phishing Attempt
Phishing: The Number 1 Social Engineering Tactic with James Arndt
Переглядів 889 місяців тому
Phishing: The Number 1 Social Engineering Tactic with James Arndt
The Audit Podcast - Trailer
Переглядів 619 місяців тому
The Audit Podcast - Trailer
VPN Security For Your Organization
Переглядів 99 місяців тому
VPN Security For Your Organization
Printing the Future: Navigating Cybersecurity in 3D Printing
Переглядів 18510 місяців тому
Printing the Future: Navigating Cybersecurity in 3D Printing
Are VPNs Secure? Insights on the Risks and Recent Breaches
Переглядів 4010 місяців тому
Are VPNs Secure? Insights on the Risks and Recent Breaches
A Veteran’s Journey into Cybersecurity with Clifton Robinson
Переглядів 3710 місяців тому
A Veteran’s Journey into Cybersecurity with Clifton Robinson
Email and Mobile Security Tips with Dean Morstad
Переглядів 3011 місяців тому
Email and Mobile Security Tips with Dean Morstad
Flipper Zero: The Cybersecurity Gadget You Need to Know About!
Переглядів 1,1 тис.11 місяців тому
Flipper Zero: The Cybersecurity Gadget You Need to Know About!
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI
Переглядів 55Рік тому
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI

КОМЕНТАРІ

  • @adwaitian
    @adwaitian День тому

    Guys this video is waste of time

  • @gakcsherbert8699
    @gakcsherbert8699 3 дні тому

    Just bring your own cable that doesn't carry data. Or use a data blocking dongle

  • @curtis-y7e
    @curtis-y7e 23 дні тому

    Great analysis, thank you! I have a quick question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

  • @randal-c5b
    @randal-c5b 26 днів тому

    Thank you so much for this amazing video! Could you help me with something unrelated: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?

    • @theauditpresentedbyital
      @theauditpresentedbyital 11 днів тому

      This is not our area of expertise. We recommend doing your own research or reaching out to Binance support.

  • @LesleyBerkovitz
    @LesleyBerkovitz Місяць тому

    Thanks for the forecast! Could you help me with something unrelated: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

  • @paulpucciarelli7694
    @paulpucciarelli7694 Місяць тому

    I bet you can get the time if you know the day. No way you can get both

  • @DougPoker
    @DougPoker Місяць тому

    Or you could just check the EXIF data attached to the photo file.

  • @raginald7mars408
    @raginald7mars408 Місяць тому

    as a German Biologist - ALL those pro Phets and revo Lutionaries for a “Better Future” created the HELL we have to day. ALL! I grew up in Germany in the 1950´s - and that appears as lost paradise - there was No Crime, nobody was sick - Physicians were POOR! We did not even need a telephone at home - what for...All public Services were perfect, punctual, reliable and CHEAP. Pro Phets destroyed that to create Hell. They create ever more Hell to Self Extinction!

  • @WyrdNexus_
    @WyrdNexus_ 2 місяці тому

    This is great in theory, but not in practice. Most vulnerabilities are human error, oversights, and exploitable bugs. You can't just NOT have those things.

    • @theauditpresentedbyital
      @theauditpresentedbyital Місяць тому

      Thanks for the comment. This is a clip from the full podcast where the general point is that regulatory entities are now requiring software developers to put more attention on developing secure software instead of rolling things out as quickly as possible and then patching vulnerabilities through updates. We hope this helps and you will give the full episode a shot!

  • @sammymorales6838
    @sammymorales6838 2 місяці тому

    2 grams of DNA is not the size of a penny lol

    • @theauditpresentedbyital
      @theauditpresentedbyital Місяць тому

      Thanks for the comment. Bill explains that a penny weighs 2 grams and you can fit about a half an exabyte onto something that size. I hope this helps clarifies and thanks for watching!

  • @PtolemyPetrie
    @PtolemyPetrie 2 місяці тому

    Major problem is many legitimate companies are utilizing sms which creates the ambiguity for people to have to distinguish between the two. Same with links in emails. If we know phishing is 80% the attack vector, we need to get companies away from putting links in email as a way to conduct business. Sometimes the service provider is doing a disservice.

    • @theauditpresentedbyital
      @theauditpresentedbyital 2 місяці тому

      Thanks for the comment, we agree! It's really hard for the user to distinguish legitimate requests from phishing attempts.

  • @BugattiLo_
    @BugattiLo_ 2 місяці тому

    Any updates on the book?

  • @BugattiLo_
    @BugattiLo_ 2 місяці тому

    As someone beginning my journey in DFID, this was a great listen and I’m glad I came across this.

  • @DsBoyan
    @DsBoyan 3 місяці тому

    I am too lazy to scan QR codes

  • @hermanstrom3948
    @hermanstrom3948 3 місяці тому

    I have a GFE phone.

  • @Matheolh123
    @Matheolh123 3 місяці тому

    Hello, how can i get in contact with you? i want to buy some of your expertice

  • @collectthemall
    @collectthemall 3 місяці тому

    Never heard about QR code scanner for Windows ?

    • @theauditpresentedbyital
      @theauditpresentedbyital 3 місяці тому

      Yes, great point! This is a clip for a long form podcast discussing dealing with common threats within an organization, so in this case, the comment was referencing what Eric has seen as a CISO. Thanks so much for joining the conversation!

  • @tonyruiz2046
    @tonyruiz2046 3 місяці тому

    ⭐️👍⭐️

  • @sleeperbuilt492
    @sleeperbuilt492 3 місяці тому

    Ok so if I have youtube on split tunneling and tiktok is on vpn and if I open both applications, so will my vpn be off for both or on for both or it will be on and off for two apps simultaneously?

    • @theauditpresentedbyital
      @theauditpresentedbyital 3 місяці тому

      Split tunneling means select traffic is going over the VPN. If UA-cam has been selected to not go over the VPN it will go out to the internet via your ISP. If traffic to TikTok has been selected to traverse the VPN then that traffic will go over the VPN from your machine to the VPN termination point and on to TikTok. Both can happen simultaneously, your ISP would only be aware of the UA-cam traffic, unless you are using your ISP for DNS, in which case your ISP may see your TikTok DNS queries. We hope this helps clarify and thanks for asking!

    • @sleeperbuilt492
      @sleeperbuilt492 3 місяці тому

      @@theauditpresentedbyital thanks very well explained

  • @retropulse03
    @retropulse03 3 місяці тому

    "At the same time crowdstrike should probably do better" No. Stop it. Do not soften this statement at all. Test your shit before deployment. Full Stop. There is no excuse.

  • @GlenMillard
    @GlenMillard 4 місяці тому

    Why did you mute the audio? 27:55 and once before that I forgot to make note of.

  • @johncorn7905
    @johncorn7905 6 місяців тому

    Sounds like a man in the middle attack

  • @AdvantestInc
    @AdvantestInc 6 місяців тому

    Fantastic discussion on post-quantum encryption! The impact of quantum computing on traditional methods is a game-changer. Appreciate the insights on preparing for the future.

    • @theauditpresentedbyital
      @theauditpresentedbyital 6 місяців тому

      Thanks so much for tuning in! Would someone from your organization be interested in discussing semiconductors? You can reach out to jschmidt@itauditlabs.com if interested.

  • @dathaniel9403
    @dathaniel9403 7 місяців тому

    I think Damian Lewis has a point

  • @Pwnagotchi-0
    @Pwnagotchi-0 8 місяців тому

    Man I just found out about these a week ago and finished . Parts came yesterday finished last night

  • @cgwworldministries83
    @cgwworldministries83 9 місяців тому

    I call 100% bs. Why? You would have a video proving it. If it sounds too good to be true, it's probably a lie.

    • @ROO1KAT
      @ROO1KAT 9 місяців тому

      Proving what?

    • @cgwworldministries83
      @cgwworldministries83 9 місяців тому

      @@ROO1KAT that plastic can hold the weight of an aircraft. 🧢🧢🧢

    • @theauditpresentedbyital
      @theauditpresentedbyital 9 місяців тому

      Thanks for your comment. The aircraft is a smaller single engine plane and the PLA material in the honeycomb pattern works like a charm.

    • @cgwworldministries83
      @cgwworldministries83 9 місяців тому

      @@theauditpresentedbyital sorry pla can't hold that much weight. Prove it please. I want to be wrong so bad. But chances are I'm not.

  • @werdnax4981
    @werdnax4981 10 місяців тому

    ok and what does this mean?!

    • @theauditpresentedbyital
      @theauditpresentedbyital 10 місяців тому

      Splitting VPN traffic refers to directing certain types of internet traffic through a VPN while allowing other types of traffic to bypass the VPN connection and use the regular internet connection. Allowing you to enjoy the cat videos. There are several reasons why a company might choose to split VPN traffic: Security: By routing only specific types of traffic through the VPN, such as sensitive data or communications, a company can ensure that this data is encrypted and secure while in transit over the internet. Meanwhile, non-sensitive traffic can bypass the VPN, reducing the load on the VPN infrastructure and potentially improving network performance. Compliance: Certain regulatory requirements or industry standards may mandate that sensitive data be transmitted over secure connections, such as VPNs. Splitting VPN traffic allows companies to ensure compliance with these requirements while still allowing non-sensitive traffic to use regular internet connections. Performance: VPN connections can sometimes introduce latency and affect network performance, especially for bandwidth-intensive applications. By splitting VPN traffic, companies can prioritize critical applications or services that require low latency and high bandwidth while directing less critical traffic over regular internet connections. Resource Management: VPN infrastructure can be costly to maintain and scale, especially for large organizations. By splitting VPN traffic, companies can optimize resource utilization by directing only necessary traffic through the VPN, thereby reducing the load on VPN servers and conserving bandwidth. Geographic Restrictions: Some online services or content may be restricted based on geographic location. By splitting VPN traffic, companies can allow employees to access geo-restricted content or services using the IP address provided by the VPN, while other non-restricted traffic can use regular internet connections. Overall, splitting VPN traffic allows companies to balance security, compliance, performance, and resource utilization based on their specific needs and requirements.

  • @brettlaw4346
    @brettlaw4346 10 місяців тому

    How vulnerable are VPNs to BGP routing attacks?

    • @theauditpresentedbyital
      @theauditpresentedbyital 10 місяців тому

      A BGP routing attack is essentially an attacker causing a router to impersonate IP addresses it doesn’t control. Attackers can exploit this by controlling or compromising a BGP-enabled router to announce routes to IP addresses, effectively diverting traffic through their network for interception or manipulation. Since the VPN traffic is encrypted the risk of compromised data is low. Here's a great explaining BGP hijacking at length, but feel free to respond with any additional questions. www.cloudflare.com/learning/security/glossary/bgp-hijacking/

  • @GoodGuyBiker
    @GoodGuyBiker 10 місяців тому

    id lvoe to chat more about this type of stuff

    • @theauditpresentedbyital
      @theauditpresentedbyital 9 місяців тому

      We would like that as well. We are planning another Pwnagotchi episode in the near future but in the meantime, you may be interested in our Episode on Flipper Zero. ua-cam.com/video/fqCUdbST99U/v-deo.html

  • @NeonEFX
    @NeonEFX 11 місяців тому

    I love these videos where you get to meet the teams behind awesome companies like Audit Labs which I just learned about last night ... I really enjoying watching their videos and they seem to have an excellent team... Keep up the good work ;) , Oh and maybe respond to your commenters once in a while it goes a long way ...Im sure your busy though doing actual work 😁 😁 lol

    • @theauditpresentedbyital
      @theauditpresentedbyital 9 місяців тому

      Yes, we are very busy but very much enjoy hearing your feedback. Thanks for tuning in! Are there any cybersecurity topics you would like to hear more about?

  • @WorldWideGamerr
    @WorldWideGamerr 11 місяців тому

    You sir are talking in hamburger and should stop forever

  • @UramazingXxX
    @UramazingXxX 11 місяців тому

    wait so i can earn loads of money by selling my ip address?

    • @theauditpresentedbyital
      @theauditpresentedbyital 9 місяців тому

      No, not exactly. The apps and internet providers are collecting your data to package and sell. You can learn more by watching the full length episode. Thanks for the comment! ua-cam.com/video/zPBiTgdDhGY/v-deo.html

  • @vasilisgreen
    @vasilisgreen 11 місяців тому

    Aren't IP addresses distributed through a NAT? Having your IP address alone is useless.

  • @YTInnovativeSolution
    @YTInnovativeSolution Рік тому

    At 14 minutes, that already exists.

    • @theauditpresentedbyital
      @theauditpresentedbyital 11 місяців тому

      You are correct! Thanks for your comment.

    • @YTInnovativeSolution
      @YTInnovativeSolution 11 місяців тому

      @@theauditpresentedbyital those pet access doors are WiFi enabled and you can set a lockdown or a pet cerfew remotely. The RFID door is a great idea. The thing I have been curious about is how well does it work keeping other animals out in the real world application. Some cats scare easily, some have balls of steel, all are curious, and there is the infamous cat games played at the door when the owner is letting them in or out. The raccoons are smart and determined. I'm just thinking aloud because my decision to purchase one is a tough one to make. However, my Flipper had no problem reading the RFID device in my cat. This ability is great and it has already got one kitty back home.

  • @ShrigmaFemale
    @ShrigmaFemale Рік тому

    Right wingers have been doing attacks like this on everyone else for decades.

  • @jacarranda
    @jacarranda Рік тому

    Leah is an inspiration! Thank you!

  • @bigfrankfraser1391
    @bigfrankfraser1391 Рік тому

    my question is, is it breaking any laws edit: way i understand it it, it might not be illegal to receive the data, but im a bit iffy about it

    • @joshualeeth
      @joshualeeth Рік тому

      It’s only illegal if you get caught.

    • @ClickClack_Bam
      @ClickClack_Bam 11 місяців тому

      I doubt it's illegal in general. When these devices lose power or reset etc, they'll generally go through this same process of hooking back up as I understand it. This device captures that process. Now from my understanding they'll cause this process to happen by kicking them off of being hooked up & then capture them hooking back up. I don't see how it's illegal to cause this as they do this by themselves so what's illegal about you causing this? Now where I think this gets into the definite gray & illegal area is your intent underneath all of this. If you're doing this to capture WiFi handshakes to crack passwords to steal someone's network etc then yes it's illegal.

    • @cadehcim855
      @cadehcim855 11 місяців тому

      love it loool@@ClickClack_Bam

    • @unitazer
      @unitazer 8 місяців тому

      It is legal to listen, capture and send at any frequency you want without restrictions (except military reserved one ofc), the legally questionable part is what you are doing with it. If you use it to capture a wpa2 handshake of a network that you dont own, AND use it to obtain the password, it might be illegal. But to be honest if your password can be brute-forced in a reasonable amount of time its a skill issue, > 10 digits and a letter is more than enough security against a brute force just dont make it obvious

  • @biocode2856
    @biocode2856 Рік тому

    Can you make your self CEO with a PDF

  • @biocode2856
    @biocode2856 Рік тому

    I got a ? What can you do with a PDF LOL

  • @thecharmcityredneck
    @thecharmcityredneck Рік тому

    Idk how I got this video on my thing. But what the hell is a quantum computer and what does it do?

    • @theauditpresentedbyital
      @theauditpresentedbyital Рік тому

      Thanks for watching. You can find more info on the full length episode. ua-cam.com/video/ZfIHbbjAbTI/v-deo.html

  • @Drey_doll
    @Drey_doll Рік тому

    Thank you that actually help me a bit more understand this. My other explanation didn’t talk about how liquid nitrogen is pushed through. And that’s it’s actually down at the bottom along with why it’s pushed to being so cold.

    • @theauditpresentedbyital
      @theauditpresentedbyital Рік тому

      Our pleasure. Thanks for watching. You can learn even more on the full length episode. ua-cam.com/video/ZfIHbbjAbTI/v-deo.html

  • @santansaif9
    @santansaif9 Рік тому