@@ssq_skullz7120 I dont really have a good advice, but try to learn linux first because thats the frst thing you will have to get familiar with using the command line, secnd is programming which is python mostly because it is the easiest programming language to learn and it is powerful, third is cybersecurity. You will have to learn fundamentals of cybersecurity in orer to understand it all like how cyber threats are performed, and etc.
@@ssq_skullz7120 But it would be a better choice to learn programming and linux first, since it will be easier for you to get into cybersecurity later in 3 to 4, but it if you dont have time to learn programming, just learn linux then, since it isnt hard when you get use to it.
As a tech-enthusiast, I was thoroughly impressed by the technical accuracy of this documentary. It's a perfect combination of education and entertainment. Thank you! 🙂
Having to rely JUST on computers and internet is more scary than most people realize. There is no perfectly secure internet space, and there is always a "backdoor" or a way into any kinds of software. The only defense is to remain vigilant and react to possible vulnerability in the system.
The internet was never intended to be "secure". It was supposed to be a open forum for knowledge. It was government and big business that started the "connect everything" movement.
Do like me…make a goofy email up for things like UA-cam and don’t bank online, pay bills online buy things from Amazon or other online shopping, keep ONLY ONE credit card for emergencies only and pay FOR EVERYTHING WITH CASH…our world has become lazy due to the internet and if you are one who values convenience over security then you get what you ask for💯💯
Even still using microsoft word 10 and Windows 95! The problem is the people using the systems within corporations and gov. who do not know how to behave securely, who are the easiest to 'engineer' vulnerability, through social engineering
I wouldn't . The company I work for LITERALLY has " something " that is running on MS-DOS. Our old I.T. Admin actually quit because it needed to be fixed and he told management that he had no idea how to even address the issue with anything he had. Next I.T. Admin came in and ended up having to buy software from an actual " black hat " to fix it. Business management is full of internet securitie"s worst enemies. Useless f**kers who are looking for ways to cut costs and show how valuable THEY are to the company will go after ? ... I.T. " ... the network is fine , everything's fine . Why are we paying these 5 people all this money for the upkeep of something that works fine ? Cut it down to a single network admin plus one guy who can , like , get LAN printers running again. " ... now give me my bonus.
@@torgo4ever recently, i were in a company pentest through our team, and what i saw is just ridiculous, they just using apache outdate version running on windows 10 outdated version and their mail exchange server is vulnerable to rce(on of the ms CVE), we just hacked their 10 different machines, and also they using outdated nginx reverse proxy to handle traffic but this one is also vulnerable to lfi(local file inclusion), when we got remote shell we got speechless, this machine contain bunch of github PAT, credit card info, other machines ssh private and public key, also whole companies user and employees database credentials running on mongodb, we just hacked one machines and that gives us whole company access, this one also a multi billion dollar company, i cant disclose the name, but what they pay us is just 50k pentest fee and 20 extra bonus, now u know, begin a white hat and security researchers is tough. Any bad actor could have done something very massive damage to this company, btw later they pay us another 50k for initial rce👀😂
As someone who knows a bit about cybersecurity, this is the most comprehensive and technically correct documentary I've ever seen. Ransomware isn't covered but the information in this doc is enough to understand why and how they shifted to that model.
*THURSDAY, SEP 1, 2022* *MESSAGE TO Hacker ANONYMOUS* Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME.* *May GOD Bless you ALL!!!*
Authors of malicious viruses attacking civilians need their finger put in a jar, and mailed back to them after serving a 5 year prisin sentence. Yes, jail the fingers.
A friend of mine just got hired by the Dept of Homeland Security as a cyber crimes analyst. What a cool job! I should've stuck with computer science in college, but switched my major to social work.
@James Stripling one has a degree he could pay for, the other come out of college more woke than my morning coffee, demanding that all us taxpayers pay for his shitty degree
@@ktanner11 ya you rather your taxes go to paying bank debts and blowing up other countries .. paying for education roads and hospitals is what taxes are INVENTED FOR ... not war and making the rich richer lol you defending the intrests of the people that extort you lol i guess you rather universities be so rich that they get to have a say in your elections lol
A story i heard in groups i can't disclose much about is that the author of stormworm added perfect auto spreading options and soon after passed away leaving the worm to its own devices, and eventually the main server managing the infected computers will go down and the worm will dissapear into the ether. This is all hearsay tho, but a very interesting story that isn't totally outlandish.
I grew up with and studied the Arpanet and the wider internet which followed. The net was built when the only computers hooked up to it had their own security and administration systems and people. This meant the systems themselves already had gatekeepers. No one dreamed an internet Host could fit in your pocket, with less security than your car.
@@joshschneider9766 There are two parts of the Arpa Net. One is testing routine concepts to survive a nuclear strike.. The packet switching Idea came from a British researcher. Putting Nuclear Strike Defense heading on Arpanet research put it up there with SAGE and the DEW Line.. This hook sold it better than the N-fold increase in R-n-D efficiency which it actually was. Arpa had to create plumbing for itself, before they could roll it out for the Armed Services. The second was the actual and long term use of early Arp net connections. Arpa internal problem was buying researchers their own systems was Hugely expensive. None of the software written at government expense could be used easily on other government funded machines. Nor could research be easily combined between isolated research groups. Arpa has to invent the chicken before they could give the military its chicken soup.
@@jeffreyplum5259 They used teletype/Telnet, TWX before ARPAnet, the first dedicated ARPAnet line was completed in 69, there was nothing long term about it as the government started setting up for it the same year the dedicated line between UCLA and SRI was finished. A British national did not come up with packet switching either, Paul Baran invented it: US Patent No. 4,438,511 (Digital Packet Switching). He moved to the US at the age of two from Poland, graduated with a BS from Drexel and MS from UCLA. His invention was based on the theories of J. C. R. Licklider another American CS. The Dew Line and SAGE had precise tasks that could be accomplished via direct line 48bit per min was more than enough at the time there wasn't defense it was launch before the opponents warhead hits terminal phase, besides this isn't information you send to peoples homes it was too unsecure ARPA would have never worked for those systems in that time to this day their successor systems are still on segregated lines again conflicts with what you think ARPAnet actually was. They were looking at a broader scope as one commentor said, all communications before/during/after a nuclear exchange multiple tasks and purposes, when not being articulated one can assume the comment means means all comms in all time frames. ARPAnet wasn't some magic translator that magically made the program that couldn't run before on the machine to then run. The only fraud that even comes close to the SAGEnet is the starwars project, ridiculous you even brought that up. I guess we did learn from SAGEnet what did not work. I sure hope you are not a research scientist. ARPA was started by Eisenhower for the exact purpose of full communications in the event of a nuclear exchange, the main concern Russia.
Creat a corporate platform that companies have to have a security officer sign up for and share a database of exploits under NDA for all companies so anyone who leaks the info can be held legally responsible.
38:33 "Zombie computer is a computer which is no longer under the control of its owner. The owner sees nothing wrong with the PC, but behind the scenes someone else is in control, and can do anything he wants any day, any time of the day." - If this doesn't describe PCs with Windows 10 and 11 installed, I don't know WHAT does.
This is why I build my own camper trailer and a campervan witches Off the Grid I'm solar panels panels and independent this allows me a lot more freedom and downsizing this is what people need to wake up to need to be self-sufficient is the way to go..
@@benjaminkaye8761 you are right about that they're definitely targeting us because we live a more free life they don't want that this is why they building it. Apartment buildings everywhere to get people to rent rent rent and not buy nothing anymore. .
I remember the blaster worm.. Always had to install Windows offline and have antivirus ready before connecting to Cable Broadband! If i left it connected, as soon as you booted with a network connection, the worm would get in and give you 60 seconds before shutdown every time.. I got good at running the fixes before it timed out but...damn. That was strange! Edit: Yep, you just had to be online! Hah...wow... Flashback from my childhood. All the Windows hate is BS though, Linux, Android and MacOS/iOS are more vulnerable now than ever! Many security issues are usually user error too, even back then.
August 2003 was the best month of my life. I did not have the mandatory (crappy) pre-installed Windows on my company laptop but had (illegally) installed it myself - and had it updated regularly (the megalomaniac administrators of that crappy pre-installed system thought they were so smart and wanted to check the source code of every update themselves (I don't know if this was even possible on Windows)). One glorious day in August 2003 one PC after the other in the office (this time in Tunisia) got a visit of an IT guy who (of course) inserted a Windows repair CD (or how else was this crap called back then?) which eventually killed the machine completely. I could work as usual, completely unaffected. Just anything else bit by bit went down - mailservers, webservers, etc... 😊
Yep work from home companies are even worse. I keep my mom's work computer updated with the latest patches and windows 10 versions because they never do. If it's on my personal network it's gonna stay updated 🤣 IDC if they like it or not. My mom's old work computer from another company got ransomware on it which was interesting. As soon as I noticed that it got unplugged from the network and unplugged from the wall I did that so it wouldn't spread and infect my personal devices on our network.
A company I worked for wanted to securely transmit data from moving vehicles to a server without using cellular tech, so we had a meeting with Lockheed-Martin because they make devices that allow ship-to-ship communications with military grade encryption for the Navy. I was surprised by their lack of physical security given their history of government contracts. We decided not to go with Lockheed-Martin, and I don’t doubt the guy’s claim in this video about compromising military networks. Pen-testing isn’t just about software security; it’s often easier to circumvent a firewall by simply walking around it and physically putting yourself on their network.
This brings back memories... I worked for Microsoft Support (Supporting Windows XP) back in the day and I vividly remember the Blaster and Sasser viruses... our queue was massive.
This is why Utilities should be Linux based! Not that Linux cannot be invaded, but even if invaded it will not be able to take over the machine. There are no Administrative Permissions on Linux so a virus cannot do much damage. It's not 100% safe, but a lot safer than Windows.
@@alexm566 this is just false. Linux is open source and thus bugs can be somber by anyone, anywhere a lot faster. You can't compare Linux (Which is a Kernel) to Windows (Which is a Operating System)
@@alexm566 I remember my first day as a 13 year old I had been asked that in a Yahoo chatroom and initially took it as a**hole 🍪 35/M/RI Have a safe rest of the week, Alex!
As a software engineer I think the way this documentary speaks about web security is mostly in the past. Don't get me wrong, there are still tons of services out there that are exploitable and especially the possiblity of DDoS is still there, but measures to mitigate that also got better, but the bottom-line is that the high-end, well maintained, high security systems are not definitely vulnerable in one way or another like they were for someone truly skilled in the 2000s. Also just for smaller projects/web systems, identity theft is one of the crimes that have gotten much harder to accomplish with more high spread adoption of security mechanisms like f.ex. 2FA, oauth etc. However one thing has probably not changed too much, if you are someone like the NSA or other big secret agency/government, you probably have resources like no one else and an exclusive backdoor into very many systems
The NSA has back doors ino Hardware across the country and probably in US produced cpu's and wireless chips. And dont get cocky. I started programming in about 83. And every generation thinks their software is unassailable. Imo modern systems are More vulnerable because theyre increasingly complex. The more links in a chain the more likely theres a weakness
twice in time, a rebel sings, once in life, a lover brings, thrice in voids, a system stares, 6th in line, 9 in wine, 7, 8 star to level will. Continuum 10101010101010103,1,1,1,1,3. Soale revolve 3three rotate on1, pull @€2010113, resolve. Zer09inestall, off.In.Pa0.O1. Virus to Smoke, exhale. FSrrr1.i H i
One of countless reasons not to live in a big city. In a big city, a power outage can be disastrous. Getting stuck in a subway, getting stuck in an elevator, etc. In a small town or out in the country, a power outage is anything from a slight inconvenience, to a surprise holiday.
RIGHT @7:43 he points to a white box with red and green blinking lights and says, "...and this pump has just gone nuts." That box is an Opto22 PLC. I have programmed those in Oil & Gas facilities. They aren't used in very many places. Most U.S. facilities use Allen Bradley PLCs, Honewell DCS, Siemens PLCs, Schneider, ABB, OMRON. No matter what PLC or DCS is used, they can all be hacked if the are connected to a network.
As a wannabe Cybersecurity bro I’m extremely motivated to learn. I’m 25 and I’m motivated to join the blue team to hone my skills and then turn red team.
Been in that waters 15 years ago. Started PC interest in 5 years old and with 8 years old was already coding in C++ and Delphi. Remember: Your love for PC and technology will beat education.
I Remember the late 80"s and the early 90's back when the Networks were being formed around the Globe and the Wonderful Joy that MIRC Brought to Us Young Hackers at the Time ! Friends and Myself created Massive Botnets . We created so many User Friendly clickable D.O.S. tools ! Back then I Never did find a Computer or a network that We could Not get into or the Ability to Shutdown or Drop from the Net. I Use to be Such a Different Person back then ! Some day I would Love to Bring into the Light some of the Activities !
Squirrel you full of 's... only after 1996 or 1997 depending on how you define dos attacks one could speak of a dos like attack and they where certainly not click me scripts
you know i can learn all this under 10 min with someordinarygamer.... he explains shit like this in under 10 min and do it in a way that is fun to listen to....
In the early days of IT, a degree didn’t mean everything. Experience meant more than a piece of paper. When corporate America bought into big higher education, they started requiring a piece of paper to get anywhere in this country. Its pushed a lot of the true talent elsewhere. Most can find gig based jobs and then build their clientele to have a successful business but others take shortcuts. We need to start appreciating experience again.
Suggestion: having hardwired systems that cut off the PLCs from the systems under control, if abnormal settings are verified. For instance, don't allow a generator to be connected to the grid until it is synced.
At a buffet, I personally sneak corn into the buffet so others can enjoy them. I hide 6 boiled corn ears in my jacket pockets. It is a joy for me to see other patrons of the establishment eat my corn thinking they were part of the buffet.
In 1990's I remember finding a Goodie virus in an ms office macro ( signed flitnik). The I love you virus was real fun too. 😅 Worked in a college library, student floppies are sooo Dirty!😮
Heh. Way back in 1996 (in the long and far off times, my best beloved), I attended an email introduction meeting held by my university's IT department where they gave all attendees a school email address. They also defined a secure system: a computer encased in concrete and sunk to the bottom of the ocean...and even then, you're not sure. Watching this, I smile at the drama and wonder why the meme of a block of concrete at the bottom of the ocean with the subtitle "Still not sure" hasn't taken root.
I had a neighbor that played games and he would host game night every now and then. They needed an extra screen so that they could view a website that shows live time feed information showing hacking attacks against the United States. Basically it was their weather forecasting so that they know when to and their gaming session.
Very good Documentary, thought it might start getting to technical for my understanding, (as most computer type stuff does) but was not only easy to comprehend, I enjoyed the whole Documentary. Have a much better understanding on hacking, or as much as understandable for me. Thank you Spark. ʰᵃᵛᵉ ᵗᵒ ᵃˢᵏ....ᵃʳᵉ ʸᵒᵘ ʳᵉˡᵃᵗᵉᵈ ᵗᵒ 'ˢᵖᵒᶜᵏ"? lol
Ever thought this "documentary" is more then just a documentary?... Ever thought the so called "security team" are accually actors?.... Some of then do seem to be security people but a few of them seems to be speaking from a script. There is a difference from explaining and a script... last year the IMF where doing a "mock up" finance system crash... it was a bit like when there was a mock up pandemic virus a year before "covid-19" came out... Why would there be a mock up finance system crash?.... hmm... maybe because they know there is going to be a finance system crash... because they are the people behind it... and when is does... they will say... "It's not our fault.. it was a computer virus".... false flag. Like it's a conspiracy?... just wait 6 month to a year and if there is a finance system crash.. you'll know it was planned. Last month the LME said they were going to close the metals futures in July... they have been doing it more then 50 years and make billions from it... so why would they close it down?... If a "hacker" was going to put a virus in the system and cause the finance system to crash... he or her is going to be affected by the event anyway... and it's not just the finance system.. fuel order, food order, doctor appointment, your anamzon orders... no ATM working... bank not open... If there was not elecricity within two weeks there would be riots and go into "mad max"... of course you'll always have solar, generators you deal with it.... but what would happen if there was no internet?.... everything runs through internet now... how long would it take to be in "mad max" now?....
this documentary is 4 steps behind how exploits are truly implemented, and the software they speak of beng illegal, is legal open source software available for whitehats, but blackhats and greyhats also have the right to use it, as it is open source.
It seems this doc was made around 2008 since it talked about the estonian cyberwarfare (2007), so pretty much everything seen here is old and outdated...
That blackout directly effected me doing Peritoneal and not able to warm up the fluid.. for 3 days. Ya not fun. Thought (as the news said) it was because of too many people using A/C at once. You mean they lied to us??
The problem is in a first world country like America and Europe people are taking things for granted.. because they are dependent on computers and the web and the system so when it fails is Big consequences because most people are so dependent upon it without that cannot live..
@@LSD209 I'm in English my living in America but I don't care for technology I don't use it if possible I do have a cell phone but it's the cheapest cell phone I can buy and I had to use it how you do use UA-cam but I have no Instagram Facebook or any other site if I'm going to date a woman I'll go up to a up front in real time I don't go online looking for no woman I do it face to face so therefore I don't depend on computers or the system for nothing if possible..mm
We have more in common than you’d believe…Anyways, I asked about your location because it helps to know when conversing. People don’t account for the differences in etiquette, speech and so forth and it can lead to misconceptions, misinterpretations and misunderstandings. What other line of communication could we use? I would like to get your opinion on something I’ve been working on for a few years but prefer not to hold a conversation here. If you’re not interested, just let me know and I’ll find someone else.
Mrs Richards: "I paid for a room with a view!" Basil: (pointing to the lovely view) "That is Torquay, Madam." Mrs Richards: "It's not good enough!" Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..." Mrs Richards: "Don't be silly! I expect to be able to see the sea!" Basil: "You can see the sea, it's over there between the land and the sky." Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction." Basil: "Why?! Because Krakatoa's not erupting at the moment ?
Best inventions I've ever come across. They make it so I do not have to interact, in person, with humans as much as I would have to if they didn't exist.
White hat I could respect. Gray or black, you just wanna fuck with people. No respect for that. Why would you even wanna do that? Wouldn't you rather be appreciated? Same skill, more love.
@@theobserver9131 Not entirely black as they have no boundaries. Sometimes you need to take vigilante justice like Batman or The Punisher. How long do we have to put up with corporations and narcissistic individuals taking advantage of us? I'm sure there are some sick rich people who, in the shadows, are involved in disturbing activities like what you see in the movies Hostel and 1999's 8mm.
They also have the Scarlet or Red Hat Hackers. Also why whoudl they hold this convention in Las Vegas, when who knows how many hackers are hacking into the casinos stealing money from them and not knowing. He should have been put to jail for the rest of his life!!
I was in a medical facility and two days ago somebody bumped the router and the nurses didn't know what medication to give to who because everything was online...
i live in Ca but was in NY visiting my family that day, in Mt vernon, just outside NYC--i got my mother blocks of ice, then immediately drove her tiny Toyota down to Grand Central and announced this car is going to lower Westchester County, who needs to go home?---4 people asked me how much and i told them no charge--i took them right to their front doors, went back down and got 4 more stranded people---took them to like New Rochelle, Yonkers, Pelham---finally i ran out of fuel and could no longer take people home ---probably my finest hour
Unfortunately, there are no ‘white’, ‘gray’, black’ hats. They are human beings with an array of wants, desires, degrees of conscience. They will behave in the way we all do, causing happiness, neutral, harm actions. In a spectrum some cause happiness consistently. Most of us have a balance of actions some causing happiness, some harm & others neutral,resulting in neutral actions. Some wish to benefit themselves and resulting in harm to others. In the same way HATS will act.
I am just beginning my learning and research in this field. I’d love to get the public opinion. What are some pro’s and Con’s for working in a career in Cyber Security?
I've been trying to learn as well and can not believe the Ego's of some.. well most hacker types I've spoken to Don't want to share information or answer questions Once they learn im a newbie sparks some sense of superiority and tell me to go do my research
What you're missing is the economical part. SIEMENS was about to be heavily fined if not excluded on the stock exchange. Most likely an agreement was made to smoth stuff over.
27:20 wow that is real bad because when your personal info even if not credit card info is stolen, the criminals very commonly sign up for MORE credit cards in YOUR name and use it all they want.
I know it sounds dumb and I am but how? Surely they get caught? Order stuff with someone else's credit card. It gets delivered to somewhere that's linked to you? I'm obviously missing something. Glad that my interest in hacking isn't Fraud related. I just like to know how things work and how to break them and then I'd get excited to watch who tries to break in :-)
Does anyone know when this was originally broadcast for TV? The video is a year old but the production of it clearly dates it closer to ~2010. TJX was 2007 so can’t be older than 2008. Anyone remember when this came out?
Its funny whenever I get burnt out learning cybersecurity, I just watch videos like this that makes me feel motivated enough to keep going
Or just watch matrix...
im heading into CyberSecurity in like 3-4 years. Any Advice u got....
@@ssq_skullz7120 I dont really have a good advice, but try to learn linux first because thats the frst thing you will have to get familiar with using the command line, secnd is programming which is python mostly because it is the easiest programming language to learn and it is powerful, third is cybersecurity. You will have to learn fundamentals of cybersecurity in orer to understand it all like how cyber threats are performed, and etc.
@@ssq_skullz7120 But it would be a better choice to learn programming and linux first, since it will be easier for you to get into cybersecurity later in 3 to 4, but it if you dont have time to learn programming, just learn linux then, since it isnt hard when you get use to it.
YOU SAID IT BEST
As a tech-enthusiast, I was thoroughly impressed by the technical accuracy of this documentary. It's a perfect combination of education and entertainment. Thank you! 🙂
better start learning something then, this is full of BS
@@m.anejante1687 What do you mean. full of bullshit.
"The computer that you probably have in your kitchen" - this doc
Having to rely JUST on computers and internet is more scary than most people realize.
There is no perfectly secure internet space, and there is always a "backdoor" or a way into any kinds of software. The only defense is to remain vigilant and react to possible vulnerability in the system.
The internet was never intended to be "secure". It was supposed to be a open forum for knowledge. It was government and big business that started the "connect everything" movement.
Actually, the modem was invented to facilitate comms after a nuclear exchange. Academic use started over a decade later. Google arpanet.
The same as people in general, no matter how they portray themselves or protect , they and we all have weaknesses
Do like me…make a goofy email up for things like UA-cam and don’t bank online, pay bills online buy things from Amazon or other online shopping, keep ONLY ONE credit card for emergencies only and pay FOR EVERYTHING WITH CASH…our world has become lazy due to the internet and if you are one who values convenience over security then you get what you ask for💯💯
Don't be afraid to turn them into the feds for nothing is ever lost or deleted.
you'd be surprised how many companies and organizations are running servers that have not had a security patch in years
Shodan ftw
Even still using microsoft word 10 and Windows 95! The problem is the people using the systems within corporations and gov. who do not know how to behave securely, who are the easiest to 'engineer' vulnerability, through social engineering
I wouldn't . The company I work for LITERALLY has " something " that is running on MS-DOS. Our old I.T. Admin actually quit because it needed to be fixed and he told management that he had no idea how to even address the issue with anything he had. Next I.T. Admin came in and ended up having to buy software from an actual " black hat " to fix it. Business management is full of internet securitie"s worst enemies. Useless f**kers who are looking for ways to cut costs and show how valuable THEY are to the company will go after ? ... I.T.
" ... the network is fine , everything's fine . Why are we paying these 5 people all this money for the upkeep of something that works fine ? Cut it down to a single network admin plus one guy who can , like , get LAN printers running again. " ... now give me my bonus.
@@torgo4ever recently, i were in a company pentest through our team, and what i saw is just ridiculous, they just using apache outdate version running on windows 10 outdated version and their mail exchange server is vulnerable to rce(on of the ms CVE), we just hacked their 10 different machines, and also they using outdated nginx reverse proxy to handle traffic but this one is also vulnerable to lfi(local file inclusion), when we got remote shell we got speechless, this machine contain bunch of github PAT, credit card info, other machines ssh private and public key, also whole companies user and employees database credentials running on mongodb, we just hacked one machines and that gives us whole company access, this one also a multi billion dollar company, i cant disclose the name, but what they pay us is just 50k pentest fee and 20 extra bonus, now u know, begin a white hat and security researchers is tough. Any bad actor could have done something very massive damage to this company, btw later they pay us another 50k for initial rce👀😂
Lmao the company I work for uses MS-DOS I think for their mainframe.
As someone who knows a bit about cybersecurity, this is the most comprehensive and technically correct documentary I've ever seen.
Ransomware isn't covered but the information in this doc is enough to understand why and how they shifted to that model.
This doc was before ransomware was common or very profitable from the general targets now
As someone who does cybersec and programming for a living, this was mostly bs.
I'll never understand people like you who feel the need to lie in order to be nice.
@@ageresequituresse Is that aimed at me ?
@@TomTom-gx1sm😂yes it's your text
"Yahoo, to this day, the biggest, busiest and most profitable website in the world".😑 How old is this video?🤔
Spidey Whiplash , Unfortunately? Too old.
Yeah it's old, still, it's an interesting bit of history!
2008, but yahoo wasn't the biggest even then. Google was far bigger (they owned youtube even back then).
Yahoo is better than google
@@peesweezy2213 in what way?
I didn't know Spark made nostalgia videos- wow did this bring back memories!
It does seem about a decade out of date. I wonder when it was made?
We need more guys like him to torch the hackers that hurt others.
*THURSDAY, SEP 1, 2022*
*MESSAGE TO Hacker ANONYMOUS*
Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME.*
*May GOD Bless you ALL!!!*
@@atromitos7094 call the feds. Its what we did.
Authors of malicious viruses attacking civilians need their finger put in a jar, and mailed back to them after serving a 5 year prisin sentence. Yes, jail the fingers.
*Are you a Hacker but NOT CRIMINAL? PLEEEEEASE HELP ME.*
Careful tiger they loved to read comments.....
A friend of mine just got hired by the Dept of Homeland Security as a cyber crimes analyst. What a cool job! I should've stuck with computer science in college, but switched my major to social work.
@James Stripling ones rich and ones broke
@James Stripling one has a degree he could pay for, the other come out of college more woke than my morning coffee, demanding that all us taxpayers pay for his shitty degree
@@ktanner11 ya you rather your taxes go to paying bank debts and blowing up other countries .. paying for education roads and hospitals is what taxes are INVENTED FOR ... not war and making the rich richer lol you defending the intrests of the people that extort you lol i guess you rather universities be so rich that they get to have a say in your elections lol
ouch lol
@@TheZuuKeeperz Not gonna lie- they're right! 😂
A story i heard in groups i can't disclose much about is that the author of stormworm added perfect auto spreading options and soon after passed away leaving the worm to its own devices, and eventually the main server managing the infected computers will go down and the worm will dissapear into the ether. This is all hearsay tho, but a very interesting story that isn't totally outlandish.
I grew up with and studied the Arpanet and the wider internet which followed. The net was built when the only computers hooked up to it had their own security and administration systems and people. This meant the systems themselves already had gatekeepers. No one dreamed an internet Host could fit in your pocket, with less security than your car.
Arpanet wasn't actually meant to do that. It was invented to facilitate comms after a nuclear exchange.
Well well well.
Good thing you were there to study arpanet. Thank you for your service... Lmao
@@joshschneider9766 There are two parts of the Arpa Net. One is testing routine concepts to survive a nuclear strike.. The packet switching Idea came from a British researcher. Putting Nuclear Strike Defense heading on Arpanet research put it up there with SAGE and the DEW Line.. This hook sold it better than the N-fold increase in R-n-D efficiency which it actually was. Arpa had to create plumbing for itself, before they could roll it out for the Armed Services.
The second was the actual and long term use of early Arp net connections. Arpa internal problem was buying researchers their own systems was Hugely expensive. None of the software written at government expense could be used easily on other government funded machines. Nor could research be easily combined between isolated research groups. Arpa has to invent the chicken before they could give the military its chicken soup.
@@jeffreyplum5259 They used teletype/Telnet, TWX before ARPAnet, the first dedicated ARPAnet line was completed in 69, there was nothing long term about it as the government started setting up for it the same year the dedicated line between UCLA and SRI was finished. A British national did not come up with packet switching either, Paul Baran invented it: US Patent No. 4,438,511 (Digital Packet Switching). He moved to the US at the age of two from Poland, graduated with a BS from Drexel and MS from UCLA. His invention was based on the theories of J. C. R. Licklider another American CS. The Dew Line and SAGE had precise tasks that could be accomplished via direct line 48bit per min was more than enough at the time there wasn't defense it was launch before the opponents warhead hits terminal phase, besides this isn't information you send to peoples homes it was too unsecure ARPA would have never worked for those systems in that time to this day their successor systems are still on segregated lines again conflicts with what you think ARPAnet actually was. They were looking at a broader scope as one commentor said, all communications before/during/after a nuclear exchange multiple tasks and purposes, when not being articulated one can assume the comment means means all comms in all time frames. ARPAnet wasn't some magic translator that magically made the program that couldn't run before on the machine to then run. The only fraud that even comes close to the SAGEnet is the starwars project, ridiculous you even brought that up. I guess we did learn from SAGEnet what did not work.
I sure hope you are not a research scientist. ARPA was started by Eisenhower for the exact purpose of full communications in the event of a nuclear exchange, the main concern Russia.
Creat a corporate platform that companies have to have a security officer sign up for and share a database of exploits under NDA for all companies so anyone who leaks the info can be held legally responsible.
38:33 "Zombie computer is a computer which is no longer under the control of its owner.
The owner sees nothing wrong with the PC, but behind the scenes someone else is in control, and can do anything he wants any day, any time of the day."
- If this doesn't describe PCs with Windows 10 and 11 installed, I don't know WHAT does.
and mac ios
@@jelteisgelukkig bolth..lol
so true .lol
This is why I build my own camper trailer and a campervan witches Off the Grid I'm solar panels panels and independent this allows me a lot more freedom and downsizing this is what people need to wake up to need to be self-sufficient is the way to go..
@Jaomir Courtar oi💓
Not many people know how to, or that this is even a possibility. Can you make a video on this for us? It's your time to shine!
Lol because the world's government's are targeting u crazy campwes😂 respect anyway, however I'm pretty sure you're safe mate
@@benjaminkaye8761 you are right about that they're definitely targeting us because we live a more free life they don't want that this is why they building it. Apartment buildings everywhere to get people to rent rent rent and not buy nothing anymore. .
@SLYTECH not as much because I don't use the main media Facebook Instagram all those places I don't use and I don't use the Wi-Fi from storefronts..
I remember the blaster worm.. Always had to install Windows offline and have antivirus ready before connecting to Cable Broadband! If i left it connected, as soon as you booted with a network connection, the worm would get in and give you 60 seconds before shutdown every time.. I got good at running the fixes before it timed out but...damn. That was strange! Edit: Yep, you just had to be online! Hah...wow... Flashback from my childhood. All the Windows hate is BS though, Linux, Android and MacOS/iOS are more vulnerable now than ever! Many security issues are usually user error too, even back then.
If I'm not mistaken the windows firewall stopped it but back in those days wasn't enabled by default.
This video must be the reason hackers hate the word “hacker” 😵💫
It's so cringe🤮
August 2003 was the best month of my life.
I did not have the mandatory (crappy) pre-installed Windows on my company laptop but had (illegally) installed it myself - and had it updated regularly (the megalomaniac administrators of that crappy pre-installed system thought they were so smart and wanted to check the source code of every update themselves (I don't know if this was even possible on Windows)).
One glorious day in August 2003 one PC after the other in the office (this time in Tunisia) got a visit of an IT guy who (of course) inserted a Windows repair CD (or how else was this crap called back then?) which eventually killed the machine completely.
I could work as usual, completely unaffected.
Just anything else bit by bit went down - mailservers, webservers, etc...
😊
what??
This story must get you all the chicks…
@@o0Donuts0o Unfortunately not 😭
Yep work from home companies are even worse. I keep my mom's work computer updated with the latest patches and windows 10 versions because they never do. If it's on my personal network it's gonna stay updated 🤣 IDC if they like it or not. My mom's old work computer from another company got ransomware on it which was interesting. As soon as I noticed that it got unplugged from the network and unplugged from the wall I did that so it wouldn't spread and infect my personal devices on our network.
@Shawn 🏴☠️ Stafford I guess it was XP at this time.
Personally I switched to Ubuntu about 10 years ago.
Never, ever had any virus issue.
A company I worked for wanted to securely transmit data from moving vehicles to a server without using cellular tech, so we had a meeting with Lockheed-Martin because they make devices that allow ship-to-ship communications with military grade encryption for the Navy. I was surprised by their lack of physical security given their history of government contracts. We decided not to go with Lockheed-Martin, and I don’t doubt the guy’s claim in this video about compromising military networks. Pen-testing isn’t just about software security; it’s often easier to circumvent a firewall by simply walking around it and physically putting yourself on their network.
This brings back memories... I worked for Microsoft Support (Supporting Windows XP) back in the day and I vividly remember the Blaster and Sasser viruses... our queue was massive.
This is the reason why I still use carrier pigeons to communicate and not the web.
A Wise man
If you're wondering when this was made, there is a clue: 8 years after 'mafiaboy'.
I love a straight forward comment. No bullshit, right to the point.
I was wondering and thinking: this is way outdated.
Still trying to escape 8 mile...
@Shawn 🏴☠️ Stafford Hackers movie was 1995
@@josephhall5681. 8
This is why Utilities should be Linux based! Not that Linux cannot be invaded, but even if invaded it will not be able to take over the machine. There are no Administrative Permissions on Linux so a virus cannot do much damage. It's not 100% safe, but a lot safer than Windows.
enhance it, upgrade the linux sys
literal BS. Linux is FAAAR less quality than Windows code.
@@alexm566 this is just false. Linux is open source and thus bugs can be somber by anyone, anywhere a lot faster. You can't compare Linux (Which is a Kernel) to Windows (Which is a Operating System)
@@electricz3045 that's a myth. look at the shell shock and other Linux bugs that remained uncovered for literally decades
@@alexm566 so you are saying Linux has far less quality code than widows while Windows is closed source and you can't see their code? Make sense.
I miss when computer viruses were our biggest concern.
I miss AOL days
@@sirtko I miss the ASL? days!
@@swallowedinthesea11 18/f/LA always 😁
@@alexm566 I remember my first day as a 13 year old I had been asked that in a Yahoo chatroom and initially took it as a**hole 🍪
35/M/RI Have a safe rest of the week, Alex!
I still have my Commodore 64.
As a software engineer I think the way this documentary speaks about web security is mostly in the past. Don't get me wrong, there are still tons of services out there that are exploitable and especially the possiblity of DDoS is still there, but measures to mitigate that also got better, but the bottom-line is that the high-end, well maintained, high security systems are not definitely vulnerable in one way or another like they were for someone truly skilled in the 2000s. Also just for smaller projects/web systems, identity theft is one of the crimes that have gotten much harder to accomplish with more high spread adoption of security mechanisms like f.ex. 2FA, oauth etc. However one thing has probably not changed too much, if you are someone like the NSA or other big secret agency/government, you probably have resources like no one else and an exclusive backdoor into very many systems
The NSA has back doors ino Hardware across the country and probably in US produced cpu's and wireless chips. And dont get cocky. I started programming in about 83. And every generation thinks their software is unassailable. Imo modern systems are More vulnerable because theyre increasingly complex. The more links in a chain the more likely theres a weakness
@@cdreid9999 I also address the concern about secret agencies with backdoors, but I'm guessing you never read that far
@@cdreid9999 What was your first proramming language back then in 83? Fortran? Cobol? Those cards with the holes?
@@transforgoku
Mine was CommodoreBASIC in 1982. Lol. We’ve a long way since using a cassette recorder for data storage.
Social engineering will always prevail.
Imagine connecting to the free wifi at the hacker convention
twice in time, a rebel sings, once in life, a lover brings, thrice in voids, a system stares, 6th in line, 9 in wine, 7, 8 star to level will. Continuum 10101010101010103,1,1,1,1,3. Soale revolve 3three rotate on1, pull @€2010113, resolve. Zer09inestall, off.In.Pa0.O1. Virus to Smoke, exhale. FSrrr1.i H i
One of countless reasons not to live in a big city. In a big city, a power outage can be disastrous. Getting stuck in a subway, getting stuck in an elevator, etc.
In a small town or out in the country, a power outage is anything from a slight inconvenience, to a surprise holiday.
I think many had realize that since the sc@m_d3mic began...
@@transforgoku PANDEMICS are one reason not to live in a city. Evidently, even a broken clock can be right once or twice a day.
This documentary is from 2008. Anything said in it is out of date.
RIGHT @7:43 he points to a white box with red and green blinking lights and says, "...and this pump has just gone nuts." That box is an Opto22 PLC. I have programmed those in Oil & Gas facilities. They aren't used in very many places. Most U.S. facilities use Allen Bradley PLCs, Honewell DCS, Siemens PLCs, Schneider, ABB, OMRON. No matter what PLC or DCS is used, they can all be hacked if the are connected to a network.
As a wannabe Cybersecurity bro I’m extremely motivated to learn. I’m 25 and I’m motivated to join the blue team to hone my skills and then turn red team.
And how's it going?
The zombie is scary, my network got disrupted twice while watching this documentary
"...All from a Pentium 133..."
Now that's a savage flex
Been in that waters 15 years ago.
Started PC interest in 5 years old and with 8 years old was already coding in C++ and Delphi.
Remember: Your love for PC and technology will beat education.
I Remember the late 80"s and the early 90's back when the Networks were being formed around the Globe and the Wonderful Joy that MIRC Brought to Us Young Hackers at the Time ! Friends and Myself created Massive Botnets . We created so many User Friendly clickable D.O.S. tools ! Back then I Never did find a Computer or a network that We could Not get into or the Ability to Shutdown or Drop from the Net. I Use to be Such a Different Person back then ! Some day I would Love to Bring into the Light some of the Activities !
Squirrel you full of 's... only after 1996 or 1997 depending on how you define dos attacks one could speak of a dos like attack and they where certainly not click me scripts
So, you're basically saying you are a POS and you invite hatred. Fine, you've got it.
I remember that blackout, I was working at Maryhaven in NY. It was crazy, all the street lights were out.
you know i can learn all this under 10 min with someordinarygamer.... he explains shit like this in under 10 min and do it in a way that is fun to listen to....
In the early days of IT, a degree didn’t mean everything. Experience meant more than a piece of paper. When corporate America bought into big higher education, they started requiring a piece of paper to get anywhere in this country. Its pushed a lot of the true talent elsewhere. Most can find gig based jobs and then build their clientele to have a successful business but others take shortcuts. We need to start appreciating experience again.
I was in Ottawa Ontario Canada in this day. I prepared for this day. My family had light, water and food.
24:00 so that's why I have been seeing spam emails with a word doc attachment.
Suggestion: having hardwired systems that cut off the PLCs from the systems under control, if abnormal settings are verified. For instance, don't allow a generator to be connected to the grid until it is synced.
Depends on the grid we are too dependent on this stuff we need to disconnect and downsize and live more simpler life..
Love the whole storm worm story...how do they have any idea it has infected millions of computers, if it is undetectable!? 🤦🏻♂️
At a buffet, I personally sneak corn into the buffet so others can enjoy them. I hide 6 boiled corn ears in my jacket pockets. It is a joy for me to see other patrons of the establishment eat my corn thinking they were part of the buffet.
wtf? 🤔
literally illegal and I've seen this comment many times this week wtf
In 1990's I remember finding a Goodie virus in an ms office macro ( signed flitnik). The I love you virus was real fun too. 😅 Worked in a college library, student floppies are sooo Dirty!😮
This video was likely made a while ago, interesting that it finds my feed today….
Heh. Way back in 1996 (in the long and far off times, my best beloved), I attended an email introduction meeting held by my university's IT department where they gave all attendees a school email address. They also defined a secure system: a computer encased in concrete and sunk to the bottom of the ocean...and even then, you're not sure.
Watching this, I smile at the drama and wonder why the meme of a block of concrete at the bottom of the ocean with the subtitle "Still not sure" hasn't taken root.
Imagine if he shorted every market he hacked. He would be a billionaire.
Nah he’d simply be caught.
Is there an updated video of this? A lot has changed in 15 years.
I had a neighbor that played games and he would host game night every now and then. They needed an extra screen so that they could view a website that shows live time feed information showing hacking attacks against the United States. Basically it was their weather forecasting so that they know when to and their gaming session.
What's the website?
@@Yellow-Rose he didn't want subscribers of this channel to go haywire in his server :D
thx for the wakeup
Great documentary. Thank you.
$5 for my social security, bank, and driver license???? Is that what I am worth to hackers???
I would have guessed 26¢.
So very not surprised at any of this.
Very good Documentary, thought it might start getting to technical for my understanding, (as most computer type stuff does) but was not only easy to comprehend, I enjoyed the whole Documentary.
Have a much better understanding on hacking, or as much as understandable for me.
Thank you Spark.
ʰᵃᵛᵉ ᵗᵒ ᵃˢᵏ....ᵃʳᵉ ʸᵒᵘ ʳᵉˡᵃᵗᵉᵈ ᵗᵒ 'ˢᵖᵒᶜᵏ"? lol
Ever thought this "documentary" is more then just a documentary?... Ever thought the so called "security team" are accually actors?.... Some of then do seem to be security people but a few of them seems to be speaking from a script. There is a difference from explaining and a script... last year the IMF where doing a "mock up" finance system crash... it was a bit like when there was a mock up pandemic virus a year before "covid-19" came out... Why would there be a mock up finance system crash?.... hmm... maybe because they know there is going to be a finance system crash... because they are the people behind it... and when is does... they will say... "It's not our fault.. it was a computer virus".... false flag. Like it's a conspiracy?... just wait 6 month to a year and if there is a finance system crash.. you'll know it was planned. Last month the LME said they were going to close the metals futures in July... they have been doing it more then 50 years and make billions from it... so why would they close it down?... If a "hacker" was going to put a virus in the system and cause the finance system to crash... he or her is going to be affected by the event anyway... and it's not just the finance system.. fuel order, food order, doctor appointment, your anamzon orders... no ATM working... bank not open... If there was not elecricity within two weeks there would be riots and go into "mad max"... of course you'll always have solar, generators you deal with it.... but what would happen if there was no internet?.... everything runs through internet now... how long would it take to be in "mad max" now?....
thats a 2004 documentary if you knew how complex hacking is now it makes this look easy haha
this documentary is 4 steps behind how exploits are truly implemented, and the software they speak of beng illegal, is legal open source software available for whitehats, but blackhats and greyhats also have the right to use it, as it is open source.
It seems this doc was made around 2008 since it talked about the estonian cyberwarfare (2007), so pretty much everything seen here is old and outdated...
It's an old documentary
That blackout directly effected me doing Peritoneal and not able to warm up the fluid.. for 3 days. Ya not fun. Thought (as the news said) it was because of too many people using A/C at once. You mean they lied to us??
The problem is in a first world country like America and Europe people are taking things for granted.. because they are dependent on computers and the web and the system so when it fails is Big consequences because most people are so dependent upon it without that cannot live..
Where do gu you live?
@@LSD209 I'm in English my living in America but I don't care for technology I don't use it if possible I do have a cell phone but it's the cheapest cell phone I can buy and I had to use it how you do use UA-cam but I have no Instagram Facebook or any other site if I'm going to date a woman I'll go up to a up front in real time I don't go online looking for no woman I do it face to face so therefore I don't depend on computers or the system for nothing if possible..mm
@@LSD209 not to mention I don't take life for granted ever
We have more in common than you’d believe…Anyways, I asked about your location because it helps to know when conversing. People don’t account for the differences in etiquette, speech and so forth and it can lead to misconceptions, misinterpretations and misunderstandings. What other line of communication could we use? I would like to get your opinion on something I’ve been working on for a few years but prefer not to hold a conversation here. If you’re not interested, just let me know and I’ll find someone else.
Europe is my favourite country
Thanks WOW THAT'S AWESOME
Mrs Richards: "I paid for a room with a view!"
Basil: (pointing to the lovely view) "That is Torquay, Madam."
Mrs Richards: "It's not good enough!"
Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..."
Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
Basil: "You can see the sea, it's over there between the land and the sky."
Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
Basil: "Why?! Because Krakatoa's not erupting at the moment ?
Random but 😂👏
@@jonnyxs892 WHAT IS NIT WIT ?
Dragonfly bro😂🥳
@@jonnyxs892 I'M A DOCTOR AND I WANT MY SAUSAGE'S !
Breakfast kaput!
Bot you great info no bs everyime i watch i learn sumting new luv u bot
U good?
@@bellopico6536 yeah I'm good now I found The Good News thx 4 asking Jesus Christ saved me
Awesome 👌
It's a very good thing the internet is just about to get replaced...... Everything is going Quantum
That intro screen is embarrassing oh my GOD.
GOD IS LOVE
Fascinating, informative video! Just at the right time for me. I will not do my banking online!
@@EruditeBlueJackass
Write much?
Duh!
Hope he meant keeping it in cash
I love how they say hacker tools are illegal. It's open-source, lolol.
Nice documentery its nice job to do.
I know some people who have home PC and never turn them off but think when they turn the monitor off that is removing the Internet connection. Wow!
Some of The gray hats.....are here in this video comnts...😮😮😃😃😃....I'm a bit surprise!!!👍👍👍...these are the big fish in this industry...
Great work 🥳🥳🥳 Thank you 💜💜💜
The sooner people realise that theres never ever a thing like a secure computer, then the sooner they stop connecting everything to the internet.
its just lazyness.
The Internet will be the downfall of mankind the worst thing ever invented.... Second is the mobile phone.....
It’s mankind that corrupts everything. We have discernment to use the resources we have.
Best inventions I've ever come across. They make it so I do not have to interact, in person, with humans as much as I would have to if they didn't exist.
I am so glad I decided not to be brainwashed(pun)by humans, religions and governments.
I'm learning HTML to become a hacker. Not sure which type I want to be, perhaps a grey hat hacker like a grey Jedi because I want to be in the middle.
Why do you advertise that? You might as well be telling everyone that you have a communicable venereal disease. Congratulations.
@@theobserver9131 Thank you!
@@swallowedinthesea11 whatever blows your skirt up.
White hat I could respect. Gray or black, you just wanna fuck with people. No respect for that. Why would you even wanna do that? Wouldn't you rather be appreciated? Same skill, more love.
@@theobserver9131 Not entirely black as they have no boundaries. Sometimes you need to take vigilante justice like Batman or The Punisher. How long do we have to put up with corporations and narcissistic individuals taking advantage of us? I'm sure there are some sick rich people who, in the shadows, are involved in disturbing activities like what you see in the movies Hostel and 1999's 8mm.
They also have the Scarlet or Red Hat Hackers.
Also why whoudl they hold this convention in Las Vegas, when who knows how many hackers are hacking into the casinos stealing money from them and not knowing.
He should have been put to jail for the rest of his life!!
Storm worm, hasn't it integrated the DragonFlyEye system from China?
Who the heck put computers in a kitchen.
This documentary was produced back in 2008 for CBC.
Good video. Orig run in Canada thru Market Place?
"they're called hackers" LOL when was this vid made?
2002
inti
I was in a medical facility and two days ago somebody bumped the router and the nurses didn't know what medication to give to who because everything was online...
Riotously scary!
Watch "dog"..... this is a good name for hacker.
i live in Ca but was in NY visiting my family that day, in Mt vernon, just outside NYC--i got my mother blocks of ice, then immediately drove her tiny Toyota down to Grand Central and announced this car is going to lower Westchester County, who needs to go home?---4 people asked me how much and i told them no charge--i took them right to their front doors, went back down and got 4 more stranded people---took them to like New Rochelle, Yonkers, Pelham---finally i ran out of fuel and could no longer take people home ---probably my finest hour
Definitely one of them. Well done sir.
Tooting your own horn much Richard Colton?
There is a kind who is pure in his own eyes, Yet is not washed from his filthiness.
Unfortunately, there are no ‘white’, ‘gray’, black’ hats. They are human beings with an array of wants, desires, degrees of conscience. They will behave in the way we all do, causing happiness, neutral, harm actions. In a spectrum some cause happiness consistently. Most of us have a balance of actions some causing happiness, some harm & others neutral,resulting in neutral actions. Some wish to benefit themselves and resulting in harm to others. In the same way HATS will act.
Interesting documentary. A lot of commercials, though.
Thank you🙏
Who even EVER used yahoo lmfaooo even 10 years ago
Just found a new career 💀
"Failure of imagination"? Uhh, they were doing training exercises that day that was exactly like what happened - planes hitting the towers..
I am just beginning my learning and research in this field. I’d love to get the public opinion.
What are some pro’s and Con’s for working in a career in Cyber Security?
I've been trying to learn as well and can not believe the Ego's of some.. well most hacker types I've spoken to
Don't want to share information or answer questions
Once they learn im a newbie sparks some sense of superiority and tell me to go do my research
This is all quite old, where is the up-to-date info?
Going in a cafe with a Laptop with hacker written on it and a black hatted guy...
What you're missing is the economical part.
SIEMENS was about to be heavily fined if not excluded on the stock exchange.
Most likely an agreement was made to smoth stuff over.
Never heard before today. History made today
27:20 wow that is real bad because when your personal info even if not credit card info is stolen, the criminals very commonly sign up for MORE credit cards in YOUR name and use it all they want.
I know it sounds dumb and I am but how? Surely they get caught? Order stuff with someone else's credit card. It gets delivered to somewhere that's linked to you? I'm obviously missing something. Glad that my interest in hacking isn't Fraud related. I just like to know how things work and how to break them and then I'd get excited to watch who tries to break in :-)
Blurred lines between hackers and antivirus labs they need each other
Storyboard moves so slow one forgets they are watching… mesmerism?😂
Lol .45 seconds. My mans def eating a container of peanut butter.
Does anyone know when this was originally broadcast for TV? The video is a year old but the production of it clearly dates it closer to ~2010. TJX was 2007 so can’t be older than 2008. Anyone remember when this came out?
Beautiful video
The smugness of these hackers..