Real Future What Happens When You Dare Expert Hackers To Hack You Episode 8
Vložit
- čas přidán 4. 03. 2016
- This Documentary Is about cyber hacking and how easily hackers can fish for your information and thus can have the power to make you homeless. It’s a scary thought, but in the end there is somewhat a relief in knowing what you need to work on in terms of your security. #lexihut
CREDITS TO: A FUSION ORIGINAL PRODUCTION 2015
"do you have any of those little things you put over the camera on the laptop?"
yeah, its called tape
Shutter
FLEX TAPE
"Because now at least, I know what I have to fix"
No you don't.
Abdou Benbada dude .. that sounded so epic
Never trust a crying baby!
7:40 yep, she's a Russian hacker
cyka blyat? LOL
This is literally my homework assignment
so this is the video I have to thank for all those security questions when I call to get a better deal at my internet provider.
Very interesting :)
Great piece.
Why are noone wearing neon sunglasses, mohawks and leather trenchcoats?
Fake hackers
Cuz wrench is taking off his mask and jacket
awesome guys keep it up
banu prathap ,
no longer public
7:21 Miracle Happened
Had me crackin up....
Lmao
LOOL
lol
@@uvbe didn't get it
he knows your history
It not your cell phone company protecting you - its the outsourced call center guy in a developing country who doesn't really care, they just have KPIs of successfully (no complaint from the caller) calls per hour.
That's their metric, thats what they get paid to work to.
original meaning of hacker is so twisted by modern mass media
Skid Hackers during this video: *Right that downright that down*
How to basic hack
First to last step
1. Go on your mothers/fathers room
2.now try to locate the bag
3.now if you locate it get the Credit card info
4.enjoy your item
Is there anything we can put on the laptop or cell to protect?
so which things you will fix ?
When I want to try and make something personal go protect my devices but I'm not smart enough or logical to do it 😑
ryanizer11 u
Always remember to use 2FA.
If this guy had 2FA on his account (assuming his phone company had provided this feature), the first attack won't have work. Even if she changes the password, she still won't be able to get into the account without also acquiring his phone.
That's effectively what the SMS "send a pin to the phone" was. She convinced the support rep to circumvent it. The person, not the technology, was the flaw there. Get that far, move his phone number to a new device, and you trip over why SMS based 2FA has mostly disappeared from anywhere competent, because the weaknesses exactly her attack is designed to pivot to then exploit were used *heavily* when 2fa originally started to take off, primarily over SMS.
7:20 is a miracle
Lol I missed it at first.
These people amaze me because none of this makes sense in my head
Take a few security courses and you'll discover that this show just touches the tip of the iceberg. If some cyber criminal is targeting you for a purpose you'd have to be locked up like Fort Knox to prevent intrusion.
@Dog C4 Wow I feel bad for you. But this is an example of why advocating for security and privacy is important. You should tell your experience as much as you can as a warning to others. It hasn't happened to me but I tend to be paranoid, so when I give warnings ppl say 'Oh he's paranoid.' So my words fall on deft ears.
As for brand names I found it doesn't matter. Hardware is related to reliability.... and from my experience I stay away from Dell.
I still use a google account but i switched to Firefox. And recently was found not so private; reversing anonymous statistical data is doable. So now I switched to the Brave browser. The desktop version can also connect through the TOR net.
I use bitwarden to create long password and maintain them but i only use my phone to access that; the network at my workplace is behind a proxy so privacy is not guaranteed.
I hope your life is back to normal. Ppl say you shouldn't live in fear but living without taking precautions is careless.
Please share your story.
9:08 i really thought them lines on the ground was Ethanet cabels hhhhhhh
A full video and no mention of 2 factor authentication?
How to any fb hacked??
Wtf what a engineer😂
This is scary
Dan Tentler is pretty good. Is he still around for real?
1:05 samy kamkar is a legend
QQQQQUUUUUUUTTTTTTTTT WEEK 1 YOSHAAAAA
Aaaannnd my camera is now covered with Blue-Tac
i don't have any online information except my wrong address and even if he can know my address he wouldn't even reach it lol
The video wasn't playing
all i want to do now is run my antivirus
Ok I know this is weird but I think Jess is REALLLLY CUTE
DAVID ALBERGO yes .. it IS weird
How the hell is that weird? Lol. However, I'm rather fond of Marina....
hey thumbs up samy kamkar
Name this music
Too bad, I have a fool proof plan.
and after watching this I am thinking that someone can even screw up my antivirus 😑😑😑
Sayan Chakraborty not even hard lol. its funny to see how many people rely on their av and feel safe with it :D
A200K Yes lol
She is Good.
So basically he made him download a Remote Desktop and keystroke logger and gave him access to his pc. Lol I could teach someone to do that in 5 minutes
teach me
Now that a tricky mother
I stills use tape to cover my camera
My hackers are people I live with, they changed my device cams to one of those that can see through the tape & at night.. Like the scanner cams at train stations that see through your luggage or your infrared cctv cams that can capture in the dark.. Unlike your regular device cams that would just capture a black screen in the dark
With social engineering.. u can hack anything ;)
Worlds greatest hackers vs anonymous,fancy bear,cyber wolf the greatest was ever 3 massive hacker groups
Which model of SDR is connect to the Mac? 8:27
JE VEUX CETTE VIDEO en langue francais
lmao he just used BEeF
Now I'm scared of kids ambushing me with martial arts. #cobrakai
Black Lanner watch out for me then cause i have both of those qualities.
*i want her instagram or twitter please*
those mic on earphones aren't that good in order to receive baby cry, and the guy on the other side would be like "what baby?"
they're calling from the computer and sending the crying baby voice to the caller from computer
6:50 ish you clicked a link - just dont lol
I mean that guy literally just sent you a rat not even great work it wasn’t even sophisticated maybe if the rat locked your screen and set cookie loggers on it then you could say that he’s very good at his job or remove cookie logger and add keylogger
Any Nirma students here !!!
i want to live in that place😁
Holy shit! Im gonna change all my passwords and take a shower.
Whos here from CAB240
IFB240
@@FocusedLoop been awaiting this reply
in 30 seconds she has my personal email adress..
so couple things i undertand this informative.
Number 1 call centres have security which is taken vey seriously especially about customers information. the process is air tight now and getting tighter by the year. Secondly you'd have to be a real moron to allow download something that gives someoen access to your pc.
You reuploaded a video without permission.
Don't blame me when you get a copyright strike.
Maxim Terra at least someone commented it
lol. i would have hacked you in a second. network engineering gotta love it.
you say hackers are everywhere... then talk about targets of hacking.
Fail intro?
Nemesi what the fuck are you saying
Nemesi found another script kiddies that declares the intro is wrong🤦🏼♀️
Fail intro you are the only person who comment that here