James Lyne: Everyday cybercrime -- and what you can do about it
Vložit
- čas přidán 15. 09. 2013
- How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design -- plus science, business, global issues, the arts and much more.
Find closed captions and translated subtitles in many languages at www.ted.com/translate
Follow TED news on Twitter: / tednews
Like TED on Facebook: / ted
Subscribe to our channel: / tedtalksdirector - Věda a technologie
Kind of awkward when he's making all of these jokes with no reaction. I found myself sharply exhaling through my nose. Great talk.
he ate his balls up there
what an amazing crowd!! just so energetic and humorous..!!!
that public is dead LMFAO
Thank you everyone for the comments (and on the TED site). Great to see the security pros got it was a simplified demo and talk to try and capture more mainstream attention. Articles due shortly to outline the best practices for those that are interested.
Charming presentation
I feel bad Mr Lyne he put some neat jokes and no one laughed :(
True. I feel for the crowd though. They missed out a lot. :)
awseomeACE I personally thought this was one of the best Ted talks. he had a few funnies that no one laughed at... must of been a German audience :P
I thought I was the only one whod noticed. lol
They did laugh. But there's no microphone on the audience so you didn't hear them ;)
You could hear some of the laughter though, so unless that laughter was so loud it was picked up by his cheek mic your theory does not hold up. Besides I've seen other TED talks where the audience were definitely heard laughing. try czcams.com/video/_QdPW8JrYzQ/video.html or my favourite, czcams.com/video/C4Uc-cztsJo/video.html
Thank you, I'm really glad it had an impact! Spread the word and tell some family and friends :)
Thank you
Thank you, really glad you enjoyed it. We need to build up more discussion in this area as it is starting to affect our society more and more.
This talk is really funny but I feel like the audience were boomers
Ah, finally! I was waiting for TED to start addressing this stuff -- I almost wish there was a whole TED event just dedicated to cybercrime -- James Lyne's lecture addresses a huge problem that has far-reaching effects, and takes more than the time he is allotted to fully unpack. It points to so many other issues that could be discussed individually. Hoping to see more of this -- thanks James!
lol. Did they hide the identity of the dolphin at 12:03 ?
Very true. Whilst some operating systems due have architectural advantages over others the user will always be a weakness. I tried in the talk to raise awareness for people outside the security community - WE all know these things but it's important to make others thing about it too.
Was the audience dead? The only other TED talk I laughed so much while watching was the scam email one!
Did you see the sequel to the scam email talk? czcams.com/video/C4Uc-cztsJo/video.html
Very good presentation! It was delivered with humor, but yet the seriousness of the issues facing us all in protecting our data was heard loud and clear. I am sharing the link to this with many family members who don't quite understand the seriousness behind logical protection.
I am a software engineering student and I found your talk extremely informative and fascinating! Thank you so much for this talk! People need to treat online privacy like the locks on their doors.
I've never seen such an active discussion going on a TED video. Really good to see this.
#1.
Absolutely riveting presentation!. I'm just over 60, was in the R.A.A.F. - communications/security/intel. gathering.
Only during my last couple of years did computers make their presence known, but what I saw and heard really troubled me, and still does.
Most people have virtually 'no idea' of REAL security, they merely hover around the edges of it, thinking what they do is their best security practice, it's their laziness and nievete that is their own major security threat.
In...
One of the most informative talks I've seen.
Thank you Dan that's very kind. There was so much more that could have been covered, but it's a short talk and hard to decide. It's far from perfect but I am glad that some people like yourself found it valuable :)
I'm an IT engineer, just discovered James today on TED. Really good talk because it's nice and easy for none tech people to understand. Also liked the point about phones, ipads, Androids etc giving away previously connected WIFI APs when they are scanning. You didn't seem to take this further though? I assume time reasons. Explaining that people can then setup a fake AP with the same name, so if you're in the area, you're connect to the rough AP rather than the genuine one.
Dude you are awesome, a not boring IT related topic talk is always good, and I hope to see you more often here!
One of the great TEDTalk I had ever seen.
They were actually great. It's a big room with lots of people and I'm the only one with a mic. They asked lots of great questions afterwards and were very engaged. I can't complain!
Thanks for the talk - one of the better on TED. Subbed. Your suggestion for asking yourself "is this information something that I want to share online or not?" is something that people won't be able to answer in most cases I suspect because we can't predict in what contexts it be used in.
Sharing your dob for example on a dating site could be very useful when used in conjunction with other data to tie you down but that wouldn't be an obvious consideration upfront - i.e. today's reality.
This talk very well done, well explained, well illustrated, and shockingly relevant. Thanks for sharing this.
And a HUGE thank you to those who provided intelligence and information for the talk, SophosLabs and those referenced in the URL in the talk (about the gang) who put it together. You guys are awesome.
Thank you! Booklet is nearly ready :) Will post it here in reply.
So worth watching and sharing!
There are some great initiatives trying to improve this such as the Rasberry PI project. We need to make sure that people not only know how to use technology but that there is a community of people who understand how it works too.
That was an amazing learning experience; Thanks James
Very insightful! Definitely worth a watch.
Very charismatic and interesting speaker! Every minute was engaging!
James, that was a fantastic talk. Thanks for the valuable info on protecting ourselves from viruses and attacks.
James Lyne, I hope that the world have many people like you, thank you.
Awesome lecture!!! Objective and intuitive.
Hi thanks for the info you share with us..it's great you are teaching people how to protect themselves
that said, it was done that way for various use cases involving multiple AP and now it is there it's tougher to change!
Thank you.
Thank you James!
Good information, but scary. Knowing what cyber criminals can do.
Great speech James! Had the perfect balance of humor and information making it very engaging to listen to :)
Excellent talk.
worth to listen to, helpful !
thank you for this information
This was so informative. Even though I knew the basics about hacking and viruses I learned a lot. Loved the Presentation.
That was a great talk! Also quite entertaining!
Excellent.
2020 still mesmerising
Thanks Brandon, really glad you enjoyed it :)
Tremenda conferencia; muy informativa, practica y aterrizada en la actualidad del cibercrimen; gracias TED!!
Great talk
What a great talk
I will be posting it on here very shortly!
Great job James!
I swear you are the first TED-talks person to interact via youtube, not that everyone here realizes it, but that kinda makes you a celebrity and that's pretty awesome. Thanks for sharing. Oh and btw have you ever gone to or been a spokesperson at def-con?
Excellent point. I had an argument with a friend recently who said security is a temporal issue - the new generation won't have the same problems. Unfortunately whilst familiarity with technology has increased, the notion of privacy and security in many cases has reduced. People are prepared to give up more information and don't see it as a risk. Education and awareness are one of our biggest problems.
Absolutely not! I keep on practicing and trying to improve though :)
Very good speak. This should be mandatory to watch for every user of a PC or smartphone.
Good Talk!
I had to remind myself of that several times through the talk when I gave it. Huge room! I am really glad you liked it though :)
i benefited a lot from this, very interesting!
james lyne you rock!... thank you...
Informative talk.
one of the best ted talks that ive heard.
You have not heard much then
That was brilliant James.
Amazing!
Thank you :)
Yep! Understanding these risks really helps as it enables us to tweak and write appropriate algorithms we use to design a communication system. Clearly u r the Guru in this field and I hope I can learn lots from U. Hungry for knowledge! Any special blog you'd refer to? :) Cheers!
A pleasure, I'm glad you liked it. There's plenty more to pick up and lots of good material online if you want to learn more.
really good!
AMAZING!
good advice.
this was very informative
Thanks.
Already followed all handles ;) you guys do a great job.
Peace, from Palestine.
Good job on the presentation. You've probably come to realize the older generations are already lost to this cyber "war", as too few of them will ever realize the scope of their computer's capabilities. However, it's the younger generations' growing tendency to look at technology from a black box PoV that is truly scary. As computing becomes more and more console-ified and cloud-y, it'll only get worse.
The same happened to electronics w/ VLSI, but people couldn't hack your fridge from Russia.
Very informative
Brilliant talk! :)
I love that site.
Interesting Talk.
Best ted talk.
very interesting, thank you!
We hack everything,cash app flip,bitcoin investment,PayPal flip,iPhone hack,credit score boost.......dm on Instagram page cyber_crime__hacker
Otimo video não sabia disso
Very much agreed.
Thank you! I am shocked about the query boxes, but I didn't quite catch the point about the windows calculator. Hopefully you could put together a presentation for kids that gets the point across. I assume game sites,like Barbie dress up, etc, are virus ridden.
I miss the days of talking to my buddy on two tin cans connected with a string...
I have learnt alot.
Hello everyone, thanks for the comments. I definitely tried to balance simplicity and creating interest for those outside security more so than in. I couldn't fit top tips in to the talk time, but suggestions like Open DNS are awesome. A little bit of the basics would enhance security a great deal for all kinds of people and then we can earn the right to work on more advanced things.
Hi there! That's an excellent question. A scan with an up to date anti-malware product is a good quick check to see if malicious code is on your system. A great deal of the mainstream malware like FakeAV, Randsomeware, Banking Trojans etc will show up if not at first shortly after. Some malicious code of a more targeted nature may not be detected. It gets pretty difficult to detect this unless you are prepared to do some fairly rigorous checks on your system.
Your an awesome speaker James. Not usually expected from a computer geek !. We're you always a natural speaker?
Hey there, let me clarify. The device in question LOOKS like a USB key but is actually a small programmable keyboard. The idea is to bypass exactly the control you describe. The device plugs in and then types out the malicious payload rather than running it as a file. This means it can run on a system even where autorun is disabled. There are a few of these devices but they don't cost much to make or acquire. Hope that makes more sense now :)
Nice!
Had an out of band question about detecting/clearing rootkits. Unfortunately detecting rootkits can be quite a challenge -even up to date AV often misses it because it's running at a higher level than the security software itself. Prevention is obviously good but not always realistic. Rootkit cleanup is best done from a separate boot disk where it is not running, or really by rebuilding/restoring from a backup.
First of all, very entertaining talk. I'm an IT guy who also happens to find security interesting. One question though, why didn't you suggest the use of Free & Open Source software and its inherent security benefits it has in comparison to proprietary platforms?
Awesome
Nice speech
As to how to remove it, a great deal of malware can be removed with clean up tools. Sometimes a particularly nasty piece of malware a cleanup from a separate book disk. In the worst instances rebuilding to a backup may be necessary. It's very prudent to have a backup on this basis.
My computer science A-levels were quite good. We did some basic algorithms and data structures which teaches you a lot about how computers work already.
thank*
Absolutely. Use a boot disk or another computer to mount the file system is a good call. It's getting harder to insert rootkits with trusted boot mechanisms providing hardware through to bootloader trust relationships with more modern operating sytems, but there are plenty around without that!
That is an excellent point - I entirely agree. Those that know how to USE technology are becoming far more common. The number of people who know how it actually works is far too small.
2:00 That ad that that guy who offered businesses DDOS services - doesn't that violate CZcams's terms of service? I've had accounts of mine canned for _opinions_ , but not touching any criminal activity