logo
episode-header-image
Sep 2022
29m 32s

How To Protect Yourself From Social Engi...

Vice
About this episode

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an employee of the company and tricked them into giving up the keys to the company. It doesn’t matter how fancy your 2FA system is if an employee is just gonna give up their SMS codes to some rando on the phone.


But worry not. There are ways to protect yourself and your company against such attacks. With me today to work through it all is Rachel Tobac. Tobac is a hacker and the CEO of SocialProof Security, a company that aims to get your organization politely paranoid.


She also, coincidentally, just published a really amazing video that dramatizes a lot about what we’re going to talk about today. You can find it on Twitter @racheltobac.


Stories discussed in this episode:


The Uber Hack Shows Push Notification 2FA Has a Downside: It’s Too Annoying


How a Third-Party SMS Service Was Used to Take Over Signal Accounts


Hackers Convinced Twitter Employee to Help Them Hijack Accounts


We’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. 


Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.


Sign up for Motherboard’s daily newsletter for a regular dose of our original reporting, plus behind-the-scenes content about our biggest stories.



Hosted on Acast. See acast.com/privacy for more information.

Up next
Feb 2024
Why Congress's Fears of Russian Space Nukes Is Political Theatre
Cyber is a show covering a diverse range of topics. We’ve covered everything from crypto to AI to online cults. If it touches technology or online culture, we’ll talk about it. That’s how you get an episode like today’s, which is both a deep dive into professional wrestling’s lat ... Show More
1 h
Feb 2024
AI Deepfakes Are Everywhere and Congress is Completely Out of Their Depth
An AI-generated Biden called voters in New Hampshire ahead of the primary and told them to stay home. X locked down the search term “Taylor Swift” after AI-generated nudes of the pop giant flooded the platform. In the wake of both scandals, Congress has struggled with how to figh ... Show More
50m 29s
Feb 2024
Tech Used to Be Bleeding Edge, Now it’s Just Bleeding
Ten years ago, Big Tech reached a peak. Facebook had wormed its way into the lives of billions of people. The mainstream news covered iPhones releases like they were Taylor Swift concerts. Elon Musk was promising to colonize Mars and fill the streets with self-driving cars. In 20 ... Show More
1h 7m
Recommended Episodes
Jul 2020
69: Human Hacker
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans ... Show More
1h 4m
Jan 2019
[Bonus] Introducing CYBER, a Hacking Podcast by Motherboard
Motherboard has launched a new podcast, called CYBER. It's available on Apple Podcasts and on whatever app you listen to.Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the inf ... Show More
1m 14s
Jan 2024
Another day, another Blizzard attack.
Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go ... Show More
35m 32s
Nov 2023
Think before you shrink! And our guest is faked
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams?All this and much more is discussed in the latest edition of the “Smashin ... Show More
1h 4m
Feb 2023
A boom of infostealers and stolen credentials.
Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dra ... Show More
48m 27s
Oct 2020
What are the rules of hacking
We've spoken about the dark side of hacking and we've shown you that hacking can be used for good. But is there a line? And what happens when you cross it? Ex-Hacker and Brand Ambassador of CTRL Group Bastien Treptel is joined by Skeeve Stevens, the first Australian to go to jail ... Show More
29m 25s
Apr 2019
Poisoned porn ads, the A word, and why why why Wipro?
The hacker who lived the high life after spreading malware via porn sites, Wipro demonstrates how to turn a cybersecurity crisis into a PR disaster, and why are humans listening in to your Alexa conversations?All this and much much more is discussed in the latest edition of the " ... Show More
52m 41s
May 2020
The Dark Secrets of a Hacking Hero
In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilfrac ... Show More
30m 39s
Sep 2021
Flipping dating apps, and crypto rewards for criminals
How to find your match on the Bumble dating app, convicted criminals make money out of cryptocurrency, and there are concerns about data in Afghanistan.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans ... Show More
47m 41s