Also in this playlist...
This transcript is automatically generated
Line right now we're gonna move up the coast we're gonna stay here no New Yorkers know Chicago in Chicago winds right now -- to Seattle.
-- talk with Jason last for Jason is the co-founder of cassava LLC what's interesting about Jason.
It is one -- -- this -- Dallas -- to what I saw the notes that we were going over this week about our guest was -- fact of the whole cyber threat because I know what's while it's not.
Sexy to talk about cyber threats and can be -- -- you might glass over at home.
It's a really important you talk about this right now you're talking about your iphones or blackberries your computers your ipads all these things.
Are susceptible and all already being hacked in Jason I know you worked with China to help try to reduce.
Your company does reduce some of the threats out there but you know China of course is being.
Is being accused of really perpetrating some of these things.
Well yes and it's it's it's a known fact that there are many attacks happening.
In China coming towards the US now the question is whether there -- originating in China from kind of a state sponsored.
Activity or if these attacks are being routed through China.
One of the real issues with the cyber security and cyber security enforcement is where to these attacks come from.
Right because the Internet is so large the Internet is not.
Really traceable so if you have an attack originating in Romania for example the routed through China -- are the Chinese to blame right.
So it's it's it's it's it it's it's a real tough nut to crack.
You know Jason really isn't in one of the things it's been interesting -- read an article couple weeks ago and this is something we may actually do it here in the West Coast and that is.
You're seeing more companies specifically in some of these countries.
Hiring hackers to hack into American corporations other western corporations and Steelers secrets in -- or not.
Hiding it at all anymore it's pretty much out in the open it's almost like there's a -- on the street only this fist fights over the Internet.
Well yes again another problem is that the whole concept of cyber security in and cyber warfare and and what a cyber attack is.
Has different meanings to different sides and if you will on the fight.
So here in the US we would consider a cyber attack something along the lines of you've reached -- network.
You've attacked my assistants you've stolen my IP.
Over in China in the -- and and you know Russia or some of the other countries they consider cyber security and cyber attack.
More of a disruption of their information containment.
And so in a place like China they have the great firewall of China which you may have heard of where they try and keep out you know only approved -- only approved information.
They can -- breaches of that.
A serious nature so you know there's a difference in the concept of what.
He's considered intellectual property you know there are different laws and right states and again the problem is that you've got.
Different countries in different parts of the world with different laws.
But they're all interconnected and they're all able to touch one another.
Right -- mile and for viewers at home while this is a -- show it's pretty much Barbara lives -- -- technology now -- more involved in our allies never before me and pretty much everyone can agree with that from your car being connected to your phone.
To your computer asks a lot and what's interesting I think is the fact that in recent years the last major tech revolution of course with television.
And you had countries like even to this day we travel of course -- a lot of plays internationally covers a major stories.
And in the Middle East you have countries that are doing -- -- -- -- -- China with their firewall Myanmar you have a number of countries around the globe that do what they can to.
To control -- of the formation in and out and they specifically want their only their information to get out.
Now you've got this medium of the Internet and you have this happening you know in Syria for example.
And people having to finally to circumnavigate to get their information out or in I think it's very interesting and and of course -- conversely while there's a positive to it with people getting information -- you have the hacking situation.
I want to bring -- -- chat right now from Carlos Carmona he says you know what about the new Internet privacy laws and are they still on the table.
This could be Internet game changer this actually comes into play as well because the NSA for example building that brand new massive facility in you talk.
That's meant to kind of watch over us here in the US.
So what do you think about that Jason with the NSA and how this is all coming into play and and the whole idea Internet privacy.
You know I am a big believer in in Internet privacy I believe in privacy I'm not a big fan of of social networking but that that's my own personal choice you know other people like to do it.
Unfortunately this has become a medium of information exchange.
And what kind of information is being exchanged over these networks or these channels I think is probably of material national defense importance.
So at some -- -- we have to realize that the Internet is not.
Now whether you need to be able to have some kind of legal justification.
Of intercepting this like a telephone line you know that that's not really my purview Lama and a security guy.
Right and there's an idea that you need to have some security in the same time if you could find a threat of course you -- to be able to address it.
-- one of our viewers Glen hunt has tweet it in any any says -- -- I was glad that this shows started up think's going for that but he also says.
How do you feel about the -- win wanting to police the Internet is so -- talking about the US and China may be trying to work together which is a bit of irony -- -- that China.
Under most people's belief that the threats do somehow comb through -- whether they originally originated there or not it is a different subject.
But what do you think about the U win possibly getting involved.
Well of course I think you know you have nation writes.
And and nations need to decide what information is appropriate for their own citizens.
But I do think that having a definition of what a line in the sand is meaning.
This kind of attack is just a no go.
-- it would probably be helpful I mean when you talk about your devices and you talk about your via Internet connectivity don't forget.
Major in national infrastructure is now accessible on the Internet there's.
Water plants there's power plants.
And these things are subject to attack clearly.
Clearly an attack of that nature you know should be defined as some kind of act of sabotage.
And so I think.
Maybe in that respect it would be useful to have a broad set of definitions of what constitutes an extremely serious.
If you're in an attack.
Right Jason -- -- -- company helps workers -- to reduce cyber threats any thing.
Again we have a lot of people watching it like myself I mean with even on the tech nerd in some respects I'm not.
The point where.
I'm just enough to be dangerous.
And most people are now what -- -- -- included and they really kind of crosses all age groups.
Is there -- home that people are watching right now could do to help maybe reduce the cyber threat that they face whether beyond their phone or on their computer rather -- patter.
It is an and they can give it another TVs for crying -- Heidi you're TVs -- -- -- if they stay home somebody can do.
-- talking about everything -- run our cars being hacked into.
I would say the number one thing people could do right now is change their passwords often and change them frequently.
You also want to be able to use different passwords for different kinds of services so.
Have a different password for your email account have a different password for your FaceBook account have a different password for your PayPal account.
Because what happens is that most of us -- a little bit lazy.
Most of us like to not remember three or four or five or six or seven different passwords -- I like to use the same password on all of our devices and services.
But remember once one of those devices is breached and one of -- love those sets of credentials are taken.
The attacker -- has access to everything.
If you're changing your passwords frequently and you using different devices you've reduced your what we would call your -- threat here tax service dramatically.
Goodbyes and Jason glass -- up the coast in Seattle we appreciate your time do so once again the CEO and founder of cassava LC I'm sure we'll have you back as we continue to talk about the the threats out there those of that advice again it very simple we were.
Doing a story about a year ago at a Starbucks and we had a guy who's a reformed hacker who sat down and on his computer he showed me 2827.
People that -- -- line.
In the Wi-Fi range of that Starbucks of those -- he people he could easily hacked in the fourteenth.
Right and it's all because of the passwords are easy to crack and they probably use the same password on the reserve or even -- Right or didn't even Howard didn't even -- this in -- what exactly the fifty exactly did he must replace again for -- for joining us we'll talk to you soon.
Thank you very much.
Filter by section