Also in this playlist...
This transcript is automatically generated
All right welcome back twenty past the -- -- once you out here in the East Coast we now go back to New York Chris -- joining aside from cassava.
-- co-founder and talking about Internet security is specifically -- talking about.
A sim card security and it comes at a time when we're hearing also about a significant case New Jersey we'll get to that a second -- of -- Chris thanks for joining us via Skype.
They're very -- -- -- -- how will always enjoy keep coming on here I struck with a look the latest news personal -- this couple other things about how the US attorney in New Jersey.
You heard about the case I was announced the largest hacking data breach and scheme ever prosecuted in the US kind of goes along but we're seeing really nationwide correct.
-- I think what we're seeing -- on a weekly basis you that it does not.
Yet when when you hear about a case like this what what comes to mind I mean is it.
What can people do at home what are some of the things and -- -- Pique your interest about this case specifically.
00 when it comes to credit card we really have to kind of rely on the credit card companies do protect because our credit card.
Numbers get used all over the place so really we just.
It comes down to this kind of protection that the the -- -- the credit card companies are going to give the consumers.
Dogs don't I don't -- Eventually you know credit card number we'll get we'll get compromised by a criminal network like that one.
Right and and it's becoming as you know easier needed to do that -- this like weird.
We're -- us on our office Saturday how you can just pretty much you know how they install those holes -- -- things on some of the gas stations where he's like a card come.
Sort of -- and after -- they enjoy information like that.
Yeah I mean there's there's so many ways the main factors your credit card number can be compromised them.
He's very directly credit card numbers and -- -- I mean it seemed like my own credit card you compromise -- get a phone call from the bank at least one and one the year if not more often than that I have to you know be a new.
To deal with all the updates of the billing companies that I have you.
-- So I know a lot of people don't.
Yes frustrating part.
Yes the first reported having to go -- -- should be do online banking have to go back and re enter your number everywhere and Palestinian noticing mutilating your payment -- connect -- forgot that was an automatic and with that cardiac decided changes.
From -- frustrating -- for sure.
I'm to sim -- security that's -- some people I don't think realizes really kind of the next step lot of credit cards and we -- there's so many different ways.
We're having to deal with security threats.
And while we hear about a morning national level and in whole NSA scandal for example being -- or watched or listened to.
Of the fact is that probably the more real realistic threat for people at home is is affecting your sim card now can be hacked into his law.
Oh yeah that's one album I mean.
And they wanted to going to be talked about it black hat conference next -- -- -- Vegas was one of the premier packing company does you -- you're hacking conference in the world.
And did some of the heat -- of that.
Will be released to the public I think right now the researchers found the vulnerability in the -- cards as.
Already disclosed that you'd be the carrier network that you found affected and all that it -- -- card manufacturers.
But -- believe they're going to use in car manufacturers.
To provide in -- to the major carrier network and the I think the idea is that so far maybe around 20% of them are deemed to be affected and a remote attack literally.
The an attacker can then view and edit -- that message or -- and -- -- -- and through that crop gain control of your -- he.
At that point they can wrapped up on charges they can redirect your phone calls.
And people for -- that your your home.
Getting -- cameras well your audio on top of it.
-- the we that we put together animal graphic for -- people -- -- give me an idea about sim card security and and and a few bullet points really that kind of explains it all everything from remotely installing software that operates independently from a phone.
Steals data from the sim card steals mobile identity changes expenses to your account.
I mean because a Smart -- were doing so much now with our phones.
Many every day seems to expand -- -- control your home for crying out loud now you can.
Destroy your life easier here's your heater you're your door locks everything you can watch what you're -- doing for -- -- -- your dog and talked to -- mean it's it's pretty amazing how some of actually.
Break in your phone and control all that.
Yeah I mean it isn't the first time people have been you know we've seen that type of attack and it's probably not what I'm either -- it did.
The interesting thing about this one is it it's an attack on the same card technology.
War which we haven't seen too much.
Effort in that area and we haven't seen that the widespread attack.
A potential attack in that area.
I'm just the united does that look down by our researcher and -- responsibly so far we know it's not being -- I'll buy it buy it -- or criminal networks or.
Other interest -- parties there.
What with the -- security what do you -- your your expertise what can people home do.
I mean really where there seems like every time we turn around is a new area that we can get hacked into and have your computer is our phones or cars look I mean it's.
It's one thing after another look at people home do specifically -- sim card security.
Or anything they kind of makes -- a -- on a basic sense makes use somebody they passed by for example some of them know rob somebody in a neighborhood if you leave the door locked automatically you're gonna be the first one probably is going to be broken into where if you have.
You know way.
Surveillance system -- doors locked Republican past who have made somebody else for same kind of thing we're talking about phones.
Yeah I mean some of the security there are security providers.
Focused on mobile.
Mobile devices and provide security.
I don't I don't actually know how to help would pit area because that Ben -- exactly.
That kind of software so many cases that security software might might not even know that the but it.
And that's one of the more series.
That some of these type of attack in -- The thing I think the fact that have been carried out against Pete even that thirty years that can subvert other security software as well.
So I didn't know really -- rubber bullet answer.
On what people should do other than to deal where.
Bed did technology that we're using is vulnerable.
And a lot of -- -- and it will continue to be vulnerable for some time.
And did keep that in your in your mind when you're deciding do you what.
When you're studying how do you -- you're going you're divided and you know people book dead.
Don't put your home address into your car GPS system right because somebody might break into your home I -- your car and then.
Bill immediately here and have to -- where you live go where you live and then -- garage door opener to -- act that you're out.
That -- the mentality that -- kind of thinking through.
But but it kind of paranoid mentality do because -- And that's the -- -- of and operate in the in this.
Security industry and he he's he's he's I think this patent pending existing vulnerabilities they put all the time.
It's simply put just pay attention to your stuff and second I mean like everything else the only only really your house for a number of days you pay attention to it objectively if somebody -- -- -- -- Did you have to think things through you know to think about Perry's new technology right now with the other than that you kind of have to rely on the credit card companies -- Watch your back when your credit -- -- compromise.
-- Chris Webber joining us from Spokane Washington we appreciate your time has always co-founder cassava.
You can find in a cassava dot com always appreciate your insight on security and thanks for joining says it has always -- -- shirt be talking to you in the coming weeks.
-- -- --
Filter by section