Secret Tips to Keep Your Cryptocurrency Safe From Cybercrime

November 02, 2022 00:30:34
Secret Tips to Keep Your Cryptocurrency Safe From Cybercrime
Chief of Cybersecurity
Secret Tips to Keep Your Cryptocurrency Safe From Cybercrime

Nov 02 2022 | 00:30:34

/

Hosted By

Dewayne Hart

Show Notes

Bitcoin and other types of cryptocurrencies have exploded onto the market in recent years, and based on virtual currency's popularity, it seems to be here to stay. Cryptocurrencies are digital or virtual currencies secured by cryptography, with many using decentralized networks based on blockchain technology – an open, distributed ledger that records transactions in code. Crypto is stored in a digital "wallet" on a website, computer, or an external hard drive. To put it simply, Investopedia defines cryptocurrencies as systems that allow for secure online payments denominated in virtual "tokens."

The first cryptocurrency launched a little over a decade ago, was created by Satoshi Nakamoto, who described it as "an electronic payment system based on cryptographic proof instead of trust." Other common types of cryptocurrency include Litecoin, Namecoin, Dogecoin, Ethereum, Cardano, and others. In March 2021, there were reportedly over 18.6 million bitcoins in circulation, with a total market cap of around $927 billion.

Technology has made almost every aspect of our lives – and the lives of criminals – easier. The blockchain has fostered an ecosystem in which illicit actors can efficiently operate anonymously and internationally, stalling financial investigations and setting the stage for increased crypto crime. BitCoin has been excellent and volatile when investing, but deeper concerns, such as ransomware and financial fraud, are lurking beneath your bank account. Do you feel rich? This podcast will reveal SECRET tips to keep your cryptocurrency safe from cybercrime. By following these tips, you'll be able to keep your coins safe from hackers and thieves.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:03.240 --> 00:00:05.919 Alright, it's time. It's that time of the hour, time of the 2 00:00:06.000 --> 00:00:08.560 day, time of the year. Uh. And the man of the year. 3 00:00:08.560 --> 00:00:10.759 I don't know if it's official somewhere, you've got to be the man 4 00:00:10.800 --> 00:00:15.119 of the year for cryptocurrency. Uh, what I'm talking about the Dwayne Heart, 5 00:00:15.160 --> 00:00:18.039 not Dwayne Heart, the Duyne Heart is joining us in the studio once 6 00:00:18.079 --> 00:00:24.160 again for another conversation about cryptocurrency. Alright, and today's topics specifically, is 7 00:00:24.199 --> 00:00:29.120 gonna be about all things cryptocurrency. We talk Actually, we talked about a 8 00:00:29.160 --> 00:00:33.039 lot about cybersecurity right on all levels from A to Z. This episode is 9 00:00:33.039 --> 00:00:36.600 about cryptocurrency, and here's some of the hot points we're gonna hit. Um, 10 00:00:36.759 --> 00:00:42.240 the cryptocurrency exchange network, financial scams, account takeovers, mobile scams, 11 00:00:42.240 --> 00:00:45.719 which I think is really interesting. That's a surface we've never really kind of 12 00:00:45.759 --> 00:00:50.320 delved into. So maybe we're gonna cuch on touch on it. Maybe an 13 00:00:50.520 --> 00:00:54.560 upcoming episode just on that topic. Also, um, for businesses, know 14 00:00:54.679 --> 00:00:58.359 your customer is should be on your short list, and crypto mining. Those 15 00:00:58.359 --> 00:01:00.200 are just a few of the topics we're gonna hit on. But Dwayne, 16 00:01:00.280 --> 00:01:04.599 before we kick things off, Actually, if you haven't heard of Dwayne Hart 17 00:01:04.640 --> 00:01:08.000 dot Uh he's not dot com, that's this website, right, But if 18 00:01:08.079 --> 00:01:11.560 you gotta check out Dwayne Harart dot com for all things about cryptocurrency. He 19 00:01:11.799 --> 00:01:15.280 literally wrote the book on the subject matter. He's an expert guru if you 20 00:01:15.319 --> 00:01:19.359 will. Um, he has a podcast as well as this interview, and 21 00:01:19.359 --> 00:01:23.480 as well as you YouTube channel. So having said that, Dwayne, let's 22 00:01:23.519 --> 00:01:26.719 start before we talk about cryptocurrency, let's talk about the blockchain itself and how 23 00:01:26.760 --> 00:01:34.319 it works. Shall Okay, blockchain itself comes from typical crypto background, all 24 00:01:34.400 --> 00:01:38.519 right, Um, it just so happened that it is starting to be used 25 00:01:38.519 --> 00:01:42.319 in the financial mins. So when you think of blockchain and then think about 26 00:01:42.400 --> 00:01:49.439 a chain link, and think about each link representative block, and each one 27 00:01:49.480 --> 00:01:55.359 of those blocks are attached to each other. So in order for you to 28 00:01:56.519 --> 00:01:59.920 break this syncle some change, then you've got to break all the blocks apart 29 00:02:00.040 --> 00:02:05.480 from each other. So what's so interesting, especially by cryptocurrency, is that 30 00:02:05.519 --> 00:02:09.560 it used blockchain and and it's used hash and algorithms, and so those hash 31 00:02:09.639 --> 00:02:14.960 and algorithms are pretty much attached to each block. And if you are trying 32 00:02:15.000 --> 00:02:21.439 to break any type of blockchain, uh, Ledger, Well, I guess 33 00:02:21.439 --> 00:02:25.439 what, you gotta break all of them apart because they all are connected together. 34 00:02:27.240 --> 00:02:30.479 And see now, you know, it's always a discussion that that is 35 00:02:30.919 --> 00:02:38.960 that is irreversible, and it is irreversible. But trust me, UM, 36 00:02:39.080 --> 00:02:44.039 hackers are getting smarter every day in some way. In the future, I'm 37 00:02:44.039 --> 00:02:49.000 pretty sure they're gonna find find ways to break through. But by time they 38 00:02:49.039 --> 00:02:53.080 find ways to break through, I think that the algorithms are going to change. 39 00:02:53.439 --> 00:02:58.000 Cryptocurrency is going to change a lot one of these. One of the 40 00:02:58.039 --> 00:03:00.759 things I like to bring up here too, is that when you deal with 41 00:03:00.800 --> 00:03:08.639 cryptocurrency, UM try to understand that that there is no middleman, you know, 42 00:03:08.879 --> 00:03:14.599 because it's not regulated by the government. It's anonymous. Every transaction is 43 00:03:14.639 --> 00:03:20.520 anonymous. Right. Also to just keep in mind that there's no gatekeeper, 44 00:03:21.039 --> 00:03:25.080 right, okay, because it's like in a while, there are no gatekeepers. 45 00:03:25.520 --> 00:03:30.840 When you're working with the dollar system, there is a gatekeeper with which 46 00:03:30.879 --> 00:03:36.680 is the Department of Treasury. Be careful you don't say much more than that. 47 00:03:37.159 --> 00:03:39.639 Um, So that can be uh, that's a yen and yang thing, 48 00:03:39.719 --> 00:03:44.400 right, So the gatekeeper, no gatekeeper can be great, But there's 49 00:03:44.599 --> 00:03:49.199 um challenges by not having some any kind of monitor this, right, yes, 50 00:03:49.400 --> 00:03:54.039 you know, the challenges are that people have control of the currency, 51 00:03:54.120 --> 00:04:00.400 but also too, there is no monitoring of the hacking advice it, right 52 00:04:00.000 --> 00:04:08.560 because the government is not watching hackers that try to infiltrate a crypto system, 53 00:04:08.639 --> 00:04:15.039 uh, pretty much a a cryptocurrency system, all right. So what happens 54 00:04:15.120 --> 00:04:21.399 is that you're count in a while and and it's not really um I gotta 55 00:04:21.519 --> 00:04:28.680 say centralized, kind of decentralized, and it's and it's a virtual way of 56 00:04:28.839 --> 00:04:34.519 doing transactions. Now, blockchain technology has pretty much been around for a long 57 00:04:34.600 --> 00:04:41.000 time. It's just so happened that cryptocurrency is trying to take a new leap 58 00:04:41.079 --> 00:04:46.959 now. And I will admit it sounds really good because you can buy a 59 00:04:46.000 --> 00:04:53.519 coin for only two cents, right and hopefully in the next couple of years 60 00:04:54.279 --> 00:04:59.759 that you know that coin is worth five dollars, So that's a completely not 61 00:05:00.199 --> 00:05:03.519 mark up big time. It's a huge returnal investment. And again the gatekeeper 62 00:05:03.600 --> 00:05:09.920 issue is that it's really the definition of a true free marketplace right where there's 63 00:05:09.959 --> 00:05:15.759 no um entity, whether government or private, making any judgment calls decisions of 64 00:05:15.800 --> 00:05:19.360 who can play the game. It's a really uh it levels a playing field 65 00:05:19.439 --> 00:05:25.600 for all participants involved, right, yes, yes, yes, you know, 66 00:05:26.839 --> 00:05:30.920 Rich, I just want to say something for a second. When it 67 00:05:31.000 --> 00:05:36.319 comes to cybersecurity, some of the same type of issues that we have with 68 00:05:36.360 --> 00:05:44.759 cryptal currency standard all across the industry, all right, because when we look 69 00:05:44.800 --> 00:05:49.120 at hacking and we look at cyber crime, someone who's trying to infiltrate the 70 00:05:49.120 --> 00:05:55.560 bubble, you know, the bubble is cybersecurity one of far ways to defeat 71 00:05:55.600 --> 00:06:00.839 cybersecurity, right, and usually with something like cryptal currency because it's such a 72 00:06:00.879 --> 00:06:05.600 um growing market. I'm pretty sure a lot of people use their cell phones 73 00:06:05.639 --> 00:06:10.360 because you know, you get that text and and say that, um, 74 00:06:10.480 --> 00:06:15.160 one of the cryptocurrencies, like bitcoin, it has taken a dip. The 75 00:06:15.240 --> 00:06:16.360 person goes, oh, yeah, you know, I need to invest in 76 00:06:16.360 --> 00:06:21.800 it now, I need to do this now. But step back, was 77 00:06:21.879 --> 00:06:29.639 that really from bitcoin? Was it just that a person was being lured right 78 00:06:29.879 --> 00:06:34.639 into an area of um hackn us, I may add, So let's talk 79 00:06:34.680 --> 00:06:40.399 about the cryptocurrency and cybersecurity connect right, Um, what are some of the 80 00:06:40.439 --> 00:06:45.720 steps or processes involved in you know, connecting these two entities. Well, 81 00:06:45.920 --> 00:06:53.279 the first one is proper authentication because with authentication, especially with some of the 82 00:06:53.360 --> 00:06:59.720 sites like coin based now and order for you to log onto your crypto currency 83 00:07:00.759 --> 00:07:05.040 account, you're gonna have to use one computer, and if you go to 84 00:07:05.079 --> 00:07:11.920 another computer, then you have to verify that computer, all right. And 85 00:07:11.959 --> 00:07:18.040 then also too, during the authentication process, you're always gonna be using two 86 00:07:18.079 --> 00:07:25.839 factor authentication. Okay. So so because you need authentication in place, so 87 00:07:25.920 --> 00:07:30.000 you can verify the identity of the person that is either logging into the count 88 00:07:30.399 --> 00:07:33.879 or the person that's making the transaction, right to provide those safeguards and those 89 00:07:33.959 --> 00:07:40.279 checks and balances in place, um, which then talk about encryption. Encryption 90 00:07:40.439 --> 00:07:46.000 is about secrecy of information. Okay, this is the bulk of cryptocurrency. 91 00:07:46.199 --> 00:07:50.079 Okay, you want to make it as secretive as possible. See, there 92 00:07:50.079 --> 00:07:58.360 els something called ciphertexts, and it's called and also to something called clearer text. 93 00:07:58.959 --> 00:08:03.399 Now, with side protects, you are encrypted information, all right. 94 00:08:03.319 --> 00:08:09.000 With this plain text, there is no encryption at all, really just standard 95 00:08:09.120 --> 00:08:16.839 data in the wow. So with cryptocurrency, it's uses encryption and the information 96 00:08:16.959 --> 00:08:20.959 is put in a cyphertext that is sent through the blockchains, all right. 97 00:08:22.040 --> 00:08:26.360 So so that's one way of looking at cryptography. But see, cryptography has 98 00:08:26.399 --> 00:08:31.639 been around for a long time and with these uh policies in place or that 99 00:08:31.720 --> 00:08:37.279 infrastructure. Uh, there's no guarantee in life, but that does that um 100 00:08:37.519 --> 00:08:41.840 ward off a lot of the typical financial scams that could be conducted elsewhere. 101 00:08:41.200 --> 00:08:45.919 No, no, okay, never never. There's no guarantee, but it 102 00:08:45.919 --> 00:08:48.799 probably does provide you know, a little bit uh more sense of security. 103 00:08:48.960 --> 00:08:54.519 Yes, yes, yes, you get a sense of the security. But 104 00:08:54.639 --> 00:08:58.080 cyber chromos are cyber chromals, Yeah, exactly. I mean you can go 105 00:08:58.120 --> 00:09:01.080 back to the old stage coach days or or the robber you know, train 106 00:09:01.200 --> 00:09:03.919 robberies. Right, the train was pretty secure, but there's no guarantee. 107 00:09:05.000 --> 00:09:07.679 You know, I don't know how they really hijacked the train with horses. 108 00:09:07.679 --> 00:09:11.879 I never understood that part, right, But I guess if you have enough 109 00:09:11.919 --> 00:09:16.639 ammunition and can um create a fear within the engineer, um, that can 110 00:09:16.679 --> 00:09:22.200 happen. So let's move on maybe to talk about it's about some concerns in 111 00:09:22.320 --> 00:09:26.159 terms we mentioned the financial scams. Um, you know, what are some 112 00:09:26.200 --> 00:09:31.000 of the electronics you know, crimes that are more difficult to track. Yes, 113 00:09:31.480 --> 00:09:37.279 when you think about these electronic crimes, people people or like hackers are 114 00:09:37.320 --> 00:09:43.559 sitting behind a computer or that phone and they carrying out um and and illegal 115 00:09:43.600 --> 00:09:52.039 activity. So what happens is that that sometimes you may not even be able 116 00:09:52.080 --> 00:09:56.799 to um peeing in on the laptop or what computer they're using, because they 117 00:09:56.799 --> 00:10:03.519 can log into another network and to carry it out. So so let's just 118 00:10:03.559 --> 00:10:07.200 imagine, right, if you had your laptop, and if it was a 119 00:10:07.200 --> 00:10:11.679 building across the screen over here, right, and let's say that you wanted 120 00:10:11.720 --> 00:10:22.600 to probably hack into a crypto currency a count you could literally try to hack 121 00:10:22.679 --> 00:10:28.360 into that building over there and use their network to hack into that system. 122 00:10:28.519 --> 00:10:33.000 Okay, So so what you're doing now is that you're putting it on this 123 00:10:33.159 --> 00:10:37.639 on the other building over there. So so that's one of the ways of 124 00:10:37.759 --> 00:10:43.000 looking at this because as an electronic crime is that there are so many end 125 00:10:43.080 --> 00:10:46.559 points everywhere. See it's see it's not like a physical crime. You know, 126 00:10:46.759 --> 00:10:52.600 people were walking into a bank saying give me all your money easy. 127 00:10:52.720 --> 00:10:58.720 It was a body. But today we have laptops and we have different systems 128 00:10:58.759 --> 00:11:03.320 that people use and they'll call endpoints, and so what you have to do 129 00:11:03.519 --> 00:11:09.240 is to have some type of way of tracking these end points down and hopefully 130 00:11:09.279 --> 00:11:13.159 your threat logs are doing it. You know, a threat logs tells you 131 00:11:13.240 --> 00:11:16.600 that that this is an IP address that has logged onto the system that has 132 00:11:16.600 --> 00:11:20.279 not been authorized or authenticated, like we talked about it. There you go. 133 00:11:22.399 --> 00:11:26.639 All right, So let's talk about um, either the American dollar where 134 00:11:26.639 --> 00:11:31.600 where does this? Where does the American dollar or any currency around the world, 135 00:11:31.039 --> 00:11:37.720 physical currency? Um, what's the future if you will? Or you 136 00:11:37.759 --> 00:11:41.840 know the risk in terms of versus cryptocurrency online? Well, you know the 137 00:11:43.159 --> 00:11:46.240 digital dollar if you want. Yeah, well, you know the problem is 138 00:11:46.320 --> 00:11:50.600 that there are a group of people that want to change all the currency over 139 00:11:50.639 --> 00:11:54.279 to cryptocurrency. Okay, Dan, It kind of put the American dollar at 140 00:11:54.399 --> 00:12:00.399 risk because nobody wants to use American dollars anymore. Okay, okay, bro, 141 00:12:01.080 --> 00:12:07.120 But what part of that is that it's a get rich scheme? Okay? 142 00:12:09.080 --> 00:12:13.799 Christ Cryptocurrencies are very, very volatile, all right, because today you 143 00:12:13.840 --> 00:12:18.679 can have a million dollars. In tomorrow you can have two dollars. You 144 00:12:18.720 --> 00:12:24.679 know, the dollar is not as volatile as these cryptocurrencies um are. So 145 00:12:24.679 --> 00:12:31.279 so it's a major, a major, major type of concern but also too, 146 00:12:31.679 --> 00:12:37.799 the reason that it is a concern is because it's not policed. Nobody 147 00:12:37.840 --> 00:12:41.720 really has a handle on who is really trying to control the market because these 148 00:12:41.720 --> 00:12:46.120 are peer to peer networks that are being used. Yeah, that's definitely the 149 00:12:46.120 --> 00:12:50.080 two sides of the coin. No pen intended, but it basically is where 150 00:12:50.600 --> 00:12:56.960 things have happened. Nefarious players have come in and who's placing this right and 151 00:12:56.039 --> 00:13:01.080 what's their motive? Um, when you allow you know, somebody's hand in 152 00:13:01.120 --> 00:13:03.679 the candy jar, so to speak, Uh, there's greed comes into play 153 00:13:03.759 --> 00:13:07.799 and they try to embezzle money and they had had a YadA right because they 154 00:13:07.799 --> 00:13:11.840 have access to it. If um, any given individual, organization, company, 155 00:13:11.879 --> 00:13:16.720 antony, government doesn't have access to it, then it should prevent or 156 00:13:16.759 --> 00:13:22.399 it helps provide again that safeguard and eliminates a lot of this uh because whenever 157 00:13:22.440 --> 00:13:28.200 there's money available to people, you know, it's almost um you have it's 158 00:13:28.200 --> 00:13:31.240 problematic at the at the front end. Right. So the concept of I, 159 00:13:31.360 --> 00:13:37.120 as I understand a blockchain and cryptocurrency is with nobody kind of governing this, 160 00:13:39.120 --> 00:13:43.039 um, you eliminate the greed factor in the in the ability for someone 161 00:13:43.080 --> 00:13:48.240 to uh take advantage of the system. But the hackers are basically the new, 162 00:13:48.840 --> 00:13:52.200 you know, twenty one century version of somebody trying to break into the 163 00:13:52.240 --> 00:14:00.000 cookie jar. They are the new form of um currency. Yeah right right, 164 00:14:01.080 --> 00:14:03.320 Okay, So we got lots more to cover here, but just want 165 00:14:03.320 --> 00:14:07.080 to remind our listeners again. You're listening to uh Rich casting over here on 166 00:14:07.080 --> 00:14:11.480 this side of the mic in our Atlanta Global Podcast studios and Dwayne Hart on 167 00:14:11.519 --> 00:14:13.399 the other side. And if some of these topics of interest to you, 168 00:14:13.960 --> 00:14:18.639 check out Dwayne Heart dot com. There you'll find access to order a copy 169 00:14:18.639 --> 00:14:22.720 of this book, uh and talk to us give us your seventeen second best 170 00:14:22.720 --> 00:14:26.039 pitch on the book here in a second. But on that Dwayne Heart dot 171 00:14:26.120 --> 00:14:30.960 com you'll also find links to his YouTube channel to the podcast cyber Security Mindset. 172 00:14:31.039 --> 00:14:35.159 Talk to us about the book, you know, the Soybersecuted mindset UM 173 00:14:35.360 --> 00:14:41.440 simplify cybersecurity. It also the other streets how to operate cybersecurity, and it 174 00:14:41.600 --> 00:14:46.960 also hit readers understand how to connect soybersecurity and to form what I called the 175 00:14:48.039 --> 00:14:54.159 cybersecurity blue front because there's a fair factor about cybersecurity. So what cybersecuity Mindset 176 00:14:54.240 --> 00:15:01.279 does is to take their different pieces of cybersecurity talk about it, and it 177 00:15:01.559 --> 00:15:05.919 was great to read us how to connect them together so that they can build 178 00:15:05.960 --> 00:15:11.399 at sobersecurity blueprint. And also I would say this again, it's it's is 179 00:15:11.440 --> 00:15:16.519 to remove that fear factor. Uh, you know, because people are afraid 180 00:15:16.559 --> 00:15:20.639 of cybersecurity today, so we have to be moved at fear factor. Well, 181 00:15:20.679 --> 00:15:24.679 and what's interesting about cyber I mean, blockchain and the cryptocurrency is that 182 00:15:24.679 --> 00:15:28.399 people do you have that fear of the unknown. But and they go, 183 00:15:28.519 --> 00:15:31.039 well, that's kind of weird. There's no physical money, you know, 184 00:15:31.120 --> 00:15:33.960 my hand, and so I'm not interested. I'm um, I don't run 185 00:15:33.039 --> 00:15:39.200 a deal with cyber uh, cryptocurrency. But what the reality is if you 186 00:15:39.279 --> 00:15:43.159 go back in history in the very early days, you know, I had 187 00:15:43.559 --> 00:15:46.879 some goats and you had some coffee beans, and we were making transaction right 188 00:15:46.960 --> 00:15:52.720 because I didn't have and we would trade um that that type of currency. 189 00:15:52.960 --> 00:15:56.600 Then it was well, here's a here's a piece of here's a coin that 190 00:15:56.639 --> 00:15:58.399 has the queen's picture on there. I'm like, no, I'm not taking 191 00:15:58.399 --> 00:16:00.919 that. Give me your offee beans or your goat milk, right right? 192 00:16:02.360 --> 00:16:03.559 And then it then it morphed into like, well, we don't have the 193 00:16:03.600 --> 00:16:07.440 coins because that was cumbersome. Let's i'll give you a piece of paper that 194 00:16:07.519 --> 00:16:11.320 has a government image on there. It's like, I'm not taking paper, 195 00:16:11.320 --> 00:16:12.840 give me your coin. Then it was like here, I'll write you a 196 00:16:12.960 --> 00:16:15.720 check instead of paper. I'm like, I don't know what this is. 197 00:16:15.799 --> 00:16:18.919 It's I owe you, no, give me a give me your dollar instead 198 00:16:18.919 --> 00:16:23.080 of a check. Then it was American Express travelers checks. Then it was 199 00:16:23.519 --> 00:16:26.799 here's a piece of plastic. I'm not going to give you a check, 200 00:16:26.840 --> 00:16:29.120 but I'll give you a piece of plastic and you can scan it. Credit 201 00:16:29.159 --> 00:16:34.519 card. People weren't adopting all of those versions of currency exchange until it became 202 00:16:34.519 --> 00:16:37.960 popular, right, So now people are looking at cryptocurrent digital. No, 203 00:16:38.039 --> 00:16:41.840 I'm not interested, give me your credit card, but it's good to be 204 00:16:41.840 --> 00:16:45.799 a matter of time and the curve is gonna shift and potentially this will be 205 00:16:45.440 --> 00:16:51.480 you know all of those other things I mentioned, nobody's training training, um 206 00:16:51.759 --> 00:16:56.240 coffee for goat milk anymore? Right, or you know old coins right, 207 00:16:56.360 --> 00:17:00.120 so well, you know what it does, go and help out with bounced 208 00:17:00.200 --> 00:17:04.920 checks exactly right. You know they don't want to take the check. Is 209 00:17:04.960 --> 00:17:08.039 it's going to clear it out with cryptocurrency? You know, uh, it's 210 00:17:08.079 --> 00:17:11.200 online. So okay, So a couple more topics hip before we wrap things 211 00:17:11.279 --> 00:17:15.359 up. So let's talk about some risk. Um what are someone on your 212 00:17:15.400 --> 00:17:22.880 short list of significant risk? All right? Account hijack, someone takes over 213 00:17:22.920 --> 00:17:29.839 your account. That's why two factor authentication is in place for these cryptocurrency account 214 00:17:30.599 --> 00:17:34.240 and normally and normally what happened is during the registration process. If it's a 215 00:17:34.319 --> 00:17:40.880 lag in time, that's when hackers can hijack and account. Once it's created, 216 00:17:40.960 --> 00:17:45.039 then it become much more difficult to hack into those accounts. A second 217 00:17:45.119 --> 00:17:52.480 level is that the identity fraug concept comes to surface. Here here goes the 218 00:17:52.519 --> 00:17:59.400 way that the identity fraud can actually um work is that someone will pretend to 219 00:17:59.440 --> 00:18:03.640 be you, or someone will pretend to be uh someone from coin based and 220 00:18:03.640 --> 00:18:08.400 trying to get information. Okay. So so when you look at the identity 221 00:18:08.480 --> 00:18:14.680 fraud there all your personal information can be used for other means as also too 222 00:18:15.039 --> 00:18:21.039 for your own for your own account, because you think about a mobile device 223 00:18:21.400 --> 00:18:25.960 and if someone tries to log into a coin based account and let's say they 224 00:18:26.119 --> 00:18:32.559 send someone a text and saying that you need to uh log into this link 225 00:18:32.640 --> 00:18:37.519 on coin base and you need to update your information whatever, right instead of 226 00:18:37.599 --> 00:18:42.559 person logs into coin base and and it's not coin based, but it's a 227 00:18:42.599 --> 00:18:47.880 bogus website, right, Okay, So so that happened. One of the 228 00:18:47.920 --> 00:18:51.000 other ways is fishing. Fishing is good too. You know, you send 229 00:18:51.000 --> 00:18:53.000 them that email and as I said before, you know, you send them 230 00:18:53.039 --> 00:18:57.559 to a to a bogus website. You know, let's even let's even talk 231 00:18:57.559 --> 00:19:03.200 about some ransomware. Okay, you gotta pay me a thousand dollars to go 232 00:19:03.279 --> 00:19:07.240 get back into your million dollars account that you have, so exactly, so 233 00:19:07.279 --> 00:19:12.000 what happens A good idea right now, now, this is what a return 234 00:19:12.079 --> 00:19:15.519 on the investment comes to surface. If I give him a thousand dollars, 235 00:19:15.960 --> 00:19:22.319 I can get back into my million dollars on coin base. See that's just 236 00:19:22.480 --> 00:19:29.079 the easy way of of how hackers can uh infiltrate account. What about a 237 00:19:29.119 --> 00:19:33.039 computer glitch, let's say for instant during the time that someone is registering. 238 00:19:33.559 --> 00:19:40.200 And if there's a computer glitch and let's say the information install this is this 239 00:19:40.319 --> 00:19:45.599 is very significant here, all right, So so that's one. And let's 240 00:19:45.640 --> 00:19:49.640 talk about minors, because miners they can disrupt tim and you know, minors 241 00:19:49.680 --> 00:19:56.400 are um they like to review transaction, you know, because when you think 242 00:19:56.400 --> 00:20:00.200 of mining, you're talking taking a deep dive, and now is and going 243 00:20:00.279 --> 00:20:06.480 in and searching and try to find information. See it's like coal monus right, 244 00:20:06.720 --> 00:20:11.720 digging right right, Well the tackles are digging as well too and just 245 00:20:11.799 --> 00:20:17.319 trying to find information. And so what happened is that that minus are going 246 00:20:17.359 --> 00:20:23.799 to reviewed each transactions and try to gain control of of your big coin accounts 247 00:20:23.799 --> 00:20:27.200 and so forth. Now one of the topics that's on the list here, 248 00:20:27.559 --> 00:20:30.519 I really have to put a question mark next to what is this? This 249 00:20:30.640 --> 00:20:37.079 concept of double spend currency? Yeah, and I caught my attention. I'm 250 00:20:37.119 --> 00:20:41.440 like, what is that? Okay, because minors will go and find out 251 00:20:41.480 --> 00:20:47.640 to your information and try to set up a second a a second transaction. 252 00:20:48.200 --> 00:20:52.960 Okay, so that something cloned, so that the MINUS will set it up 253 00:20:53.759 --> 00:20:59.519 because the crypto chain is irreversible. But what if they can set up another 254 00:21:00.000 --> 00:21:03.359 transaction and double spend your money just like for instance, you may say, 255 00:21:03.359 --> 00:21:07.000 okay, then I have ten dollars that I want to pull out. But 256 00:21:07.039 --> 00:21:12.079 if a miners can find that information, then they can set up another transaction 257 00:21:12.359 --> 00:21:18.599 and replicate that transaction. You know it replicates. So that means that the 258 00:21:18.640 --> 00:21:22.359 ten dollars that you thought that you were extracting, you know it right? 259 00:21:23.359 --> 00:21:26.319 Okay, that makes sense because then it doesn't necessarily set up red flags. 260 00:21:26.920 --> 00:21:32.519 Well but yeah, exactly for you, but not for the average Joe. 261 00:21:32.599 --> 00:21:37.640 Yeah, okay, UM, so I think our last topic on the list 262 00:21:37.680 --> 00:21:41.960 here, let's talk about some we talked about, you know, defining UM, 263 00:21:41.000 --> 00:21:48.319 the blockchain, defining cryptocurrency UM, some you know hacker UH tools that 264 00:21:48.359 --> 00:21:52.799 they've been using, and UH financial risk and problems and some of the frauds. 265 00:21:52.839 --> 00:21:57.319 Let's finish up with what are some controls to counter all of these uh 266 00:21:57.440 --> 00:22:02.519 some of these topics we've talked about. Let's go talk about email. Email. 267 00:22:02.599 --> 00:22:07.359 The number one that pay close attention to email and make sure that it's 268 00:22:07.440 --> 00:22:14.160 from a legitimate source, because if it's anything such as someone sending you a 269 00:22:14.160 --> 00:22:17.160 way up link and telling you to go to a website so that you can 270 00:22:17.279 --> 00:22:22.680 update your coin based account or something like that, you you really have to 271 00:22:22.680 --> 00:22:30.079 watch that. UM and just to make sure that you are stand wise and 272 00:22:30.279 --> 00:22:37.279 also too that you're noticing any type of unfamiliar activity on your accounts as well. 273 00:22:38.400 --> 00:22:44.039 And I bring up email because that's probably the most centralized. That's the 274 00:22:44.160 --> 00:22:45.519 entry point, right, it's your front door. It's your front door, 275 00:22:45.680 --> 00:22:49.400 yes, right, yes, it is the front door. So so if 276 00:22:49.400 --> 00:22:56.200 someone can find a way to infiltrate your account to email by actually UM conversing 277 00:22:56.279 --> 00:23:00.400 someone to go to another website that is I legited it and you know, 278 00:23:00.440 --> 00:23:06.319 the person put information in there, and and now someone can log into your 279 00:23:06.359 --> 00:23:10.839 coin based account because because it can be as easy as like coin bases going 280 00:23:10.880 --> 00:23:15.480 through and making sure every user can reset that passwords and you get the email 281 00:23:15.640 --> 00:23:17.640 and you said you must go to this link, and you go to that 282 00:23:17.720 --> 00:23:22.079 link and you put your user name of passwords in there. Okay, game 283 00:23:22.119 --> 00:23:25.720 over, game is over. Yeah. It made a lot of these principles 284 00:23:25.720 --> 00:23:30.039 apply that we're somewhat familiar with UM in our everyday life in terms of you 285 00:23:30.039 --> 00:23:33.440 don't keep out your pin to the A T M machine, right, UM. 286 00:23:33.519 --> 00:23:38.039 You don't take a phone call that UM and they're asking for private information 287 00:23:38.519 --> 00:23:42.279 and it could be from the source, you know, your bank or your 288 00:23:42.279 --> 00:23:48.000 home mortgage or whatever it is. But instead of completing that conversation, you 289 00:23:48.039 --> 00:23:51.839 go directly to the source and you contact the bank. Are the I R 290 00:23:51.960 --> 00:23:55.119 S? Who are you know that entity? So in this case UM, 291 00:23:55.200 --> 00:23:59.160 you might get it. You might be a legitimate email from a cryptocurrency account 292 00:23:59.160 --> 00:24:02.559 that you've set up that has some updates, some system updates, some things 293 00:24:02.559 --> 00:24:04.519 you need to correct, But don't reply that emails. What you're saying, 294 00:24:04.519 --> 00:24:07.599 go go to your log into your actual accounts, see if there's any alerts 295 00:24:07.640 --> 00:24:11.440 there. I am going to say that humans are the weakest link in this 296 00:24:11.559 --> 00:24:17.319 process. Let's just to be real apps because humans are the weak ist linked. 297 00:24:17.400 --> 00:24:22.599 Because humans are very flexible. The technology as a standard, So why 298 00:24:22.640 --> 00:24:30.240 not deal with the issue of being flexible because a human can make the wrong 299 00:24:30.359 --> 00:24:36.799 decision, but technology has a standard. If you state in technology that two 300 00:24:36.880 --> 00:24:45.039 factor authentication is the primary type of UM safeguard, that is that is being 301 00:24:45.160 --> 00:24:48.279 used, guess what is there? But as a hacker, you want to 302 00:24:48.359 --> 00:24:52.640 defeat that purpose must saying Okay, if I can get to humans to go 303 00:24:53.039 --> 00:24:57.720 and actually to authenticate to the wrown source, then I can gain assets. 304 00:25:00.079 --> 00:25:04.160 Some of the other errors here you've got to safe guard your account passwords. 305 00:25:06.359 --> 00:25:08.039 UM. We talked about it last time. In real estate, they say 306 00:25:08.079 --> 00:25:12.559 the three principles or location, location, location, UM. In cybersecurity, 307 00:25:12.640 --> 00:25:17.480 it's all about password, password, password, passway pass way password, you 308 00:25:17.519 --> 00:25:22.519 know. I just I was reading an article earlier about having a password manager 309 00:25:22.440 --> 00:25:32.359 and versus using two factor authentication, and two factor authentication is best if you 310 00:25:32.400 --> 00:25:37.119 have a lot of passwords and to use the passwords manager. I've always thought 311 00:25:37.160 --> 00:25:41.759 that, you know, a password managers just something that's saving your passwords either 312 00:25:42.000 --> 00:25:45.839 either through the browser, and it makes it easy. But at the same 313 00:25:45.839 --> 00:25:53.119 time, I prefer to use two factor authentication. Now. Coin base is 314 00:25:53.319 --> 00:26:00.119 very very strong with making sure that two factor authentication operates. Any of you 315 00:26:00.119 --> 00:26:04.519 have not logged into your account and an extremely long time, it's gonna have 316 00:26:04.680 --> 00:26:10.640 you to re authenticate and to reverify who you are. Another safeguard in place. 317 00:26:10.759 --> 00:26:14.160 Yes, UM. Okay. So last question is we've teased at the 318 00:26:14.160 --> 00:26:19.839 top of the hour about this crypto crypto exchange network UM defined or helps determine 319 00:26:19.880 --> 00:26:26.359 what that UH is involved in the crypto exchange network. Oh okay, then 320 00:26:26.400 --> 00:26:32.400 well let us appear to peer network. Okay, and it's usually usually one 321 00:26:32.480 --> 00:26:37.920 person that is trying to create a ledger, and so in that blockchain network, 322 00:26:38.880 --> 00:26:45.240 so what you have is that someone that registers for a transaction and h 323 00:26:45.279 --> 00:26:49.519 then the transaction is represented as a block and a share ledger. Then then 324 00:26:49.599 --> 00:26:55.799 so after that the block is broadcasted to all participants and then after that the 325 00:26:55.839 --> 00:27:00.640 participants approved the transaction is valid. And you know, this is the area 326 00:27:00.720 --> 00:27:07.279 here that is most most important. Is it valid? Because if it's not 327 00:27:07.440 --> 00:27:11.920 identified as as being valid, that's when double spin currency comes to place, 328 00:27:12.519 --> 00:27:15.799 all right. And then the next thing is, you know, the block 329 00:27:17.359 --> 00:27:22.440 is added to the chain because as you build these block chains and as they 330 00:27:22.480 --> 00:27:27.920 are encrypted, and as they hash once you once you do a transaction, 331 00:27:27.960 --> 00:27:33.240 which is a record, they are added onto the chain. So for a 332 00:27:33.279 --> 00:27:40.000 hack or two infiltrate that chain or to make it irreversible, you're gonna have 333 00:27:40.119 --> 00:27:45.079 to break all of the different blocks, okay, which is increasingly hard to 334 00:27:45.119 --> 00:27:52.440 do. So the easy way that a hacker can infiltrate a crypto network is 335 00:27:52.519 --> 00:27:56.680 prior to the network being created, or prior to the peer to peer um 336 00:27:57.240 --> 00:28:03.799 uh connection, right all right, because once it's created, it's increasingly harder 337 00:28:03.920 --> 00:28:07.599 yeah, it's it's kind of more locked. Like you said, that's interesting. 338 00:28:07.599 --> 00:28:11.160 Takeaway I had was the concept of, uh, if there's a glitch 339 00:28:11.200 --> 00:28:14.279 while you're setting up the account or you pause or whatever, that's basically kind 340 00:28:14.279 --> 00:28:17.559 of leaving your go back to the analogy, it's like you're leaving your front 341 00:28:17.559 --> 00:28:22.039 door cracked open. Right once the door closed and locked and locked with a 342 00:28:22.079 --> 00:28:25.960 dead bull, it makes it not impossible, but a whole lot more of 343 00:28:25.960 --> 00:28:27.519 a challenge than just like, oh, the door's open, let me just 344 00:28:27.559 --> 00:28:33.400 walk in that lag time. Yeah, okay, because that makes sense. 345 00:28:33.680 --> 00:28:41.119 This same concept applies to any transaction and any type of network communication that you 346 00:28:41.160 --> 00:28:48.079 have because the cryptocurrency networks are very fast. Okay, see that speedy transactions, 347 00:28:48.119 --> 00:28:52.319 So what if you can slow it down in its lag time? You 348 00:28:52.359 --> 00:28:56.599 know, that's that's when the problem occurs. Most other people that are familiar 349 00:28:56.680 --> 00:29:03.799 with a handshake over in UM over in I T T C P I P 350 00:29:04.319 --> 00:29:08.759 okay and shaking okay, this is this is kind of you know, the 351 00:29:08.799 --> 00:29:15.799 same concept you know between your sink and your acknowledge concepts. Right, So 352 00:29:15.799 --> 00:29:21.400 so if you have a lapse in timing, then you kind of open the 353 00:29:21.440 --> 00:29:25.200 door see it's see it's kind of like a bank, right if you walk 354 00:29:25.279 --> 00:29:27.920 through a bank door, and if the door closed is really fast, so 355 00:29:29.000 --> 00:29:32.559 that means that the criminals cannot get in. But what if it's just all 356 00:29:32.640 --> 00:29:37.440 the closes and you know it, depending on the size of the criminal itself, 357 00:29:38.079 --> 00:29:42.839 you can slip through the door. So that same concept follows. Um 358 00:29:44.039 --> 00:29:48.079 follows timing and these timing eros well speaking, the timing our time is about 359 00:29:48.160 --> 00:29:51.480 up here. So that's a great way to segue. And I'm just looking 360 00:29:51.519 --> 00:29:53.359 at the list of our upcoming topics. We've got a great lineup for this 361 00:29:53.400 --> 00:29:56.799 season coming up, so stay tuned. Uh. Some of the on the 362 00:29:56.799 --> 00:30:03.279 shortlist is, um, what's security hackers don't want you to know? Um, 363 00:30:03.359 --> 00:30:07.839 you're how to determine your cybersecurity business capabilities. We're gonna be covering lots 364 00:30:07.880 --> 00:30:12.839 of other UM topics on that on the line zero trust in terms of US 365 00:30:12.880 --> 00:30:18.279 government agencies, key reasons. They're so lots lots coming up here. But 366 00:30:18.519 --> 00:30:21.440 Dwayne again, our pleasure to have you back in the studio here on the 367 00:30:21.480 --> 00:30:26.839 Georgia our global podcast studios here in our Atlanta, Georgia studio, so rich 368 00:30:26.880 --> 00:30:29.799 casting over here signing off, Duayne will see you on the other side of 369 00:30:29.799 --> 00:30:30.960 the microphone soon, all right, and take care.

Other Episodes

Episode 11

November 14, 2023 00:23:48
Episode Cover

Mastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate Programs

Do you know what's on your network? That's a serious question that many cannot answer. When invoking "The Cybersecurity Mindset," the reader can relate...

Listen

Episode 13

December 12, 2023 00:30:00
Episode Cover

Mastering The Cybersecurity Mindset Part 3 - Building Cyber Connectors Platforms

Critical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain...

Listen

Episode 4

May 15, 2023 00:32:12
Episode Cover

Toyota Vulnerability Management Practices Are Weak

Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota...

Listen