A (125:09)
Yeah, we'll talk about that in just a little bit, but we'll have more in just a bit. Our show today, brought to you by this little doohickey here. This is a thin canary. What is it? What do you think? It looks like it. Maybe it's an external USB drive. Just a black box until you see it's got an Ethernet connection and a power connection on the back. This, my friends, this is the thinks canary. This is a honey pot. This is a brilliant security device. We talk about security a lot on all of our shows, and we say frequently, it's kind of only axiomatic that security is a layered solution. You know, you probably have your perimeter defenses, your firewalls, you know, your smart appliances, that kind of thing. But do you have anything that will let you know if somebody has penetrated your defenses? Did you know that companies, on average don't know they've been breached for 91 days? 3 months? The bad guys have free reign to wander around your network exfiltrating information so they can blackmail you, putting little time bombs all over the place so they can ransomware you. It's vital that if somebody gets into your network, you know about it, and you know about it right away. And that's what this thinks canary does. Now, I have a number of them. If you're a big bank, you might have hundreds. You scatter them around, certainly every VLAN ought to have at least one or two. They can. Now, they're honeypots. They can be deployed in minutes, and they can impersonate anything. This is a synology nas. It could be a Windows server, it could be a Linux server. It could have every service turned on like a Christmas tree. Could have just one or two judiciously selected services. It could be an SSH server, it could be a SCADA device. I mean, these things can impersonate so many things. When I say impersonate, the impersonation is perfect. No hacker will know the difference. Down to the Mac address, the actual company Mac address, down to the ui, everything looks exactly like the real thing, but they're not. And if somebody is. Is accessing one of these things, or, you know, by the way, you can use them to make lore files that look real, too, like, you know, spreadsheets. You can put them on your cloud. I have them on Google Docs. I have Some spreadsheets called payroll information. If somebody opens one of those files or tries to access this fake internal SSH server, your thinks Canary will immediately tell you there's somebody in your network doing something they ought not do. No false alerts, just the alerts that matter. By the way, alerts any way you want it. Email, text, Slack, it supports web hooks, syslog, of course, any way you want them. When you get that alert though, you know it's time to pay attention. We've only had this thing go. I've had this thing for years. We've only had it go off once. One of our hosts had put a western digital NAS online that for some reason was going out and sniffing all our ports immediately. When I got the warning, I said, it's this, it's inside the house. I went and I found it. I knew exactly what port it was on and disconnected it. And that was the end of that. This is so valuable. Just choose a profile for your things Canary device. It's so easy to do, by the way. You could change it anytime you want. Register with a hosted console, you get monitoring and notifications. Then you sit back and relax. The minute attacker has breached, your network starts snooping around. Or a malicious insider. As soon as any adversary makes themselves known by accessing your Thinks Canary, you're going to get the alert. Now let me tell you a little bit about the cost. And again, the number you have depends on the size of your operation. As a small business, we have about five go to Canary Tools twit. 7,500 bucks a year. You get five things Canaries, you get your own hosted console, you get upgrades, you get support, you get, you get maintenance. Oh, and if you use the offer code twit in the how did you hear about us Box, you also get 10% off. And not just for the first year, but for life for as long as you have your things canaries. But if you're at all concerned, you should know they have a two month money back guarantee. 60 days for a full refund. I should mention we've been covering, we've been doing ads for these guys for nine years now. And all that time, not one person has ever asked for the refund. Not one. Because once you get this thing Scannery, you're going to say, how did I live without it? Visit Canary Tools Twit. Don't forget the offer code TWIT in the how did you hear about us Box. Canary toolstwit. Thank you. Thanks Canary, not only for supporting our shows, but for supporting our security. We really appreciate it. The trial of the century began this week. A social media trial in Los Angeles. Jury selection began in Los Angeles Superior Court. Some of the biggest tech companies Meta, Instagram, Bytes, dance, TikTok, Google's YouTube. The lawsuit says they deliberately, deliberately addict and harm children. Now, TikTok settled out a day before Snap settled out for an undisclosed sum a couple of days before. But the trial goes on because Meta didn't and YouTube did not. You know, this is a really interesting question. In fact, Tech Dirt says the social media addiction narrative may be more harmful than social media itself. Mike Masnick writing on Thursday. He says they're using the tobacco playbook in this, comparing social media to cigarettes. Mike says, but social media addiction isn't recognized as a real clinical addiction. In fact, there's a lot of question about whether social media is as harmful even as as people say. Perhaps one could argue, Mike writes, that everyone screaming about social media addiction is doing more real harm than any social media product itself. Because for the vast majority of heavy social media users, the problem isn't addiction in a clinical sense. It's habit. Habit is different than addiction.