Transcript
A (0:00)
Yeah. So if you go to public WI fi, because there's such weak security protocol, so there's little hacks that you can put in, and you can basically see the streams of data that are going on. And then they have emulators, so you can almost. They literally can almost emulate your screen and watch everything you're doing.
B (0:13)
Holy crap.
A (0:14)
Snip, Pat word passwords. They can do all kinds of. They can even do little applets to log on to your. Your phone or your mobile device, your laptop, and basically just make a copy of it.
B (0:21)
Wow. Okay, guys, we got Scott here today, cyber security expert. What's new with you, man? I know you got the book launch and you're busier than ever.
A (0:37)
Yeah. Well, thanks for having me on. Really excited to be here. Big fan of. Of you and your show, and so it's really cool. Thanks. But, yeah, I. I live in the world of cyber security. That's where. Where I camp Clash of Two worlds.
B (0:50)
Right now, because I'm in the entertainment business. And you're in cyber security.
A (0:53)
Yeah, it's crazy world out there. There's just so many threats and things that are going on that it's almost hard to get your head around the growth of the cybersecurity hacks and the ransomware stuff that we read about really, almost every day in the news. It's crazy. And it's obviously a global problem, too.
B (1:12)
Yeah. Because data is really valuable. So these people or groups want to basically get all this data. Right. That's how they're hacking into these companies for the data.
A (1:20)
100%. Yeah. They're. They really want the data is the value. And certain types of data is more valuable than other types of data. So, you know, they love, you know, health care data, not only for the health care, you know, kind of hr, the doctors and the nurses, but the patient data is really valuable, too. So on the dark Web, which is where a lot of this lives, and, you know, that's one of the problems, quite frankly, is it's becoming so prolific for anybody. You know, if you're a middle school or a high schooler that really loves tech and you want to start hacking, just get the Tor browser, go on the dark web, you can actually join a franchise for ransomware and to do hacking. Wow. So you pay 299 bucks, you get a kit, they give you some tools, some training, and then if you go out, try to hack maybe some local businesses or whatever you can because, you know, you're connected, so you really can. You know, we get Hacks from all over the world that come into the US and get businesses and the other things are going way down to small businesses, but you basically can join up a franchise, crazy as it is, and they'll bring in. If you can't hack in, they'll bring in one of their experts, one of the really good threat actor guys, and they'll actually work with you, and then they'll split the profits of the ransomware. So once they get the bitcoin, and it's a sophisticated world. And the other thing is, is that a lot of times when they finally do negotiate and, you know, they show up with a black screen and all your networks down, I mean, just kind of imagine, you know, your whole thing is whether you're a small business and a coffee business or you're a hospital, you know, your systems come to a complete halt. So you just get a black screen of death. As we say, it's got a text file. It says, oh, by the way, we have all your data encrypted. Please pay, you know, 50 bitcoin to, you know, whatever that hundred Bitcoin or whatever. And so then in a couple of cases we've been pulled, you know, pulled into exposed facto of, you know, ransomware. They're ready to settle and negotiate because they didn't have proper backups and some of the things you should have in place. And they said, oh, call our 1-800-number to our call center, and they'll settle up the transaction. So they're so sophisticated, they actually not only have franchises, they have call centers.
