January 5, 2022
RadioPublic Podcasts
Join our community!!
Subscribe to the Insecurity Brief podcast now on every platform we can find
Follow us on Twitter
@HoneyBeez0x
@trip_elix
Links
Our Website:
Youtube:
iTunes:
Spotify:
Trip’s books
https://www.tripelix.com/merch
Honey’s books
https://beedefense.net
#Biometric #SMS #hack #trump
A company that is a critical part of the global telecommunications infrastructure used by AT&T, T-Mobile, Verizon and several others around the world such as Vodafone and China Mobile, quietly disclosed that hackers were inside its systems for years, impacting more than 200 of its clients and potentially millions of cellphone users worldwide.
https://www.vice.com/en/article/z3xpm8/company-that-routes-billions-of-text-messages-quietly-says-it-was-hacked
Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. There are several kinds of biometric authentication, including retina scanning, facial recognition and fingerprint authentication, the most common one. Everyone’s fingerprints are unique, and it is commonly accepted that they can identify a person without being reproduced.
https://blog.talosintelligence.com/2020/04/fingerprint-research.html
The well-known Turkish hacker RootAyyildiz Turkish Defacer, the “Father of Turkish hackers” as they call him, again uses his hacking weapons and this time in collaboration with the hacking team 1877 Team! According to exclusive information from SecNews, the Turkish hacker is responsible for one defacement attack on Donald Trump website
https://en.secnews.gr/369126/hacked-site-donald-trump-rootayyildiz-1877-team/
Honey Beez is a retired computer hacker, chess addict, author, and mother. Honey is an American and a New Yorker. She has written several Children’s books and chess books as well as creating an American chess opening called The Bee Defense.
Trip Elix is an author, podcaster and video personality Over the last 30 years, he has worked as a security analyst and privately as a consultant, investigator, forensic technician and a skip tracer. He is the author of three books and gives talks on security and privacy.
Coyright