Nathan: REvil. They just hit for a $70 million ransomware attack.
Ham: Oh, my
word, you've been. You've been naming off these attackers who are these people?
Nathan: Know, if you're a potential target, know why you're a potential target, where you're vulnerable and what they're going to be going for. It always goes back to safe. Clicking .
Ham: I never knew cyber insurance is actually a thing. Can I bundle it with my car? My ATV.
Nathan: Hey everybody. My name's Nathan, a student on the information security team here at Minnesota state university Mankato. And I'll be your resident expert on all things cybersecurity for our second season of the CyberAware podcast.
Ham: Hey, what's happening guys? I'm Noah "Ham" Adamson, just a regular guy here on a journey becoming more cyber aware alongside
the experts,
Mercy: and I'm Mercy, a student and cybersecurity specialists on the information security team alongside Nathan.
I'll be your go to for breaking news and trends happening in the cyber-verse and beyond each week ,
Nathan: We'll walk
you through the cyber security world from the basics of personal security, fascinating topics like ransomware, the dark web, and hacking.
Ham: We'll even be joined by some special guest experts. Join us as we uncover what you need to know to stay secure
Mercy: coming this October, you're on the lookout for season two of the cyberware podcast.
In this episode of the CyberAware Podcast, host Sherwin discusses with guest speaker Nate Johnson the topic of research and cybersecurity vulnerabilities. Nate is a penetration tester and is a co-host for another podcast series on YouTube called the Irongeek Cast.
Nate delves into his undergraduate research topic, which was proximity radio frequency identification (RFID) in card reader lock systems. For example, the technology that is used with Mav Cards. He also researched the security flaws and the encryption within card reader lock systems using open source coding. Nate then lays out a comparison between RFID and NFC (Near Field Communication) and how variable band frequencies play a major role in these systems. Nate also shares with Sherwin his study abroad experience in the Netherlands and how NFC is very common there, ranging from identification to payments at almost every location. Nate moves on to talk more about his current research, giving insight on security tactics used to prevent physical bypass on RFID and NFC card reader lock systems. Nate illustrates his experience as a penetration tester and he sheds more light on faculty and student research on cybersecurity.
Interestingly, Nate and Sherwin then pivot the conversation to discuss the latest Pentagon speculated UFO sightings and go on to imagine the security methods that could have been used to evade radar spotters. Nate then shares his public presentation experience in front of industry professionals, explaining how having expertise in recent advancements can even sometimes give you an edge over someone who has decades of experience in the industry. Finally, he suggests to incoming students some important coursework for pursuing cybersecurity from a Minnesota State University, Mankato alumni’s point of view.
In this episode of the CyberAware Podcast, our hosts, Raj and Sherwin, discuss with special guest Mubasser Kamal focused mainly on cyberpunks. Mubassir graduated from Minnesota State University, Mankato two years ago with a masters degree in IT and he has been currently working for a penetration testing company based in Minneapolis as a security consultant. The podcast is all about cyberpunks which simply put forward means individuals into cybertheft & other malicious criminal activities in the cyberworld.
The first major example of cyberpunk they discuss is phishing and how there has been an upsurge in SMS phishing and the number of victims during this COVID-19 timeline. They provide insights to cross-site request forgery and SQL injection which turn out to be some of the common exploits. They elaborate on penetration testing further and how institutions implement it effectively to test their cyber infrastructure like mobile and web applications to name some and to evade exploits like remote code execution attacks. They also talk about tools like ‘Netcat’ that they use for troubleshooting the exploits while they poke around different servers. They talk more about ‘mercenary’ hackers implemented and sponsored by Governments and corporations around the world to conduct cyber-attacks & espionage too. They explain how these hackers have high-end targets and many of the times bait people close to their target to hack into, essentially implementing these innocent people as passive cyberpunks. They then give some tips to stay cybersecure like always checking the links (URL), getting back to the institution involved directly to check the validity of the e-mail or SMS or call they received, securing home networks better using WPA passwords, performing regular firmware updates on devices like routers, etc. Finally they take you through a typical day in life of an Information security analyst and the tasks they perform on a daily basis.
Summary of episode 4:
In this episode of the CyberAware Podcast, Raj and Sherwin speak with special guest Michael Menne, the Chief Information Security Officer (CISO) at Minnesota State University, Mankato. With 28 years of experience in IT, Michael shares his thoughts on cybersecurity and how things have changed throughout the years. Michael gives insight into what his job as a CISO entails, how organizations assess security risks, and how students can pursue a career as a CISO. The group also discusses other frequently asked questions, including how IT Solutions and the security team reacted to the COVID-19 pandemic.
During the second half of the podcast, Raj, Sherwin, and Michael discuss what it means to outsource security services and how outsourcing can impact higher education organizations specifically. The group also chats about the process of implementing new technology to enhance cybersecurity, and the pros and cons of spending University resources on these projects. Lastly, Michael shares his thoughts on security regarding the Internet of things and smart devices, like smart speakers. The group ends with a few quick tips on how to stay up to date with current cybersecurity issues, including following the newsfeed on our CyberAware website or contacting Michael Menne.
CyberAware Website: https://mankato.mnsu.edu/cyberaware
Contact Michael Menne: https://mankato.mnsu.edu/it-solutions/about-it-solutions/it-solutions-staff/michael-menne/
In the second episode of the CyberAware Podcast, our hosts, Raj and Sherwin, delve into the world of cybersecurity to uncover the basics of passwords and device protection – the last of the two P’s of cybersecurity. Brad Ammerman, an adjunct professor in Computer Information Science at Minnesota State University, Mankato, joins Sherwin and Raj in discussing best password tips and how to keep your devices safe.
Bradley Ammerman
Linkedin: https://www.linkedin.com/in/bradammerman\
Music by our host Sherwin Bothello.