{"video_id":"RMojraRwxio","title":"What Do HACKERS Do With YOUR Data?","channel":"Techquickie","show":"Techquickie","published_at":"2019-05-06T14:58:16Z","duration_s":424,"segments":[{"start_s":0.24,"end_s":7.279,"text":"so there have been plenty of reports in the news lately about large-scale data","speaker":null,"is_sponsor":0},{"start_s":5.279,"end_s":10.8,"text":"breaches caused by everything from clever hacking to poor security","speaker":null,"is_sponsor":0},{"start_s":9.12,"end_s":15.28,"text":"practices to somebody just leaving a flash drive","speaker":null,"is_sponsor":0},{"start_s":12.8,"end_s":19.92,"text":"lying around but once everyone's email addresses passwords and credit card","speaker":null,"is_sponsor":0},{"start_s":17.199,"end_s":24.24,"text":"numbers get stolen what actually happens to all that information i mean is there","speaker":null,"is_sponsor":0},{"start_s":21.92,"end_s":28.8,"text":"just like a walmart for cybercriminals where they go to buy your personal","speaker":null,"is_sponsor":0},{"start_s":26.0,"end_s":33.12,"text":"information at rollback prices and if your information is indeed part of a","speaker":null,"is_sponsor":0},{"start_s":30.72,"end_s":37.04,"text":"massive breach how do you find out what are the appropriate precautions","speaker":null,"is_sponsor":0},{"start_s":35.12,"end_s":42.0,"text":"so one thing that's helpful in understanding what happens after a data","speaker":null,"is_sponsor":0},{"start_s":38.96,"end_s":44.239,"text":"breach is to realize the sheer scope of","speaker":null,"is_sponsor":0},{"start_s":42.0,"end_s":49.92,"text":"many of them it's not uncommon for these breaches to affect tens of millions of","speaker":null,"is_sponsor":0},{"start_s":47.28,"end_s":55.28,"text":"people at once and sometimes even more so that means that it isn't particularly","speaker":null,"is_sponsor":0},{"start_s":52.48,"end_s":60.48,"text":"easy for an individual user to search through large databases of stolen","speaker":null,"is_sponsor":0},{"start_s":57.92,"end_s":66.32,"text":"information especially considering the sorts of places that information ends up","speaker":null,"is_sponsor":0},{"start_s":63.44,"end_s":71.2,"text":"oftentimes this data actually will appear on dark web markets that require","speaker":null,"is_sponsor":0},{"start_s":68.799,"end_s":74.56,"text":"special software to access them where it is indeed","speaker":null,"is_sponsor":0},{"start_s":72.4,"end_s":79.2,"text":"bought and sold by cyber criminals hoping to rack up fraudulent charges","speaker":null,"is_sponsor":0},{"start_s":77.2,"end_s":83.119,"text":"drain someone's bank account or even commit outright identity theft","speaker":null,"is_sponsor":0},{"start_s":81.68,"end_s":88.32,"text":"now you can learn more about the dark web here but it turns out that this isn't","speaker":null,"is_sponsor":0},{"start_s":86.32,"end_s":94.479,"text":"the only place where personal data can appear in fact sometimes it'll show up","speaker":null,"is_sponsor":0},{"start_s":90.96,"end_s":96.479,"text":"in a much more public pastebin site","speaker":null,"is_sponsor":0},{"start_s":94.479,"end_s":101.52,"text":"what's a pastebin site you might ask well it's kind of the digital equivalent","speaker":null,"is_sponsor":0},{"start_s":98.88,"end_s":106.64,"text":"of the inside of a bathroom stall wall they're designed for anyone to just dump","speaker":null,"is_sponsor":0},{"start_s":104.56,"end_s":111.84,"text":"a large amount of data as plain text and these things can be great","speaker":null,"is_sponsor":0},{"start_s":109.6,"end_s":116.32,"text":"for folks like coders who want others to check their code for errors or i mean","speaker":null,"is_sponsor":0},{"start_s":113.759,"end_s":121.2,"text":"just anyone who needs a place to quickly jot down a non-sensitive information","speaker":null,"is_sponsor":0},{"start_s":119.04,"end_s":126.159,"text":"in recent years though some pastebin sites have become hotbeds for stolen","speaker":null,"is_sponsor":0},{"start_s":123.52,"end_s":131.44,"text":"data procured from data breaches now some of this data is put there by","speaker":null,"is_sponsor":0},{"start_s":128.56,"end_s":136.319,"text":"hacktivists who don't seek to make much if any money off of their exploits while","speaker":null,"is_sponsor":0},{"start_s":134.0,"end_s":141.599,"text":"other leaks are partially dumped to pastebin sites by attackers as a free","speaker":null,"is_sponsor":0},{"start_s":139.44,"end_s":146.56,"text":"sample of a larger dataset that they expect to get paid for on one of the","speaker":null,"is_sponsor":0},{"start_s":144.08,"end_s":150.64,"text":"aforementioned darknet markets and while anyone can bring up data","speaker":null,"is_sponsor":0},{"start_s":148.72,"end_s":153.519,"text":"that's dumped to a paste bin it's not exactly easy for the average consumer to","speaker":null,"is_sponsor":0},{"start_s":152.8,"end_s":158.08,"text":"go hunt for their credentials one by one","speaker":null,"is_sponsor":0},{"start_s":156.48,"end_s":162.0,"text":"after they heard about the latest big data breach on the news","speaker":null,"is_sponsor":0},{"start_s":159.84,"end_s":166.4,"text":"there is good news though there are easier ways to keep tabs on your logins","speaker":null,"is_sponsor":0},{"start_s":164.239,"end_s":171.36,"text":"and passwords there are services that try to catalog dark net leaks and that","speaker":null,"is_sponsor":0},{"start_s":169.2,"end_s":176.72,"text":"automatically detect when large data dumps appear on paste bins then organize","speaker":null,"is_sponsor":0},{"start_s":174.08,"end_s":181.44,"text":"them into databases and save them even if the original data gets taken down one","speaker":null,"is_sponsor":0},{"start_s":179.36,"end_s":185.599,"text":"of the best known of these services is have i been pwned which works by having","speaker":null,"is_sponsor":0},{"start_s":183.599,"end_s":190.239,"text":"you enter your email address which it then checks against a database of","speaker":null,"is_sponsor":0},{"start_s":187.84,"end_s":195.28,"text":"billions of leaked account records to see if you've been affected by a breach","speaker":null,"is_sponsor":0},{"start_s":192.8,"end_s":199.76,"text":"have i been pwned uses a bot to monitor pastebin sites for new submissions","speaker":null,"is_sponsor":0},{"start_s":197.04,"end_s":204.08,"text":"containing credentials and passwords it offers email notifications if the site","speaker":null,"is_sponsor":0},{"start_s":201.84,"end_s":208.56,"text":"finds your info in a recent breach and it also allows users to enter their own","speaker":null,"is_sponsor":0},{"start_s":206.4,"end_s":210.879,"text":"passwords to check against the database as well","speaker":null,"is_sponsor":0},{"start_s":210.0,"end_s":215.519,"text":"which sounds like a terrible idea","speaker":null,"is_sponsor":0},{"start_s":213.519,"end_s":220.08,"text":"but don't worry have i been pwned employs an algorithm that keeps your","speaker":null,"is_sponsor":0},{"start_s":217.28,"end_s":225.04,"text":"password secure when you test them by hashing them then only sending the first","speaker":null,"is_sponsor":0},{"start_s":222.72,"end_s":228.64,"text":"five characters of the hash to a server that contains the database of known","speaker":null,"is_sponsor":0},{"start_s":227.12,"end_s":232.56,"text":"breached passwords after any matching hashes are found","speaker":null,"is_sponsor":0},{"start_s":230.48,"end_s":236.799,"text":"they're sent back to your pc which can then determine if your entire hash","speaker":null,"is_sponsor":0},{"start_s":234.64,"end_s":240.799,"text":"password is the same as any of the passwords found in the database if you","speaker":null,"is_sponsor":0},{"start_s":239.04,"end_s":243.76,"text":"don't know what a hash is by the way you can learn all about them","speaker":null,"is_sponsor":0},{"start_s":242.48,"end_s":247.68,"text":"right up here this functionality has actually also","speaker":null,"is_sponsor":0},{"start_s":245.599,"end_s":250.959,"text":"been built into some password managers which can even tell you if your","speaker":null,"is_sponsor":0},{"start_s":249.12,"end_s":255.76,"text":"credentials have been found in a recent data dump so","speaker":null,"is_sponsor":0},{"start_s":253.12,"end_s":260.72,"text":"that's cool but then what if you follow these steps and your details have been","speaker":null,"is_sponsor":0},{"start_s":258.0,"end_s":265.68,"text":"compromised well step one is to change your passwords step two is to contact","speaker":null,"is_sponsor":0},{"start_s":263.36,"end_s":269.759,"text":"your bank and credit card companies if your email was tied to those accounts","speaker":null,"is_sponsor":0},{"start_s":267.44,"end_s":273.919,"text":"and get in touch then with step three one of the major credit reporting","speaker":null,"is_sponsor":0},{"start_s":271.36,"end_s":277.36,"text":"agencies once you've contacted them you can do basic things like freezing your","speaker":null,"is_sponsor":0},{"start_s":275.919,"end_s":281.199,"text":"credit for free or if you want something a little less","speaker":null,"is_sponsor":0},{"start_s":279.12,"end_s":286.0,"text":"intrusive than having your credit frozen you can pay for credit monitoring which","speaker":null,"is_sponsor":0},{"start_s":283.84,"end_s":291.68,"text":"will send you a report when anyone tries to open a new account or apply for","speaker":null,"is_sponsor":0},{"start_s":288.479,"end_s":293.52,"text":"credit in your name and that last one","speaker":null,"is_sponsor":0},{"start_s":291.68,"end_s":297.12,"text":"i know it's kind of a pain and to be quite frank i don't want to advocate for","speaker":null,"is_sponsor":0},{"start_s":295.84,"end_s":301.12,"text":"those credit monitoring companies because i think at least some of them","speaker":null,"is_sponsor":0},{"start_s":298.88,"end_s":305.36,"text":"are a bunch of yahoos and i don't mean that in like uh yahoo the company way i","speaker":null,"is_sponsor":0},{"start_s":303.36,"end_s":308.72,"text":"just i mean they're idiots i remember being on the phone with one","speaker":null,"is_sponsor":0},{"start_s":306.88,"end_s":314.08,"text":"of them and complaining that their site doesn't support two-factor authentication even though there's a","speaker":null,"is_sponsor":0},{"start_s":311.52,"end_s":317.919,"text":"blog post on their site from like three years ago recommending that you turn","speaker":null,"is_sponsor":0},{"start_s":315.919,"end_s":321.759,"text":"two-factor authentication on for any sensitive accounts like and the guy he","speaker":null,"is_sponsor":0},{"start_s":319.919,"end_s":326.32,"text":"didn't even the guy on the phone okay low-level customer service person","speaker":null,"is_sponsor":0},{"start_s":323.36,"end_s":330.4,"text":"whatever didn't even know what 2fa was you have a lot of sense of information","speaker":null,"is_sponsor":0},{"start_s":328.16,"end_s":334.08,"text":"in there anyway it's all you can really do and it's","speaker":null,"is_sponsor":0},{"start_s":332.16,"end_s":338.8,"text":"really important in the event of a leak that you take action swiftly if your","speaker":null,"is_sponsor":0},{"start_s":336.56,"end_s":342.479,"text":"information is out there because in some cases the company responsible for the","speaker":null,"is_sponsor":0},{"start_s":340.639,"end_s":347.36,"text":"leak might cover your monitoring fees anyway and the thing is is like you","speaker":null,"is_sponsor":0},{"start_s":344.639,"end_s":351.36,"text":"never know what could come back to bite you","speaker":null,"is_sponsor":0},{"start_s":348.72,"end_s":351.36,"text":"and where","speaker":null,"is_sponsor":0},{"start_s":351.759,"end_s":357.759,"text":"and if you don't want anything to bite you check out bitdefender total security","speaker":null,"is_sponsor":0},{"start_s":355.36,"end_s":361.919,"text":"2019. their best in class security solutions for Windows mac Android and","speaker":null,"is_sponsor":0},{"start_s":360.0,"end_s":365.919,"text":"iOS have been awarded outstanding product of the year by av comparatives","speaker":null,"is_sponsor":0},{"start_s":364.0,"end_s":369.6,"text":"and they're trusted by over 500 million users worldwide that is half of a","speaker":null,"is_sponsor":0},{"start_s":368.639,"end_s":374.88,"text":"billion network threat prevention detects attacks including botnets and stops them","speaker":null,"is_sponsor":0},{"start_s":372.96,"end_s":378.639,"text":"before they begin and also prevents your sensitive information from being sent in","speaker":null,"is_sponsor":0},{"start_s":376.639,"end_s":383.28,"text":"an unencrypted format you also get ransomware protection a vpn service","speaker":null,"is_sponsor":0},{"start_s":380.96,"end_s":386.8,"text":"parental controls and autopilot a security advisor that provides","speaker":null,"is_sponsor":0},{"start_s":384.639,"end_s":390.4,"text":"contextual recommendations based on your device's usage and needs","speaker":null,"is_sponsor":0},{"start_s":388.639,"end_s":395.199,"text":"all of this is backed by comprehensive 24 7 support so check out the link below","speaker":null,"is_sponsor":0},{"start_s":392.8,"end_s":399.039,"text":"for more details as well as a special giveaway","speaker":null,"is_sponsor":0},{"start_s":396.88,"end_s":402.16,"text":"so thanks for watching guys like dislike check out our other videos leave a","speaker":null,"is_sponsor":0},{"start_s":400.639,"end_s":409.84,"text":"comment if you have a suggestion for a future fast as possible and don't forget","speaker":null,"is_sponsor":0},{"start_s":405.36,"end_s":409.84,"text":"to subscribe and ring the bell icon","speaker":null,"is_sponsor":0},{"start_s":410.0,"end_s":416.16,"text":"that's weird when you click it it doesn't ring","speaker":null,"is_sponsor":0},{"start_s":413.44,"end_s":419.84,"text":"also also they changed the bell icon so make sure you've got the bell icon on","speaker":null,"is_sponsor":0},{"start_s":417.84,"end_s":425.68,"text":"right there's off and then there's like on a bit and then there's like on all","speaker":null,"is_sponsor":0},{"start_s":421.68,"end_s":425.68,"text":"the time you want that one","speaker":null,"is_sponsor":0}],"full_text":"so there have been plenty of reports in the news lately about large-scale data breaches caused by everything from clever hacking to poor security practices to somebody just leaving a flash drive lying around but once everyone's email addresses passwords and credit card numbers get stolen what actually happens to all that information i mean is there just like a walmart for cybercriminals where they go to buy your personal information at rollback prices and if your information is indeed part of a massive breach how do you find out what are the appropriate precautions so one thing that's helpful in understanding what happens after a data breach is to realize the sheer scope of many of them it's not uncommon for these breaches to affect tens of millions of people at once and sometimes even more so that means that it isn't particularly easy for an individual user to search through large databases of stolen information especially considering the sorts of places that information ends up oftentimes this data actually will appear on dark web markets that require special software to access them where it is indeed bought and sold by cyber criminals hoping to rack up fraudulent charges drain someone's bank account or even commit outright identity theft now you can learn more about the dark web here but it turns out that this isn't the only place where personal data can appear in fact sometimes it'll show up in a much more public pastebin site what's a pastebin site you might ask well it's kind of the digital equivalent of the inside of a bathroom stall wall they're designed for anyone to just dump a large amount of data as plain text and these things can be great for folks like coders who want others to check their code for errors or i mean just anyone who needs a place to quickly jot down a non-sensitive information in recent years though some pastebin sites have become hotbeds for stolen data procured from data breaches now some of this data is put there by hacktivists who don't seek to make much if any money off of their exploits while other leaks are partially dumped to pastebin sites by attackers as a free sample of a larger dataset that they expect to get paid for on one of the aforementioned darknet markets and while anyone can bring up data that's dumped to a paste bin it's not exactly easy for the average consumer to go hunt for their credentials one by one after they heard about the latest big data breach on the news there is good news though there are easier ways to keep tabs on your logins and passwords there are services that try to catalog dark net leaks and that automatically detect when large data dumps appear on paste bins then organize them into databases and save them even if the original data gets taken down one of the best known of these services is have i been pwned which works by having you enter your email address which it then checks against a database of billions of leaked account records to see if you've been affected by a breach have i been pwned uses a bot to monitor pastebin sites for new submissions containing credentials and passwords it offers email notifications if the site finds your info in a recent breach and it also allows users to enter their own passwords to check against the database as well which sounds like a terrible idea but don't worry have i been pwned employs an algorithm that keeps your password secure when you test them by hashing them then only sending the first five characters of the hash to a server that contains the database of known breached passwords after any matching hashes are found they're sent back to your pc which can then determine if your entire hash password is the same as any of the passwords found in the database if you don't know what a hash is by the way you can learn all about them right up here this functionality has actually also been built into some password managers which can even tell you if your credentials have been found in a recent data dump so that's cool but then what if you follow these steps and your details have been compromised well step one is to change your passwords step two is to contact your bank and credit card companies if your email was tied to those accounts and get in touch then with step three one of the major credit reporting agencies once you've contacted them you can do basic things like freezing your credit for free or if you want something a little less intrusive than having your credit frozen you can pay for credit monitoring which will send you a report when anyone tries to open a new account or apply for credit in your name and that last one i know it's kind of a pain and to be quite frank i don't want to advocate for those credit monitoring companies because i think at least some of them are a bunch of yahoos and i don't mean that in like uh yahoo the company way i just i mean they're idiots i remember being on the phone with one of them and complaining that their site doesn't support two-factor authentication even though there's a blog post on their site from like three years ago recommending that you turn two-factor authentication on for any sensitive accounts like and the guy he didn't even the guy on the phone okay low-level customer service person whatever didn't even know what 2fa was you have a lot of sense of information in there anyway it's all you can really do and it's really important in the event of a leak that you take action swiftly if your information is out there because in some cases the company responsible for the leak might cover your monitoring fees anyway and the thing is is like you never know what could come back to bite you and where and if you don't want anything to bite you check out bitdefender total security 2019. their best in class security solutions for Windows mac Android and iOS have been awarded outstanding product of the year by av comparatives and they're trusted by over 500 million users worldwide that is half of a billion network threat prevention detects attacks including botnets and stops them before they begin and also prevents your sensitive information from being sent in an unencrypted format you also get ransomware protection a vpn service parental controls and autopilot a security advisor that provides contextual recommendations based on your device's usage and needs all of this is backed by comprehensive 24 7 support so check out the link below for more details as well as a special giveaway so thanks for watching guys like dislike check out our other videos leave a comment if you have a suggestion for a future fast as possible and don't forget to subscribe and ring the bell icon that's weird when you click it it doesn't ring also also they changed the bell icon so make sure you've got the bell icon on right there's off and then there's like on a bit and then there's like on all the time you want that one"}