Listen "When Hackers Behave Like Ghosts"
Episode Synopsis
We’re a month away from Halloween, but when a police detective aptly described a hotel hacker as a ghost, I thought it was a really clever analogy! It’s hard to recreate and retrace an attacker’s steps when there are no fingerprints or evidence of forced entry.
Let’s start with your boarding pass. Before you toss it, make sure you shred it, especially the barcode. It can reveal your frequent flyer number, your name, and other PII. You can even submit the passenger’s information on the airline’s website and learn about any future flights. Anyone with access to your printed boarding pass could do harm and you would never know who your perpetrator would be.
Next, let’s assume you arrive at your destination and the hotel is using a hotel key with a vulnerability. In the past, when hackers reveal a vulnerability, companies step up to fix it. But now, when systems need a fix and a software patch won’t do, how do we scale the fix for millions of hardware on hotel keys?
Other articles discussed:
Make metrics and influence people
Keylogging with an iphone and android
Tool of the week: Gost: Build a local copy of Security Tracker.
Panelists: Cindy Ng, Kilian Englert, Forrest Temple, Mike Buckbee
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
Let’s start with your boarding pass. Before you toss it, make sure you shred it, especially the barcode. It can reveal your frequent flyer number, your name, and other PII. You can even submit the passenger’s information on the airline’s website and learn about any future flights. Anyone with access to your printed boarding pass could do harm and you would never know who your perpetrator would be.
Next, let’s assume you arrive at your destination and the hotel is using a hotel key with a vulnerability. In the past, when hackers reveal a vulnerability, companies step up to fix it. But now, when systems need a fix and a software patch won’t do, how do we scale the fix for millions of hardware on hotel keys?
Other articles discussed:
Make metrics and influence people
Keylogging with an iphone and android
Tool of the week: Gost: Build a local copy of Security Tracker.
Panelists: Cindy Ng, Kilian Englert, Forrest Temple, Mike Buckbee
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
More episodes of the podcast State of Cybercrime
Black Hat Cartels
31/10/2025
Supply Chain Attacks
20/09/2025
ShinyHunters' CRM Heist
18/08/2025
Salt Typhoon Returns
25/07/2025
Copilot's Zero-Click Vulnerability
18/06/2025
UK Retail Under Siege
21/05/2025
The Oracle Breach Debate
19/04/2025
$1.5B ByBit Crypto Heist
14/03/2025
DeepSeek Disruption
04/02/2025
U.S. Treasury Breach
15/01/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.