full transcript
From the Ted Talk by James Lyne: Everyday cybercrime -- and what you can do about it
Unscramble the Blue Letters
So isn't it amazing how much ctnoorl the attackers can get with such a simple operation? Let me show you how most malware is now distributed today. What I'm going to do is open up a website that I worte. It's a terrible website. It's got really awful graphics. And it's got a comments section here where we can submit comments to the website. Many of you will have used something a bit like this before. Unfortunately, when this was implemented, the developer was slightly inebriated and managed to forget all of the secure cnodig practices he had learned. So let's iangmie that our attacker, called Evil Hacker just for comedy value, isrents something a little nasty. This is a script. It's code which will be interpreted on the webpage. So I'm going to submit this post, and then, on my vctiim computer, I'm going to open up the web bewosrr and browse to my website, www.incrediblyhacked.com. Notice that after a couple of sedoncs, I get rcrteeiedd. That website address at the top there, which you can just about see, microshaft.com, the browser carehss as it hits one of these exploit pckas, and up pops fake antivirus. This is a virus pretending to look like antivirus stofrwae, and it will go through and it will scan the system, have a look at what its popping up here. It creates some very serious alerts. Oh look, a child porn proxy server. We really should clean that up. What's really insulting about this is not only does it provide the attackers with access to your data, but when the scan finishes, they tell you in order to clean up the fake viruses, you have to register the pcourdt. Now I liked it better when viruses were free. (lahutegr) People now pay cirrynlabiemcs mneoy to run vieruss, which I find utterly bizarre.
Open Cloze
So isn't it amazing how much _______ the attackers can get with such a simple operation? Let me show you how most malware is now distributed today. What I'm going to do is open up a website that I _____. It's a terrible website. It's got really awful graphics. And it's got a comments section here where we can submit comments to the website. Many of you will have used something a bit like this before. Unfortunately, when this was implemented, the developer was slightly inebriated and managed to forget all of the secure ______ practices he had learned. So let's _______ that our attacker, called Evil Hacker just for comedy value, _______ something a little nasty. This is a script. It's code which will be interpreted on the webpage. So I'm going to submit this post, and then, on my ______ computer, I'm going to open up the web _______ and browse to my website, www.incrediblyhacked.com. Notice that after a couple of _______, I get __________. That website address at the top there, which you can just about see, microshaft.com, the browser _______ as it hits one of these exploit _____, and up pops fake antivirus. This is a virus pretending to look like antivirus ________, and it will go through and it will scan the system, have a look at what its popping up here. It creates some very serious alerts. Oh look, a child porn proxy server. We really should clean that up. What's really insulting about this is not only does it provide the attackers with access to your data, but when the scan finishes, they tell you in order to clean up the fake viruses, you have to register the _______. Now I liked it better when viruses were free. (________) People now pay ______________ _____ to run _______, which I find utterly bizarre.
Solution
- software
- coding
- victim
- crashes
- viruses
- control
- laughter
- browser
- seconds
- inserts
- money
- redirected
- packs
- imagine
- wrote
- cybercriminals
- product
Original Text
So isn't it amazing how much control the attackers can get with such a simple operation? Let me show you how most malware is now distributed today. What I'm going to do is open up a website that I wrote. It's a terrible website. It's got really awful graphics. And it's got a comments section here where we can submit comments to the website. Many of you will have used something a bit like this before. Unfortunately, when this was implemented, the developer was slightly inebriated and managed to forget all of the secure coding practices he had learned. So let's imagine that our attacker, called Evil Hacker just for comedy value, inserts something a little nasty. This is a script. It's code which will be interpreted on the webpage. So I'm going to submit this post, and then, on my victim computer, I'm going to open up the web browser and browse to my website, www.incrediblyhacked.com. Notice that after a couple of seconds, I get redirected. That website address at the top there, which you can just about see, microshaft.com, the browser crashes as it hits one of these exploit packs, and up pops fake antivirus. This is a virus pretending to look like antivirus software, and it will go through and it will scan the system, have a look at what its popping up here. It creates some very serious alerts. Oh look, a child porn proxy server. We really should clean that up. What's really insulting about this is not only does it provide the attackers with access to your data, but when the scan finishes, they tell you in order to clean up the fake viruses, you have to register the product. Now I liked it better when viruses were free. (Laughter) People now pay cybercriminals money to run viruses, which I find utterly bizarre.
Frequently Occurring Word Combinations
ngrams of length 2
collocation |
frequency |
malicious code |
4 |
usb key |
4 |
pretty accurate |
2 |
computer viruses |
2 |
change pace |
2 |
telephone numbers |
2 |
internet dating |
2 |
dating sites |
2 |
gps coordinates |
2 |
social media |
2 |
wireless networks |
2 |
wireless network |
2 |
ngrams of length 3
collocation |
frequency |
internet dating sites |
2 |
Important Words
- access
- address
- alerts
- amazing
- antivirus
- attacker
- attackers
- awful
- bit
- bizarre
- browse
- browser
- called
- child
- clean
- code
- coding
- comedy
- comments
- computer
- control
- couple
- crashes
- creates
- cybercriminals
- data
- developer
- distributed
- evil
- exploit
- fake
- find
- finishes
- forget
- free
- graphics
- hacker
- hits
- imagine
- implemented
- incrediblyhacked
- inebriated
- inserts
- insulting
- interpreted
- laughter
- learned
- malware
- managed
- microshaft
- money
- nasty
- notice
- open
- operation
- order
- packs
- pay
- people
- popping
- pops
- porn
- post
- practices
- pretending
- product
- provide
- proxy
- redirected
- register
- run
- scan
- script
- seconds
- section
- secure
- server
- show
- simple
- slightly
- software
- submit
- system
- terrible
- today
- top
- utterly
- victim
- virus
- viruses
- web
- webpage
- website
- wrote
- www