Episode 16: The Kids That Took Twitter | Cyber Humanity Podcast

Logo
Presented by

Chris Pace, Kev Breen, Paul Bentham, Max Vetter

About this talk

As you might have guessed from the title, the Twitter hack is the focus of this episode – specifically, the kids behind the attack. Why are youngsters so much more likely to turn to cyber crime? How can we guide them onto a more ethical path, while still giving them the opportunity to explore their incredible cyber talents? Kev shares a blast from the past and tells us about his path to cyber. Buckle up, because it’s a good’un! Of course, he maintains that he’s stayed firmly away from any shades of grey during his early cyber years. We totally believe you, Kev! We couldn’t cover the Twitter hack story without discussing the somewhat salacious interlude during the court case. How is it that Max can’t even share his screen on Zoom due to security restrictions, but someone can get onto a major court case and share porn? Finally, and most importantly, we puzzle over why these kids merited an entire task force when there are entire criminal organizations out there monetizing malware and doing real harm. Tune in to find out! *** About the Cyber Humanity Podcast Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two main flavors. We’re either ranting about themes close to the heart of us security types, or we’re discussing threats and vulnerabilities that have hit headlines – or slipped under the radar – in recent weeks. Join Chris Pace, Kev Breen, Max Vetter, and Paul Bentham as they wend their way through the murky world of Cyber Humanity.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (9)
Subscribers (2217)
We empower organizations to increase, measure and demonstrate human capabilities in every part of their cybersecurity.