The article Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266 under the topic hacking podcast is being interested by many of you today. Let’s find out Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266 with daotaoladigi.com in today’s article!

Video Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

Share Link Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

Vì tính chất bảo mật ĐƯỜNG LINK nên chúng tôi cần xác minh bằng CODE*



    HƯỚNG DẪN LẤY CODE (CHỈ MẤT 30 GIÂY)

    Bước 1: COPY từ khóa bên dưới (hoặc tự ghi nhớ)

    ghế công thái học

    Bước 2: Bấm vào google.com.vn và tìm từ khóa. Sau đó, nhấp vào kết quả này ().

    You can get software/tools/applications from a variety of sources. The following are the Download Links for the most stable version today

    Description Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

    Nicole Perlroth is a cybersecurity journalist and author. Please support this podcast by checking out our sponsors:
    – Linode: to get $100 free credit
    – InsideTracker: and use code Lex25 to get 25% off
    – Onnit: to get up to 10% off
    – ROKA: and use code LEX to get 20% off your first order
    – Indeed: to get $75 credit

    EPISODE LINKS:
    Nicole’s Twitter:
    Nicole’s Website:
    Nicole’s Book:

    PODCAST INFO:
    Podcast website:
    Apple Podcasts:
    Spotify:
    RSS:
    Full episodes playlist:
    Clips playlist:

    OUTLINE:
    0:00 – Introduction
    0:55 – Zero-day vulnerability
    6:56 – History of hackers
    21:48 – Interviewing hackers
    25:50 – Ransomware attack
    38:34 – Cyberwar
    51:42 – Cybersecurity
    1:00:49 – Social engineering
    1:17:42 – Snowden and whistleblowers
    1:27:12 – NSA
    1:36:59 – Fear for cyberattacks
    1:44:30 – Self-censorship
    1:48:51 – Advice for young people
    1:54:08 – Hope for the future

    SOCIAL:
    – Twitter:
    – LinkedIn:
    – Facebook:
    – Instagram:
    – Medium:
    – Reddit:
    – Support on Patreon:

    Vì tính chất bảo mật ĐƯỜNG LINK nên chúng tôi cần xác minh bằng CODE*



      HƯỚNG DẪN LẤY CODE (CHỈ MẤT 30 GIÂY)

      Bước 1: COPY từ khóa bên dưới (hoặc tự ghi nhớ)

      ghế công thái học

      Bước 2: Bấm vào google.com.vn và tìm từ khóa. Sau đó, nhấp vào kết quả này ().

      Image of Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

      hacking podcast - Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

      Artwork for Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

      Question about Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

      If you have any questions about the article Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266 please let us know, all your questions or suggestions will help me improve in the following articles < /p>

      The article Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266 was compiled by me and my team from many sources. If you find the article Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266 helpful, please support the team Like or Share!

      =>> Check out more videos about hacking podcast here: Youtube Source

      Statistics Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266

      The video “Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar | Lex Fridman Podcast #266” had 770531 views, was liked 16275 times, voted 5.00/5 stars.

      Lex Fridman channel has spent a lot of effort and time to build this video with 02:01:35 length, let’s share this clip to support the author.

      Keywords for this video: #Nicole #Perlroth #Cybersecurity #Weapons #Cyberwar #Lex #Fridman #Podcast, agi,ai,ai podcast,artificial intelligence,artificial intelligence podcast,china,cyberattack,cybersecurity,hacking,lex ai,lex fridman,lex jre,lex mit,lex podcast,mit ai,new york times,nicole perlroth,russia,snowden, hacking podcast, Lex Fridman

      1. Cybersecurity
      2. Cybercrime
      3. Hacking tutorials
      4. Data breaches
      5. Dark web
      6. Computer viruses
      7. Ethical hacking
      8. Network security
      9. Information security
      10. Penetration testing
      11. Phishing
      12. Social engineering
      13. Malware
      14. Cyber espionage
      15. Cyber law
      16. Cyber warfare
      17. White hat hacking
      18. Black hat hacking
      19. Cyber threats
      20. Encryption techniques.

      Comments

      1. Lex Fridman

        Here are the timestamps. Please check out our sponsors to support this podcast.
        0:00 – Introduction & sponsor mentions:
        – Linode: https://linode.com/lex to get $100 free credit
        – InsideTracker: https://insidetracker.com/lex and use code Lex25 to get 25% off
        – Onnit: https://lexfridman.com/onnit to get up to 10% off
        – ROKA: https://roka.com/ and use code LEX to get 20% off your first order
        – Indeed: https://indeed.com/lex to get $75 credit
        0:55 – Zero-day vulnerability
        6:56 – History of hackers
        21:48 – Interviewing hackers
        25:50 – Ransomware attack
        38:34 – Cyberwar
        51:42 – Cybersecurity
        1:00:49 – Social engineering
        1:17:42 – Snowden and whistleblowers
        1:27:12 – NSA
        1:36:59 – Fear for cyberattacks
        1:44:30 – Self-censorship
        1:48:51 – Advice for young people
        1:54:08 – Hope for the future

      2. alexkaa

        Amongst all his variety of guests, I often enjoy Lex himself most – his contemplating on 'authentic weirdness' was highly holistic. 🔥

      3. roman nmv

        Again, don’t really like her biased reasoning… what I read between the lines is that Russia, China, Argentina, Iran etc are those geo hot points that invested heavily in offensive tools as if the US are white and fluffy…

      4. roman nmv

        She sounds like there are no cyber laws and regulations in the us. I am not based in the us but to my knowledge, there are both federal and state regulations in place. Can anyone clarify pls?

      5. Georgeta Carmen

        The tinkering with a bunch of stuff makes a lot more sense to me now.
        My youngest brother used to do that.
        He did end up working as an engineer.
        I guess he was good at it.
        I remember that I got him a new bike for his 12 th birthday.
        And he took it apart because he said that he wanted to make it go faster.
        How?
        It makes more sense now.
        I didn't get upset with him.
        I just paid to fix his bike again.
        I didn't want to break his spirit.
        I enjoyed this conversation.

      6. Native American

        That's why women are failures. They think in terms of global morality rather than what's in the best interest of their family or country. They have no love or loyalty. They try new people on like coats. Think about it. Her moral compass she just said was off because we bombed our enemy. To her she thinks oh okay we are morally wrong. The men will say no, we are right this was for the love of country and family that we built. That is why women are not leaders.

      7. Native American

        I hacked someone's website that had an active host managing their website whom was connected to their personal network and a very big business was network. I hacked the communication between the two people and used that connection to print out all the machines data on that network and then proceeded to gleen Information on the devices. I basically know nothing about network penetration and yet still did this. I wonder what experienced people can do.

      8. H

        Very interested however Nicole has heavy vocal fry in sentences of more than 5 words which makes this so hard to listen to. It is like scratching your fingers on a chalk board. As someone deeply involved in the cybersecurity space I want to listen, but I just can't for more than 1-2 minutes before pausing to maintain inner calm.

      9. Dan

        The NSA using anything for 'traditional espionage' is absolutely reprehensible from a constitutional standpoint. You really can't justify any of it. Safety isn't ever a priority over freedom.

      10. MygenteTV

        Last year I reported 10 vulnerabilities to the US government on some federal government web applications, 5 got accepted and fixed. Those mfs didn't even said thank you to me. Instead they banned me from testing their shit. They got mad when I told them I wanted money for my work, that i didn't care about the bragging of me being able to say I hacked. Those mfs want to pay people for their work by saying "ok you can say hacked us".This girl as many others don't really understand that the US government is NOT good in any way, shape or form. As they told her in Argentina, the US is the last person we like to deal with. They are lucky I had been busy with other stuff but as soon im free, I'm for them for trying to play me out.

      11. Gérard Mentor

        Fridman :"I have a hope that for the most part intelligent agencies are trying to do good and are actually doing good for the world." My god this is so naive…
        Intelligence Agencies are working for the interests of whoever controls them…
        People who have power, whatever the context is, will use it for their own interest.

      12. Gérard Mentor

        On comparing US intelligence agencies or government behaviour regarding ppl freedom, it's true the US doesn't do to it's own ppl what countries like China do, but they do awful and evil stuff abroad, putting friend of theirs in power in for example even if that person is going to commit a genocide towards a minority in that country…
        The US government is just as evil as China, Iran or Russia….they just don't have the possibility to be as bad at home because of the context (laws, constitution…).
        She talks about a guy that was put into solitary confinement "Tht's evil!", the US have done just as bad stuff abroad…Putting Pinochet in power in Chile for example….
        She actually says it, it's the bureaucracy that make it impossible in the US. That bureaucracy is not a obstacle to make evil shit abroad, and it shows…

        US >< China, A Perfect World >< 1984.

      13. Benjamin Hoffman

        This interview was interesting but it hard to listen to her aspouse leftist talking points. I wish Lex would get some diversity of opinion on his podcast since almost everyone of his guests is more left-leaning. Joe Rogan at least gets people from both sides.

      14. jspur22

        So I am a CISSP and use to do in-person social engineering tests for the banks we were auditing. Typically I would google who was in charge of IT or the ISO and name drop them saying that they sent me down to check on some stuff before the audit, or that I was new and needed a tour. I would say at least 60% of the time I was able to get behind a teller line and plug in a USB left in a server room alone, or taken into the vault (pretty much nothing in vaults these days besides safety deposit), without them EVER making a call and verifying who I was.

        Also, I am using the podcast for CPEs and this can be some documentation.

      15. alphaBEE

        Love what she said about making yourself a tougher target. It's always been a golden rule since the beginning of civilizations. Unless ofcourse someone specifically targets you, then one day he's gonna get you.

      16. Skylar Versendaal

        People are not fundamentally good. That’s a very predeterministic mindset and small minded. We all have the capacity for good and also for evil, we choose which way we go. If humans were inherently good then Adolf hitler would have never existed

      17. osi

        Her anti-Trump / Snowden opinions seem based more in ideology other than pure journalism, but other than that it was a fantastic podcast. Will get her book eventually, the audio version if the narration is good.

      18. KnowledgeIsGood

        The answer to this problem is so God Damned simple.
        We need to pull the plug on all the foreign scumbags! The United States needs to cut off all of the dirtbag countries from the Internet. Does anybody in the US look at content that comes from Russia? I don't. What about China or Nigeria, or India? I don't. If all those countries vaporized right now it would not effect me — I would not care. We need to cut off all the Crap Hole countries — Yes I said it! Crap Hole countries. These foreign countries don't do a god damned thing for us…. They are a big turd floating down the Ganges River and I don't want it touching me… Do you want it touching you?

      19. Daniel Tochinskiy

        Great interview Lex, Nicole even talented is too biased, and not a journalist at all. She was trying to sell her book too much. Great job pushing her a bit even though she eluded answering tough questions.

      20. Gravoc

        I’m surprised she didn’t touch on how and mobile two factor authentication is.

        If you’re going to 2FA, use email. Your email provider won’t give your email away on a socially engineered customer service call. Verizon, T-Mobile, or any mainstream ISP are notorious for being low security. If someone has your password, they likely have enough info on you to authenticate enough into phone customer support. Your ISP will literally mail a SIM chip to the hacker, and the hacker now has your mobile number.

        ISP support are supposed to be following authorization protocol. They have back doors into your account if you can’t verify for some obscure reason. Someone can be socially engineered to bypass authentication on your ISP’s end and achieve a means to an end.