Keepingthe hacker out

Jack Stones, a famous hacker, brought down the biggest industrial groups. Take inspiration from his hacking techniques to better protect yourself from attacks.

Episode1

Keeping the hacker out

New podcast

High-speed

espionage

High-speed espionage

Episode1 • 10:49

A talented hacker, Jack Stones acts most often behind his computer screen. But he also knows how to blend in with a crowd ... or on a train. His mission: to approach the target in the wagon, and find an opportunity to steal the confidential research documents stored on his computer. Ultra fast action and above all invisible to the negligent victim.

Discover the other episodes

FAQ

A suspicious e-mail, i.e. of a malicious nature, should catch your attention by the unusual nature of its format or request: spelling or syntax errors, the tone or turn of phrase of the author, a sender you do not know…

If you receive an email that looks suspicious, do not click on the attachments or links. You should also not give out your professional or personal login details or even your bank details. You must report this email to Support ASK.

And if by mistake you clicked on a link or opened a suspicious attachment, even if you closed it right away, you have to report it as well: if the attachment is actually malicious, it only needs a few microseconds to corrupt your computer, especially considering how fast computers can execute commands today. Most often, these malicious codes run in stealth mode and without displaying anything on the screen. We all make mistakes, but if you do click, the most important thing is to know how to react. Report what you did directly to ASK and they will do their best to remove any doubt by analyzing your device. At worst, you will have avoided a security incident.

Email is still the most used written communication medium in most companies. Also, the volume of requests contributes to reducing the level of vigilance devoted to each one. It is therefore unfortunately logical that emails are nine out of ten times the entry way for corporate hacking.

If you use the same password in several places (websites, applications...), and one of them was to be hacked, the password associated with your name or email address would then be known, and could be reused by attackers to effortlessly access your user account on other sites where it would be identical.

A good password, or a so-called "strong" password, is one that takes too long to guess or crack by testing all combinations, for example. This is why it is important to choose a long password (at least 12 characters), and one that does not contain any known information that could make hacking easier: do not use your login, your name, your first name, or any other information that can be found about you. Ideally, you can even complicate the hacker's job by varying the possibilities: use lower case, upper case, special characters or punctuation...

One trick is to take a quote that you know well or that is easy to remember, and use only the first few letters of each word. For example: "Being famous on Twitter is like being rich in Monopoly :)" would give "BfoTilbriM:)". And this is a 14-character password that is hard to crack! (Atia14cptihtc!)

Company's informational assets: methods, processes, patents, know-how... It is with good reason that data is called the new black gold. There will always be someone for whom this data is valuable (by giving them a competitive, strategic or financial advantage) and who may try to acquire it illegally. That's why you need to be careful about what you share, and with whom, but also about what you might voluntarily or involuntarily expose.

Keeping the hacker out
Contact ASK

Having a doubt

of being a hacker's target?

Contact ASK

See other episodes

 

Month of cybersecurity

The European Cybersecurity Month (ECSM) is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations, and to providing up-to-date online security information through awareness raising and sharing of good practices.

The ECSM campaign is coordinated by the European Union Agency for Cybersecurity (ENISA) and the European Commission, and supported by EU Member States and hundreds of partners from Europe, and beyond.

The European Cybersecurity Month

French presidency of the European union: the cyber security cooperation networks of the EU have met in Paris

Le mois de la cybersécurité
Le mois de la cybersécurité
High-speed espionage
/
  • High-speed espionage

    High-speed espionage

    Oct 4, 2021 • 10:49

    Discover exclusively the testimony of Jack Stones, a computer hacker whose cyberattacks have shaken the leaders of large industrial groups.

  • To pay or not to pay?

    To pay or not to pay?

    Oct 14, 2021 • 11:19

    Mandated by a competitor to buy up a competitive market, Jack shifts from shadow to light. He leaves his hacker’s den to infiltrate openly into the heart of a business. His goal: to derail the production line with spyware. Exhilarated by the taste for risk and the greed, he will…

  • Criminal messaging

    Criminal messaging

    Oct 21, 2021 • 11:25

    Jack evokes the birth of his “vocation”. From small amateur hacks to massive cyber attacks, he defines hacking as child’s play. His first shot? A theft of sensitive data carried out on a café terrace. Just by listening to a conversation. Clever, simple and terribly effective. What espionage techniques did…

  • Identity theft

    Identity theft

    Oct 28, 2021 • 11:00

    A hacker’s most important tool? Patience. Jack waited 200 days to go from phishing to the perfect catch. 200 days to destabilize a company before it goes public. 200 days spent collecting data, observing, intercepting identifiers. Patiently, he infiltrated the company’s computer system, and more precisely, the brains of its…