ABOUT THE SPEAKER
James Lyne - Cybersecurity specialist
Whether he’s taking on insecure hotspots, inept passwords, or lax OS designers, James Lyne exposes technology’s vulnerabilities while elevating the security awareness of everyday users.

Why you should listen

In an ever-expanding world of networked mobile devices, security threats -- and our ignorance of them -- are more widespread than ever. James Lyne of security firm Sophos believes that if we continue to ignore basic best practices, security is on a trajectory of failure.
 
A self-described geek, Lyne spends time ripping apart the latest gadgets and software, builds true random number generators out of tinfoil and smoke alarm parts, among other unlikely objects. But his gift lies in his ability to explain complicated concepts and abstract threats to diverse audiences around the world.

More profile about the speaker
James Lyne | Speaker | TED.com
TED2013

James Lyne: Everyday cybercrime -- and what you can do about it

Filmed:
1,657,306 views

How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
- Cybersecurity specialist
Whether he’s taking on insecure hotspots, inept passwords, or lax OS designers, James Lyne exposes technology’s vulnerabilities while elevating the security awareness of everyday users. Full bio

Double-click the English transcript below to play the video.

00:12
I'm going to be showing some of the cybercriminals'
0
713
1632
00:14
latest and nastiest creations.
1
2345
2462
00:16
So basically, please don't go and download
2
4807
2908
00:19
any of the viruses that I show you.
3
7715
2696
00:22
Some of you might be wondering what a cybersecurity specialist looks like,
4
10411
3018
00:25
and I thought I'd give you a quick insight
5
13429
2169
00:27
into my career so far.
6
15598
2678
00:30
It's a pretty accurate description.
7
18276
2501
00:32
This is what someone that specializes
8
20777
1656
00:34
in malware and hacking looks like.
9
22433
2420
00:36
So today, computer viruses and trojans,
10
24853
3414
00:40
designed to do everything from stealing data
11
28267
2880
00:43
to watching you in your webcam
12
31147
2041
00:45
to the theft of billions of dollars.
13
33188
2778
00:47
Some malicious code today goes as far
14
35966
2195
00:50
as targeting power, utilities and infrastructure.
15
38161
4143
00:54
Let me give you a quick snapshot
16
42304
1961
00:56
of what malicious code is capable of today.
17
44265
2614
00:58
Right now, every second, eight new users
18
46879
3070
01:01
are joining the Internet.
19
49949
2155
01:04
Today, we will see 250,000 individual new computer viruses.
20
52104
7308
01:11
We will see 30,000 new infected websites.
21
59412
5773
01:17
And, just to kind of tear down a myth here,
22
65185
2086
01:19
lots of people think that when you get infected
23
67271
2488
01:21
with a computer virus, it's because you went to a porn site.
24
69759
3451
01:25
Right? Well, actually, statistically speaking,
25
73210
2443
01:27
if you only visit porn sites, you're safer.
26
75653
3125
01:30
People normally write that down, by the way. (Laughter)
27
78778
3002
01:33
Actually, about 80 percent of these
28
81780
1562
01:35
are small business websites getting infected.
29
83342
3513
01:38
Today's cybercriminal, what do they look like?
30
86855
2285
01:41
Well, many of you have the image, don't you,
31
89140
2426
01:43
of the spotty teenager sitting in a basement,
32
91566
2176
01:45
hacking away for notoriety.
33
93742
2388
01:48
But actually today, cybercriminals
34
96130
1623
01:49
are wonderfully professional and organized.
35
97753
3311
01:53
In fact, they have product adverts.
36
101064
2871
01:55
You can go online and buy a hacking service
37
103935
2131
01:58
to knock your business competitor offline.
38
106066
2149
02:00
Check out this one I found.
39
108215
1559
02:01
(Video) Man: So you're here for one reason,
40
109774
1819
02:03
and that reason is
41
111593
1465
02:05
because you need your business competitors,
42
113058
1912
02:06
rivals, haters, or whatever the reason is, or who,
43
114970
3952
02:10
they are to go down.
44
118922
1744
02:12
Well you, my friend, you've came to the right place.
45
120666
2860
02:15
If you want your business competitors to go down,
46
123526
2416
02:17
well, they can.
47
125942
1336
02:19
If you want your rivals to go offline, well, they will.
48
127278
3424
02:22
Not only that, we are providing a short-term-to-long-term
49
130702
3027
02:25
DDOS service or scheduled attack,
50
133729
2355
02:28
starting five dollars per hour for small personal websites
51
136084
3811
02:31
to 10 to 50 dollars per hour.
52
139895
2904
02:34
James Lyne: Now, I did actually pay
53
142799
1323
02:36
one of these cybercriminals to attack my own website.
54
144122
2793
02:38
Things got a bit tricky when I tried to expense it at the company.
55
146915
3494
02:42
Turns out that's not cool.
56
150409
1714
02:44
But regardless, it's amazing how many products
57
152123
3010
02:47
and services are available now to cybercriminals.
58
155133
3112
02:50
For example, this testing platform,
59
158245
2476
02:52
which enables the cybercriminals
60
160721
1715
02:54
to test the quality of their viruses
61
162436
2482
02:56
before they release them on the world.
62
164918
2452
02:59
For a small fee, they can upload it
63
167370
1957
03:01
and make sure everything is good.
64
169327
1666
03:02
But it goes further.
65
170993
1533
03:04
Cybercriminals now have crime packs
66
172526
2245
03:06
with business intelligence reporting dashboards
67
174771
3119
03:09
to manage the distribution of their malicious code.
68
177890
3476
03:13
This is the market leader in malware distribution,
69
181366
3528
03:16
the Black Hole Exploit Pack,
70
184894
1638
03:18
responsible for nearly one third of malware distribution
71
186532
3659
03:22
in the last couple of quarters.
72
190191
1974
03:24
It comes with technical installation guides,
73
192165
3009
03:27
video setup routines,
74
195174
1045
03:28
and get this, technical support.
75
196219
3955
03:32
You can email the cybercriminals and they'll tell you
76
200174
2388
03:34
how to set up your illegal hacking server.
77
202562
3622
03:38
So let me show you what malicious code looks like today.
78
206184
4284
03:42
What I've got here is two systems,
79
210468
2312
03:44
an attacker, which I've made look all Matrix-y and scary,
80
212780
3690
03:48
and a victim, which you might recognize from home or work.
81
216470
3302
03:51
Now normally, these would be on different sides
82
219772
2729
03:54
of the planet or of the Internet,
83
222501
2555
03:57
but I've put them side by side
84
225056
1396
03:58
because it makes things much more interesting.
85
226452
2664
04:01
Now, there are many ways you can get infected.
86
229116
2055
04:03
You will have come in contact with some of them.
87
231171
2592
04:05
Maybe some of you have received an email
88
233763
2096
04:07
that says something like, "Hi, I'm a Nigerian banker,
89
235859
4085
04:11
and I'd like to give you 53 billion dollars
90
239944
2764
04:14
because I like your face."
91
242708
2427
04:17
Or funnycats.exe, which rumor has it
92
245135
3394
04:20
was quite successful in China's recent campaign against America.
93
248529
3769
04:24
Now there are many ways you can get infected.
94
252298
2430
04:26
I want to show you a couple of my favorites.
95
254728
1987
04:28
This is a little USB key.
96
256715
2660
04:31
Now how do you get a USB key to run in a business?
97
259375
2157
04:33
Well, you could try looking really cute.
98
261532
4125
04:37
Awww.
99
265657
1938
04:39
Or, in my case, awkward and pathetic.
100
267595
2363
04:41
So imagine this scenario: I walk into one of your businesses,
101
269958
4189
04:46
looking very awkward and pathetic, with a copy of my C.V.
102
274147
2842
04:48
which I've covered in coffee,
103
276989
1899
04:50
and I ask the receptionist to plug in this USB key
104
278888
3387
04:54
and print me a new one.
105
282275
1949
04:56
So let's have a look here on my victim computer.
106
284224
3230
04:59
What I'm going to do is plug in the USB key.
107
287454
3246
05:02
After a couple of seconds,
108
290700
1490
05:04
things start to happen on the computer on their own,
109
292190
2751
05:06
usually a bad sign.
110
294941
1935
05:08
This would, of course, normally happen
111
296876
1694
05:10
in a couple of seconds, really, really quickly,
112
298570
2758
05:13
but I've kind of slowed it down
113
301328
1660
05:14
so you can actually see the attack occurring.
114
302988
2830
05:17
Malware is very boring otherwise.
115
305818
2517
05:20
So this is writing out the malicious code,
116
308335
2597
05:22
and a few seconds later, on the left-hand side,
117
310932
3797
05:26
you'll see the attacker's screen get some interesting new text.
118
314729
4298
05:31
Now if I place the mouse cursor over it,
119
319027
1931
05:32
this is what we call a command prompt,
120
320958
2307
05:35
and using this we can navigate around the computer.
121
323265
3797
05:39
We can access your documents, your data.
122
327062
2159
05:41
You can turn on the webcam.
123
329221
1501
05:42
That can be very embarrassing.
124
330722
1629
05:44
Or just to really prove a point,
125
332351
1723
05:46
we can launch programs like my personal favorite,
126
334074
3121
05:49
the Windows Calculator.
127
337195
2805
05:52
So isn't it amazing how much control
128
340000
2288
05:54
the attackers can get with such a simple operation?
129
342288
2895
05:57
Let me show you how most malware
130
345183
1931
05:59
is now distributed today.
131
347114
2183
06:01
What I'm going to do is open up a website
132
349297
2520
06:03
that I wrote.
133
351817
1316
06:05
It's a terrible website. It's got really awful graphics.
134
353133
4315
06:09
And it's got a comments section here
135
357448
2194
06:11
where we can submit comments to the website.
136
359642
3681
06:15
Many of you will have used something a bit like this before.
137
363323
3007
06:18
Unfortunately, when this was implemented,
138
366330
1947
06:20
the developer was slightly inebriated
139
368277
2425
06:22
and managed to forget
140
370702
1242
06:23
all of the secure coding practices he had learned.
141
371944
2989
06:26
So let's imagine that our attacker,
142
374933
3066
06:29
called Evil Hacker just for comedy value,
143
377999
3448
06:33
inserts something a little nasty.
144
381447
2023
06:35
This is a script.
145
383470
1699
06:37
It's code which will be interpreted on the webpage.
146
385169
4077
06:41
So I'm going to submit this post,
147
389246
2325
06:43
and then, on my victim computer,
148
391571
2382
06:45
I'm going to open up the web browser
149
393953
2027
06:47
and browse to my website,
150
395980
2253
06:50
www.incrediblyhacked.com.
151
398233
3789
06:54
Notice that after a couple of seconds,
152
402022
2124
06:56
I get redirected.
153
404146
1457
06:57
That website address at the top there,
154
405603
1977
06:59
which you can just about see, microshaft.com,
155
407580
3331
07:02
the browser crashes as it hits one of these exploit packs,
156
410911
3193
07:06
and up pops fake antivirus.
157
414104
4024
07:10
This is a virus pretending to look like antivirus software,
158
418128
5056
07:15
and it will go through and it will scan the system,
159
423184
2365
07:17
have a look at what its popping up here.
160
425549
1508
07:19
It creates some very serious alerts.
161
427057
1748
07:20
Oh look, a child porn proxy server.
162
428805
2343
07:23
We really should clean that up.
163
431148
2432
07:25
What's really insulting about this is
164
433580
1584
07:27
not only does it provide the attackers with access to your data,
165
435164
4238
07:31
but when the scan finishes, they tell you
166
439402
2823
07:34
in order to clean up the fake viruses,
167
442225
3123
07:37
you have to register the product.
168
445348
2676
07:40
Now I liked it better when viruses were free.
169
448024
3336
07:43
(Laughter)
170
451360
2779
07:46
People now pay cybercriminals money
171
454139
2526
07:48
to run viruses,
172
456665
2101
07:50
which I find utterly bizarre.
173
458766
2761
07:53
So anyway, let me change pace a little bit.
174
461527
3536
07:57
Chasing 250,000 pieces of malware a day
175
465063
3506
08:00
is a massive challenge,
176
468569
1655
08:02
and those numbers are only growing
177
470224
2070
08:04
directly in proportion to the length of my stress line, you'll note here.
178
472294
3879
08:08
So I want to talk to you briefly
179
476173
1876
08:10
about a group of hackers we tracked for a year
180
478049
3050
08:13
and actually found --
181
481099
2007
08:15
and this is a rare treat in our job.
182
483106
2577
08:17
Now this was a cross-industry collaboration,
183
485683
2483
08:20
people from Facebook, independent researchers,
184
488166
2389
08:22
guys from Sophos.
185
490555
2081
08:24
So here we have a couple of documents
186
492636
2655
08:27
which our cybercriminals had uploaded
187
495291
2826
08:30
to a cloud service, kind of like Dropbox or SkyDrive,
188
498117
4377
08:34
like many of you might use.
189
502494
2209
08:36
At the top, you'll notice a section of source code.
190
504703
3392
08:40
What this would do is send the cybercriminals
191
508095
2968
08:43
a text message every day telling them how much money
192
511063
5040
08:48
they'd made that day,
193
516103
1666
08:49
so a kind of cybercriminal billings report, if you will.
194
517769
3296
08:53
If you look closely, you'll notice a series
195
521065
2757
08:55
of what are Russian telephone numbers.
196
523822
2983
08:58
Now that's obviously interesting,
197
526805
1479
09:00
because that gives us a way of finding our cybercriminals.
198
528284
3237
09:03
Down below, highlighted in red,
199
531521
2115
09:05
in the other section of source code,
200
533636
1751
09:07
is this bit "leded:leded."
201
535387
2743
09:10
That's a username,
202
538130
1289
09:11
kind of like you might have on Twitter.
203
539419
2859
09:14
So let's take this a little further.
204
542278
1231
09:15
There are a few other interesting pieces
205
543509
2258
09:17
the cybercriminals had uploaded.
206
545767
2275
09:20
Lots of you here will use smartphones
207
548042
2572
09:22
to take photos and post them from the conference.
208
550614
2647
09:25
An interesting feature of lots of modern smartphones
209
553261
2837
09:28
is that when you take a photo,
210
556098
1667
09:29
it embeds GPS data about where that photo was taken.
211
557765
4237
09:34
In fact, I've been spending a lot of time
212
562002
2443
09:36
on Internet dating sites recently,
213
564445
2244
09:38
obviously for research purposes,
214
566689
2411
09:41
and I've noticed that about 60 percent
215
569100
3521
09:44
of the profile pictures on Internet dating sites
216
572621
2823
09:47
contain the GPS coordinates of where the photo was taken,
217
575444
4451
09:51
which is kind of scary
218
579895
1061
09:52
because you wouldn't give out your home address
219
580956
2562
09:55
to lots of strangers,
220
583518
1449
09:56
but we're happy to give away our GPS coordinates
221
584967
1994
09:58
to plus or minus 15 meters.
222
586961
4029
10:02
And our cybercriminals had done the same thing.
223
590990
3234
10:06
So here's a photo which resolves to St. Petersburg.
224
594224
3204
10:09
We then deploy the incredibly advanced hacking tool.
225
597428
3686
10:13
We used Google.
226
601114
2395
10:15
Using the email address, the telephone number
227
603509
2225
10:17
and the GPS data, on the left you see an advert
228
605734
3549
10:21
for a BMW that one of our cybercriminals is selling,
229
609283
3669
10:24
on the other side an advert for the sale of sphynx kittens.
230
612952
5348
10:30
One of these was more stereotypical for me.
231
618300
3100
10:33
A little more searching, and here's our cybercriminal.
232
621400
3989
10:37
Imagine, these are hardened cybercriminals
233
625389
3546
10:40
sharing information scarcely.
234
628935
1868
10:42
Imagine what you could find
235
630803
1148
10:43
about each of the people in this room.
236
631951
1703
10:45
A bit more searching through the profile
237
633654
1806
10:47
and there's a photo of their office.
238
635460
1860
10:49
They were working on the third floor.
239
637320
2048
10:51
And you can also see some photos
240
639368
2199
10:53
from his business companion
241
641567
1175
10:54
where he has a taste in a certain kind of image.
242
642742
4839
10:59
It turns out he's a member of the Russian Adult Webmasters Federation.
243
647581
3995
11:03
But this is where our investigation starts to slow down.
244
651576
3017
11:06
The cybercriminals have locked down their profiles quite well.
245
654593
3943
11:10
And herein is the greatest lesson
246
658536
2035
11:12
of social media and mobile devices for all of us right now.
247
660571
4578
11:17
Our friends, our families and our colleagues
248
665149
3730
11:20
can break our security even when we do the right things.
249
668879
4689
11:25
This is MobSoft, one of the companies
250
673568
2780
11:28
that this cybercriminal gang owned,
251
676348
2166
11:30
and an interesting thing about MobSoft
252
678514
1589
11:32
is the 50-percent owner of this
253
680103
2871
11:34
posted a job advert,
254
682974
1947
11:36
and this job advert matched one of the telephone numbers
255
684921
3380
11:40
from the code earlier.
256
688301
2152
11:42
This woman was Maria,
257
690453
2125
11:44
and Maria is the wife of one of our cybercriminals.
258
692578
2880
11:47
And it's kind of like she went into her social media settings
259
695458
3520
11:50
and clicked on every option imaginable
260
698978
2795
11:53
to make herself really, really insecure.
261
701773
3697
11:57
By the end of the investigation,
262
705470
1567
11:59
where you can read the full 27-page report at that link,
263
707037
3559
12:02
we had photos of the cybercriminals,
264
710596
2034
12:04
even the office Christmas party
265
712630
2895
12:07
when they were out on an outing.
266
715525
1866
12:09
That's right, cybercriminals do have Christmas parties,
267
717391
3249
12:12
as it turns out.
268
720640
1588
12:14
Now you're probably wondering what happened to these guys.
269
722228
2235
12:16
Let me come back to that in just a minute.
270
724463
2937
12:19
I want to change pace to one last little demonstration,
271
727400
2747
12:22
a technique that is wonderfully simple and basic,
272
730147
3969
12:26
but is interesting in exposing how much information
273
734116
3065
12:29
we're all giving away,
274
737181
1776
12:30
and it's relevant because it applies to us as a TED audience.
275
738957
4278
12:35
This is normally when people start kind of shuffling in their pockets
276
743235
2450
12:37
trying to turn their phones onto airplane mode desperately.
277
745685
4218
12:41
Many of you all know about the concept
278
749903
1686
12:43
of scanning for wireless networks.
279
751589
2343
12:45
You do it every time you take out your iPhone or your Blackberry
280
753932
3401
12:49
and connect to something like TEDAttendees.
281
757333
4020
12:53
But what you might not know
282
761353
1747
12:55
is that you're also beaming out a list of networks
283
763100
4751
12:59
you've previously connected to,
284
767851
2422
13:02
even when you're not using wireless actively.
285
770273
4147
13:06
So I ran a little scan.
286
774420
1727
13:08
I was relatively inhibited compared to the cybercriminals,
287
776147
2926
13:11
who wouldn't be so concerned by law,
288
779073
2544
13:13
and here you can see my mobile device.
289
781617
2587
13:16
Okay? So you can see a list of wireless networks.
290
784204
2654
13:18
TEDAttendees, HyattLB. Where do you think I'm staying?
291
786858
4627
13:23
My home network, PrettyFlyForAWifi,
292
791485
3493
13:26
which I think is a great name.
293
794978
1765
13:28
Sophos_Visitors, SANSEMEA, companies I work with.
294
796743
2767
13:31
Loganwifi, that's in Boston. HiltonLondon.
295
799510
3308
13:34
CIASurveillanceVan.
296
802818
2441
13:37
We called it that at one of our conferences
297
805259
1609
13:38
because we thought that would freak people out,
298
806868
1736
13:40
which is quite fun.
299
808604
1994
13:42
This is how geeks party.
300
810598
4658
13:47
So let's make this a little bit more interesting.
301
815256
2207
13:49
Let's talk about you.
302
817463
2538
13:52
Twenty-three percent of you have been to Starbucks
303
820001
2110
13:54
recently and used the wireless network.
304
822111
3115
13:57
Things get more interesting.
305
825226
1164
13:58
Forty-six percent of you I could link to a business,
306
826390
2446
14:00
XYZ Employee network.
307
828836
2870
14:03
This isn't an exact science, but it gets pretty accurate.
308
831706
4179
14:07
Seven hundred and sixty-one of you I could identify a hotel you'd been to recently,
309
835885
4469
14:12
absolutely with pinpoint precision somewhere on the globe.
310
840354
3839
14:16
Two hundred and thirty-four of you, well, I know where you live.
311
844193
3948
14:20
Your wireless network name is so unique
312
848141
2319
14:22
that I was able to pinpoint it
313
850460
1549
14:24
using data available openly on the Internet
314
852009
2667
14:26
with no hacking or clever, clever tricks.
315
854676
4248
14:30
And I should mention as well that
316
858924
1820
14:32
some of you do use your names,
317
860744
1542
14:34
"James Lyne's iPhone," for example.
318
862286
2596
14:36
And two percent of you have a tendency to extreme profanity.
319
864882
4358
14:41
So something for you to think about:
320
869240
2004
14:43
As we adopt these new applications and mobile devices,
321
871244
3913
14:47
as we play with these shiny new toys,
322
875157
2317
14:49
how much are we trading off convenience
323
877474
3822
14:53
for privacy and security?
324
881296
2890
14:56
Next time you install something,
325
884186
2058
14:58
look at the settings and ask yourself,
326
886244
2304
15:00
"Is this information that I want to share?
327
888548
3552
15:04
Would someone be able to abuse it?"
328
892100
2890
15:06
We also need to think very carefully
329
894990
2072
15:09
about how we develop our future talent pool.
330
897062
4141
15:13
You see, technology's changing at a staggering rate,
331
901203
2979
15:16
and that 250,000 pieces of malware
332
904182
3176
15:19
won't stay the same for long.
333
907358
2872
15:22
There's a very concerning trend
334
910230
2198
15:24
that whilst many people coming out of schools now
335
912428
3193
15:27
are much more technology-savvy, they know how to use technology,
336
915621
4412
15:32
fewer and fewer people are following the feeder subjects
337
920033
3613
15:35
to know how that technology works under the covers.
338
923646
4324
15:39
In the U.K., a 60 percent reduction since 2003,
339
927970
4385
15:44
and there are similar statistics all over the world.
340
932355
3775
15:48
We also need to think about the legal issues in this area.
341
936130
4076
15:52
The cybercriminals I talked about,
342
940206
1527
15:53
despite theft of millions of dollars,
343
941733
2139
15:55
actually still haven't been arrested,
344
943872
2109
15:57
and at this point possibly never will.
345
945981
3559
16:01
Most laws are national in their implementation,
346
949540
3500
16:05
despite cybercrime conventions, where the Internet
347
953040
3999
16:09
is borderless and international by definition.
348
957039
3106
16:12
Countries do not agree, which makes this area
349
960145
2833
16:14
exceptionally challenging from a legal perspective.
350
962978
3617
16:18
But my biggest ask is this:
351
966595
4360
16:22
You see, you're going to leave here
352
970955
1642
16:24
and you're going to see some astonishing stories in the news.
353
972597
3717
16:28
You're going to read about malware doing incredible
354
976314
2174
16:30
and terrifying, scary things.
355
978488
3261
16:33
However, 99 percent of it works
356
981749
3929
16:37
because people fail to do the basics.
357
985678
4190
16:41
So my ask is this: Go online,
358
989868
3022
16:44
find these simple best practices,
359
992890
2645
16:47
find out how to update and patch your computer.
360
995535
2554
16:50
Get a secure password.
361
998089
1551
16:51
Make sure you use a different password
362
999640
1530
16:53
on each of your sites and services online.
363
1001170
3351
16:56
Find these resources. Apply them.
364
1004521
3243
16:59
The Internet is a fantastic resource
365
1007764
2611
17:02
for business, for political expression,
366
1010375
2065
17:04
for art and for learning.
367
1012440
2331
17:06
Help me and the security community
368
1014771
3182
17:09
make life much, much more difficult
369
1017953
3468
17:13
for cybercriminals.
370
1021421
1952
17:15
Thank you.
371
1023373
1328
17:16
(Applause)
372
1024701
4539

▲Back to top

ABOUT THE SPEAKER
James Lyne - Cybersecurity specialist
Whether he’s taking on insecure hotspots, inept passwords, or lax OS designers, James Lyne exposes technology’s vulnerabilities while elevating the security awareness of everyday users.

Why you should listen

In an ever-expanding world of networked mobile devices, security threats -- and our ignorance of them -- are more widespread than ever. James Lyne of security firm Sophos believes that if we continue to ignore basic best practices, security is on a trajectory of failure.
 
A self-described geek, Lyne spends time ripping apart the latest gadgets and software, builds true random number generators out of tinfoil and smoke alarm parts, among other unlikely objects. But his gift lies in his ability to explain complicated concepts and abstract threats to diverse audiences around the world.

More profile about the speaker
James Lyne | Speaker | TED.com

Data provided by TED.

This site was created in May 2015 and the last update was on January 12, 2020. It will no longer be updated.

We are currently creating a new site called "eng.lish.video" and would be grateful if you could access it.

If you have any questions or suggestions, please feel free to write comments in your language on the contact form.

Privacy Policy

Developer's Blog

Buy Me A Coffee