Library

Video Player is loading.
 
Current Time 0:00
Duration 6:51
Loaded: 0%
 
x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    First up in today’s roundup of cybersecurity tech news: a plot twist that will surprise

  • 00:03

    absolutely no one, a bluetooth covid test kit has been discovered to be hackable, this

  • 00:09

    is concrete proof that not everything needs to be computerised for the sake of it.

  • 00:14

    The “ellume covid-19 home test” is a super fancy testing kit, the idea is you do the

  • 00:18

    test as you would any other covid test by ramming a rod up your nose, then squeezing

  • 00:23

    a sample of your nostril juice onto the test pad.

  • 00:26

    However this thing isn’t going to give you your result on the test itself, you know the

  • 00:29

    two lines we’ve all become familiar with - instead it connects to your phone via bluetooth,

  • 00:34

    and then your phone tells you whether you’re positive or negative via an app.

  • 00:37

    We’ll get to it’s hackability in a moment.

  • 00:40

    But the more I researched into this thing the more I became just shocked and confused

  • 00:44

    at how ridiculous and pointless this whole device even is.

  • 00:47

    The signal path did a tear down video on it which I’ll link below.

  • 00:51

    It turns out this thing has a standard covid test strip inside of it, the one that produces

  • 00:55

    those two lines.

  • 00:56

    Then it uses some fancy optics and LEDs to read those two lines, before it transmits

  • 01:01

    the result to the app over bluetooth.

  • 01:02

    Oh and it’s single use so once it’s been used you just chuck it away, there’s no

  • 01:07

    way to switch out the test strip.

  • 01:08

    So if I’ve understood this right, all this does, is look at the lines for you, determines

  • 01:13

    whether there’s two of them and tells you via an app.

  • 01:16

    Then because it can only be used once you throw it away, you know the thing you just

  • 01:20

    spent $26 on.

  • 01:22

    I can’t help but feel I’m ranting at this point, but unless I’m missing something,

  • 01:25

    I just find this comically pointless.

  • 01:28

    Anyhow, the hackability that’s why you’re here, by introducing all the technical overheads

  • 01:33

    a device like this needs, ellume has accidentally introduced a bunch of things that can go wrong.

  • 01:39

    Cybersecurity company F-secure discovered that the developers forgot to remove some

  • 01:42

    handy debug features from the app before publishing it.

  • 01:46

    With a rooted Android phone they were able to modify certain variables as well as a checksum

  • 01:51

    in the test result before it was processed via the app.

  • 01:54

    They decided to test this method on their “Marketing manager” who was covid negative

  • 01:58

    at the time.

  • 01:59

    Using their hacks they were able to produce a fake positive covid result, but they could’ve

  • 02:03

    made the result negative if the person was in reality positive.

  • 02:07

    But hang on a second, this test result looks rather official, surely results from this

  • 02:11

    widget weren’t being accepted as proof of covid status to enter the US?

  • 02:14

    Erm, well they were kinda.

  • 02:16

    But with a catch, if you wanted an official certificate like this one, you had to pay

  • 02:20

    $20 to schedule a video call to have someone watch you take the test to make sure you weren’t

  • 02:26

    having someone else take the test for you or something like that, but of course the

  • 02:29

    person watching you can’t tell whether the app itself has been hacked.

  • 02:33

    To make matters worse, these tests were actually recalled a few months ago for unrelated reasons

  • 02:38

    - it turns out they were producing a high number of false positives.

  • 02:42

    Why exactly I can’t be sure, but I would guess it had nothing to do with the actual

  • 02:46

    test strip, and something more to do with all the overhead of having optics to read

  • 02:50

    a couple of lines.

  • 02:52

    The irony of sticking a bunch of electronics in a covid test to produce a device that seems

  • 02:56

    to be worse than a bare test strip whilst also being an order of magnitude more expensive

  • 03:01

    I find hilarious.

  • 03:02

    Let me know in the comments, is there something I’m missing here?

  • 03:05

    Or is this just as ridiculous as it seems?

  • 03:07

    Usually cyber scams aren’t very clever.

  • 03:10

    Whether the plan is to trick a user into enabling macros on an excel spreadsheet or luring someone

  • 03:15

    with the promise of free discord nitro - scams usually rely on a mix of technical illiteracy,

  • 03:20

    and falling for something that’s just too good to be true.

  • 03:23

    However this next scam is ingenious whilst being remarkably simple.

  • 03:27

    Scammers have been putting QR codes on parking meters in an attempt to trick people into

  • 03:31

    giving them money instead of paying for their actual ticket.

  • 03:35

    How this works kinda speaks for itself, in the dead of night someone goes round putting

  • 03:39

    stickers on parking meters which tell people to scan the QR code to pay for their parking,

  • 03:44

    in this case if they did, they were redirected to this site “passportlab.xyz”, which

  • 03:51

    prompts you to log in and give the scammers your card details.

  • 03:53

    The FBI has put out a PSA advising people to be wary of QR codes.

  • 03:58

    If I’m being honest, I don’t think I’d put a QR code under as much scrutiny as I

  • 04:02

    would a link in an email, even though they are essentially both links.

  • 04:06

    I receive phishing emails all the time, cybercriminals are always out to hack youtube channels and

  • 04:11

    turn them into elon musk crypto scam pages.

  • 04:14

    But anyway, when an email has a link I reckon I employ a good amount of caution before clicking

  • 04:19

    it.

  • 04:20

    But if I’m outside, you know - in the real world, and I have to scan a QR code to pay

  • 04:23

    for a ticket, or to check the bus schedule or something seemingly benign, I really don’t

  • 04:28

    think I’d be as careful as if I was clicking a link in an email.

  • 04:32

    Now I definitely will though, and you should too.

  • 04:36

    A VPN company has been shut down in a joint operation with various law enforcement agencies

  • 04:42

    worldwide.

  • 04:43

    Now VPNs aren’t illegal in of themselves, but this VPN company was slightly different

  • 04:48

    in that they “advertised [their services] on the dark web” to cybercriminals as a

  • 04:51

    way to stay hidden when doing things that they probably shouldn’t.

  • 04:55

    The fact that cybercriminals will happily use services like VPNs which are directly

  • 04:59

    marketed to them just never ceases to amaze me.

  • 05:02

    It’s not a smart move for a miscreant to outsource their opsec to a company which is

  • 05:06

    known for providing VPNs to criminals.

  • 05:08

    That’s like trying to hide a sandwich from a seagull by putting it in a hamper full of

  • 05:12

    food.

  • 05:13

    It might work for a while, but you’re just giving the seagulls more of a reason to find

  • 05:17

    a way into the box of treats.

  • 05:18

    The seagulls in this case being the authorities and the sandwich being all the juicy data

  • 05:23

    VPNLab has on their customers, and funnily enough a notice on the now seized domain says

  • 05:27

    that authorities have “seized the customer data stored within” - so no doubt this data

  • 05:32

    is going to lead to other investigations.

  • 05:34

    I couldn’t help but notice that they’ve edited the VPNLab logo to make it look like

  • 05:38

    it’s on fire and falling apart, this is new, I haven’t seen this before on seizure

  • 05:42

    pages.

  • 05:43

    Part of me thinks they got someone on fiverr to make this edit - but however they did it,

  • 05:47

    it is a nice touch to a landing page that is otherwise slightly boring.

  • 05:50

    This isn’t the first VPN company to be taken down, a site called doubleVPN was pwned last

  • 05:55

    year also for catering to criminals.

  • 05:58

    But interestingly when it comes to the VPNLab takedown, no arrests have yet been made, it’s

  • 06:03

    only the infrastructure here that’s been seized.

  • 06:06

    This video is sponsored by Linode, who are giving you $100 worth of free cloud computing.

  • 06:10

    Linode is a totally customisable cloud hosting platform - whether you’re looking to quickly

  • 06:15

    spin up a VPN, website or host a kubernetes cluster - Linode has you covered.

  • 06:19

    If it runs on linux it’ll run on linode.

  • 06:21

    Linode just announced availability of their NVME block storage, the first alternative

  • 06:26

    cloud provider to officially support this state of the art hardware.

  • 06:30

    Linode’s philosophy is to focus on providing all the tools a developer really needs at

  • 06:35

    competitive prices.

  • 06:36

    Use the link in the description now to claim your free $100.

  • 06:40

    Thanks for watching, let’s see if we can hack the youtube AI by tickling the like button,

  • 06:44

    follow me on the instagrams for behind the scenes stuff, and I’ll see you in the next

  • 06:48

    video, have a good one.

All

The example sentences of COMPUTERISED in videos (1 in total of 1)

is verb, 3rd person singular present concrete adjective proof noun, singular or mass that preposition or subordinating conjunction not adverb everything noun, singular or mass needs verb, 3rd person singular present to to be verb, base form computerised verb, past participle for preposition or subordinating conjunction the determiner sake noun, singular or mass of preposition or subordinating conjunction it personal pronoun .

Use "computerised" in a sentence | "computerised" example sentences

How to use "computerised" in a sentence?

  • Rap music is just computerised crap. I listen to Top of the Pops and after three songs I feel like killing someone.
    -George Harrison-
  • I hate the fact that so much of our life is computerised rather than mechanised.
    -Martin Freeman-

Definition and meaning of COMPUTERISED

What does "computerised mean?"

/kəmˈpyo͞odəˌrīz/

verb
To switch to a system that is run by computers.