Tiger Team (TV series)

Last updated

Tiger Team is a 2007 American television show on Court TV, [1] that was aired as a burn-off pilot on the evening of December 25, 2007, [2] days before the network converted to the new branding of truTV.

Contents

The show follows a civilian tiger team [3] composed of Chris Nickerson, Luke McOmie, and Ryan Jones, members of Alternative Technology, an Information Security company from Colorado, which is hired to infiltrate organizations with the objective of testing their weaknesses to electronic, psychological, tactical, and physical threats. Attacks executed on organizations in this television show include social engineering, wired and wireless hacking, and physical breaking and entering

Tiger Team's two produced episodes aired on Christmas Night 2007 at 11:00 pm ET, a time when original new television programming usually never premieres, much less non-holiday programming. Although some viewers were interested in more episodes of the show, the network emailed those who inquired to say it was only a 'special', and there would be no consideration under truTV's new programming direction to make it a continuing series. [4]

Episodes

Reception

The first episode was described as an "excellent example " of the issue posed by persons "posing as a vendor [to] compromise [a] target company". [6] [7]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of cybercrime.

<span class="mw-page-title-main">Lisa Rinna</span> American actress (b. 1963)

Lisa Rinna is an American actress, television personality and model. As an actress, she is best known for her roles as Billie Reed on the NBC daytime soap opera Days of Our Lives and Taylor McBride on Fox's television drama Melrose Place. Between 2014 and 2022, Rinna starred on Bravo's hit reality television series The Real Housewives of Beverly Hills. Other television credits include being a contestant on NBC's The Celebrity Apprentice and ABC's Dancing with the Stars, as well as guest-starring roles on series such as Entourage, Veronica Mars, Community, The Middle, and American Horror Stories. Rinna made her Broadway debut in Chicago as Roxie Hart in June 2007.

<span class="mw-page-title-main">Social engineering (security)</span> Psychological manipulation of people into performing actions or divulging confidential information

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."

An over-the-air update, also known as over-the-air programming, is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network. These embedded systems include mobile phones, tablets, set-top boxes, cars and telecommunications equipment. OTA updates for cars and internet of things devices can also be called firmware over-the-air (FOTA). Various components may be updated OTA, including the device's operating system, applications, configuration settings, or parameters like encryption keys.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is performed to identify weaknesses, including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed.

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.

A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Air gap (networking)</span> Network security measure

An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. It means a computer or network has no network interface controllers connected to other networks, with a physical or conceptual air gap, analogous to the air gap used in plumbing to maintain water quality.

A red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work for the organization or are hired by the organization. Their work is legal, but can surprise some employees who may not know that red teaming is occurring, or who may be deceived by the red team. Some definitions of red team are broader, and include any group within an organization that is directed to think outside the box and look at alternative scenarios that are considered less plausible. This can be an important defense against false assumptions and groupthink. The term red teaming originated in the 1960s in the United States.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

Physical information security is the intersection or common ground between physical security and information security. It primarily concerns the protection of tangible information-related assets such as computer systems and storage media against physical, real-world threats such as unauthorized physical access, theft, fire and flood. It typically involves physical controls such as protective barriers and locks, uninterruptible power supplies, and shredders. Information security controls in the physical domain complement those in the logical domain, and procedural or administrative controls.

<span class="mw-page-title-main">Kevin Pereira</span> American game show host and TV personality

Kevin Elder Pereira is an American television personality and host.

<i>Hardcore Pawn</i> American TV reality show

Hardcore Pawn is an American reality television series produced by RDF USA and Richard Dominick Productions for truTV about the day-to-day operations of American Jewelry and Loan, a family-owned and -operated pawn shop and broker in Detroit, Michigan's 8 Mile Road corridor.

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

<span class="mw-page-title-main">Kali Linux</span> Debian-based Linux distribution for penetration testing

Kali Linux is a Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security. The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories. The tagline of Kali Linux and BackTrack is "The quieter you become, the more you are able to hear", which is displayed on some backgrounds, see this example.

Barnaby Michael Douglas Jack was a New Zealand hacker, programmer and computer security expert. He was known for his presentation at the Black Hat computer security conference in 2010, during which he exploited two ATMs and made them dispense fake paper currency on the stage. Among his other most notable works were the exploitation of various medical devices, including pacemakers and insulin pumps.

Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”.

<i>Hack My Life</i> 2015 American TV series or program

Hack My Life is an American how-to series that premiered on truTV on January 6, 2015.

References

  1. "Tiger Team brings haxploitation to TV • The Register".
  2. Baichtal, John. "Hackers on Court TV!". Wired. ISSN   1059-1028 . Retrieved 2024-11-16.
  3. "Court TV getting makeover in '08". Reuters. 2007-08-09.
  4. Bejtlich, Richard (6 January 2008). "No More Tiger Team?". TaoSecurity Blog. Blogspot. Archived from the original on 25 January 2013. Retrieved 12 December 2021.
  5. Ozkaya, Dr Erdal (2018-04-30). Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert. Packt Publishing Ltd. ISBN   978-1-78883-800-9.
  6. "Unauthorized Personnel - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 2024-11-16.
  7. Wilhelm, Thomas; Andress, Jason (2011-01-01), Wilhelm, Thomas; Andress, Jason (eds.), "Chapter 5 - Disguise", Ninja Hacking, Boston: Syngress, pp. 75–87, ISBN   978-1-59749-588-2 , retrieved 2024-11-16