Episode 12 MP3 | Youtube | Twitch.TV | Twitter | FacebookiTunesStitcher


Title: If I did it: Confessions of an Election hacker
Synopsis:
“To ‘hack’ an election, all you need to do is to erode trust. A delegitimized election equals a delegitimized winner. “

Red Perspective:
Blue Perspective:
References:
http://icitech.org/icit-analysis-hacking-elections-is-easy-part-one-tactics-techniques-and-procedures/
http://icitech.org/wp-content/uploads/2016/08/ICIT-Analysis-Hacking-Elections-is-Easy-Part-One2.pdf
http://icitech.org/wp-content/uploads/2016/08/ICIT-Analysis-Hacking-Elections-is-Easy-Part-Two
https://research.hks.harvard.edu/publications/workingpapers/citation.aspx?PubId=11349&type=WPN

Title: Odinaff SWIFTly making off with banking funds
Synopsis:
Symantec has found evidence that the Odinaff group has mounted attacks on SWIFT users, using malware to hide customers’ own records of SWIFT messages relating to fraudulent transactions. The tools used are designed to monitor customers’ local message logs for keywords relating to certain transactions. They will then move these logs out of customers’ local SWIFT software environment. We have no indication that SWIFT network was itself compromised.
Red Perspective:
Blue Perspective:
References:
https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks
https://www.symantec.com/connect/blogs/swift-attackers-malware-linked-more-financial-attacks

Title: FireEYE has no shame
Synopsis:
Tries to capitalize on human loss of life and a major catastrophy by comparing cybersecurity to Hurricane Matthew
Red Perspective:
Blue Perspective:
References:
http://gizmodo.com/security-company-uses-tasteless-hurricane-matthew-pitch-1787680027

Title: How TroyHunt deals with abuse
Synopsis:

Red Perspective:
Blue Perspective:
References:
https://www.troyhunt.com/heres-how-i-handle-online-abuse/