hacking tags

Bull Session

Hacking the DNC

July 28, 2016          

Episode Summary

This week on The Digital Life we discuss cyberwarfare, propaganda, and the release of the DNC’s e-mails on WikiLeaks, but what some security experts have indicated to be Russian hackers.

Small groups of technologically empowered people are shaping our digital world in new ways. We’ve heard about the creative class of knowledge workers who leverage digital technology to build new things. These destructive actors are, in many ways, their polar opposite.

 
Resources:
Clinton campaign — and some cyber experts — say Russia is behind email release

Bull Session

Hacking Power

January 21, 2016          

Episode Summary

This week on The Digital Life, we chat about hacking power grids, the IoT, and the escalation of cyber warfare.

Power grids are becoming increasingly subject to cyber attacks and now, at least one has been successful. In December, an attack on a utility in Western Ukraine caused a blackout for 80,000 customers, which was the first known power outage caused by a cyber attack. The malware used in the attack, called BlackEnergy, infected systems via a corrupted Microsoft Word attachment. In January, Kiev’s main airport went dark after a power outage, once again linked to BlackEnergy. As cyber attacks begin causing life and death situations in the real world, the concern over security and the IoT grows.

Resources
First Known Hacker Caused Power Outage Signals Troubling Escalation
Malware Clearly Behind Ukraine Power Outage, SANS Utility Expert Says
Hackers caused power cut in western Ukraine – US

Bull Session

The Top Stories of 2015

December 17, 2015          

Episode Summary

This week, on The Digital Life we chat about the top science and technology stories of 2015.

From new net neutrality rules to evidence of flowing water on Mars, Amazon’s cut throat corporate culture to outrageous drug price increases, hacking exploits to genetically altered designer babies, we explore the biggest and most impactful news events of the year.

Resources
White House Approves Sanctions Against North Korea for Sony Hack
FCC Passes Net Neutrality Rules, Reclassifies Broadband as Utility
Working for Amazon Can Be Awful. Is It As Awful As the New York Times Says?
A Huge Overnight Increase in a Drug’s Price Raises Protests
NASA Scientists Find Evidence of Flowing Water on Mars
Chinese Experiment Which ‘Edits’ DNA of Human Embryos Ignites Ethical Controversy

Bull Session

Cyberwar

November 26, 2015          

Episode Summary

On The Digital Life this week, we chat about Anonymous, in the wake of their declaring war on the terrorist group, ISIS.

This conflict represents something entirely new in 21st century warfare, and is strongly related to the transformation of power in the digital age. Both of these groups are new types of organizations — nimble, distributed, and asynchronous — they present their adversaries with few primary targets. They both rely heavily on digital tools to inspire others to join a movement.

Will Anonymous’ war on ISIS ultimately be harmful or helpful? While stopping the ISIS propaganda machine would be of great benefit, removing terrorists from Twitter and other social networks will make it more difficult for national intelligence agencies and security firms to track them. And, in response to the campaign by Anonymous, ISIS will no doubt change its online tactics to defend itself.

As we watch this cyberwar unfold, we can only imagine how it is a precursor to future conflicts where the boundaries blur between the digital and physical worlds.

Resources
Anonymous Takes on IS
Cyber War: What Can Anonymous Really Do to ISIS?
Is Anonymous’ War on ISIS Doing More Harm Than Good?

Bull Session

Hacking Cars

July 30, 2015          

Episode Summary

In this episode of The Digital Life, we discuss the Jeep auto hack in which cybersecurity researchers were able to remotely take control of a car’s critical systems, the subsequent 1.4M vehicle recall by Chrysler, and the new bill introduced by Senators Ed Markey (Dem – Massachusetts) and Richard Blumenthal (Dem – Connecticut) to protect automobiles from cyberattacks. Are security and privacy the defining issues for the Internet of Things? Unfortunately, it seems like this incident may be the first of many examples of hacking the IoT and connected environments.

Resources

Hackers Remotely Kill a Jeep on the Highway—With Me in It
After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix
Senate Bill Seeks Standards For Cars’ Defenses From Hackers