Logo
    Search

    Podcast Summary

    • Hacking an election goes beyond just manipulating voting machinesElections can be influenced through cyber attacks that manipulate public perception and sow discord, not just through direct manipulation of vote tallies.

      Hacking an election goes beyond just manipulating voting machines. The discussion highlights the example of the French television network TV5 being hacked by a group with suspected ties to the Kremlin, which broadcasted terrorist propaganda to millions of viewers. This incident underscores the importance of securing digital systems against cyber attacks, as well as the potential for hackers to manipulate public perception and sow discord. The hackers behind the TV5 attack were able to exploit vulnerabilities in the system, and their actions were designed to mislead and manipulate the public. This serves as a reminder that elections can be influenced not only through direct manipulation of vote tallies but also through more insidious means, such as spreading misinformation and manipulating public opinion. As technology continues to play a larger role in elections, it's crucial that measures are taken to secure digital systems and protect against cyber attacks.

    • Three pillars of hacking in elections: social, digital, and physicalSocial manipulation, like media bias and voter fraud, may be more significant threats to election integrity than large-scale digital manipulation of voting machines.

      While the idea of hacking voting machines to rig elections is a common concern, it's important to remember that there are multiple aspects to hacking and election manipulation. The discussion highlighted that there are three pillars of hacking: social, digital, and physical. While vote rigging through manipulating voting machines falls under the digital category, it may be less likely on a large scale due to the way elections are run in the United States. Instead, concerns around election manipulation may be more rooted in the social realm, such as media bias and voter fraud, which can be more challenging to address. It's essential to distinguish between voter fraud and the threat of large-scale digital election manipulation, as the two are often conflated. While there are proven cases of voter fraud, it's generally a minor issue compared to the potential impact of digital or social manipulation. Understanding the different aspects of hacking and election manipulation can help us better address these concerns and ensure the integrity of our democratic processes.

    • Modern voting systems' vulnerabilities to hackingHacking modern voting systems can manipulate data, bypass security checks, and alter democratic process outcomes.

      Modern voting systems, being physical devices with digital infrastructure, are inherently vulnerable to hacking due to their network connectivity. Hackers could potentially reverse engineer their own machines and infiltrate the communication networks to manipulate data or bypass security checks. The fear and hope emotions are powerful tools used in political strategies, including hacking elections, making people change their actions, attitudes, and beliefs. Understanding the vulnerabilities of these systems requires in-depth knowledge of their code and infrastructure. While it may seem like an exciting challenge for some, the potential consequences of successful hacking can be detrimental to the democratic process.

    • Privacy Challenges in Political Elections and CybercrimesIn the digital age, privacy is increasingly challenged, leading to cybercrimes such as phishing and social manipulation. It's crucial to protect personal information and advocate for stronger privacy regulations.

      In today's world, where privacy is increasingly challenged, particularly in the digital age, the manipulation and violation of privacy have become significant issues, especially in the context of political elections. The ease of access to vast amounts of information, combined with the removal of privacy barriers, makes individuals and organizations more vulnerable to cybercrimes such as phishing. This can lead to the leakage of confidential emails and conversations, which can then be used for social manipulation and engineering. The line between what is legal and what is not in terms of privacy invasion is becoming increasingly blurred. While some argue that it's a new era of political strategy, others see it as a violation of personal privacy and a threat to democratic processes. It's essential to be aware of these risks and take steps to protect personal information, while also advocating for stronger privacy protections and regulations.

    • Discussing Phishing Scams and the Impact of Secrets in ElectionsPhishing scams can trick people into revealing sensitive information, while secrets and suspicion can influence elections. The effectiveness of each approach depends on the situation.

      Phishing scams are a common method used to obtain sensitive information, such as email addresses and passwords, by disguising fraudulent emails as legitimate ones. In this discussion, an example was given of an email that appeared to be from Gmail, asking the recipient to verify their settings, but in reality, it was a phishing attempt. Once the recipient entered their email address and password, the scammer gained access to their account. The discussion also touched upon the ongoing speculation surrounding Hillary Clinton's emails and the potential impact of revealing secrets versus manufacturing suspicion in the context of influencing an election. Ultimately, it was suggested that the effectiveness of each approach depends on the nature of the secrets being kept. However, both revealing secrets and creating suspicion can be powerful tools in manipulating public opinion. The speakers also acknowledged that they were not directly involved in the US election and were simply discussing the topic from an outsider's perspective.

    • Discussing election interference and maintaining democratic processesDespite political differences, it's crucial to discuss election interference and its impact on democratic processes. The CyberWire Daily Podcast emphasizes the significance of this topic and promises more traditional hacking-focused episodes in the future.

      Despite political differences, it's essential to discuss the implications of election interference and the importance of maintaining democratic processes. The hosts, Jordan Bluman and Scott Winder, acknowledged the intense partisanship surrounding the 2016 election but emphasized the significance of this topic for everyone. They also addressed the extended absence of new episodes and shared their plans for bigger stories and a larger audience. The hosts expressed gratitude to listeners for their patience and support and promised more traditional hacking-focused episodes in the future. If you're new to the show, they encourage you to go back a few episodes for a better understanding of its content. Overall, the conversation underscores the importance of addressing critical issues and the value of ongoing dialogue.

    Recent Episodes from Hacked

    Google Search Leaks

    Google Search Leaks
    Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJuly 02, 2024

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Minimizing And Reducing Security Risk with Dr. Eric Cole

    Minimizing And Reducing Security Risk with Dr. Eric Cole

    "While technology has vastly changed, cybersecurity is pretty straightforward and basic. If you own any company no matter how big or how small, you need to recognize you are a target. And it’s simple, any system accessible from the internet is fully patched, never contains critical data, you do those 2 things and guess what, almost all of the attacks including the solo wins would not have happened if companies just followed some of the core foundations or rules of Cybersecurity."
    -Dr. Eric Cole, Life of a CISO Podcast Host, Secure Anchor Founder

    In this episode, Ben Schneider and Eric discuss the # 1 way of breaking into the systems and the 2 major rules that help prevent major attacks from happening. They also discuss why Smartphones should not be the device where you store your files. He also explains how free applications increase the risk of your security. There’s a lot in store for this episode that will surely help you secure your business.

    Episode Notes:
    Dr. Cole has done work for Lockheed Martin and McAfee. He performs security for the Gates family and was a commissioner for President Obama, for whom Dr. Cole continues to provide security advice.

    CONNECT WITH ERIC
    Links:
    Website | Twitter | Instagram | Facebook | Amazon

    CONNECT WITH US!
    Links:
    >Ben Schneider: Ben's
    Instagram | Ben's Website
    >Business and Lifestyle Legends Podcast: Follow on IG
    @bllpodcastcom
    >For more information and to explore other episodes,
    click here. We'd love to hear from you! Leave us a rating and review below!

    Get the BEN SCHNEIDER COACHING: Reach the next level with your company with the help of a professional marketing strategist, CLICK HERE

    Calling ALL entrepreneurs and online talents! --check out the NEW job search platform Jobmofy.com to upgrade your business!

    For questions or inquiries, EMAIL: hello@bllpodcast.com

    NORTH ATLANTA'S BIZLINK: GNFCC’s Tech400 Committee with Winford Williams, LexisNexis Risk Solutions, and Ralph Pasquariello, Snellings Walters Insurance Agency

    NORTH ATLANTA'S BIZLINK:  GNFCC’s Tech400 Committee with Winford Williams, LexisNexis Risk Solutions, and Ralph Pasquariello, Snellings Walters Insurance Agency
    Show Summary What’s the purpose of the Tech400 Committee of the Greater North Fulton Chamber of Commerce? How do technology companies connect through the activities of this committee? What’s the latest on key technology sectors in North Fulton? This podcast answers these questions and more, as Kali Boatright, CEO of the Greater North Fulton Chamber […] The post NORTH ATLANTA'S BIZLINK: GNFCC’s Tech400 Committee with Winford Williams, LexisNexis Risk Solutions, and Ralph Pasquariello, Snellings Walters Insurance Agency appeared first on Business RadioX ®.