This is the 79th episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was hosted by Tom Eston and Scott Wright recorded August 23, 2018. Listen to this episode and previous ones direct via your web browser by clicking here!
This episode is available on our YouTube Channel and is the very first episode that we recorded over video via Skype! We apologize for the poor video quality at times and will be testing additional video streaming via Facebook or YouTube live in the future. Please subscribe to our channel and let us know how you like this new format!
In this episode Tom and Scott discuss election hacking which has been top of mind for many of us and a hot topic in the news, especially with the midyear elections coming up in the United States. Tom talks about the DEF CON Voting Machine Hacking Village, what was discovered and how hacking voting machines will hopefully make elections more secure in the future. As mentioned on the show, we recommend checking out previous podcast guest Rachel Tobac’s short video on how easy it was to hack a voting machine used in 18 US states in under 2 minutes:
At @defcon hacking conference and just learned how easy it is to physically gain admin access on a voting machine that is used in 18 states. Requires no tools and takes under 2 minutes. I’m concerned for our upcoming elections. pic.twitter.com/Kl9erBsrtl
— Rachel Tobac (@RachelTobac) August 12, 2018
Scott also discusses the recent phishing “attack” on the Democratic National Committee (DNC) that actually was a authorized phishing test and some of the challenges with disclosing or not disclosing phishing tests to employees.
Please send any show feedback, suggestions for future guests and topics to feedback [aT] sharedsecurity.net or comment in our social media feeds. You can also call our voice mail box at 1-613-693-0997 if you have a question for our Q&A section on the next full episode. Be sure to visit our website, follow us on Twitter, Instagram and like us on Facebook. Thanks for listening!