Go offline with the Player FM app!
OSINT, Social Engineering, & the Election (with Ed Porter)
Archived series ("Inactive feed" status)
When? This feed was archived on July 28, 2021 12:26 (). Last successful fetch was on August 22, 2019 01:28 ()
Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 165815543 series 173009
OSINT, Social Engineering, & the Election (with Ed Porter)
ADVANCED PERSISTENT SECURITY PODCAST
EPISODE 25
GUEST: Ed Porter
NOVEMBER 14, 2016
If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.
NOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers
OSINT, Social Engineering, & the Election (with Ed Porter) SHOW NOTES
PART 1
We kick this episode off by discussing a couple of current events in the news. The first is from ThreatPost and discusses a story that academic professionals provide a seal of approval on the signal algorithm and associated apps (What’sApp, Allo, and Signal) rating it ‘Cryptographically sound.” The second, also from ThreatPost discusses an OAuth2 vulnerability released at Black Hat EU and takes advantage of poor implementations to hijack accounts.
Stories
ThreatPost: Signal is Cryptographically Sound
ThreatPost: OAuth2 vulnerability exposes mobile applications
PART 2
We discuss OSINT and Social Engineering as they relate to the election. In this segment, we talk about misinformation campaigns (such as claims of election hacking), gathering information, and influencing the public opinion. This is more of how OSINT and Social Engineering played into the election. Joe provides advice for aspiring candidates to use OSINT to better understand their constituents and develop better campaign platforms.
PART 3
In this segment, the direction shifts to how the election is driving Social Engineering campaigns and what OSINT can be gathered from social media after the election. Joe provides an example of such a phishing campaign purporting to be ABC News. He predicts that the number of campaigns will only increase.
ABOUT Ed
Edward Porter has been working with IT for over 17 years in the Atlanta area and recently obtained his CISSP in August 2016. He has a technical background and has also held certifications from Cisco (CCNA) and CompTIA (A+, Network+, Security+, Linux+). Through his passion for technology and helping others he became a guru to family, friends, and community, spreading the good news about our information age while putting out the resulting fires and malware infections. Having established a solid foundation of IT and networking competencies, he began to focus on information security and protecting others.
Ed is looking for work and can be found on Twitter @edinatl and LinkedIn.
CONTACTING Ed:
PASSWORD BLOG LINKS:
AlienVault
Hosted Locally on Advanced Persistent Security
WI-FI BLOG LINK:
AlienVault
Hosted Locally on Advanced Persistent Security
POWERSHELL LINK:
Thanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.
Enter your email address:Delivered by FeedBurner
SUBSCRIBE TO OUR MAILING LIST
50 episodes
Archived series ("Inactive feed" status)
When? This feed was archived on July 28, 2021 12:26 (). Last successful fetch was on August 22, 2019 01:28 ()
Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 165815543 series 173009
OSINT, Social Engineering, & the Election (with Ed Porter)
ADVANCED PERSISTENT SECURITY PODCAST
EPISODE 25
GUEST: Ed Porter
NOVEMBER 14, 2016
If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.
NOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers
OSINT, Social Engineering, & the Election (with Ed Porter) SHOW NOTES
PART 1
We kick this episode off by discussing a couple of current events in the news. The first is from ThreatPost and discusses a story that academic professionals provide a seal of approval on the signal algorithm and associated apps (What’sApp, Allo, and Signal) rating it ‘Cryptographically sound.” The second, also from ThreatPost discusses an OAuth2 vulnerability released at Black Hat EU and takes advantage of poor implementations to hijack accounts.
Stories
ThreatPost: Signal is Cryptographically Sound
ThreatPost: OAuth2 vulnerability exposes mobile applications
PART 2
We discuss OSINT and Social Engineering as they relate to the election. In this segment, we talk about misinformation campaigns (such as claims of election hacking), gathering information, and influencing the public opinion. This is more of how OSINT and Social Engineering played into the election. Joe provides advice for aspiring candidates to use OSINT to better understand their constituents and develop better campaign platforms.
PART 3
In this segment, the direction shifts to how the election is driving Social Engineering campaigns and what OSINT can be gathered from social media after the election. Joe provides an example of such a phishing campaign purporting to be ABC News. He predicts that the number of campaigns will only increase.
ABOUT Ed
Edward Porter has been working with IT for over 17 years in the Atlanta area and recently obtained his CISSP in August 2016. He has a technical background and has also held certifications from Cisco (CCNA) and CompTIA (A+, Network+, Security+, Linux+). Through his passion for technology and helping others he became a guru to family, friends, and community, spreading the good news about our information age while putting out the resulting fires and malware infections. Having established a solid foundation of IT and networking competencies, he began to focus on information security and protecting others.
Ed is looking for work and can be found on Twitter @edinatl and LinkedIn.
CONTACTING Ed:
PASSWORD BLOG LINKS:
AlienVault
Hosted Locally on Advanced Persistent Security
WI-FI BLOG LINK:
AlienVault
Hosted Locally on Advanced Persistent Security
POWERSHELL LINK:
Thanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.
Enter your email address:Delivered by FeedBurner
SUBSCRIBE TO OUR MAILING LIST
50 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.