Episode 262
Episdoe #262: Edwin Kwan: Casio Data Breach affects over 120,000 customers in 149 countries; Ian Garrett: 6 Types of Supply Chain Attacks (Part 2); Hillary Coover: Keeping Perspective: Why the Social Media Surveillance Revelation Deserves a Thoughtful Look; Marcel Brown: This Day in Tech History
Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.
The stories we’re covering today.
Marcel Brown: October 31st, 2000. Russia launches Soyuz TM-31 carrying the first crew to the International Space Station. Between the 2011 retirement of the space shuttle and the 2020 demo flight of SpaceX Crew Dragon, the Soyuz served as the only means to ferry crew to or from the International Space Station.
Edwin Kwan: Casio has suffered a data breach that has affected over 120,000 customers in 149 countries. Casio said that the cause of the breach was due to some of the network settings in the development environment being disabled due to system operational error.
Hillary Coover: US and Customs Enforcement Agency, ICE, is employing an AI powered tool known as Giant Oak Search Technology to scan social media posts for content that it deems derogatory to the United States. This revelation, first brought to light by 404 Media, has really ruffled some feathers.
Ian Garrett: This is the second part of our exploration into software supply chain attacks. We'll explore dependency confusion, stolen SSL and code-signing certificates, the targeting of developers CI/CD infrastructure, and the use of social engineering to drop malicious code.