
Sign up to save your podcasts
Or
Hosts Sug Shin and Dan Chung discuss the North Korean hacking apparatus in its totality. In edition to the crypto heist that we discussed in Ep. 2, North Korea engages in all matter of activities related to hacking. Some experts has dubbed this "The All-Purpose Sword" (link below). Besides its growing nuclear and ICBM capabilities, North Korea has quietly been organizing its military around its cyber operations. The hosts discuss some of the more public cyber attacks the country has engaged in over the years as well as some of the methods they currently employ. Dan also gets into the issues that Crossing Borders faces surrounding the prospect of spies infiltrating their networks. The episode ends with Sug and Dan bemoaning their parents' susceptibility to phishing and other online scams.
Links:
The All-Purpose Sword study
Support the show
Hosts Sug Shin and Dan Chung discuss the North Korean hacking apparatus in its totality. In edition to the crypto heist that we discussed in Ep. 2, North Korea engages in all matter of activities related to hacking. Some experts has dubbed this "The All-Purpose Sword" (link below). Besides its growing nuclear and ICBM capabilities, North Korea has quietly been organizing its military around its cyber operations. The hosts discuss some of the more public cyber attacks the country has engaged in over the years as well as some of the methods they currently employ. Dan also gets into the issues that Crossing Borders faces surrounding the prospect of spies infiltrating their networks. The episode ends with Sug and Dan bemoaning their parents' susceptibility to phishing and other online scams.
Links:
The All-Purpose Sword study
Support the show