Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://baesystemsai.blogspot.nl/2016/04/two-bytes-to-951m.html
https://threatpost.com/bangladesh-bank-hackers-accessed-swift-system-to-steal-cover-tracks/117637/
http://www.theregister.co.uk/2016/04/22/i_hacked_facebook_and_found_someone_had_beaten_me_to_it/
I’m really enjoying these security talks with humor, security-news and -expertise!
I was just wondering if this Bank of Bangladesh heist might be an inside job?
How else could the attackers know about the very specific details on hardware (printer) and database code needed? And if it was, does it change our way of thinking on how to secure our (clients) businesses?
It’s possible. We don’t know enough yet. Many of the same controls will help protect against insiders, though that depends on the organization and what role the insider plays. I’ll think about that some for the next show. Good question.