ART 80F - WEEK 7 LECTURE CONTENT
Exploiting Networks + Systems
A Network or System Exploit
Component, protocol or feature of a system that allows it to be manipulated or disrupted.
Fake Networks on LinkedIn
From BBC Report on Fake Profiles being used by Hackers
By making these connections, criminals can entice users to give up personal details, direct them to malware-laden websites and, if they can get their email addresses, launch spear-phishing campaigns - targeted emails that aim to steal personal information.
"LinkedIn users expect to be contacted by recruiters, so this ruse works out in the scammers' favour," it said in its report.
"Most of these fake accounts have been quite successful in gaining a significant network - one had 500 contacts. Some even managed to get endorsements from others," Symantec researcher Dick O'Brien told the BBC.
Article How to Spot a Fake Profile
"Gaming" Spotify
Vice article on Spotify's Spam War
Via Vice / Motherboard
Article on "Sleepify" strategy
In this YouTube post Vulfpeck’s frontman Jack Stratton claims that for each Spotify user that streams “Sleepify”—which is comprised of ten tracks of complete silence—on repeat throughout the night, the band will make $4. If enough people do it, that could help it fund a free tour, which Stratton claims will visit the cities that stream the album the most.
Fake Accounts - Deception, Disruption + Chaos
DeSmog report on fake Twitter accounts used to spread disinformation and counter protest efforts against DAPL
Gizmodo on Fake ANTIFA Accounts