logo
episode-header-image
May 2020
30m 39s

The Dark Secrets of a Hacking Hero

WIRED
About this episode
tail spinning
Up next
Mar 5
Iran Strikes in the AI Era; Prediction Markets Ethics; Paramount Beats Netflix
This week, the team dives into why disinformation and the AI industry battles have quickly positioned themselves at the center of the ongoing conflict between the U.S and Iran. They also discuss how prediction markets like Polymarket and Kalshi are increasingly facing insider tra ... Show More
33m 44s
Mar 3
BIG INTV: Open AI’s Former Safety Lead Calls Out Erotica Claims (Rerun)
Steven Adler used to lead product safety at OpenAI. When Katie read his recent op-ed asking OpenAI to prove that they have and continue to address safety issues, she knew she wanted to talk to him. This week she sits down with Steven to talk about what AI users should know about ... Show More
39m 53s
Feb 26
Pentagon v. ‘Woke’ Anthropic; Agentic v. Mimetic; Trump v. the State of the Union
This week, the team dives into the feud that has been brewing between Anthropic and the Pentagon — and what it says about how the government interacts with tech companies. Later, Zoë tells us why figuring out whether you are agentic or mimetic has become the new litmus test in Si ... Show More
31m 22s
Recommended Episodes
Feb 2023
A boom of infostealers and stolen credentials.
Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dra ... Show More
48m 27s
Apr 2023
Inside the history of a child hacker.
Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers tr ... Show More
46m 25s
Nov 2019
Cyber espionage. Russia tries Web autarky. The US will investigate TikTok. A bad keyboard app is out of Google Play but still in circulation. Crime comes to e-sports. Happy hundredth, GCHQ.
FireEye warns of Messagetap malware and its spying on SMS. NSO Group’s Pegasus troubles seem to be expanding. Russia prepares to disconnect its Internet. The US opens a national security investigation into TikTok. An Android keyboard app is making bogus purchases and doing other ... Show More
26m 26s
Jan 2022
109: TeaMp0isoN
<p>TeaMp0isoN was a hacking group that was founded by TriCk and MLT (twitter.com/0dayWizard). They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.</p><p><br></p><p>Sponsors</p><p>Support for this show comes ... Show More
1 h
May 2020
Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media.
A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security, familiarity, and rates of adoption ... Show More
21m 19s
Jun 2020
Tracking down hackers-for-hire. SNAKE ransomware bites Honda. Anti-DDoS for criminal markets. And a menu for cyber contraband.
Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. B ... Show More
21m 51s
Sep 2020
The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch.
An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at h ... Show More
22m 56s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
Jan 2024
Password Perils: The threat of credential stuffing exploits.
Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener named Steve who shares some push back from the 23andMe story from last week, and ... Show More
1 h
Jun 2021
Who is Hacking the U.S. Economy?
<p>In the past few weeks, some of the biggest industries in the U.S. have been held up by cyberattacks.</p><p>The first big infiltration was at Colonial Pipeline, a major conduit of gas, jet fuel and diesel to the East Coast. Then, J.B.S., one of the world’s largest beef supplier ... Show More
22m 31s