logo
episode-header-image
May 2020
30m 39s

The Dark Secrets of a Hacking Hero

WIRED
About this episode
tail spinning
Up next
Today
Trump Davos Drama; AI Midterms; ChatGPT's Last Resort
Welcome back to Uncanny Valley! This week, WIRED’s Brian Barrett and Leah Feiger are joining the show as the new co-hosts, alongside Zoë Schiffer. And our attention has been on the drama going down in the quaint little town of Davos. Zoë tells us how at the World Economic Forum’s ... Show More
36m 9s
Jan 20
BIG INTV: Wikipedia's Founder on Holding the Line in a Post Fact World
Katie sits down with Wikipedia founder Jimmy Wales talks about what it means to build something used by billions of people that’s not optimized for growth at all costs. Jimmy reflected on Wikipedia’s messy, human origins, the ways it’s been targeted by governments from Russia to ... Show More
58m 8s
Jan 13
BIG INTV: Reid Hoffman Wants Silicon Valley to ‘Stand Up’
The LinkedIn cofounder and frequent Trump target, Reid Hoffman has a simple message for his peers: “Just speak up about the things that you think are true.”Join WIRED’s best and brightest on Uncanny Valley as they dissect the collision of tech, politics, finance, and business, fr ... Show More
51m 43s
Recommended Episodes
Feb 2023
A boom of infostealers and stolen credentials.
Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dra ... Show More
48m 27s
Apr 2023
Inside the history of a child hacker.
Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers tr ... Show More
46m 25s
Nov 2019
Cyber espionage. Russia tries Web autarky. The US will investigate TikTok. A bad keyboard app is out of Google Play but still in circulation. Crime comes to e-sports. Happy hundredth, GCHQ.
FireEye warns of Messagetap malware and its spying on SMS. NSO Group’s Pegasus troubles seem to be expanding. Russia prepares to disconnect its Internet. The US opens a national security investigation into TikTok. An Android keyboard app is making bogus purchases and doing other ... Show More
26m 26s
Jan 2022
109: TeaMp0isoN
<p>TeaMp0isoN was a hacking group that was founded by TriCk and MLT (twitter.com/0dayWizard). They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.</p><p><br></p><p>Sponsors</p><p>Support for this show comes ... Show More
1 h
May 2020
Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media.
A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security, familiarity, and rates of adoption ... Show More
21m 19s
Jun 2020
Tracking down hackers-for-hire. SNAKE ransomware bites Honda. Anti-DDoS for criminal markets. And a menu for cyber contraband.
Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. B ... Show More
21m 51s
Sep 2020
The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch.
An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at h ... Show More
22m 56s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
Jan 2024
Password Perils: The threat of credential stuffing exploits.
Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener named Steve who shares some push back from the 23andMe story from last week, and ... Show More
1 h
Jun 2021
Who is Hacking the U.S. Economy?
<p>In the past few weeks, some of the biggest industries in the U.S. have been held up by cyberattacks.</p><p>The first big infiltration was at Colonial Pipeline, a major conduit of gas, jet fuel and diesel to the East Coast. Then, J.B.S., one of the world’s largest beef supplier ... Show More
22m 31s