logo
episode-header-image
Apr 2019
16m 15s

IoT devices exposed in peer-to-peer soft...

N2K Networks
About this episode
Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility of more violence, and journalists wonder if prior restraint of certain speech m ... Show More
Up next
Yesterday
Europe clamps down on global hackers.
The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on s ... Show More
27m 16s
Yesterday
Mid season reflection with Kim Jones. [CISOP]
In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, un ... Show More
41m 27s
Mar 16
Watch out for cybercrime frequent flyers.
Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercri ... Show More
25m 45s
Recommended Episodes
Mar 2022
Thu. 03/31 – Hackers Forging Emergency Data Requests
Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ... Show More
16m 52s
Mar 2021
Wed. 03/10 – Now The Hackers Are In The Security Cams
Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ... Show More
18m 5s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s
Oct 2023
The Viral ‘Kia Boys’ Car Theft Trend That’s Going Viral on Instagram
Kias and Hyundais are being stolen in America at an alarming rate. Using a screwdriver and a USB cable, it’s trivially easy to steal one. Kia and Hyundai blame social media, but the problem is so overwhelming that several cities are suing the car manufacturer for creating a crime ... Show More
1h 11m
Oct 2019
Thu. 10/24 - Is TikTok A “National Security Risk?”
Is TikTok a national security risk? Inquiring Senators want to know. Earnings running the gamut from bad to surprisingly good from Twitter, Amazon and Tesla. And to paraphrase an old saw: if a voicemail system goes down how would anyone even notice? Sponsors: Mealime LegalForc ... Show More
17m 18s