logo
episode-header-image
Apr 2019
16m 15s

IoT devices exposed in peer-to-peer soft...

N2K Networks
About this episode
Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility of more violence, and journalists wonder if prior restraint of certain speech m ... Show More
Up next
Yesterday
Leaky chats collide with shifting security standards.
A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce ... Show More
25m 16s
Jan 29
Proxy wars and open doors.
Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized threat groups. U.S. military cyber operators carried out a covert operation to di ... Show More
30m 24s
Jan 28
When the Director uses the wrong chat window.
CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enh ... Show More
25m 6s
Recommended Episodes
Mar 2022
Thu. 03/31 – Hackers Forging Emergency Data Requests
Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ... Show More
16m 52s
Mar 2021
Wed. 03/10 – Now The Hackers Are In The Security Cams
Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ... Show More
18m 5s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s
Oct 2023
The Viral ‘Kia Boys’ Car Theft Trend That’s Going Viral on Instagram
Kias and Hyundais are being stolen in America at an alarming rate. Using a screwdriver and a USB cable, it’s trivially easy to steal one. Kia and Hyundai blame social media, but the problem is so overwhelming that several cities are suing the car manufacturer for creating a crime ... Show More
1h 11m
Oct 2019
Thu. 10/24 - Is TikTok A “National Security Risk?”
Is TikTok a national security risk? Inquiring Senators want to know. Earnings running the gamut from bad to surprisingly good from Twitter, Amazon and Tesla. And to paraphrase an old saw: if a voicemail system goes down how would anyone even notice? Sponsors: Mealime LegalForc ... Show More
17m 18s