logo
episode-header-image
Jan 2017
20m 33s

Grid hacking in Ukraine. Cellebrite brea...

N2K Networks
About this episode

In today's podcast we get updates on grid hacking in Ukraine and the case of the EyePyramid spyware in Italy. Smartphone forensics shop Cellebrite suffers a data breach. WhatsApp appears to have an encryption issue, but most observers think it's not really a backdoor. WordPress gets eight patches. ENISA issues recommended best practices for securing connected cars. A US Justice Department IG will look into the FBI's investigation of classified information handling in the Clinton State Department. President Obama expands NSA's authority to share raw SIGINT with other intelligence agencies. The Johns Hopkins University's Joe Carrigan reminds us to protect our mobile phone numbers. Stanford Cyber Initiative Executive Director Allison Berke shares that organization's mission. Guccifer 2.0 wants to clear a few things up, and the ShadowBrokers say "bye-bye," or maybe "do svidaniya."

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could fin ... Show More
11m 4s
Aug 23
Beyond the smoke screen. [Research Saturday]
This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by ... Show More
22m 22s
Aug 22
A free speech showdown.
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware we ... Show More
31m 48s
Recommended Episodes
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Jul 2023
Asaf Lubin on Cyber Espionage and International Law
On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-0558. ... Show More
48m 46s
Jun 2021
How the FBI Ran Its Own Texting App to Catch Criminals
It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy ... Show More
28m 52s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
59m 4s
Feb 2024
CISA Goes Rogue: How Cybersecurity Became Censorship | 2.25.24
The Cybersecurity and Infrastructure Security Agency faces claims it censors the American public and interferes in elections. After the debunked Russian collusion narrative and the Twitter files, some lawmakers now want to see the agency completely dismantled. Get the facts first ... Show More
25m 50s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Jul 2023
Charl van der Walt on Cyber Extortion
What are the latest trends in the ransomware-as-a-service ecosystem? Since at least May 27, the CL0P ransomware gang has been exploiting a previously unknown vulnerability to exfiltrate data from financial services organizations, energy corporations, government agencies, and even ... Show More
53m 46s