logo
episode-header-image
Feb 2019
21m 33s

Hybrid war and tactical influence operat...

N2K Networks
About this episode
In today’s podcast we hear about a test of influencing soldiers through their social media: Instagram works best, Twitter not so much. Separ credential-stealing malware successfully lives off the land. NoRelationship attacks get past some email filters. Spamming users to get your point across may not be the best form of disclosure. University researchers fin ... Show More
Up next
Today
Does diversity matter in cyber? [CISOP]
Show Notes: As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybe ... Show More
20m 15s
Yesterday
The parallel war online.
Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortio ... Show More
37m 18s
Yesterday
Cyber Without Borders: Standing guard 210 kilometers from risk. [Special Edition]
In the final installment of our three-part series on ⁠Cyber Coalition 2025⁠⁠, ⁠⁠Maria Varmazis⁠⁠⁠, host here at N2K CyberWire, and ⁠⁠⁠Liz Stokes, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond th ... Show More
25m 59s
Recommended Episodes
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Mar 2021
Wed. 03/10 – Now The Hackers Are In The Security Cams
Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ... Show More
18m 5s
Oct 2023
Would you let emergency services hack into your phone?
<p>NSW Police are trialling technology allowing them to remotely access Triple Zero callers' phones so they can see what’s happening on the ground in an emergency. The GoodSAM app enables police dispatchers to turn on a caller’s camera and start livestreaming video, as well as pi ... Show More
14m 24s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
58m 4s
Jun 2021
Cyberguerre: des conflits invisibles aux conséquences bien réelles
<p>Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ... Show More
26m 17s
Sep 2022
Chiquita banana, dumb criminals, and detecting ring binders
Students learn a valuable lesson when it comes to AI detecting guns on campus, SIM swappers are surprisingly stupid, and romance scammers get scammed by someone (or some thing?) calling themselves Chiquita Banana.All this and much much more is discussed in the latest edition of t ... Show More
50m 53s
Nov 2023
Think before you shrink! And our guest is faked
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams?All this and much more is discussed in the latest edition of the “Smashin ... Show More
1h 4m
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
May 2023
.ZIP domains, AI lies, and did social media inflame a riot?
ChatGPT hallucinations cause turbulence in court, a riot in Wales may have been ignited on social media, and do you think .MOV is a good top-level domain for "a website that moves you"?All this and much much more is discussed in the latest edition of the "Smashing Security" podca ... Show More
1h 16m
Mar 2021
Fri. 03/05 – Eyes Emoji On Tim Wu Joining The Biden Administration
Tim Wu joined the Biden administration and that sound you hear is a big collective gulp from Silicon Valley. A tweet undo button has been unearthed. Turntable.fm has resurfaced. New data suggests the death of silicon valley has been exaggerated. And of course, the weekend longrea ... Show More
18m 51s