logo
episode-header-image
May 2018
30m 55s

#7: “Did you say washing machine?” (Care...

Amaeya Media
About this episode
The t3chies review the news that ride sharing platform Careem reported a security breach that took place on Jan 14, compromising potentially 14 million user & 558,000 driver accounts. We also talk about how to better manage your passwords & take our first #askt3chtree question from Judhi Prasetyo. 
Up next
Sep 2018
#10: “Playing catch-up” (Drones)
Boy, are we glad to be back! Just two of us this week, and we bring you everything drones. Tune in to hear our resident drone expert Sheban break down all you need to know, current & future trends in drone tech and what needs to happen to make drone logistics a mainstream reality ... Show More
59m 49s
Jun 2018
#9: “Genesis” (Retro episode!)
A special episode where the t3chies reminisce about the technologies we grew up with and the early days of the internet. Do people still play with virtual pets? -—- All sounds are used under Fair Use as illustrative of the larger point & fall under the copyright of the owners of ... Show More
1 h
May 2018
#8: “Why are you doing my job?” (Google I/O & the Duplex call)
The t3chies discuss their thoughts on Google I/O & the Duplex call that sends either a cheer or a creep down your spine. Plus, a follow up question from Judhi Prasetyo on our answer last week. You can send us your questions [on Twitter](https://twitter.com/intent/tweet?text=@t3ch ... Show More
44m 59s
Recommended Episodes
Apr 2017
Digging deep on how to get out of password hell with Dashlane
In part 2 of Jefferson Graham's reports on how to deal with passwords and keep them away from hackers, an extended interview with Emmanuel Schalit, the founder of Dashlane, a password manager. Schalit talks about the best kind of passwords to have, why he believes texting is the ... Show More
21m 28s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Jul 2020
Bug bounties: the good and the bad of computer security
Verge editor-in-chief Nilay Patel talks to founder and CEO of Luta Security Katie Moussouris. Moussouris has a long history in computer security, working at Microsoft and the Department of Defense creating their first bug bounty programs to incentivize catching and reporting secu ... Show More
1h 5m
Apr 2019
IoT devices exposed in peer-to-peer software vulnerability. Car hacking claims. More warnings of possible violence in Sri Lanka. Curating app stores for security. eScooter’s “voices” hacked.
Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility ... Show More
16m 15s
Mar 2022
Tech News: Lapsus$ Hackers Identified
Cybersecurity researchers say that a 16-year-old boy in England is the ringleader of the Lapsus$ hacker group that compromised Okta and other companies earlier this week. We learn which big tech companies are the most ethical, sort of. And lots more! See omnystudio.com/listener f ... Show More
27m 3s
Apr 2023
Inside the history of a child hacker.
Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers tr ... Show More
46m 25s
Aug 2019
Capital One investigation update. Don’t give up on the cloud. Exposed databases and backdoors. Cybercrime as high-stakes poker. Phishing the financials. Bots on holiday.
Investigators pursue the possibility that the alleged Capital One hacker might have hit other companies’ data. An exposed ElastiSearch database, now secured, was found at Honda Motors. Data from beauty retailer Sephora are found on the dark web. Defenders are urged to think of th ... Show More
21m 40s