logo
episode-header-image
About this episode

Raena, Mark and Michael were at the helm for this weeks show where they looked at the British PM’s thoughts on banning strong encryption in the country. Many questions remain unanswered, including the impact on the economy.

The makers of RCS, the smartphone application designed to remotely turn on the phone’s microphone and collect other data which is used by many Governments around the world, were hacked. The Hacking Team, the name of the Milan based company, had 415GB of data leaked online. Some of it via their twitter feed. Details of a zero day exploit of Adobe Flash was part of the data leaked, prompting Adobe to release yet another patch to it’s software.

Lissa and Jason continue their chat about Women in Tech, from the perspective of a Teacher. They explore the differences between boys and girls and how each approach and use technology.

BBC Micro:bit

The BBC have revived the BBC Micro, this time in the form of the Micro:bit. The tiny circuit board, supporting a processor, a couple of switches, LEDs and powered by batteries will be given away to every Year 7 student across the UK. Supported by websites and teachers, the program hopes to lift student interest in computing beyond playing games and texting.

A German man, scanning the promotional QR code on his bottle of tomato sauce, reached a website that he was not expecting. The porn site had used a domain name that the sauce makers had let lapse.

The post Hacked Hackers, a bit of BEEB and Saucy QR Codes appeared first on Technogaze!.

Up next
Jun 2015
Fender Bender, Pink Dot and Appleness
Whoa – what a show! Dan, Mike, Byron, Michael, Josh, Lissa, Mark & Jason were on the show talking cars, tech and LGBTIQ. We partnered with Fender Bender to look into what was happening with Autonomous vehicles, beyond the usual Google related stories. Apple CarPlay and Android Au ... Show More
1h 5m
Jun 2015
Radiothon, String of Death and Android Auto
It was Radiothon week and Mark, Michael, Raena and Josh Re:membered JOY along with Craig and Luke. On the Tech front, a specially crafted text message has been able to crash any iOS device. The bug, in a widely used Apple library, also affects OS X and the Apple watch. Our tin fo ... Show More
53m 17s
May 2015
LG’s wallpaper display, taxing Uber, video conferencing research
In this episode, the old gang are back together, with Ranea joining Michael and Mark from across the ditch via the wonders of fibre optic cable.  We started off with LG’s latest prototype screen, a 1mm thick, 55″ panel that weighs in at just 1.8kg, and sticks to the wall via a ma ... Show More
48m 24s
Recommended Episodes
Aug 2022
Russian cyberespionage and influence op disrupted. RedAlpha versus Chinese minorities and (of course) Taiwan. Evil PLC proof-of-concept. Cl0p takes a poke at a water utility.
Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look ... Show More
26m 19s
Jun 2018
Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time.
In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound ... Show More
21m 5s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2019
Supply chain hacking campaign looks like espionage. Airstrikes versus hackers. FTC versus Facebook. Notes from the Global Cyber Innovation Summit. What’s up with MegaCortex.
Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovati ... Show More
22m 33s
Feb 2023
Blender is back, but now DBA Sinbad (still working for the Lazarus Group). Cyberespionage notes. Hacktivism. ICS threats. Valentine’s Day scams.
"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann J ... Show More
27 m
Feb 2021
Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad.
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence ... Show More
25m 37s
Jun 2023
Cyber spies and vulnerability goodbyes. RedLine Stealer and Vidar: the cryptkeepers. Social engineering TTPs.
North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they’ve disrupted IFC.org. Unmaski ... Show More
31m 49s
Nov 2020
Ups and downs in the cyber underworld. Enduring effects of COVID-19 in cyberspace. Safer online shopping. “Take me home, United Road, to the place I belong, to Old Trafford, to see United…”
Qbot is dropping Egregor ransomware, and RagnarLocker continues its recent rampage. Cryptocurrency platforms troubled by social engineering at a third party. TrickBot reaches version 100. Stuffed credentials exposed in the cloud. COVID-19 practices may endure beyond the pandemic. ... Show More
24m 54s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s