logo
episode-header-image
About this episode

Raena, Mark and Michael were at the helm for this weeks show where they looked at the British PM’s thoughts on banning strong encryption in the country. Many questions remain unanswered, including the impact on the economy.

The makers of RCS, the smartphone application designed to remotely turn on the phone’s microphone and collect other data which is used by many Governments around the world, were hacked. The Hacking Team, the name of the Milan based company, had 415GB of data leaked online. Some of it via their twitter feed. Details of a zero day exploit of Adobe Flash was part of the data leaked, prompting Adobe to release yet another patch to it’s software.

Lissa and Jason continue their chat about Women in Tech, from the perspective of a Teacher. They explore the differences between boys and girls and how each approach and use technology.

BBC Micro:bit

The BBC have revived the BBC Micro, this time in the form of the Micro:bit. The tiny circuit board, supporting a processor, a couple of switches, LEDs and powered by batteries will be given away to every Year 7 student across the UK. Supported by websites and teachers, the program hopes to lift student interest in computing beyond playing games and texting.

A German man, scanning the promotional QR code on his bottle of tomato sauce, reached a website that he was not expecting. The porn site had used a domain name that the sauce makers had let lapse.

 

 

The post Hacked Hackers, a bit of BEEB and Saucy QR Codes appeared first on Technogaze.

Up next
Apr 2025
Dr Hon Weng Chong – “actual intelligence” from Cortical Labs
<p>In today&#8217;s episode, Mark and Jason sat down with Dr Hon Weng Chong, founder of startup and research firm Cortical Labs.  We discussed the prospect of developing a computer that &#8211; in place of a silicon, the central processing can be performed instead by neurons grow ... Show More
48m 1s
Apr 2025
Data privacy and security at United States border control, magnetically influencing viruses to fight disease, Microsoft turns 50
<p>In this episode, Michael, Mark, and Jason were joined by Josh Taylor, journalist at The Guardian. We discussed the powers United States officers have in searching and seizing devices at the border. We also discussed the latest data breach in Australia, this time affecting supe ... Show More
52m 49s
Mar 2025
Dr Michael Milford – Robotics, television, movies, and Artificial Intelligence
<p>Raena sat down with Dr Michael Milford, the director of the Centre for Robotics at <a href="https://qut.edu.au">Queensland University of Technology</a> in Brisbane, Australia. We discussed his current research on creating next-generation navigation systems for robots, people, ... Show More
18m 43s
Recommended Episodes
Aug 2022
Russian cyberespionage and influence op disrupted. RedAlpha versus Chinese minorities and (of course) Taiwan. Evil PLC proof-of-concept. Cl0p takes a poke at a water utility.
Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look ... Show More
26m 19s
Jun 2018
Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time.
In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound ... Show More
21m 5s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2019
Supply chain hacking campaign looks like espionage. Airstrikes versus hackers. FTC versus Facebook. Notes from the Global Cyber Innovation Summit. What’s up with MegaCortex.
Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovati ... Show More
22m 33s
Feb 2023
Blender is back, but now DBA Sinbad (still working for the Lazarus Group). Cyberespionage notes. Hacktivism. ICS threats. Valentine’s Day scams.
"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann J ... Show More
27 m
Feb 2021
Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad.
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence ... Show More
25m 37s
Jun 2023
Cyber spies and vulnerability goodbyes. RedLine Stealer and Vidar: the cryptkeepers. Social engineering TTPs.
North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they’ve disrupted IFC.org. Unmaski ... Show More
31m 49s
Nov 2020
Ups and downs in the cyber underworld. Enduring effects of COVID-19 in cyberspace. Safer online shopping. “Take me home, United Road, to the place I belong, to Old Trafford, to see United…”
Qbot is dropping Egregor ransomware, and RagnarLocker continues its recent rampage. Cryptocurrency platforms troubled by social engineering at a third party. TrickBot reaches version 100. Stuffed credentials exposed in the cloud. COVID-19 practices may endure beyond the pandemic. ... Show More
24m 54s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s