logo
episode-header-image
Oct 2022
38m 53s

The Zombies Are Attacking

iHeartPodcasts
About this episode

What is a zombie computer? What is a botnet? And what the heck is a DDoS attack? We look at a common tactic used by hackers to silence or inconvenience a target, how it works, and the measures companies like Cloudflare take to mitigate them.

See omnystudio.com/listener for privacy information.

Up next
Yesterday
Week in Tech: Hot Maps and AI Judges
Is betting on current events the ‘future of news’? This week in the News Roundup, Oz and Karah ask AI if their favorite restaurants are hot or not and why Gen Z is nostalgic for a world without the internet. They also discuss Wimbledon’s new AI judges and how drones are impacting ... Show More
38m 9s
Jul 9
The Story: Roblox and the ‘Prehistoric Era’ of Gaming w/ David Baszucki
David Baszucki is the co-founder and CEO of Roblox, the gaming platform that’s become a digital playground for millions of kids around the world. Baszucki sits down with Oz to talk about how Roblox became one of the most beloved tech platforms for the younger generations, and why ... Show More
31m 21s
Jul 4
TechStuff Classic: The Story of the Sony Walkman
This week, we’re revisiting one of our favorite episodes — all about the Sony Walkman. Jonathan Strickland dives into why Time named the portable device number 47 on a list of the 50 most influential gadgets of all time. How did the Walkman become a thing, and what influence has ... Show More
46m 8s
Recommended Episodes
May 2016
Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ... Show More
12m 45s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed ... Show More
40m 57s
Jun 2023
CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.
CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 rans ... Show More
29m 31s
Jan 2023
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ... Show More
29m 40s
Jun 2023
A new botnet takes a frosty bite out of the gaming industry. [Research Saturday]
Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. T ... Show More
19m 28s
Jun 2020
Cyberespionage and counterespionage. The DDoS that never was. A very strange case of cyberstalking. And leaky niche dating sites.
What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of c ... Show More
22m 3s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Apr 2020
Cybersecurity notes during the pandemic emergency. Twitter bots. Ransomware attack on a biotech firm. WHO updates. And how are the cyber gangs doing these days?
Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on attempts to compromise the Worl ... Show More
26m 21s
Sep 2023
Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.
Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thought ... Show More
26m 46s
Jun 2023
Reddit sees bad luck as a BlackCat attack crosses their path. The C2C market is more mystical nowadays. Hacktivist auxiliaries and false flags in the hybrid war.
The BlackCat gang crosses Reddit’s path, threatening to leak stolen data. Mystic Stealer malware evades and creates a feedback loop in the C2C market. RDStealer is a new cyberespionage tool, seen in the wild. The United States offers a reward for information on the Cl0p ransomwar ... Show More
28m 57s