logo
episode-header-image
Jun 2023
42m 1s

Hacking and cybercrime

Bbc Radio 4
About this episode

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US Democratic National Committee in 2016. From a bored graduate student who accidentally crashed the nascent internet, to cyber criminals and bot farms, Shapiro looks at the dark history of the information age.

Dr Alice Hutchings first began researching cybercrime in the late 1990s, while working in industry, and is now Director of the Cambridge Cybercrime Centre. She argues that the romanticised image of the underground hacker as an anti-authoritarian ‘lone wolf’ who possesses technological wizardry is outdated. Hacking has become industrialised with criminals able to buy ‘off-the-shelf’ tools to infect computers.

While hackers constantly look to exploit vulnerabilities within the technology, one of the major weak points are users themselves. Jenny Radcliffe’s job is to expose the flaws and weaknesses in security operations. In People Hacker she explains how she uses a blend of psychology, stagecraft and charm to gain access to computer systems, and reveals how people can boost their security and make her job more difficult.

Producer: Katy Hickman

Up next
Jan 26
Biology, technology and the future
Adam Rutherford and guests discuss intelligence, genetics and the nature of reality. How are scientific advances in AI, cognitive science and genetics changing our understanding of the material world and what it means to be human? Adrian Woolfson argues that we must transform bio ... Show More
42m 11s
Jan 19
Rethinking politics
If trust in politicians is broken and the political system isn't delivering, then how might we go about fixing things? Can we revive faith in democratic government by doing things differently? The political scientist Hélène Landemore argues that electoral politics is broken and t ... Show More
41m 35s
Jan 12
The arts and health
What is the purpose of the Arts? Can music, literature and visual art change our lives physically and socially, as well as personally? Adam Rutherford explores the power of the arts and how it might be defined and explained.Engaging with the arts is one of our most powerful tools ... Show More
41m 8s
Recommended Episodes
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Mar 2022
Cryptography vs. Cybercrime
The business of cybercrime is booming, and the people who protect our data are seemingly locked in step with the people who hack it. So today we’re covering historical efforts to safeguard – or steal – our most valuable information online. From ancient cryptographers inspiring ea ... Show More
46m 9s
Feb 2019
48: Cyber Attack Wargaming - Top 100 Women in Tech Winner Lisa Forte, CEO Red Goat
Lisa Forte deservedly won the top 100 Women in Tech award for 2018 for her work combating cyber-crime. She is an inspirational public speaker and a tenacious entrepreneur. Her business Red Goat Cyber Security helps businesses combat cyber crime. If you want to play at cyber warga ... Show More
1h 1m
Feb 2024
How clicking a single link can cost millions | Ryan Pullen
Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercrimi ... Show More
14m 46s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2023
Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.
Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia I ... Show More
26m 8s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s