logo
episode-header-image
Jun 2023
42m 1s

Hacking and cybercrime

Bbc Radio 4
About this episode

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US Democratic National Committee in 2016. From a bored graduate student who accidentally crashed the nascent internet, to cyber criminals and bot farms, Shapiro looks at the dark history of the information age.

Dr Alice Hutchings first began researching cybercrime in the late 1990s, while working in industry, and is now Director of the Cambridge Cybercrime Centre. She argues that the romanticised image of the underground hacker as an anti-authoritarian ‘lone wolf’ who possesses technological wizardry is outdated. Hacking has become industrialised with criminals able to buy ‘off-the-shelf’ tools to infect computers.

While hackers constantly look to exploit vulnerabilities within the technology, one of the major weak points are users themselves. Jenny Radcliffe’s job is to expose the flaws and weaknesses in security operations. In People Hacker she explains how she uses a blend of psychology, stagecraft and charm to gain access to computer systems, and reveals how people can boost their security and make her job more difficult.

Producer: Katy Hickman

Up next
Mar 16
Consciousness and Identity
What makes us who we are? In Radio 4's discussion programme to start off the week, Tom Sutcliffe and guests explore consciousness and identity, and whether the face reveals our inner thoughts and character.American science writer Michael Pollan is celebrated for his work on food ... Show More
41m 54s
Mar 9
Under the sea
What lies beneath the world's oceans? From the phenomenal infrastructure of telecoms cables to shipwrecked galleons and treasure and the sea creatures of the literary imagination - we explore the mysteries of the deep. Adam Rutherford chairs Radio 4's discussion programme which s ... Show More
41m 51s
Mar 2
Reading and storytelling
The UK government has declared 2026, the National Year of Reading. The numbers suggest that reading needs all the public relations it can get. Under a third of school children say they read for pleasure and the number going on to read English Literature at University has shrunk b ... Show More
41m 43s
Recommended Episodes
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Feb 2019
48: Cyber Attack Wargaming - Top 100 Women in Tech Winner Lisa Forte, CEO Red Goat
Lisa Forte deservedly won the top 100 Women in Tech award for 2018 for her work combating cyber-crime. She is an inspirational public speaker and a tenacious entrepreneur. Her business Red Goat Cyber Security helps businesses combat cyber crime. If you want to play at cyber warga ... Show More
1h 1m
Feb 2024
How clicking a single link can cost millions | Ryan Pullen
Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercrimi ... Show More
14m 46s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2023
Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.
Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia I ... Show More
26m 8s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s