logo
episode-header-image
Jun 2023
42m 1s

Hacking and cybercrime

Bbc Radio 4
About this episode

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US Democratic National Committee in 2016. From a bored graduate student who accidentally crashed the nascent internet, to cyber criminals and bot farms, Shapiro looks at the dark history of the information age.

Dr Alice Hutchings first began researching cybercrime in the late 1990s, while working in industry, and is now Director of the Cambridge Cybercrime Centre. She argues that the romanticised image of the underground hacker as an anti-authoritarian ‘lone wolf’ who possesses technological wizardry is outdated. Hacking has become industrialised with criminals able to buy ‘off-the-shelf’ tools to infect computers.

While hackers constantly look to exploit vulnerabilities within the technology, one of the major weak points are users themselves. Jenny Radcliffe’s job is to expose the flaws and weaknesses in security operations. In People Hacker she explains how she uses a blend of psychology, stagecraft and charm to gain access to computer systems, and reveals how people can boost their security and make her job more difficult.

Producer: Katy Hickman

Up next
Yesterday
Genes and hands: mapping character and health
<p>What can genetics and palmistry tell us about how we understand identity, character and health? Adam Rutherford is joined by Professor of Zoology Matthew Cobb; the historian Professor Alison Bashford and the geneticist Charlotte Houldcroft.</p><p>Matthew Cobb discusses his bio ... Show More
41m 37s
Nov 17
Digital Futures and Information Crises
<p>How can we reclaim the internet? Tom Sutcliffe and guests discuss the digital age - its supporters and discontents. </p><p>Tech critic Cory Doctorow introduces his new book Enshittification, a blistering diagnosis of how online platforms have decayed — from innovation to explo ... Show More
41m 40s
Nov 10
Saving Tigers, Green Crime and Cli-fi
Threats to the natural world are the focus of today’s conversation. Adam Rutherford talks to wildlife biologist Jonathan Slaght, novelist Juhea Kim and criminal psychologist Julia Shaw.Jonathan Slaght discusses Tigers Between Empires, his account of the international effort to sa ... Show More
41m 50s
Recommended Episodes
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Mar 2022
Cryptography vs. Cybercrime
The business of cybercrime is booming, and the people who protect our data are seemingly locked in step with the people who hack it. So today we’re covering historical efforts to safeguard – or steal – our most valuable information online. From ancient cryptographers inspiring ea ... Show More
46m 9s
Feb 2019
48: Cyber Attack Wargaming - Top 100 Women in Tech Winner Lisa Forte, CEO Red Goat
Lisa Forte deservedly won the top 100 Women in Tech award for 2018 for her work combating cyber-crime.She is an inspirational public speaker and a tenacious entrepreneur. Her business Red Goat Cyber Security helps businesses combat cyber crime. If you want to play at cyber wargam ... Show More
1h 1m
Feb 2024
How clicking a single link can cost millions | Ryan Pullen
<p>Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercr ... Show More
14m 46s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2023
Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.
Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia I ... Show More
26m 8s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s