logo
episode-header-image
Jun 2023
42m 1s

Hacking and cybercrime

Bbc Radio 4
About this episode
Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US Democratic National Committee in 2016. From a bored graduate student who accide ... Show More
Up next
Jun 23
Sanctuary, refuge and exile
Sanctuary is an ancient idea of a place of refuge or freedom from harm. It has deep roots in the history, literature and myths of many cultures. Marina Warner’s new book Sanctuary explores travelling tales and concepts of hospitality and home - suggesting that myths, stories and ... Show More
41m 57s
Jun 16
The Idea of Genius
We think we know what a genius is: a tortured poet; rebellious scientist; monstrous artist; or a tech disruptor. You can tell what a society values by who it labels as a genius says Helen Lewis in her new book, The Genius Myth: The Dangerous Allure of Rebels, Monsters and Rule-Br ... Show More
41m 35s
Jun 9
Hidden spaces and dangerous places
There is a parallel world which operates under different rules and benefits those with money and power. That’s the argument made by the journalist Atossa Araxia Abrahamian in her new book The Hidden Globe: How Wealth Hacks the world. She traces the rise of a freeports, charter ci ... Show More
41m 43s
Recommended Episodes
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Mar 2022
Cryptography vs. Cybercrime
The business of cybercrime is booming, and the people who protect our data are seemingly locked in step with the people who hack it. So today we’re covering historical efforts to safeguard – or steal – our most valuable information online. From ancient cryptographers inspiring ea ... Show More
46m 9s
Feb 2019
48: Cyber Attack Wargaming - Top 100 Women in Tech Winner Lisa Forte, CEO Red Goat
Lisa Forte deservedly won the top 100 Women in Tech award for 2018 for her work combating cyber-crime.She is an inspirational public speaker and a tenacious entrepreneur. Her business Red Goat Cyber Security helps businesses combat cyber crime. If you want to play at cyber wargam ... Show More
1h 1m
Feb 2024
How clicking a single link can cost millions | Ryan Pullen
Is cybercrime getting easier? Cybersecurity expert Ryan Pullen dives into his work investigating massive digital breaches and testing security blindspots — which led to him gaining access to the software controls of a well-known building in London. Learn more about how cybercrimi ... Show More
14m 46s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
May 2023
Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.
Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia I ... Show More
26m 8s
Sep 2023
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..
UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our I ... Show More
31m 11s