logo
episode-header-image
Sep 2023
20m 25s

Tech News: Hackers Gotta Hack

iHeartPodcasts
About this episode

Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.

See omnystudio.com/listener for privacy information.

Up next
Aug 22
Week in Tech: Chips are the New Oil
How will we send memes when the world ends? This week, Oz and Karah recap the first ever World Humanoid Robot Games – the Olympics for Androids. Then, Oz explains why the US might be putting secret tracking devices inside shipments of advanced microchips. Karah explains a texting ... Show More
30m 41s
Aug 20
The Story: Inside a Couples Retreat for AI Companions
This week we go on a romantic getaway for people who are in love with AI. Karah talks with Sam Apple, an author and journalist who wrote an article for Wired about a couples retreat he organized for people with AI companions. We’ll discuss how the weekend unfolded, whether AI rom ... Show More
29m 52s
Aug 15
Week in Tech: If Versailles Could Talk
Is technology actually good for older people? This week, Oz and Karah explore the French palace of Versailles by talking to a statue-turned-chatbot. Then, Oz gives an update on Apple’s new make-or-break Siri overhaul. Karah weighs whether everyday use of technology is rotting our ... Show More
34m 18s
Recommended Episodes
Jun 2018
Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time.
In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound ... Show More
21m 5s
Sep 2023
What up in the underworld’s C2C markets. An update on the Sony hack claims. Notes on cyberespionage, from Russia, China, and parts unknown. And there’s a market for bugs.
A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malw ... Show More
33m 28s
Aug 2016
Daily: Election hacking, layoff rumors, the unbearable lightness of Pokemon.
In today’s podcast we look at Black Hat and draw some consensus advice for start-ups. Cyber espionage rises around the South China Sea. Apparent Russian hacking continues to worry election officials and voters in the US. The HEIST exploit is demonstrated. ISIS jockeys with al Qae ... Show More
20m 18s
Aug 2023
Action in the cybercriminal underworld. Russia’s FSB and SVR are both active, and so are their hacktivist auxiliaries. NSA offers advice on configuring next-generation firewalls.
Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Span ... Show More
29m 2s
Mar 2022
Thu. 03/31 – Hackers Forging Emergency Data Requests
Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ... Show More
16m 22s
Jan 2023
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ... Show More
29m 40s
Jan 2020
Curveball proofs-of-concept. CISA warns chemical industry. Military families harassed online. Phishing the UN. Fleeceware in the Play Store. Moscow says there was no Burisma hack.
Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers recei ... Show More
21m 50s
Jan 2023
Contractor error behind FAA outage. OneNote malspam. Vastflux ad campaign disrupted. Ukraine moves closer to CCDCOE membership. Alerts for gamblers and gamers.
The FAA attributes its January NOTAM outage. Malicious OneNote attachments are appearing in phishing campaigns. The Vastflux ad campaign has been disrupted. Ukraine moves toward closer cybersecurity collaboration with NATO. Rick Howard considers the best of 2022. Deepen Desai fro ... Show More
25m 31s
Jun 2019
Hacker conspiracies
The rise of cyber-crime and technology brings with it false information and fear mongering. Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks teach us what information we should adhere to and what stories have been created to drive us into the arms of cli ... Show More
28m 41s
Feb 2023
FBI Investigates a network incident. Developments in cybercrime. DDoS against German airports. US forms a Disruptive Technology Strike Force. CISA releases 15 ICS advisories.
The FBI is investigating incidents on its networks. Frebniis backdoors Microsoft servers. ProxyShell vulnerabilities are used to install a cryptominer. Havoc's post-exploitation framework. Atlassian discloses a data breach. German airports sustain a cyber incident. An Aspen Insti ... Show More
31m 47s