logo
episode-header-image
Sep 2023
20m 25s

Tech News: Hackers Gotta Hack

iHeartPodcasts
About this episode

Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.

See omnystudio.com/listener for privacy information.

Up next
Yesterday
The Story: Roblox and the ‘Prehistoric Era’ of Gaming w/ David Baszucki
David Baszucki is the co-founder and CEO of Roblox, the gaming platform that’s become a digital playground for millions of kids around the world. Baszucki sits down with Oz to talk about how Roblox became one of the most beloved tech platforms for the younger generations, and why ... Show More
31m 21s
Jul 4
TechStuff Classic: The Story of the Sony Walkman
This week, we’re revisiting one of our favorite episodes — all about the Sony Walkman. Jonathan Strickland dives into why Time named the portable device number 47 on a list of the 50 most influential gadgets of all time. How did the Walkman become a thing, and what influence has ... Show More
46m 8s
Jul 2
The Story: Selfhood in the Digital Age w/ Vauhini Vara
Writer and journalist Vauhini Vara has been entangled with the tech world for most of her life — first as a kid in the Seattle suburbs and a college student in the Bay Area, and then as a reporter covering Silicon Valley for The Wall Street Journal. But it wasn’t until she turned ... Show More
34m 33s
Recommended Episodes
Jun 2018
Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time.
In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound ... Show More
21m 5s
Sep 2023
What up in the underworld’s C2C markets. An update on the Sony hack claims. Notes on cyberespionage, from Russia, China, and parts unknown. And there’s a market for bugs.
A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malw ... Show More
33m 28s
Aug 2016
Daily: Election hacking, layoff rumors, the unbearable lightness of Pokemon.
In today’s podcast we look at Black Hat and draw some consensus advice for start-ups. Cyber espionage rises around the South China Sea. Apparent Russian hacking continues to worry election officials and voters in the US. The HEIST exploit is demonstrated. ISIS jockeys with al Qae ... Show More
20m 18s
Aug 2023
Action in the cybercriminal underworld. Russia’s FSB and SVR are both active, and so are their hacktivist auxiliaries. NSA offers advice on configuring next-generation firewalls.
Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Span ... Show More
29m 2s
Mar 2022
Thu. 03/31 – Hackers Forging Emergency Data Requests
Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ... Show More
16m 22s
Jan 2023
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ... Show More
29m 40s
Jan 2020
Curveball proofs-of-concept. CISA warns chemical industry. Military families harassed online. Phishing the UN. Fleeceware in the Play Store. Moscow says there was no Burisma hack.
Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers recei ... Show More
21m 50s
Jan 2023
Contractor error behind FAA outage. OneNote malspam. Vastflux ad campaign disrupted. Ukraine moves closer to CCDCOE membership. Alerts for gamblers and gamers.
The FAA attributes its January NOTAM outage. Malicious OneNote attachments are appearing in phishing campaigns. The Vastflux ad campaign has been disrupted. Ukraine moves toward closer cybersecurity collaboration with NATO. Rick Howard considers the best of 2022. Deepen Desai fro ... Show More
25m 31s
Jun 2019
Hacker conspiracies
The rise of cyber-crime and technology brings with it false information and fear mongering. Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks teach us what information we should adhere to and what stories have been created to drive us into the arms of cli ... Show More
28m 41s
Feb 2023
FBI Investigates a network incident. Developments in cybercrime. DDoS against German airports. US forms a Disruptive Technology Strike Force. CISA releases 15 ICS advisories.
The FBI is investigating incidents on its networks. Frebniis backdoors Microsoft servers. ProxyShell vulnerabilities are used to install a cryptominer. Havoc's post-exploitation framework. Atlassian discloses a data breach. German airports sustain a cyber incident. An Aspen Insti ... Show More
31m 47s