logo
episode-header-image
Jul 2020
1h 5m

Bug bounties: the good and the bad of co...

The Verge
About this episode
Verge editor-in-chief Nilay Patel talks to founder and CEO of Luta Security Katie Moussouris. Moussouris has a long history in computer security, working at Microsoft and the Department of Defense creating their first bug bounty programs to incentivize catching and reporting security bugs and vulnerabilities in software systems. Nilay and Katie discuss the g ... Show More
Up next
Jul 8
A quest for the best headphone mics
On this episode of The Vergecast, we kick off Hot Girl Vergecast Summer with a classic Vergecast segment: the mic test. Guest host Victoria Song is joined by Vergecast producers Andru Marino and Erick Gomez to see how the Nothing Headphone 1, Sony WH-1000XM6, Apple AirPods Max, a ... Show More
1h 6m
Jul 1
The movie and TV tech we actually want to use
One way to think about the tech industry is just as a series of people trying to build stuff they saw in movies and on TV. Some of that tech is great, some of it is deeply dystopian, and most of it would make the world a very different place if it suddenly existed. In this episod ... Show More
1h 33m
Jun 27
What Meta and Anthropic really won in court
It's already the heat of summer, and the news keeps coming. Nilay, David, and Jake start the show with a bunch of tech news, including the latest on Tesla's robotaxi launch, some updates on the Trump Phone, new devices from Fairphone and Unihertz, and Meta's shifting strategy for ... Show More
1h 46m
Recommended Episodes
Jan 2024
Vulnerabilities and security risks.
Ivanti products are under active zero-day exploitation. Phemedrone is a new open-source info-stealer. Bishop Fox finds exposed SonicWall firewalls. GitLab and VMware patch critical vulnerabilities. The Secret Service foils a phishing scam. Europol shuts down a cryptojacking campa ... Show More
32m 50s
Jan 2023
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ... Show More
29m 40s
Jun 2023
A Joint Advisory on LockBit. AI chatbots: the grammarians of tomorrow. KillNet makes a deal with the Devil (Sec). The private-sector’s piece in the hybrid war puzzle.
The Five Eyes, alongside a couple of allies, issue a LockBit advisory. AI aids in proofreading phishing attacks. Anonymous Sudan mounts nuisance-level DDoS attacks against US companies. France alleges a disinformation campaign conducted by Russian actors. KillNet says it's partne ... Show More
22m 46s
Jul 2016
Daily & Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.
In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a c ... Show More
21m 34s
Jan 2020
Curveball proofs-of-concept. CISA warns chemical industry. Military families harassed online. Phishing the UN. Fleeceware in the Play Store. Moscow says there was no Burisma hack.
Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers recei ... Show More
21m 50s
Apr 2019
Poisoned porn ads, the A word, and why why why Wipro?
The hacker who lived the high life after spreading malware via porn sites, Wipro demonstrates how to turn a cybersecurity crisis into a PR disaster, and why are humans listening in to your Alexa conversations?All this and much much more is discussed in the latest edition of the " ... Show More
52m 41s
May 2016
Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ... Show More
12m 45s
Oct 2018
Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes.
In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank rais ... Show More
20m 12s
Feb 2023
Fighting software vulnerabilities with software bill of materials
Earn additional income by sharing your opinion on userinterviews.com!Episode Resources: Executive Order on Improving the Nation’s Cybersecurity Alpha-Omega Projects Cybersecurity & Infrastructure Security Agency (Cisa) Tools to create SBOM  About Barak Brudo Barak Brudo helps org ... Show More
38m 35s
Mar 2024
Apple's iMessage Encryption Puts Its Security Practices in the DOJ's Crosshairs
Privacy and security are an Apple selling point. But the DOJ's new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users. 
8m 19s