Informações:
Sinopse
Home Of The Cyber Show & The World Of Hip-Hop Show!
Episódios
-
Iranian Hacker Hysteria
09/01/2020 Duração: 28minIf you’re at all plugged into the global news cycle, you’ll know the U.S. assassinated Iran’s General Qassem Soleimani, a commander in the Islamic Revolutionary Guard Corps (IRGC) and leader of the secretive Quds Force.Since that night, experts have been wondering what the blowback from Tehran will be. Naturally, in the age of cyberwarfare, people are getting pretty worried about the threat of Iranian hackers, who, if you were to believe some newscasts, are practically hiding in your modem.There are some real and some overblown threats from Iranian hackers now facing the U.S. In fact, the Department of Homeland Security issued a warning that it was logging increased cyberattacks emanating from the Iranian regime on American networks.But how worried should we be?On this week’s CYBER we have Motherboard reporter Joseph Cox who is already tracking alleged Iranian hackers defacing American websites, to discuss what Tehran’s hackers are actually capable of hacking. See acast.com/privacy fo
-
Re-run: Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
02/01/2020 Duração: 01h01minOn this week's CYBER we're re-upping our longform interview of none other than Mr. Edward Snowden, a person who might've affected the infosec world more than any singular human over the last decade. We'll be back next week with a fresh new episode for our 2020 season. See acast.com/privacy for privacy and opt-out information.
-
Trolls, Hackers, Spies: The Cyber Decade
26/12/2019 Duração: 46minIt occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we’ve done. The real scoops, traffic hogs, and think pieces. But then again, this is the decade that changed infosec. This was the decade that made hackers critical players on the world stage, our personal digital information sacred, and our political systems fixed into some strange, social media hellscape. Since its founding in 2009, Motherboard has seen it all with you.So on this episode of CYBER, our dear editor-in-chief Jason Koebler and host Ben Makuch will take you through from the beginning of the decade to its end: from Guy Fawkes masks, strings of weaponized code to your brain being manipulated by a Facebook ad. See acast.com/privacy for privacy and opt-out information.
-
The Hacker In My Ring Camera: A Tale of Trolls And A Podcast
19/12/2019 Duração: 31minImagine installing security cameras in your house to protect your family. Then one day those cameras start talking to you. Trolling you, in fact.After last week when the news broke that Amazon’s super sketchy security camera company Ring, had its products compromised, Motherboard got even more scoop: There’s a livestream-podcast over a Discord channel where hackers take over people's Ring cameras and use their speakers to troll its owners in the comfort of their own homes.Then Motherboard tested the security of Ring and found, well, Ring accounts are lacking basic security measures.On this week’s CYBER we have our reporter Joseph Cox, who broke the stories, to tell us more. See acast.com/privacy for privacy and opt-out information.
-
Where Our Cell Phones Go When We Recycle Them
12/12/2019 Duração: 01h01minThis week we talk to Adam Minter, author of “Secondhand,” about the end-of-life supply chain for our cell phones, computers, and all the other stuff we keep in our houses. See acast.com/privacy for privacy and opt-out information.
-
How Big Telcos Just Made Your Phone Easier To Hack
06/12/2019 Duração: 28minResearchers learned that telecom companies are implementing the successor to SMS in vulnerable ways, making everyone’s text messages unsafe. See acast.com/privacy for privacy and opt-out information.
-
The CYBER Cypher EP
21/11/2019 Duração: 15minOn this week's episode we introduce the newly named "Cypher" part of the show where we round up the tech stories of the week that we think you need to know. On deck we discuss infamous hacker Phineas Fisher and an actual investigation called: "Who farted?"We'll be off next week for Thanksgiving, because Ben is going back to Canadia. Good luck eating too much, everyone! See acast.com/privacy for privacy and opt-out information.
-
How Scary Is Critical Infrastructure Hacking?
14/11/2019 Duração: 35minSome of the most fascinating hacks are the types that don’t just pwn a shady malware company, the trade secrets of America or embarass the Democratic National Committee, but the kinds that target water systems, nuclear power plants and the oil and gas sector.Critical infrastructure hacking was brought into the public psyche by former Secretary of State and CIA director, Leon Panetta, in a much taunted 2012 speech where he warns of a coming “Cyber Pearl Harbour.” On this week’s CYBER we have Selena Larson, a former CNN reporter and cyber threat intelligence analyst working over at Dragos which is a leading cybersecurity company that specializes in critical infrastructure security, to tell us what we should be realistically worried about and if she believes Panetta’s speech has any merit in 2019. See acast.com/privacy for privacy and opt-out information.
-
How Google Torpedoed A Cybersecurity Rising Star
07/11/2019 Duração: 33minIt’s the classic story of a corporate giant swallowing up a darling startup into its ranks and destroying its core business.Originally a spawn of the Alphabet company—Google’s parent umbrella—Chronicle was a cybersecurity startup considered by many to be a game changer: it was going to leverage machine learning and Alphabet’s endless supply of malware samples and technical data via Google, and fuse it into an over the counter product that infosec units in companies all over the world could use to make the Internet better for everyone. It seemed, to many, this was a cybersecurity company that wasn’t hawking snakeoil, but a real, helpful product. And part of its allure was that Chronicle would not join its corporate overlord outright, but instead remain independent of Google.Then it was announced they were going to join Google and everyone jumped ship. Now, as one employee put it, “Chronicle is dead.” In other words, one of the cybersecurity industry's most promising startups is falling apart after on
-
The Assassination of Blogger Martin Kok
31/10/2019 Duração: 27minThe tale started with an encrypted phone company, Morroccan gangsters, the Scottish mafia, and a blogger. It ended with an assassination outside of a sex club in Amsterdam.Last week, Motherboard reporter Joseph Cox broke the news that MPC—a Scottish company that hawked special encrypted phones that could evade police surveillance—had been connected to the murder of crime blogger Martin Kok. Kok was a former criminal himself who had previously served a jail sentence for two murders.Kok’s crime blogging had gotten him on the wrong side of the Gillespie brothers, two Scots who are still operating a highly sophisticated drug and gun running operation connected to South American cartels, as well as Morroccan gangster associates. They allegedly hatched a successful plan to kill him in December 2016.On this week’s episode of CYBER, Cox goes into detail about how this criminal syndicate carried out Kok's murder, and what it means for crime in 2019 when the mafia isn’t buying encrypted phones, but making them for
-
Inside the U.S. Cyber Army
24/10/2019 Duração: 49minThe U.S. military prides itself on being one of the most powerful militaries on the face of the earth. The best trained, the best equipped with the latest wartech, the most mobile, with a power projection around the world. It’s why, sadly, as the Bureau of Investigative Journalism—which tracks U.S. drone strikes in Pakistan, Yemen, Afghanistan, and Somalia—maintains that the American military has killed as many as over 12,000 people in targeted strikes since 2004. Of those numbers, close to 1,800 are civilians and up to nearly 400 of that number, are kids.There’s even been consideration on whether or not the U.S. military could have at on point taken on the entire world in the kinetic reality of ground, air, and sea war. But in 2019, the American war machine doesn’t simply need soldiers,helicopters, or F-22s. It needs hackers to infiltrate secure networks, to spy, or disrupt critical infrastructure of an enemy during any given military operation. In order to professionalize and certify its importanc
-
Girls Do Porn
17/10/2019 Duração: 26minThe operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? See acast.com/privacy for privacy and opt-out information.
-
How Neo-Nazi Terrorists Are Organizing Online
10/10/2019 Duração: 29minNeo-Nazi terrorists are taking a page from ISIS' playbook and carrying out calculated, horrific, mass casualty attacks all over the world to shock and scare of the public.And they’re taking another tip from the infamous terrorist group: using internet savvy and encrypted networks to spread propaganda, recruit new members, and ultimately orchestrate terrorism. They have even used famous jihadist images of Osama bin Laden in their propaganda and glorify ISIS videos.After a spate of high-profile deplatforming campaigns on more mainstream social media sites like Twitter and Facebook, the far-right retreated to the more covert corners of the internet, taking up on platforms like Minds. Recently, and similarly to ISIS, neo-Nazis have begun using Telegram for everything from shitposting to coordinating terrorist activities.On this week’s CYBER we’ve got VICE News reporter Tess Owen to talk about her scoop on neo-Nazi terror and its relationship to Telegram.Follow Ben on Twitter. See acast.com/privacy for privac
-
Lyft and Uber Are Having a Terrible, Awful, No-Good Time
04/10/2019 Duração: 28minThe last few months have been decidedly horrible for rideshare apps Uber and Lyft, which were once the darlings of Wall Street investors who contributed billions of dollars in venture capital to help them disrupt an entire industry. Now, there’s trouble on the horizon. Lyft has been sued for sexual assault by at least 26 passengers in recent months. One driver was allowed to continue operating on the platform after a truly horrifying incident: He and several other men allegedly took a passenger intended for Crown Heights to a park in New Jersey, where they violently assaulted her. Another driver was permitted by Lyft to continue giving over 700 rides after severely beating one of his passengers, stomping his head into the ground. Lyft users are alleging a robotic and inefficient complaint system shows Uber’s biggest rival cares more about profits than the safety of its clients.Then, there’s Lyft rival Uber, which has been posting major losses after the biggest IPO of 2019.Now. t
-
The Spy Who (Allegedly) Screwed Us
26/09/2019 Duração: 36minCatch the rat. Find the mole. It’s the classic scenario of a spy thriller. Recently, a top spy in the Five Eyes collective—the secretive espionage and intel sharing alliance between agencies in the U.S., U.K., Canada, New Zealand and Australia—was caught trying to sell top secret information.An FBI investigation of Phantom Secure, the encrypted cell phone provider which sold devices to Mexican cartels, uncovered a secret Canadian mole who allegedly offered its CEO Vincent Ramos intel on the investigations surrounding his company.Without knowing the anonymous leaker, the Canadian feds began the slow process of paring down the list of who the potential mole could be. This led them to a top cybersecurity expert and head of an intelligence unit that had access to not only Canadian spycraft, but to international intelligence shared between the top secret collective. James Ortis, the alleged mole, had his hands on things like heavily guarded NOC lists (“Non-Official-Cover" spies, or double agents in
-
The Private Surveillance System Tracking Cars in America
19/09/2019 Duração: 26minIn just a few taps and clicks, the system, made by a private company, shows where a car has been seen throughout the U.S. Tipped by a private investigator source, Joseph Cox broke the news that a powerful system used by an industry including repossession agents and insurance companies tracks cars across the US. Armed with just a car's plate number, the tool—fed by a network of private cameras spread across the country—provides users a list of all the times that car has been spotted.Follow Ben Makuch and Joseph Cox on Twitter. See acast.com/privacy for privacy and opt-out information.
-
The Biggest iPhone Hack In History, Explained
12/09/2019 Duração: 26minAt the end of August, researchers at Google dropped a bombshell: they had discovered malicious websites that they said were indiscriminately spreading iPhone malware for years. At certain points the websites were even using zero day exploits; attacks that take advantage of vulnerabilities that Apple is not aware of. Apple subsequently confirmed what various media reports found: that the malicious sites were particularly geared towards hacking Uighur muslims, many of whom live in Western China under intense surveillance from the government. Apple disputed some details from Google, such as the length of the campaign, but this is still likely the biggest iPhone hack we know about so far.On this week's episode of CYBER, we talk to Motherboard Senior Staff Writer Joseph Cox about Google's research, and what it means for how governments deploy iPhone malware: it turns out, on a much larger scale than we previously thought. See acast.com/privacy for privacy and opt-out information.
-
The Cyberwar In Yemen
05/09/2019 Duração: 24minBy most accounts, the war in Yemen is a brutal and lethal tragedy of the modern world that has claimed the lives of thousands of people. With the backing of western military industrial power, the Saudi-led coalition has undertaken a relentless bombing campaign against the Iran-backed Houthi rebels that ousted President Abdrabbuh Mansour Hadi and his regime from the capital Sanaa in 2015.Human rights watchers have accused the Saudis and its allies of war-crimes and a string of attacks against civilians. Just this last weekend the International Red Cross said the Saudis had killed over 100 people in a single strike on a detention center. And as the kinetic war rolls out IRL, the Yemeni people have also been casualty to a silent war: one that’s online.On this week’s episode we sit down with Winnona DeSombre, a threat intelligence researcher at RecordedFuture to talk about how cyberwarfare and espionage has been a serious feature in the war in Yemen. See acast.com/privacy for privacy and opt-out in
-
How to Track Malware
29/08/2019 Duração: 28minWe’ve all heard of high profile hacks, like Stuxnet which basically took out the Iranian nuclear program, or that time when Seth Rogen’s stoner comedy made North Korea really, really pissed off and they hacked Sony.And the key to all of these hacks is malware, or software specifically and intentionally designed to damage computer systems. But one thing some people often ask themselves is: what is malware, exactly? Well, ultimately just some lines of code. On this week’s CYBER we have someone who researches it for a living: malware analyst Tarik Salah of Domain Tools. See acast.com/privacy for privacy and opt-out information.
-
Forget Russian Trolls, American Voting Systems Can Be Hacked
22/08/2019 Duração: 24minImagine a world where one of our most critical instruments of democracy, voting systems, are connected to the internet where they are potentially vulnerable to hacking.Well, thanks to the work of Motherboard contributor Kim Zetter, we now know that’s the reality we live in after she broke the story that researchers had found voting systems online, including systems in Wisconsin, Michigan, and Florida—all well known for being key swing states in presidential elections.But for years election officials have said our voting systems, used for closely fought Presidential election of 2016 and in 2012 when it was Romney versus Obama, weren’t even on the internet and thus, they said, unhackable.CYBER recently caught up with Kim to discuss her massive scoop and how Russian troll armies might not be the thing threatening American democracy or scaring the intelligence community tasked with protecting it come 2020. See acast.com/privacy for privacy and opt-out information.