PLAY PODCASTS
Security, Spoken

Security, Spoken

2,086 episodes — Page 22 of 42

Security News This Week: Chinese Hacking Surges Amid Coronavirus Crisis

Plus: A Windows zero day, an iOS watering hole, and more of the week's top security news. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 31, 20205 min

Google Bans Infowars Android App Over Coronavirus Claims

Apple kicked Alex Jones out of the App Store in 2018. The Google Play Store has finally followed suit. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 30, 20206 min

The US Army Corps of Engineers Deploys Against Coronavirus

The US is desperate for hospital beds. The USACE can build thousands of them in a matter of days. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 27, 20207 min

Google Removes Adware-Laced Kids' Apps From Play Store

After over a million downloads, the Tekya-infected Android offerings are finally on ice. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 26, 20204 min

How Microsoft Dismantled the Infamous Necurs Botnet

A years-long investigation and global cooperation disrupted one of the biggest botnets ever. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 25, 20207 min

WhatsApp Is at the Center of Coronavirus Response

The World Health Organization is partnering with the messaging app to help disseminate trustworthy information. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 24, 20207 min

Coronavirus Sets the Stage for Hacking Mayhem

As more people work from home and anxiety mounts, expect cyberattacks of all sorts to take advantage. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 23, 20207 min

A Critical Internet Safeguard Is Running Out of Time

Shadowserver has helped keep the internet safe for 15 years. Unless it can raise funds fast, it's going to disappear. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 20, 20206 min

Kill Chain: HBO's Election Security Doc Stresses Urgency

A new documentary makes crystal clear how little time remains to protect the 2020 election. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 19, 20204 min

High-Stakes Security Set-Ups Are Making Remote Work Impossible

It's a rule of thumb in cybersecurity that the more sensitive your system, the less you want it to touch the internet. But as the US hunkers down to limit the spread of Covid-19, cybersecurity measures presents a difficult technical challenge to working remotely for employees at critical infrastructure, intelligence agencies, and anywhere else with high-security networks. In some cases, working from home isn't an option at all. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 18, 20208 min

Most Medical Imaging Devices Run Outdated Operating Systems

You'd think that mammography machines, radiology systems, and ultrasounds would maintain the strictest possible security hygiene. But new research shows that a whopping 83 percent of medical imaging devices run on operating systems that are so old they no longer receive any software updates at all. That issue is endemic to Internet of Things devices generally, many of which aren't designed to receive software improvements or offer only a complicated path to doing so. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 17, 20204 min

Russia Is Learning How to Bypass Facebook's Disinfo Defenses

Since Russia’s stunning influence operations during the 2016 United States presidential race, state and federal officials, researchers, and tech companies have been on high alert for a repeat performance. With the 2020 election now just seven months away, though, newly surfaced social media posts indicate that Russia’s Internet Research Agency is adapting its methods to circumvent those defenses. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 16, 20208 min

Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys

Over the past few years, owners of cars with keyless start systems have learned to worry about so-called relay attacks, in which hackers exploit radio-enabled keys to steal vehicles without leaving a trace. Now it turns out that many millions of other cars that use chip-enabled mechanical keys are also vulnerable to high-tech theft. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 13, 20206 min

A Simple New Tool Lets You Open Email Attachments Without Fear

Opening email attachments from untrusted senders has long been one of the easiest ways to get hacked. But unlike other common security screw-ups—using "password" for your password, downloading pirated software from shady websites—there's no practical way for a modern human to avoid opening the occasional mystery-meat attachment. Now one technologist has produced a solution. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 12, 20206 min

Last Week's Internet Calamity That Wasn't

This is a story about something that could have gone wrong on the internet this week but instead turned out mostly OK. How often can you say that? Around nine o’clock on the East Coast on Friday, February 28, bad news arrived on the doorstep of Let’s Encrypt. An arm of the nonprofit Internet Security Research Group, Let’s Encrypt is a so-called certificate authority that lets websites implement encrypted connections at no cost. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 11, 20209 min

Security News This Week: An Unfixable Flaw Threatens 5 Years of Intel Chips

As the novel coronavirus continues to propagate, phishing scams that pose as Covid-19 advice do as well. The trend started over a month ago, but it's only going to get worse. Abide by these tips to avoid them, and also please keep washing those hands. In non-pandemic news, researchers figured out how to clone the mechanical keys of tens of millions of cars from Toyota, Hyundai, and Kia, making theft a much simpler matter. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 10, 20205 min

The EARN IT Act Is a Sneak Attack on Encryption

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms. It also poses the most serious threat in years to strong end-to-end encryption. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 9, 20208 min

The Long Path out of the Vulnerability Disclosure Dark Ages

In 2003, security researchers Katie Moussouris and a colleague at enterprise security firm @stake—which would later be acquired by Symantec—found a bad flaw in an encrypted flash drive from Lexar. It was trivial to uncover the password that decrypted the drive's data. But when they tried to let Lexar know? "Things went wrong," says Chris Wyspol, who was also working at @stake at the time. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 6, 20204 min

North Korea Is Recycling Mac Malware. That's Not the Worst Part

For years, North Korea's Lazarus Group hackers have plundered and pillaged the global internet, scamming and infecting digital devices around the world for espionage, profit, and sabotage. One of their weapons of choice: a so-called loader that allows them to clandestinely run a diverse array of malware on targeted Macs with hardly a trace. But Lazarus didn't create the loader on its own. The group seems to have found it laying around online, and repurposed it to elevate their attacks. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 5, 20205 min

Security News This Week: Clearview AI's Massive Client List Got Hacked

It was the RSA security conference in San Francisco this week, and the security industry descended on Moscone Center for days of handing out free stickers, demoing products, and presenting research. And the week was punctuated by fewer handshakes and more elbow bumps thanks to Covid-19. WIRED looked at research that North Korea is recycling Mac malware, and how it's indicative of booming malware reuse. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 4, 20206 min

How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before actual bad guys find them. Normally, Strand embarks on these missions himself, or deploys one of his experienced colleagues at Black Hills Information Security. But in July 2014, prepping for a pen test of a South Dakota correctional facility, he took a decidedly different tack. He sent his mom. In fairness, it was Rita Strand's idea. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 3, 20207 min

How Trump Hollowed Out US National Security

As Richard Grenell, the current US ambassador to Germany, starts his second day on the job as the nation’s acting director of national intelligence, his arrival also marks the ouster of not only his predecessor, Joseph Maguire, but reportedly also of DNI principle executive Andrew Hallman. By the end of the day, almost all of the roles created after 9/11 literally to prevent the next 9/11 will be either vacant or lack permanent appointees. Learn about your ad choices: dovetail.prx.org/ad-choices

Mar 2, 202011 min

Gmail Is Catching More Malicious Attachments With Deep Learning

Distributing malware by attaching tainted documents to emails is one of the oldest tricks in the book. It's not just a theoretical risk—real attackers use malicious documents to infect targets all the time. So on top of its anti-spam and anti-phishing efforts, Gmail expanded its malware detection capabilities at the end of last year to include more tailored document monitoring. And it's working. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 28, 20205 min

Nintendo Cracks Down After High-Profile Leaks

At 10:28 pm on November 1, an image of an unknown and classified Pokémon appeared in a Discord group. Gigantamax Machamp, the megasized version of the body-builder Pokémon, was slated to appear in the then-unreleased games Pokémon Sword and Pokémon Shield. Within minutes, JPEGs of it were posted to 4chan. Then, on a dedicated Pokémon Reddit. It wasn’t long until 300 URLs were hosting it. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 27, 20209 min

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking—which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet of things devices to a range of attacks. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 26, 20207 min

Russia Doesn't Want Bernie Sanders. It Wants Chaos

If there’s one line intelligence officials have stuck to about Russian interference in US elections, it’s that it never stopped. Not after the 2016 election, not after the 2018 midterms, and certainly not now, well into the 2020 primary season. Which is why it should be no great surprise that, as the Washington Post first reported Friday, US officials warned Bernie Sanders that Russia is “attempting to help” his presidential campaign. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 25, 20207 min

Bluetooth-Related Flaws Threaten Dozens of Medical Devices

Bluetooth is used in everything from speakers to implanted pacemakers, which means that Bluetooth-related vulnerabilities can affect a dizzying array of devices. In the latest instance, a newly discovered round of 12 Bluetooth bugs potentially exposes more than 480 devices to attack, including fitness trackers, smart locks, and dozens of medical tools and implants. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 24, 20207 min

YouTube Gaming's Most-Watched Videos Are Dominated by Scams and Cheats

YouTube Gaming has been clawing its way into streaming platform Twitch’s market share for months. But new data retrieved by WIRED suggests that YouTube Gaming also has a serious problem with scammers and cheat-makers—and lots and lots of bots. In January, all seven of the most-watched YouTube Gaming channels weren’t run by happy gamers livestreaming the game du jour. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 21, 20207 min

Hundreds of Millions of PC Components Still Have Hackable Firmware

That laptop on your desk or server on a data center rack isn't so much a computer as a network of them. Its interconnected devices—from hard drives to webcams to trackpads, largely sourced from third parties—have their own dedicated chips and code as well. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 20, 20209 min

Voting App Flaws Could Have Let Hackers Manipulate Results

West Virginia and Oregon have both recently deployed mobile a voting app called Voatz to facilitate absentee voting. But Voatz now turns out to have major security flaws, according to researchers from the Massachusetts Institute of Technology—including vulnerabilities that could let a hacker manipulate results. The newly unearthed bugs could allow an attacker to reveal someone's votes, block votes from being submitted, or even manipulate them. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 19, 20208 min

Conservative News Sites Track You Lots More Than Left-Leaning Ones

In an age of hyper-partisanship, Americans increasingly get their news from sites that align with their political beliefs. But more separates those right and left-leaning sides of the web than their opposite ideologies. According to a new study, the right end of the fractured online news industry also tracks its audience far more aggressively than the left does. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 18, 20208 min

Signal Is Finally Bringing Its Secure Messaging to the Masses

Last month, the cryptographer and coder known as Moxie Marlinspike was getting settled on an airplane when his seatmate, a midwestern-looking man in his 60s, asked for help. He couldn't figure out how to enable airplane mode on his aging Android phone. But when Marlinspike saw the screen, he wondered for a moment if he was being trolled: Among just a handful of apps installed on the phone was Signal. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 17, 202011 min

Google's Giving Out Security Keys to Help Protect Campaigns

Malign foreign influence operations during the 2016 United States presidential election season raised awareness about the need for tighter security within campaigns. And while the 2020 presidential campaigns have shown some improvement, many are still seriously lagging—and facing real threats—with nine months left before election day. Now Google is trying to help move the needle. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 14, 20205 min

How to Get Your Yahoo Breach Settlement Money

Well, here we are again. Even years later, it's still hard to fully grasp the degree to which Yahoo failed at protecting the data of billions of people across multiple breaches in the 2010s. But now, thanks to a class action suit against Yahoo that has reached a proposed settlement, you have until July 20 to file a claim if you were impacted. Don't miss out on your chance for a $100 apology. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 13, 20205 min

Facebook's Bug Bounty Caught a Data-Stealing Spree

Despite its best damage control efforts, Facebook is still dogged by its checkered past on data privacy. But at least some of the security mechanisms the company has put in place are catching problems—and helping them get fixed. Facebook said on Friday that in 2019 its bug bounty saw its largest number of accepted bugs since the program launched nine years ago, paid out its highest single reward ever, and began inviting select researchers to evaluate new features before they launched. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 12, 20205 min

Security News This Week: Pro-Trump Trolls Flooded the Iowa Caucus Phone Lines

The week kicked off with the Iowa caucuses, which went very poorly, in so many ways! We'll talk about a few of them below, but the main takeaway is that adding unvetted technology to the voting process—or anything—rarely makes things better. Other states, please take note! Actually, Nevada and New Hampshire already have. It's a start. In another unwelcome technological evolution, ransomware has started targeting industrial control systems, which bodes poorly for critical infrastructure. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 11, 20205 min

Trump Now Has the Senate GOP's Blessing to Undermine Democracy

Welcome to a dark day in America’s modern experiment with democracy. Despite becoming the first president ever to receive votes from both parties to convict and remove him from office in an impeachment trial, President Donald Trump today woke up in the White House unbound. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 10, 20206 min

An Artist Used 99 Phones to Fake a Google Maps Traffic Jam

Almost three years ago, artist Simon Weckert noticed something unusual at a May Day demonstration in Berlin: Google Maps showed there was a massive traffic jam, even though there were zero cars on the road. Soon enough, Weckert realized that it was the mass of people, or more specifically their smartphones, that had inadvertently tricked Google into seeing gridlock on an empty street. And then he decided to do it himself. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 7, 20206 min

This Identity Activist Wants to Make Facebook Obsolete

Kaliya Young doesn’t want to break up Facebook. She wants to make it obsolete. She was an Olympic-level water polo player for Canada, but in 2002 was diagnosed with Hodgkin’s lymphoma. Freshly graduated from university and living in the San Francisco Bay Area, she went through months of radiation and chemotherapy that sapped her physical strength. In her mid-twenties, far from home, no longer an athlete, Young felt intensely alone. Wired UK This story originally appeared on WIRED UK. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 6, 20206 min

Security News This Week: Windows 7 Gets One Last Update for the Road

Have you heard about this little thing called Space Force? If so, it's probably through ridicule; the latest branch of the US military has received no shortage of it since it launched at the end of last year. Still, at least it had a better week than Intel, which had to release a patch for a patch for its patch of its ZombieLoad problem. Say that five times fast. This week we also took a look at the most common Mac malware, at least by antivirus firm Kaspersky's reckoning. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 5, 20205 min

Dashlane's Super Bowl Ad Proves Password Managers Have Arrived

This year’s crop of Super Bowl ads includes plenty of the usual suspects: expensive cars, cheap beers, big tech. But among the companies coughing up a reported $5.6 million for 30 seconds of Big Game glory is one name most people have never heard of, selling a product that many don’t know exists: Dashlane, an app that manages your passwords. It’s not that password management is entirely novel. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 4, 20207 min

Warren Pledges to Fight Disinformation, but Her Arsenal Is Limited

Elizabeth Warren has a plan for dealing with disinformation. Sort of. Yesterday, the Democratic senator and presidential candidate known for her detailed policy objectives released a proposal titled “Fighting Digital Disinformation.” The part about what she intends to do as president, however, is a bit thin by her standards. The bulk of the plan is devoted instead to what Warren wants social media platforms to do. Learn about your ad choices: dovetail.prx.org/ad-choices

Feb 3, 20206 min

Scraping the Web Is a Powerful Tool. Clearview AI Abused It

The internet was designed to make information free and easy for anyone to access. But as the amount of personal information online has grown, so too have the risks. Last weekend, a nightmare scenario for many privacy advocates arrived. The New York Times revealed Clearview AI, a secretive surveillance company, was selling a facial recognition tool to law enforcement powered by “three billion images” culled from the open web. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 31, 20208 min

One Small Fix Would Curb Stingray Surveillance

Law enforcement in the United States, international spies, and criminals have all used (and abused) the surveillance tools known as "stingrays" for more than a decade. The devices can track people's locations and even eavesdrop on their calls, all thanks to weaknesses in the cellular network. Today, researchers are detailing a way to stop them—if only telecoms would listen. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 30, 20208 min

The Sneaky Simple Malware That Hits Millions of Macs

The popular misconception that Macs don’t get viruses has become a lot less popular in recent years, as Apple devices have weathered their fair share of bugs. But it’s still surprising that the most prolific malware on macOS—by one count, affecting one in 10 devices—is so relatively crude. This week, antivirus company Kaspersky detailed the 10 most common threats its macOS users encountered in 2019. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 29, 20205 min

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

In a criminal complaint released Monday, the Brazilian government is charging journalist Glenn Greenwald with committing cybercrimes. The accusations are connected to leaked text messages that Greenwald reported on last year for The Intercept Brasil, which the outspoken journalist launched in 2016 as a spinoff of the US-based news site he had founded two years prior. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 28, 20206 min

Inside the World's Highest-Stakes Industrial Hacking Contest

On a small, blue-lit stage in a dim side room of the Fillmore Theater in Miami on Tuesday, three men sat behind laptops in front of a small crowd. Two of them nervously reviewed the commands on a screen in front of them. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 27, 202011 min

Everything We Know About the Jeff Bezos Phone Hack

On November 8, 2018, Amazon CEO Jeff Bezos received an unexpected text message from Saudi Arabian leader Mohammed bin Salman. The two had exchanged numbers a few months prior, in April, at a small dinner in Los Angeles, but weren’t in regular contact; Bezos had previously received only a video file from the crown prince in May that reportedly extolled Saudi Arabia’s economy. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 24, 20209 min

A Handy Chrome Feature, a Sonos Update Warning, and More News

Chrome is protecting and Sonos is disconnecting, but first: a cartoon about the new big screen. Here's the news you need to know, in two minutes or less. Want to receive this two-minute roundup as an email every weekday? Sign up here! Today’s News Don't ignore Chrome's new password checkup feature If you've logged in to any accounts on Google Chrome recently, you've probably noticed a new pop-up nagging you about your password security. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 23, 20202 min

An Open Source Bid to Encrypt the Internet of Things

End-to-end encryption is a staple of secure messaging apps like WhatsApp and Signal. It ensures that no one—even the app developer—can access your data as it traverses the web. But what if you could bring some version of that protection to increasingly ubiquitous—and notoriously insecure—Internet of Things devices? The Swiss cryptography firm Teserakt is trying just that. Learn about your ad choices: dovetail.prx.org/ad-choices

Jan 22, 20206 min