Security, Spoken

WIRED
undefined
Apr 16, 2019 • 6min

William Barr Sends Troubling Signals Ahead of Mueller Report Release

The Mueller report has been sitting in the Justice Department for nearly two weeks. Attorney general William Barr told Congress Wednesday he’s hoping the public will finally get a look at the 300-plus page document sometime within the next week, ending a bizarre period of dissembling and fumbling by Barr that has left America with more questions than answers about the seriousness of what Mueller uncovered. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 16, 2019 • 5min

Security News This Week: Julian Assange Faces Extradition to the US

It was another busy week in the security world, and perhaps the biggest story was the arrest of Julian Assange in London on Thursday. The WikiLeaks founder is facing criminal charges in the US over allegations that he conspired to help Chelsea Manning hack into Pentagon computer networks nine years ago. It’s hardly an open-and-shut case, which Andy Greenberg broke down shortly after the indictment was unsealed. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 15, 2019 • 2min

Julian Assange Arrested, Mastering Jeopardy!, and More News

Tech news you can use, in two minutes or less: Julian Assange charged with computer hacking. WikiLeaks founder Julian Assange was arrested today in London and faces hacking charges from the US government. The indictment, which was unsealed today, centers around an allegation that Assange promised to help then Army-private Chelsea Manning gain access to classified materials. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 15, 2019 • 6min

How To Make Your Amazon Echo and Google Home as Private as Possible

If you use a smart speaker, you know all of the conveniences and delights that make it more than just a glorified paper weight. But, admit it, you've probably given it some privacy side-eye from time to time. After all, it is a microphone that just sits in your house waiting for a wake word to start recording what you say. Here's how to tighten the reins on what Alexa, Google Assistant, and Siri can hear, when, and how it gets used. It's a good time to take stock. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 12, 2019 • 8min

Breaking Down the Hacking Case Against Julian Assange

For the first time since 2012, WikiLeaks founder Julian Assange no longer has the legal protections of the Ecuadorean Embassy in London. He now faces the criminal charges he's always suspected and feared—although it's now clear that he's accused of criminal behavior not as a journalist, or even a spy, but a hacker. On Thursday, London's metropolitan police physically dragged Assange out of his residence at the embassy and into a police van. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 12, 2019 • 6min

A New Breed of ATM Hackers Gets in Through a Bank’s Network

Over the past few years, scammers have increasingly siphoned cash off of digital payment networks, stealing hundreds of millions of dollars so far. Not only is the problem hard to contain; new findings show that it's evolving and maturing, with new types of ATM malware on the rise. Researchers at the Kaspersky Security Analyst Summit in Singapore are presenting findings on Wednesday about a new wave of payment system scams. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 11, 2019 • 6min

'Exodus' Spyware Posed as a Legit iOS App

Private companies around the world have evolved a gray industry supplying digital surveillance and hacking tools to governments and local law enforcement. As the once little-known practice has grown, so too has the resulting malware. Researchers have now found that one of these spyware products, which had previously been found on the Google Play Store, also targeted iOS. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 11, 2019 • 8min

A Peek Into the Toolkit of the Dangerous 'Triton' Hackers

When the malware known both as Triton and Trisis came to light in late 2017, it quickly gained a reputation as perhaps the world's most dangerous piece of code: the first ever designed to disable the safety systems that protect industrial facilities from potentially lethal physical accidents. But Triton hackers still have to engage in a far more common forms of hacking to plant that code, in some cases spending close to a year digging their way through IT networks before they reach their targets. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 10, 2019 • 7min

How Android Fought an Epic Botnet—and Won

In March 2017, the Android security team was feeling pleased with itself. The group had detected, analyzed, and neutralized a sophisticated botnet built on tainted apps that all worked together to power ad and SMS fraud. Dubbed "Chamois," the malware family had already cropped up in 2016, and was being distributed both through Google Play and third-party app stores. So the Android team started aggressively flagging and helping to uninstall Chamois until they were sure it was dead. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Apr 10, 2019 • 2min

An IOS App That Secretly Spies on You, And More News

Tech news you can use, in two minutes or less: Hackers found their way into Apple's ecosystem, and possibly your phone Cyber criminals have been directing users to download something called Exodus, an app that was actually malware. It allowed access to photos, videos, device IDs, audio recordings, and contacts, potentially tracking a victim's location and listening to their conversations through the microphone. Learn about your ad choices: dovetail.prx.org/ad-choices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app