

Security, Spoken
WIRED
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
Episodes
Mentioned books

Apr 16, 2019 • 6min
William Barr Sends Troubling Signals Ahead of Mueller Report Release
The Mueller report has been sitting in the Justice Department for nearly two weeks. Attorney general William Barr told Congress Wednesday he’s hoping the public will finally get a look at the 300-plus page document sometime within the next week, ending a bizarre period of dissembling and fumbling by Barr that has left America with more questions than answers about the seriousness of what Mueller uncovered.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 16, 2019 • 5min
Security News This Week: Julian Assange Faces Extradition to the US
It was another busy week in the security world, and perhaps the biggest story was the arrest of Julian Assange in London on Thursday. The WikiLeaks founder is facing criminal charges in the US over allegations that he conspired to help Chelsea Manning hack into Pentagon computer networks nine years ago. It’s hardly an open-and-shut case, which Andy Greenberg broke down shortly after the indictment was unsealed.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 15, 2019 • 2min
Julian Assange Arrested, Mastering Jeopardy!, and More News
Tech news you can use, in two minutes or less: Julian Assange charged with computer hacking. WikiLeaks founder Julian Assange was arrested today in London and faces hacking charges from the US government. The indictment, which was unsealed today, centers around an allegation that Assange promised to help then Army-private Chelsea Manning gain access to classified materials.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 15, 2019 • 6min
How To Make Your Amazon Echo and Google Home as Private as Possible
If you use a smart speaker, you know all of the conveniences and delights that make it more than just a glorified paper weight. But, admit it, you've probably given it some privacy side-eye from time to time. After all, it is a microphone that just sits in your house waiting for a wake word to start recording what you say. Here's how to tighten the reins on what Alexa, Google Assistant, and Siri can hear, when, and how it gets used. It's a good time to take stock.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 12, 2019 • 8min
Breaking Down the Hacking Case Against Julian Assange
For the first time since 2012, WikiLeaks founder Julian Assange no longer has the legal protections of the Ecuadorean Embassy in London. He now faces the criminal charges he's always suspected and feared—although it's now clear that he's accused of criminal behavior not as a journalist, or even a spy, but a hacker. On Thursday, London's metropolitan police physically dragged Assange out of his residence at the embassy and into a police van.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 12, 2019 • 6min
A New Breed of ATM Hackers Gets in Through a Bank’s Network
Over the past few years, scammers have increasingly siphoned cash off of digital payment networks, stealing hundreds of millions of dollars so far. Not only is the problem hard to contain; new findings show that it's evolving and maturing, with new types of ATM malware on the rise. Researchers at the Kaspersky Security Analyst Summit in Singapore are presenting findings on Wednesday about a new wave of payment system scams.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 11, 2019 • 6min
'Exodus' Spyware Posed as a Legit iOS App
Private companies around the world have evolved a gray industry supplying digital surveillance and hacking tools to governments and local law enforcement. As the once little-known practice has grown, so too has the resulting malware. Researchers have now found that one of these spyware products, which had previously been found on the Google Play Store, also targeted iOS.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 11, 2019 • 8min
A Peek Into the Toolkit of the Dangerous 'Triton' Hackers
When the malware known both as Triton and Trisis came to light in late 2017, it quickly gained a reputation as perhaps the world's most dangerous piece of code: the first ever designed to disable the safety systems that protect industrial facilities from potentially lethal physical accidents. But Triton hackers still have to engage in a far more common forms of hacking to plant that code, in some cases spending close to a year digging their way through IT networks before they reach their targets.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 10, 2019 • 7min
How Android Fought an Epic Botnet—and Won
In March 2017, the Android security team was feeling pleased with itself. The group had detected, analyzed, and neutralized a sophisticated botnet built on tainted apps that all worked together to power ad and SMS fraud. Dubbed "Chamois," the malware family had already cropped up in 2016, and was being distributed both through Google Play and third-party app stores. So the Android team started aggressively flagging and helping to uninstall Chamois until they were sure it was dead.
Learn about your ad choices: dovetail.prx.org/ad-choices

Apr 10, 2019 • 2min
An IOS App That Secretly Spies on You, And More News
Tech news you can use, in two minutes or less: Hackers found their way into Apple's ecosystem, and possibly your phone Cyber criminals have been directing users to download something called Exodus, an app that was actually malware. It allowed access to photos, videos, device IDs, audio recordings, and contacts, potentially tracking a victim's location and listening to their conversations through the microphone.
Learn about your ad choices: dovetail.prx.org/ad-choices


