Security, Spoken

WIRED
undefined
Mar 7, 2019 • 7min

The Overlooked Security Threat of Sign-In Kiosks

Daniel Crowley has a long list of software platforms, computers, and Internet of Things devices that he suspects he could hack. As research director of IBM’s offensive security group X-Force Red, Crawley’s job is to follow his intuition about where digital security risks and threats may be lurking, and expose them so they can be fixed. But so many types of computing devices are vulnerable in so many ways, he can’t chase down every lead himself. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 6, 2019 • 5min

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The National Security Agency develops advanced hacking tools in-house for both offense and defense—which you could probably guess even if some notable examples hadn't leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency chose for the first time demonstrated Ghidra, a refined internal tool that it has chosen to open source. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 6, 2019 • 6min

Hack Brief: Google Reveals "BuggyCow," a Rare MacOS Zero-Day Vulnerability

When Google's team of ninja bug-hunting researchers known as Project Zero finds a hackable flaw in somebody else's code, they give the company responsible 90 days to fix it before going public with their findings—patched or not. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 5, 2019 • 5min

States Need Way More Money to Fix Crumbling Voting Machines

The 2018 midterm elections were hardly a glowing reflection on the state of America’s voting technology. Even after Congress set aside millions of dollars for state election infrastructure last year, voters across the country still waited in hours-long lines to cast their ballots on their precincts’ finicky, outdated voting machines. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 4, 2019 • 23min

The Air Force Wants to Give You Its Credit Card

Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics, is something like Q for the Defense Department. He formerly ran the Strategic Capabilities Office, a secretive military skunkworks designed to figure out how to fight future wars. While there, he helped design swarms of tiny unmanned drones; he helped create Project Maven; and he tried to partner the Defense Department with the videogame industry. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 4, 2019 • 6min

FTC Hits TikTok With Record $5.7 Million Fine Over Children’s Privacy

When the lip-syncing app Musical.ly first exploded in popularity nearly four years ago, it was best-known for being a teen sensation. But according to the Federal Trade Commission, the app also illegally collected information from children under the age of 13. The agency announced Wednesday that Musical.ly, now known as TikTok, has agreed to pay a $5. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 1, 2019 • 10min

5 Key Takeaways From Michael Cohen's Testimony to Congress

The bombshells and not-so-surprising surprises, both legal and those just plain embarrassing, come on almost every page of Michael Cohen’s 20 pages of prepared testimony for the House Oversight and Reform Committee. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Mar 1, 2019 • 7min

Trump Can’t Make a North Korea Deal on His Own

A much-touted two-day summit between Donald Trump and North Korean leader Kim Jong-Un failed to reach the finish line Thursday, as talks collapsed and Trump returned to Washington, DC. It’s unclear exactly what unraveled the process; Trump says Kim asked for the lifting of all economic sanctions in exchange for closing the Yongbyon Nuclear Scientific Research Complex, while North Korea reportedly says it had asked for relief on some, but not all. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Feb 28, 2019 • 8min

Michael Cohen's Credibility Has Never Been More Certain

Like many reporters and editors in DC or New York, I have been yelled at by Michael Cohen. It's been almost a rite of passage for anyone writing about Donald Trump over the past decade. There was no bone too small for his long-time lawyer and fixer to pick when it came to published criticisms of the real estate developer. My turn came in June 2012, when he called to yell at me over an item the magazine I then edited had written about Trump's forthcoming hotel on Pennsylvania Avenue. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Feb 27, 2019 • 7min

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Over the past 18 months, revelations about wireless carriers selling smartphone location data to third parties have forced telecoms to promise reform. Worryingly, but perhaps not surprisingly, these user protections have been slow to actually materialize. Even if carriers shape up, though, an attacker can still track a smartphone's location and snoop on phone calls thanks to newly discovered flaws in 4G and even 5G protocols. Learn about your ad choices: dovetail.prx.org/ad-choices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app