Security, Spoken

WIRED
undefined
Jan 4, 2018 • 8min

A Critical Intel Flaw Breaks Basic Security for Most Computers

One of the most basic premises of computer security is isolation: If you run somebody else's sketchy code as an untrusted process on your machine, you should restrict it to its own tightly sealed playpen. Otherwise, it might peer into other processes, or snoop around the computer as a whole. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jan 2, 2018 • 6min

Hacker Lexicon: What Is Sinkholing?

When you have tons of leftovers you put them in Tupperware. When you have an excess of phone calls, you send them to voicemail. And when you have a deluge of junk from a botnet attacking your network, you put all that malicious traffic into a sinkhole. Sinkholing is a technique for manipulating data flow in a network; you redirect traffic from its intended destination to the server of your choosing. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jan 2, 2018 • 15min

The Worst Hacks of 2017

2017 was bananas in lots of ways, and cybersecurity was no exception. Whether critical infrastructure attacks or insecure databases, hacks, breaches, and leaks of unprecedented scale impacted institutions around the world—along with the billions of people who trust them with their data. This list includes incidents disclosed in 2017, but note that some took place earlier. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jan 1, 2018 • 7min

2017 Was a Terrible Year for Internet Freedom

Think of a country that stifles internet freedom. You might first jump to the oppressive regimes of North Korea, China, or Cuba, where internet access is either forbidden or radically restricted. But in fact, according to a recent study by the non-profit Freedom House, the principles of internet freedom are under attack worldwide—including in the United States. And it's only getting worse. Overt government restrictions, after all, aren't the only way to impede internet freedom. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jan 1, 2018 • 6min

The Most-read WIRED Security Stories of 2017

Back in July, WIRED security writer Lily Hay Newman assessed the year in hacks and breaches and found, "the first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. It's only July, and already there's been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 29, 2017 • 8min

Cryptojacking Has Gotten Out of Control

Cryptojacking, which exploded in popularity this fall, has an ostensibly worthy goal: Use an untapped resource to create an alternative revenue stream for games or media sites, and reduce reliance on ads. It works by embedding a JavaScript component in a website that can leverage a visiting device's processing power to mine a cryptocurrency (usually Monero). Each visitor might only do a tiny bit of mining while they're there, every user lending some hash power over time can generate real money. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 28, 2017 • 13min

The Most Dangerous People on the Internet in 2017

Not so long ago, the internet often felt like a fully detached realm of ephemeral fun. Today, we wake up to tweets from a president that seem intended to goad a rogue state into nuclear war. Hackers launch ransomware worms that tear across the globe in a matter of hours, paralyzing massive multinational infrastructure companies. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 27, 2017 • 6min

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

Perhaps you've been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's voice. If so, you haven't necessarily lost your mind. Instead, if you own one of a few models of internet-connected speaker and you've been careless with your network settings, you might be one of thousands of people whose Sonos or Bose devices have been left wide open to audio hijacking by hackers around the world. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 26, 2017 • 9min

Congress Is Debating Warrantless Surveillance in the Dark

In 2013, former National Security Agency contractor Edward Snowden famously brought to light a series of classified US government spying programs. For the first time, the American people learned that the NSA was collecting millions of their phone calls and electronic communications—emails, Facebook messages, texts, browsing histories—all without a warrant. Several of the programs Snowden revealed are authorized under Section 702 of the Foreign Intelligence Surveillance Amendments Act. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 26, 2017 • 10min

Hold North Korea Accountable for WannaCry—And the NSA, Too

Seven months after the WannaCry ransomware ripped across the internet in one of the most damaging hacking operations of all time, the US government has pinned that digital epidemic on North Korea. And while cybersecurity researchers have suspected North Korea's involvement from the start, the Trump administration intends the official charges to carry new diplomatic weight, showing the world that no one can launch reckless cyberattacks with impunity. Learn about your ad choices: dovetail.prx.org/ad-choices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app