

Security, Spoken
WIRED
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
Episodes
Mentioned books

Dec 18, 2017 • 14min
It's Super Hard to Find Humans in the FCC’s Net Neutrality Comments
The Federal Communications Commissions' public comment period on its plans to repeal net neutrality protections was bombarded with bots, memes, and input from people who don't actually exist. The situation's gotten so bad that FCC Commissioner Jessica Rosenworcel, as well as several members of Congress, including one Republican, have called for the FCC to postpone its December 14 net neutrality vote so that an investigation can take place. The FCC seems unlikely to comply.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 18, 2017 • 7min
The Most Secure Account of All—If You Can Stand It
There was a time when high-status people signaled their worth with an ostentatious key fob for an expensive car. Today the keyring of an important person—or at least a paranoid one—might be distinguished by a less obvious marker: a pair of inconspicuous plastic dongles that protect an inbox full of secrets worth keeping.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 15, 2017 • 7min
Smartphone Security 101: The Steps That Matter Most
Hackers can threaten your smartphone in lots of ways, and if you want (or need) to lock it down completely, ironclad protection gets a little complicated. Fortunately, you can take some quick and easy steps to make big improvements to your mobile security. They don’t eliminate all risk, but they’re a solid baseline for any smartphone owner.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 15, 2017 • 8min
How to Rip the Mics Out of Your MacBook and iPhone
Any self-respecting paranoiac long ago taped over the webcam on their laptop—and for good measure, the cameras on their smartphone too. But for those truly concerned that their computers have been hacked and turned into spy tools, the microphones on those devices represent just as much of a security threat as the cameras. They would allow a hacked gadget to bug an entire room.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 14, 2017 • 6min
Extreme Security Measures for the Extra Paranoid
You've covered the basics. You've checked off the more-than-basics. But you still can't fight a nagging feeling that it's not quite enough. At a certain point, if a nation-state wants to compromise your devices or your privacy badly enough, it's going to find a way. You can at least make it harder for them. Here are a few measures designed to do just that. The Air Gap Up There The best way not to get your computer hacked? Don't connect it to any other computer, a practice known as air-gapping.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 14, 2017 • 8min
How to Sweep For Bugs and Hidden Cameras
If you're facing targeted security threats, your problems run deeper than spyware on your devices. You need to check your physical spaces as well—your home, hotel room, office, and so on—for hidden cameras, mics, and other eavesdropping tools that someone may have planted. That means performing regular "technical surveillance counter measures" inspections. In other words? Checking for bugs.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 13, 2017 • 5min
Physical Measures to Amp Up Your Digital Security
When you think about online security, you think digital solutions. Install a reputable antivirus program; use end-to-end encryption. But protection can be physical as well. To up your security game, think outside the code with these IRL reinforcements. Tape Over Your Webcam Mark Zuckerberg does it. So does James Comey. And you, too, should also take this high-reward, low-tech security step.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 13, 2017 • 6min
What to Do if You’re Being Doxed
There are few more toxic practices online than doxing, the distribution of someone's personal information across the internet against their will. It’s all too common, though, deployed regularly and devastatingly as a means to harass and intimidate. The practice is not limited to public—or briefly internet famous—figures either. Anyone can be a victim, at any time.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 12, 2017 • 5min
Resist Phishing Attacks with Three Golden Rules
Like any classic hustle, phishing has staying power. The fake emails and texts that lure you into a digital con—Free cruise! Act now!—may not comprise a very technical hack, but the attackers behind them still put a lot of resources and expertise into giving their cons as much authenticity as possible. That’s what makes it so difficult to protect yourself against phishing. You know not to click links in shady emails. You know to think twice before clicking any link in any email.
Learn about your ad choices: dovetail.prx.org/ad-choices

Dec 12, 2017 • 8min
The A-B-C’s of Keeping Your Kids Safe Online
If the web were an amusement park attraction, you’d have to be 10 feet tall to ride—it's terrifying enough for adults and a funhouse of horrors for kids, from inappropriate content to unkind comment sections to outright predators. And yet! The internet also affords opportunities to learn, to socialize, to create. Besides, at this point trying to keep your kids off of it entirely would be like keeping them away from electricity or indoor plumbing. They’re going to get online.
Learn about your ad choices: dovetail.prx.org/ad-choices


