Security, Spoken

WIRED
undefined
Dec 11, 2017 • 6min

Take These 7 Steps Now to Reach Password Perfection

Your passwords are a first line of defense against many internet ills, but few people actually treat them that way: Whether it’s leaning on lazy Star Wars references or repeating across all of your accounts—or both—everyone is guilty of multiple password sins. But while they’re an imperfect security solution to begin with, putting in your best effort will provide an immediate security boost. Don’t think of the following tips as suggestions. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 11, 2017 • 10min

Evidence That Ethiopia Is Spying on Journalists Shows Commercial Spyware Is Out of Control

Throughout 2016 and 2017, individuals in Canada, United States, Germany, Norway, United Kingdom, and numerous other countries began to receive suspicious emails. It wasn’t just common spam. These people were chosen. WIRED OPINION ABOUT Ronald Deibert (@rondeibert) is professor of political science and director of the Citizen Lab at the University of Toronto’s Munk School of Global Affairs. The emails were specifically designed to entice each individual to click a malicious link. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 8, 2017 • 7min

North Korea's Latest Missile Test Was Even Scarier Than It Seemed

When North Korea tested an intercontinental ballistic missile on Tuesday, analysts quickly determined that the weapon would be able to reach any target in the continental United States. Further photo and video analysis since, though, indicate that the missile test represents an even greater advance in capabilities than analysts first thought. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 7, 2017 • 9min

A Tiny New Chip Could Secure the Next Generation of IoT

The Internet of Things security crisis persists, as billions of inadequately secured webcams, refrigerators, and more flood homes around the world. But IoT security researchers at Microsoft Research have their eye on an even larger problem: the billions of gadgets that already run on simple microcontrollers—small, low-power computers on a single chip—that will gradually gain connectivity over the years, exponentially expanding the internet of things population. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 7, 2017 • 8min

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

Pretending to be someone you're not in an email has never been quite hard enough—hence phishing, that eternal scourge of internet security. But now one researcher has dug up a new collection of bugs in email programs that in many cases strip away even the existing, imperfect protections against email impersonation, allowing anyone to undetectably spoof a message with no hint at all to the recipient. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 6, 2017 • 9min

Ghostery Deploys AI in the Fight Against Ad Trackers

Most ad blockers—and there are so, so many of them now—operate roughly the same way, comparing the scripts they encounter on a given site to their whitelist and block list letting the former run and stopping the others. This means they largely share the same drawback, as well; they can’t block what they’ve never seen before. With its latest release, popular ad blocker Ghostery attempts to solve that common dilemma, with a fashionable solution: artificial intelligence. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 6, 2017 • 7min

Phishing Schemes Are Using Encrypted Sites to Seem Legit

A massive effort to encrypt web traffic over the last few years has made green padlocks and "https" addresses increasingly common; more than half the web now uses internet encryption protocols to keep data protected from prying eyes as it travels back and forth between sites and browsers. But as with any sweeping reform, the progress also comes with some new opportunities for fraud. And phishers are loving HTTPS. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 5, 2017 • 6min

Here's the NSA Agent Who Inexplicably Exposed Critical Secrets

A series of leaks has rocked the National Security Agency over the past few years, resulting in digital spy tools strewn across the web that have caused real damage both inside and outside the agency. Many of the breaches have been relatively simple to carry out, often by contractors like the whistleblower Edward Snowden, who employed just a USB drive and some chutzpah. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 5, 2017 • 7min

Security News This Week: A New Bill Wants Jail Time for Execs Who Hide Data Breaches

It's been a rough week for a lot of people, but particularly for Apple. On Tuesday, a security researcher tweeted information about a dire bug in the company's macOS High Sierra operating system that allowed anyone being prompted for system user credentials to bypass the authentication by simply typing "root" as the username and leaving the password blank. Apple rushed to push out a necessary update on Wednesday, but botched it a bit; if you hadn't yet updated to macOS 10.13. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Dec 4, 2017 • 6min

MacOS Update Accidentally Undoes Apple's "Root" Bug Patch

When a company like Apple rushes out a software patch for a critical security bug, it deserves praise for protecting its customers quickly. Except, perhaps, when that patch is so rushed that it's nearly as buggy as the code it was designed to fix. Learn about your ad choices: dovetail.prx.org/ad-choices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app