Security, Spoken

WIRED
undefined
Jul 10, 2017 • 7min

Hack Brief: Hackers Targeted a US Nuclear Plant (But Don't Panic Yet)

As the world watched highly skilled hackers take down power grids in Ukraine twice in two years, cybersecurity analysts reached the growing consensus that Russian hackers may be using the country as a testing ground for attacks they'll someday try on the United States. On Thursday, when news emerged that hackers have indeed been targeting American power plants—including a Kansas nuclear facility—it seemed possible that day had arrived. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 7, 2017 • 6min

North Korea's Latest Missile Launch Hastens the Inevitable

North Korea's successful test of its first intercontinental ballistic missile carries grave geopolitical implications for a vast swath of the world. Although such an achievement seemed improbable not long ago, it was all but inevitable. The Hermit Kingdom tested its first nuclear bomb in 2006 and has spent the past decade steadily improving the rockets needed to lob one at its enemies. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 6, 2017 • 8min

AI Will Make Forging Anything Entirely Too Easy

“Lordy, I hope there are tapes,” said an exasperated James Comey in his testimony before the Senate Intelligence Committee on June 8. Comey’s desire reflects a familiar one for individuals accused of lying when the stakes are high. The former FBI director wished for tapes because, in our society, audio and video recordings serve as a final arbiter of truth. He said, she said always loses to what the tape shows. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 5, 2017 • 6min

Security News This Week: How Shipping Giant Maersk Dealt With a Malware Meltdown

When a piece of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as Petya (or NotPetya or Nyetya) proved especially vicious. It paralyzed thousands of computers, including those of Ukrainian government agencies, transportation infrastructure, and companies, as well as international targets including Danish shipping firm Maersk and US pharmaceutical giant Merck. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 4, 2017 • 7min

Trump Wants All Your Voter Data. What Could Go Wrong?

The private ballot is tradition in the United States. Now, President Trump’s voter fraud commission wants to collect every American’s voting history and make it available to the public—all in the name of “election integrity. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 3, 2017 • 10min

Ukrainians Say Petya Ransomware Hides State-Sponsored Attacks

When a ransomware outbreak exploded from Ukraine across Europe yesterday, disrupting companies, government agencies, and critical infrastructure, it at first appeared to be just another profit-focused cybercriminal scheme---albeit a particularly vicious and damaging one. But its origins in Ukraine raised deeper questions: After all, shadowy hackers have waged a cyberwar there for years, likely at Russia's bidding. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jun 30, 2017 • 7min

The Encryption Debate Should End Right Now

When law enforcement argues it needs a “backdoor” into encryption services, the counterargument has typically been that it would be impossible to limit such access to one person or organization. If you leave a key under the doormat, a seminal 2015 paper argues, a burglar eventually find its. And now recent events suggest an even simpler rebuttal: Why entrust a key to someone who gets robbed frequently? This aptly describe US intelligence services of late. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jun 29, 2017 • 5min

WikiLeaks Dump Reveals a Creepy CIA Location-Tracking Trick

How many people specifically know where you are right now? Some friends and family? Your coworkers, maybe? If you're using a Windows laptop or PC you could add another group to the list: the CIA. New documents released on Wednesday as part of WikiLeaks' series of CIA hacking revelations detail a method the agency uses to geolocate computers, and the people using them. Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jun 28, 2017 • 5min

Petya Ransomware Outbreak Sweeps Europe

Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jun 26, 2017 • 7min

A Diabolical Way of Hacking a Chip With a Wave of Your Hand

Learn about your ad choices: dovetail.prx.org/ad-choices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app