#7: “Did you say washing machine?” (Careem breach & password management)

#7: “Did you say washing machine?” (Careem br...

Up next

#10: “Playing catch-up” (Drones)

Boy, are we glad to be back! Just two of us this week, and we bring you everything drones. Tune in to hear our resident drone expert Sheban break down all you need to know, current & future trends in drone tech and what needs to happen to make drone logistics a mainstream reality ...  Show more

#9: “Genesis” (Retro episode!)

A special episode where the t3chies reminisce about the technologies we grew up with and the early days of the internet. Do people still play with virtual pets? -—- All sounds are used under Fair Use as illustrative of the larger point & fall under the copyright of the owners of ...  Show more

Recommended Episodes

Digging deep on how to get out of password hell with Dashlane
Talking Tech

In part 2 of Jefferson Graham's reports on how to deal with passwords and keep them away from hackers, an extended interview with Emmanuel Schalit, the founder of Dashlane, a password manager. Schalit talks about the best kind of passwords to have, why he believes texting is the ...  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more

Bug bounties: the good and the bad of computer security
The Vergecast

Verge editor-in-chief Nilay Patel talks to founder and CEO of Luta Security Katie Moussouris. Moussouris has a long history in computer security, working at Microsoft and the Department of Defense creating their first bug bounty programs to incentivize catching and reporting secu ...  Show more

IoT devices exposed in peer-to-peer software vulnerability. Car hacking claims. More warnings of possible violence in Sri Lanka. Curating app stores for security. eScooter’s “voices” hacked.
CyberWire Daily

Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility ...  Show more