The Zombies Are Attacking

The Zombies Are Attacking

Up next

Google's AI chief: We're Living in the “Foothills of the Singularity” - Week In Tech

What does it mean to be at the “foothills of the singularity”? That’s how DeepMind CEO Demis Hassabis ended his speech at Google I/O, prompting questions and scratched heads. Oz and Reed Albergotti (Semafor) attempt to dissect the meaning behind Hassabis’s confounding statement. ...  Show more

The ‘Steroid Olympics’ Brought to You By Big Tech - The Story

What if Olympic athletes could use steroids and other performance-enhancing drugs, legally? They can now, at the Enhanced Games. The Enhanced Games take place on May 24th and it’s anyone’s guess what will happen.Unless you’re Chris Gayomali, host of the new podcast SuperHuman, wh ...  Show more

Recommended Episodes

Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
CyberWire Daily

In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ...  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more

CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.
CyberWire Daily

CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 rans ...  Show more

TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
CyberWire Daily

How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ...  Show more