One of the World’s Most Wanted Hackers Speaks

One of the World’s Most Wanted Hackers Speaks

Suivant

Why Congress's Fears of Russian Space Nukes Is Political Theatre

Cyber is a show covering a diverse range of topics. We’ve covered everything from crypto to AI to online cults. If it touches technology or online culture, we’ll talk about it. That’s how you get an episode like today’s, which is both a deep dive into professional wrestling’s lat ...  Afficher plus

AI Deepfakes Are Everywhere and Congress is Completely Out of Their Depth

An AI-generated Biden called voters in New Hampshire ahead of the primary and told them to stay home. X locked down the search term “Taylor Swift” after AI-generated nudes of the pop giant flooded the platform. In the wake of both scandals, Congress has struggled with how to figh ...  Afficher plus

Épisodes Recommandés

Curveball proofs-of-concept. CISA warns chemical industry. Military families harassed online. Phishing the UN. Fleeceware in the Play Store. Moscow says there was no Burisma hack.
CyberWire Daily

Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers recei ...  Afficher plus

[Bonus] Introducing CYBER, a Hacking Podcast by Motherboard
Radio Motherboard

Motherboard has launched a new podcast, called CYBER. It's available on Apple Podcasts and on whatever app you listen to.Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the inf ...  Afficher plus

The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch.
CyberWire Daily

An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at h ...  Afficher plus

Bear prints around the Czech Foreign Ministry. Tinker, tailor, soldier, hacker, Humpty Dumpty. Gamer forum breaches. Where in the world is Phineas Phisher?
CyberWire Daily

Bear prints in the Czech foreign ministry. Tinker, tailor, soldier, hacker in Moscow, with a side of Humpty Dumpty. Gamer forum data breaches go undetected for seventeen months. Credential reuse (and the limitations of human memory) are seen as a big threat to security. An IBM st ...  Afficher plus