Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted.

Disentangling cybercrime from cyberespionage....

Up next

Yippee-ki-yay, cybercriminals! [OMITB]

While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cy ...  Show more

And the Breachies go to…

In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet m ...  Show more

Recommended Episodes

NSO Employee Abused Phone Hacking Tech to Target a Love Interest
CYBER

Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ...  Show more

E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
This Week in Startups

0:50 Jason intros Tim Junio
1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform
5:20 Tim explains the Dyn cyber attack
13:20 How many Fortune 500 companies have been blackmailed via cyber at ...
  Show more

How the FBI Ran Its Own Texting App to Catch Criminals
CYBER

It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy ...  Show more