Robot as Servant

Robot as Servant

Up next

All Together Now

Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series finale, we tackle vulnerability scans, how sharing information can be a powerful tool against cyber crime, and why it’s more importan ...  Show more

Invisible Intruders

What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion d ...  Show more

Recommended Episodes

Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.
CyberWire Daily

Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator’s book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and ...  Show more

Using bidirectionality override characters to obscure code. [Research Saturday]
CyberWire Daily

Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ...  Show more

Word Power | The Trojan Horse
English Plus

Traverse the timelines, from the cobbled streets of ancient Troy to present-day life strategies, as we unearth the intriguing stories of the Trojan Horse. Delve into tales of ingenuity, surprise, and the undying spirit of mankind.Find the transcript of this episode on https://eng ...  Show more

Daily & Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.
CyberWire Daily

In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a c ...  Show more