Security, Spoken

WIRED
undefined
Sep 4, 2024 • 36sec

Introducing WIRED Politics Lab!

Join Leah Feiger and guests as they delve into the chaotic world of internet extremism and disinformation. They explore the impact of conspiracies on society and discuss how to navigate through the fog of misinformation. Expect engaging discussions that combine insights from tech and politics, shedding light on today’s most pressing issues.
undefined
Sep 4, 2024 • 43sec

Introducing WIRED's Gadget Lab!

Dive into the latest tech trends with expert insights from the WIRED team. Discover why the shift from audio articles was made and how it enhances tech discussions. The hosts tackle pressing questions in the gadget world, ensuring you stay updated with breaking news and in-depth analysis. Get ready for a fun exploration of technology that keeps you informed and entertained!
undefined
Jul 31, 2024 • 7min

A Senate Bill Would Radically Improve Voting Machine Security

A new legislative proposal aims to radically enhance the security of voting machines in the U.S. by mandating penetration testing. It opens doors for independent researchers to identify vulnerabilities, ultimately aiming to strengthen electoral integrity. The SECURIT Act, part of the Intelligence Authorization Act, focuses on boosting election cybersecurity while addressing foreign interference. Unified efforts between election vendors and security experts are emphasized as critical to safeguarding the electoral process.
undefined
Jul 30, 2024 • 8min

How Infostealers Pillaged the World’s Passwords

Uncover the alarming rise of infostealer malware as it wreaks havoc on personal data security. The discussion highlights how these malicious programs are harvesting millions of passwords, cookies, and even search histories. With hackers increasingly exploiting cloud vulnerabilities, the urgency for robust password protection has never been greater. Learn about the tactics employed by these cybercriminals and the profound implications for both individuals and corporations in this ever-evolving digital landscape.
undefined
Jul 29, 2024 • 8min

New Jersey's $500 Million Bid to Become an AI Epicenter

New Jersey is making headlines with a bold tax credit plan aimed at luring AI companies to its shores. The ambitious initiative could redefine the state's tech landscape, but opinions are divided on its effectiveness. Some skeptics point to past tax breaks that failed to deliver promised job growth. The discussion sheds light on the complexities of economic incentives in the burgeoning AI sector, exploring whether this move can truly transform the state into a technological powerhouse.
undefined
Jul 26, 2024 • 6min

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

A clandestine network on GitHub controlled by Stargazer Goblin is spreading ransomware and info stealers, luring users with popular downloads that actually contain malicious software. The tactics of the hacker 'ghost' network include automated searches for linked accounts, fictitious reviews, and GitHub's countermeasures involving manual reviews and machine learning algorithms.
undefined
Jul 25, 2024 • 4min

Don't Fall for CrowdStrike Outage Scams

Swindlers exploiting chaos post CrowdStrike software update with bogus support sites. Beware of scams, only trust official sources to avoid falling for misinformation.
undefined
Jul 24, 2024 • 8min

How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter

Exploring the Russian-linked malware that disrupted a heating utility in Lviv, affecting 600 buildings in Ukraine during winter. The cyber attack used a new malware called Frosty Goop to target Ukrainian civilians through essential infrastructure.
undefined
Jul 23, 2024 • 9min

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

The podcast delves into the Pentagon's controversial plan to spend $141 billion on upgrading outdated and potentially dangerous ICBM silos. It raises questions about the effectiveness and necessity of these doomsday machines, discussing their role in national defense strategy and the ethical implications of maintaining them.
undefined
Jul 22, 2024 • 8min

From the Archives: How to Spot a Business Email Compromise Scam

Discover how to identify and prevent business email compromise scams, including verifying requests and maintaining clear communication within a company. Be prepared for when a criminal pretends to be your boss or coworker asking for a favor involving money.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app