Security, Spoken cover image

Security, Spoken

Latest episodes

undefined
Sep 4, 2024 • 36sec

Introducing WIRED Politics Lab!

Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech and politics from the WIRED team. Join host Leah Feiger and a rotation of guests as they guide you through the exciting, challenging, and sometimes entertaining vortex of internet extremism, conspiracies, and disinformation on WIRED Politics Lab.You can find the information needed to lift the fog of disinformation we find ourselves in everyday right on this feed.Listen to WIRED Politics Lab: https://listen.wired.com/politicslab_feeddrop Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Sep 4, 2024 • 43sec

Introducing WIRED's Gadget Lab!

Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech from the WIRED team.On WIRED's Gadget Lab, you'll find hosts Lauren Goode and Michael Calore tackling the biggest questions in the world of tech with knowledgeable WIRED reporters.You can expect the best of WIRED's breaking news and tech analysis right here in this feed.Listen to WIRED's Gadget Lab: https://listen.wired.com/YDai_aaZ Learn about your ad choices: dovetail.prx.org/ad-choices
undefined
Jul 31, 2024 • 7min

A Senate Bill Would Radically Improve Voting Machine Security

A new legislative proposal aims to radically enhance the security of voting machines in the U.S. by mandating penetration testing. It opens doors for independent researchers to identify vulnerabilities, ultimately aiming to strengthen electoral integrity. The SECURIT Act, part of the Intelligence Authorization Act, focuses on boosting election cybersecurity while addressing foreign interference. Unified efforts between election vendors and security experts are emphasized as critical to safeguarding the electoral process.
undefined
Jul 30, 2024 • 8min

How Infostealers Pillaged the World’s Passwords

Uncover the alarming rise of infostealer malware as it wreaks havoc on personal data security. The discussion highlights how these malicious programs are harvesting millions of passwords, cookies, and even search histories. With hackers increasingly exploiting cloud vulnerabilities, the urgency for robust password protection has never been greater. Learn about the tactics employed by these cybercriminals and the profound implications for both individuals and corporations in this ever-evolving digital landscape.
undefined
Jul 29, 2024 • 8min

New Jersey's $500 Million Bid to Become an AI Epicenter

New Jersey is making headlines with a bold tax credit plan aimed at luring AI companies to its shores. The ambitious initiative could redefine the state's tech landscape, but opinions are divided on its effectiveness. Some skeptics point to past tax breaks that failed to deliver promised job growth. The discussion sheds light on the complexities of economic incentives in the burgeoning AI sector, exploring whether this move can truly transform the state into a technological powerhouse.
undefined
Jul 26, 2024 • 6min

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

A clandestine network on GitHub controlled by Stargazer Goblin is spreading ransomware and info stealers, luring users with popular downloads that actually contain malicious software. The tactics of the hacker 'ghost' network include automated searches for linked accounts, fictitious reviews, and GitHub's countermeasures involving manual reviews and machine learning algorithms.
undefined
Jul 25, 2024 • 4min

Don't Fall for CrowdStrike Outage Scams

Swindlers exploiting chaos post CrowdStrike software update with bogus support sites. Beware of scams, only trust official sources to avoid falling for misinformation.
undefined
Jul 24, 2024 • 8min

How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter

Exploring the Russian-linked malware that disrupted a heating utility in Lviv, affecting 600 buildings in Ukraine during winter. The cyber attack used a new malware called Frosty Goop to target Ukrainian civilians through essential infrastructure.
undefined
Jul 23, 2024 • 9min

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

The podcast delves into the Pentagon's controversial plan to spend $141 billion on upgrading outdated and potentially dangerous ICBM silos. It raises questions about the effectiveness and necessity of these doomsday machines, discussing their role in national defense strategy and the ethical implications of maintaining them.
undefined
Jul 22, 2024 • 8min

From the Archives: How to Spot a Business Email Compromise Scam

Discover how to identify and prevent business email compromise scams, including verifying requests and maintaining clear communication within a company. Be prepared for when a criminal pretends to be your boss or coworker asking for a favor involving money.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode