Wired Security Spoken Edition

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 264:52:56
  • Mas informaciones

Informações:

Sinopsis

Get in-depth coverage of security news and trends at WIRED. A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you cant read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com

Episodios

  • WhatsApp Security Flaws Could Allow Snoops to Slide Into Group Chats

    11/01/2018 Duración: 12min

    When WhatsApp added end-to-end encryption to every conversation for its billion users two years ago, the mobile messaging giant significantly raised the bar for the privacy of digital communications worldwide. But one of the tricky elements of encryption—and even trickier in a group chat setting—has always been ensuring that a secure conversation reaches only the intended audience, rather than some impostor or infiltrator. Learn about your ad choices: dovetail.prx.org/ad-choices

  • How the Government Hides Secret Surveillance Programs

    10/01/2018 Duración: 10min

    In 2013, 18-year-old Tadrae McKenzie robbed a marijuana dealer for $130 worth of pot at a local Taco Bell in Tallahassee, Florida. He and two friends had used BB guns to carry out the crime, which under Florida law constituted robbery with a deadly weapon. McKenzie braced himself to serve the minimum four years in prison. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Meltdown and Spectre Fixes Arrive—But Don't Solve Everything

    10/01/2018

    This week, a pair of vulnerabilities broke basic security for practically all computers. That's not an overstatement. Revelations about Meltdown and Spectre have wreaked digital havoc and left a critical mass of confusion in their wake. Not only are they terrifically complex vulnerabilities, the fixes that do exist have come in patchwork fashion. With most computing devices made in the last two decades at risk, it's worth taking stock of how the clean-up efforts are going. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Pop-Up Mobile Ads Surge as Sites Scramble to Stop Them

    09/01/2018 Duración: 05min

    Ads that automatically redirect you from your daily browsing to a flashy sweepstakes have long been an incredibly annoying facet of the internet. But the versions that have evolved on the mobile web are particularly vexing, because they can trap you with a pop-up "notification" and nowhere to go. And a recent surge in these mobile pop-ups, even on reputable sites, has left people more frustrated than ever. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Triple Meltdown: How So Many Researchers Found a 20-Year-Old Chip Flaw At the Same Time

    09/01/2018 Duración: 17min

    On a cold Sunday early last month in the small Austrian city of Graz, three young researchers sat down in front of the computers in their homes, and tried to break their most fundamental security protections. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Security Roundup: White House Staffers Can't Use Personal Smartphones Anymore

    08/01/2018 Duración: 05min

    It’s not every week that you have a once-in-a-generation security disaster. You know, definitionally. So let’s lead off with Meltdown and Spectre, a pair of attacks that impacts the processors inside most computers today. It’s quite a mess! While technically complicated, Meltdown and Spectre are best understood in terms of scale. Every Intel processor since 1995 is impacted, along with AMD and ARM-based chips. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

    08/01/2018 Duración: 05min

    Learn about your ad choices: dovetail.prx.org/ad-choices

  • What Would Really Happen If Russia Attacked Undersea Internet Cables

    05/01/2018 Duración: 07min

    It might seem like nightmare scenario. A terrorist organization or nefarious nation state decides to derail the global internet by faulting the undersea fiber optic cables that connect the world. These cables, which run along the ocean floor, carry almost all transoceanic digital communication, allowing you to send a Facebook message to a friend in Dubai, or receive an email from your cousin in Australia. Learn about your ad choices: dovetail.prx.org/ad-choices

  • A Dead-Simple Algorithm Reveals the True Toll of Voter ID Laws

    05/01/2018 Duración: 10min

    Ever since the Supreme Court struck down a key part of the Voting Rights Act in 2013, laws requiring voters to show identification when they vote have speckled the nation, popping up in states from Rhode Island to Arizona. Almost as quickly, voting rights advocates have taken states like Texas and Alabama to court, arguing that these laws intentionally discriminate against minority voters. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Get a Password Manager. No More Excuses

    04/01/2018 Duración: 11min

    You're sick of hearing this. The exhortations didn't work in 2013 and they're not going to work now. Sure. But the truth is that you need a password manager, and it's worth it to take the time to set one up. At this point, even their shortcomings prove how vital they are. Learn about your ad choices: dovetail.prx.org/ad-choices

  • A Critical Intel Flaw Breaks Basic Security for Most Computers

    04/01/2018 Duración: 08min

    One of the most basic premises of computer security is isolation: If you run somebody else's sketchy code as an untrusted process on your machine, you should restrict it to its own tightly sealed playpen. Otherwise, it might peer into other processes, or snoop around the computer as a whole. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Hacker Lexicon: What Is Sinkholing?

    02/01/2018 Duración: 06min

    When you have tons of leftovers you put them in Tupperware. When you have an excess of phone calls, you send them to voicemail. And when you have a deluge of junk from a botnet attacking your network, you put all that malicious traffic into a sinkhole. Sinkholing is a technique for manipulating data flow in a network; you redirect traffic from its intended destination to the server of your choosing. Learn about your ad choices: dovetail.prx.org/ad-choices

  • The Worst Hacks of 2017

    02/01/2018 Duración: 14min

    2017 was bananas in lots of ways, and cybersecurity was no exception. Whether critical infrastructure attacks or insecure databases, hacks, breaches, and leaks of unprecedented scale impacted institutions around the world—along with the billions of people who trust them with their data. This list includes incidents disclosed in 2017, but note that some took place earlier. Learn about your ad choices: dovetail.prx.org/ad-choices

  • 2017 Was a Terrible Year for Internet Freedom

    01/01/2018 Duración: 07min

    Think of a country that stifles internet freedom. You might first jump to the oppressive regimes of North Korea, China, or Cuba, where internet access is either forbidden or radically restricted. But in fact, according to a recent study by the non-profit Freedom House, the principles of internet freedom are under attack worldwide—including in the United States. And it's only getting worse. Overt government restrictions, after all, aren't the only way to impede internet freedom. Learn about your ad choices: dovetail.prx.org/ad-choices

  • The Most-read WIRED Security Stories of 2017

    01/01/2018 Duración: 05min

    Back in July, WIRED security writer Lily Hay Newman assessed the year in hacks and breaches and found, "the first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. It's only July, and already there's been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Cryptojacking Has Gotten Out of Control

    29/12/2017 Duración: 07min

    Cryptojacking, which exploded in popularity this fall, has an ostensibly worthy goal: Use an untapped resource to create an alternative revenue stream for games or media sites, and reduce reliance on ads. It works by embedding a JavaScript component in a website that can leverage a visiting device's processing power to mine a cryptocurrency (usually Monero). Each visitor might only do a tiny bit of mining while they're there, every user lending some hash power over time can generate real money. Learn about your ad choices: dovetail.prx.org/ad-choices

  • The Most Dangerous People on the Internet in 2017

    28/12/2017 Duración: 13min

    Not so long ago, the internet often felt like a fully detached realm of ephemeral fun. Today, we wake up to tweets from a president that seem intended to goad a rogue state into nuclear war. Hackers launch ransomware worms that tear across the globe in a matter of hours, paralyzing massive multinational infrastructure companies. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

    27/12/2017 Duración: 05min

    Perhaps you've been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's voice. If so, you haven't necessarily lost your mind. Instead, if you own one of a few models of internet-connected speaker and you've been careless with your network settings, you might be one of thousands of people whose Sonos or Bose devices have been left wide open to audio hijacking by hackers around the world. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Congress Is Debating Warrantless Surveillance in the Dark

    26/12/2017 Duración: 09min

    In 2013, former National Security Agency contractor Edward Snowden famously brought to light a series of classified US government spying programs. For the first time, the American people learned that the NSA was collecting millions of their phone calls and electronic communications—emails, Facebook messages, texts, browsing histories—all without a warrant. Several of the programs Snowden revealed are authorized under Section 702 of the Foreign Intelligence Surveillance Amendments Act. Learn about your ad choices: dovetail.prx.org/ad-choices

  • Hold North Korea Accountable for WannaCry—And the NSA, Too

    26/12/2017 Duración: 09min

    Seven months after the WannaCry ransomware ripped across the internet in one of the most damaging hacking operations of all time, the US government has pinned that digital epidemic on North Korea. And while cybersecurity researchers have suspected North Korea's involvement from the start, the Trump administration intends the official charges to carry new diplomatic weight, showing the world that no one can launch reckless cyberattacks with impunity. Learn about your ad choices: dovetail.prx.org/ad-choices

página 93 de 105