In the waning years of the 20th century, amid growing anxieties about the turn of the millennium,...
31:01
In the waning years of the 20th century, amid growing anxieties about the turn of the millennium,...
31:01
In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using...
27:08
The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used...
30:52
In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He...
51:03
For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an...
37:15
SIM Registration: Security, or Surveillance?
Right now, hundreds of thousands of people in the southern African country of Namibia are faced...
31:12
In 2008, The 12 million PCs strong Mariposa Botnet infected almost half of Furture 100 companey -...
44:27
The Real Story of Citibank’s $10M Hack
Valdimir Levin is often presented as "the first online bank robber," and appeares on many lists...
32:48
About a year ago, six academics from Ruhr University Bochum and the CISPA Helmholtz Center for...
30:14
When investigators discovered in 1996 that US military networks were being extensively hacked,...
35:20
In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of...
31:50
By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep...
40:09
NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral...
32:18
Should You Pay Ransomware Attackers? A Game Theory Approach
The FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4...
32:38
Silent Firewalls: The Underrepresentation of Women in Cyber
In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom...
29:57
In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President...
33:33
Can We Stop the AI Cyber Threat?
Much of the cybersecurity software in use today utilizes AI, especially things like spam filters...
26:32
Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic...
39:38
Why aren't there more bug bounty programs?
On the face of it, there's an obvious economic incentive for both vendors and security...
33:54
The constant battle between those who wish to encrypt data and those who wish to break these...
30:44
Devocional 18/04/24
Episodio
I Was Wrong About AppleTV... 📺
Episodio
Паша Техник: Главныk
Episodio
EP 130: Top 5 Mustaches
Episodio