Roman Seleznev: Did the Punishment Fit the Crime?
In 2019, Roman Seleznev, a 34 years-old Russian national, was sentenced to 27 years in prison: A sentence that’d make any criminal quiver. Seleznev's deeds had a horrendous effect on the 2.9 milli
Celebrating the End of the Usable Internet
It feels like the old internet is breaking apart and no one is sure where to go. The first three pages of search results on Google are dreck. Reddit is shutting down the third party apps that make it
Hunting Warhead Introduces: The Banned Teacher
From the host that brought you The Band Played On, The Banned Teacher is a new investigation, in a different city. He says it was consensual sex. She says it was rape. He was her music teacher. She wa
The Increasingly Violent Discord Servers Where Kids Flaunt Their Crimes
Discord and Minecraft servers are part of an ecosystem where young people brag about crimes. SIM swapping, extortion, and are all part of an disparate online communit
Big Tech Wants You to Think AI Will Kill Us All
Did you know that AI is set to automate as many as a third of your tasks? In the future we’re all going to be saving a lot of time. That’s as long as no one invents artificial general intelligence tha
AI Lawyers Are Hallucinating + Hacktivists are Ransomwaring + the Apple is Augmenting Reali
In this chat episode we discuss a routine personal injury lawsuit derailed by AI, a new strain of ransomware called Malas Locker being used by hacktivists to make a political statement, rehabilitation
AI Lawyers Are Hallucinating, Hacktivists are Ransomwaring, and the Apple is Augmenting Rea
In this chat episode we discuss a routine personal injury lawsuit derailed by AI, a new strain of ransomware called Malas Locker being used by hacktivists to make a political statement, rehabilitation
The DHS Is Reading Travelers' Posts at the Border
Customs and Border Protection is scanning people’s social media, the feds have arrested some swatters, and the FTC has ordered Ring to cough up a fine. This week on Cyber, Motherboard’s premier cyber
The Cursed Maiden Voyage of the MS Satoshi
The story of the MS Satoshi and the quest to start a libertarian crypto nation on the high seas in the shell of an old cruise ship.Learn more about your ad choices. Visit
AI Can Read Your Dreams and Collect Your Debts. What’s Next?
Is there anything artificial intelligence can’t do?Debt collectors want AI to push people into coughing up what’s owed. An AI created photo of an attack on the Pentagon generated a minor panic. There’
CYBER: Crime and Crypto with Cory Doctorow
Crypto and crime, crime and crypto. They go together like spreadsheets and tax evasion. When cryptocurrency hit the scene it was, according to its evangelists, going to usher in a world of decentraliz
Ethical Space Hackers + CryptoProgram + Juice Jacking Revisited.
A chat episode about the world's first ethical satellite hacking exercise, a much deeper look at Juice Jacking and whether (and when) it's actually a thing, and a remarkable crypto themed money making
Ethical Space Hackers, CryptoProgram, and Juice Jacking Revisited.
A chat episode about the world's first ethical satellite hacking exercise, a much deeper look at Juice Jacking and whether (and when) it's actually a thing, and a remarkable crypto themed money making
The Economics Of Cybersecurity
The numbers can’t be any clearer: a DDoS attack costs less than a hundred dollars, while the price tag for mitigating it might reach tens if not hundreds of thousands of dollars. A single well crafted
FakeCalls: the Spam Calls that Really Work [CPRadio]
For all the ridiculous spam calls in the world, but a small percentage of them are actually, legitimately, convincing. According to the Korean government, “voice phishing” compromises nearly 200 Korea
CYBER: Inside the Italian Mafia’s Encrypted Phone of Choice
We talk a lot about encrypted phones on Cyber. Everyone loves a secure communication channel that no one can peer into. But some companies, well, if there’s criminal activity going on they’re gonna se
Apple II and How the Computer Became Personal
If you’re watching or listening to this show you’re probably doing it on a device that owes its very existence to the Apple II. But these days we remember the iPhone, 90s era Windows, and even the Mac
Wondery Presents - Flipping The Bird: Elon vs Twitter
When Elon Musk posted a video of himself arriving at Twitter HQ carrying a white sink along with the message “let that sink in!” it marked the end of a dramatic takeover. Musk had gone from Twitter cr
The Reason You Don’t Have Data Privacy
We’ve all experienced the creepiness of modern data trafficking, but that kind of daily annoyance is the surface of a much bigger issue: Big Tech companies such as Amazon & Microsoft are lobbying poli
Thieves are Stealing Cars Using Old Nokia Phones
It looks like a bluetooth speaker or an old Nokia cellphone. But that’s a disguise. Inside these small devices is everything car thieves need to break into your vehicle. There are telegram channels no
Operation Silent Watch [CPRadio]
In July 2021, several prominent human rights activists in Azerbaijan received the same phishing email that delivered them spyware, capable of causing significant harm to their personal and professiona
How Entire Countries Can Lose the Internet
Disruptions to the world’s internet cables happen more often than you think: Whether it be ship anchors or animals or saboteurs, cut a few wires in the right places and at nearly the speed of light yo
Operation Cookie Monster + The Russian Hackathon VPN + The Mac Bitcoin Whitepaper Mystery
A chat episode about the brilliantly named international operation to take down Genesis Market, an FBI warning against juice jacking, Amnezia the open source VPN that's become a surprise Russian expor
Operation Cookie Monster, The Russian Hackathon VPN, and the Mac Bitcoin Whitepaper Mystery
A chat episode about the brilliantly named international operation to take down Genesis Market, an FBI warning against juice jacking, Amnezia the open source VPN that's become a surprise Russian expor
Someone Is Selling Computer Generated Swatting Services
Automation is making everyone’s lives easier, including people who call in fake bomb threats on crowded public locations. We live in a world where pranksters and criminals can summon a massive police
What We Know about the Pentagon Leaks
Top Secret classified Pentagon documents leaked on a Minecraft Discord server. The pages of documents contain sensitive information about troop placements in Ukraine, rumors about allies, and—weirdly—
Copyright © poddl.com 2020 - Podcast content © their respective owners, Poddl.com does not rehost any podcast
Twitter: @poddlcom
| Reddit: /r/poddl
| Email and DMCA takedown notices: info@etc
| Login
| Sign Up