CYBER

CYBER

www.vice.com/en_us/topic/cyber
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporte…


The Internet Vigilante That Hunts Gaming’s Biggest Cheaters
Aug 6 • 37 min
He’s a vigilante that goes by the alias Gamerdoc. He infiltrates secret online chatrooms to hunt down wrongdoing and the dishonest who prey upon and exploit the system. His target you might ask? The many cheating gamers out there who are using flawed code…
Countries Are Trying to Hack Coronavirus Vaccines From Each Other
Jul 30 • 17 min
The US has accused Russia and China of trying to hack research groups that are working on a coronavirus vaccine. Is that a bad thing? See acast.com/privacy for privacy and opt-out information.
How Hackers Took Control of Twitter
Jul 23 • 35 min
Motherboard reporter Lorenzo Franceschi-Bicchierai hosts this special episode of Cyber. He’s joined by Joseph Cox, who reported on the Twitter hack that had the accounts of Elon Musk, Joe Biden, and Apple amongst others tweet out a cryptocurrency scam.…
The Hacker Who’s Hacking Ventilators to Save Lives
Jul 16 • 45 min
It’s a tale as old as our digital era: Tech enthusiasts wanting to repair their devices without the authorization of the company that makes them. Apple, for example, is notoriously awful at allowing users access to easy fixes of iPhones or Macbooks and…
Hit Men, Drug Traffickers: The Criminal Phone Service Hacked By Cops
Jul 9 • 29 min
It’s straight out of a hacking thriller: drug dealers. Murderers. Extortionists. Traffickers. Hit men. All using an encrypted network to openly talk about their illicit trades, amassing millions in messages. Then, like the magical hacks of a CSI cyber…
Is America Still Number One At Hacking?
Jul 2 • 39 min
It used to be that American hackers and the NSA were the unquestionable world’s best. Following the many revelations from the Snowden leaks, it became clear the U.S. government had not only violated the civil liberties of American citizens, but the NSA…
Huawei’s Chief Security Officer on 5G and Government Spying
Jun 25 • 50 min
The US government is in a race with China to provide the world with 5G networks. Some call it the new arms race, as both Washington and Beijing go from country to country trying to negotiate for its companies to provide the future of the internet’s…
The Story of A Robot FBI Agent And Another American Revolution
Jun 18 • 78 min
On CYBER this week, we’re talking about a novel that frightfully depicts a not-so-distant future where FBI agents work with robot partners and terrorists meet up inside video games. See acast.com/privacy for privacy and opt-out information.
Is Anonymous Really Back?
Jun 11 • 31 min
Back in 2011 during Occupy Wall Street protests, a certain hacktivist collective truly came into its own. The years since Anonymous exploded in popularity and even became the constant pop culture reference point to all hacktivism or even, just hackers.…
It’s Now the Military Industrial Complex Versus Protestors
Jun 4 • 23 min
Well, it’s a hell of a time to be alive. After a brutalizing pandemic, fit with stay at home orders and government indecision, something else happened. The cold blooded murder of unarmed black man George Floyd by a white cop in Minneapolis has set off…
The Privacy Concerns Behind App Based Contact Tracing
May 28 • 37 min
If you’ve been listening to the news, chances are you’ve heard about it incessantly: contact tracing. But what is it exactly? And what are the surveillance and privacy issues surrounding it? Will yet another app that tracks your movements really be the…
The FBI Can Now Search Your Browser History
May 21 • 45 min
Since the dawn of the Patriot Act, a sweeping surveillance bill enacted shortly after 9/11, it’s been both the bane of privacy hawks and the favourite tool of the Intelligence Community. But lately, the Senate, courtesy of Mitch McConnell, helped the IC…
The Short And Terrifying History Of Modern Surveillance
May 14 • 41 min
On the show, we talk a lot about the state of Orwellian world we’ve found ourselves in: big data, corporate and governmental surveillance. You know, Big Brother. But where did it come from? What’s it’s historical context? To answer these questions, we…
The Senator Who Believes in UFOs
May 7 • 33 min
In 2017, amidst the backdrop of the Mueller investigation and Russian spy paranoia, the world learned, via a New York Times bombshell, that the Pentagon had a top secret UFO program. The Advanced Aerospace Threat Identification Program, AATIP for short,…
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Apr 30 • 28 min
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on…
Russian Spies And The Media
Apr 23 • 44 min
The DNC hack. It was a tale of espionage and intrigue. But behind closed doors, Russian intelligence knew just how to play the media in a liberal democracy. And that is a tale as old as time. Thomas Rid, a world renowned academic on national security and…
Why the United States Isn’t Ready for Online Voting
Apr 16 • 33 min
The mechanics of voting really hasn’t changed since the dawn of democracy. People line up, mark a ballot for their candidate and then leave. But in today’s pandemic, the lines for the Wisconsin primary illustrated the legitimate dangers of having…
Bonus: The Distance
Apr 10 • 7 min
Hi Cyber listeners! Friendly podcast producer Ricardo here with a new bonus podcast from the Vice Audio team. The Distance features short, first-person stories from all over the world about how the pandemic is changing the way we live. We’re sharing the…
The Cyber Mercenaries Who Can’t Stay Out Of Bad News
Apr 9 • 29 min
It was implicated in the hacking and spying of activists in Mexico. It may have helped the Saudis kill and behead Washington Post journalist Jamal Khashoggi. Now, it’s inserting itself into the pandemic news as if it needed more bad press. NSO Group, the…
Zoom’s Boom In Popularity Reveals Privacy Issues
Apr 2 • 28 min
This time of pandemic and social isolation is introducing a lot of new normals to us all. While we’re all holed up in our apartments, the need to interact with our friends and the outside world hasn’t just suddenly ended. In fact, people are FaceTiming…
How Amazon Has Continued To Exploit Its Workers During the Pandemic
Mar 26 • 29 min
Right now, many people are sitting indoors quarantined from the world, stocked up on supplies and watching way too much Netflix. Some might even feel the impulse to order goods to their doorstep. So they fire up their Amazon Prime accounts and order some…
How Governments Might Use Coronavirus to Chip Away At Our Privacy
Mar 19 • 24 min
Yes, friends, this week’s CYBER podcast was recorded from the comfort of our apartments. Because, well, the global pandemic. Today on the show, we thought it would be important to discuss how coronavirus will affect state and corporate surveillance. Yes,…
This Small Company Has Turned Utah Into a Surveillance Panopticon
Mar 12 • 43 min
It’s cliche to say it, but it’s true, we’re living in a frighteningly similar world to George Orwell’s 1984. Where it’s not just people that are spies, but everything can be a spy. And people are making money off of it to fuel this Big Brother world. It’s…
North Korea’s Hackers Are Still Active, and What Data Clearview AI Has on You
Mar 5 • 29 min
In late 2014, North Korean hackers made their blockbuster debut in popular culture after the infamous Sony hack. It was one of those watershed cybersecurity moments when a hacking story finally dominated news headlines with a made for Hollywood plot: A…
How Cameo’s Private Celebrity Videos Were Open to the World
Feb 27 • 30 min
It used to be that if you wanted to interact with your favourite celebrity you’d have to do elaborate things like camp out near a red carpet in Hollywood, lying in wait, until you finally got the chance to scream-ask Queen Bey for her autograph amongst a…
Jeff Bezos’ Meteoric Rise, and Kickstarter’s Historic New Union
Feb 20 • 42 min
When we think of the titans of industry, we used to think of names like Rockefeller, Carnegie, and Vanderbilt. But today, in 2020, we have new names that dominate the world economy: Zuckerberg, Cook, Musk, and Thiel. Above them stands one man: Jeff Bezos.…
Stealing Luxury Cars Has Never Looked So Easy
Feb 13 • 28 min
Luxury cars, like everything else in this entire world, including sex toys, pacemakers, firearms, the electric grid, and ISIS, can be hacked. But most people aren’t hackers, which is why a device that can automatically hack a keyless entry vehicle by the…
The Truths Behind UFOs, and The App That Blew Up The Iowa Caucus
Feb 6 • 42 min
On this week’s CYBER Cipher, we have Breaking News about the app that delayed the Iowa Caucus results, how it was made, and the company that made it. But first: it’s finally here. And I know it’s slightly off brand, But. I. Do. Not. Care. Because, who…
Drugs, Cannibals, and Identity Theft: The Truth Behind The Dark Web
Jan 30 • 36 min
The Dark Web has been around for as long as the internet has existed, but most people still don’t know what it actually is. From easily obtained illicit drugs to rumors of cannibalism and human trafficking, it’s been difficult for the average person to…
Jeff Bezos Is Hacked and Uber Is Capitalism at its Worst
Jan 23 • 33 min
In a special breaking edition of Cyber Cipher, Joseph Cox sits down with us to go over the alleged hacking of Jeff Bezos’ phone by Saudi Arabia. After the break we have one of Motherboard’s newest reporters on the Uber beat, Edward Ongweso Jr., to tell us…
Whatever Happened To Anonymous?
Jan 16 • 46 min
At its height, the hacktivist collective known as Anonymous was the bane of Scientologists, the FBI, CIA, Mastercard, Paypal, Middle Eastern dictatorships, and in its latest effective iterations, even ISIS. But in recent years, Anonymous has all but…
Iranian Hacker Hysteria
Jan 9 • 28 min
If you’re at all plugged into the global news cycle, you’ll know the U.S. assassinated Iran’s General Qassem Soleimani, a commander in the Islamic Revolutionary Guard Corps (IRGC) and leader of the secretive Quds Force. Since that night, experts have been…
Re-run: Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
Jan 2 • 61 min
On this week’s CYBER we’re re-upping our longform interview of none other than Mr. Edward Snowden, a person who might’ve affected the infosec world more than any singular human over the last decade. We’ll be back next week with a fresh new episode for our…
Trolls, Hackers, Spies: The Cyber Decade
Dec 26, 2019 • 46 min
It occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we’ve done. The real scoops, traffic hogs, and think pieces. But then again, this is the decade that changed infosec. This was the…
The Hacker In My Ring Camera: A Tale of Trolls And A Podcast
Dec 19, 2019 • 31 min
Imagine installing security cameras in your house to protect your family. Then one day those cameras start talking to you. Trolling you, in fact. After last week when the news broke that Amazon’s super sketchy security camera company Ring, had its…
Where Our Cell Phones Go When We Recycle Them
Dec 12, 2019 • 61 min
This week we talk to Adam Minter, author of “Secondhand,” about the end-of-life supply chain for our cell phones, computers, and all the other stuff we keep in our houses. See acast.com/privacy for privacy and opt-out information.
How Big Telcos Just Made Your Phone Easier To Hack
Dec 6, 2019 • 28 min
Researchers learned that telecom companies are implementing the successor to SMS in vulnerable ways, making everyone’s text messages unsafe. See acast.com/privacy for privacy and opt-out information.
The CYBER Cypher EP
Nov 21, 2019 • 15 min
On this week’s episode we introduce the newly named “Cypher” part of the show where we round up the tech stories of the week that we think you need to know. On deck we discuss infamous hacker Phineas Fisher and an actual investigation called: “Who…
How Scary Is Critical Infrastructure Hacking?
Nov 14, 2019 • 35 min
Some of the most fascinating hacks are the types that don’t just pwn a shady malware company, the trade secrets of America or embarass the Democratic National Committee, but the kinds that target water systems, nuclear power plants and the oil and gas…
How Google Torpedoed A Cybersecurity Rising Star
Nov 7, 2019 • 33 min
It’s the classic story of a corporate giant swallowing up a darling startup into its ranks and destroying its core business. Originally a spawn of the Alphabet company—Google’s parent umbrella—Chronicle was a cybersecurity startup considered by many to be…
The Assassination of Blogger Martin Kok
Oct 31, 2019 • 27 min
The tale started with an encrypted phone company, Morroccan gangsters, the Scottish mafia, and a blogger. It ended with an assassination outside of a sex club in Amsterdam. Last week, Motherboard reporter Joseph Cox broke the news that MPC—a Scottish…
Inside the U.S. Cyber Army
Oct 24, 2019 • 49 min
The U.S. military prides itself on being one of the most powerful militaries on the face of the earth. The best trained, the best equipped with the latest wartech, the most mobile, with a power projection around the world. It’s why, sadly, as the Bureau…
Girls Do Porn
Oct 17, 2019 • 26 min
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? See acast.com/privacy for…
How Neo-Nazi Terrorists Are Organizing Online
Oct 10, 2019 • 29 min
Neo-Nazi terrorists are taking a page from ISIS’ playbook and carrying out calculated, horrific, mass casualty attacks all over the world to shock and scare of the public. And they’re taking another tip from the infamous terrorist group: using internet…
Lyft and Uber Are Having a Terrible, Awful, No-Good Time
Oct 4, 2019 • 28 min
The last few months have been decidedly horrible for rideshare apps Uber and Lyft, which were once the darlings of Wall Street investors who contributed billions of dollars in venture capital to help them disrupt an entire industry. Now, there’s trouble…
The Spy Who (Allegedly) Screwed Us
Sep 26, 2019 • 36 min
Catch the rat. Find the mole. It’s the classic scenario of a spy thriller. Recently, a top spy in the Five Eyes collective—the secretive espionage and intel sharing alliance between agencies in the U.S., U.K., Canada, New Zealand and Australia—was caught…
The Private Surveillance System Tracking Cars in America
Sep 19, 2019 • 26 min
In just a few taps and clicks, the system, made by a private company, shows where a car has been seen throughout the U.S. Tipped by a private investigator source, Joseph Cox broke the news that a powerful system used by an industry including repossession…
The Biggest iPhone Hack In History, Explained
Sep 12, 2019 • 26 min
At the end of August, researchers at Google dropped a bombshell: they had discovered malicious websites that they said were indiscriminately spreading iPhone malware for years. At certain points the websites were even using zero day exploits; attacks that…
The Cyberwar In Yemen
Sep 5, 2019 • 24 min
By most accounts, the war in Yemen is a brutal and lethal tragedy of the modern world that has claimed the lives of thousands of people. With the backing of western military industrial power, the Saudi-led coalition has undertaken a relentless bombing…
How to Track Malware
Aug 29, 2019 • 28 min
We’ve all heard of high profile hacks, like Stuxnet which basically took out the Iranian nuclear program, or that time when Seth Rogen’s stoner comedy made North Korea really, really pissed off and they hacked Sony. And the key to all of these hacks is…
Forget Russian Trolls, American Voting Systems Can Be Hacked
Aug 22, 2019 • 24 min
Imagine a world where one of our most critical instruments of democracy, voting systems, are connected to the internet where they are potentially vulnerable to hacking. Well, thanks to the work of Motherboard contributor Kim Zetter, we now know that’s the…
Inside Def Con: World’s Biggest Hacker Gathering
Aug 15, 2019 • 18 min
For over 25 years, hackers, spies, cops, Silicon Valley bros, technologists and even politicians descend upon Las Vegas, Nevada for what’s become the pre-eminent hacker conference in the entire world: Def Con. See acast.com/privacy for privacy and opt-out…
Why The FBI Arrested the Hacker Who Saved the World From WannaCry (with Marcy Wheeler)
Aug 8, 2019 • 18 min
Two years ago, Marcus Hutchins, better known by his hacker name ‘MalwareTech,’ was at the Las Vegas International Airport awaiting his flight back home to the United Kingdom (UK). He was hungover and coming back from Def Con, the biggest hacker conference…
The Phone Farmers Who Fake Netflix Ad Views for Cash
Aug 1, 2019 • 14 min
Did you know you could make money watching Netflix trailers on your phone? Did you know that people have earned close to $2,000 a month programming hundreds of phones to watch Netflix trailers, video game trailers, celebrity gossip shows, and sports? But…
One of the World’s Most Wanted Hackers Speaks
Jul 25, 2019 • 16 min
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world’s most wanted hackers—wanted to make a statement on CYBER to deny he’s an agent of…
How Palantir’s Spy Tool for Cops Works
Jul 18, 2019 • 19 min
A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and a gallivanting billionaire founder with connections to the Trump Administration is set to become one of the biggest IPOs in recent…
The Connection Between a Deadly Gunfight and Phone Location Data
Jul 11, 2019 • 13 min
In the span of six seconds and 20 gunshots and three dead bodies hit the ground of a Nissan dealership in Texas. And somebody was tracking one of their cell phones remotely. See acast.com/privacy for privacy and opt-out information.
Inside Jigsaw, Google’s ‘Internet Justice League’
Jul 2, 2019 • 21 min
For years, Google’s internet freedom moonshot Jigsaw has gotten glowing attention for its ambitious projects. But current and former employees, along with leaked documents and internal messages, reveal a grim reality behind the scenes. Motherboard’s…
Is Your Password Secure? Probably Not
Jun 27, 2019 • 19 min
For decades, experts have known that a simple alphanumeric password isn’t enough to secure our identities online, but nothing has changed. In this episode, we’re talking to Wendy Nather, a veteran of the infosec world who knows a thing or two about…
The Zuckerberg Deepfake Heard Around the World
Jun 21, 2019 • 26 min
Last week a video of Mark Zuckerberg emerged online. The video showed Facebook’s CEO speaking to the camera in his office, but what he was saying didn’t seem right. This deepfake of Mark Zuckerberg was perhaps the biggest troll of Facebook in recent…
What Happens When a US Border Protection Contractor Gets Hacked?
Jun 13, 2019 • 25 min
On this week’s episode of CYBER, Joseph Cox and Motherboard EIC Jason Koebler discuss the breach of a Customs and Border Protection contractor that exposed pictures of drivers in Pennsylvania, and the implications for the future of data retention. This…
The Politician Fighting The Spyware Industry
Jun 7, 2019 • 24 min
On this week’s CYBER host Ben Makuch sat down with Dutch politician Marietje Schaake to discuss the future of cyberweapons, how governmental regulation on spyware should mirror the conventional arms industry, and how Brexit might make Britain a haven for…
The Grugq
May 30, 2019 • 42 min
Ben Makuch sits down with one of InfoSec’s only true celebrities: The Grugq (who recently added the name ‘Thaddeus’ to his Twitter account, which has over 100,000 followers.) For the uninformed, the Grugq is a South African hacker, security research,…
Who’s Afraid of Huawei?
May 21, 2019 • 29 min
In this week’s CYBER podcast, we spoke to VICE News reporter William Turnton, who just spent a week in China as part of a bizzarre Huawei junket. See acast.com/privacy for privacy and opt-out information.
Why There’s No Need to Panic About a ‘Cyber 9/11’
May 14, 2019 • 25 min
On this week’s episode of CYBER, we spoke to Robert Lee, a former NSA analyst and infrastructure hacking expert, about the state of critical infrastructure, the threats it faces, and why there’s still no need to panic. See acast.com/privacy for privacy…
Manhattan’s District Attorney Explains How She Prosecutes Cybercrime
May 7, 2019 • 32 min
Elizabeth Roper, the chief of the cybercrime and identity theft bureau in the Manhattan District Attorney’s office explains how one of the country’s most important prosecutors goes after cybercriminals. See acast.com/privacy for privacy and opt-out…
How a Hacker Tracked Thousands of Cars and Gained the Ability To Kill Their Engines
Apr 30, 2019 • 22 min
In this week’s CYBER podcast, we spoke about Motherboard’s scoop on a hacker who breached two GPS tracking companies. See acast.com/privacy for privacy and opt-out information.
Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
Apr 22, 2019 • 61 min
In this week’s CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, WikiLeaks, Julian Assange, and press freedom in the United States and beyond. See acast.com/privacy for privacy and opt-out information.
How ‘Unicorn Riot’ Exposes The Far Right Online
Apr 15, 2019 • 34 min
This week, CYBER speaks to Freddy Martinez, one of the members of Unicorn Riot, an activist and media collective that’s been tracking and exposing nazis, racists, and other far-right people on the internet. See acast.com/privacy for privacy and opt-out…
How the ‘New York Times’ Protects its Journalists From Hackers and Spies
Apr 8, 2019 • 29 min
This week, CYBER speaks to Runa Sandvik, the senior director of information security at The New York Times about how she helps the Times journalists stay safe online and help them protect sources. See acast.com/privacy for privacy and opt-out information.
Why The ASUS Supply Chain Hack Is a Big Deal
Apr 1, 2019 • 20 min
On this week’s episode of CYBER, we sat down with Kim Zetter, the legendary cybersecurity reporter and the author of the original news story on the ASUS hack. Zetter walked us through this specific hack, and also told us about previous supply chain…
Why Hackers Are Stoked That Beto O’Rourke Was One Of Them
Mar 27, 2019 • 34 min
This week, CYBER speaks to Oxblood Ruffin, a long-time member of the legendary hacking group Cult of The Dead Cow, or cDc. Ruffin told us about the cDc, its historical importance, and why it’s a big deal that a US presidential candidate was once part of…
How Online Disinformation Affects the Real World
Mar 20, 2019 • 36 min
In the lead up to the 2016 US presidential elections, the Russian government allegedly used internet trolls, fake Facebook accounts, and hackers in a coordinated disinformation campaign. What did we learn from it? And how is the world preparing to deal…
The Prototype iPhones Hackers Use to Research Apple’s Most Sensitive Code
Mar 7, 2019 • 32 min
Very few people have heard of them, but “dev-fused” iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world. Lorenzo Franceschi-Bicchierai talks about his blockbuster investigation, and host Ben Makuch…
The Cybersecurity Industrial Complex
Mar 4, 2019 • 24 min
Last year, investors poured $5 billion in cybersecurity startups. The whole industry will be worth $170 billion in three years, according to a recent estimate. There’s so many infosec companies it’s hard to keep track of them. And yet, are we all really…
How Hackers Break into iCloud-Locked iPhones
Feb 19, 2019 • 27 min
In spring, 2017, a teenager walked up behind a woman leaving the Metro in Northeast Washington DC and put her in a chokehold: “Be quiet,” he said. And “delete your iCloud.” He grabbed her iPhone 6S and ran away. The iCloud security feature has cut down on…
How Google Tracks Hackers
Feb 11, 2019 • 26 min
Tracking hacking groups has become a booming business. Dozens of so-called “threat intelligence” companies keep tabs on them and sell subscriptions to feeds where they provide customers with up to date information on what the most advanced cyber criminals…
The Spyware Sting Operation
Feb 5, 2019 • 41 min
Citizen Lab, a human rights watchdog, tracks governments who do bad things online, and learned that slain journalist Jamal Khashoggi’s phone was bugged. Soon after that revelation, Citizen Lab’s researchers began getting weird requests to meet in person…
The Penetration Tester
Jan 28, 2019 • 29 min
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly “secure” locations and either steal information or install a tool so that other hackers can exfiltrate data.…
I Gave a Bounty Hunter $300. Then He Located Our Phone
Jan 24, 2019 • 42 min
Earlier this month, Motherboard sent $300 to a bounty hunter. Within moments, he sent us a Google Maps screenshot with the real-time location data of a phone that we’d asked him to track. Motherboard editor-in-chief Jason Koebler and senior staff writer…
[BONUS] Malicious Life: The Ashley Madison Hack
Jan 24, 2019 • 29 min
This week, CYBER presents an episode from Malicious Life, one of our favorite hacking podcasts. In this episode, host Ran Levi takes a deep dive into how Ashley Madison, “the dating site for people who want to have an affair,” got hacked. More…
The PewDiePie Hacks
Jan 15, 2019 • 23 min
In November, 50,000 printers started suddenly printing a message urging recipients to subscribe to PewDiePie—YouTube’s most popular star ever, with 80 million subscribers. It came with a warning, too: That the printers were hacked because they were…
The Dark Overlord and the 9/11 Insurance Files Hack
Jan 4, 2019 • 24 min
A few hours before midnight on New Year’s Eve, the mysterious hacking group the Dark Overlord tweeted a link to an encrypted file: “We’ll be providing many answers about 9/11 conspiracies through our 18,000 secret documents leak.” This is just the latest…
The Base
Dec 31, 2018 • 27 min
CYBER host Ben Makuch and reporter Mack Lamoureux recently spent months embedded on in a secretive social network called “The Base,” which is used by American neo-Nazis to organize real-life meetups. See acast.com/privacy for privacy and opt-out…
How to Track Government Hackers and APTs
Dec 24, 2018 • 30 min
Fancy Bear, APT10, Lazarus Group, Charming Kitten. These are all the names given to government hacker groups. And if you pay any attention to cybersecurity news you heard about Russian hackers, Chinese hackers, and groups that are usually called…
The Motherboard Guide to Not Getting Hacked
Dec 17, 2018 • 38 min
In the coming weeks, millions of people will get new phones, computers, Amazon Echos, Google Homes, Smart Coffee Makers, and other internet of things devices. All of these things come with their own privacy, surveillance, and hacking risks, but there are…
Inside the Messy World of Nintendo Switch Hacking
Dec 3, 2018 • 12 min
Pirates recently dumped Super Smash Bros. Ultimate around two weeks before it was scheduled to hit stores. Motherboard senior staff writer Joseph Cox takes us inside the messy world of Nintendo Switch hacking and piracy. The Switch piracy community—much…
America’s Voting Machines Are Vulnerable to Election Hacking
Nov 19, 2018 • 15 min
When you say “election hacking” it means something different than the Kremlin’s disinformation campaigns. On this episode of CYBER, we talk about what real election hacking is with Motherboard contributor Kim Zetter, who just wrote a piece for New York…
SIM Hijacking and the Phone Number Ransom
Nov 12, 2018 • 25 min
Imagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone…
Introducing CYBER: A Hacking Podcast by MOTHERBOARD
Nov 8, 2018 • 1 min
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don’t have to. CYBER is coming next week, and will help you understand what’s…