DiscoverSecurity, Spoken
Security, Spoken
Claim Ownership

Security, Spoken

Author: WIRED

Subscribed: 2,086Played: 90,170
Share

Description

Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
2085 Episodes
Reverse
Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech and politics from the WIRED team. Join host Leah Feiger and a rotation of guests as they guide you through the exciting, challenging, and sometimes entertaining vortex of internet extremism, conspiracies, and disinformation on WIRED Politics Lab.You can find the information needed to lift the fog of disinformation we find ourselves in everyday right on this feed.Listen to WIRED Politics Lab: https://listen.wired.com/politicslab_feeddrop
Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech from the WIRED team.On WIRED's Gadget Lab, you'll find hosts Lauren Goode and Michael Calore tackling the biggest questions in the world of tech with knowledgeable WIRED reporters.You can expect the best of WIRED's breaking news and tech analysis right here in this feed.Listen to WIRED's Gadget Lab: https://listen.wired.com/YDai_aaZ
This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities.
Infostealer malware is swiping millions of passwords, cookies, and search histories. It’s a gold mine for hackers—and a disaster for anyone who becomes a target.
The Garden State has enacted a hefty new tax credit specifically for AI businesses. But tax incentives—particularly around data centers—haven’t always created large numbers of jobs.
Cybersecurity researchers have spotted a 3,000-account network on GitHub that is manipulating the platform and spreading ransomware and info stealers.
Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm's catastrophic software update.
The code, the first of its kind, was used to sabotage a heating utility in Lviv at the coldest point in the year—what appears to be yet another innovation in Russia’s torment of Ukrainian civilians.
The DOD wants to refurbish ICBM silos that give it the ability to end civilization. But these missiles are useless as weapons, and their other main purpose—attracting an enemy’s nuclear strikes—serves no end.
In this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here's what do to when a bad actor lands in your inbox.
US prosecutors have charged Michail Chkhikvishvili, also known as “Commander Butcher,” with a litany of crimes, including alleged attempts to poison Jewish children in NYC.
After the Supreme Court limited the power of federal agencies to craft regulations, it’s likely up to Congress to keep US cybersecurity policy intact.
A hacker group called “NullBulge” says it stole more than a terabyte of Disney’s internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art.
Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security.
A new resolution echoes what 16 members of Congress have already said to the White House: It must do more to free one of the most storied crypto-focused federal agents in history.
The cybercrime boss, who helped lead the prolific Zeus malware gang and was on the FBI’s “most wanted” list for years, has been sentenced to 18 years and ordered to pay more than $73 million.
Google is bringing the password-killing “passkey” tech to its Advanced Protection Program users more than a year after rolling them out broadly.
More than a dozen men threatened, assaulted, tortured, or kidnapped victims in likely the worst-ever crypto-focused serial extortion case of its kind in the US.
The most notorious deepfake sexual abuse website is hosting altered videos originally published as part of the GirlsDoPorn operation. Experts say this new low is only the beginning.
Generative AI is seeping into the core of your phone, but what does that mean for privacy? Here’s how Apple’s unique AI architecture compares to the “hybrid” approach adopted by Samsung and Google.
loading