Streams

 

 

Hackers And Net Security

Studio 360

Did Seth Rogen Cause the Sony Pictures Cyber Attack?

Thursday, December 04, 2014

North Korea’s regime hates the new Seth Rogen movie. Did they hack Sony Pictures’ computer systems in retaliation?

Comments [2]

On The Media

What is Reddit's Definition of "Personal Info"?

Tuesday, September 02, 2014

Reddit has a hard and fast rule against doxing, but has no problem with the posting stolen nude photos of celebrities
Read More

Comments [1]

On The Media

Anonymous Distances Itself From Member Who Doxed The Wrong Cop

Wednesday, August 20, 2014

Hacker collective Anonymous is distancing itself from a member who posted the name of the wrong police officer in connection with the shooting of Michael Brown.
Read More

Comments [2]

On The Media

Should We Reset Every Password Every Three Months?

Wednesday, May 21, 2014

So WNYC, our parent company and benevolent overlords, has set its IT policy such that we are required to change our passwords every three months. and it drives us nuts. It feels like our internal communications are low-stakes enough and WNYC is a not particularly valuable target. But considering how frequently passwords are compromised these days, maybe this should be applied to all my online accounts, not just my work account.

Read More

Comments [3]

On The Media

Swipe Right For Tinder Users' Exact Location

Thursday, February 20, 2014

Tinder is a dating app that allows users to search for potential matches based on proximity. There's been a lot of talk of the app's popularity with Olympic athletes, which the media seems to be eating up. Yesterday, some security researchers published an article saying that they had figured out how to use Tinder to get users' exact locations.

Read More

Comment

On The Media

Hunter Moore's Indictment Yesterday Was For Hacking, Not For Revenge Porn

Friday, January 24, 2014

Yesterday, revenge porn pioneer and all around gross dude Hunter Moore was indicted by the United States District Court for the Central District of California. But even though California has revenge porn statutes on the books, the bulk of the charges were made under what is known as the Computer Fraud and Abuse Act, or, more colloquially, The Hacker Law.

Read More

Comments [3]

On The Media

From Russia with Love (And Heroin)

Friday, August 02, 2013

Journalist Brian Krebs has been writing about computer security for years, much to the chagrin of the online fraudsters and identity thieves he reports upon. He often finds himself on the receiving end of online attacks from these criminals, but last month, they hatched a much more elaborate plan. Brooke speaks to Krebs about being harassed by Russian cyber criminals.

Shigeto - Ringleader

Comments [1]

On The Media

Assessing the True Threat of Cyberwar

Friday, February 15, 2013

This week, President Obama issued an executive order to strengthen the nation's cyber security against what the government sees as a potentially cataclysmic threat. There has been plenty of drum beating about the threat of cyber warfare, but just how realistic is the threat of an attack that could wreak havoc on our national infrastructure? In a story from August of 2012, On the Media producer Alex Goldman investigates.

 

Jun Miyake - Lillies of the Valley

Comments [3]

New Tech City

New Tech City: Internet Troll or Freedom Fighter?

Tuesday, February 12, 2013

Internet troll Andrew Auernheimer (aka Weev) is facing up to 10 years in federal prison for breaching AT&T's servers.  On this week's New Tech City he explains why he believes his actions helped consumers and upheld American democratic ideals.

Comments [6]

On The Media

Mat Honan's Epic Hacking

Friday, August 10, 2012

In the space of just a few hours, hackers managed to remotely delete Wired reporter Mat Honan's iPad, iPhone, even the hard drive on his computer. Brooke talks to Mat about the surprisingly simple means by which the hackers were able to devastate his online life.

Comments [6]

On The Media

Word Watch: Hacker

Friday, April 13, 2012

The past year we've heard stories about hacking, from The News of the World scandal to the exploits of groups like Anonymous and Lulzsec. But the way the media uses the word 'hack' diverges sharply from the way it's used by actual hackers. On the Media Producer Alex Goldman explores the history of the word and how its meaning has shifted over time in a story that originally aired in September of 2011. 

 

Comments [3]

On The Media

The Gentleman Hacker of 1903

Friday, January 13, 2012

Hackers frequently release insecure information to demonstrate the vulnerability of new technologies. It's a novel approach, but certainly not new. Bob talks to New Scientist's Paul Marks, who tells the story of Nevil Maskelyne, and magician and inventor who, in the interest of exposing the technology's insecurity, hacked Guglielmo Marconi's first demonstration of the wireless telegraph.

Quantic And His Combo Barbaro - Cancao Do Deserto

Comments [2]

On The Media

The Hacker Law

Friday, September 23, 2011

Passed in 1986, the Computer Fraud and Abuse Act was specifically meant to target hacking. But in recent years it's been used to prosecute a much wider swath of behavior, some of which has nothing to do with hacking. Marcia Hofmann of the Electronic Frontier Foundation talks to Brooke about the perils of having such a vague law on the books.

Comment

On The Media

Word Watch: Hacker

Friday, September 23, 2011

This year we've heard stories about hacking, from The News of the World scandal to the exploits of groups like Anonymous and Lulzsec. But the way the media uses the word hack diverges sharply from the way it's used by actual hackers. On the Media Producer Alex Goldman explores the history of the word and how its meaning has shifted over time. 

Comments [4]

The Brian Lehrer Show

The World's "Most Wanted" Hacker

Thursday, August 18, 2011

Kevin Mitnick, famous former hacker turned security consultant and author of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, discusses the vulnerabilities of information security and what it was like being a former hacker.

Comments [3]

The Takeaway

Global Hacking Threats Raise Concern Over U.S. Readiness

Thursday, August 04, 2011

McAfee, a leading cyber security company, issued a report on Wednesday that indirectly points to China as the source of a broad ranging cyber attack on more than 72 organizations throughout the world — including the United Nations, the Olympic movement and the U.S. government. As cyber attacks become a growing threat to the country, the National Security Agency has made a push to employ the best and brightest to combat these attacks. Often, the most qualified people to play defense are often the ones that were once on the offensive — former hackers.

Comment

On The Media

The Hacking "Epidemic" (Cue Jaws Theme)

Friday, June 17, 2011

Internet technologist Bruce Schneier argues that there's been no epidemic of hacking in the last few months, only an epidemic of hacking coverage. The media have gone looking for a pattern, he says, in just the same way they do with shark attacks every summer and are distracting us from the real issues of cyber-security.

Comment