Look for any podcast host, guest or anyone
Showing episodes and shows of

Lorenzo Franceschi-Bicchierai

Shows

SUCkIA - Sem Uso ComercialSUCkIA - Sem Uso ComercialNotícias de 16/07/25 [4 Edição]1~> Baterias de silício-carbono, apesar da alta densidade energética, enfrentam adoção limitada em smartphones devido a regulamentações de 20Wh por célula nos EUA e problemas de expansão e vida útil reduzida. Marcas como Nothing limitam a capacidade por software para mitigar esses desafios.[Ben Schoon - 9to5google.com]2~> Autoridades chinesas utilizam o novo malware Massistant para extrair dados (mensagens, fotos, localização) de telefones Android apreendidos. Desenvolvida pela Xiamen Meiya Pico, a ferramenta exige acesso físico a um dispositivo desbloqueado e, embora deixe rastros, a extração de dados é imediata.[Lorenzo Fran...2025-07-1722 minIn Defence of the Revolution: A Cuba Solidarity PodcastIn Defence of the Revolution: A Cuba Solidarity PodcastWhen All You've Got is Mike HammerSamantha and Cam discuss recent threats to Cubans from Mike Hammer, Chief of Mission of the U.S. Embassy in Havana; the denial of U.S. visas to Cuban athletes; more spurious rumours of Chinese spy bases in Cuba; and new evidence of a Spanish cyberattack on Cuban government institutions. Additional reading:‘Mysterious hacking group Careto was run by the Spanish government, sources say,’ by Lorenzo Franceschi-Bicchierai (Techcrunch): https://techcrunch.com/2025/05/23/mysterious-hacking-group-careto-was-run-by-the-spanish-government-sources-say/‘Collateral Damage: The Environmental Cost of Cuba’s Terrorism Designation,’ by Vinicius Pereira (Wh...2025-06-0455 minYouTube FeedYouTube FeedMicrosoft shuts down SkypeSkype has been shut down by its owner Microsoft today. It comes more than two decades after its inital launch in 2003. Skype was among the most popular chat services across the globe until the rise of Viber, WhatsApp and, later, Zoom. Host Carolyn Beeler speaks with Lorenzo Franceschi-Bicchierai, a senior writer with TechCrunch, about the rise of Skype and why it was it was so innovative at the time of its launch.2025-05-0504 minCyber BriefingCyber BriefingMay 02, 2025 - Cyber Briefing👉 What are the latest cybersecurity alerts, incidents, and news?🚨 #CyberAlertsFBI Warns of Scammers Targeting Employee Self Service Websites to Steal DataSource: FBISecurity Flaw in macOS Lets Hackers Escape Sandbox and Access Sensitive DataSource: Microsoft Threat IntelligenceSophisticated PyPI Attack Uses Gmail SMTP to Deploy Malware and Exfiltrate DataSource: Olivia Brown via SocketMintsLoader Delivers GhostWeaver Malware Through Phishing and ClickFix AttacksSource: Insikt GroupLummaStealer Campaign Uses FakeCAPTCHA to Deliver Malware and Harves...2025-05-0210 minCyber BriefingCyber BriefingApril 18, 2025 - Cyber Briefing👉 What are the latest cybersecurity alerts, incidents, and news?🚨 #CyberAlertsCritical Flaw in Erlang OTP SSH Exposes Devices to Remote Code ExecutionSource: OpenwallXorDDoS Malware Targets Docker Servers in Growing Global DDoS AttacksSource: Joey Chen via Cisco TalosCISA Warns of Active Exploitation of NTLM Vulnerability in Windows SystemsSource: Cybersecurity Infrastructure Security Agency (CISA)CrazyHunter Group Uses GitHub Tools to Target Taiwanese Critical SectorsSource: Maristel Policarpio, Sarah Pearl Camiling, Jacob Santos, Cj Arsley Mateo, Ieriz Nicoll...2025-04-1810 minCyber BriefingCyber BriefingApril 16, 2025 - Cyber Briefing👉 What's trending in cybersecurity today?🚨 #CyberAlertsChinese Hackers Target Linux and macOS Systems Using SNOWLIGHT and VShell RATSource: Alessandra Rizzo via SysdigHackers Exploit Node.js Vulnerabilities to Deliver Malware and Steal Sensitive DataSource: MicrosoftAPT29 Deploys GrapeLoader Malware in European Embassy Phishing CampaignSource: Check Point Malicious PyPI Package Hijacks MEXC Cryptocurrency Orders and Steals TokensSource: Guy Korolevski via JFrogSlow Pisces Targets Crypto Developers with Malware Disguised as Job ChallengesSource...2025-04-1610 minCyber BriefingCyber BriefingMarch 07, 2025 - Cyber Briefing👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlertsEncryptHub Expands Operations with Phishing Attacks and EncryptRAT MalwareSource: KrakenLabsAkira Ransomware Uses Unsecured Webcam to Bypass EDR and Launch AttackSource: S-RMOver 1000 WordPress Sites Compromised by Malicious JavaScript CodeSource: Himanshu Anand via c/sideMalicious Campaign Targets Japanese Organizations with Cobalt Strike ExploitsSource: Chetan Raghuprasad via Cisco TalosElastic Fixes Critical Kibana Flaw That Could Lead to Arbitrary Code ExecutionSo...2025-03-0709 minThe Weekly Snapshot - FinTechThe Weekly Snapshot - FinTechLockBit Ransomware Fallout: Impact on Wise, Affirm, Mercury, and Evolve Bank Customers ExplainedRecent Ransomware Attack on Evolve Bank and Trust Under Investigation by Fintech Companies: Wise, Affirm, Mercury, and others are examining the effects of a LockBit ransomware incident on their customers, as reported by Lorenzo Franceschi-Bicchierai on TechCrunch. Additionally, catch up on top tips for crafting an engaging Fintech resume and a quick review of weekly Fintech news.2024-07-0506 minCyber BriefingCyber BriefingJuly 01, 2024 - Cyber Briefing👉 What's happening in cybersecurity today? 🚨 #CyberAlerts Water Sigbin Exploits Oracle WebLogic Servers with Fileless Cryptocurrency Miners Source: Ahmed Mohamed Ibrahim , Shubham Singh, Sunil Bharti via Trend Micro OpenSSH Vulnerability Exposes Millions to Remote Code Execution Source: Qualys Reserve Bank of India Warns Banks of Rising Cyber Risks and Remediation Tactics Source: The Reserve Bank of India Microsoft Resumes Windows 11 Update While Excluding Virtualization Users Source: Mayank Parmar via Windows Latest Hackers Actively Exploit D-Link...2024-07-0109 minCyber BriefingCyber BriefingJune 20, 2024 - Cyber Briefing👉 What's going on in the cyber world today? 🚨 #CyberAlerts Unpatched Vulnerability Lets Anyone Impersonate Microsoft Corporate Email Accounts Source: Lorenzo Franceschi-Bicchierai via TechCrunch Rust-Based Fickle Stealer Malware Targets Windows Users via Multiple Attack Chain Source: Pei Han Liao via Fortinet New SquidLoader Malware Evades Detection in Phishing Attacks on Chinese Firms Source: Fernando Dominguez via Level Blue Atlassian Fixes Multiple High-Severity Vulnerabilities in Confluence and Jira Source: Atlassian Rogue Raticate Strikes Again Targeting Enterp...2024-06-2008 minCyber BriefingCyber BriefingMay 03, 2024 - Cyber Briefing👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlerts U.S. Warns of North Korean Email Spoofing Threat Source: The National Security Agency (NSA) Dirty Stream Attack Exposes Android App Vulnerabilities Source: Microsoft New Goldoon Botnet Targets Old D-Link Router Flaw for Attacks Source: Cara Lin and Vincent Li via Fortinet CISA, FBI Urge Firms to Eliminate Path Traversal Flaws Source: Cybersecurity Infrastructure Security Agency New Adload Malware Variant Sidesteps Apple’s XProtect...2024-05-0311 minCupertino, podcast sobre AppleCupertino, podcast sobre AppleTodos somos HumanesLa llegada de la primera tienda alternativa y los emuladores de software son un soplo de aire fresco para nuestros iPhone. Nos ha gustado mucho poder probarlos.Matías comparte su experiencia instalando un emulador de Nintendo en su dispositivo. Más allá, vemos un futuro con posibles aplicaciones y usos de las tiendas alternativas, como el contenido adulto, aplicaciones de criptomonedas y clientes de BitTorrent.Los antiguos empleados de Apple protagonizan este episodio, los creadores del Humane AI Pin y los 700 despedidos recientemente por la compañía, Jony Ive y su nueva compañía de IA c...2024-04-2136 minIn the NewsIn the News142: Black Hole Sun ☀️ X-ray Vision 😎 and an Apple TV Moon Landing 🌔Send us a textWatch the video!https://youtu.be/1iEzu71X5U0In the News blog post for April 12, 2024:https://www.iphonejd.com/iphone_jd/2024/04/in-the-news722.html 00:00 Black Hole Sun11:31 Supercuts in Seasons with Xray Vision23:24 Humane AI Pin (aka TNG Communicator Pin)34:28 Zero Day Dollars40:56 Trailer Happy43:40 Jeff’s Security iTip: Lockdown Mode48:41 Bonus Security iTip: Safety Check52:45 Brett’s Security iTip: Lock down info on your Lock ScreenJeff (and son’s) eclipse pictures on MastodonJason Snell...2024-04-1257 minCyber BriefingCyber BriefingMarch 20, 2024 - Cyber Briefing 👉 What's trending in cybersecurity today? 🚨 #CyberAlerts U.S. Federal Trade Commission Warns Against Scammers Impersonating Employees Source :  Jay Mayfield via FTC WordPress Automatic Plugin Vulnerabilities Expose 40k Sites Source :  PatchStack Andariel Group Deploys MeshAgent in Korean Cyber Attacks  Source : Sanseo via Ahnlab New 'Conversation Overflow' Email Attack Bypasses Machine Learning Security Source :  STEPHEN KOWSKI via SlashNext New DoS Attack Threatens Thousands of Systems Source :   EVA MICHELY via CISPA 💥 #CyberIncidents Pokemon Company Resets Passwords Amid Hacking Attempts  ...2024-03-2009 minHackedHackedMission CriticalJordan interviews TechCrunch Senior Writer Lorenzo Franceschi-Bicchierai about a new chapter in crypto in the US; the first criminal charges for hacking a decentralized crypto exchange. Which is maybe the least interesting thing about the story these charges tell. Learn more about your ad choices. Visit podcastchoices.com/adchoices2023-08-0135 minThe TechCrunch PodcastThe TechCrunch PodcastThe hack is coming from inside your phone and other TC newsThis week Darrell talks with Amanda Siberling about how the founder of Spill, a new social app, secured funding after he was laid off from Twitter. And new TC writer Lorenzo Franceschi-Bicchierai talks about his illuminating scoop about a recent Google Fi hack. But first, Darrell goes over some of the top news from the week. Articles from the episode:Three months ago, he was laid off from Twitter. Now, his competing app Spill is fundedGoogle Fi hack victim had Coinbase, 2FA app hijacked by hackersMore from TechCrunchNetflix lists rules and exemptions t...2023-02-0328 minCYBERCYBERUber’s Been Hacked and Sim Swappers Are Getting ViolentGroups on Telegram that used to primarily be interested in taking over people’s phones and online accounts have changed tactics. Now, they’re selling violence. And to cap off the week, a hacker we don’t know much about was able to steal the credentials of an Uber employee and access the company's back end.On this episode of Cyber, Motherboard staff writers Lorenzo Franceschi-Bicchierai and Joseph Cox walk us through the latest in the world of cybersecurity.Stories discussed on this episode:Firebombs and Shootings: The Rise of IRL Ha...2022-09-1631 minCYBERCYBERThis Vigilante Keeps Crypto Safe From Thieves by Hacking it FirstCrypto is the wild west. Decentralized finance is the purview of the rich and the risk-taker. There’s millions to be had, but it’s easy—often too easy—to lose everything. If you read Motherboard you know that big and wild hacks are common. Maiar went offline recently after hackers stole $113 million from it. The Osmosis exchange just lost $5 million to hackers. And those are just the stories Motherboard reported on this week.If you’re an investor, an exchange, or a private holder, who do you turn to when your crypto is being stolen? The author...2022-06-0942 minCYBERCYBERDiscord Is The Center of the Crypto World and That’s a ProblemDiscord. The popular chat app was once the humble home of gamers who were tired of paying for Ventrilo and Teamspeak servers. Now, it’s so much more. The crypto people have come and it doesn’t look like they’re going anywhere.From the Bored Ape Yacht Club to the next alt-coin with no backing, any project related to the blockchain probably has a space on Discord. But Discord was never built to be a place where people gathered together to manifest complex financial schemes and, because of that, it’s rife with scammers, grifters, and hack...2022-05-3133 minCYBERCYBERFacebook Doesn’t Know What It’s Doing With your DataFacebook’s biggest strength is quickly becoming its largest headache. For years, Facebook has survived by tracking every little thing its users do and selling that on to everyone. But now a slew of regulations across the globe are looking to crack down on the social media site and, according to leaked documents, Facebook has no idea how to get compliant. Worse, the social media giant has no idea where any given piece of data goes once it enters its ecosystem.On this episode of Cyber, we sit down with Motherboard Senior Staff Writer Lorenzo Franceschi-Bicchierai to...2022-05-0536 minHackedHackedThe Chicken Drumstick GangThe story of the biggest video game cheating bust in history and the cheater who got away, with Motherboard senior staff writer Lorenzo Franceschi-Bicchierai, who frequently appears on Motherboard's own infosec podcast CYBER.If you like the show and want to make sure we can keep making it, please subscribe, and if you can visit https://www.patreon.com/hackedpodcast and show us some love.Thanks to our sponsor Command Line Heroes. Check out the show right over here -> https://link.chtbl.com/commandlineheroes_cyoa?sid=s9.podcast...2022-03-0141 minCYBERCYBERThe Cyber Front in the War on UkraineThere are a lot of companies out there willing to sell shady customers the tools they need to spy on just about anyone. All over the world software vendors like Hacking Team and NSO Group will help you break into a cellphone or read an email you’re not supposed to. But that might soon be changing.On this episode of Cyber, Motherboard senior staff writer Lorenzo Franceschi-Bicchierai joins host Matthew Gault to talk about spyware vendors. It’s the subject of Lorenzo’s new piece, “The US Crackdown on Spyware Vendors Is Only Beginning.”...2022-02-2437 minTech Won\'t Save UsTech Won't Save UsCringe Raps and $5 Billion in Stolen Bitcoin w/ Lorenzo Franceschi-BicchieraiParis Marx is joined by Lorenzo Franceschi-Bicchierai to discuss the arrest of Ilya Lichtenstein and Heather Morgan for trying to launder the $5 billion in Bitcoin stolen in the 2016 Bitfinex hack, how they were moving the money, how the authorities found them, and what lessons the case might hold.Lorenzo Franceschi-Bicchierai is senior staff writer at Motherboard. Follow Lorenzo on Twitter at @lorenzofb.Tech Won’t Save Us offers a critical perspective on tech, its worldview, and wider society with the goal of inspiring people to demand better tech and a better world. Follow the podcast (@te...2022-02-1745 minCYBERCYBERThe Lingering Mystery of the Rapper Who Allegedly Laundered $1B in BitcoinIn 2016, someone hacked the crypto exchange Bitfinex and made off with 120,000 BTC. At the time, the bitcoins were worth $65 million. Now they’re worth around $5 billion.On February 7, authorities in the U.S. arrested Ilya Lichtenstein and his wife, Heather Morgan. The charge? Allegedly the couple laundered around $1 billion in stolen Bitcoin. As news of the charges spread, journalists began to dig into the couple and discovered that Morgan was extremely online. A wannabe rapper, Morgan has posted dozens of YouTube videos, TikToks, and contributed to Forbes. Here to talk about the hack, the...2022-02-1045 minCYBERCYBERThis Is Why There’s Been So Many NFT and Crypto HacksIt’s been a wild few weeks for crypto and NFTs. The whole market took some hits, but the crypto markets especially have seemed to spiral. At the same time, there’s been so many hacks, stolen Apes, and ransomed tokens that it’s hard to keep track of them all.This week on Cyber, we go through it all. Who lost what and how? Also, what is it about the blockchain that makes it so vulnerable to hacks and schemes?Motherboard senior staff writer Lorenzo Franceschi-Bicchierai and Motherboard Senior Editor Jordan Perason sit do...2022-01-2745 minCYBERCYBERA Brief History of Twitch Getting HackedOn October 6, a massive leak of Twitch data revealed how much cash its biggest streamers made. The leak isn’t the first time Twitch’s security has been called into question and as the fallout from the leak spiraled, Motherboard reporter Lorenzo Franceschi-Bicchierai went looking for an older story, the story of Urgent Pizza. This week on Cyber, Lorenzo tells us the story of the biggest hack in Twitch history. In 2014 unskilled hackers walked right into Twitch’s code and made off with everything. It was right after Amazon had paid nearly $1 billion for the company. Later, Lorenzo breaks down everythin...2021-10-2129 minSecurity NoiseSecurity Noise4.21 - A Route to Failure Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Justin Bollinnger, Carlos Perez, and David Boyd.   Announcements Join the TrustedSec Discord Community TrustedSec is on Discord! Join our server to interact with the security community and the TrustedSec team. Go to discord.gg/trustedsec to join. PentesterLab Giveaway To enter visit https://www.trustedsec.com/podcastgiveaway please submit on or before October 22, 2021 to be eligible.   St...2021-10-0832 minDarknet DiariesDarknet DiariesCyber Presents: How To Not Get Scammed In The Crypto MarketThere is no episode of Darknet Diaries this week. Instead we are going to play an episode from the podcast Cyber, by Vice Motherboard. See you with a new episode next week. Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.  This episode: How To Not Get S...2021-10-0525 minCYBERCYBERApple's Spy in the Jailbreak CommunityDouble agents are a Cold War trope. An American spy has *gasp* secretly been working for the Soviets the whole time. These days, you’re more likely to run into a double agent in the world of corporate information technology. Sometimes hackers are selling company secrets while helping the very corporations they exploit.Andrey Shumeyko was one such double agent. The hacker cruised the digital hangouts of people who bought and sold the secrets of Apple. Facing financial pressure and—to hear them tell it, a sense of guilt—they reached out to Apple.Thin...2021-08-2626 minThe ScoopThe ScoopMore Warzone Cheating Controversy?! - The ScoopThe show where the Ice Cream Team go through all the geeky "need to know" video game news from around the globe every weekday from 10am UK Time, live over on Twitch.tv/IceCreamUploads. Title: Call of Duty: Warzone hackers appear to be boosting high-profile streamers to level 1000 and unlocking all weapon camos Website: Eurogamer Author: Wesley Yin-Poole https://www.eurogamer.net/articles/2021-07-13-call-of-duty-warzone-hackers-appear-to-be-boosting-high-profile-streamers-to-level-1000-and-unlocking-weapon-camos Title: ‘Undetectable’ Console Cheat Shuts Down After Activision Request Website: Vice Author: Lorenzo Franceschi-Bicchierai https://www.vice.com/en/article/m7e5bv/undetectable-console-cheat-shuts-down-after-activision-request Title: After a 6 month absence, Cyberpunk was the best sell...2021-07-141h 14Coffee with a JournalistCoffee with a JournalistLorenzo Franceschi-Bicchierai, ViceOur guest this week is Lorenzo Franceschi-Bicchierai a senior staff writer for Vice Motherboard. Lorenzo covers hacking, information security, and digital rights. Prior to his current role, he was an intern turned reporter at Mashable, and an editorial intern at Wired. During the episode, Lorenzo starts by sharing about the high number of irrelevant emails in his inbox, the growth of the cybersecurity team at Motherboard, answers an audience question, and more.2021-07-0631 minSecurity NoiseSecurity Noise4.11 - A Bountiful Harvest of Exploits SHOW NOTES Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Kelsey Segrue, Justin Bollinger, and David Boyd.   Stories Title: Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment URL: https://securityledger.com/2021/04/deere-john-researcher-warns-ag-giants-site-provides-a-map-to-customers-equipment/ Author: Paul Roberts   Title: D.C. Police Department Victim Of Apparent Ransomware Attack URL: https://www.npr.org/2021/04/27/991116344/d-c-police-department-victim-of-apparent-ransomware-attack Author: Jaclyn Diaz2021-04-3033 minCYBERCYBERInside One of the Biggest Apple Device Hacks EverFor years, Apple has claimed its devices are the most secure in the world, poo-pooing PC and Android devices for being as clean as a public swimming pool. But just this week, Motherboard’s very own Lorenzo Franceschi-Bicchierai reported on what is being described as one of the biggest security flaws of Apple products exploited by hackers ever, and it could have affected you. He’s on the latest episode to talk about this and the year so far in Mac exploits. Hosted on Acast. See acast.com/privacy for more information.2021-04-2933 minSecurity NoiseSecurity Noise4.9 - Message Me that Review SHOW NOTES Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rob Simon, Justin Bollinger and David Boyd .   Stories Title: A Security App’s Fake Reviews Give Us a Window Into ‘App Store Optimization’ URL: https://www.vice.com/en/article/n7vxgd/a-security-apps-fake-reviews-give-us-a-window-into-app-store-optimization Author: Lorenzo Franceschi-Bicchierai   Title: Can We Stop Pretending SMS is Secure Now URL: https://krebsonsecurity.com/2021/03/can-we-stop-pretending-sms-is-secure-now/ Author...2021-03-2626 minInfinitumInfinitumOdma' dođe!Ep 151Miroslav Petrović potvrdio da samo 13in MacBook Escape ima disk koji može da se zameni naknadno.Ivan Dilber:Jel koristio neko vertikalne ergonomske miseve?@applepaydude: YouTube konačno dostupan na srpskom App StoreGoogle Docs, Calendar for iOS updated with Apple's App Privacy labels — MDNMiki pomenuo tutorial o blockhain u 4D-u.Apple Launches Service for Transferring iCloud Photos and Videos to Google Photos — MacRumorsArizona advances bill forcing Apple and Google to allow Fortnite-style alternative payment options — The VergeJack Dors...2021-03-071h 31Digital PlanetDigital PlanetHas tech been compromised in the US Capitol?Following the events at the US Capitol this week, photos have emerged on social media showing protestors in offices where what appear to be emails can be seen on screen. Also with access to these offices, could protestors have downloaded sensitive data or compromised the tech in some way? Some cybersecurity experts are even questioning if the whole IT system should be replaced. Lorenzo Franceschi-Bicchierai from Vice Motherboard explains the possible risks.Internet shutdown costs in 2020 The website Top10VPN has released its annual report into the costs of internet shutdowns in 2020. They’ve found the economic co...2021-01-1241 minCYBERCYBERHow Hackers Took Control of TwitterMotherboard reporter Lorenzo Franceschi-Bicchierai hosts this special episode of Cyber. He's joined by Joseph Cox, who reported on the Twitter hack that had the accounts of Elon Musk, Joe Biden, and Apple amongst others tweet out a cryptocurrency scam. Hosted on Acast. See acast.com/privacy for more information.2020-07-2335 minSecurity NoiseSecurity Noise3.28 - Enterprise GradeWelcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Alex Hamerstone, Rick Yocum, and David Boyd   Stories of Interest Title: Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay URL: https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/ Author: Shaun Nichols and Gareth Corfield   Title: DHS CISA: Companies are getting hacked even after patching Pulse Secure VPNs URL: http...2020-04-2433 minCYBERCYBERWhy the United States Isn't Ready for Online VotingThe mechanics of voting really hasn’t changed since the dawn of democracy. People line up, mark a ballot for their candidate and then leave.But in today’s pandemic, the lines for the Wisconsin primary illustrated the legitimate dangers of having thousands of people line up with one another to vote. Likewise, New York Governor Andrew Cuomo delayed his state’s primaries from April to June for the same reason.All of this forces us to ask the question: In an age where everything is done online, why aren’t we voting from our...2020-04-1633 minCYBERCYBERThe Cyber Mercenaries Who Can’t Stay Out Of Bad NewsIt was implicated in the hacking and spying of activists in Mexico. It may have helped the Saudis kill and behead Washington Post journalist Jamal Khashoggi. Now, it’s inserting itself into the pandemic news as if it needed more bad press.NSO Group, the infamous Israeli spyware company with links to intelligence agencies, developed software tracking coronavirus-infected citizens. But, as our Motherboard reporter Lorenzo Franceschi Bicchierai tells us, that’s likely just a way for it to expand its questionable business. Hosted on Acast. See acast.com/privacy for more information.2020-04-0929 minThe Cyber ChroniclesThe Cyber ChroniclesEpisode One: SIM JackingSIM Jacking is a frequent threat these days, but you can do something about it. *The story found in this episode was unearthed and first relayed by a reporter for VICE named Lorenzo Franceschi-Bicchierai.2019-09-1805 minThe ThreatConnect PodcastThe ThreatConnect PodcastIt's 5-O'SOC Somewhere with ThreatConnect, Episode 2: BlackHat DebriefHear ThreatConnect’s Research team (Marika Chauvin, Kyle Ehmke, and Alex Valdivia) discuss their thoughts, impressions, and what they learned at this year’s Black Hat and DefCon conferences in Las Vegas. Spoiler Alert: below are links to a few of the briefings and other curiosities mentioned by the team!  MITRE ATT&CK: The Play at Home Edition https://www.blackhat.com/us-19/briefings/schedule/?linkId=70782980#mitre-attck-the-play-at-home-edition-15035 Katie Nickels, ATT&CK Threat Intelligence Lead, MITRE and Ryan Kovar, Principal Security Strategist, Splunk Detecting Deep Fakes with Mice https://www.blackhat.com/us-19/brief...2019-08-2030 minCYBERCYBERInside Jigsaw, Google's 'Internet Justice League'For years, Google’s internet freedom moonshot Jigsaw has gotten glowing attention for its ambitious projects. But current and former employees, along with leaked documents and internal messages, reveal a grim reality behind the scenes. Motherboard's Lorenzo Franceschi-Bicchierai tells us about his months-long investigation into Jigsaw and its "toxic" workplace culture. Hosted on Acast. See acast.com/privacy for more information.2019-07-0221 minMOTHERBOARDMOTHERBOARDFacebook VoicemailsSample of voicemails that Lorenzo Franceschi-Bicchierai received when Google was telling users that his number was Facebook's.2019-05-0900 minWhat Next: TBD | Tech, power, and the futureWhat Next: TBD | Tech, power, and the futureUnmasking The Russians Who Hacked The DNCIn this episode April Glaser is joined once again by co-host Siva Vaidhyanathan, director of the Center for Media and Citizenship at the University of Virginia. They start by talking about the Sri Lankan government’s shutdown of Facebook and WhatsApp after the Easter attacks on churches and hotels. Then they talk to Lorenzo Franceschi-Bicchierai, a staff writer for Motherboard and producer for CYBER, a Motherboard podcast about hacking. In their conversation Franceschi-Bicchierai talks about the time he corresponded directly with hackers who infiltrated the servers of the Democratic National Committee. Those hackers initially tried to pass the...2019-04-2434 minThe VICE Guide to Right NowThe VICE Guide to Right NowUnderstanding Julian AssangeOn this episode, we’re talking about Julian Assange’s recent arrest, and sifting through all the news swirling around it with Motherboard Editor-In-Chief Jason Koebler and Motherboard reporter Lorenzo Franceschi-Bicchierai.  See acast.com/privacy for privacy and opt-out information.2019-04-1700 minCYBERCYBERThe Prototype iPhones Hackers Use to Research Apple’s Most Sensitive CodeVery few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world. Lorenzo Franceschi-Bicchierai talks about his blockbuster investigation, and host Ben Makuch talks to someone who sells these prototype phones. Hosted on Acast. See acast.com/privacy for more information.2019-03-0732 minRadio MotherboardRadio Motherboard[Bonus] Introducing CYBER, a Hacking Podcast by MotherboardMotherboard has launched a new podcast, called CYBER. It's available on Apple Podcasts and on whatever app you listen to.Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.  Hosted on Acast. See acast.com/privacy for more information.2019-01-2301 minRadio MotherboardRadio Motherboard[Bonus] Introducing CYBER, a Hacking Podcast by MotherboardMotherboard has launched a new podcast, called CYBER. It's available on Apple Podcasts and on whatever app you listen to.Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.  Hosted on Acast. See acast.com/privacy for more information.2019-01-2301 minCYBERCYBERThe Motherboard Guide to Not Getting HackedIn the coming weeks, millions of people will get new phones, computers, Amazon Echos, Google Homes, Smart Coffee Makers, and other internet of things devices. All of these things come with their own privacy, surveillance, and hacking risks, but there are steps you can take to minimize your exposure. So we thought it’d be a good time to talk about the Motherboard Guide to Not Getting Hacked, our comprehensive advice on digital security.We’ve released a new version of it every year for the last three years, adding and changing things as hacking threats and...2018-12-1738 minThe VICE Guide to Right NowThe VICE Guide to Right NowIntroducing Motherboard's New Hacking Podcast, CYBERCYBER is Motherboard’s first-ever cybersecurity, hacking, and infosec podcast - and you can listen to episode 1 here.Imagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there’s almost nothing you can do to stop...2018-11-2600 minMOTHERBOARDMOTHERBOARDSIM Hijacking and the Phone Number RansomImagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there’s almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch talks to Lorenzo Franceschi-Bicchierai about...2018-11-1225 minCYBERCYBERSIM Hijacking and the Phone Number RansomImagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there’s almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch speaks to Motherboard report...2018-11-1225 minThe VICE Guide to Right NowThe VICE Guide to Right NowWe Reviewed a $100 Counterfeit iPhone XMotherboard Editor-in-Chief Jason Koebler and staff writer Lorenzo Franceschi-Bicchierai disassembled a counterfeit iPhone X that they bought through a colleague in China for $100. Then they asked security researchers to probe it to find out what it is. The verdict is wild.  See acast.com/privacy for privacy and opt-out information.2018-07-2300 minre:publica 18 - Alle Sessionsre:publica 18 - Alle SessionsWhen Spies Come Home: Inside the Consumer Spyware IndustryJoseph Cox, Lorenzo Franceschi-Bicchierai This talk covers two areas: the inner workings of the consumer spyware industry, and how that industry has been repeatedly linked to cases of domestic and sexual violence, rape, and murder. The first is based on a slew of internal spreadsheets, financial documents, customer records, and even live intercepts captured by malware which activist hackers stole and provided to us as journalists. This data shows the popularity of consumer spyware, how some companies explicitly market their products to jealous or paranoid lovers to spy on their spouses, and even some connections to the same companies that...2018-05-0425 minre:publica 18 - Science & Technologyre:publica 18 - Science & TechnologyWhen Spies Come Home: Inside the Consumer Spyware IndustryJoseph Cox, Lorenzo Franceschi-Bicchierai This talk covers two areas: the inner workings of the consumer spyware industry, and how that industry has been repeatedly linked to cases of domestic and sexual violence, rape, and murder. The first is based on a slew of internal spreadsheets, financial documents, customer records, and even live intercepts captured by malware which activist hackers stole and provided to us as journalists. This data shows the popularity of consumer spyware, how some companies explicitly market their products to jealous or paranoid lovers to spy on their spouses, and even some connections to the same companies that...2018-05-0425 minAround The EmpireAround The EmpireEp 44 Mueller Unites American War PartyDan and Joanne talk about the Mueller’s indictment of Russian internet trolls for defrauding the United States and meddling in the 2016 election by placing ads on social media (most of which ran after the election itself). While the indictments themselves seem absurd, they did bring about a significant change. Both the establishment Left and Right are now more united against Russia and around the War Party.   We are independent media and we rely on your contributions. Patreon: patreon.com/aroundtheempire Donations: aroundtheempire.com Find all of our work at our website aroundtheempire.com...2018-02-271h 43Tech Policy LeadersTech Policy LeadersTiffany Cross: How to be Street Smart About Building Your Personal Brand in Washington, D.C. Tiffany Cross (@tifcrossmyheart) is brings 20 years of relationships, outreach, and storytelling to The Beat, Washington's inclusive political pulse.  Having spent significant time working in newsrooms, covering Capitol Hill, managing in-house corporate public affairs, working on campaigns, and navigating communities of color, she brings a unique set of skills that casts a wide net of influence. Understanding the intersection of press, partnerships, politics, and policy, Tiffany has a proven record of excellent relationships in the private and public sectors, media, the entertainment industry, and civic and social justice organizations.  Most recently, Tiffany served as a Senior Ad...2017-01-1748 minRadio MotherboardRadio Motherboard#fsociety Episode 1: How a Motherboarder Became a Writer for Mr. RobotHello, friend. If you’ve been a Radio Motherboard listener, you know that we’re big fans of Mr. Robot, USA’s moody, disorienting hacker drama. In fact, Motherboard and Mr. Robot’s respective moods align so closely that Amy Teitel, a former Motherboard freelancer, is now a staff writer for the show’s second season. We talk to Amy about how she made the shift from security journalism to tv writing, why she thinks Mr. Robot hasn’t gotten hacked, and her brand new play debuting soon off Broadway. This is the first episode of a brand n...2016-07-251h 06Radio MotherboardRadio Motherboard#fsociety Episode 1: How a Motherboarder Became a Writer for Mr. RobotHello, friend. If you’ve been a Radio Motherboard listener, you know that we’re big fans of Mr. Robot, USA’s moody, disorienting hacker drama. In fact, Motherboard and Mr. Robot’s respective moods align so closely that Amy Teitel, a former Motherboard freelancer, is now a staff writer for the show’s second season. We talk to Amy about how she made the shift from security journalism to tv writing, why she thinks Mr. Robot hasn’t gotten hacked, and her brand new play debuting soon off Broadway. This is the first episode of a brand n...2016-07-251h 06Radio MotherboardRadio MotherboardHello WorldRadio Motherboard's Jason Koebler and Lorenzo Franceschi-Bicchierai are going to talk about the real-life hacks that we see in Mr. Robot season two. This is #fsociety, coming your way all summer. Hosted on Acast. See acast.com/privacy for more information.2016-07-1301 minRadio MotherboardRadio MotherboardHello WorldRadio Motherboard's Jason Koebler and Lorenzo Franceschi-Bicchierai are going to talk about the real-life hacks that we see in Mr. Robot season two. This is #fsociety, coming your way all summer. Hosted on Acast. See acast.com/privacy for more information.2016-07-1301 minRadio MotherboardRadio MotherboardWhy Does Facebook Suggest You Friend Your Tinder Matches?When you log into Facebook, you'll see a list of "suggested friends." They're full of people you went to high school with, random colleagues, and a bunch of people that you do sort of know ... but why does Facebook know that you know them?Motherboard contributor Kari Paul talks to us about her investigation into how Facebook and other social networks learn things about you that you've never purposefully given them access to. Short Circuit editor Nicholas Deleon talks to us about watching the Democratic presidential debate in virtual reality, and Lorenzo Franceschi-Bicchierai discusses why 2015-10-1630 minRadio MotherboardRadio MotherboardWhy Does Facebook Suggest You Friend Your Tinder Matches?When you log into Facebook, you'll see a list of "suggested friends." They're full of people you went to high school with, random colleagues, and a bunch of people that you do sort of know ... but why does Facebook know that you know them?Motherboard contributor Kari Paul talks to us about her investigation into how Facebook and other social networks learn things about you that you've never purposefully given them access to. Short Circuit editor Nicholas Deleon talks to us about watching the Democratic presidential debate in virtual reality, and Lorenzo Franceschi-Bicchierai discusses why 2015-10-1630 min