Hackable? show

Hackable?

Summary: We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are. Winner of Best Branded Podcast - 10th Annual Shorty Awards.

Podcasts:

 Gone Phishin’ | File Type: audio/mpeg | Duration: 00:37:01

Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own.

 Porch Piracy | File Type: audio/mpeg | Duration: 00:29:43

The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy.

 Introducing: Malicious Life | File Type: audio/mpeg | Duration: 00:35:21

This week, we’re bringing you a story from our friends over at Malicious Life - a podcast about the history of cybersecurity. If movies have taught us anything, it’s that if you want to rob a bank, you dress up as the cleaning crew. The people behind the huge hack of Target in 2013 must have seen one action film too many, because when they decided to hack one of the biggest retailers in the world, they did it via the HVAC maintenance systems’ computers.

 False Charges | File Type: audio/mpeg | Duration: 00:30:27

It's always stressful when your phone's battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable.

 Who's Watching | File Type: audio/mpeg | Duration: 00:30:13

Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.

 Darknet Diaries Presents: Project Raven | File Type: audio/mpeg | Duration: 01:02:38

Check out this episode from one of our favorite podcasts, “Darknet Diaries”. It’s a fascinating look at how someone becomes a cyber mercenary, and what happens if you push them beyond their moral comfort zone.

 Keyless Ignition | File Type: audio/mpeg | Duration: 00:25:03

Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key.

 MouseJacked | File Type: audio/mpeg | Duration: 00:25:13

Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.

 The Mr. Robot Spectacular | File Type: audio/mpeg | Duration: 00:34:22

While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.

 Dead Drops | File Type: audio/mpeg | Duration: 00:36:59

You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!

 Up Your Game | File Type: audio/mpeg | Duration: 00:31:07

Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.

 Face the Fax | File Type: audio/mpeg | Duration: 00:27:03

All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.

 Malicious Brews | File Type: audio/mpeg | Duration: 00:37:52

Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.

 Phreaks and Geeks | File Type: audio/mpeg | Duration: 00:30:35

From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data.

 The Weakest Link | File Type: audio/mpeg | Duration: 00:31:18

Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual "front door" wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.

Comments

Login or signup comment.