Gesamtlänge aller Episoden: 1 day 15 hours 20 minutes
In this issue: Russians Hack FBI Comms System On Chinese "Spy Trains" Supply-Chain Security and Trust from the by read by
In this issue: Influence Operations Kill Chain The Myth of Consumer-Grade Security Massive iPhone Hack Targets Uyghurs When Biology Becomes Software from the by read by
In this issue: Palantir's Surveillance Service for Law Enforcement Zoom Vulnerability Attorney General William Barr on Encryption Policy How Privacy Laws Hurt Defendants Brazilian Cell Phone Hack from the by read by
In this issue: Data, Surveillance, and the AI Arms Race Fake News and Pandemics from the by read by
In this issue: First American Financial Corp. Data Records Leak Fraudulent Academic Papers Chinese Military Wants to Develop Custom OS Computers and Video Surveillance from the by read by
In this issue: China Spying on Undersea Internet Cables G7 Comes Out in Favor of Encryption Backdoors Defending Democracies Against Information Attacks Protecting Yourself from Identity Theft First Physical Retaliation for a Cyberattack Leaked NSA...
In this issue: CAs Reissue Over One Million Weak Certificates Zipcar Disruption First Look Media Shutting Down Access to Snowden NSA Archives Mail Fishing TajMahal Spyware New Version of Flame Malware Discovered from the by read by
In this issue: Evaluating the GCHQ Exceptional Access Proposal Public-Interest Tech at the RSA Conference Blockchain and Trust from the by read by
In this issue: New Attack Against Electrum Bitcoin Wallets Machine Learning to Detect Software Vulnerabilities Using a Fake Hand to Defeat Hand-Vein Biometrics from the by read by