Gesamtlänge aller Episoden: 8 days 14 hours 11 minutes
On this week's CYBER Cipher, we have Breaking News about the app that delayed the Iowa Caucus results, how it was made, and the company that made it.But first: it’s finally here. And I know it’s slightly off brand, But. I. Do. Not. Care. Becaus...
The Dark Web has been around for as long as the internet has existed, but most people still don't know what it actually is. From easily obtained illicit drugs to rumors of cannibalism and human trafficking, it's been difficult for the average...
In a special breaking edition of Cyber Cipher, Joseph Cox sits down with us to go over the alleged hacking of Jeff Bezos' phone by Saudi Arabia. After the break we have one of Motherboard’s newest reporters on the Uber beat, Edward Ongweso Jr., to...
At its height, the hacktivist collective known as Anonymous was the bane of Scientologists, the FBI, CIA, Mastercard, Paypal, Middle Eastern dictatorships, and in its latest effective iterations, even ISIS.But in recent years, Anonymous has all but ...
If you’re at all plugged into the global news cycle, you’ll know the U.S. assassinated Iran’s General Qassem Soleimani, a commander in the Islamic Revolutionary Guard Corps (IRGC) and leader of the secretive Quds Force.Since that night, experts have b...
On this week's CYBER we're re-upping our longform interview of none other than Mr. Edward Snowden, a person who might've affected the infosec world more than any singular human over the last decade. We'll be back next week with a fr...
It occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we’ve done. The real scoops, traffic hogs, and think pieces. But then again, this is the decade that...
Imagine installing security cameras in your house to protect your family. Then one day those cameras start talking to you. Trolling you, in fact.After last week when the news broke that Amazon’s super sketchy security camera company Ring, had its pr...
This week we talk to Adam Minter, author of “Secondhand,” about the end-of-life supply chain for our cell phones, computers, and all the other stuff we keep in our houses.
Researchers learned that telecom companies are implementing the successor to SMS in vulnerable ways, making everyone’s text messages unsafe.