Hackable?

We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are. Winner of Best Branded Podcast - 10th Annual Shorty Awards.

https://hackablepodcast.com

Eine durchschnittliche Folge dieses Podcasts dauert 29m. Bisher sind 38 Folge(n) erschienen. Dies ist ein zweiwöchentlich erscheinender Podcast
subscribe
share



 

recommended podcasts


episode 2: Malicious Brews


Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.


share





 2019-06-04  37m
 
 

episode 1: Phreaks and Geeks


From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data.


share





 2019-05-21  30m
 
 

episode 7: The Weakest Link


Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual "front door" wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.


share





 2019-02-05  31m
 
 

episode 6: Remote Control


Smart TV’s make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle


share





 2019-01-22  33m
 
 

Introducing Darknet Diaries


This week, we’re featuring an episode of Darknet Diaries: “The Beirut Bank Job.” It tells the true story of Jayson E. Street, a renowned white-hat for hire. He’s scary good at using social engineering to identify security vulnerabilities. Until 1.5 liters


share





 2019-01-15  30m
 
 

episode 5: RAT Attack


While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT.


share





 2019-01-08  28m
 
 

episode 4: Flying Blind


There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control?


share





 2018-12-17  28m
 
 

episode 3: Digital Breadcrumbs


From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended?


share





 2018-12-04  26m
 
 

episode 2: Prying Eyes


Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for gr


share





 2018-11-20  28m
 
 

episode 1: Virtually Vulnerable


Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, Geoff heads to the University of New Haven virtual reality research lab to learn if hackers ca


share





 2018-11-06  28m