Get the best podcast recommendations in your inbox every week. 😎
podcast cover
Tech

CYBER

VICE

4 FANS
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters ...Show More
Best
Newest

19:33 | Jun 27th

For decades, experts have known that a simple alphanumeric password isn't enough to secure our identities online, but nothing has changed. In this episode, we’re talking to Wendy Nather, a veteran of the infosec world who knows a thing or two about i...Show More

26:33 | Jun 21st

Last week a video of Mark Zuckerberg emerged online. The video showed Facebook's CEO speaking to the camera in his office, but what he was saying didn’t seem right. This deepfake of Mark Zuckerberg was perhaps the biggest troll of Facebook in recent ...Show More
Get the best podcast recommendations in your inbox every week. 😎

25:30 | Jun 13th

On this week’s episode of CYBER, Joseph Cox and Motherboard EIC Jason Koebler discuss the breach of a Customs and Border Protection contractor that exposed pictures of drivers in Pennsylvania, and the implications for the future of data retention. Th...Show More

24:30 | Jun 7th

On this week’s CYBER host Ben Makuch sat down with Dutch politician Marietje Schaake to discuss the future of cyberweapons, how governmental regulation on spyware should mirror the conventional arms industry, and how Brexit might make Britain a haven...Show More

42:39 | May 30th

Ben Makuch sits down with one of InfoSec’s only true celebrities: The Grugq (who recently added the name ‘Thaddeus’ to his Twitter account, which has over 100,000 followers.) For the uninformed, the Grugq is a South African hacker, security researc...Show More

29:37 | May 21st

In this week's CYBER podcast, we spoke to VICE News reporter William Turnton, who just spent a week in China as part of a bizzarre Huawei junket.

25:53 | May 14th

On this week's episode of CYBER, we spoke to Robert Lee, a former NSA analyst and infrastructure hacking expert, about the state of critical infrastructure, the threats it faces, and why there's still no need to panic.

32:33 | May 7th

Elizabeth Roper, the chief of the cybercrime and identity theft bureau in the Manhattan District Attorney’s office explains how one of the country’s most important prosecutors goes after cybercriminals.

22:25 | Apr 30th

In this week’s CYBER podcast, we spoke about Motherboard’s scoop on a hacker who breached two GPS tracking companies.

1:01:13 | Apr 22nd

In this week's CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, WikiLeaks, Julian Assange, and press freedom in the United States and beyond.

34:46 | Apr 15th

This week, CYBER speaks to Freddy Martinez, one of the members of Unicorn Riot, an activist and media collective that’s been tracking and exposing nazis, racists, and other far-right people on the internet. 

29:45 | Apr 8th

This week, CYBER speaks to Runa Sandvik, the senior director of information security at The New York Times about how she helps the Times journalists stay safe online and help them protect sources. 

20:38 | Apr 1st

On this week’s episode of CYBER, we sat down with Kim Zetter, the legendary cybersecurity reporter and the author of the original news story on the ASUS hack. Zetter walked us through this specific hack, and also told us about previous supply chain a...Show More

34:15 | Mar 27th

This week, CYBER speaks to Oxblood Ruffin, a long-time member of the legendary hacking group Cult of The Dead Cow, or cDc. Ruffin told us about the cDc, its historical importance, and why it's a big deal that a US presidential candidate was once part...Show More

36:32 | Mar 20th

In the lead up to the 2016 US presidential elections, the Russian government allegedly used internet trolls, fake Facebook accounts, and hackers in a coordinated disinformation campaign. What did we learn from it? And how is the world preparing to de...Show More

32:05 | Mar 7th

Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world. Lorenzo Franceschi-Bicchierai talks about his blockbuster investigation, and host Ben Makuc...Show More

24:06 | Mar 4th

Last year, investors poured $5 billion in cybersecurity startups. The whole industry will be worth $170 billion in three years, according to a recent estimate. There’s so many infosec companies it's hard to keep track of them. And yet, are we all rea...Show More

27:57 | Feb 19th

In spring, 2017, a teenager walked up behind a woman leaving the Metro in Northeast Washington DC and put her in a chokehold: "Be quiet," he said. And "delete your iCloud." He grabbed her iPhone 6S and ran away. The iCloud security feature has cut ...Show More

26:23 | Feb 11th

Tracking hacking groups has become a booming business. Dozens of so-called “threat intelligence” companies keep tabs on them and sell subscriptions to feeds where they provide customers with up to date information on what the most advanced cyber crim...Show More

41:30 | Feb 5th

Citizen Lab, a human rights watchdog, tracks governments who do bad things online, and learned that slain journalist Jamal Khashoggi's phone was bugged. Soon after that revelation, Citizen Lab's researchers began getting weird requests to meet in per...Show More

29:26 | Jan 28th

This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly "secure" locations and either steal information or install a tool so that other hackers can exfiltrate d...Show More

42:14 | Jan 24th

Earlier this month, Motherboard sent $300 to a bounty hunter. Within moments, he sent us a Google Maps screenshot with the real-time location data of a phone that we'd asked him to track. Motherboard editor-in-chief Jason Koebler and senior staff wri...Show More

29:48 | Jan 24th

This week, CYBER presents an episode from Malicious Life, one of our favorite hacking podcasts. In this episode, host Ran Levi takes a deep dive into how Ashley Madison, "the dating site for people who want to have an affair," got hacked. More import...Show More

23:12 | Jan 15th

In November, 50,000 printers started suddenly printing a message urging recipients to subscribe to PewDiePie—YouTube’s most popular star ever, with 80 million subscribers. It came with a warning, too: That the printers were hacked because they were d...Show More

24:09 | Jan 4th

A few hours before midnight on New Year’s Eve, the mysterious hacking group the Dark Overlord tweeted a link to an encrypted file: “We'll be providing many answers about 9/11 conspiracies through our 18,000 secret documents leak.” This is just the ...Show More

27:06 | Dec 31st, 2018

CYBER host Ben Makuch and reporter Mack Lamoureux recently spent months embedded on in a secretive social network called “The Base," which is used by American neo-Nazis to organize real-life meetups.

30:28 | Dec 24th, 2018

Fancy Bear, APT10, Lazarus Group, Charming Kitten. These are all the names given to government hacker groups. And if you pay any attention to cybersecurity news you heard about Russian hackers, Chinese hackers, and groups that are usually called AP...Show More

38:29 | Dec 17th, 2018

In the coming weeks, millions of people will get new phones, computers, Amazon Echos, Google Homes, Smart Coffee Makers, and other internet of things devices. All of these things come with their own privacy, surveillance, and hacking risks, but there...Show More

12:46 | Dec 3rd, 2018

Pirates recently dumped Super Smash Bros. Ultimate around two weeks before it was scheduled to hit stores. Motherboard senior staff writer Joseph Cox takes us inside the messy world of Nintendo Switch hacking and piracy. The Switch piracy community—m...Show More

15:29 | Nov 19th, 2018

When you say “election hacking” it means something different than the Kremlin's disinformation campaigns. On this episode of CYBER, we talk about what real election hacking is with Motherboard contributor Kim Zetter, who just wrote a piece for New Yo...Show More

25:39 | Nov 12th, 2018

Imagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone...Show More

01:14 | Nov 8th, 2018

Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. CYBER is coming next week, and will help you understand wh...Show More