Ranked #1
What Pornhub’s New Rules Could Mean for the Rest of the Internet
What Pornhub’s New Rules Could Mean for the Rest of the Internet
Let’s be real: most people watch it and it’s about as fundamental to Internet culture as Google itself: Porn. And nowada... Read more
25 Feb 2021
•
27mins
Ranked #2
The Hacker In My Ring Camera: A Tale of Trolls And A Podcast
The Hacker In My Ring Camera: A Tale of Trolls And A Podcast
Imagine installing security cameras in your house to protect your family. Then one day those cameras start talking to yo... Read more
19 Dec 2019
•
31mins
Similar Podcasts
Ranked #3
The Private Surveillance System Tracking Cars in America
The Private Surveillance System Tracking Cars in America
In just a few taps and clicks, the system, made by a private company, shows where a car has been seen throughout the U.S... Read more
19 Sep 2019
•
26mins
Ranked #4
Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
In this week's CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, WikiLeaks, Julian Assang... Read more
22 Apr 2019
•
1hr 1min
Ranked #5
How Scary Is Critical Infrastructure Hacking?
How Scary Is Critical Infrastructure Hacking?
Some of the most fascinating hacks are the types that don’t just pwn a shady malware company, the trade secrets of Ameri... Read more
14 Nov 2019
•
35mins
Ranked #6
Iranian Hacker Hysteria
Iranian Hacker Hysteria
If you’re at all plugged into the global news cycle, you’ll know the U.S. assassinated Iran’s General Qassem Soleimani, ... Read more
9 Jan 2020
•
28mins
Ranked #7
How Google Torpedoed A Cybersecurity Rising Star
How Google Torpedoed A Cybersecurity Rising Star
It’s the classic story of a corporate giant swallowing up a darling startup into its ranks and destroying its core busin... Read more
7 Nov 2019
•
33mins
Ranked #8
The Assassination of Blogger Martin Kok
The Assassination of Blogger Martin Kok
The tale started with an encrypted phone company, Morroccan gangsters, the Scottish mafia, and a blogger. It ended with ... Read more
31 Oct 2019
•
27mins
Ranked #9
Girls Do Porn
Girls Do Porn
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have ... Read more
17 Oct 2019
•
26mins
Ranked #10
How Palantir's Spy Tool for Cops Works
How Palantir's Spy Tool for Cops Works
A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and ... Read more
18 Jul 2019
•
19mins
Ranked #11
Re-run: Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
Re-run: Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom
On this week's CYBER we're re-upping our longform interview of none other than Mr. Edward Snowden, a person who might've... Read more
2 Jan 2020
•
1hr 1min
Ranked #12
How Hackers Break into iCloud-Locked iPhones
How Hackers Break into iCloud-Locked iPhones
In spring, 2017, a teenager walked up behind a woman leaving the Metro in Northeast Washington DC and put her in a choke... Read more
19 Feb 2019
•
27mins
Ranked #13
Whatever Happened To Anonymous?
Whatever Happened To Anonymous?
At its height, the hacktivist collective known as Anonymous was the bane of Scientologists, the FBI, CIA, Mastercard, Pa... Read more
16 Jan 2020
•
46mins
Ranked #14
How Google Tracks Hackers
How Google Tracks Hackers
Tracking hacking groups has become a booming business. Dozens of so-called “threat intelligence” companies keep tabs on ... Read more
11 Feb 2019
•
26mins
Ranked #15
The Penetration Tester
The Penetration Tester
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockro... Read more
28 Jan 2019
•
29mins
Ranked #16
Inside Jigsaw, Google's 'Internet Justice League'
Inside Jigsaw, Google's 'Internet Justice League'
For years, Google’s internet freedom moonshot Jigsaw has gotten glowing attention for its ambitious projects. But curren... Read more
2 Jul 2019
•
21mins
Ranked #17
The Motherboard Guide to Not Getting Hacked
The Motherboard Guide to Not Getting Hacked
In the coming weeks, millions of people will get new phones, computers, Amazon Echos, Google Homes, Smart Coffee Makers,... Read more
17 Dec 2018
•
38mins
Ranked #18
Is Your Password Secure? Probably Not
Is Your Password Secure? Probably Not
For decades, experts have known that a simple alphanumeric password isn't enough to secure our identities online, but no... Read more
27 Jun 2019
•
19mins
Ranked #19
I Gave a Bounty Hunter $300. Then He Located Our Phone
I Gave a Bounty Hunter $300. Then He Located Our Phone
Earlier this month, Motherboard sent $300 to a bounty hunter. Within moments, he sent us a Google Maps screenshot with t... Read more
24 Jan 2019
•
42mins
Ranked #20
The Spyware Sting Operation
The Spyware Sting Operation
Citizen Lab, a human rights watchdog, tracks governments who do bad things online, and learned that slain journalist Jam... Read more
5 Feb 2019
•
41mins