Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy. For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
This week, we’re bringing you a story from our friends over at Malicious Life - a podcast about the history of cybersecurity. If movies have taught us anything, it’s that if you want to rob a bank, you dress up as the cleaning crew. The people behind the huge hack of Target in 2013 must have seen one action film too many, because when they decided to hack one of the biggest retailers in the world, they did it via the HVAC maintenance systems’ computers.
It's always stressful when your phone's battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable.For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
Check out this episode from one of our favorite podcasts, “Darknet Diaries”. It’s a fascinating look at how someone becomes a cyber mercenary, and what happens if you push them beyond their moral comfort zone.
Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key.For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.For more info www.hackablepodcast.comLeave a rating or review in Apple Podcasts so we know what you think.
While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait! For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual "front door" wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet. For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
Smart TVs make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game. For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
This week, we’re featuring an episode of Darknet Diaries: “The Beirut Bank Job.” It tells the true story of Jayson E. Street, a renowned white-hat for hire. He’s scary good at using social engineering to identify security vulnerabilities. Until 1.5 liters of Diet Pepsi got him into trouble in a Beirut bank...
While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT. For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control? For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended? For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.
Alexa Nebula
Is there any news about this show coming back or not
venkat varun
please come back
Danny Buscett
I really liked this podcast any future plans of more episodes???
Rohan Indurkar
is there going to be any new season
Matt McDonald
This episode is misleading. It has nothing to do with hacking your phone with a cable; it's about hacking your computer with a USB cable. If you're going to pose it as hacking your phone, let's stick to that instead of circumventing it and just hacking a computer.