This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

CYBER

By VICE

Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.

  1. 1.
    How Palantir's Spy Tool for Cops Works07/18/2019
    19:02
  2. 2.
    The Connection Between a Deadly Gunfight and Phone Location Data07/11/2019
    13:18
  3. 3.
    Inside Jigsaw, Google's 'Internet Justice League'07/02/2019
    25:55
  4. 4.
    Is Your Password Secure? Probably Not06/27/2019
    20:45
  5. 5.
    The Zuckerberg Deepfake Heard Around the World06/21/2019
    31:49
  6. 6.
    What Happens When a US Border Protection Contractor Gets Hacked?06/13/2019
    30:46
  7. 7.
    The Politician Fighting The Spyware Industry06/07/2019
    24:31
  8. 8.
    The Grugq05/30/2019
    43:54
  1. 9.
    Who’s Afraid of Huawei? 05/21/2019
    31:47
  2. 10.
    Why There’s No Need to Panic About a ‘Cyber 9/11’05/14/2019
    28:02
  3. 11.
    Manhattan’s District Attorney Explains How She Prosecutes Cybercrime05/07/2019
    34:42
  4. 12.
    How a Hacker Tracked Thousands of Cars and Gained the Ability To Kill Their Engines04/30/2019
    24:34
  5. 13.
    Edward Snowden on Julian Assange, the Mueller Report, and Press Freedom04/22/2019
    1:03:24
  6. 14.
    How ‘Unicorn Riot’ Exposes The Far Right Online04/15/2019
    37:13
  7. 15.
    How the ‘New York Times’ Protects its Journalists From Hackers and Spies04/08/2019
    32:22
  8. 16.
    Why The ASUS Supply Chain Hack Is a Big Deal04/01/2019
    21:50
  9. 17.
    Why Hackers Are Stoked That Beto O’Rourke Was One Of Them03/27/2019
    35:48
  10. 18.
    How Online Disinformation Affects the Real World03/20/2019
    36:32
  11. 19.
    The Prototype iPhones Hackers Use to Research Apple’s Most Sensitive Code03/07/2019
    35:05
  12. 20.
    The Cybersecurity Industrial Complex03/04/2019
    24:06
  13. 21.
    How Hackers Break into iCloud-Locked iPhones02/19/2019
    27:57
  14. 22.
    How Google Tracks Hackers02/11/2019
    26:24
  15. 23.
    The Spyware Sting Operation02/05/2019
    41:30
  16. 24.
    The Penetration Tester01/28/2019
    29:26
  17. 25.
    I Gave a Bounty Hunter $300. Then He Located Our Phone01/24/2019
    44:44
  18. 26.
    [BONUS] Malicious Life: The Ashley Madison Hack01/24/2019
    31:25
  19. 27.
    The PewDiePie Hacks01/15/2019
    23:45
  20. 28.
    The Dark Overlord and the 9/11 Insurance Files Hack01/04/2019
    24:09
  21. 29.
    The Base12/31/2018
    27:07
  22. 30.
    How to Track Government Hackers and APTs12/24/2018
    30:30
  23. 31.
    The Motherboard Guide to Not Getting Hacked12/17/2018
    39:00
  24. 32.
    Inside the Messy World of Nintendo Switch Hacking12/03/2018
    12:46
  25. 33.
    America's Voting Machines Are Vulnerable to Election Hacking11/19/2018
    15:29
  26. 34.
    SIM Hijacking and the Phone Number Ransom11/12/2018
    25:40
  27. 35.
    Introducing CYBER: A Hacking Podcast by MOTHERBOARD11/08/2018
    1:14

Listen to CYBER now.

Listen to CYBER in full in the Spotify app