4 • 645 Ratings
🗓️ 17 December 2018
⏱️ 39 minutes
🧾️ Download transcript
In the coming weeks, millions of people will get new phones, computers, Amazon Echos, Google Homes, Smart Coffee Makers, and other internet of things devices. All of these things come with their own privacy, surveillance, and hacking risks, but there are steps you can take to minimize your exposure. So we thought it’d be a good time to talk about the Motherboard Guide to Not Getting Hacked, our comprehensive advice on digital security.
We’ve released a new version of it every year for the last three years, adding and changing things as hacking threats and security best practices evolve. This week, Harlo Holmes, director of Newsroom Digital Security at Freedom of the Press Foundation, and Lorenzo Franceschi-Bicchierai, a senior staff writer at Motherboard join editor-in-chief Jason Koebler to talk about the guide.
Hosted on Acast. See acast.com/privacy for more information.
Click on a timestamp to play from that location
0:00.0 | Tann, it's got the code it's going to launch. |
0:11.0 | It's a unit system. |
0:13.0 | I know this. |
0:15.0 | It's all the files of the whole park. |
0:17.0 | It tells her everything. |
0:19.0 | Sir, he's uploading the virus. |
0:21.8 | Eagle won. |
0:22.6 | The package is being delivered. |
0:24.8 | I'm Jason Kebler, editor-in-chief of motherboard, and this is Cyber, our podcast about hacking. |
0:30.7 | I'm filling in this week for Ben Makou. |
0:32.4 | Good morning. |
0:32.9 | Well, as the number of mobile devices explode, so does the number of attacks on our cell phones. |
0:37.2 | It may be much easier to hack into a personal cell phone than you might think. |
0:40.8 | You're going through the methodology of how we hack routers. |
0:43.3 | Amazon device in our Portland home recorded a private conversation and sent that recording to a random contact. |
0:50.9 | In the coming weeks, millions of people will get new phones, computers, Amazon Echoes, Google |
0:56.3 | homes, smart coffee makers, and other Internet of Things devices. All of these gadgets come with |
1:02.1 | their own privacy, surveillance, and hacking risks, but there are steps you can take to minimize |
1:06.4 | your exposure. So we thought it would be a good time to talk about the motherboard guide to not |
1:10.8 | getting hacked, |
1:11.5 | our comprehensive advice on digital security. We've released a new version of the guide every year for |
1:16.6 | the last three years, adding in changing things as hacking threats and security best practices evolve. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from VICE, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of VICE and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.