Harry speaks with Professor Scott Shapiro about his new book, “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.” Shapiro traces five famous and extraordinarily destructive hacks beginning with the Morris worm, an innocent invention shut the internet down in 1988. His accounts illustrate that not all hacks, or hackers, are born alike. Shapiro emphasizes the distinction between downcode events—the actual creation of codes and their likely inevitable vulnerability – and upcode events – roughly the laws, social norms and psychology that make hacking possible. Shapiro is whip-smart and hugely knowledgeable; and it’s a fascinating discussion about a problem that is not going away. – TALKING FEDS PODCAST is a roundtable discussion that brings together prominent former government officials, journalists, and special guests for a dynamic and in-depth analysis of the most pressing questions in law and politics. New episodes every week! Listen wherever you get your podcasts. Apple Podcasts: 🤍podcasts.apple.com/us/podcast/talking-feds/id1456045551 Spotify: 🤍open.spotify.com/show/57MG7RvSRiAfxfpUSQWqWv Make sure to SUBSCRIBE! 🤍🤍youtube.com/🤍TalkingFeds?sub_confirmation=1 FOLLOW US Website: 🤍🤍talkingfeds.com/ Twitter: 🤍twitter.com/talkingfedspod Harry’s Twitter: 🤍twitter.com/harrylitman Instagram: 🤍🤍instagram.com/talkingfedspod/ Facebook: 🤍🤍facebook.com/talkingfeds TikTok: 🤍🤍tiktok.com/🤍talkingfedspod SUBSCRIBE TO OUR NEWSLETTER: 🤍🤍talkingfeds.com/contact BECOME A PATREON MEMBER: 🤍🤍patreon.com/talkingfeds CONTACT US Contact forms: 🤍🤍talkingfeds.com/contact Email: talkingfedspodcast🤍gmail.com
Crimes going on with computer Hacks 💯PROOF💯
Just like everything, it rolls downhill. It's the user that's responsible for security. 😅
What OS Security development has been limited by the government ?
Great Show guys! Glad I stumbled across this channel. Prof Shapiro, I liked your auto safety analogy. But I believe you left out an important detail, The government didn't get involved until activist like Ralph Nader protested. This led to the creation of consumer, product safety groups. It also led to the creation of a new (topic for another show/book) industry, "Lobbyist"
Just bought your book from Audible!
Is the little bird on Prof Shapiro’s shoulder, tweeting speaking points in his ear?
Very informative interview Thanks
Excellent discussion!!! Very informative. Thanks Harry and thanks Professor Shapiro!
As a programmer I can attest to the fact that, when we are creating a product, security is the last thing in our minds. It is always an after thought and thus prone to security attacks.. Coders rarely think of security first. Hopefully this is changing, but right now, it is still the same thing. And we tend to see the security group that audits our code for leaks as enemy rather than protector of our software base.
Great intro for the book! Thanks for bringing us this great discussion.
I wonder if Koch conspired with Putin to bring down the Colonial pipeline to punish the country for congressional investigations of big oil ceo's.
Depending on companies to inform the security departments when they are hacked doesn't keep us safe. We need to change our domestic laws.
ebziciyUxCw&t=22m45s 22:45 nice shoutout to independent bookstores 👏
Thanks. This was quite informative.❤
Someone used my medical record to get narcotics and I found out in 2020 about the hack. I had years of agony and 2 surgeries during the time I was being hacked. I had 500 doctor appointments and was often told by the doctors they could not help me. I begged the doctors to tell me why. I read the CDC guidelines and discovered that the doctors are legislated by the congress to not talk about what they read on the cures data base. I am in a twilight zone. Now I cannot even walk into a doctor's office without having serious PTSD. The pain is so bad I have considered the medically assisted suicide option. I want to live. Please help me.
Thank you Scott and Harry!