We’ve all felt helpless as our phone’s battery dwindles in a moment of dire need. 25%...15%... 5%. The panic sets in, and suddenly, any port in the proverbial storm will do. You start outlet hunting and maybe even ask strangers if you can borrow their cable. But have you ever wondered whether every charging station ...
Read Blog
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But as loyal “Hackable?” listeners know, the smarter something is, the more likely it is that it can be hacked. So does that mean that a hacker can interrupt your binge-watching? Or do something worse? On the latest “Hackable?” Geoff sets up his smart ...
Read Blog
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for your keys. But is the signal sent through the air secure? Does every click give hackers a chance to capture your code? During the second season of “Hackable?” white-hat hacker Tim Martin gained keyless entry ...
Read Blog
Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried about is running out of battery at the wrong moment. But do these devices actually have a critical vulnerability? Could cutting the cord allow a hacker to take control of your computer? On the latest ...
Read Blog
While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. Inspired by the efforts of the main character Elliot and his band of hackers, we’ve compromised Wi-FI networks, dropped malicious USB drives, and cracked car key fobs — all legally and with permission, ...
Read Blog
USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer. So If you spot a USB drive sitting on the ground or in your office, should you assume someone lost their files? Or is it a hacker baiting you into compromising your computer and network? ...
Read Blog
“Hackable?” host Geoff Siskind’s son is a huge fan of the world-building computer game Minecraft — and downloads “mods” for it often. These mods are third-party updates that allow players to alter their favorite game. Whether you want to improve the graphics or add your favorite movie character to a game, there’s a mod for ...
Read Blog
Is the Personal Data on Your Smartphone Vulnerable? Listen to Find Out: Used for everything from banking and taking pictures, to navigating, streaming, and connecting, mobile devices are a treasure trove of sensitive personal data. On the latest episode of “Hackable?” the team investigates how secure that data really is by inviting a white-hat to ...
Read Blog