Episodes
Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own.
Published 12/03/19
Published 12/03/19
The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy.
Published 11/19/19
This week, we’re bringing you a story from our friends over at Malicious Life - a podcast about the history of cybersecurity. If movies have taught us anything, it’s that if you want to rob a bank, you dress up as the cleaning crew. The people behind the huge hack of Target in 2013 must have seen one action film too many, because when they decided to hack one of the biggest retailers in the world, they did it via the HVAC maintenance systems’ computers.
Published 11/12/19
It's always stressful when your phone's battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable.
Published 11/05/19
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.
Published 10/22/19
Check out this episode from one of our favorite podcasts, “Darknet Diaries”. It’s a fascinating look at how someone becomes a cyber mercenary, and what happens if you push them beyond their moral comfort zone.
Published 10/15/19
Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key.
Published 10/08/19
Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.
Published 09/24/19
While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.
Published 07/30/19
You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!
Published 07/16/19
Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.
Published 07/02/19
All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.
Published 06/18/19
Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.
Published 06/04/19
From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data.
Published 05/21/19
Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual "front door" wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.
Published 02/05/19
Smart TV’s make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game.
Published 01/22/19
This week, we’re featuring an episode of Darknet Diaries: “The Beirut Bank Job.” It tells the true story of Jayson E. Street, a renowned white-hat for hire. He’s scary good at using social engineering to identify security vulnerabilities. Until 1.5 liters of Diet Pepsi got him into trouble in a Beirut bank...
Published 01/15/19
While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT.
Published 01/08/19
There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control?
Published 12/17/18
From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended?
Published 12/04/18
Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for grabs?
Published 11/20/18
Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, Geoff heads to the University of New Haven virtual reality research lab to learn if hackers can manipulate virtual experiences and create real danger.
Published 11/06/18
In a world where we obsess over staying connected, how can we be sure we’re not leaving ourselves vulnerable? Hackable? gives us a front row seat to explore where we’re susceptible in our daily routines, without even realizing it. From Wi-Fi to webcams and cars to computers, these episodes expose the places hackers may hit, and explain how they get our information. With the FBI putting out a most wanted list solely dedicated to cybercriminals, it’s no argument what a huge issue cybercrime...
Published 11/01/18
The industry of smart baby devices, also known as the "Internet of Toddlers” includes everything from bluetooth pacifiers, internet-enabled monitors, and Wi-Fi onesies. IoT might be best thing to happen to the nursery...but are the potential vulnerabilities worth it? Geoff and Bruce find out just how easily hackers turn these devices into child’s play.
Published 05/29/18