Podcasts about cyber wars

  • 53PODCASTS
  • 63EPISODES
  • 45mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 15, 2025LATEST
cyber wars

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber wars

Latest podcast episodes about cyber wars

Darn IT Podcast
The Cyber Wars: The Fall of the BlackLock Empire

Darn IT Podcast

Play Episode Listen Later Apr 15, 2025 7:49


BlackLock, a ruthless ransomware gang, thought they were untouchable—until cybersecurity experts flipped the script. In this episode of Darnley's Cyber Café, Darnley uncovers how a security firm hacked the hackers, dismantling their entire operation from the inside.How did they do it? What critical mistakes led to BlackLock's downfall? And what does this mean for the future of cybercrime?Tune in for a thrilling deep dive into one of the biggest cyber takedowns yetClick here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Wars: How Elite Teams Stay Ahead of the Game | A Conversation with Gary Hayslip | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 4, 2025 15:37


Guest: Gary Hayslip, CISO, SoftBank Investment AdvisorsLinkedIn: https://www.linkedin.com/in/ghayslip/Website: cisodrg.com/biographies/gary-hayslip/Host: Dr. Rebecca WynnOn ITSPmagazine  

3 Takeaways
The CIA's Secrets: Spy Missions, Cyber Wars & Covert Operations (#235)

3 Takeaways

Play Episode Listen Later Feb 4, 2025 23:18


The CIA may not be thrilled with this conversation. Here, Pulitzer Prize-winning author and highly regarded CIA expert Tim Weiner reveals stunning details about the agency's  espionage and covert activities. Learn about the CIA's greatest successes and failures, its best weapon, how China and Russia are spying on the U.S., and much more.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Protecting Innovation: Bestselling Author and CrowdStrike Co-Founder Dmitri Alperovitch on Cyber Wars, China, and Winning the Tech Race

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Jan 6, 2025 53:02


939: Dmitri Alperovitch, co-founder of CrowdStrike and the Silverado Policy Accelerator, joins Technovation to explore the U.S.-China geopolitical rivalry and the rise of a second Cold War. In his latest book, World on the Brink: How America Can Beat China in the Race for the 21st Century, Dmitri outlines the critical need for the U.S. to dominate key technological industries, strengthen alliances, and focus strategically on the Indo-Pacific region to deter China's ambitions. He also discusses parallels between today's geopolitical tensions and the Cold War with the Soviet Union, as well as Taiwan's emergence as a pivotal flashpoint.

Doc Thompson's Daily MoJo
Ep 092524: 21st Century Cyber Wars

Doc Thompson's Daily MoJo

Play Episode Listen Later Sep 25, 2024 120:05


September 25, 2024The Daily Mojo is 2 hours of news, commentary, comedy, and auditory deliciousness.www.TheDailyMojo.com"21st Century Cyber Wars"The P Diddy thing may be the reason for Britney Spears' whole wackadoodle episodes. Congressional staffers are spending too much time on Tinder and Grindr, apparently. Canadians need better cameras. Phil Bell - The Daily Mojo's DC Correspondent - Wanna know why pop culture is important?  HEREOur affiliate partners:Dave and his crew were roasting historically great coffee before some of these newcomers even thought about creating a coffee brand. He's still the best, in our eyes! www.AmericanPrideRoasters.comNothing says “I appreciate you” like an engraved gift or award. Ron and Misty (mostly Misty) have the perfect solution for you if you need a gift idea for family or your employees!www.MoJoLaserPros.comWe love to support Mike Lindell and his company. He's a real patriot and an American success story!https://www.mypillow.com/radiospecials Promo code: Mojo50Be ready for anything from a hurricane to man-created stupidity (toilet paper shortage, anyone?). The tools and food storage you need to weather the storm.www.PrepareWithMojo50.com Stay ConnectedWATCH The Daily Mojo LIVE 7-9a CT: www.TheDailyMojo.com (RECOMMEDED)Rumble: HEREFacebook: HEREMojo 5-0 TV: HEREFreedomsquare: HEREOr just LISTEN:www.Mojo50.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-daily-mojo-with-brad-staggs--3085897/support.

614Startups
Cyber Wars: AI vs AI with Tony Pietrocola, AgileBlue

614Startups

Play Episode Listen Later Jul 17, 2024 30:27


In this episode of the 614Startups Podcast, host Elio Harmon sits down with Tony Pietrocola, President of AgileBlue. AgileBlue is a leading AI-driven cybersecurity operations platform that empowers businesses to detect, analyze, and respond to cyber threats with unprecedented speed and accuracy. Learn more about AgileBlue at www.agileblue.com. Tony shares his insights on why cybersecurity is critical for businesses of all sizes and delves into the most pressing cybersecurity threats facing organizations today. From sophisticated phishing attacks to the ever-evolving landscape of ransomware, Tony breaks down the dangers lurking in the digital world. Discover how AgileBlue leverages cutting-edge AI technology to combat these threats, providing affordable and effective cybersecurity solutions tailored to meet the needs of any business. Whether you're a startup or a large enterprise, this episode is packed with valuable advice and practical tips on protecting your digital assets. Tune in to hear how AgileBlue's innovative approach to cybersecurity is not only making the cyber world safer but also ensuring that businesses can operate with peace of mind. Don't miss this essential conversation on safeguarding your business in the digital age!

Man Behind The Machine
Joshua : Cyber Wars (PC, Network, Russia 80s Ukraine Cybersicherheitskrieg

Man Behind The Machine

Play Episode Listen Later May 18, 2024 72:22


On this episode: Joshua's gonna start a war --- Send in a voice message: https://podcasters.spotify.com/pod/show/man-behind-the-machine/message

House Zofi | هاوس زوفي
سايبربنك 0011

House Zofi | هاوس زوفي

Play Episode Listen Later Apr 9, 2023 134:36


هذه الحلقة منتجت وسجلت بالإشتراك مع بودكاست ستيل شاوت (Steel Shout) أدب السايبربنك يعتبر من أهم الفروع التي ولدت من أدب الخيال العلمي في القرن العشرينما هو الـ(cyberpunk)  في الأدب.يمثل الـ (cyberpunk) نوعًا من أدب الخيال العلمي الذي يتميز بتمحوره حول العالم الافتراضي والتكنولوجيا المتقدمة، كما يتضمن العديد من العناصر الأخرى مثل الجريمة والفساد والتحرر والتمرد، ونوع من القصص الغامضة. يعود أصل الـ (cyberpunk)  إلى الأدب الخيال العلمي الذي ظهر في الستينات والسبعينات من القرن الماضي، ولكنه انتشر وازدهر في الثمانينات والتسعينات، وذلك بفضل العديد من الأعمال الشهيرة التي تناولت هذا الموضوع، مثل رواية "نيرومانسر" للكاتب وليام جيبسون التي صدرت في عام 1984.تعريف (cyberpunk)تأتي كلمة "سايبربانك" أو "سايبربونك" (Cyberpunk) من مزيج بين كلمتين:الأولى هي "سايبرنيتيكس" (Cybernetics) وهي تعني دراسة النظم الآلية والحيوية والتفاعل بينها.يشير مصطلح "سايبرنيتيكس" (Cybernetics) إلى دراسة النظم والآليات والتفاعلات بين الأجزاء المختلفة في الأنظمة الحيوية والآلية. ويتضمن هذا المصطلح فهم العلاقات المتبادلة بين الجزء والكل في النظام، وكيفية تغيير وتحكم الأنظمة في أنفسها.وتشمل مجالات الدراسة في السايبرنيتيكس مثل هذه النظم المختلفة كالأعصاب والغدد، والآليات المتحكمة في الصناعة والتحكم في المرور والملاحة والطيران، والتكنولوجيا الحيوية والطبية، والذكاء الاصطناعي والروبوتات.يعود أصل مصطلح "سايبرنيتيكس" (Cybernetics) إلى اللغة اليونانية، حيث تعني "kybernetes" باللغة اليونانية "الملاح" أو "القائد" أو "المدير". ولقد استخدم هذا المصطلح في اليونان القديمة للإشارة إلى الشخص الذي يدير السفينة ويتحكم في اتجاهها وحركتها. وفي القرن العشرين، أطلق عالم الرياضيات الأمريكي نوربرت وينر (Norbert Wiener) مصطلح "cybernetics" لوصف الدراسة العلمية للتحكم والتواصل في الآلات والأنظمة المعقدة. وقد استخدم وينر هذا المصطلح للإشارة إلى دراسة العمليات التي تحكم الأنظمة المعقدة، سواء كانت هذه الأنظمة آلية أو حية. ومنذ ذلك الحين، انتشر استخدام مصطلح "سايبرنيتيكس" لوصف دراسة نظم التحكم الآلية والحية، وأصبح مصطلحًا شائعًا في العديد من المجالات العلمية والتقنية المختلفة.ومن المهم أن نلاحظ أن السايبرنيتيكس لا تقتصر فقط على النظم الحيوية، بل تشمل أيضًا النظم الآلية والتكنولوجية، وهذا ما يجعلها مفهومًا مهمًا في العديد من المجالات المختلفة، بما في ذلك العلوم الحاسوبية والهندسة والفلسفة والاقتصاد والعلوم الاجتماعية.  والثانية هي "بانك" (Punk) وهي تعني نوعًا من الموسيقى الروك المتمردة والمناهضة للنظام والسلطة وبالتالي، فإن الـ(cyberpunk)  يجمع بين عنصرين رئيسيين: العالم التكنولوجي المتقدم والمتمردة والمناهضة للنظام والسلطة. ويتناول هذا النوع من الأدب عادة العالم الافتراضي والتقنية المتطورة بطريقة متمردة ومناهضة للنظام، ويتضمن الكثير من العناصر الاجتماعية والسياسية والثقافية المعاصرة.يُعرف مصطلح "بانك" (Punk) بشكل لغوي على أنه نوع من الموسيقى الروك المتمردة والمعارضة للنظام والسلطة، والتي ظهرت في السبعينيات من القرن الماضي. ويشار في قاموس أكسفورد الإنجليزي إلى أن كلمة "بانك" تعني بشكل عام شخصاً أو شيئاً يتمتع بالقوة والعنف والتمرد والانفصال عن النظام السائد. ويمكن أن يُستخدم مصطلح "بانك" لوصف أي شيء يتميز بالتمرد والمعارضة للسلطة والنظام، وليس فقط في عالم الموسيقى الروك. وعلى سبيل المثال، يمكن استخدام هذا المصطلح لوصف حركات اجتماعية وثقافية وفنية أخرى، مثل حركات الشباب المتمردة وحركات المقاومة السياسية والفنانين الذين يسعون لتحدي النظام السائد.بروس بيثكي (Bruce Bethke) هو كاتب أمريكي ولد في عام 1955، وهو معتبر أحد رواد الأدب السايبربانكي. وقد نشر بيثكي في عام 1980 قصة قصيرة بعنوان "Cyberpunk" في مجلة "Amazing Science Fiction". وقد تم استخدام هذه القصة لاحقًا كدليل لتحديد الأدب السايبربانكي. تتناول قصة بيثكي العالم الخيالي والمستقبلي والذي يتميز بتكنولوجيا متقدمة وتمحوره حول شخصية مخترق حاسوبي يقوم بسرقة بيانات مهمة. وقد اشتهرت هذه القصة بسبب استخدام كلمة "سايبربانك" في عنوانها، والتي أصبحت بعد ذلك مصطلحاً مشهوراً في الأدب والثقافة الشعبية. وقد كتب بيثكي العديد من القصص الخيالية والروايات، وأصبحت له بعض الأعمال الأخرى مثل "Headcrash" و "Wild Wild West" و "Redbeard" و "Rebel Moon"، وقد تم ترشيح روايته "Headcrash" لجائزة نيبولا في عام 1995. وبالإضافة إلى كونه كاتباً، فإن بيثكي يعمل أيضاً في مجال تكنولوجيا المعلومات والحوسبة، ويشغل حالياً منصب مدير تقنية المعلومات في إحدى الشركات الأمريكية.تصريح بروس ستيرلينغ "combination of lowlife and high tech" ليس تعريفًا محددًا للسايبربنك، وإنما هو وصف للجو العام الذي يمكن أن يتميز به عالم السايبربنك. ففي هذا الوصف، يركز ستيرلينغ على تحدُّث السايبربنك عن النزلاء الرَّخاء والمتعطشين للمتع الجسدية والأمور غير المشروعة، والتكنولوجيا العالية والحديثة التي تستخدمها هؤلاء الأشخاص في تحقيق ما يريدونه. ويتناول ستيرلينغ هذا المفهوم في روايته الشهيرة "المرآة الشعورية" (Mirrorshades)، وهي مجموعة من القصص القصيرة التي تعتبر أحد الأعمال الأساسية في أدب السايبربنك.ومع ذلك، يمكن القول أن هذا الوصف ينطبق بشكل عام على أعمال السايبربنك، حيث يتميز هذا النوع الأدبي بتحقيق التوازن بين الجوانب العالية التكنولوجية والجوانب الأكثر شعبية والمرتبطة بالعالم السفلي والجريمة المنظمة. وتنتمي روايات وليام جيبسون وبروس يرلينغ وغيرهما من الكتَّاب إلى هذا النوع الأدبي، ويتعاملون في أعمالهم مع قضايا تتعلق بالتكنولوجيا المتقدمة والحياة الافتراضية والتحديات الاجتماعية والثقافية التي تنشأ بسببها. وتجمع هذه الأعمال بين الجوانب العالية التكنولوجية والجوانب الأكثر شعبية والمرتبطة بالعالم السفلي، وتتميز بأسلوب سريع الإيقاع وشخصيات مثيرة للاهتمام، كما تستخدم لغة فيها الكثير من المصطلحات التقنية والحاسوبية.وبشكل عام، يجمع وصف بروس ستيرلينغ "combination of lowlife and high tech" بين هذه الجوانب، ويعكس الجانب الغامض والمثير للاهتمام في أدب السايبربنك، الذي يتميز بتحقيق التوازن بين العالم الافتراضي والعالم الحقيقي وبين الجوانب الفنية والتكنولوجية والجوانب الاجتماعية والثقافية.عناصر السايبربنك الأدبي:·       الجوالـ (Dystopian):o      تحكم وتملك المنظمات والشركات للمجتمع.o      طبقية الرأسماليةo      حياة وضيعة.o      تمرد الأفراد على الشركات والمنظمات.o      انغماس الأفراد في الجريمة والملذات والشهوات.o      غلاء المعيشة ·       التقنية العالية:o      الذكاء الصناعي.o      الواقع الافتراضي .o      تطورعلم الأطراف الصناعيةo      المستنسخين والرجال الآليين.o      الاتصالات والتقنيةo      الهاكرز او محرك الشبكة  (Netrunner)·       الثقافة:o      موسيقى الـ  Punk Rock والـVaporwaveo      الازياء o      العمران والأضواء (اليابان في الثمانينات ونموها اقتصاديا في العالم الإلكتروني)o      المتحري والمحقق الظلامي (Noir)o      الرياضات والترفيه  أهم الأعمال الأدبية:·       رواية نوفا لـ (Samuel Delany) في عام 1968:o      نوفا هي رواية خيال علمي من تأليف الكاتب الأمريكي صموئيل ديلاني ونشرت في عام 1968. تستكشف الرواية، التي تصنف رسميًا كعمل فضائي، السياسة والثقافة في مستقبل يتسم بانتشار تقنية السايبورج بشكل شامل (والرواية واحدة من سلفيات السايبربانك)، ولكن يمكن أن تنطوي صناعة القرارات الكبرى على استخدام بطاقات التاروت. تحمل الرواية نغمات أسطورية قوية، وترتبط على حد سواء بمسألة البحث عن الكأس المقدسة وبقصة جايسون والأرجونوتيكا والسعي للحصول على الصوف الذهبي. تم ترشيح نوفا لجائزة هيوغو لأفضل رواية في عام 1969. في عام 1984، قام ديفيد برينجل بإدراجها ضمن قائمته لأفضل 100 رواية خيال علمي كتبت منذ عام 1949. ملخص القصةفي عام 3172، تنقسم السلطة السياسية في المجرة إلى فصيلين: فصيل دراكو الموجود على الأرض وفصيل الاتحاد الثريد الذي ظهر في وقت لاحق. كلاهما لديه اهتمامات في المستعمرات الخارجية الأحدث، حيث تنتج المناجم كميات قليلة من المصدر القيم إليريون، وهو مادة فائقة الثقل ضرورية للسفر الفضائي وتغيير مناخ الكواكب.يتورط قائد مهووس ومشوه من الاتحاد الثريد، لورك فون راي، في صراع بين العائلات الأرستقراطية والاقتصادية القوية، فيجند فريقًا متنوعًا من المختلفين لمساعدته في السباق مع عدوه اللدود، الأمير ريد من شركة ريد شيفت المرتبطة بفصيل دراكو، للحصول على الزعامة الاقتصادية عن طريق تأمين كمية هائلة من إليريون مباشرة من قلب نجم نوفا. وبذلك، سيحدث فون راي تحولًا في توازن القوى في النظام الكوني الحالي، مما سيؤدي إلى سقوط العائلة الحمراء ونهاية سيطرة الأرض على السياسة الفضائية بين النجوم.تتبع الرواية مغامرات فريق فون راي في محاولة الحصول على إليريون من نوفا، حيث يتعرضون للعديد من المصاعب والتحديات، بما في ذلك مواجهة العدو، والتعامل مع الأسرار الغامضة المرتبطة بنوفا نفسها، وكذلك الاستكشاف العميق لشخصيات الأعضاء المختلفين في الفريق.في نهاية المطاف، يتمكن فون راي وفريقه من الحصول على الإليريون من نوفا، ويتغلبون على الأمير ريد وشركته، مما يؤدي إلى تحويل التوازن في السياسة الفضائية بين الفصيلين. وبالتالي، ينتهي السيطرة الأرضية على السياسة الفضائية، وتبدأ مرحلة جديدة في تاريخ المجرة. ·       رواية (Do Androids Dream of Electric Sheep) لـ (Philip K. Dick) عام 1968:o      هي رواية خيال علمي كتبها الكاتب الأمريكي فيليب ك. ديك، وصدرت عام 1968. تدور أحداث الرواية في المستقبل البعيد بعد أن تعرضت الأرض لحرب نووية دمرت جزءا كبيرا منها وأدت إلى إنقراض الحيوانات وتحكي قصة ريك ديكارد، الذي يعمل كصائد للروبوتات المتمردة التي تشبه البشر، ويتم تكليفه بمهمة القضاء على ستة من هذه الروبوتات المتمردة. هذه الرواية تشتمل على بعض العناصر التي يمكن وصفها بالسايبرنك، مثل الروبوتات والذكاء الاصطناعي، يمكن اعتبار هذه الرواية الأم لفيلم "Blade Runner" الذي صدر في عام 1982 والذي يعتبر من أهم الأعمال في فن السايبرنك.تدور قصة الحيوانات في الرواية حول شخصية ريك ديك، الذي يعمل كصائد للحيوانات النادرة، وذلك لكسب نقاط مادية تتيح له شراء حيوان حقيقي بدلاً من حيوان اصطناعي. ويحلم ريك بامتلاك حيوان طائر "البطريق الإمبراطوري"، وهو الحيوان النادر الذي يساعده على التفرد والتميز في مجتمع موحد.تعتبر قصة الحيوانات والتركيز على الرغبة في امتلاك حيوانات حقيقية، رمزًا للحاجة إلى التميز والاهتمام بالطبيعة والحيوانات، وكذلك للعلاقة بين الإنسان والطبيعة في عالم مستقبلي متغير. وتعد هذه القصة أحد المحاور الرئيسية في الرواية التي تتناول موضوعات أخرى مثل الهوية الإنسانية الواقعية والذاتية والمجتمعية والروبوتات والذكاء الاصطناعي، والتي تركز على القضايا الأخلاقية والفلسفية المتعلقة بالحياة والوجود والتعايش في عالم متغير ومعقد.رواية (Neuromancer) للكاتب الأمريكي ويليام جيبسون عام 1984 م:تعد من أولى روايات السايبربانك. تعتبر من أهم الأعمال الأدبية في هذا النوع، حيث أنها قدمت للقراء نموذجاً جديداً للأدب العلمي والخيال العلمي، يستخدم فيه (جيبسون) تقنيات ومفاهيم حديثة كالحوسبة والشبكات والذكاء الاصطناعي والروبوتات والتجارة الإلكترونية، وجعل منها عناصر رئيسية في قالب قصته المثيرة والمشوقة. وقد فازت هذه الرواية بجائزة نيبولا لأفضل رواية علمية خيالية في عام 1984.بطلها كيس، وهو هاكر حاسوب عاطل عن العمل يتم استئجاره من قبل صاحب عمل جديد غامض يدعى أرميتاج. يتم تشكيل فريق مع مولي، السايبورغ، وبيتر ريفيرا، اللص والخادع، لتنفيذ سلسلة من الجرائم التي تمهد الطريق للهدف النهائي للمجموعة، والذي يتم تنفيذه في محطة الفضاء المدارية المسماة "فريسايد"، موطن عائلة تيسييه-أشبول الثرية. تم إنشاء اثنين من الذكاءات الاصطناعية (AIs)، وينترميوت ونيورومانسر ، التي هي قوية لدرجة أنها يمكن أن تتصل ببعضها البعض في نقطة واحدة فقط. يتعلم كيس وزملاؤه أنهم تم استئجارهم من قبل وينترميوت لكسر الفصل بين الذكاءات الاصطناعية. يتغلب كيس ومولي على التدخلات القانونية السيبرانية ومحاولة خيانة من ريفيرا لدمج وينترميوت مع نيورومانسر، وينتهي الأمر بكيس يعيش في عالم جديد شجاعأفلام:·        Escape from New York (1981)[40][41]·        Burst City (1982)[42]·        Tron (1982)[43]·        Blade Runner (1982)[44]·        Brainstorm (1983)[45]·        Videodrome (1983)[46]·        Repo Man (1984)·        The Terminator (1984)·        Brazil (1985)·        RoboCop (1987)[47]·        The Running Man (1987)·        Gunhed (1989)[48]·        Tetsuo: The Iron Man (1989)·        Circuitry Man (1990)[49]·        RoboCop 2 (1990)·        Hardware (a.k.a. M.A.R.K. 13) (1990)[50]·        Megaville (1990)[51]·        Total Recall (1990)[52]·        Terminator 2: Judgment Day (1991)·        964 Pinocchio (1991)[53]·        Until the End of the World (1991)[54]·        Nemesis (1992)·        Freejack (1992)[55]·        The Lawnmower Man (1992)[56]·        Tetsuo II: Body Hammer (1992)·        Cyborg 2 (1993)[57]·        Demolition Man (1993)[58]·        RoboCop 3 (1993)·        Robot Wars (1993)·        Plughead Rewired: Circuitry Man II (1994)[59]·        Death Machine (1994)·        Hackers (1995)[60]·        Johnny Mnemonic (1995)[61]·        Judge Dredd (1995)[62]·        Strange Days (1995)[63]·        Virtuosity (1995)·        Escape from L.A. (1996)[64]·        The Lawnmower Man 2: Beyond Cyberspace (1996)[65]·        Deathline (a.k.a. Redline) (1997)[66]·        The Fifth Element (1997)[67]·        Nirvana (1997)[68]·        Andromedia (1998)[69]·        New Rose Hotel (1998)·        Pi (1998)[70]·        Skyggen (a.k.a. Webmaster) (1998)[71]·        Dark City (1998)[72]·        eXistenZ (1999)[73]·        The Thirteenth Floor (1999)[74]·        Bicentennial Man (1999)[75]·        The Matrix (1999)[76]·        I.K.U. (2000)[77]·        The 6th Day (2000)[78]·        Avalon (2001)[79]·        A.I. Artificial Intelligence (2001)·        Electric Dragon 80.000 V (2001)[80]·        Cypher (2002)[81]·        Dead or Alive: Final (2002)[82]·        Impostor (2002)[83]·        Minority Report (2002)[84]·        Resurrection of the Little Match Girl (2002)[85][86]·        All Tomorrow's Parties (2003)[87]·        Code 46 (2003)[88]·        The Matrix Reloaded (2003)[89]·        The Matrix Revolutions (2003)[90]·        Natural City (2003)[91]·        Paycheck (2003)[92]·        Avatar (a.k.a. Cyber Wars) (2004)[93]·        Immortal (2004)[94]·        I, Robot (2004)[95]·        Paranoia 1.0 (a.k.a. One Point 0) (2004)[96]·        Æon Flux (2005)[97]·        Children of Men (2006)·        Ultraviolet (2006)[98]·        Chrysalis (2007)[99]·        Eden Log (2007)[100]·        The Gene Generation (2007)[101][102][103]·        Babylon A.D. (2008)[104][105]·        Sleep Dealer (2008)[106]·        Tokyo Gore Police (2008)[107]·        District 9 (2009)·        Hardwired (2009)[108][109]·        Surrogates (2009)[110]·        Tetsuo: The Bullet Man (2009)·        Tron: Legacy (2010)[60]·        Repo Men (2010)[111]·        Priest (2011)[60]·        Dredd (2012)[112][113][114][115][116]·        Total Recall (2012)·        Elysium (2013)[117][118]·        The Zero Theorem (2013)[60]·        Automata (2014)[119]·        Transcendence (2014)[120]·        RoboCop (2014)·        Chappie (2015)[121]·        Ex Machina (2015)[122]·        Hardcore Henry (2015)·        Ghost in the Shell (2017)[123][124]·        Bleeding Steel (2017)·        Blade Runner 2049 (2017)·        Ready Player One (2018)[125][126]·        Upgrade (2018)·        Hotel Artemis (2018)·        Anon (2018)·        Alita: Battle Angel (2019)·        Reminiscence (2021)·        Jung E (2023)القصص المصورة:·        Judge Dredd (1977–) by John Wagner and Carlos Ezquerra·        The Incal (1981–1989) by Alejandro Jodorowsky·        Akira (1982–1990) by Katsuhiro Ōtomo[33]·        Black Magic (1983) by Masamune Shirow·        Ronin (1983–1984) by Frank Miller·        Shatter (1985–1988) by Peter B. Gillis and Mike Saenz·        Appleseed (1985–1989) by Masamune Shirow·        Dominion (1986) by Masamune Shirow·        Ghost in the Shell (1989–1991) by Masamune Shirow·        Neuromancer (1989) by Tom de Haven and Bruce Jensen[34]·        Battle Angel Alita (1990–1995) by Yukito Kishiro[33]·        Martha Washington (1990–1991) by Frank Miller and Dave Gibbons·        Barb Wire (1994–1995) by Chris Warner·        Transmetropolitan (1997–2002) by Warren Ellis[35]·        Eden: It's an Endless World! (1998–2008) by Hiroki Endo·        Blame! (1998) by Tsutomu Nihei[36]o   NOiSE (2001) – prequel to Blame!o   Biomega (2007)·        Singularity 7 (2004) by Ben Templesmith[37]·        The Surrogates (2005) by Robert Venditti[38]·        The entire Marvel 2099 line is an example of the cyberpunk genre in comics, especially Ghost Rider 2099 and Spider-Man 2099.·        Marvel's Machine Man Vol. 2·        Batman Beyond·        The True Lives of the Fabulous Killjoys (2013-2014) by Gerard Way and Shaun Simon الأنمي:·        Megazone 23 (1985)[127]·        Neo Tokyo (1986)[128]·        Black Magic M-66 (1987)·        Bubblegum Crisis (1987)[129]o   Bubblegum Crisis Tokyo 2040 (1998)[130]·        Akira (1988)[131][132]·        RoboCop: The Animated Series (1988)·        Beast Machines: Transformers (1999–2000)·        Dominiono   Dominion (1988–1989)o   New Dominion Tank Police (1993–1994)o   Tank Police Team: Tank S.W.A.T. 01 (2006)·        Appleseedo   Appleseed (1988 film)o   Appleseed (2004 film)o   Appleseed Ex Machina (2007 film)o   Appleseed XIII (2011)o   Appleseed Alpha (2014 film)·        A.D. Police Files (1990)·        Cyber City Oedo 808 (1990)[133]·        Æon Flux (1991–1995)[134]·        Silent Möbius (1991–2003)[135]·        Genocyber (1993)[136]·        Macross Plus (1994)·        Armitage III (1995)·        Ghost in the Shell (anime films)o   Ghost in the Shell (1995 film)[137]o   Ghost in the Shell 2: Innocence (2004 film)[138]·        Ghost in the Shell: Stand Alone Complex (S.A.C.)[139]o   Ghost in the Shell: Stand Alone Complex (S.A.C.) (2002–2003)o   Ghost in the Shell: S.A.C. 2nd GIG (2004–2005)o   Ghost in the Shell: Stand Alone Complex - Solid State Society (2006 film)o   Ghost in the Shell: SAC 2045 (2020–2022)·        Ghost in the Shell: Ariseo   Ghost in the Shell: Arise (2013–2015)o   Ghost in the Shell: The New Movie (2016 film)·        Spicy City (1997)·        Cowboy Bebop (1998)·        RoboCop: Alpha Commando (1998–1999)·        Serial Experiments Lain (1998)[140]·        Gundress (1999)·        Batman Beyond (1999–2001)·        Metropolis (2001)[141]·        The Animatrix (2003)[142]·        Code Lyoko (2003–2007)·        Heat Guy J (2003)[143]·        Parasite Dolls (2003)[144]·        Texhnolyze (2003)[145]·        Wonderful Days (a.k.a. Sky Blue) (2003)[146][147]·        Burst Angel (2004)[148]·        Fragile Machine (2005)[149]·        Aachi & Ssipak (2006)[150]·        A Scanner Darkly (2006)[151]·        Ergo Proxy (2006)[152]·        Paprika (2006)[153][154]·        Renaissance (2006)[155]·        Dennō Coil (2007)[156]·        Vexille (2007)[157][158]·        Technotise: Edit & I (2009, Serbia)[159]·        Real Drive (2008)·        Mardock Scramble (2010)[160]·        Accel World (2012–2016)·        Psycho-Pass (2012)[161]·        Tron: Uprising (2012)·        Dimension W (2016)·        No Guns Life (2019–2020)·        Altered Carbon: Resleeved (2020)·        Akudama Drive (2020)·        Blade Runner: Black Lotus (2021–2022)·        Cyberpunk: Edgerunners (2022)مسلسلات·        World on a Wire (1973)[162]·        The Deadly Assassin (1976)[163]·        Overdrawn at the Memory Bank (1983)[164]·        Max Headroom: 20 Minutes into the Future (1985), British television movieo   Max Headroom (1987),[165] American television series based on the UK TV movie·        Wild Palms (1993)[166]·        TekWar (1994)[167]·        RoboCop: The Series (1994)·        VR.5 (1996)[citation needed]·        Welcome to Paradox (1998)[168]·        The X-Files, two episodes of the series were written by William Gibson and contain cyberpunk themes:o   Kill Switch (1998)[169]o   First Person Shooter (2000)[170][171]·        Harsh Realm (1999)[172]·        Total Recall 2070 (1999)[173]·        Dark Angel (2000–2002)[174]·        RoboCop: Prime Directives (2001)[175]·        Charlie Jade (2005)[176]·        Terminator: The Sarah Connor Chronicles (2008–2009)·        Power Rangers RPM (2009)·        Kamen Rider Dragon Knight (2009)[citation needed]·        Dollhouse (2009–2010)[177]·        Caprica (2010)·        Person of Interest (2011–2016)·        Black Mirror (2011–2019)·        Continuum (2012–2015), set in the present with a protagonist who has time traveled back from a cyberpunk future in 2077·        H+: The Digital Series (2012)·        Almost Human (2013–2014)·        Die Gstettensaga: The Rise of Echsenfriedl (2014)·        Mr. Robot (2015–2019)·        Humans (2015–2018)·        Westworld (2016–2022)·        Incorporated (2016–2017)·        Altered Carbon (2018–2020)·        S'parta (2018)·        Better Than Us (2018–2019)·        Love, Death & Robots (2019–present)·        Meta Runner (2019–2022)·        Onisciente (2020)·        Upload (2020–present)[178] ألعاب فيديو:·       Exapunk The Screamer (1985)[190] Imitation City (1987)[191] Megami Tensei series (1987–present)[192]  Digital Devil Story: Megami Tensei (1987)[193][194]   Devil Summoner: Soul Hackers (1997)[195]   Shin Megami Tensei: Digital Devil Saga (2004)[196]   Shin Megami Tensei IV (2013)[192]   Soul Hackers 2 (2022)   Metal Gear series (1987–present)  Metal Gear Solid (1998)[197]   Metal Gear Solid 2: Sons of Liberty (2001)[198]   Metal Gear Solid 4: Guns of the Patriots (2008)[192]   Metal Gear Rising Revengeance (2013)   Akira (1988–2002)  Akira (1988)[192]   Akira Psycho Ball (2002)   Neuromancer (1988)[199] Snatcher (1988–1996)[200] Genocide (1989)[192] Night Striker (1989) DreamWeb (1992)[201] Flashback (1992)[202] BloodNet (1993)[203] Gadget: Invention, Travel, & Adventure (1993)[204] Shadowrun series  Shadowrun (SNES) (1993)[205]   Shadowrun (Sega Genesis) (1994)[206]   Shadowrun (Sega CD) (1996)[207]   Shadowrun (2007)[208][209]   Shadowrun Returns (2013) [210]   Shadowrun: Dragonfall (2014) [211]   Shadowrun Chronicles: Boston Lockdown (2015)   Shadowrun: Hong Kong (2015) [212]   Syndicate series  Syndicate (1993)[213]   Syndicate Wars (1996)[214]   Syndicate (2012)[215]   Beneath a Steel Sky (1994)[216] Burn:Cycle (1994)[217] Hell: A Cyberpunk Thriller (1994) Delta V (1994)[218] Hagane: The Final Conflict (1994)[192] Live A Live (1994)[192] Rise of the Robots (1994) [219][220] Policenauts (1994)[192] Appleseed series  Appleseed: Oracle of Prometheus (1994)   Appleseed EX (2004)   System Shock series  System Shock (1994)[221]   System Shock 2 (1999)[222]   CyberMage: Darklight Awakening (1995)[223] Johnny Mnemonic: The Interactive Action Movie (1995)[224] Road Rage (1995) Osman (1996)[192] Blade Runner (1997)[225] Final Fantasy VII (1997)[226]  Compilation of Final Fantasy VII (2004–2009)   Final Fantasy VII Remake (2020)[227]   Ghost in the Shell (1997)[192] Einhänder (1998)[192] Nightlong: Union City Conspiracy (1998) Xenogears (1998)[228] The Nomad Soul (1999) Fear Effect series  Fear Effect (2000)   Fear Effect 2: Retro Helix (2001)   Fear Effect Sedna (2018)   Deus Ex series  Deus Ex (2000)[229]   Deus Ex: Invisible War (2003) [230]   Deus Ex: Human Revolution (2011) [231]   Deus Ex: The Fall (2013)[232]   Deus Ex: Mankind Divided (2016)   Perfect Dark series  Perfect Dark (2000)   Perfect Dark Zero (2005)   Oni (2001)[233] Anachronox (2001) Mega Man Battle Network series  Mega Man Battle Network (2001)   Mega Man Battle Network 2 (2001)   Mega Man Battle Network 3 (2002)   Mega Man Network Transmission (2003)   Mega Man Battle Chip Challenge (2003)   Mega Man Battle Network 4 (2003)   Mega Man Battle Network 5 (2004)   Mega Man Battle Network 6 (2005)   Uplink (2001)[234][235] Breath of Fire: Dragon Quarter (2002)[236] .hack series  .hack//IMOQ (2002–2003)   .hack//G.U. (2006–2007)   .hack//Link (2010)   Neocron (2002)[237] Enter the Matrix (2003)[238] P.N.03 (2003) Cy Girls (2004) Æon Flux (2005) Dystopia (2005)[239] System Rush (2005)[240] Mirror's Edge (2008) Halo 3: ODST (2009) Cyber Knights series:  Cyber Knights (Classic) (2011)[241]   Cyber Knights: Flashpoint (2021)[242]   Gemini Rue (2011)[243] Hard Reset (2011) Cypher (2012)[244] Cataclysm: Dark Days Ahead (2013) Remember Me (2013)[245] Far Cry 3: Blood Dragon (2013) Alien: Isolation (2014) Jazzpunk (2014) Transistor (2014) Watch Dogs series:  Watch Dogs (2014)[246]   Watch Dogs 2 (2016)   Watch Dogs: Legion (2020)   2064: Read Only Memories (2015) Call of Duty: Black Ops III (2015)[247] Dex (2015)[248] Technobabylon (2015) Soma (2015) Satellite Reign (2015) Digimon Story: Cyber Sleuth (2015)[249] Invisible, Inc. (2016) Mirror's Edge Catalyst (2016) Superhot (2016) VA-11 HALL-A (2016)[250] Digimon Story: Cyber Sleuth – Hacker's Memory (2017)[249] Observer (2017) Ruiner (2017)[251] The Red Strings Club (2018)[252] Ion Fury (2018) Tales of the Neon Sea (2018)[253] Astral Chain (2019)[254] Katana Zero (2019) Dohna Dohna (2020)[255] Cyberpunk 2077 (2020) Ghostrunner (2020) Incredibox  V8: Dystopia (2020)   Cloudpunk (2020) ENCODYA (2021) The Ascent (2021) Stray (2022) SIGNALIS (2022) The Last Night (TBA)[256]  الالعاب الروائية:·        Cyberpunk (1988)o   Cyberpunk 2020 (1990)o   Cyberpunk V3.0 (2005)o   Cyberpunk Red (2020)·        Shadowrun (1989)·        GURPS Cyberpunk (1990)[257]·        Necromunda (1995)·        Infinity (2005)·        Corporation (2009)[258]·        Deadzone (2013)·        Carbon 2185 A Cyberpunk RPG (2019)

love american new york death world children ai men future british travel marvel guns resurrection brazil tales adventure dead robots spider man code va artificial intelligence escape humans matrix memory sons vr breath blame mirror patriots invisible avatar renaissance literature paradoxes punk priest halo upgrade hackers terminator parties pi corporations wire cyberpunk nirvana science fiction blade runner carbon infinity black mirror beneath flashback hardware noir serbia westworld genocide robocop ready player one innocence impostors x files pinocchio tron observer immortal compilation prometheus akira cyborg ascent upload paychecks far cry paranoia flux stray existenz nemesis cowboy bebop ghost in the shell metropolis avalon judgment day road rage metal gear solid soma dystopia singularity transcendence ex machina brainstorm continuum total recall ghost rider dystopian minority report final fantasy vii incorporated black magic syndicate gig redline alita battle angel frank miller watch dogs metal gear final fantasy vii remake running man demolition man fifth element dex osman elysium dredd altered carbon judge dredd paprika cypher dollhouse dead zone oni deus ex anon reminiscence transistor watch dogs legion dark city strange days alien isolation videodrome william gibson ultraviolet batman beyond chrysalis matrix reloaded tron legacy warren ellis repo man superhot chappie cybernetics perfect dark hardwired shadowrun cyberpunk edgerunners matrix revolutions system shock killswitch max headroom uk tv dark angel gerard way astral chain lawnmower man first person shooters one point johnny mnemonic webmasters surrogates neuromancer hardcore henry ruiner katana zero odst snatcher animatrix live alive ghostrunner hotel artemis automata psycho pass do androids dream deus ex mankind divided virtuosity scanner darkly sky blue almost human appleseed robot wars hard reset neo tokyo martha washington battle angel alita necromunda john wagner tetsuo the iron man blood dragon deus ex human revolution death machines wonderful days little match girl xenogears netrunner bicentennial man metal gear rising revengeance freejack caprica cyberpunk red uplink serial experiments lain thirteenth floor edge catalyst repo men megaman battle network steel sky tokyo gore police zero theorem bubblegum crisis skyggen norbert wiener death line terminator the sarah connor chronicles ben templesmith shadowrun returns blade runner black lotus yukito kishiro delta v katsuhiro robert venditti red strings club read only memories tron uprising memory bank code lyoko jazzpunk dimension w ergo proxy akudama drive all tomorrow policenauts overdrawn fear effect cyber wars samuel delany tsutomu nihei macross plus tekwar shin megami tensei iv digimon story cyber sleuth megami tensei wild palms accel world beyond cyberspace fabulous killjoys cyber city oedo harsh realm power rangers rpm perfect dark zero shadowrun dragonfall cyberpunk rpg no guns life ion fury biomega new rose hotel shadowrun hong kong sleep dealer gemini rue fear effect sedna technobabylon armitage iii circuitry man deus ex the fall peter b gillis endless world anachronox charlie jade satellite reign robocop prime directives andromedia deus ex invisible war mardock scramble mirrorshades black magic m fire dragon quarter eden it
RBC Disruptors
Cyber Wars: A Good Offense Is the Best Defense

RBC Disruptors

Play Episode Listen Later Mar 21, 2023 31:52


Cyber threats have been around as long as the Internet, but attacks have ramped up in the last few years, with the pandemic dramatically shifting more of our work—and our lives—online. Organizations also moved more of their operations to the cloud, creating a new potential liability. Recent high-profile security breaches have crippled some of Canada's largest companies such as Empire Foods, Indigo, and Maple Leaf Foods, with costly impacts to the tune of tens of millions of dollars. Organized crime and some nation states are getting better and better at breaching existing security. It's up to Canada to leverage our talent, technology, and knowledge to turn those cybersecurity challenges into opportunities. On this episode of Disruptors, an RBC Podcast, host John Stackhouse takes a deep dive into what is being done to fight cybercrime. Guests include Adam Evans, RBC's Senior Vice-President & Chief Information Security Officer Michelle Zatlyn, the founder, President, and COO of Cloudflare, and David Shipley, founder & CEO of Beauceron Security. What are the biggest risks to your data and what's being done to keep it safe? Listen in to find out.  For more information about Cloudflare, check out their website. Click here to read about Beauceron Security. More information about RBC's cybersecurity initiative can be found here.

Storybeat with Steve Cuden
Christopher Hatton, Writer-Director-Producer-Episode #237

Storybeat with Steve Cuden

Play Episode Listen Later Mar 14, 2023 65:33


Christopher Hatton is a writer-director-producer based in Singapore.  His work ranges from sci-fi to drama to action to animation. He's created projects in North America, the U.K., Europe and Asia.  He recently completed writing, directing, and producing Raven's Hollow, an ambitious period thriller based on events in the life of a young Edgar Allan Poe.   I've seen Raven's Hollow and can tell you it's a terrifically entertaining, beautifully rendered, quite eerie mystery-horror-thriller. Some of Christopher's other credits include Battle of the Damned with Dolph Lundgen, the robots-gone-berserk thriller Robotropolis, Cyber Wars with genre legend David Warner, Phantom Racer, and the first draft screenplay for what would become Shanghai Noon, among many others. Christopher earned an MFA in Playwriting from the University of Iowa where he took time out from writing plays to submit an unsolicited spec script to Star Trek: The Next Generation, which wound up being produced as a two-part episode.  This was immediately followed by the sale of a pitch to Star Trek, which brought him to Los Angeles where he secured an agent and never wrote a stage play again.   

Tech Hive: The Tech Leaders Podcast
#65 - Cyber-attack vulnerability and the ‘AI Arms Race' with Jake Bernardes, CISO @ Whistic

Tech Hive: The Tech Leaders Podcast

Play Episode Listen Later Feb 28, 2023 52:40


‘Wars don't mean guns, they mean keyboards' is the standout phrase from this week's episode of The Tech Leaders Podcast with cybersecurity expert and CISO of Whistic, Jake Bernardes. In the episode, both Gareth and Jake discuss the IT vulnerabilities that exist in the public sector, as well as the necessary precautions needed to avoid debilitating cyber-attacks and data breaches. The conversation highlights the importance of user understanding and ‘opening your eyes to the value of your data' to ensure optimum security. Alongside cyber-safety, Jake describes how AI is another keen interest of his, as he and Gareth discuss the likelihood of an ‘AI Arms Race' between search engine giant, Google, and revolutionary newcomer, Chat GPT. However, despite acknowledging the omnipresence of artificial intelligence in society, Jake notes that the key to good leadership ultimately lies within pure human interaction: as he stresses the importance of being ‘in the middle of your team' to share success and shield from failure.  Time stamps What good leadership means to Jake – (01:50) Career overview - (2:30) Missionary work and learning humility (05:35) Retaining ‘natural obsessiveness' (07:50) From Corporate to Start-up (08:55) Key career milestones (12:14) Whistic and the Vendor Risk space (13:45) The biggest cyber security threats (18:25) Growing risk of Cyber Wars (21:50) ‘Did you Chat GPT that?' (26:40) Ethical hacking (30:05) The skills gap (33:20)  Exciting tech innovations (35:30) Verifying things at the source (38:25) Keeping fit to keep you focused (43:52) A coffee meeting with Alexander Hamilton and Elon Musk (44:28) ‘Don't be afraid to trust your gut' (46:34)  * BOOK RECOMMENDATION: ‘Man's Search for Meaning' - Viktor E. Frankl  Man's Search For Meaning By Viktor E Frankl | Used | 9781844132393 | World of Books (wob.com) 

Who Back When | A Doctor Who Podcast
N164 Ascension of the Cybermen

Who Back When | A Doctor Who Podcast

Play Episode Listen Later Feb 12, 2023


Doc ditches the fam at the end of the Cyber Wars and Irish Moses grows up to be the village super cop

Who Back When | A Doctor Who Podcast
N164 Ascension of the Cybermen

Who Back When | A Doctor Who Podcast

Play Episode Listen Later Feb 12, 2023 92:15


Doc ditches the fam at the end of the Cyber Wars and Irish Moses grows up to be the village super cop

The Killing IT Podcast
Episode 202: The Good Guys win the Cyber Wars, Scientist Using Wifi to See Through Walls, & AI and Ethics

The Killing IT Podcast

Play Episode Listen Later Feb 7, 2023 31:16


Topic 1: Score 1 for the Good Guys in the Cyber Wars https://www.axios.com/newsletters/axios-login-0f2b3e6a-1272-4510-8fd2-c1aa9128b8db.html In a significant development in the fight against ransomware, the FBI announces that they have shut down a notorious cyber gang after infiltrating their system months ago and secretly giving decryption keys to ransomware victims. Topic 2: Ummmm … This is Some Seriously Scary Big Brother Stuff https://www.vice.com/en/article/y3p7xj/scientists-are-getting-eerily-good-at-using-wifi-to-see-people-through-walls-in-detail Scientists have announced that they are able to see people through walls using WiFi technology. And not just the “heat blob” from Hollywood movies … but detailed movements and positions. On a scientific note, this is cool. On a security / privacy note, this is super eerie.  Topic 3: No One Is Surprised: The First Victim in the AI Wars Will Be … Ethics https://www.axios.com/newsletters/axios-login-77eb3638-5655-4156-b6dc-abb7129dde34.html?chunk=0&utm_term=emshare#story0 Sure, generative AI is fun. We have had our laughs and we're starting to grind the gears to find legitimate uses for services like ChatGPT … and the possibilities are incredible. But never forget that this isn't just about technology, it's about business. And the incumbents aren't going to just let the upstart take over the industry. And once the race for market domination begins, the commitment to ethics and fair treatment are likely to be the first casualties. https://www.nist.gov/trustworthy-and-responsible-ai  Princeton computer science professor says don't panic over 'bullshit generator' ChatGPT https://www.businessinsider.com/princeton-prof-chatgpt-bullshit-generator-impact-workers-not-ai-revolution-2023-1 "It is trying to be persuasive, and it has no way to know for sure whether the statements it makes are true or not," he said.  Also … this one is incredibly funny: https://www.axios.com/newsletters/axios-login-77eb3638-5655-4156-b6dc-abb7129dde34.html :-)  The Onion weighs in with the most accurate take on ChatGPT yet. Sponsor Memo: OITVOIP Let's cut the FUD; don't let anyone scare you from selling VoIP because “compliance is hard”.  With our newest Managed Compliance service, OITVOIP removes compliance headaches from the picture while you retain control of your client relationships.  Get started selling faster than ever! Visit HTTPS://oit.co/ mspradio to learn more today! 

Inside Geneva
Cyber Wars

Inside Geneva

Play Episode Listen Later Jan 24, 2023 28:40


The war in Ukraine is almost a year old. Inside Geneva asks what role cyberwarfare has played.Christian-Marc Lifländer, head of NATO Cyber Defence Section: "Cyberspace has been central to the war in Ukraine. It has been used to shape the battle space. Cyberattacks were used to lay the ground for the invasion."Its influence has been stealthy…Charlotte Lindsey, CyberPeace Institute: "Everybody was expecting when cyber was used in warfare that there would be some cataclysmic, major humanitarian impact of the use of cyber."But worrying…Max Smeets, Center for Security Studies, ETH Zurich: "In the case of Russia, what we have seen are very specific efforts to make sure that some of the key parts of the Ukrainian internet will be connected to the Russian internet, that then provides them with new ways of ownership, control and monitoring."And far reaching…Charlotte Lindsey, CyberPeace Institute: "What has come out clearly from the conflict in Ukraine and Russia is just the scale and extent of cyber operations which are happening way beyond the boundaries of those countries and are affecting many others."Please try out our French Podcast: the Dangerous MillionsGet in touch! Email us at insidegeneva@swissinfo.ch Twitter: @ImogenFoulkes and @swissinfo_en Thank you for listening! If you like what we do, please leave a review.

Naeem Sikandar Podcast
EP123 Rafay Baloch On Hacking, Deepfakes, AI, Financial Frauds, Cyber Wars & No Privacy Laws In Pakistan | The Naeem Sikandar Podcast

Naeem Sikandar Podcast

Play Episode Listen Later Dec 30, 2022 91:41


in this episode of #NAEEM_SIKANDAR_PODCAST, we have invited Mr. @RafayBaloch , a Pakistani ethical hacker and security researcher known for his discovery of vulnerabilities in the Android operating system. He has been featured and known by both national and international media and publications like Forbes, BBC, The Wall Street Journal, and The Express Tribune. I discussed with Rafay ongoing audio and video leaks, deep fake technology, Financial frauds, artificial intelligence, and privacy laws.

GZero World with Ian Bremmer
How the US will fight cyber wars

GZero World with Ian Bremmer

Play Episode Listen Later Aug 20, 2022 26:58


en Easterly is optimistic about the state of America's cyber defenses, she tells Ian Bremmer on the GZERO World podcast. As director of the US Cybersecurity and Infrastructure Security Agency, she is tasked with defending the country from all cyber threats, foreign and domestic, at a time when the stakes are very high. The next decade will be a turning point in the global cyber arms race. From Russian-backed ransomware attacks against America's largest oil pipeline to the phone scammer who won't leave you alone during dinner, we're living in a brave new world.   While Russia is the more urgent cyber threat, says Easterly, China could do more damage in the long term. As for non-state actors like ISIS carrying out major cyberattacks, there is "low probability, but high impact.” The bigger problem, she adds, may be nations that use cyber to do somewhat lawful things like collecting intelligence, but then use such practices for nefarious purposes. The US government has finally gotten serious about protecting itself from cyberattacks, but still needs cooperation from the private sector to drive down risk to the nation, Easterly explains, noting that the Cyber Incident Reporting for Critical Infrastructure Act will now require whoever operates critical infrastructure to report attacks coming from state and non-state actors.

GZERO World with Ian Bremmer
How the US will fight cyber wars

GZERO World with Ian Bremmer

Play Episode Listen Later Aug 20, 2022 27:00


en Easterly is optimistic about the state of America's cyber defenses, she tells Ian Bremmer on the GZERO World podcast. As director of the US Cybersecurity and Infrastructure Security Agency, she is tasked with defending the country from all cyber threats, foreign and domestic, at a time when the stakes are very high. The next decade will be a turning point in the global cyber arms race. From Russian-backed ransomware attacks against America's largest oil pipeline to the phone scammer who won't leave you alone during dinner, we're living in a brave new world.   While Russia is the more urgent cyber threat, says Easterly, China could do more damage in the long term. As for non-state actors like ISIS carrying out major cyberattacks, there is "low probability, but high impact.” The bigger problem, she adds, may be nations that use cyber to do somewhat lawful things like collecting intelligence, but then use such practices for nefarious purposes. The US government has finally gotten serious about protecting itself from cyberattacks, but still needs cooperation from the private sector to drive down risk to the nation, Easterly explains, noting that the Cyber Incident Reporting for Critical Infrastructure Act will now require whoever operates critical infrastructure to report attacks coming from state and non-state actors. Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.

On The Edge With Andrew Gold
121. The Cyber Wars | Adam Levin

On The Edge With Andrew Gold

Play Episode Listen Later May 22, 2022 69:08


Adam Levin is a cyber security expert. Adam Levin links: https://adamlevin.com/what-the-hack/ https://open.spotify.com/show/5892yrlZCRK4B1Ns2v6zFP https://twitter.com/Adam_K_Levin Andrew Gold links: http://youtube.com/andrewgold1 http://instagram.com/andrewgold_ok http://twitter.com/andrewgold_ok Learn more about your ad choices. Visit megaphone.fm/adchoices

Break It Down Show
Charles Arthur – Social Warming, Social Media's Dangerous Effects

Break It Down Show

Play Episode Listen Later May 12, 2022 61:07


Charles Arthur – Social Warming, Social Media's Dangerous Effects - Charles Arthur is a journalist, author and speaker, writing on science and technology for over thirty years. He was technology editor of the Guardian from 2005–2014, and afterward carried out research into social division at Cambridge University. He is the author of two specialist books, Digital Wars and Cyber Wars. Get SOCIAL WARMING: THE DANGEROUS & POLARISING EFFECTS OF SOCIAL MEDIA on Amazon at In SOCIAL WARMING: THE DANGEROUS & POLARISING EFFECTS OF SOCIAL MEDIA, releasing August 10 2021 from Oneworld Publications, author and technology journalist of over 30 years, Charles Arthur, helps us understand the crisis being caused by social media and how we can put a stop to it.   Please support the Break It Down Show by doing a monthly subscription to the show  All of the money you invest goes directly to supporting the show!   For the  of this episode head to  Haiku Social media Causing crisis left and right Can we stop it?   ​Similar episodes: Adrian Goldsworthy  DW Wilber  Anna Simons  Join us in supporting Save the Brave as we battle PTSD.  Executive Producer/Host: Pete A Turner  Producer: Damjan Gjorgjiev  Writer: Dragan Petrovski  The Break It Down Show is your favorite best, new podcast, featuring 5 episodes a week with great interviews highlighting world-class guests from a wide array of shows.

Better Known
Charles Arthur

Better Known

Play Episode Listen Later Oct 24, 2021 29:42


Technology writer Charles Arthur discusses with Ivan six things which he thinks should be better known. Charles Arthur's latest book, his third, is Social Warming, which looks at how and why social media has such a dramatically polarising effect on politics, journalism and societies around the world, even in countries where usage is low. His previous two books were on hacking (Cyber Wars, 2016) and the three-way tussle between Apple, Google and Microsoft in search, music and smartphones (Digital Wars, 2012). He was technology editor at The Guardian from 2005-2014, and before that had roles as the technology and science editor at The Independent from 1995-2013. He writes The Overspill, a daily list of links and brief commentary about technology, science and whatever seems interesting (such as the wholesale moving of buildings from one place to another) at http://theoverspill.wordpress.com. The daily list is also available as an email. He is on Twitter at @charlesarthur, and The Overspill is @theoverspill. His work at The Guardian is at http://theguardian.com/profile/charlesarthur. Go board game https://en.wikipedia.org/wiki/Go_(game) Age of Miracles by Karen Thompson Walker https://www.kirkusreviews.com/book-reviews/karen-thompson-walker/age-of-miracles/ Josh Homme's work as a music producer https://www.soundonsound.com/people/josh-homme DuckDuckGo https://spreadprivacy.com/why-use-duckduckgo-instead-of-google/ Whatdotheyknow.com http://www.rtaylor.co.uk/foi-requests-to-central-government-via-whatdotheyknow.html Little Fish https://www.chicagotribune.com/entertainment/what-to-watch/sc-mov-little-fish-review-0203-20210203-wgq6aqhnojbb5kw3byqtstwoky-story.html This podcast is powered by ZenCast.fm

69 Cent Special
Cyber Wars (2004)

69 Cent Special

Play Episode Listen Later Oct 2, 2021 86:31


SOUND EFFECTSPigeotto CryChameleon Twist OST - Title Screen

Brief News Brief
Brief News Brief - July 7th 2021 - The Earth is on Fire

Brief News Brief

Play Episode Listen Later Jul 7, 2021 11:43


The Existential Threat of the Planet Earth   The Cyber Wars have Begun   Miami Condo Collapse

Cyber Humanity
41: Cyber Wars: Revenge of the Printers

Cyber Humanity

Play Episode Listen Later Jul 6, 2021 43:09


There's a lot to cover in this week's episode, so brace yourself because we've got newsflashes and stone-cold facts flying your way.  First up, despite what Chris thinks, people do still use printers. Now, researchers in China have found (and accidentally disclosed) a critical Windows zero-day affecting Print Spooler. Cue much printer hate, as well as some actually useful insights into what has occurred.  Next on the agenda, we take a look at the HSE Ireland ransomware attack, with a special focus on what the heck has been going on with Virus Total. Also coming up is the somewhat intriguing “fact” that the USA is the most cyber-secure nation in the world.  And it wouldn't be an episode of Cyber Humanity without a juicy ‘hackers could' feature starting with a NEWSFLASH! Homes filled with smart devices could be exposed to hundreds of hacking attempts a WEEK. To which we say: no sh*t, Sherlock. *** https://www.infosecurity-magazine.com/news/printnightmare-zero-day/ (https://www.infosecurity-magazine.com/news/printnightmare-zero-day/) https://www.theregister.com/2021/06/30/america_global_cyber_security_index_2020/ (https://www.theregister.com/2021/06/30/america_global_cyber_security_index_2020) https://www.bleepingcomputer.com/news/security/microsoft-finds-netgear-router-bugs-enabling-corporate-breaches/ (https://www.bleepingcomputer.com/news/security/microsoft-finds-netgear-router-bugs-enabling-corporate-breaches/) https://www.bleepingcomputer.com/news/security/virustotal-ordered-to-reveal-private-info-of-stolen-hse-data-downloaders/ (https://www.bleepingcomputer.com/news/security/virustotal-ordered-to-reveal-private-info-of-stolen-hse-data-downloaders/)

Business Wars
Encore: Southwest vs American Airlines | Aviation Cyber Wars | 3

Business Wars

Play Episode Listen Later Jun 30, 2021 21:44


The computer age is on the horizon, and American Airlines has a secret weapon: SABRE. Sure, the airline is top of the heap under the current pen-and-paper reservation system — the one where travel agents use a massive phonebook to look up flights, then call individual airlines to book a ticket. But they're tired of playing phone tag. The American Society of Travel Agents has plans to roll out a new electronic system, one that could force American to lose its unofficial preferred status. The company has to get its system to market first — and its leaders have to convince the travel agencies to get onboard. But there's a much bigger threat looming on the horizon, one that could give a big boost to upstart rivals like Southwest Airlines. Deregulation is coming, and when it does it will change everything. Listen to new episodes 1 week early and to all episodes ad free with Wondery+. Join Wondery+ for exclusives, binges, early access, and ad free listening. Available in the Wondery App https://wondery.app.link/businesswars.Support us by supporting our sponsors! Fiverr - Get 1 free year and save 10% on your purchase on Fiverr Business with promo code WARS. Just go to fiverr.com/business, and don't forget promo code WARS.Privacy Policy and California Privacy Notice.

Bumper 2 Bumper
#63: Histamines, Cyber Wars & Kelp w/ Chris & Rick

Bumper 2 Bumper

Play Episode Listen Later Jun 7, 2021 27:22


Chris talks about removing histamines from his diet while Rick chats about Doctor Anthony Fauci.

Politics: Meet Me in the Middle
66 - Hacked: Cyber Security with David Holtzman (Part One)

Politics: Meet Me in the Middle

Play Episode Listen Later May 24, 2021 38:00


Bill Curtis and Jane Albrecht discuss cybersecurity with author and tech-wiz, David Holtzman. They dive deep into the Colonial Pipeline Hack, ransomware, and Solar Winds. You’ll learn about the capabilities of Russia, China, and other nations in the cyber-wars. Do you want to know what Zero Day means, who’s DarkSide, Fancy Bear and Cozy Bear?... which software is the safest, Apple or Microsoft? And how wars will be fought in the future? This two-part series on cyber-intelligence will certainly deliver. Episode Timestamps: 3:16 Why do countries get hacked? David Holtzman is a world-class information technologist, currently working with global block chain companies, with deep expertise in privacy, encryption, ethics, cybersecurity, digital registries and intellectual property. 5:05 The Colonial Pipeline Hack 6:16 Panic Buying and Hacks (DarkSide) 9:19 Two Types of Hackers 10:30 Negotiating with Hackers 11:08 The Solar Winds Hack and Russia 12:54 Deduction and knowing who’s the Hacker 14:34 Tracking what information was hacked 16:16 How to handle the backdoor second hack attack 17:45 Lessons Learned from Hackers and USA Cyber intelligence 20:36 Trump and classified intelligence 21:36 Do we have proof that Trump passed info onto the Russians? 23:36 What is Zero Day? 24:54 Apple vs Microsoft and Hacking 28:02 Mutual assured annihilation 29:50 Ramifications of Hacking 32:44 Cold War References and destruction 34:00 Defending against Russian Aggression  ---------------------- Learn More:  https://www.curtco.com/meetmeinthemiddle Follow Us on Twitter: https://www.twitter.com/politicsMMITM Hosted by: Bill Curtis and Jane Albrecht Edited and Sound Engineering by: Joey Salvia Theme Music by: Celleste and Eric Dick A CurtCo Media Production https://www.curtco.com See omnystudio.com/listener for privacy information.

ICRC Humanitarian Law and Policy Blog
Even ‘cyber wars' have limits. But what if they didn't?

ICRC Humanitarian Law and Policy Blog

Play Episode Listen Later May 19, 2021 13:09


Cyber operations have become a reality of today's armed conflicts, and their use is likely to continue to increase in the future. In response to this trend, the ICRC has long maintained that international humanitarian law (IHL) governs – and limits – any use of cyber operations during armed conflicts. But what is really at stake? In this post, ICRC legal advisers Tilman Rodenhäuser and Kubo Mačák explain that the risk of harm to humans is significant, and that the seemingly technical issue of IHL applicability in cyberspace makes a difference in the real world.

scary(ish) podcast
Scaryish - Ep 152: Cyber Wars & The Black Volga

scary(ish) podcast

Play Episode Listen Later Nov 10, 2020 58:01


Robin & Adam proudly present Episode 152 of Scary(ish)! Adam details multiple instances of crimes or warfare carried out in the digital realm while Robin tells the creepy tale of a phantom car known as The Black Volga. Listen, Share, Subscribe, and Review!

KLRNRadio
Cyber Wars REPLAY: More Chy Nah

KLRNRadio

Play Episode Listen Later Oct 27, 2020 67:46


Beyond Solitaire
Episode 10 - Doug Glover and Mitch Reed on Military Wargaming

Beyond Solitaire

Play Episode Listen Later Jul 20, 2020 67:43


In this episode, Liz interviews Doug Glover (Lead Pursuit Podcast) and Mitch Reed (No Dice No Glory)—both military men and hobbyist wargamers—about the forms wargaming can take in their professional and personal lives. Also, catch ALL of us at Cyber Wars, a digital event being run by HMGS. Info here: https://www.hmgs.org/page/CyberWarsSTD01All episodes of my podcast are available here: https://beyondsolitaire.buzzsprout.com/Enjoy my work? Consider getting me a "coffee" on Ko-fi! https://ko-fi.com/beyondsolitaireTo see all of my solo reviews and videos, click here: http://www.beyondsolitaire.net/solo-reviews.htmlContact Me: Email: beyondsolitaire at gmail.comTwitter: @beyondsolitaireInstagram: @beyondsolitaireFacebook: www.facebook.com/beyondsolitaireWebsite: www.beyondsolitaire.net

Foreign Policy Focus
Trump Gives CIA Approval for Cyber Wars guest Will Porter

Foreign Policy Focus

Play Episode Listen Later Jul 17, 2020 44:36


Will Porter returns to Foreign Policy Focus to discuss the new report that Trump gave the CIA approval to wage cyberwar. The approval was granted in 2018, after being denied by both Bush and Obama. The order allows for the targeting of countries including Russia, China, and Iran. Will details a recent series of disasters in Iran and how Trump's cyberwar may have played a role.  Links Intercept - Banks make $18 billion Yahoo - Cyberwar Nation - Army recruits with Twitch

No Dice, No Glory Podcast Page
No Dice No Glory Episode 65: HMGS CYBER WARS

No Dice, No Glory Podcast Page

Play Episode Listen Later Jul 15, 2020 32:08


In this episode, we talk to the organizers of HMGS CYBER WARS, and online gaming event scheduled for 23-26 July. For more info go to https://www.hmgs.org/page/CyberWarsSTD01

KLRNRadio
Cyber Wars: APT 41 Evolution from Games to Government Espionage

KLRNRadio

Play Episode Listen Later Apr 20, 2020 60:51


Avoiding internet predators, APT 41 thanks to Fire Eye.

KLRNRadio
More Bears: Cyber Wars APT Bear Discussions

KLRNRadio

Play Episode Listen Later Mar 2, 2020 66:06


KLRNRadio
Replay: The Bears - The APT Beginning of Cyber Wars

KLRNRadio

Play Episode Listen Later Mar 2, 2020 61:02


Cyber Wars
More Bears: Cyber Wars APT Bear Discussions

Cyber Wars

Play Episode Listen Later Mar 2, 2020 66:06


Cyber Wars
Replay: The Bears - The APT Beginning of Cyber Wars

Cyber Wars

Play Episode Listen Later Mar 2, 2020 61:02


Snackable Reads Podcast
002-Podcast Cyber Wars and Koi Ponds

Snackable Reads Podcast

Play Episode Listen Later Aug 14, 2019 6:11


002-Podcast Cyber Wars and Koi Ponds There was a story in the new recently about a cargo ship that could not navigate because all its maps were on the ship’s computers and the computer went down due to a malware virus. This reminded me of a short story I wrote a few years ago, Too […]

Craig Peterson's Tech Talk
50 years of the moon landing. The cybersecurity gap and flaws in both iOS and Android apps, the cyberattack on Iran and data breach liability and more on TTWCP Today

Craig Peterson's Tech Talk

Play Episode Listen Later Jul 25, 2019 28:09


  Soon we will 50 years of the moon landing, why do some think we were never there? The cybersecurity gap and flaws in both iOS and Android apps. The U.S. launches a cyberattack on Iran How much liability do you have for a data breach? I am planning a Security Summer for my listeners.  I will have some free courses.  I will also introduce you to some of the software that I use for my clients and how you can use it too.  Also, I have some limited opportunities for businesses who have had enough with their security issues to work with me and my team and put their security problems to rest once and for all.   So watch out for announcements on those. For more tech tips, news, and updates visit - CraigPeterson.com --- Transcript:  Below is a rush transcript of this segment; it might contain errors. Airing date: 07/06/2019 In a few short weeks, we will celebrate 50 years of the moon landing. The cybersecurity gap and flaws in both iOS and Android apps, the cyberattack on Iran and data breach liability. ---- Craig Peterson Hello, everybody and welcome course, this is Craig Peterson, your host for the next time, give or take 27 minutes, we're going without commercial interruption again, we are going to be talking about some of the details of our lives are digital lives. And with the 50th anniversary of the moon landing coming up, we wanted to go through some of the facts there, because we've had a lot of people who seem to be confused about it. And it's kind of amazing to me because I remember it so well like it was yesterday. But it's amazing to me to think that more than half of the people alive today. Were not alive when the moon landing occurred. And, you know, that's just a matter of perspective. So you're, you're talking to me, and I'm a little bit older, I guess. And then most people if that's the case, but anyways, talk a little bit about that, the cybersecurity gap. And some interesting observations that were in Forbes magazine here this past week about it. flaws in our iOS and Android apps, you might be surprised. But there are security flaws in almost as many iOS apps from Apple, as our Android will tell you why. And what those are. We have some new Mac malware that's out there right now. And this is an interesting one because this could go both ways. You could call this a user error. Or you might want to call it a security problem that Apple has, or maybe Apple created, but it is behaving the way it's supposed to. Third-Party contractors, this comes from this week, I did a big presentation for University of New Hampshire group here. It is a mastermind group of CEOs. And we were talking about the biggest liabilities, and more than 60% scent of your fast is coming from inside. And that includes contractors. So we'll talk a little bit about that couple of warnings here from 3 am, about business travelers, we got to talk about this, the US has launched a cyber attack, instead of launch launching a kinetic attack, and we'll talk a little bit about the implications to you and your business because of that. And there could be some enormous implications there. And a little bit more here about liability for a data breach. So we're going to talk about all of this right now. So let's get into it. First off liability for a data breach. As I mentioned, I had a great presentation, and I think it was created at a lot of compliments on it, as I spoke at this mastermind group for the University of New Hampshire. And it was kind of fascinating because there were several different CEOs, I guess this group has kind of a non compete thing where none of the members can compete with each other. I'm in a mastermind group, a paid group and there, they don't have that restriction, you have to be a good person. But there are people in your same line of work, I kind of like that. As a general rule, there is a lot of business out there for everybody. When you can talk to someone that speaks your language in your line of work about what's happening is important. I had a few people comment afterward, the stories that I will Vin about clients of mine, that have had security problems, we're unable to solve them themselves. You know, they tried, obviously, but they weren't successful, because they got hacked, they got breached. So, you know, I use a lot of stories with some of these things. And when we're talking about a data breach and your liability, I did bring that up this week. But it's huge. And we're talking about an average cost right now, for a data breach of over $7 million. Here in the US, it's 3.8 million average, worldwide. But it's about twice that here in the United States. As we look at some of the data breaches, it's going to continue to grow. There's going to be more and more companies that are failing to assess their systems for security flaws. And that's why you got to have a third party come in, and you can't trust your CIA. So your security person to do these types of audits, you need a third person to do it. And then you have to plug the holes. And sometimes you can have that third party do it because maybe they know what they're doing. Many times, if you're a slightly bigger company, and you have your own IT staff than your it, the staff is going to do it. But you got to think about who when you get hacked. What are you going to do? Your data is gone, you know, are you out of business is your goose cooked is the expression, great article, and Kiplinger that I have up on my website right now about it? And are you as a business person on the hook for any losses sustained by the client, and I spent some time in the presentation talking about insurance. And that is an essential thing to have. for your business. However, more and more of the cyber liability insurance claims are getting cut back or even denied. Because the company hasn't been doing everything that they should have been doing, even not doing things are listed in the contract insurance contract. So two main ways that civil liability for a data breach can occur. One is finding negligence. You have to be aligned with the peers in your industry, the best practices if you will. If you're not if you could have had better protection, then yes, indeed, you may have civil financial liability and some of those governmental fines we've talked about on the show before. And secondly, even if you did everything that was required to prevent a data breach, it could still happen. So then the next stage is, did you do enough after the event to reduce the harm to the people affected? You know, did you notify them right away? Did you take immediate investigation remediation steps? Did you contact law enforcement? What did you do after the fact is considered reasonable? All the things we need to keep in mind as we are business people. And having that plan in advance can save you a ton. I went through some of those statistics as well. Here are some good points for everyone to pay attention to one have a breach coach who can help you put together your breach plan and then run the ball response and get an attorney involved getting them involved early. Everyone should know what their roles are. That's part of what we have, that's going to be part of our security summer this year. So make sure you're signed up. Because we have some documents about what your plan should look like who should be involved whose responsibility is each part of that, then so that it just makes a huge, huge difference. These people who are most liable if you're a consumer, and you've had your information breached, pay attention to this as well, because you have the other side. One, if you collect payment information for online sales, if you maintain a database of personal information on current past or prospective customers, and say you have employees, if you store information about employees digitally, including social security numbers, medical information, guess what we're getting into their the HIPAA regulations, I bet you thought if you weren't a medical practice, you didn't have to worry about it HIPAA while you do if you have employees, if you rely heavily on technology for daily operations, remember, you're going to be out of business out of operation for days, weeks, or even longer. If you are located in any jurisdiction that has a mandatory Breach Notification laws. Right now, that is true of everywhere in the world. Well, you know, the first world countries, if you will, the United States has them. For every state, there are some federal notification laws. Depending on what type of business you have. Same things true in Canada, the same things true throughout Europe. So be careful here too, with cyber insurance coverage. And we talked about that this week with the UNH co people, and what you should have what you can expect from cyber insurance coverage. And again, we'll talk more about this during our security summer, and if you haven't already, make sure you sign up, go to Craig Peterson dot com, and you'll see a sign-up, come up right at the top of the homepage, you can sign up right there. And I'll let you know when the security summer starts. But we're going to be covering all kinds of stuff about firewalls about backups about the liabilities, CEO type things through home users, and what you can do what you should do. Mac This is called malware. As I said, I kind of debate, whether it is malware, because the software is behaving as expected. Mac OS has something now called gatekeeper. And it keeps an eye on the programs on your computer, what you download where it came from, is it signed. And it allows developers to have software that you download that is signed, and then refers offsite to allow you then to get additional files, get it a database server. And in this particular case, that is being talked about over on ZD net. At lunch, you gain access to a file server, and it's called an NFL server. And this is the calling that ZD next call is a security flaw. I'm not so sure it's a security flaw. Apple has known about it for a month, they haven't patched it, it would be easy enough to patch, but it would also break a lot of good software out there. So here's the trick. If you're running a Mac or a PC or anything, do not download software from sites that you are not 100% confident can be trusted. It's just that simple. It's back to the brass tacks. get right back to it. What are the brass tacks and security one of the first is don't click on stuff? In particularly don't look download and run software that is on your, you know, on a web browser that you're putting on your computer. Now we know President Trump said he was going to respond to the Iranian aggression and shooting down is drunk. And there's dispute by Iran whether or not the drone was in the Iranian airspace. And there's some question about that, too, because the United States, for instance, claims a 200-mile jurisdiction. the international agreement says it's a 12-mile zone, and some are 20 miles, and the Straits of Hormuz are I think it's 12 miles there the narrowest point. So was it an international space? Technically, yes. Did Iran claim the space it was in as their own? Well, they did. So President Trump pulled out of this kinetic attack, we were going to bomb, there, the radar installations and the missile launch in facilities. It came out this last weekend that we hacked them. Now, I found out something exciting about this Russian power security breach that happened a couple of weeks ago, don't know if you heard about that. But apparently, we broke into and had control of several Russian power stations located in Russia. We flipped the lights on and off a few times to let them know - Hey, guys, we're here, Quit messing around with our elections and Quit messing around with any other stuff that's out there. We have that capability. President Obama put some cyber offensive capabilities in place, and President Trump has upped the game there. And apparently what he did this was the report from last week weekends he authorized our cybersecurity guys to attack Iran. Now, when Russia attacked Ukraine, of course, that piece of malware spread worldwide and brought down hundreds, thousands of computers, s down, taken off the internet, and many others were ransom because Russia did not have control over that malware. We got malware into some of their missile launch systems. And we were able to shut them down. And possibly it didn't spend any farther. Just like when we got into their centrifuges for making bombs for their purification of uranium, that code did not get any further than the centrifuges and destroyed them. Now, we went after them, and US businesses now should be ready for what's going to be a massive attack from Iran. We remember Iran doesn't have the finesse we do, and they don't have all of the talent that we do. And they don't care if they're hitting a military target or not. When it comes to CYBER WARS, these retaliatory strikes from there are very likely to hit pretty much anybody here in the US. They've already been attacking us before President Trump launched this attack, apparently against them. According to The Washington Post, Iran has been bombarding US businesses with software designed to wipe the contents of networks and computers, rather than to steal their data, which is rather interesting. It was from Chris Krebs, a director of the Homeland Security department's Cyber Security Division. And what that means is if the Iranians get ahold of your business systems are your home system, they are going to wipe it clean. So make sure you have excellent backups. Again, if you don't make sure you attend my training here my security summer because we're going to be going over that this is free people. It's free for anyone to attend, you can upgrade if you want to that's paid. But you're going to get all of the core information absolutely for free. And I think we're going to do it is no matter where whether they pay you or not, you're going to get all the information for free. The same data, let me put it that way. Whether you decide to get the golden ticket, or Jessica can do it for free, that that's what I'm doing for the radio listeners, anyone can attend because I want to get this information out there. So be prepared for the Iranian attack, they've already started attacking our businesses, we've already had North Korea attack Russia. I mentioned this that the CEO presentation I gave this last week for the UNH group. I was looking at one of our customers, just at their website, and looking at the firewall because we have some very advanced firewalls sitting in front of even web servers. These firewalls that we were looking at just for that one web server, we were logging, five attacks, which was just crazy. Five attacks from Russia! It wasn't as I said, it wasn't only five attacks from Russia, it was five attacks per second, on average, over the last 36 or 48 hours. It was just crazy how they were getting just nailed, nailed, hammered. You guys already know, if you listen to me for a while about a client that we picked up, that had been having email issues. We looked into it, and we ended up we asked the client, it was okay to do this. We ended up bringing the FBI in because we found Chinese back doors into their systems. And they were a manufacturer, they had all of their plans, of course, electronically, all of the manufacturing, etc., etc. So now what now they get to compete against China, with their designs. Amen. To me, that blows my mind, frankly, how could you? How could you do that? It's, but it's ignorance. It thinks you're okay. Going back to this story, let me go back to this is the one from Kiplinger, I was referring to earlier here, here's a great little quote from the author here, Dennis Beaver. He said my father is a dentist, and up in years, his office has all of his patients records stored electronically, which he accesses from home from his laptop by leaving the server always on at the office. I mentioned this to a geeky friend. And the next day, he showed me dental records from my dad's office that he had hacked, he claimed to be doing this as a favor to get my father's attention about cybersecurity, and I believe them. So by the way, be careful, don't just to that without permission. We have ethical hackers in my business here, who are doing penetration testing, but we make sure we've got full approval from the company. So don't, don't just go and do this. So the story goes on. I told that, and he immediately changes passwords but didn't seem too bothered. There was another one. I knew one fortune 500 companies CFO who used the same password for over ten years, most think that it's a joke, but it was improved. It was not so funny after they found his credentials in seven data breaches used to hack the company's email servers, spoof emails, and steal 10s of thousands of dollars without anyone noticing for months. We picked up a client here, a local one here in the northeast who had had $80,000 taken out of their operating account. Of course, they noticed it quickly, but not before the money was gone entirely. So be very, very careful, we're going to cover these things in our security summer, again, just Craig peterson.com. And subscribe right there on the homepage. And we'll let you know when that starts. That's probably going to be mid-July by the looks of things right now. And we're talking about 10 to 15 minutes sessions a couple of times a week. And we're going to keep them up for least a week in case you miss it so that you can watch one of the replays a little bit later on. Okay, man, we are almost out of time here. 76% of mobile apps have flaws, allowing hackers to steal passwords, money, and text. These are some high-risk vulnerabilities that are common across Android and iOS, Android has a little bit more risk than iOS, were talking about, but 5% higher risk. And this is according to a company called positive technology. And they went in and looked at some of these mobile apps and the biggest problem in secure data storage. So be careful about that. Again, Cisco has an answer to that. And with iOS, it's just phenomenal. Nobody has anything like this other than Cisco. But be very, very careful because there are other products out there that could be useful to you. But remember, any data stored can be stolen, you can't necessarily trust the app developers, they might be taking your data. Great article, you'll see it on my website. It is from Forbes, and this is about the cybersecurity skills gap and how classrooms are not the solution. Have a look on my website for that one. Business travelers, something new called visual hacking coming from the Czech Republic. Again, that's up on my website and in this morning's newsletter, and the US launches a cyber attack aimed at Iranian rocket and missile systems. I'll talk a little bit about that. We've got a couple of great articles, online. I spoke with the UNH CEO mastermind group this week about third party contractors and why they are our weakest cybersecurity link. And they're just not being held accountable. You know, if you ask people who are the biggest cybersecurity threats out there, who have I talked about today? I've mentioned what Russia, China, I mentioned North Korea and Iran. You'd be right. But those countries are the most significant foreign threats. As I said this week at the speech I gave, the real problem is internal. And by internal, I don't just mean your employees, I mean, your contractors. It's one of the things you have to go through you have to consider penetration testing, taking an analysis of your business, and the data security. Here's the Customs and Border Protection. I talked about this a couple of months ago, on May 31. So it wasn't even two months ago, they had a breach where 100,000 people were photographed inside vehicles, crossing the border in a couple of lanes, and included images of the vehicle license plates, maybe some other stuff that was that stolen, it was taken through a third-party contractor that was doing work for Customs and Border Patrol. The most signal severe breaches of the last ten years have also been self-inflicted. So let's look at this one. It appears in The Hill from Flexiera. Patches were available for 86% of the vulnerabilities on the day of disclosure. In other words, when these companies came forward and told people about the hacks that had happened 86% of those hacked, it didn't have to happen, because there were patches out already. Okay, other breaches. They gained access by compromising third-party vendors like were talking about and stealing their credentials to log into the corporate network of the eventual target. Speaking of Target, back in 20 1340 million credit cards lost through a third party air conditioning provider that was hooked up to the corporate network, all they had to do is break into the air conditioning system. And now they had a launchpad. Think of what happened out in Las Vegas, a beautiful big fish tank, and they put a smart controller in it that would warn them when their temperature got too cold because the fish are so expensive. It was hooked up to their network, and it was compromised and used it as a launching pad. We see that all the time with cameras security cameras. They breached the Office of Personnel Management through Key Point government solutions. A third party used by the Office of Personnel Management. And it gave China 21 million personnel files including background checks on top security clearances. In 2017, Australian defense subcontractor lost 30 gigabytes of highly sensitive data, including information on the Joint Strike for Strike Fighter program. Crazy. By the way, they had not updated their software in 12 months. In 2018 China compromising network of yet another defense contractor doing work for the Navy. Our technology, our advances our military superiority were stolen from us, again, from the hill in an assessment delivered to Navy SECRETARY RICHARD Spencer in March and reviewed by the Wall Street Journal, the Navy and its industry partners are under cyber siege by Chinese and Russian hackers. So think about all of that when you are thinking about your business and even your home computer. Segment your networks, break them up, use good passwords, this is all stuff we're going to review in our security summer. Again, Craig Peterson calm, you can say him, email me and I'll let you know when it happens. Me at Craig Peterson calm. We're going to cover all of this. So you guys know what to do, whether you're an individual, or small-medium business because in most companies face it, who's the computer guy or gal? It's whoever likes computers the most, or maybe whoever wanted to raise they're not necessarily computer professionals. And it's extremely, rare that their security professionals, security professionals, you know, we're working every day trying to keep up to date. And I've been doing this for 30 years, and I'm still learning stuff. So be careful, hire outside firms. Okay, blah, blah, okay. On to the Apollo program. There are many people I read a book, and I remember reading this back in the early 80s. And I marked it all up. And it was about how the lunar landing was a hoax. Hollywood has made some films about it. And more and more kids nowadays think the whole thing was a setup. So this is a great article, written by Ethan Siegel. There you go. And we are talking a little bit about the moon landing. So let's go through this. People are saying that the entire space program and NASA is nothing more than a hoax. But let's get go through a little bit of evidence. Number one, we can still see the evidence of the Apollo program on the moon even today. If you walk on the sand on a beach, the waves are going to level it out, and there won't be any sign that you were ever there. Right. But none of that exists on the moon. Even in the Sahara Desert on the sand, you've got the shifting winds that shift that sand around. That is not true on the moon. We have pictures from regular people of the moon of the landing site, Apollo 12,14, and 17. They photographed those from Earth. On the Apollo 12 landing sites. There is a ton of stuff you'll see this article. You can view all of the pictures. It is from Forbes magazine. You can see it up on my website at Craig Peter song calm. I have a link to a number to extensive photographic and video evidence from the Apollo missions themselves. The one I like the best is one that I am most personally familiar is the lunar Laser Ranging retro-reflector, and there are many others. But this is one that we HAM's us we can bounce off of the moon there's a reflector that was left up there by the Apollo missions we can bounce a laser off, and we use that scientifically to figure out how far the moon is away. But there are also lunar sighs month the seismometers there is the solar wind composition spectrum lunar surface Magnum, Magnum, meter, magnetometer, lunar dust collector, many more. All were left up there all ran for years. Some of this stuff is still running so we were there to let them tell you otherwise. Take care, everybody. Make sure you sign up for the security summer. Craig Peterson dot com, take care, everybody. Bye-bye. ---  Related articles: Hillary Clinton and CyberSecurity — In What Universe?  What Did You Say? The Forever Recordings of Alexa The Landscape of Streaming TV is Changing be prepared to Pay More IoT Insecurity Its a Problem for Businesses and Consumers Alike Didn’t Update Your Outlook — Watch Out For Iranians Hacks O365 Non-Security – again Crypto trust is costly and hidden Organized crimes latest drive-by’s attacking website visitors   ---  More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
Did the Apollo moon landings happen?. Yes they did! Are we in a Cyberwar with Iran? What you need to know the risks with third party contracts and more on TTWCP Today

Craig Peterson's Tech Talk

Play Episode Listen Later Jun 29, 2019 28:09


  Did the Apollo moon landings happen?. Yes they did! Listen in to find out how it is provable 50 years later. Are we in a Cyberwar with Iran? Unfortunately, yes and why you might get caught in the crossfire. Business Productivity, for many it means the use of Third Party Software and Cloud Services.  But is it safe?  How to protect yourself.  Visual hacking and why it is putting Business travelers at risk. I am planning a Security Summer for my listeners.  I will have some free courses.  I will also introduce you to some of the software that I use for my clients and how you can use it too.  Also, I have some limited opportunities for businesses who have had enough with their security issues to work with me and my team and put their security problems to rest once and for all.   So watch out for announcements on those. For more tech tips, news, and updates visit - CraigPeterson.com --- Transcript:  Below is a rush transcript of this segment; it might contain errors. Airing date: 06/29/2019 Did the Apollo moon landings happen?. Yes they did! Are we in a Cyberwar with Iran? What you need to know the risks with third party contracts. ---- Hello, everybody and welcome. Of course, this is Craig Peterson, your host for the next give or take 27 minutes, we're going without commercial interruption again. We are going to be talking about some of the details of our digital lives. With the 50th anniversary of the moon landing coming up, we wanted to go through some of the facts about that event because for some odd reason a lot of people seem to be confused about what took place. It's kind of amazing to me because I remember it so well like it was yesterday. It's incredible to me to think that more than half of the people alive today were not even alive when the moon landing occurred. That's just a matter of perspective, right? We'll talk a bit about the cybersecurity gap. There was an article with some interesting observations in Forbes magazine this past week about it. We will discuss some flaws in both iOS and Android apps, and it might surprise you, but there are security flaws in almost as many iOS apps from Apple, as Android and I will tell you why and what those are. We have some new Mac malware that's out there right now, and it is an interesting one because it could go both ways. You could call this a user error. Or you might want to call it a security problem that Apple has, or maybe one Apple created. However, it is behaving the way it's was designed to work. This week, I did a big presentation for a University of New Hampshire mastermind group of CEOs. We were talking about the most significant cyber liabilities, and I shared that more than 60 percent of your theft is coming from inside. From inside I mean, those with authorized access which includes all Third Party Contractors. So we'll talk a little bit about that. If you travel for business, 3M has a couple of stark warnings for business travelers. Oh my, we've got to talk about this, the U.S. launched a cyber attack against Iran, instead of beginning with a kinetic strike. We'll talk a little bit about some significant implications to you and your business because of that. Then a little bit more here about liability for a data breaches and we will talk about all of this right now. So, let's get into it. First off liability for a data breach. As I mentioned, I had an excellent presentation this week at this mastermind group for the University of New Hampshire. There were a lot of interactive questions and comments about what I presented. It was kind of fascinating because there were several CEOs from various industries. For this group, they have a non-compete criterion that precludes the members from directly competing with each other. I belong to a mastermind group, a paid group, and they don't have that type of restriction, you have to be basically a decent person, and so there are many people in your same line of work, I kind of like that. As a general rule, there is a lot of business out there for everybody. And being able to talk to someone that speaks your language that's in your line of work, and discuss with them what's really happening is a huge deal. After my presentation, I had a few people comment afterward, that the stories that I wove in about clients of mine, that experienced security problems and were unable to solve them themselves. They tried, obviously, but they weren't successful, because they got hacked, they got breached. I use a lot of stories with some of these things, and it is especially important when we're talking about a data breach and your liability. I didn't get to bring that up this week, but it's absolutely massive. How significant is that liability for a data breach right now? We're talking about an average cost of over $7 million here in the U.S. The worldwide average is 3.8 million, but here in the U.S., it's about twice that. When we're discussing some of the data breaches that are going on and how they are continuing to grow, there's going to be more and more companies who are failing to assess their own systems for security flaws, realistically. That is why you need to have a third party come in. You can't trust your CIO or your in-house security person to do these types of audits, you need a third person to do it. Then once they have identified your weaknesses, you have to plug the holes. Sometimes that will also require the services of a third party do it because they know, exactly what they're doing. Many times, if you're a slightly bigger company, and you have your own I.T. staff. Then your I.T. team is going to do it. But it is something you have to think about. When you get hacked, what are you going to do? Your data is stolen, and you are out of business or as the expression goes - your goose is cooked. There is an excellent article from Kiplinger that I have up on my website right now about this very thing. As a business owner, CEO you on the hook for any losses sustained by your clients. I spent some time in the presentation talking about insurance. And that is an essential thing to have. For your business. However, more and more of the cyber liability insurance claims are getting cut back or even denied. Why? It is because companies are not doing everything that they ought to do, those things that are listed in the insurance contract. There are two main ways that civil liability for a data breach can occur. One is finding negligence. That is determined by whether your company is aligned with other peers in your industry, and adherence to the best practices if you will. If you're not or if you could have had better protection, then yes, indeed, you may have civil financial liability. Including some of those excessive governmental fines and penalties, we've talked about on the show before. Secondly, even if you did everything that was required to prevent a data breach, it could still happen. The next stage is, did you do enough after the event to reduce the harm to the people affected? Did you notify them right away? Did you take immediate investigation remediation steps? Did you contact law enforcement? What did you do after the fact, was it considered reasonable? These are all the things we need to keep in mind as business people. Having that plan in advance can save you both time and money. I went through some of those statistics as well. Here are some good points for everyone that this article makes and you should pay attention to. One you should have a breach coach who can help you put together your breach plan and who can run the breach response. It is crucial to get an attorney involved and involved early. Everyone should know what their roles are. This will be part of our security summer this year. So make sure you're signed up. I will have some documents about what your plan should look like who should be involved whose responsible for each part of that process. It can make a huge, huge difference. Here are the most liable people. If you're a consumer, and you've had your information breached pay attention to this as well because you have the other side. As a business if: You collect payment information for online sales, You maintain a database of personal information on current past or prospective customers You have employees, and you store information about employees digitally, including social security numbers, medical information (guess what you have HIPAA liability) I bet you thought those only applied to medical practice, you didn't have to worry about HIPAA, Well, you do. You have employees, You rely heavily on technology for daily operations( remember, you're going to be out of business, out of action for days, weeks, or even longer.) You're located in any jurisdiction has a mandatory Breach Notification laws. Right now, that is true of everywhere in the world. Well, in the first world countries, if you will, the United States has them. For every state, there are some federal notification laws. Depending on what type of business you have. The same is true in Canada and throughout Europe. Be careful here, too, when you are selecting your cyber insurance coverage. What you should have, what you can expect from that cyber insurance coverage. We'll talk more about this during our security summer, if you haven't already, make sure you sign up, just go to Craig Peterson dot com. There you'll see a sign-up, come up right at the top of the homepage, and you can sign up right there. I'll let you know when the security summer starts. We're going to be covering all kinds of stuff about firewalls about backups about liabilities, CEO type things all the way through home users. What you can do, what you should do. This week some are saying that Macs are infected with what they are calling malware. As I said, It's debatable whether it really is malware, because the software is behaving as expected. Mac OS has something now called gatekeeper, it keeps an eye on the programs on your computer, what you download where it came from and is it signed correctly? It is used by developers to have software that you download that is then referred off-site to add additional files, to get into the database server, etc. In this particular case, that is being talked about over ZDNet, it lets you gain access to a file server, it's called an NFS server. ZDNet is calling this a security flaw I'm not so sure it's a security flaw. Apple has known about it for a month, they haven't patched it, it would be easy enough to, but it would also break a lot of good software out there. Here's the trick. If you're running a Mac, or a P.C. or anything, do not download software from sites that you are not 100% confident can be trusted. It's just that simple. It's back to the brass tacks, right? Get right back to it. What are the brass tacks? In the security field, one of the first is: Don't click on stuff. Don't download and run software that is on your on a web browser on your computer. Now we know President Trump said he was going to respond to the Iranian aggression and shooting down our drone. There's dispute by Iran whether or not the drone was in the Iranian airspace. There's some question about that, too, because the United States, for instance, claims a 200-mile jurisdiction. The international agreement says it's a 12-mile zone, and some are 20 miles. Well, when we're talking about the Straits of Hormuz, I think it's 12 miles at the narrowest point. Is it an international space? Technically, yes. Did Iran claim the area it was in as their own? Well, obviously, they did. President Trump pulled out of a kinetic attack, we were ready to bomb their radar installations and their missile launching facilities. It came out this last weekend that instead we apparently we hacked them. Now, I found something exciting about this Russian power security breach that happened a couple of weeks ago. I don't know if you heard about that. But apparently, the U.S. broke into and had control of some Russian power stations located in Russia. We flipped the lights on and off possibly a few times to let them know, Hey, guys, we're here, Quit messing around with our elections and quit messing around with some of the other stuff that is ours there. We have that capability. President Obama put some cyber offensive capabilities in place, and President Trump has really upped the game there. Apparently, what he did, and this was the report from last week weekend, is that he authorized our cybersecurity guys to attack Iran. Now, when Russia attacked Ukraine, of course, that piece of malware spread worldwide and brought down hundreds of thousands of computers, as many were shut down, taken off the internet, and many others were held ransom because Russia did not have control over that malware. We apparently got malware into some of their missile launch systems. We were able to shut them down so that it didn't spread any farther. It is just like when we got into their centrifuges for making bombs for their purification of uranium, that code did not get any further than the centrifuges and destroyed them. Now, we went after them. U.S. businesses now should be ready for what's going to be a massive attack from Iran. We remember Iran doesn't have the finesse we do, they don't have all of the talents that we do. And they don't really care if they're hitting a military target or not. When it comes to CYBER WARS, these retaliatory strikes from Iran are very likely to be against pretty much anybody here in the U.S. They've already been attacking us before President Trump launched this attack, apparently against them. They've been bombarding us with software that's designed to wipe the contents of networks and computers, rather than steal their data. This is according to The Washington Post that I think is really kind of interesting. And that was from Chris Krebs, a director of the Homeland Security Department, Cyber Security Division. This means that if the Iranians get ahold of your business systems or your home system, they are going to wipe it clean. So make sure you have excellent backups. Again, if you don't make sure you attend my training here my security summer because we're going to be going over that. This is free people. It's absolutely free for anyone to attend, you can upgrade if you want to, to a paid version which will allow more access, but you're going to get all of the core information absolutely for free. Whether you're paid or not, you're going to get all the information for free. The same data, let me put it that way. Whether you decide to get the golden ticket, or just do it for free, that that's what I'm doing for the radio listeners, anyone can attend, because I want to get this information out there. Be prepared for the Iranian attack, they've already started attacking our businesses. We've already had North Korea attack. Russia attack. I mentioned this, in fact, in that CEO presentation I gave this last week for the UNH group. It happened right here in N.H. I was looking at one of our customers, who just had a website, and was looking at their firewall because we have some very advanced firewalls sitting in front of even web servers. These firewalls that we were looking at, just for that one web server, we were logging, five attacks. That is just crazy. Five attacks from Russia. It wasn't as I said, it wasn't only five attacks from Russia, it was five attacks per second, on average, over the last I think it was 36 or 48 hours. It was just crazy how this company was getting just hammered. However, you guys already know, if you listen to me for a while about a client that we picked up, that had been having email issues. We looked into it, and we ended up bringing the FBI in, with the client's permission, because we found Chinese back doors into their systems. This is a small manufacturer who kept all of their plans, of course, electronically, all of the manufacturing stuff, etc., etc. Now, they get to compete against China, with their own designs. That just blows my mind, frankly, How could you do that? It's, ignorance, right? It's thinking you're okay. In fact, going back to this story from Kiplinger, I was referring to earlier here, here's a great little quote from the author here, Dennis Beaver. And he says "My father is a dentist and is up in years, his office has all of his patient's record stored electronically, which he accesses from home from his laptop by leaving the server always on at the office. I mentioned this to a geeky friend who the next day, showed me dental records from my dad's office that he had hacked, he claimed to be doing this as a favor to get my father's attention about cybersecurity, and I believe him. By the way, be careful, never do that without permission, right? There are ethical hackers in my business here, who are doing penetration testing, but we make sure we've got full consent from the company. So don't, don't just go and do this. Thus, the story goes on. "When I told Dad, and he immediately changed the password but didn't seem too bothered. Here's another one. "I knew one fortune 500 company CFO who used the same password for over 10 years. Most think that it's a joke, but it was real and proved not so funny after his credentials were found in seven data breaches. His password was used to hack the company's email servers, spoof emails, and steal 10's of thousands of dollars without anyone noticing for months. I picked up a client here, a local one here in the northeast who had had $80,000 taken out of their operations account. And of course, they realized that pretty quickly, but by the time they noticed it, the money was gone. Be very, very careful. We're going to cover these things in our security summer, again, just Craig peterson.com. And subscribe right there on the homepage. And we'll let you know when that starts. Tentatively it is going to be mid-July by the looks of things right now. And we're talking about 10 to 15-minute sessions a couple of times a week. And we're going to keep them up for at least a week in case you miss it so that you can watch one of the replays a little bit later on. Okay, man, we are almost out of time here. 76% of mobile apps have flaws, allowing hackers to steal passwords, money, and texts. These are some high-risk vulnerabilities. They're universal across Android and iOS, Android has a little bit more risk than iOS, we're talking about, but 5% higher risk. This is according to a company called positive technology. They went in and looked at some of these mobile apps, and the biggest problem is in secure data storage. So be careful about that. Again, Cisco has an answer to that. And with iOS, it's just phenomenal. Nobody has anything like this other than Cisco. Be very, very careful, there are products out there that could be useful to you. Remember that stored information can be stolen. You can't necessarily trust the app developers, they might be taking your data. Great article, you'll see it on my website. It is from Forbes, and this is about the cybersecurity skills gap and won't be solved in the classroom. So have a look on my website for that one. Business travelers, something new called visual hacking, and this is from the Czech Republic, again, that's up on my website and in this morning's newsletter. The U.S. launches a cyber attack aimed at Iranian rocket and missile systems, and we will talk a little bit about that. We've got a couple of great articles online. I spoke about this with the UNH co mastermind this week third-party contractors. They are our weakest cybersecurity link. And they're just not being held accountable. You know, if you ask people who are the biggest cybersecurity threats out there who have talked about today, I mentioned what Russia, China, I said, North Korea mentioned Iran. And you'd be right. But those countries are the most significant foreign threats. And I, as I mentioned this week at the speech I gave this, is the real problem is internal. And by internal, I don't just mean your employees, I mean, your contractors. And that's one of the things you have to go through. When you're looking at the penetration testing, you're doing the analysis of your business and the data security. Now from the Customs and Border Protection, I talked this on May 31. They had a breach where 100,000 people were photographed inside vehicles crossing the border and a couple of lanes and included images of the vehicle license plates, maybe some other stuff that was that stolen, it was taken through a third party contractor that was doing work for Customs and Border Patrol. The most significant breaches of the last 10 years have also been self-inflicted. So let's look at this one. This is a significant number here. This is quoted in The Hill from Flexera. Patches were available for 86% of the vulnerabilities on the day of disclosure. In other words, when these companies came forward and told people about the hacks that had happened, at 86% of those were hacks, that didn't have to happen, because there were patches out already. Okay, in other breaches, access was gained by compromising a third party like the vendors who we were just talking about and stealing their credentials to log into the corporate network of the eventual target. Speaking of Target, look at Target, and back in 2013, 40 million credit cards were lost through a third party air conditioning provider that was connected to the corporate network. All the hacker had to do is break into the air conditioning system, and now they had a launch pad. Think of what happened out in Las Vegas, beautiful big fish tank, they put a smart controller in it that would warn them when their temperature got too cold because the fish are so expensive. It was hooked up to their network, and it was compromised. That fish tank temperature control system was used as a launching pad. We're seeing that all the time with cameras security cameras, the Office of Personnel Management was breached through Key Point government solutions. This is a third party used by the Office of Personnel Management. That third party gave China, 21 million personnel files, including the background checks conducted on top security clearances. In2017, Australian defense subcontractor lost 30 gigabytes of highly sensitive data, including information on the drone strike for the Joint Strike Fighter program. Crazy. By the way, the software had not been updated for 12 months. In 2018, China compromised the network of yet another defense contractor doing work for the Navy. Again, our technology, our advanced military superiority, has literally been stolen from us. Again from The Hill, in an assessment delivered to Navy SECRETARY RICHARD v. Spencer in March and reviewed by the Wall Street Journal, the Navy and its industry partners are under cyber siege by Chinese and Russian hackers. So think about all of that when you are thinking about your business and even your home computer. Segment your networks, break them up, use good passwords, this is all stuff we're going to review in our security summer. Again, Craig Peterson dot com, you can email me, and I'll let you know when it happens. Just text Me at Craig Peterson dot com, we're going to cover all of this. I want you guys to know what to do, whether you're an individual or a small-medium business. In most companies, face it the computer guy or gal is whoever likes computers the most, or maybe the one who wanted a raise. They're not necessarily computer professionals. It is very, rare to find security professionals. We're working every day trying to keep up to date. Even though I've been doing this for 30 years, and I'm still learning stuff. So be careful when you go out and hire outside firms. On to the Apollo program. I read a book back in the early 80s. And I marked it all up. And it was about how the lunar landing was a hoax. Hollywood has made some films about it. There are many people, and more and more kids nowadays think the whole thing was a setup. This is a great article written by Ethan Siegel. In the article, he talks a little bit about the moon landing. People are saying that the entire space program and NASA is nothing more than a hoax. Let's get go through a little bit of evidence. Number one, we can still see the evidence of the Apollo program on the moon even today. If you walk on the sand on a beach, the waves are going to level it out, and there won't be any sign that you were ever there. Right. But none of that exists on the moon. Even in the Sahara Desert on the sand, you've got the shifting winds that shift that sand around. However, that is not the case on the moon. We actually have pictures from regular people of the moon of the landing site, Apollo 12,14, and 17. Those have all been photographed from Earth. On the Apollo 12 landing sites. There is a ton of stuff you'll see this article from Forbes magazine. You can view all of the pictures. You can see it up on my website at Craig Peterson dot com. I have a link to a number to extensive photographic and video evidence from the Apollo missions themselves. The one I like the best is one that I am personally familiar with. This is a Lunar Laser Ranging, and there are many others. But this is one that we Ham Radio users use. We can bounce off of the moon there's a reflector that was left up there by the Apollo missions we can bounce a laser off, and we use that scientifically to figure out how far the moon is away. But there are also lunar seismometers there is the solar wind composition spectrum lunar surface magnetometer, a lunar dust collector, many more. It was all left up there all where it ran for years. Some of this technology is still running. We were there. Don't let them tell you otherwise. Take care, everybody. Make sure you sign up for the security summer at Craig Peterson, dot com Take care, everybody. Bye-bye. ---  Related articles: Be Careful What You Browse — Drive-By Malware on the Rise Are You Ready? Iranian Cyber Counter Attacks Cyber Breaches — How far does your liability extend? What We Know About Apollo Missions After 50 years  Trumping Iranian Aggression    Is Your App Safe? Maybe Not! We Will Need 3.5 Million Cybersecurity Professionals by 2021 and They Won’t Come Out Of Our Colleges Mac Non-Vulnerability Vulnerability During Travel Is Your Data Safe from Snooping Eyes? Who Is Your Biggest Cyber Liability? Maybe It Is Not Who You Think ---  More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Digital Transformation Podcast
Data Hacks that Shocked the World

Digital Transformation Podcast

Play Episode Listen Later May 4, 2019 22:15


Cybersecurity journalist Charles Arthur discusses his book "Cyber Wars" which gives us the dramatic inside stories of some of the world's biggest cyber attacks. Charles explores why each hack happened, what techniques were used, what the consequences were and how they could have been prevented.  From 2005-2014 Charles was technology editor at The Guardian newspaper, where he reported on Wikileaks, Anonymous, and others. Previously he was science and technology editor at The Independent, and before that worked at New Scientist, Business Magazine and Computer Weekly. His previous book is "Digital Wars." Do you want to be a guest? DigitalTransformationPodcast.net/guest Do you want to be a sponsor? DigitalTransformationPodcast.net/sponsor

Random but Memorable
Cyber Hotel Business Hack with Charles Arthur

Random but Memorable

Play Episode Listen Later Dec 4, 2018 27:39


We have Charles Arthur on the show this week talking about the biggest hacks on business in the last few years and the advice to prevent it. We also talk about the Marriott data breach and how Tesla gave a forum user admin access by accident. Tweet us @1Password using the hashtag #ask1Password. We talked about... The Marriott Hack on 500 million accounts Tesla giving a forum user more permissions than they should Cyber Wars from Charles Arthur is available in all good book shops! Question from @tofumac "When giving a pdf app access to my cloud drive (ex. PDF expert, Readdle) to make changes etc, does this mean that they could potentially look through any of my documents stored there?" Placename from @toonetown Tooele too-IL-ə Thanks for listening, tweet us with suggestions, place names or questions for the next show.

AIIM On Air
I Am AIIM interview series, plus winning the Cyber Wars

AIIM On Air

Play Episode Listen Later Nov 15, 2018 30:46


Carah Koch, Director of Enterprise Content Management for the Metropolitan Council in Minneapolis visits for the first in a series of "I Am AIIM" member interviews. Plus, best-selling technology author, Charles Arthur, discusses his new book Cyber Wars: Hacks that Shocked the World. Listen for action items you can use today. Host, Kevin Craine For more visit AIIM.Org/podcast

Business Wars
Southwest vs American - Aviation Cyber Wars | 3

Business Wars

Play Episode Listen Later Sep 18, 2018 20:12


The computer age is on the horizon, and American Airlines has a secret weapon: SABRE. Sure, the airline is top of the heap under the current pen-and-paper reservation system — the one where travel agents use a massive phonebook to look up flights, then call individual airlines to book a ticket. But they’re tired of playing phone tag. The American Society of Travel Agents has plans to roll out a new electronic system, one that could force American to lose its unofficial preferred status. The company has to get its system to market first — and its leaders have to convince the travel agencies to get onboard.But there’s a much bigger threat looming on the horizon, one that could give a big boost to upstart rivals like Southwest Airlines. Deregulation is coming, and when it does it will change everything.Support this show by supporting our sponsors!

The Common Good Podcast
The Common Good Forum: Congressman Mike Rogers - "Cyber Wars"

The Common Good Podcast

Play Episode Listen Later Jul 30, 2018 22:08


Honorable Mike Rogers Former Congressman, Chair, House Intel Committee "Cyber Wars" Session Convener: John Harwood, Chief Washington Correspondent, CNBC

Everyday MBA
160: Cyber Hacks that Shocked the Business World

Everyday MBA

Play Episode Listen Later Jun 30, 2018 23:10


Episode 160 - Charles Arthur discusses his book "Cyber Wars" and the dramatic inside stories of some of the world's biggest cyber attacks. Explore data breaches at Equifax, Sony Pictures, TJ Maxx and more. Charles was the technology editor at The Guardian, where he investigated scores of cybersecurity threats as well as WikiLeaks, Anonymous, and LulzSec. Stay tuned in the later part of the interview for three action items you can use today. Host, Kevin Craine Would you like to be on the show? http://Everyday-MBA.com/guest

The Authors Show
Interview:Zero Day: China s Cyber Wars, by author T. L. Williams

The Authors Show

Play Episode Listen Later Feb 22, 2018 14:17


Interview with author T. L. Williams. For readers who enjoyed Tom Clancy and James Patterson thrillers, CIA veteran T. L. Williams unfolds a chilling--and highly conceivable--scenario in his latest novel, ZERO DAY: China's Cyber Wars. Moving between Chongqing, China and Langley, Virginia, this fast-paced spy thriller revolves around a plot by the Chinese government to seize the edge on global power by undermining the U.S. economy.

SpyCast
China's Cyber Wars: An Interview with TL Williams

SpyCast

Play Episode Listen Later Aug 8, 2017 55:39


SPY Historian Vince Houghton sat down with former CIA operations officer and Deputy Division Chief for Counterintelligence TL Williams to discuss his career and his new novel, Zero Day: China's Cyber Wars.

cia cyber wars deputy division chief
Department of Engineering Science Lectures
Will future communications technologies lead to cyber wars or a better world?

Department of Engineering Science Lectures

Play Episode Listen Later May 22, 2017 50:43


Communications technology has enabled massive social change over the past decades. However, the many benefits that we enjoy are accompanied by challenges - cyber security, inadequate coverage, the ease of spreading fake news, Naomi Climer will talks about where communications technology is heading including 5G and the internet of things (IoT) - what will be the ‘killer apps’ of the IoT? What could we do when everything is connected to the internet? How will we use all this extra bandwidth and speed? How could communications technology improve life for everyone on the planet? Naomi will cover the technical challenges still to be overcome and discuss some of the social challenges and spectacular opportunities that 5G and the internet of things will create. The 43rd Maurice Lubbock Memorial Lecture.

Europe Calling
Cyber Wars!

Europe Calling

Play Episode Listen Later May 17, 2017


Major Spanish firms among victims of massive global cyber attack. Authorities say steps taken to mitigate ransomware crisis in Spain but experts warn problem not over. Spain wants new rules for a complete overhaul of the euro zone..Madrid backs the reforms suggested by French President Emmanuel Macron., The traditional method of teaching English is being challenged in Catalonia..... 'Pope Francis has prayed over the graves of the two Portuguese children who he will canonise today in an open air mass in Fatima, nearly 100 years after their death in 1919. NHS computer systems and phones down after cyber attack NHS staff have claimed pop-up messages are appearing on screens saying the PC is 'under control' and they must pay a ransom to stop all the files being deleted Ministers call for 'EU border' in Africa to stem the flow of migrants but Labour makes NO promise to cut immigration in its manifesto.......and said the party would 'develop and implement fair immigration rulesJeremy Corbyn hijacks Theresa May's first EVER Facebook Live. .....;Theresa May revealed that she injects herself with insulin four or five times a day but urged fellow sufferers not to allow the illness to hold them back from doing what they want in life.....Patriotism could account for rising number of Christians. The proportion of people who identify themselves as Church of England worshippers has seen a small rise from 16.3 per cent in 2009 to 17.1 per cent in 2015

Author T.L. Williams discusses #ZeroDay on #ConversationsLIVE

"Conversations LIVE!" with Cyrus Webb

Play Episode Listen Later Feb 16, 2017 19:00


Host Cyrus Webb welcomes author T.L. "Terry" Williams to #ConversationsLIVE to discuss his love of writing and what it's been like to share that with the world. The two also discuss his new book ZERO DAY: China's Cyber Wars.

china zero day terry williams cyber wars cyrus webb book author interview conversations live radio
Let's Just Talk!
China's Cyper War/Lies We Tell Ourselves

Let's Just Talk!

Play Episode Listen Later Feb 10, 2017 49:59


First guest is former CIA veteran T. L. Williams unfolds this chilling—and highly conceivable—scenario in his latest novel, “ ZERO DAY: China’s Cyber Wars” 2nd guest is Jon Frederickson author of “The Lies We Tell Ourselves: How to Face the Truth, Accept Yourself, and Create a Better Life”. Focusing on the heart and soul of therapy, THE LIES WE TELL OURSELVES.This show is broadcast live on Tuesday's 2PM ET on W4CY Radio – (www.w4cy.com) part of Talk 4 Radio (http://www.talk4radio.com/) on the Talk 4 Media Network (http://www.talk4media.com/

Unbuttoned History
169 - The Wives of Henry VIII (Special Guest Gabe Graetz)

Unbuttoned History

Play Episode Listen Later Jan 15, 2017 130:56


Three-time guest and super best friend of the show Gabe Graetz comes on, and the tangents are a-plenty. We pitch a book series called Cyber Wars, learn what having having sex 'The French Way' means, find out how gross Henry the VIII was and eventually talk about his wives. We got together with Gabe so this episode is like 9 hours long, enjoy!

Free Your Mind Podcast
Free Your Mind Podcast #91

Free Your Mind Podcast

Play Episode Listen Later Apr 11, 2016 67:58


In this episode we welcome Patrea Patrick to the show. Patrea Patrick is a filmmaker, novelist. Patrea is an advocate for securing our Grid as a matter of National Security. She has dedicated years to bringing the issue of vulnerability of the electric grid to the forefront, and reporting on the utilities’ part in not putting forth proper protections. This issue has been hidden from the American people and has now become classified. Her two films on hardening the critical infrastructure from Cyber Wars, Terrorists, and EMP’s are leading edge information. She is an advocate for the Constitution, getting the undue influence of money out of politics, and stopping the revolving door from Wall Street to Washington. Patrea is working to get transparency in government leading to stopping the millionaires club in congress.  In her travels Ms. Patrick has met with the head of the Federal Energy Regulatory Commission, Presidential candidates, the former head of the CIA, Congressmen, State Senators, State representative and leading scientists.  She has been to the high clearance secret OPS Center where security threats to our national Security are assessed to discuss this critical subject.   http://www.patreapatrick.com https://www.facebook.com/patrea.patrck  

Shelby Podcast
What's Hot: Steve Hewitt One Last Time

Shelby Podcast

Play Episode Listen Later Sep 1, 2015 7:47


Steve Hewitt has a long track record of being consistently accurate about the future of technology. Don’t miss his last interview before he retires. Join us as Steve discusses What’s Hot and What’s Coming. Topics include: the Internet of Things, Cyber Wars, Drones, Self-Driving Cars, an Update on the American Church, and learn about Steve’s upcoming Free Pastor's Retreat! What is the next vital issue for the church? Listen to Steve’s parting advice for building attendance and community within a ministry. Make sure you watch the end of the video to see a brief tribute to Steve’s eight guest appearances on Shelby Podcast. And for the first time ever, a link is provided to view Steve’s What’s Hot class notes from ISC 2015 in San Antonio, TX!

Shelby Podcast
What's Hot: Steve Hewitt One Last Time

Shelby Podcast

Play Episode Listen Later Sep 1, 2015 7:47


Steve Hewitt has a long track record of being consistently accurate about the future of technology. Don’t miss his last interview before he retires. Join us as Steve discusses What’s Hot and What’s Coming. Topics include: the Internet of Things, Cyber Wars, Drones, Self-Driving Cars, an Update on the American Church, and learn about Steve’s upcoming Free Pastor's Retreat! What is the next vital issue for the church? Listen to Steve’s parting advice for building attendance and community within a ministry. Make sure you watch the end of the video to see a brief tribute to Steve’s eight guest appearances on Shelby Podcast. And for the first time ever, a link is provided to view Steve’s What’s Hot class notes from ISC 2015 in San Antonio, TX!

Digital Good Times
Episode 28: Marquis Montgomery - Hackers vs Cyber Security

Digital Good Times

Play Episode Listen Later Jun 23, 2015 59:56


The Cyber Wars have begun. The cyber security sector will need to fill a million jobs in the next ten years. Join the squad as we Deep dive with Marquis Montgomery a Cyber Security expert on the front lines. Protect your #Digitalia. @DigiGoodTimesThis weeks #AboutThatAction aka #TheMovement mix is brought to you by DGT’s own @Smalleyez www.digigoodtimes.com Mix Tracklist — Flip D – Amber J Dilla – Won’t Do Thundercat – Them Changes BOSCO – Seventh $erious Klein – 24 Micah Freeman – Movement (feat. Abra)

Doctor Who: Tin Dog Podcast
TDP 134: Revenge of the Cybermen

Doctor Who: Tin Dog Podcast

Play Episode Listen Later Jul 25, 2010 20:03


Revenge of the Cybermen was the fifth and final story of (although it was not originally intended as the finale). The story saw the return of the as lead villains for the first time since the story , and their only appearance (barring flashbacks) until in . It was further significant for being the first Doctor Who story released on home video. Contents [] // Synopsis Everyone but a few men of the crew of have been killed by . realises that the are close by and are hoping to destroy the planet Voga, the famous planet of gold. Gold is lethal to the Cybermen and Voga must be destroyed to enable their survival. The Doctor is captured and is sent to Voga with two humans, all three with bombs strapped to them. The Cybermen hope to detonate them in a sensitive spot in order to destroy . But the Doctor manages to defuse the bombs, so instead the Cybermen decide to fill Nerva Beacon with bombs and crash into Voga. But the Doctor gets to Nerva and prevents it from destroying the planet of gold. Meanwhile the Cybermen retreat into their ship and the Vogans destroy it with a missile of their own. Plot [] Part One , and use the , spinning their way through time and space back to . They land back in the control room they left when they last beamed down to Earth, but Sarah notices the is not there. The Doctor tells Sarah that the time ship is drifting back in time towards them and they just need to wait for her to catch up. A door slides open, revealing a dead body, and many more beyond, littering the outer ring of the station. In a communications room, crewman warns off an approaching spaceship away from Nerva Beacon, which is under quarantine due to a plague. Professor , a planetary surveyor, asks Commander how long they can run a 50-man station with three men, but the other officer, , thinks they can continue to manage. Nerva is on a 30-year assignment to warn ships away from , the new asteroid it is orbiting, until its presence is updated on all the starcharts of inbound ships. The time travellers find a sealed door leading to Section Q. The Doctor surmises that this is the same station they left, but thousands of years in the past, before the solar flares that devastated Earth. As the Doctor tries to get through the door, the trio fail to see a silver, snake-like creature — a — crawling around the bodies behind them. Somewhere else, an alien tries to contact Nerva, and barely gets through to Warner before he is shot by two more of his own kind. The only place the signal could have come from is Voga, but Kellman tells Warner that he set up the station there and spent six months cataloguing its rocks. Voga had drifted into the solar system 50 years before and had been captured by Jupiter's gravity. An asteroid of that size drifting between star systems could not support life and he warns against going down to Voga and spreading the plague. Warner logs the call anyway. The Doctor manages to open the sealed door, which activates an alarm. On Voga, , leader of the Guardians of the mines, orders his men to bury the dead Vogan that was shot earlier. , his aide, tells him that the dead Vogan was frightened of Vorus's plan. Vorus tells him that they can trust their agent on Nerva. buys humans, and they have more gold on Voga than in the rest of the galaxy. The reason the agent had not contacted them is probably because the Cybermen are monitoring transmissions. In the communications room, the Cybermat attacks Warner, biting him before it is thrown off. Warner collapses, glowing veins appearing on his face while Kellman enters and pulls the magnetic log tape from the console. Meanwhile, the Doctor, Harry and Sarah have reached the forward control room, mere seconds before Lester and Stevenson enter levelling their weapons at them. The door behind them slides open to reveal the communications room, and Kellman brings Stevenson to Warner's fallen form. When Stevenson sees that his crewman has the plague, he prepares to shoot Warner to stop the infection's spread, but the Doctor stops him. The Doctor lies, saying that they are a medical team sent from Earth, and convince Stevenson to let Harry examine Warner. They take Warner to the crew quarters as Kellman returns to his own room and spies on the Doctor and Stevenson in the communications room using an assembled device. Stevenson tells the Doctor about the asteroid, formerly named Neo Phobos, but renamed Voga by Kellman. The Doctor recognises the name: Voga, the Planet of Gold, and realises that Cybermen are involved. Stevenson says the Cybermen died out centuries before, but the Doctor points out they merely vanished after attacking Voga at the end of the last . Hearing all this, Kellman contacts a Cybership nearby, its crew commanded by a with a black helmet. The ship moves towards Nerva. Warner is dead. When the Doctor examines the body he finds two puncture wounds, indicating that Warner was injected with poison and confirming the Doctor's suspicion that there is no plague. The Doctor says that if he had seen Warner earlier he might have been able to use Nerva's transmat to filter out the poison from his system. The Doctor has another suspicion; investigating Kellman's quarters, he finds the communications device as well as some gold. The Doctor hides when Kellman returns, but Kellman realises that someone has been inside the room. He sabotages the room, electrifying the floor and sending gas pouring up from it. Keeping off the floor, the Doctor reaches the door to open it with his . Meanwhile, Sarah is attacked by the cybermat. [] Part Two The Doctor escapes Kellman's room and hears Sarah scream. He throws the Cybermat to the floor and kills it with some gold dust, but Sarah has already been bitten. The Doctor carries her to the transmat chamber, handing her to Harry, and prepares to beam them down to Voga and back. However, Kellman has taken the transmat's pentalium drive. The Doctor reconfigures the transmat to bypass the sabotaged system while Stevenson and Lester go and confront Kellman. On Voga, Vorus observes a giant rocket, the Sky Striker. He tells Magrik that his agent has informed them that the Cybermen are heading for the beacon. Vorus wants the Sky Striker fitted with its bomb head in four hours. Obseving the incoming craft via radar The Doctor jury rigs the transmat, and Harry and Sarah beam down to Voga. With the poison filtered out, Sarah instantly recovers. As Harry notices that the cavern floor is littered with gold, Vogans arrive and capture them. Harry and Sarah are brought before Vorus, who wants to know who is still alive on Nerva. However, the answers will have to wait. Harry and Sarah are taken away while Vorus answers a call from Councillor Tyrum, who arranges for them to meet. Lester and Stevenson capture Kellman. The Doctor explains that the Cybermen fear Voga because gold, as a non-corrodible substance, plates their breathing apparatus and suffocates them. The Doctor cannot get Harry and Sarah back without the pentalium drive, but Kellman feigns ignorance, trying to buy time until the Cybermen arrive. The Doctor uses a control box he found in Kellman's room to activate a Cybermat, threatening Kellman with it until he reveals that the drive is around his neck. Harry and Sarah are chained up in a cave, where Harry notes that the chains are solid gold, which is soft metal that perhaps they can file through. Meanwhile, Tyrum tells Vorus that he knows that aliens have come to Voga. He also knows that Vorus wants Voga to emerge as a trading power again and not hide from the Cybermen, who apparently disappeared centuries ago. Because of this, Tyrum no longer trusts Vorus or the Guardians, and will send his Militia to take over the mines. Vorus is furious, but Tyrum says his troops have orders to crush any resistance. Fighting breaks out in the mines between the Guardians and the Militia. Vorus tells Magrik to keep Tyrum from finding out about the Sky Striker, and to kill the two humans immediately. Harry and Sarah have managed to free themselves, however, and get away before the execution team arrives. They are pursued by more Guardians, who fire at them. Harry and Sarah are cornered and about to be shot when Militia troops appear, forcing the Guardians to stand down. The Doctor has repaired the transmat, but is unable to lock on to Harry and Sarah as they have left the receptor circle. At that point, Lester detects an incoming ship, but it does not respond to their signals. As the Cybership docks, the Doctor recognises it for what it is, but is unable to lock the hatch. The Cybermen come through, impervious to gunfire, and shoot all three men down. [] Part Three The Cyber Leader tells Kellman that the three men are not dead, merely neutralised, as they are necessary to their plan. Kellman set the transmat receptors mere yards from a shaft that leads into the core of Voga. As the environment is hostile to Cybermen, the three men will carry explosives down to Voga and destroy the asteroid. Kellman insists on going down to Voga first to check that the transmat is functioning properly and the Cyber Leader beams him down. There, he runs into some Militia. Not realising the distinction between them and the Guardians, he demands to see Vorus and is taken away while trying to warn them that they are all in danger. Meanwhile, Harry and Sarah are brought before Tyrum and tell their story. When Harry mentions the cybermats, Tyrum asks Harry and Sarah to accompany him to confront Vorus. The Doctor wonders what Kellman's reward is, if it is not Voga's gold. He taunts the Cyber Leader, saying that the Cybermen were finished once humans discovered their weakness to gold and ended the Cyber-Wars. Cyber Leader tells the Doctor that is the reason why Voga must be destroyed before the Cybermen begin their campaign again. The Cyber Leader says that Kellman was promised the rule of the solar system after the Cybermen had conquered it. With Cyberbombs strapped to their backs, the Doctor, Lester and Stevenson are briefed. They are to plant the bombs in the core of the planet, after which they have 14 minutes to return and escape via transmat. If they try to remove their harnesses before they reach the target zone, a secondary explosion will kill them. Their progress will be followed by radar. The three beam down, accompanied by two Cybermen. Militia arrive and start to fire on the Cybermen, who make short work of the Vogans. None of the three men believe that the Cyber Leader will keep his word about letting them escape, but they have to keep moving towards the target zone as they are being monitored. On Nerva, the Cyber Leader declares that Kellman is of no further use to them. Tyrum questions Kellman, who tells him that he and Vorus were working to lure the Cybermen to the beacon, which Vorus has targeted with a rocket. At that moment, a Militia man arrives to tell Tyrum about the arrival of the Cybermen, and how their weapons are useless. Kellman urges them to use the rocket. Tyrum orders his men to use every weapon they can while he speaks to Vorus. Harry tells Sarah to get back to Nerva and warn the Doctor while he tries to stop the rocket from being fired. When Tyrum tells Vorus about the Cybermen on Voga, he shows Tyrum the Sky Striker, which he has been working on for two years. However, with the Cybermen already on Voga, they have no time to get it ready. Vorus claims his plans were to just free his people from the fear of the Cybermen and bring them back into the light. Tyrum scoffs, seeing as Vorus has allied himself with Kellman, a double agent and murderer, motivated only by the promise of gold. Harry suggests finding another way into the core to stop the bombs. The Cybermen continue their slaughter of the Vogans as the bomb timer ticks down even further. Sarah transmats back to Nerva, where she overhears the Cybermen monitoring the three men's progress. However, the deeper the three men go, the heavier the concentration of gold interferes with the radar. The men continue onward, however to the centre of the asteroid. Harry and Kellman, meanwhile, are crawling down a cross shaft towards the same location. With the exit blocked, Harry pushes against the rocks, causing a rock slide. Kellman pushes Harry out of the way, but is crushed to death by a boulder, while on the other side, rocks rain down on the Doctor. Harry exits the shaft and finds the Doctor unconscious. Not realising the danger, Harry tries to unbuckle the Doctor's harness. [] Part Four Destruction of the Cybership Fortunately, Harry is stopped by Lester. The Doctor awakens and conceives a plan. Stevenson will continue on and create a radar trail, while the rest use the cross shaft to surprise and attack the Cybermen with gold. The Doctor and Harry jump the two Cybermen, trying to push gold dust into their chest plates. However, the Cybermen are too strong, and Harry and the Doctor are forced to retreat. Lester leaps onto the Cybermen and undoes his harness, the explosion killing both himself and the Cybermen. With the loss of contact, the Cyber Leader orders immediate detonation. Sarah tries to stop them but is thrown to the floor. However, when the button is pressed, no explosion follows. The Doctor has managed to disarm the countdown device, which allows him to release his harness safely. With Sarah tied up, the Cyber Leader now plans to send Nerva, loaded with more Cyberbombs, into Voga's centre to destroy it. Magrik tells Vorus that the Sky Striker is now ready, but before he can launch it, the Doctor asks them to give him 15 minutes to transmat to Nerva and deal with the Cybermen himself, armed with a bag of gold dust. If he does not contact them by that time, then they can launch the rocket. The Doctor reaches Nerva and frees Sarah while the Cybermen are loading the bombs. He takes the Cybermat and its control box, filling the Cybermat with gold dust. The Doctor sends the Cybermat to attack a Cyberman, injecting him with the dust and killing him. As Nerva begins to move towards Voga, Vorus sees this and attempts to fire the rocket. Tyrum shoots Vorus, but as the Guardian dies, he triggers the launch. The Doctor and Sarah's attack on the remaining Cybermen fails; The Doctor is forced by the Cyberleader to tie himself and Sarah up and they are left to perish in the crash. However, the Sky Striker is approaching just as fast. The Doctor manages to untie them both with a trick learned from Harry Houdini, and contacts Voga, instructing them to steer the rocket towards the Cybership that is just leaving. The Sky Striker veers away from Nerva and destroys the Cybership instead. However, the beacon is still on a collision course. The Doctor manages to unlock the gyro controls, skimming Nerva just above Voga's surface until they reach the other side of the asteroid and open space. The TARDIS materialises in the control room just as Harry arrives via transmat. The Doctor tells his companions to hurry up; he's received a message from Brigadier Lethbridge-Stewart through the space-time telegraph the Doctor left him, which means it, is a grave emergency. Although Harry asks if they should say good-bye to the Commander, Sarah tells him not to argue. The three rush into the TARDIS and it dematerialises. Cast - - - Commander - - - - - - - - - First - Crew - , - - - - - , - - - - - - - - - - - References [] The Doctor says to the Cybermen, "You've no home planet, no influence, nothing.", which may refer to either or . The Doctor refers to the calling them "total machine creatures". [] The Cybermen plan to destroy Voga because of its high density of . [] The Doctor, Sarah and Harry have been to the 'beacon' before, in the future when it becomes . [] is associated with recent use. [] has been travelling back through time to reach the Doctor and his companions. Once the Doctor and his companions have finished using the , it disappears. [] During the Cyber-Wars, the was used to great effect by . The banned , two of which could destroy . Story notes A new Cybermat. This story features a new form of . This is the first story to feature the . The 's , later to become one of the series' regular incidental music composers, made his uncredited debut on this story when he was asked by producer to add to, and enhance, the score provided by . This story had a working titles of; The Revenge Of The Cybermen, Return Of The Cybermen, additionally; Part 1 had a working title of: The Beacon In Space Part 2 had a working title of: The Plague Carriers Part 3 had a working title of: The Gold Miners Part 4 had a working title of: The Battle For The Nerva A number of sets in this story were reused from , which was recorded immediately before it. The Cybermen's voices were provided for the first time by the actors inside the costumes. Five of this story's guest cast had played notable roles earlier in Doctor Who's history: in and in the previous Cyberman story, in in as in . would go on to play in , which came after Revenge of the Cybermen in production order even though it was aired prior to this serial. The Vogan seal is reused by designer in . Between the broadcast of Episodes 1 and 2, , the , passed away. Ironically he died during broadcast of a serial that served to reintroduce the Cybermen -- his final solo appearance as the Doctor occurred during the serial that introduced them. [] Ratings Part 1 - 9.5 million viewers Part 2 - 8.3 million viewers Part 3 - 8.9 million viewers Part 4 - 9.4 million viewers [] Myths to be added [] Filming locations Wookey Hole Caves, Wells, (Puppet theatre, TC1, TC8), Shepherd's Bush, [] Production errors The symbol seen hanging in the Vogan audience chamber (and smaller versions on the Vogan costumes), would later be re-used in , and become better known thereafter as the . (The may have had some influence on Voga during the time before their Non-Intervention policy.) The launching of the is represented by rather obvious NASA stock footage of a Saturn V rocket taking off. The Doctor was wearing a long brown coat and hat at the end of the previous story, but they've vanished when he materializes. Lester wears his interplanetary Space command insignia upside down. When the Doctor enters the TARDIS in episode four the paper printout of the space/time telegraph can be seen hanging on a hook just inside the door. At the end of the story, the Cyber-ship explodes into flames, yet oxygen is need for fire, and The Cybermen do not breathe, as seen in so why would the cybermen have oxygen on there ship? they may take prisoners Continuity This story takes place after the Cyber-Wars, which started in in : . The Cybermen of that story look at video of past encounters with the Doctor and watch him deliver the "no planet" line. It later becomes clear () that the Cybermen have had access to time travel technology. The Cybermen's first home planet Mondas was destroyed in : , while their second home planet Telos was destroyed in : , which was made some time after this story. The discrepancy over how many moons Jupiter should have is resolved in : . This story occurs after : This story occurs before : Home video and audio releases [] DVD releases This story was first released on DVD in the on as part of the Cybermen boxset. The one disc set includes a of the story, as well as the following special features: Commentary by Elisabeth Sladen (Sarah Jane), David Collings (Vorus) and Philip Hinchcliffe (Producer). The Tin Man And The Witch Cheques, Lies And Videotape BBC News Location Report Coming Soon Trailer Radio Times Billings Production Subtitles Photo Gallery Editing for DVD release completed by . [] VHS and Betamax releases Revenge of the Cybemen will be released on DVD in the UK on 9th August 2010, along with . Released on VHS and Betamax as Doctor Who: Revenge of the Cybermen. This story was the first Doctor Who story to be released to the home video market. (edited) (edited) (unedited) (edited) (unedited) (movie format) (movie format)

Doctor Who: Tin Dog Podcast
TDP 86: Cyberman Histroy 101

Doctor Who: Tin Dog Podcast

Play Episode Listen Later Mar 27, 2009 17:47


P The Cybermen are a race of who are amongst the most persistent enemies of in the series, . Cybermen were originally a wholly species of humanoids originating on Earth's twin planet that began to implant more and more artificial parts into their bodies as a means of self-preservation. This led to the race becoming coldly logical and calculating, with emotions usually only shown when naked aggression was called for. They were created by Dr. (the unofficial scientific advisor to the programme) and in 1966, first appearing in the serial, , the last to feature as the . They have since been featured numerous times in their extreme attempts to survive through conquest. A version of the Cybermen appeared in the ' two-part story, "" and "". These Cybermen also appeared in the two-part 2006 season finale, "" and "". This then carried through to the spin-off in the episode "". They would later return to the revived series in the 2008 Christmas Special "", introducing two new variants of the race; the Cyber-Shades and the Cyber-King. Contents [] // [] Physical characteristics An original Cyberman from The Tenth Planet While the Doctor's other old enemies the were on the whole unchanged during the original series' twenty-six season run, the Cybermen were seen to change with almost every encounter. The Cybermen are , but have been augmented to the point where they have few remaining organic parts. In their first appearance in the series, the only portions of their bodies that still seemed human were their hands, but by their next appearance in (1967), their bodies were entirely covered up in their metallic suits, with their hands replaced by two finger claws, but changed back to regular five-fingered hands in (1968). As they are relatively few in number, the Cybermen tend towards covert activity, scheming from hiding and using human pawns or to act in their place until they need to appear. They also seek to increase their numbers by converting others into Cybermen (a process known as "cyber-conversion"). It is presumed (and often implied) that there are still organic components beneath their suits, meaning they are actually cyborgs, not robots: in The Tenth Planet, a Cyberman tells a group of humans that "our brains are just like yours", although by the time of , their brains seem to have been replaced with electronics. Also in this same story, two human slave-prisoners of the Cybermen on the planet Telos, named Bates and Stratton, reveal that their organic arms and legs have been removed by the Cybermen, and replaced by Cyber-substitutes. In (1982), the actors' chins were vaguely visible through a clear perspex area on the helmet to suggest some kind of organic matter. In (1967), veins and brains were visible through the domed head of the Cyberman Controller and similarly, in (1985) and "" (2006), the Cyber-Controller's brain is visible through the dome. The first is a Mondas Cyber Controller, while the second involves alternative Earth's John Lumic. However, in (1975), the Doctor says they are "total machine creatures". The audio play implies that the converted victim's face remains beneath the Cyberman faceplate, although the audio plays, like all non-televised spin-off media, are of uncertain with regards to the television series. The novel by states that some Cybermen experience rare flashes of emotional memory from the time before they were converted, which are then usually suppressed. The parallel Earth Cybermen in the 2006 series are usually constructed from human brains bonded to a Cyberman exoskeletal shell with an artificially grown nervous system threaded throughout ("The Age of Steel"), although direct grafting of cyber-components is another method of conversion (""). Although the Cybermen often claim that they have done away with human emotion, they have exhibited emotions ranging from anger to smug satisfaction in their confrontations with the Doctor (although this is only clearly present during their appearances in the 1980s). Some Cybermen in the early stories were even given individual names such as "Krang". Some parallel Earth Cybermen did retain some memories of their pre-conversion lives, although their emotional response varied. In "Cyberwoman", the partial conversion led to a degree of insanity in , which was retained even after she transferred her brain into a cyberman body. In "", Yvonne Hartman is able to retain at least some elements of her personality in order to prevent the advance of a group of other Cybermen, and is last seen weeping what appears to be either an oil-like substance or blood. In the same episode, the Cyber-Leader expresses clear frustration at the humans' refusing to surrender, although in a later scene he criticizes the Doctor for showing emotion. In "", the Doctor is able to defeat the Cybermen by shutting down their emotional inhibitors, enabling them to "see" what had become of them. Their realization of what they had become led them to either simply shut down out of sheer horror, or partially explode. Lastly, when the first Cyber Leader is killed, his head explodes with some white liquid leaking down his body; there are references in that episode to a patented Cybus Industries mixture of chemicals used to preserve the brain. The novel by suggests that some Cybermen imitate emotions to intimidate and unnerve their victims. The Big Finish Productions audio play (set on Mondas in the early days of cyber-conversion) suggests that the Cybermen deliberately remove their emotions as part of the conversion process to stifle the physical and emotional trauma of becoming a Cyberman. The conversion process in the parallel Earth is termed "upgrading". This motive behind the removal of emotions is made more explicit in "The Age of Steel" where it is done by means of an emotional inhibitor. In that episode, the deactivation of their emotional inhibitors drives the converted Cybermen insane when they realise what they have become, killing them. This motive may also be applicable to Mondas Cybermen, given their forcible conversion of other lifeforms to Cybermen to maintain their numbers, despite the fact the Mondasians appear to have originally willingly converted themselves as a survival mechanism.[] Cybermen have a number of weaknesses over the years. The most notable weakness is the element . Their aversion to gold was not mentioned until their attempt to destroy the planetoid Voga (the so-called "Planet of Gold") in (1975). Initially, it was explained that, due to its non-corrodible nature, gold essentially their . For example, the glittergun, a weapon used during the Cyber-Wars in the future, fired gold dust at its targets. However, in later serials, gold appeared to affect them rather like affects , with gold coins or gold-tipped fired at them having the same effect. The revived series' Cybermen have no such weakness, though the tie-in website for the episode makes mention of it. Cybermen are also rather efficiently killed when shot with their own guns. Other weaknesses from early stories include , based technology, and excessive levels of . In "The Age of Steel" an grenade is shown to disable a Cyberman and shut down its emotional inhibitor. Their armour is often depicted as flexible and resistant to bullets, but can be penetrated by gold arrows and projectiles made of gold. The Parallel Earth Cybermen are bullet-proof and are very resilient, but are not indestructible — they are vulnerable to heavy explosives, electromagnetic pulses and specialised weaponry, as well as weapons. [] Costume details The design of the Cybermen acted almost as a guide to prevailing at the time of transmission. Nearly all were silver in colour and included items and material such as cloth, rubber diving suits, , chest units, tubing, practice balls, ' gloves, and silver-painted boots. A BBC Cyberman costume from the black & white era of TV has recently been discovered. The 1980s design used converted flight suits painted silver. Unlike the Doctor's other foes, the Cybermen have changed substantially in appearance over the years, looking more and more modern, although retaining certain commonalities of design, the most iconic being the "handle bars" attached to Cybermen heads, that were supposed to aid with their hearing, their round eyeholes and their chest units. Completely black-coloured Cybermen were seen briefly in "". A Cyberman head from the 1975 serial Revenge of the Cybermen, seen here in a display case in "" (2005). Aside from these changes, variations in design between rank-and-file Cybermen and their leaders have been seen. In and (both 1968), the Cyber Director was depicted as an immobile mechanism. In The Tomb of the Cybermen and Attack of the Cybermen, the Cyber Controller was a larger Cyberman with a high domed head instead of the "handle bar" helmet design. In Revenge of the Cybermen, the Cyber Leader had a completely black helmet except for his face. From (1982) onwards he could be distinguished from his troops by the black handle bars on his helmet. The Cyber-Leader in "Army of Ghosts" also had black handles. Because the Doctor is a time traveller, he meets the Cybermen at various points in their history out of sequence from the order the serials were made. This can be confusing since Cybermen from serials set in "earlier" periods of history can sometimes look more sophisticated than those from "later" periods. suggests in his reference work About Time 5 that the anachronistically designed Cybermen of Earthshock and Silver Nemesis are time travellers, like those in Attack of the Cybermen. A Cyberman head was seen in the 2005 episode, "", kept in a display case. The text on the info card states that the head was found in a sewer, suggesting that the head was from . However, the enlarged Cyber-Handles suggest that the head is from . The info card states the head was found in 1975, the year in which was set and the year in which Revenge of the Cybermen was broadcast. The Cybermen returned in episodes 5 and 6 of the 2006 season of the new series, in a two-part story set on an alternate Earth. The new Cybermen were designed by production designer 's team and at Millennium FX. The new Cyberman design is physically imposing, being about 6 feet 7 inches (2.0 m) tall. The general design is made to resemble modern consumer electronics, such as the . To this extent, they are made from burnished steel instead of silver, feature the Cybus Corporation symbol on its chest, and have a general design. The other distinct Cyberman design is that of the Cyber-Controller, which had glowing eyes, a transparent forehead revealing the brain, and sockets on its chest-plate providing connectors to other systems. The episode "" features a partially cyber-converted woman who lacks the outer plating of a fully converted Cyberman. Her body is encased in metal structures but much of her flesh, including her face, is visible. She also has clearly visible metallic breasts, though it is not clear how much of her own flesh has been replaced and how much is merely covered. Another character speculates she could be 40-45% human, and 55-60% Cyberman. [] Voice Early Cybermen had an unsettling, sing-song voice, constructed by placing the inflections of words on the wrong syllables. In their first appearance, the effect of this was augmented by the special effect of having a Cyberman abruptly open his mouth wide and keep it open, without moving his tongue or lips, while the separately recorded voice would be playing, and then shut it quickly when the line was finished. Although the cloth-like masks of the first Cybermen were soon replaced by a full helmet, a similar physical effect involving the mouth "hatch" opening and then shutting when the line was finished was used until (1968). Later, the production team used from its by adding first a , then a , to modify speech to make it sound more alien and computer-like. In later stories of the original series and in the audio plays, two copies of the voice track were sampled and pitch-shifted downwards by differing amounts and layered to produce the effect, sometimes with the addition of a small amount of . From Revenge of the Cybermen to (1988) the actors provided the voices themselves, using microphones and transmitters in the chest units. The voices for the 2006 return of the Cybermen are similar to the buzzing electronic monotone voices of the Cybermen used in The Invasion. They were provided by (who performed the voices for the Cybermen in Big Finish audio stories as well as the in both the new series and the audio stories). As shown in the season 2 DVD special feature "Confidential Cut Downs," the timbre was created by processing Brigg's voice through a Moog ring modulator. Unusually, in "The Age of Steel", the Cyber-Controller (John Lumic, played by ) retains his voice after being upgraded, but it is still electronic. In "Doomsday", a Cyberman which contains the brain of director Yvonne Hartman retains a female-sounding though still electronic voice, as does the partially converted in "Cyberwoman" when her Cyberman personality is dominant. The reason for this is that their minds are taking control of the suit into which their brain has been placed, thus allowing the Cyber-suit's design to be exploited through sheer mental power. In an effect reminiscent of the earliest Cybermen's mouths snapping open while speaking, the new Cybermen have a blue light in their "mouths" which blinks in synchronisation with their speech. [] Cybermen variants Some Cybermen are given titles, being credited as "Cyber Leader" (or variants thereof), "Cyber Lieutenant", "Cyber Scout" or the "Cyber Controller". The Cyber Controller in particular has appeared in multiple forms, both humanoid and as an immobile computer, and has also been referred to as the "Cyber Planner" or "Cyber Director". The Controller seen (and destroyed) in various serials also may or may not be the same consciousness in different bodies; it appears to recognize and remember the Doctor from previous encounters. In Iceberg, the first Cyber Controller is created by implanting a Cyber Director into the skull of a recently converted Cyberman. The Cyber-Controller in "The Age of Steel" used the brain of , the creator of the Cybermen in that parallel reality. In "Doomsday", a Cyber-Leader appears, and when he is destroyed, mention is made of downloading his data files into another Cyberman unit, which is then upgraded to Cyber-Leader. The 2008 Christmas special, "", featured a new variant called a Cybershade., The Doctor theorises that it is a more primitive version of a Cyberman, using the brain of a cat or a dog. In the same story a "Cyber-King" appears; according to the Doctor, it is a "-class" ship resembling a Cyberman hundreds of feet tall, and contains a Cyber-factory in its chest. It is controlled from within its mouth. Its right arm can be converted into a cannon, and its left into a laser. [] Technology Cybermen technology is almost completely oriented towards weaponry, apart from their own bodies. When originally seen in The Tenth Planet they had large energy weapons that attached to their chests. In The Moonbase, the Cybermen had two types of weaponry: an electrical discharge from their hands, which stunned the target, and a type of gun. They also made use of a large laser cannon with which they attempted to attack the base itself. The hand discharge was also present in The Tomb of the Cybermen, which featured a smaller, hand-held cyber-weapon shaped like a that was described as an . In The Wheel in Space the Cybermen could use the discharge to also operate machinery, and had built into their chest units. They displayed the same units in The Invasion as well as carrying large rifles for medium distance combat. In Revenge of the Cybermen and Real Time their weapons were built into their helmets. Killing Ground indicates that this type of Cybermen also have more powerful hand weapons. Subsequent appearances have shown them armed almost exclusively with hand-held cyberguns. The Cybermen have access to known as cobalt bombs, which are also sometimes known as Cyber-bombs, which were banned by the galactic (Revenge of the Cybermen). A "Cyber-megatron bomb" was mentioned in The Invasion, supposedly powerful enough to destroy all life on Earth. In Earthshock, the Cybermen also used androids as part of their plans to invade Earth. The parallel Earth Cybermen their victims by touching them and at first carried no other weaponry. In "Army of Ghosts" and "Doomsday", the Cybermen are equipped with retractable energy weapons housed within their forearms (these were actually first shown in "", but only very briefly and were not used during that episode), but also use modified human weapons to battle the Daleks. The arm mounted guns prove effective against humans but are unable to penetrate Dalek shields. Two Cybermen sent to parley with Dalek Thay at the Battle of Canary Wharf shot the Dalek but were promptly exterminated. In the episode "" the partially converted used her electrical touch against the Torchwood team, as well as an energy beam fired from her arm which could only stun the part of the body at which it was aimed. [] Cybermats The Cybermen also use smaller, cybernetic creatures called "cybermats" as weapons of attack. In their first appearance in The Tomb of the Cybermen, they resembled oversized metallic and had segmented bodies with hair-like tactile sensor probes along the base of their heads, which were topped with crystalline eyes. The described them as a "form of metallic life," implying that they may be semi-organic like the Cybermen, and that they attacked by feeding off brain waves. The second model of cybermat seen in The Wheel in Space was used for sabotage, able to tune in on human brainwaves. They were carried to the "Wheel" in small but high-density sacs that sank through the hull of the space station, causing drops in air pressure. These cybermats had solid for eyes instead of crystals. The Second Doctor used an audio frequency to jam them, causing them to spin, crash and disintegrate. The third model, seen in Revenge of the Cybermen, was a much larger, snake-like cybermat that could be remotely controlled and could inject poison into its victims. It had no visible eyes or other features, and was as vulnerable to gold dust as the Cybermen were. In Spare Parts, "mats" are cybernetically augmented creatures, sometimes kept as pets. Cybermats of a different design are used for surveillance by Mondas' Central Committee. The creatures occasionally go wild, chewing on power sources, and must be rounded up by a "mat-catcher." In the novel by and , set in the 1940s, the Cybermen create cybermats by cyber-converting local animals like cats or birds, possibly because of lack of technological resources. In the audio adventure , a Cyberman reveals that the organs of children who are too small to be fully cyber-converted are used in the creation of cybermats. [] History [] Conceptual history The name "Cyberman" comes from , a term coined in 's book Cybernetics or Control and Communication in the Animal and the Machine (MIT Press, 1948). Wiener used the term in reference to the control of complex systems in the animal world and in mechanical networks, in particular self-regulating control systems. By 1960, doctors were performing research into surgically or mechanically augmenting humans or animals to operate machinery in space, leading to the coining of the term "cyborg", for "cybernetic organism". In the 1960s, "spare-part" surgery was starting out, with the first, gigantic heart-lung machines being developed. There were also serious suggestions of wiring the nerve endings of amputees directly into machines for quicker response. In 1963, Kit Pedler had a conversation with his wife (who was also a doctor) about what would happen if a person had so many prostheses that they could no longer distinguish themselves between man and machine. He got the opportunity to develop this idea when, in 1966, after an appearance on the BBC science programmes and , the BBC hired him to help on the Doctor Who serial . That eventually led to him writing, with Gerry Davis's help, The Tenth Planet for Doctor Who. Pedler, influenced by the logic-driven from the comic strip, originally envisaged the Cybermen as "space monks", but was persuaded by Davis to concentrate on his fears about the direction of spare-part surgery. The original Cybermen were imagined as human, but with plastic and metal prostheses. The Cybermen of The Tenth Planet still have human hands, and their facial structures are visible beneath the masks they wear. However, over time, they evolved into metallic, more robot-like designs. The Cybermen attracted controversy when parents complained after a scene in The Tomb of the Cybermen in which a dying Cyberman spurted white foam from its innards. Another incident was initiated by Pedler himself, who took a man in a Cyberman costume into a busy shopping area of . The reaction of the public was predictable, and the crowd almost blocked the street and the police were called in. Pedler said that he "wanted to know how people would react to something quite unusual," but also admitted that he "wanted to be a nuisance." Pedler wrote his last Cyberman story, The Invasion, in 1968, and left Doctor Who with Gerry Davis to develop the scientific thriller series . [] History within the show [] Origins Millennia ago, during prehistoric times, Mondas was knocked out of solar orbit and drifted into deep space. The Mondasians, already far in advance of Earth's technology and fearful for their race's survival, sent out spacecraft to colonise other worlds, including , where they pushed the native Cryons aside and used the planet to house vast tombs where they could take refuge in when necessary. On Mondas, the Mondasians were dying out, and therefore, in order to survive and continue the race, they replaced most of their bodies with Cybernetic parts. Having eventually removed all emotion from their brains, to maintain their sanity, the natives installed a drive propulsion system so they could pilot the planet itself through space. As the original race was limited in numbers and were continually being depleted, the Mondasians — now Cybermen — became a race of conquerors who reproduced by taking other organic beings and forcibly changing them into Cybermen. The origins of the Cybermen were further elaborated upon in Spare Parts. The move to "cybernise" Mondasians must have commenced on Mondas before they conquered Telos. Otherwise, there must have been some ongoing contact between Mondas and Telos after it was conquered, or the move to develop into Cybermen must have been paralleled after that point. [] The Earth invasions The Cybermen's first attempt at invading Earth, around 1970, was chronicled in The Invasion. A group of Cybermen from "Planet 14" had allied themselves with industrialist Tobias Vaughn, who installed mind control circuits in electrical appliances manufactured by his International Electromatics company, paving the way for a ground invasion. This was uncovered by the newly formed , led by , who repelled the invasion with the help of the , and . In The Tenth Planet, the and his companions and , met an advance force of Cybermen that landed near an space tracking station in the year 1986. This advance force was to prepare for the return of Mondas to the . As Mondas approached, it began to drain Earth's energy for the Cybermen's use, but in the process absorbed too much energy and disintegrated. The Cybermen on Earth also fell apart as their homeworld was destroyed. In 1988 a fleet of Cyber warships was assembled to convert Earth into a New Mondas. A scouting party was sent to Earth in search of the legendary Nemesis statue, a artifact of immense power, made of the "living metal" validium. Due to the machinations of the and his companion , however, the Nemesis destroyed the entire Cyber-fleet instead. (Silver Nemesis). In 2012, the inert head of a Cyberman was part of the Vault, a collection of alien artefacts belonging to American billionaire ("", 2005). According to its label, it was recovered from the sewers in 1975 and presumably came from the 1970 invasion attempt, although it is of a design only seen in Revenge of the Cybermen, which took place in the late 29th century (in a sense, the label is accurate, as Revenge was broadcast in 1975). By the mid-21st century, mankind had reached beyond its planet and set up in deep space. One of these, Space Station W3, known as "The Wheel," was the site of a takeover by Cybermen who wanted to use it as a staging point for yet another invasion of Earth. The , and prevented this in The Wheel in Space. The Cybermen returned in The Moonbase. By the year 2070, Earth's weather was being controlled by the Gravitron installation on the . The Cybermen planned to use the Gravitron to disrupt the planet's weather patterns and destroy all life on it, eliminating a threat to their survival. This attempt was also stopped by the Second Doctor, , , and the surviving crew of the moonbase. [] The Cyber-Wars Five centuries after the destruction of Mondas, the Cybermen had all but passed into legend when an archaeological expedition to the planet Telos uncovered their resting place in The Tomb of the Cybermen. However, those Cybermen were not dead but merely in hibernation, and were briefly revived before the Second Doctor returned them to their eternal sleep, with help from some of the archaeologists, Jamie and Victoria. This was short-lived, however. By the beginning of the 26th century, the Cybermen were back in force, and the galactic situation was grave enough that Earth hosted a conference in 2526 that would unite the forces of several planets in a war against the Cybermen. A force of Cybermen tried to disrupt this conference, first by trying to infiltrate Earth in a freighter and when that was discovered by the , to crash the freighter into Earth and cause an ecological disaster. Although the attempt failed, the freighter was catapulted back in time to become the (Earthshock). Unfortunately, the Doctor's Companion was trapped aboard the freighter, and died in the crash; leaving the , and to mourn him. The Cybermen faced complete defeat now that humanity was united against them in the Cyber-Wars. The glittergun had been developed as a weapon against them, with , the legendary "Planet of Gold", being a major supplier of gold dust ammunition. Meanwhile, the native Cryons on the planet Telos rose up and sabotaged the Cybermens' hibernation tombs. Using a captured time travel machine, a group of Cybermen travelled back to Earth in 1985 to try to prevent the destruction of Mondas, but were stopped by the and his companion (Attack of the Cybermen). The Cryons also finally succeeded in taking back Telos. The Cybermen did survive, but by the late 29th century they had been reduced to small remnant groups wandering throughout space. The , and encountered one such group during this time; and the Doctor very sarcastically pointed out their diminished state, noting that they had "no home planet, no influence, nothing!", and were "just a bunch of pathetic tin soldiers, skulking about the galaxy in an ancient spaceship." These Cybermen had discovered that Voga had drifted through space and wandered into the , being pulled into orbit around as a new moon. They planned to restore their race's power with a plan of revenge against Voga by destroying it with Cyber-bombs. They hoped that this would disrupt their enemies' supply of gold, but their plot was stopped by the Doctor. This was their last chronological appearance to date, with the Cybermen seemingly vanishing from history after this point (Revenge of the Cybermen). A Cyberman (of the type seen in The Invasion) also appeared in the exhibit in (1973). Three squads of Cybermen of the Earthshock variety, each led by a Cyber-Leader, appeared in (1983) in a slightly larger role. [] Parallel Earth and the Battle of Canary Wharf In the ""/"" two-part story, the , , and crash down into a parallel London in a parallel universe, where the Cybermen are being created on modern-day Earth. These alternate Cybermen were created as an "upgrade" to humanity and the ultimate move into cyberspace, allowing the brain to survive in an ageless steel body. These Cybermen also referred to themselves as "Human Point 2 (Human.2)" and "deleted" all those deemed incompatible with the upgrade. They could electrocute humans with a touch. These Cybermen were created by , a terminally ill and insane genius whose company, Cybus Industries, had advanced humanity considerably. To find a way to survive, he perfected a method to sustain the human brain indefinitely in a cradle of chemicals, bonding the synaptic impulses to a metal exoskeleton. The Cybermen "handle bars" were part of a high-tech communications device called an EarPod. Also created by Lumic, the EarPods were used extensively in the place of MP3 players and mobile phones, allowing information to be directly downloaded into people's heads. Lumic began to trick and abduct homeless people and convert them into Cybermen, and assassinated the President of Great Britain after the President rejected his plans. Using the EarPods, Lumic took mental control of London, marching thousands to be cyber-converted. He was betrayed by an old friend who damaged his wheelchair's life-support systems. He had told the Cybermen that he would upgrade 'only with my last breath' and since that moment was at hand he was involuntarily upgraded into the Cyber-Controller, a superior model of Cyberman. However, the Doctor and his companions, having accidentally landed on the parallel Earth, managed to foil his plans. They freed London from mental control and disabled the Cybermen's emotional inhibitors, causing them to go insane and in some cases explode. Lumic himself fell to his apparent death into the burning remains of his factory. A human resistance group, the Preachers, then set about to clean up the remainder of Lumic's factories around the world. These Cybermen reappeared in the 2006 season finale "Army of Ghosts" and "Doomsday". It is to be noted that these Cybermen also use energy weapons built into their right arms. However, in "The Age of Steel" after the conversion sequence, the newly created Cybermen can be seen to have the retractable weapons in place after exiting the conversion chambers. Having infiltrated that world's version of the and discovering a breach between universes caused by the passage of an interdimensional , the Cybermen used it to invade the Doctor's universe. However, the void ship's users, the , also revealed themselves, leading to all-out war across London with mankind caught in the crossfire. Eventually, the Doctor re-opened the breach, causing the Cybermen and Daleks (who had been saturated with background radiation from the ) to be sucked back into it. The breach then sealed itself, leaving the Cybermen and Daleks (except the , who used their emergency temporal shift function to escape) seemingly trapped in the Void forever. [] Torchwood Three Incident Lisa the "Cyberwoman" In "" it was revealed that at the height of the "" the Cybermen had begun to directly convert whole bodies using regular Earth technology, rather than transplant their brains into parallel earth Cyberman shells. One of their victims, a woman called , was only partially converted when the power was shut off and she was rescued by her boyfriend, . Jones took her to in along with a cyber-conversion unit which he made into a life support system for her under her directions. He tried to find a cure for her condition, calling on cybernetics expert Dr Tanizaki. Unfortunately Hallett's Cyberman personality asserted itself, leading to her killing Tanizaki and trying to take over Torchwood Three as a staging area for a new Cyberman army. She eventually transplanted her own brain into the body of a pizza delivery girl whom she let into the base, and was shot to death by the other members of the Torchwood team. [] The CyberKing A small handful of the Cybermen t

Online Gaming Podcast
Cyber-Wars and Days of Wonder - Show #2 - 06/27/2006

Online Gaming Podcast

Play Episode Listen Later Jun 27, 2006


Review of Cyber-Wars, http://www.cyber-wars.com Steep Learning Curve Lots of similar sounding options Options that are important are hidden amongst options that are superfluous Rechargable Statistics: Energy, Capacity, Intent Combat Stats: RAM, CPU Speed, BUS Speed, Harddrive A number of options and a lot of room to advance Premium Package is $5 to buy more energy or increase the regeneration of energy Regeneration gets full every 7 hours or so, which is a time commitment for some casual players Final Grade: C, I found too much of the game to be complicated and not enough advancement Review of Days of Wonder, www.daysofwonder.com Games Available: Ticket to Ride (USA and Europe), Queens Necklace, Gang of Four and Fist of the Dragonstones Java-based, but I found it to be very stable and easy to use Ticket to Ride has a lot of players all the time, the others may be more difficult to play at any given time. Exactly duplicates the boardgame/cardgame (Except with automated scoring and a highlight of destinations in TTR) Karma system No tournaments or serious ladder system. There is ranking but it is simply a number (there is no top players list I could find) AI bots have different flavors: LongBot, DirectBot, DumbBot