Episodes (Page 5)
✨
Chris Davis from Hyas discusses major IT security threats he helped stop
✨
Kik is a popular chat app used by 1 in 3 American teenagers
✨
The Pirate Bay operates as torrent search engine indexing copyrighted material since 2003
✨
Amélie Koran (webjedi) recounts an unauthorized intrusion into a major bank's network and the incident response
✨
Jenny Radcliffe, a social engineer and physical penetration tester, shares stories from her penetration testing engagements
✨
Cybereason threat research team uncovered and tracked interesting malware
✨
Victor responsibly discloses vulnerabilities found on the web
✨
Victor, Edwin, and Mattijs from Guild of the Grumpy Old Hackers discuss their work following the 2016 LinkedIn data breach
✨
2012 LinkedIn breach exposed millions of user credentials with usernames and password hashes stolen
✨
Cam Harrison (kilobit) rose to prominence as a carder in the cybercriminal underworld before his eventual arrest
✨
Guest 'Alex' experiments with risks of posting boarding passes on social media and discovers security vulnerabilities
✨
Marcus J. Carey and Jeff Man, NSA cryptologists, share their career paths into the intelligence community
✨
Zero Day Initiative's Pwn2Own hacking contest challenges top hackers to find vulnerabilities in secure systems like browsers and phones
✨
Anonymous darknet marketplace vendor V shares his transition from buyer to seller in illicit markets
✨
Social engineer discusses techniques for manipulating people into performing unwanted actions for profit
✨
Adam Hulcoop and John Scott-Railton from Citizen Lab investigated Dark Basin, a massive targeted hacking campaign
✨
Episode features nerdcore musicians ytcracker, Ohm-I, and Dual Core discussing hacker and technology-themed music
✨
February 2018 Winter Olympics in Pyeongchang, South Korea experienced cyber attack disabling digital infrastructure
✨
Hackers breached JP Morgan Chase, one of the world's largest financial institutions, but not for typical financial theft
✨
From 2009-2013, CIA's foreign asset communication channels were compromised with severe consequences