Jack Rhysider offentlig
[search 0]
Flere
Download appen!
show episodes
 
Loading …
show series
 
A special phone, made from top-to-bottom with privacy, hidden apps and encryption to protect your data from prying eyes. Sounds great, right? There's only one problem: It has a secret back door that funnels everything you do to law enforcement. Privacy journalist Joseph Cox shares the complicated story of how a secret operation to stop drug traffic…
  continue reading
 
The terror attacks on September 11, 2001 changed everyone's life, around the world. But for Shannen Rossmiller, a judge in rural Montana, understanding how it happened and who would do such a thing became an obsession. Despite the danger to her life and family, she went undercover in extremist online forums and assumed the identity of multiple Arab…
  continue reading
 
Rachel Tobac is an unsuspecting social engineer who never thought she'd become a world-renown hacker. But after an amazing feat at DEF CON in Las Vegas, she started getting calls from huge tech companies and government contractors asking for her help. In this episode we, learn why a hacker's best tool has nothing to do with tech, and everything to …
  continue reading
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
If you own cryptocurrency on an exchange, it's only as safe as the employees at that company. If they get phished or hacked, say goodbye to your Bitcoin. North Korean agents have gotten VERY good at stealing hundreds of millions of dollars worth of crypto this way. Journalist Geoff White walks us through these devious and damaging heists that make …
  continue reading
 
When scammers call Jim Browning to extort money, he uses his IT skills to turn the tables on them. The results are extremely satisfying, and often hilarious. That's why he's become a YouTube star. Jim has not only disrupted massive fraud operations, but his videos shed light on the intricacies of scam networks. He takes Jack on a behind-the-scenes …
  continue reading
 
When Joseph Harris was a teen, he learned that video game accounts and social media handles were worth big bucks on the dark web - if you could take control of them. Thus began his life of crime. He wormed his way into exploits, took control of email and Dropbox accounts, and eventually started sniffing out the keys to valuable crypto wallets. From…
  continue reading
 
Daniel Kelley was just 12 years old when his rivals in "World of Warcraft" found his IP address and knocked him offline during battle. These exploits, left in plain sight, made him wonder how many other companies and servers were completely vulnerable. There were thousands. At first, he looked but wouldn't touch. But eventually, the curiosity aroun…
  continue reading
 
Jim Lawler, aka "Mad Dog," was a CIA case officer for 25 years. These days, he shares the fascinating tactics the agency (and other governments) use to get people to "flip" on their own countries, and prevent catastrophes — some of them, nuclear. Jim breaks down the asset flip acronym M-I-C-E: Money, Ideology, Coercion, and Ego. Visit https://darkn…
  continue reading
 
Some video game players will do anything for an advantage, and that demand has created huge underground markets for cheat software, game exploits, and even cheat subscription packages. When game developers patch the cheats, the cheat makers find other work-arounds so as not to lose their customers. This arms race has been going on for as long as vi…
  continue reading
 
Axact is a Pakistani tech company with fancy offices and butlers waiting on their employees night and day. But they don't make apps or chatbots. Instead, they create elaborate websites and marketing materials for colleges that don't exist, then scam people into buying fake degrees. And their customers love it. One employee, let's call him "Fazal," …
  continue reading
 
HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of exploits and payloads that good guys can use to crack open a network. So...what could possibly go wrong? Visit https://darknetdiaries.com/episode/114/ for a list of sources, full transcripts, and to listen to all episodes. .…
  continue reading
 
Loading …

Hurtig referencevejledning