Jack Rhysider openbaar
[search 0]
Meer
Download the App!
show episodes
 
Loading …
show series
 
The terror attacks on September 11, 2001 changed everyone's life, around the world. But for Shannen Rossmiller, a judge in rural Montana, understanding how it happened and who would do such a thing became an obsession. Despite the danger to her life and family, she went undercover in extremist online forums and assumed the identity of multiple Arab…
  continue reading
 
Rachel Tobac is an unsuspecting social engineer who never thought she'd become a world-renown hacker. But after an amazing feat at DEF CON in Las Vegas, she started getting calls from huge tech companies and government contractors asking for her help. In this episode we, learn why a hacker's best tool has nothing to do with tech, and everything to …
  continue reading
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
If you own cryptocurrency on an exchange, it's only as safe as the employees at that company. If they get phished or hacked, say goodbye to your Bitcoin. North Korean agents have gotten VERY good at stealing hundreds of millions of dollars worth of crypto this way. Journalist Geoff White walks us through these devious and damaging heists that make …
  continue reading
 
When scammers call Jim Browning to extort money, he uses his IT skills to turn the tables on them. The results are extremely satisfying, and often hilarious. That's why he's become a YouTube star. Jim has not only disrupted massive fraud operations, but his videos shed light on the intricacies of scam networks. He takes Jack on a behind-the-scenes …
  continue reading
 
When Joseph Harris was a teen, he learned that video game accounts and social media handles were worth big bucks on the dark web - if you could take control of them. Thus began his life of crime. He wormed his way into exploits, took control of email and Dropbox accounts, and eventually started sniffing out the keys to valuable crypto wallets. From…
  continue reading
 
Daniel Kelley was just 12 years old when his rivals in "World of Warcraft" found his IP address and knocked him offline during battle. These exploits, left in plain sight, made him wonder how many other companies and servers were completely vulnerable. There were thousands. At first, he looked but wouldn't touch. But eventually, the curiosity aroun…
  continue reading
 
Jim Lawler, aka "Mad Dog," was a CIA case officer for 25 years. These days, he shares the fascinating tactics the agency (and other governments) use to get people to "flip" on their own countries, and prevent catastrophes — some of them, nuclear. Jim breaks down the asset flip acronym M-I-C-E: Money, Ideology, Coercion, and Ego. Visit https://darkn…
  continue reading
 
Some video game players will do anything for an advantage, and that demand has created huge underground markets for cheat software, game exploits, and even cheat subscription packages. When game developers patch the cheats, the cheat makers find other work-arounds so as not to lose their customers. This arms race has been going on for as long as vi…
  continue reading
 
Axact is a Pakistani tech company with fancy offices and butlers waiting on their employees night and day. But they don't make apps or chatbots. Instead, they create elaborate websites and marketing materials for colleges that don't exist, then scam people into buying fake degrees. And their customers love it. One employee, let's call him "Fazal," …
  continue reading
 
HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of exploits and payloads that good guys can use to crack open a network. So...what could possibly go wrong? Visit https://darknetdiaries.com/episode/114/ for a list of sources, full transcripts, and to listen to all episodes. .…
  continue reading
 
Adam got a great job doing IT work at a school. He liked it, and felt like he was part of the team. But when a bad decision from his past caught up with him, the old admin passwords he used to know became more tempting than ever. Visit https://darknetdiaries.com/episode/113/ for a list of sources, full transcripts, and to listen to all episodes. ..…
  continue reading
 
This is not a drill, but a dire call to action. Your privacy is worth rebelling over. Corporations and governments are greedily stripping away our digital privacy. It's not just about data; it's about power, control, and our fundamental rights. It's time to say 'No More' to data breaches, surveillance, and the casual trading of our personal lives. …
  continue reading
 
#shorts #cybersecurity DLL side-loading is a tricky attack method. It's tough for antivirus scans to catch because the running programs seem fine, but the files they call to start running are the actual problem. Visit https://darknetdiaries.com/episode/103/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.yout…
  continue reading
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
A young and ingenious hacker created ZeuS, one of the most sophisticated banking trojans. It's designed to log into your bank account and steal money from you -- as if you made the transfer yourself. The malware became so widespread, it resulted in one of the biggest FBI operations ever. Visit https://darknetdiaries.com/episode/111/ for a list of s…
  continue reading
 
Loading …

Korte handleiding