Jack Rhysider δημόσια
[search 0]
Περισσότερα
Download the App!
show episodes
 
Loading …
show series
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
If you own cryptocurrency on an exchange, it's only as safe as the employees at that company. If they get phished or hacked, say goodbye to your Bitcoin. North Korean agents have gotten VERY good at stealing hundreds of millions of dollars worth of crypto this way. Journalist Geoff White walks us through these devious and damaging heists that make …
  continue reading
 
When scammers call Jim Browning to extort money, he uses his IT skills to turn the tables on them. The results are extremely satisfying, and often hilarious. That's why he's become a YouTube star. Jim has not only disrupted massive fraud operations, but his videos shed light on the intricacies of scam networks. He takes Jack on a behind-the-scenes …
  continue reading
 
When Joseph Harris was a teen, he learned that video game accounts and social media handles were worth big bucks on the dark web - if you could take control of them. Thus began his life of crime. He wormed his way into exploits, took control of email and Dropbox accounts, and eventually started sniffing out the keys to valuable crypto wallets. From…
  continue reading
 
Daniel Kelley was just 12 years old when his rivals in "World of Warcraft" found his IP address and knocked him offline during battle. These exploits, left in plain sight, made him wonder how many other companies and servers were completely vulnerable. There were thousands. At first, he looked but wouldn't touch. But eventually, the curiosity aroun…
  continue reading
 
Jim Lawler, aka "Mad Dog," was a CIA case officer for 25 years. These days, he shares the fascinating tactics the agency (and other governments) use to get people to "flip" on their own countries, and prevent catastrophes — some of them, nuclear. Jim breaks down the asset flip acronym M-I-C-E: Money, Ideology, Coercion, and Ego. Visit https://darkn…
  continue reading
 
Some video game players will do anything for an advantage, and that demand has created huge underground markets for cheat software, game exploits, and even cheat subscription packages. When game developers patch the cheats, the cheat makers find other work-arounds so as not to lose their customers. This arms race has been going on for as long as vi…
  continue reading
 
Axact is a Pakistani tech company with fancy offices and butlers waiting on their employees night and day. But they don't make apps or chatbots. Instead, they create elaborate websites and marketing materials for colleges that don't exist, then scam people into buying fake degrees. And their customers love it. One employee, let's call him "Fazal," …
  continue reading
 
HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of exploits and payloads that good guys can use to crack open a network. So...what could possibly go wrong? Visit https://darknetdiaries.com/episode/114/ for a list of sources, full transcripts, and to listen to all episodes. .…
  continue reading
 
Adam got a great job doing IT work at a school. He liked it, and felt like he was part of the team. But when a bad decision from his past caught up with him, the old admin passwords he used to know became more tempting than ever. Visit https://darknetdiaries.com/episode/113/ for a list of sources, full transcripts, and to listen to all episodes. ..…
  continue reading
 
This is not a drill, but a dire call to action. Your privacy is worth rebelling over. Corporations and governments are greedily stripping away our digital privacy. It's not just about data; it's about power, control, and our fundamental rights. It's time to say 'No More' to data breaches, surveillance, and the casual trading of our personal lives. …
  continue reading
 
#shorts #cybersecurity DLL side-loading is a tricky attack method. It's tough for antivirus scans to catch because the running programs seem fine, but the files they call to start running are the actual problem. Visit https://darknetdiaries.com/episode/103/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.yout…
  continue reading
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
A young and ingenious hacker created ZeuS, one of the most sophisticated banking trojans. It's designed to log into your bank account and steal money from you -- as if you made the transfer yourself. The malware became so widespread, it resulted in one of the biggest FBI operations ever. Visit https://darknetdiaries.com/episode/111/ for a list of s…
  continue reading
 
One hacker, taking control of thousands of zombie computers, could send 74 BILLION spam emails per DAY. Most of it was targeting vulnerable people with the promise of inexpensive (and dangerous) prescriptions. But when law enforcement, tech platforms, and drug companies worked together, their takedown of these unprecedented botnets changed spam for…
  continue reading
 
The U.S. economy is losing literal BILLIONS of dollars to a death cult of scammers in Nigeria. Their tactics are so dark and insidious that it ruins lives and destroys families. You have to hear this story to believe it. Visit https://darknetdiaries.com/episode/141/ for a list of sources, full transcripts, and to listen to all episodes. ... https:/…
  continue reading
 
Visit https://darknetdiaries.com/episode/93/ for a list of sources, full transcripts, and to listen to all episodes. The Armslist.com case vividly illustrates the implications of Section 230 in shielding online platforms from legal accountability for user-generated content and transactions. Despite the tragic outcome of a weapon sale facilitated th…
  continue reading
 
TeaMp0isoN was a hacktivist group founded by TriCk and MLT. They were responsible for some extremely high profile hacks. But in this story, it’s not the rise that’s most interesting. It’s the fall. Visit https://darknetdiaries.com/episode/109/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?…
  continue reading
 
Marq was a very accomplished IT professional, who only lurked on darknet marketplaces because he found them interesting. But after losing his job and a close friend, the temptation to sell a trove of sensitive data was just too great. Visit https://darknetdiaries.com/episode/108/ for a list of sources, full transcripts, and to listen to all episode…
  continue reading
 
Alethe is a brilliant social engineer, but her journey into the hacking world is much stranger than fiction. She shares how a difficult upbringing brought her center stage at DefCon. Visit https://darknetdiaries.com/episode/107/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=M2rnQzYInP4…
  continue reading
 
How much online abuse are you willing to take before you decide to let your abuser have what they want? When you have a very valuable social media username, the stakes can ramp up very quickly. And in some cases, the results can be deadly. Visit https://darknetdiaries.com/episode/106/ for a list of sources, full transcripts, and to listen to all ep…
  continue reading
 
When an innocent photo that was never shared wound up on 4chan, Madison started receiving 24/7 harassment. Her twin sister Christine came to help. But despite tracking down the suspects and presenting binders full of evidence, the cops refused to help. That's when they took matters into their own hands. Visit https://darknetdiaries.com/episode/140 …
  continue reading
 
Every phone on the market is built to spy on you, but there are some encrypted phones made for privacy. There's only one problem: They're being sold to criminals. Joseph Cox, Senior Staff Writer at Motherboard, breaks down the world of encrypted phones -- a very good idea gone horribly wrong. Visit https://darknetdiaries.com/episode/105 for a list …
  continue reading
 
Loading …

Οδηγός γρήγορης αναφοράς