EP 109: TeaMp0isoN
TeaMp0isoN was a hacking group that was founded by TriCk and MLT. They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.
Listen NowTeaMp0isoN was a hacking group that was founded by TriCk and MLT. They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.
Listen NowThis is the story of Marq. Which involves passwords, the dark web, and police.
Listen NowAlethe is a social engineer. Professionally she tries to trick people to give her passwords and access that she shouldn't have. But her journey to this point is interesting and in this episode she tells us how she became a social engineer.
Listen NowHow much online abuse are you willing to take before you decide to let your abuser have what they want? Unfortunately, this is a decision that many people have to ask themselves.
Listen NowJoseph Cox, Senior Staff Writer at Motherboard, joins us to talk about the world of encrypted phones.
Listen NowArya Ebrahami has had quite a personal relationship with darknet marketplaces. In this episode you’ll hear about his adventures on tor.
Listen NowFabio Viggiani is an incident responder. In this episode he talks about the story when one of his clients were breached.
Listen NowFrank Bourassa had an idea. He was going to make money. Literally. Listen to the story of a master counterfeiter.
Listen NowIn 2014 the Puerto Rico Lottery was mysteriously losing money. Listen to this never before told story about what happened and who did it.
Listen NowThe NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile phone. They sell this spyware to government agencies around the world. How is it used and what kind of company is the NSO Group?
Listen NowIgor works as a private investigator in NYC. He's often sitting in cars keeping a distant eye on someone with binoculars. Or following someone through the busy streets of New York. In this episode we hear about a time when Igor was on a case but s...
Listen NowZero day brokers are people who make or sell malware that's sold to people who will use that malware to exploit people. It's a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for...
Listen NowWhat if someone wanted to own your Instagram account? Not just control it, but make it totally theirs. This episode tells the story of how someone tried to steal an Instagram account from someone.
Listen NowNicole Beckwith wears a lot of hats. She's a programmer, incident responder, but also a cop and a task force officer with the Secret Service. In this episode she tells a story which involves all of these roles.
Listen NowJon and Brian are penetration testers. They're paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of when everything goes wrong.
Listen NowChris Davis has been stopping IT security threats for decades. In this episode he tells a few tales of some threats that he helped stop.
Listen NowKik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
Listen NowThe Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn't store any of the copyrighted material. It just points the user to where you can download i...
Listen NowWhat happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran, aka webjedi, was there for one of these intrusions and tells us the story of what happened.
Listen NowMeet Jenny Radcliffe, the People Hacker. She's a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing job...
Listen NowThe threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats.
Listen NowVictor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
Listen NowIn 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story.
Listen NowIn 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.
Listen NowThis is the story of Cam Harrison, aka kilobit and his rise and fall as a prominent carder.
Listen NowHow bad is it if you post your boarding pass on Instagram? Our guest Alex decides to figure this out for themself and has quite a story about what happened. We also hear from TProphet who’s here to give us some travel hacks to save tons on airfare...
Listen NowIn this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there.
Listen NowThe Zero Day Initiative runs a contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, even cars. Whoever can demonstrate the most vulnerabili...
Listen NowThis is the story of a darknet marketplace vendor we'll name V. He tells his story of how he first became a buyer, then transitioned into seller.
Listen NowIn this episode we hear a story from a social engineer who's job it is to get people to do things they don't want to do. Why? For profit.
Listen Now