EP 103: Cloud Hopper
Fabio Viggiani is an incident responder. In this episode he talks about the story when one of his clients were breached.
Listen NowFabio Viggiani is an incident responder. In this episode he talks about the story when one of his clients were breached.
Listen NowFrank Bourassa had an idea. He was going to make money. Literally. Listen to the story of a master counterfeiter.
Listen NowIn 2014 the Puerto Rico Lottery was mysteriously losing money. Listen to this never before told story about what happened and who did it.
Listen NowThe NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile phone. They sell this spyware to government agencies around the world. How is it used and what kind of company is the NSO Group?
Listen NowIgor works as a private investigator in NYC. He's often sitting in cars keeping a distant eye on someone with binoculars. Or following someone through the busy streets of New York. In this episode we hear about a time when Igor was on a case but s...
Listen NowZero day brokers are people who make or sell malware that's sold to people who will use that malware to exploit people. It's a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for...
Listen NowWhat if someone wanted to own your Instagram account? Not just control it, but make it totally theirs. This episode tells the story of how someone tried to steal an Instagram account from someone.
Listen NowNicole Beckwith wears a lot of hats. She's a programmer, incident responder, but also a cop and a task force officer with the Secret Service. In this episode she tells a story which involves all of these roles.
Listen NowJon and Brian are penetration testers. They're paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of when everything goes wrong.
Listen NowChris Davis has been stopping IT security threats for decades. In this episode he tells a few tales of some threats that he helped stop.
Listen NowKik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
Listen NowThe Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn't store any of the copyrighted material. It just points the user to where you can download i...
Listen NowWhat happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran, aka webjedi, was there for one of these intrusions and tells us the story of what happened.
Listen NowMeet Jenny Radcliffe, the People Hacker. She's a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing job...
Listen NowThe threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats.
Listen NowVictor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
Listen NowIn 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story.
Listen NowIn 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.
Listen NowThis is the story of Cam Harrison, aka kilobit and his rise and fall as a prominent carder.
Listen NowHow bad is it if you post your boarding pass on Instagram? Our guest Alex decides to figure this out for themself and has quite a story about what happened. We also hear from TProphet who’s here to give us some travel hacks to save tons on airfare...
Listen NowIn this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there.
Listen NowThe Zero Day Initiative runs a contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, even cars. Whoever can demonstrate the most vulnerabili...
Listen NowThis is the story of a darknet marketplace vendor we'll name V. He tells his story of how he first became a buyer, then transitioned into seller.
Listen NowIn this episode we hear a story from a social engineer who's job it is to get people to do things they don't want to do. Why? For profit.
Listen NowWhat do you do when you find yourself the target of a massive hacking campaign, and you are getting thousands of phishing emails and someone following you in your car. You might turn to Citizen Lab who has the ability to research who is behind thi...
Listen NowNerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdcore music.
Listen NowIn February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out a lot of the Olympic's digital infrastructure. Teams rushed to get things back up, but it was bad. Malware had repeatedly wiped the domain c...
Listen NowThis is the story about how someone hacked into JP Morgan Chase, one of the biggest financial institutions in the world. It's obvious why someone would want to break into a bank right? Well the people who hacked into this bank, did not do it for o...
Listen NowFrom 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This had terrifying consequences.
Listen NowPoker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winn...
Listen Now