Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Similar Podcasts

Detective Google
Únete al club: https://splendid.clubEs el año 20XX. Desde su despacho en el fin del mundo, el Detective Google investiga los crímenes que acechan a los habitantes de internet.A medio camino entre la reflexión tecnológica y el true crime, cada temporada de Detective Google explorará cómo el crimen se aprovecha de los avances tecnológicos y cómo los avances tecnológicos inventan nuevas formas de cometer crímenes, y qué dice esta retroalimentación sobre nuestro mundo, el que hay fuera del ordenador.Apúntate a Splendid y consigue acceso a comunidades exclusivas, episodios sin anuncios y contenido extra de todos nuestros podcasts: https://splendid.club Hosted on Acast. See acast.com/privacy for more information.

Como pienso, digo
Este es mi espacio personal, donde encontrarán todo tipo de reflexiones sobre diversas temáticas, que como las pienso, las digo.

DEMENTES
Conversaciones sin censura con los referentes de cada industria. Todos mis invitados se salieron del camino tradicional y en el episodio hablamos de cómo lo hicieron y los aprendizajes que han tenido en el camino. DEMENTES Podcast es parte del Network de SONORO.
Ep 13: Carna Botnet
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing.
Ep 12: Crypto Wars
In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to use strong encryption. Listen to their battle and what they had to do through to accomplish this.
Ep 11: Strictly Confidential
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.
Ep 10: Misadventures of a Nation State Actor
In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.
Ep 9: The Rise and Fall of Mt. Gox
Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?
Ep 8: Manfred (Part 2)
Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this.
Ep 7: Manfred (Part 1)
Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.
Ep 6: The Beirut Bank Job
Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.
Ep 5: #ASUSGATE
Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable.
Ep 4: Panic! at the TalkTalk Board Room
Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.
Ep 3: DigiNotar, You are the Weakest Link, Good Bye!
The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.
Ep 2: The Peculiar Case of the VTech Hacker
VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.
Ep 1: The Phreaky World of PBX Hacking
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured.