Episode (172)
Halaman 17 dari 18
Crypto Wars
Feb 01, 2018In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government ...
Strictly Confidential
Jan 15, 2018What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surpri...
Misadventures of a Nation State Actor
Jan 01, 2018In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.
The Rise and Fall of Mt. Gox
Dec 15, 2017Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?
Manfred (Part 2)
Dec 01, 2017Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his ful...
Manfred (Part 1)
Dec 01, 2017Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.
The Beirut Bank Job
Nov 15, 2017Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.
#ASUSGATE
Nov 01, 2017Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own ro...
Panic! at the TalkTalk Board Room
Oct 15, 2017Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a r...
DigiNotar, You are the Weakest Link, Good Bye!
Oct 01, 2017The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.