how fbi ran its own texting app to catch criminals
▶ play ♪ mp3 m3u

How the FBI Ran Its Own Texting App to Catch Criminals

It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized the

introducing next call david ridgen
▶ play ♪ mp3 m3u

Introducing: The Next Call with David Ridgen

From David Ridgen, the creator of Someone Knows Something, comes the new investigative podcast The Next Call. Tackling unsolved cases through strategic phone calls. From the victim's family members to

chinas unrestricted warfare part
▶ play ♪ mp3 m3u

China’s Unrestricted Warfare, Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal import

cpradio your most vulnerable computer
▶ play ♪ mp3 m3u

[CPRadio] Your Most Vulnerable Computer

Would you use a computer without any kind of antivirus? Would you put your personal photos on that device? Use it to text and email? Access your bank? It turns out: you're probably already doing all o



cias woke twitter rebrand
▶ play ♪ mp3 m3u

The CIA's Woke Twitter Rebrand

The Central Intelligence Agency. Since its inception during the Cold War days it’s taken on the mystique as the silent hand of the US government. It’s been entwined in controversies ranging from the P

colonial pipeline darkside assaf dahan b side
▶ play ♪ mp3 m3u

Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported in many East Coast states.The entity

my first hack high school prank bad opsec
▶ play ♪ mp3 m3u

My First Hack: A High School Prank With Bad OPSEC

Before he even knew he wanted to be a hacker, Haroon Meer figured out “on a whim” that he could mess with all the high school computers by just changing one single character in a configuration fi

introducing death in cryptoland
▶ play ♪ mp3 m3u

Introducing: A Death in Cryptoland

When the young CEO of Canada’s largest cryptocurrency exchange is reported to have died while honeymooning in India, it sets off a cataclysmic chain of events that would leave about 76,000 people out


place where you get answers from
▶ play ♪ mp3 m3u

The Place Where You Get Answers From

Jordan Bloemen & Scott Francis Winder discuss the saga of Vastaamo, and what happens when some of the most sensitive data imaginable finds its way into the wrong hands.If you like the show and want to

rsa breach part
▶ play ♪ mp3 m3u

RSA Breach, Part 2

In the wake of RSA's disclosure of the breach, the company cyber analysts chose not to boot the attackers of their network - but followed their activities closely, trying to figure out their identitie

rsa breach untold story part
▶ play ♪ mp3 m3u

RSA Breach: The Untold Story, Part 1

In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionag

how drug cartels do cybersecurity
▶ play ♪ mp3 m3u

How Drug Cartels Do Cybersecurity

The many Mexican cartels of the last few decades have developed into what the US government sees as a not only criminal but a geopolitical enemy, joining the ranks of the Taliban, ISIS, al-Qaeda, and


cpradio cyber academy
▶ play ♪ mp3 m3u

[CPRadio] Cyber Academy -

In our previous episodes, you heard the term more than once. But what exactly does it mean? What stands behind this big word?For such terms and questions, we create the format of Cy

everything you need to know about pipeline hack
▶ play ♪ mp3 m3u

Everything You Need To Know About the Pipeline Hack

So another band of hackers struck again: a criminal gang known as DarkSide’ unleashed a ransomware attack on the Colonial Pipeline, which shut down an integral line that supplies the East Coast with o

chinas unrestricted warfare part
▶ play ♪ mp3 m3u

China’s Unrestricted Warfare, Part 2

In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionag

pokemon card gold rush is causing labor crisis
▶ play ♪ mp3 m3u

The Pokemon Card Gold Rush Is Causing a Labor Crisis

An avalanche of cardboard’ is completely overwhelming card grading companies as collectors try to cash in on Pokemon’s resurgent popularity.  See for privacy and opt-out in


creating grassroots security conference jack daniel ml b side
▶ play ♪ mp3 m3u

Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]

Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides'

cpradio in cybersecurity
▶ play ♪ mp3 m3u

[CPRadio] 2020 in Cybersecurity

In 2020 hospitals were hit with ransomware, corporations with phishing attacks, and we saw one of the biggest hacks ever conceived: the SolarWinds breach. It was a groundbreaking year, so in this epis

three meaningless words
▶ play ♪ mp3 m3u

Three Meaningless Words

Jordan Bloemen & Scott Francis Winder discuss the internet's oldest and weirdest mystery and whether it's any of those things.If you like the show and want to make sure we can keep making it, please

inside one biggest apple device hacks ever
▶ play ♪ mp3 m3u

Inside One of the Biggest Apple Device Hacks Ever

For years, Apple has claimed its devices are the most secure in the world, poo-pooing PC and Android devices for being as clean as a public swimming pool. But just this week, Motherboard’s very own Lo


chinas unrestricted warfare part
▶ play ♪ mp3 m3u

China’s Unrestricted Warfare, Part 1

Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veterans

introducing lazarus heist
▶ play ♪ mp3 m3u

Introducing: The Lazarus Heist

The Lazarus Heist is a new podcast from our partners at the BBC World Service. It’s about a devastating cyber-attack, Kim Jong-un, Sony Pictures Entertainment, and how the Lazarus Group hackers caused

why whatsapp wont let you appear offline
▶ play ♪ mp3 m3u

Why WhatsApp Wont Let You Appear Offline

It’s easily one of the world’s most popular messaging apps, owned and operated by Mark Zuckerberg and his Facebook empire.But more recently WhatsApp has come under some serious scrutiny for some very

can nuclear power plants be hacked
▶ play ♪ mp3 m3u

Can Nuclear Power Plants Be Hacked?

Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power plant


far rights war against porn
▶ play ♪ mp3 m3u

The Far Right's War Against Porn

Since Capitol Hill everybody has become pretty intimately familiar with how radical and violent the far-right truly is. Online it exists in cesspools like the encrypted app Telegram, or Gab, a Twitter

shutting down internet in minutes chris wysopal ml b side
▶ play ♪ mp3 m3u

Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]

Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, a

how your phone can get hacked for
▶ play ♪ mp3 m3u

How Your Phone Can Get Hacked for $16

What if we told you that your phone could be hacked 16$ and all of the texts that were meant for you, were rerouted to someone else with nefarious designs on your most personal exchanges? It’s a real

lpht part end
▶ play ♪ mp3 m3u

L0pht’, Part 2 – The End

In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the 90s many of the L0pht hackers had qu


my first hack how cybersecurity pioneer hacked her way through life
▶ play ♪ mp3 m3u

My First Hack: How a Cybersecurity Pioneer Hacked Her Way Through Life

Katie Moussouris is now a recognizable name in the cybersecurity industry. She is one of the pioneers in the world of bug bounties after starting Microsoft’s program. But before she became a famous ha

story lpht part
▶ play ♪ mp3 m3u

The Story of L0pht’, Part 1

'L0pht', or 'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet s

deepfaking it
▶ play ♪ mp3 m3u

Deepfaking It

Jordan Bloemen & Scott Francis Winder discuss a Pennsylvania Cheer mom with an (alleged) grudge, an impressive imagination, and a powerful new tool at her disposal.If you like the show and want to mak

cpradio vaccines on darknet
▶ play ♪ mp3 m3u

[CPRadio] Vaccines on the Darknet

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal import3



hacking

subscribe m3u
Hacking podcasts
Sub created by yama, moderated by yama. Suggest a podcast (pending approvals: 0)
 

links



Creating your own community (subpoddl) is free and easy. Once signed up you can create your own community
Tip: click on thumbnail image for direct mp3 download


Copyright © poddl.com 2020 - Podcast content © their respective owners, Poddl.com does not rehost any podcast
Twitter:@poddlcom  |  Reddit: /r/poddl  |  Email and DMCA takedown notices: info@etc  | Login  | Sign Up