Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a j
Chris Davis has been stopping IT security threats for decades. He’s currently running the company Hy
Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But som
The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrigh
What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka w
Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Wh
The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tra
Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about di
In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Ha
In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user detail
This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder.Sponsor
How bad is it if you post your boarding pass on Instagram? Our guest, “Alex” decides to figure this
In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their stor
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in
This is the story of a darknet marketplace vendor we’ll name V. V tells his story of how he first be
In this episode we hear a story from a social engineer who’s job it is to get people to do things th
What do you do when you find yourself the target of a massive hacking campaign, and you are getting
Nerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdc
In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wipi
This is the story about how someone hacked into JP Morgan Chase, one of the biggest financial instit
From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was