Jack Rhysider
Want full access? Sign up to get personalized summaries, transcripts, and more.
Get Started FreeIn 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts we...
Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully...
Israel has their own version of the NSA called Unit 8200. I was curious what this unit does and tried to take a peek inside. Hear what I foun...
Something is wrong with the Apple Podcasts top charts. As a podcaster, this personally annoyed and intrigued me. I investigate how this is ha...
The IRS processes $3 trillion dollars a year. A lot of criminals want to get a piece of that. In 2015 the IRS had a large data breach. Hundre...
Alberto Hill was sent to prison for a long time for hacking. For a crime he said he did not commit. Listen to his story and you be the judge...
Darknet markets are online black markets. They are highly illegal, and dangerous to run. Hear exactly how dangerous it was for Alphabay and H...
When banks started coming online, they almost immediately started being targeted by hackers. Vladimir Levin was one of the first ever known h...
Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee whic...
Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time h...
Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobm...
In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet....
A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money.
A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for....
In 2007, a hacker named Eijah got fed up with the way DRM prevented him from being able to play the content he paid for. He decided to fight...
A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident respo...
In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the coun...
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just...
In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be...
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the sto...
Join other podcast enthusiasts who are getting podcast summaries.
Sign Up Free