Jack Rhysider
Want full access? Sign up to get personalized summaries, transcripts, and more.
Get Started FreeIn the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used onli...
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a...
In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exac...
Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?
Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual g...
Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.
Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.
Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to res...
Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metr...
The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what h...
VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the...
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we...
Join other podcast enthusiasts who are getting podcast summaries.
Sign Up Free