Jack Rhysider public
[search 0]
Plus
Téléchargez l'application!
show episodes
 
Loading …
show series
 
When a large corporation with thousands of computers was breached, Fabio was called in to investigate. But he quickly found a cryptic note lurking inside the malware, and realized the company that hired him wasn't the true target after all. Visit https://darknetdiaries.com/episode/103/ for a list of sources, full transcripts, and to listen to all e…
  continue reading
 
Why earn money when you can literally create it? Frank Bourassa always loved dangerous projects, but figuring out how to print millions of fake $20 bills cost him much more than the price of ink and paper. Visit https://darknetdiaries.com/episode/102/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.co…
  continue reading
 
The hacktivist known as D3f4ult was upset with the status quo. So he (and his cohorts) used their skills to take down predators and expose government surveillance. But when he set his sights on a much bigger target — the director of the CIA — things got hot real fast. Visit https://darknetdiaries.com/episode/139/ for a list of sources, full transcr…
  continue reading
 
In 2014, the Puerto Rican lottery was mysteriously losing money. Yet, a complete audit of the drawing and the accounting showed no issues. That's when one penetration tester got the green light to go deep, and uncover a scam so dangerous, he had to leave the island. Visit https://darknetdiaries.com/episode/101/ for a list of sources, full transcrip…
  continue reading
 
The highly secretive company NSO Group creates an insidious spyware called "Pegasus" that can jailbreak an iPhone remotely and log every keystroke and call. They sell it to governments who claim they're using it to fight crime and terrorism. But investigations by accountability groups show that this virus is used to spy on journalists, activists, a…
  continue reading
 
Igor works as a private investigator in NYC. He’s often sitting in cars, keeping a distant eye on someone with binoculars, or following someone through busy streets. But there was one case where something just didn't feel right. The more he looked into it, the deeper the rabbit hole went. Visit https://darknetdiaries.com/episode/99/ for a list of s…
  continue reading
 
If a hacker finds a bug at Microsoft or Google, they could report it to the company, get it patched up, and get a nice reward. OR, they could sell it to a government for WAY more money. That government would keep it secret, and might use it to spy on other countries, or its own people. New York Times cybersecurity reporter Nicole Perlroth takes us …
  continue reading
 
What if someone wanted to own your Instagram account? Not just control it, but make it totally theirs? There's a black market for "OG" social handles. But when Miles refused to sell, some hackers took matters into their own hands in a truly terrifying way. Visit https://darknetdiaries.com/episode/97/ for a list of sources, full transcripts, and to …
  continue reading
 
Your cousin calls. He asks about your family, even specific details like your dad's heart condition. After the chit-chat, he explains he's in big trouble, and his lawyer needs you to wire $2,000 to fight the charges. Most people would want to help. But the truth is, that's not really your cousin. In fact, it's all an elaborate scam. Check out the t…
  continue reading
 
When a malware report at a small town police station fell into Nicole Beckwith's jurisdiction, she could sense there was more to the story. Over the course of months, she worked at the U.S. Secret Service to unravel a digital forensics mystery that went all the way to the mayor's office. Visit https://darknetdiaries.com/episode/96/ for a list of so…
  continue reading
 
Jon and Brian are paid to break into buildings and hack networks to test their security. But on one mission, even the best preparation and tools did not equip them for what happened next. Visit https://darknetdiaries.com/episode/95/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=1isotvePA…
  continue reading
 
When Chris Davis sniffed out some strange Web traffic patterns, he peeled back the layers to discover one of the largest botnets ever created. But what was it for? And who is behind this malicious network? Visit https://darknetdiaries.com/episode/94 for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/…
  continue reading
 
#shorts Tensions got high when Pakistan did not give justice to the terrorist attacks that killed 40 Indian soldiers. Indian hackers took to the internet and hacked Pakistan as a form of protest. Listen to the full episode -🎙Darknet Diaries Ep. 51: The Indo-Pak Conflict ... https://www.youtube.com/watch?v=ym-9lozDDlw…
  continue reading
 
*Content Warning* This episode contains descriptions of child abuse, exploitation, and other NSFW language. Kik is a messaging app marketed to teens. 1 in 3 U.S. teenagers use Kik. Yet the company that owns the platform has abandoned it, and it has grown rampant with child predators and illicit content. So who is responsible for cleaning up this me…
  continue reading
 
When does selling spyware become a crime against humanity? "Mercenary Spyware" is a new grade of espionage tools that can track down terrorists *or* facilitate genocide, depending on who's using it. And the people who make it don't care who's buying, as long as they have the cash. In this episode we hear from Crofton Black at Lighthouse Reports who…
  continue reading
 
The Pirate Bay has been the go-to destination for pirated music, movies, and software since 2003, and despite MANY attempts by large companies and governments to destroy it, the site still lives on 20 years later. This is the story of its creators, their often radical views about copyright, and how this strange "Google for torrents" has bounced bac…
  continue reading
 
Amélie Koran, aka webjedi, has defended the networks of the largest governments, non-profits, and companies in the world. But when she spotted something lurking on the computers of the World Bank, a suspicious log quickly turned into a round-the-clock crisis. Visit https://darknetdiaries.com/episode/91/ for a list of sources, full transcripts, and …
  continue reading
 
Jenny Radcliffe is a People Hacker, and became a social engineer before it was cool. She gets paid to break into buildings and test their security. She shares three stories of how she blends in, breaks in, and one time when things went horribly wrong. Visit https://darknetdiaries.com/episode/90/ for a list of sources, full transcripts, and to liste…
  continue reading
 
When federal investigators uncovered a terrorist's phone, even Apple couldn't unlock it. That's when the FBI turned to a darknet marketplace for some shadier (and expensive) tools. Get the full story here: https://www.youtube.com/watch?v=cCojdhIBNeM ... https://www.youtube.com/watch?v=hZqX-WzCqLIPar Jack Rhysider
  continue reading
 
The threat research team at Cybereason uncovered an interesting piece of malware. Many shrugged it off, but the more they studied and tracked it, the more it pointed to a serious threat actor, targeting Palestinian politicians. Visit https://darknetdiaries.com/episode/89/ for a list of sources, full transcripts, and to listen to all episodes. ... h…
  continue reading
 
*This episode was originally published on March 30, 2021. Some of the details about Twitter's policies and verified accounts is now out of date.* The Guild of the Grumpy Old Hackers hacked Donald Trump's Twitter account back in 2016 with surprising ease. SURELY when he became president, his security was locked down? Well ... Listen to episode 87 he…
  continue reading
 
Changing the parts on your PC and making copies of your software is a long-held tradition. So if game consoles are just tiny computers, shouldn't you be able to modify them? You used to, until lawsuits started favoring game companies instead of players. This is the story of Gary Bowser, a long-time hacker and modder who landed in VERY hot water wit…
  continue reading
 
A breach at LinkedIn and some truly terrible passwords allowed three Belgian guys to take control of Donald Trump's Twitter account in 2016. How they did it, and what they did next, might change how you think about social media. Visit https://darknetdiaries.com/episode/87/ for a list of sources, full transcripts, and to listen to all episodes. ... …
  continue reading
 
In 2012, LinkedIn was the target of a massive data breach. A hacker got in and stole millions of user details. But this wasn't because of weak user passwords or bad security practices. It all came down to one LinkedIn engineer's crucial mistake. Visit https://darknetdiaries.com/episode/86 for a list of sources, full transcripts, and to listen to al…
  continue reading
 
Making fake IDs is an art. But when partnered up with stolen credit cards, the sky's the limit on how much cash you can pull out of a local ATM. Visit https://darknetdiaries.com/episode/85/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=c9CCLfmH9wA…
  continue reading
 
The list of tricks hackers and phishers use to take control of your accounts is endless. There's even a 2nd hand market for compromised passwords, if you know where to look. Watch the full video here: https://www.youtube.com/watch?v=Qm7k1CPFkIc ... https://www.youtube.com/watch?v=Oq3BsVtEbHYPar Jack Rhysider
  continue reading
 
PRO-TIP: Never post a picture of your boarding pass online. In fact, you probably shouldn't post anything online -- especially if you're the Prime Minister of a country. Visit https://darknetdiaries.com/episode/84/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=ko2duHwO280…
  continue reading
 
Government computer networks across the Caribbean - including critical infrastructure like power plants - were infested with dormant malware, ready to activate when the time was right. Who was behind this massive attack, and how did one threat hunter named Omar figure it out? Visit https://darknetdiaries.com/episode/135 for a list of sources, full …
  continue reading
 
Working on the tech side of the NSA doesn't happen overnight. It requires rigorous training, background checks, and a safe and secret place to let Chinese malware run wild. Visit https://darknetdiaries.com/episode/83 for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=JemCG7y_2kc…
  continue reading
 
Loading …

Guide de référence rapide