logo
episode-header-image
Dec 2022
1h 8m

131: Welcome to Video

Jack Rhysider
About this episode
Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website. This story is part of Andy’s new book “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. An affiliate lin ... Show More
Up next
Jan 20
169: MoD
Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the i ... Show More
1h 6m
Jan 6
168: LoD
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security cu ... Show More
1h 17m
Dec 23
167: Threatlocker
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.SponsorsThis episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengt ... Show More
49m 17s
Recommended Episodes
Feb 2023
I Know What You Did With That Bitcoin
<p>If you’ve committed any internet crimes lately, you probably shouldn’t have paid for them with Bitcoin. While many crypto-evangelists have long thought of digital currency as a means of buying legal and illicit goods on the web with total anonymity, the fact is that nearly all ... Show More
27m 28s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Mar 2023
Crypto hacker hijinks, government spyware, and Utah social media shocker
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gra ... Show More
47m 33s
Feb 2024
DOJ strikes justice.
The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coo ... Show More
30m 31s
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ... Show More
1h 3m
Jan 2024
The Growing Ransomware Threat: Targets, Insights, and Strategies with Halcyon's Jon Miller | E1877
<p>This Week in Startups is brought to you by…</p> <p>Scalable Path. Want to speed up your product development without breaking the bank? Since 2010, Scalable Path has helped over 300 companies hire deeply vetted engineers in their time zone. Visit <a href="http://www.scalablepat ... Show More
55m 53s
Jun 2021
How the FBI Ran Its Own Texting App to Catch Criminals
It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy ... Show More
28m 52s
May 2020
The Dark Secrets of a Hacking Hero
<p>In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ... Show More
30m 39s
May 2023
BlackCat gang crosses your path and evades detection. You’re just too good to be true, can’t money launder for you. Commercial spyware cases.
AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymu ... Show More
29m 32s