logo
episode-header-image
Today
1h 4m

Don't Fence Me In: Mark DeFriest

iHeartPodcasts
About this episode

How does someone get a life sentence for stealing their own tools? Take one part probate, one part rebellion, multiple parts prison escapes, and one part Florida. What you get is the wild tale of Mark DeFriest, the Prison Houdini. 

See omnystudio.com/listener for privacy information.

Up next
Aug 21
Curate This: Influencer Crimes
Looking for some engagement with some crime content from the world of social media influencers? Look no further, Rude Dudes! Become brand embassadors to ridiculousness with tales of sob stories, lies, and financial hijinks! #adSee omnystudio.com/listener for privacy information. 
59m 42s
Aug 19
Someone Could've Died! The Best-Ever College Football Pranks
There's Coach John Heisman, bacon grease, rivals Auburn vs. Georgia Tech and the train that nearly wrecked. There's LSU vs. Tulane and the hijacking of the mascot Mike the Tiger, a real live Bengal. There's also Harvard vs. Yale (vs. MIT) and the surprise exploding football field ... Show More
53m 30s
Aug 14
The Wheels on the CAN Bus: Car Hacks
Today's automobiles are brimming with technology. Most of the time, that's pretty cool. But it stops being cool when sneaky hackers breach the systems and have a field day. Those are crimes…ridiculous crimes.See omnystudio.com/listener for privacy information. 
52m 21s
Recommended Episodes
Oct 2024
Notorious Hackers
Cybersecurity company Kaspersky has a list of the most notorious hackers of all time. We look at three of the entries, from the loose confederation of hackers called Anonymous to a hacker responsible for stealing millions of credit and debit card numbers.See omnystudio.com/listen ... Show More
42m 31s
Jan 2025
When Hackers Get Hacked: Cyber Security Today for January 27, 2025
Cybersecurity Recap: Major Data Breaches, Transparency Issues, and a Twist on Script Kiddies In this episode of Cybersecurity Today, host Jim Love covers various major cybersecurity incidents and developments. Mozilla criticizes the auto industry's data privacy practices followin ... Show More
7m 57s
Apr 2017
Elections, influence operations, and hacking. How clever phishing succeeds. Chipotle's point-of-sale breach. Hacking in Fast and Furious 8.
In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise s ... Show More
15m 33s
Oct 2019
Defending against future tech
It’s becoming incredibly easy to purchase commercial hacking tools as new technology becomes available, so how do we defend ourselves against this? Brand Ambassador for CTRL Group and reformed Hacker Bastien Treptel invites Srini Raghuram, the Director of Security Engineering fro ... Show More
27m 26s
Jan 2025
CES 2025
We're going over some of the coolest and strangest inventions that are about to change our lives forever from this year's Consumer Electronics Show!See omnystudio.com/listener for privacy information. 
6m 30s
Feb 2025
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate ... Show More
9m 51s
Jan 2025
A Hacker's View of Civic Infrastructure: Cyber Security Today Weekend January 25, 2025
Exploring Cyber Vulnerabilities in Civic Infrastructure with Ethical Hacker Nick Aleks In this episode, we dive into the vulnerabilities present in our civic infrastructure with ethical hacker Nick Aleks. We discuss the risks associated with outdated and poorly secured systems th ... Show More
24m 6s
Oct 2024
How One Teenager Became a Legendary Hacker
Investigators say that Arion Kurtaj’s life in cybercrime began at age 11, and ultimately led to his participation in the hacks of major companies like Nvidia, Microsoft, and Uber. WSJ’s Robert McMillan explains how Kurtaj’s case has brought worries about a new breed of fearless y ... Show More
19m 44s
Jan 2025
Hacking the bureau.
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulne ... Show More
40m 16s
May 5
Ep 8: Living Off The Land
Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’ ... Show More
34m 46s