logo
episode-header-image
Nov 2018
1h 11m

#130 The Snapchat Thief

Gimlet
About this episode
This week, a new Super Tech Support: after Lizzie's Snapchat gets hacked, things start getting really creepy. Alex investigates. Michael Bazzell's Podcast The complete Security and Privacy Podcast Steps Michael Bazzell Gave Alex to Protect Himself How to port your phone number Password Manager Google Authenticator Yubikey Michael's workbook to freeze your cr ... Show More
Up next
Dec 2024
Casey Wants to Believe
If you like this episode and want to hear more, please sign up for our premium feed here! https://hyperfixedpod.com/joinIf you would like to join at the $60 yearly level and receive your very own Big Chub Chet's button, you can do so here:https://hyperfixedpod.com/buttonThere are ... Show More
34m 17s
Jun 2022
#189 Goodbye All
One last thing before we go. Learn more about your ad choices. Visit podcastchoices.com/adchoices 
53m 49s
Jun 2022
#188 Into the Depths
Inspired by @depthsofwikipedia, this week we dive deeper into three of our favorite weird Wikipedia pages. Learn more about your ad choices. Visit podcastchoices.com/adchoices 
45m 34s
Recommended Episodes
Aug 2023
A Fortune in Crypto, Stolen With a Phone
Hackers ripped off Michael Terpin with a textbook SIM swap. When he went to war to get his $24 million back, the thieves’ friends were unusually happy to help. By Margi Murphy and Drake BennettSee omnystudio.com/listener for privacy information. 
38m 50s
May 2022
118: Hot Swaps
This is the story of Joseph Harris (https://twitter.com/akad0c). When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned. Joseph sometimes demonstrates vuln ... Show More
1h 26m
Aug 2021
444: It Should Definitely Bother Apple
Follow-up: Disney PhotoPass (via Ryan D) Bug bounties (via Dan Chandler) Cryptocurrency and failed monetary systems CSAM Security Threat Model Rview of Apple’s Child Safety Features Joanna Stern’s interview with Craig Federighi Patriot Act Digital Millennium Copyright Act 1Passwo ... Show More
2h 22m
Sep 2023
TWiG 732: Unidentified Flying Skellington - New Android Branding, Twitter Spy
Britain Admits Defeat in Controversial Online Safety Bill When Tech Says "No" Apple Backs Down on Its Controversial Photo-Scanning Plans The FBI secretly launched an encrypted messaging system for criminals Former Twitter Employees Charged With Spying for Saudi Arabia Jeff Jarvis ... Show More
2h 14m
Mar 2022
The Rise of the Hacking Group LAPSUS$
It started with SIM swapping and escalated into hacks of Okta, Microsoft, Nvidia, and EA. They’re LAPSUS$, a hacking collective that’s been the boogeyman of big corporations for the past few years. People have wondered about their motivations and identities. Now, seven of them ha ... Show More
33m 17s
Jan 2024
How do sim swapping scams work?
Most of us have our smartphones on our person more or less all day, every day. Our photos, payment methods and a lot of personal data are stored on them. So we’re all wary of the risk of having them stolen when out in public.But did you know there’s another way someone can take c ... Show More
4m 37s
May 2023
BlackCat gang crosses your path and evades detection. You’re just too good to be true, can’t money launder for you. Commercial spyware cases.
AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymu ... Show More
29m 32s
Feb 2024
Murder at the Warehouse | Sidebar 3
Susan Simpson, Jacinda Davis, and Kevin Fitzpatrick answer listener questions and discuss how a 14-year-old witness becomes the turning point in the investigation into Renee Ramos’ murder. Bonus interrogation clips and calls with Jake Silva are also shared. Visit our website for ... Show More
30m 9s
Jul 2020
69: Human Hacker
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans ... Show More
1h 4m
Mar 2016
162: iPhone Sorry Erin
Follow-up: How many iPad and Mac users also carry iPhones? Why not use CloudKit or BackBlaze B2 for Overcast file uploads? Car break-ins via keyless entry amplifiers Apple's "Loop You In" Event Sad times for the Mac Intel Skylake Oculus founder's comments 40 Years in 40 Seconds R ... Show More
1h 37m