logo
episode-header-image
Sep 2017
14m 1s

Ep 1: The Phreaky World of PBX Hacking

Jack Rhysider
About this episode
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured. 
Up next
Yesterday
171: Melody Fraud
What if the music charts you see aren’t real? What if the numbers that define success can be manufactured? We talked to Andrew, a man who has spent his career on both sides of this battle. He once profited from the loopholes in streaming platforms, but now, his job is to close th ... Show More
1h 9m
Feb 3
170: Phrack
Phrack is legendary. It is the oldest, and arguably the most prestigious, underground hacking magazine in the world.It started in 1985 and is still running today. In this episode we interview the Phrack staff to hear some stories about what it’s like running a hacker magazine for ... Show More
45m 1s
Jan 20
169: MoD
Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the i ... Show More
1h 6m
Recommended Episodes
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ... Show More
1h 3m
Mar 2022
The Rise of the Hacking Group LAPSUS$
It started with SIM swapping and escalated into hacks of Okta, Microsoft, Nvidia, and EA. They’re LAPSUS$, a hacking collective that’s been the boogeyman of big corporations for the past few years. People have wondered about their motivations and identities. Now, seven of them ha ... Show More
33m 17s
Jul 2019
One of the World’s Most Wanted Hackers Speaks
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world’s most wanted hackers—wanted to make a statement on CYBER to deny he’s an agent of the Kremlin. Phineas Fis ... Show More
16m 56s
Mar 2021
Tech News: Gab gets Hacked and YouTube Copies TikTok
A hacker with a piratical handle hacked into Gab and stole 70 gigabytes of data. Meanwhile, China tests out a digital currency, Minneapolis backs off of an ill-advised plan to use influencers and YouTube decides to try and do TikTok only without as many editing tools. Learn more ... Show More
16m 6s
Apr 2015
#21 Hack The Police
When Higinio Ochoa got out of prison for hacking in September of 2014, one of the terms of his parole was that he is not allowed to use any internet connected device. We went to his home in Austin to find out how he got caught and what it's like - in 2015 - to go from living onli ... Show More
30m 28s
Nov 2019
Episode 1: Hacker vs. Hacker
Einar Stangvik is a white-hat hacker — an internet security expert with an expertise in cracking the most secure and disturbing parts of the web. He discovers a troubling phenomenon online and joins forces with journalist Håkon Høydal. It leads them to Australia, to confront two ... Show More
54m 22s
Sep 2022
CYBER SECURITY UNCUT: SPECIAL EPISODE: Millions of Australians at risk of identity theft from Optus hack
In this special episode of the Cyber Security Uncut podcast, Major General (Ret'd) Marcus Thompson, inaugural head of the ADF's Information Warfare Division and Phil Tarrant, director – defence and security at Momentum Media, unpack the extent of the Optus hack, and how the data ... Show More
23m 33s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s