show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Investigative journalist Scott Carney explores true crime, cult psychology, biohacking, fitness revolutions, climate change calamities, organ trafficking and a whole lot more. Get exclusive access and bonus material at Patreon https://patreon.com/sgcarney ©PokeyBear LLC 2023-
  continue reading
 
Artwork

1
Beyond the Barrier

Jake, Corwin, and, Joe

Unsubscribe
Unsubscribe
Monthly+
 
We are a group of friends that have worked in Public Safety in one way or another for most of our lives. We have long talked about starting a podcast to cover those things that not many shows will talk about. We also want to talk about and share our personal experiences with others in the hope that maybe we can help them learn from our experiences.
  continue reading
 
Welcome to ”What the Shell?” where I dive into major hacks and vulnerabilities in a way meant to be accessible by anyone. Come with me as we look at each incident through an exciting lens of curiosity. Join us on our discord if you‘d like to participate in discussions with myself and our guests! https://discord.gg/mBPbWcVRYR
  continue reading
 
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
  continue reading
 
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
  continue reading
 
Loading …
show series
 
How can we make the online world safer for our kids and families? This episode, we learn how to strike a harmonious balance of online privacy and security with founder of the Family Online Safety Institute, Stephen Balkam. Tune in to hear his top tips for keeping our kids and families digital lives safe. 👨‍👩‍👧‍👦🔐 We also unlock a few metaphorical a…
  continue reading
 
The science of ice bathing has been evolving a lot in the last few years. Brad Schoenfeld is a PhD in physiology and hypertrophy (literally building muscle) who just completed a metastudy analysis that showed that ice bathing after working out could kill the muscle gains. Read more on his blog post about it here:https://www.lookgreatnaked.com/blog/…
  continue reading
 
Rachel Tobac is an unsuspecting social engineer who never thought she'd become a world-renown hacker. But after an amazing feat at DEF CON in Las Vegas, she started getting calls from huge tech companies and government contractors asking for her help. In this episode we, learn why a hacker's best tool has nothing to do with tech, and everything to …
  continue reading
 
So maybe you don't care about what happens in Andrew Huberman's personal life. So long as his science checks out, what's the harm? Well, I hate to break it to you but his science doesn't really check out either. From cherry-picked results to quack "protocols" Huberman frequently overextends his knowledge and starts shilling pseudoscience. This week…
  continue reading
 
Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk abou…
  continue reading
 
At its height, the bone factories in Calcutta exported more than 60,000 anatomical skeletons a year to medical programs all over the world. Most of the bones had been looted from graves and burning ghats. Still, anatomy processors made millions of dollars stealing and then exporting those bodies abroad. Today, those hundreds of tons of human remain…
  continue reading
 
How can we shape the future of AI and make sure it's used for good? We sit down with Verity Harding, author of the newly released: AI Needs You: How We Can Change AI's Future and Save Our Own. 🦸‍♂️🤖 Tune in for the historical lessons we can learn from previous tech revolutions of the twentieth-century – from the space race to the internet – and how…
  continue reading
 
How many scientific papers are rotten with fake data? It turns out a lot more than you might think. Even some of the most well-respected medical institutions in the world have been caught out making things up in what should have been life-saving cancer research. Citizen sleuth, David Sholto came on the show today to talk about his role in unmasking…
  continue reading
 
A guy named "Drew" (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there's money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a list of sources, full transcripts, and to …
  continue reading
 
Gabriel Custodiet speaks for a second time with Viktor Viksei about the problems of the VPN industry, about how VPNs work, and about one of the few non-sellouts to privacy: IVPN. First episode with Viktor (Episode 39): https://odysee.com/@WatchmanPrivacy:1/UncomfortableTruthsAboutVPNIndustry:5 Guest Links → https://twitter.com/vonthedock (Viktor Vi…
  continue reading
 
If you own cryptocurrency on an exchange, it's only as safe as the employees at that company. If they get phished or hacked, say goodbye to your Bitcoin. North Korean agents have gotten VERY good at stealing hundreds of millions of dollars worth of crypto this way. Journalist Geoff White walks us through these devious and damaging heists that make …
  continue reading
 
What's the number one thing anybody can do to protect their own security? On today’s episode, Charles, Marcus, and Tom from the Mac Admins Podcast share their top tips for Apple device users looking to manage their own security. 🖥️📱 In Watchtower Weekly, we dissect the recent 'on-again-off-again' takedown of infamous ransomware gang, Lockbit. Plus,…
  continue reading
 
Why did the US Government give $500 billion to Nigerian hackers? What is Pig butchering? How will artificial intelligence change the the way hackers operate? What is the future of cyber warfare? These are all true stories from the dark side of the internet.Today I had the opportunity to talk with Jack Rhysider--the amazing host of the podcast Darkn…
  continue reading
 
When scammers call Jim Browning to extort money, he uses his IT skills to turn the tables on them. The results are extremely satisfying, and often hilarious. That's why he's become a YouTube star. Jim has not only disrupted massive fraud operations, but his videos shed light on the intricacies of scam networks. He takes Jack on a behind-the-scenes …
  continue reading
 
When Joseph Harris was a teen, he learned that video game accounts and social media handles were worth big bucks on the dark web - if you could take control of them. Thus began his life of crime. He wormed his way into exploits, took control of email and Dropbox accounts, and eventually started sniffing out the keys to valuable crypto wallets. From…
  continue reading
 
This week the author and hose of the Conspirituality podcast, Derek Beres joins me to talk about the strange axis between spirituality, wellness and conspiracy theories that have taken over the internet. We don't pull any punches in this conversation, touching on the rise of anti-vaccine conspiracies, lizard people, coffee enemas, and how the neuro…
  continue reading
 
Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights int…
  continue reading
 
Daniel Kelley was just 12 years old when his rivals in "World of Warcraft" found his IP address and knocked him offline during battle. These exploits, left in plain sight, made him wonder how many other companies and servers were completely vulnerable. There were thousands. At first, he looked but wouldn't touch. But eventually, the curiosity aroun…
  continue reading
 
Can millions of toothbrushes be hacked and 'turned into a secret army' for criminals? How are tech giants fighting election-related deepfakes? We answer all that in this episode's Watchtower Weekly. 🪥🗳️ Roo also hosts a hilarious game of Security Blank and sits down with our special guest, Greg Van Der Gaast. Previously cited as one of the world's …
  continue reading
 
Have you ever woken up while you were dreaming, only to find that you couldn't move a muscle? Or, perhaps even more terrifying: have you woken up and felt a deep weight on your chest and sensed that an evil creature was pushing down on your chest? That, my friend, is the night hag--another name for sleep paralysis. I recently had a chance to chat w…
  continue reading
 
Jim Lawler, aka "Mad Dog," was a CIA case officer for 25 years. These days, he shares the fascinating tactics the agency (and other governments) use to get people to "flip" on their own countries, and prevent catastrophes — some of them, nuclear. Jim breaks down the asset flip acronym M-I-C-E: Money, Ideology, Coercion, and Ego. Visit https://darkn…
  continue reading
 
Some video game players will do anything for an advantage, and that demand has created huge underground markets for cheat software, game exploits, and even cheat subscription packages. When game developers patch the cheats, the cheat makers find other work-arounds so as not to lose their customers. This arms race has been going on for as long as vi…
  continue reading
 
We're back! Join the podcast crew for a brand new season of random security. We're kicking off our first episode with notorious hacker and expert security consultant, Jayson E. Street. Settle in, as he recalls how understanding human behavior led him to successfully robbing banks and organizations on five different continents. 🏦🌎 We also unpack the…
  continue reading
 
Gabriel Custodiet speaks with Jack Rhysider, host of the fabulous Darknet Diaries podcast. They go behind the scenes of Jack’s work routine and aesthetic views. Jack shares the commonalities of his guests, details of his inner drive, his operational security, and his view of the future of cybersecurity. Guest Links →https://darknetdiaries.com/ →Pod…
  continue reading
 
Axact is a Pakistani tech company with fancy offices and butlers waiting on their employees night and day. But they don't make apps or chatbots. Instead, they create elaborate websites and marketing materials for colleges that don't exist, then scam people into buying fake degrees. And their customers love it. One employee, let's call him "Fazal," …
  continue reading
 
In 2011 the journalist Michael Scott Moore was on assignment in Somalia on an assignment to document the spread of piracy in the Gulf of Aden. Just before he took a flight home, gunman stopped his car and forced him to get out. This was the beginning of 977 days in captivity. I had the opportunity to speak with Moore before he left for Somalia on h…
  continue reading
 
HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of exploits and payloads that good guys can use to crack open a network. So...what could possibly go wrong? Visit https://darknetdiaries.com/episode/114/ for a list of sources, full transcripts, and to listen to all episodes. .…
  continue reading
 
Loading …

Quick Reference Guide