How Can You Get Paid to Break Into Stuff?

How Can You Get Paid to Break Into Stuff?

Up next

Why Does Albania Have Hundreds of Thousands of Bunkers?

When Albanian dictator Enver Hoxha started building concrete bunkers during the Cold War, it was part paranoia and part propaganda. Learn more about these mysterious bunkers and how they're being repurposed today in this episode of BrainStuff, based on this article: https://histo ...  Show more

What Pranks Have Astronauts Pulled?

Since the early days of space exploration, some of NASA's greatest have pulled some great pranks. Learn about our favorites, from a smuggled sandwich to a space gorilla, in this episode of BrainStuff, based on this article: https://science.howstuffworks.com/ridiculous-history-5-n ...  Show more

Recommended Episodes

Hacking Humans
Prodigy

The days of robbing banks at gunpoint are gone. It's much more profitable to hijack networks. To better protect themselves companies hire people to test their security, but no firewall is going to stop a social engineer. Especially not one like Chris Hadnagy. Learn more about you ...  Show more

Penetration Testing
Prodigy

With an onslaught of ransomware attacks disrupting our supply chains, cybersecurity is more important than ever before. The best way to strengthen your defenses is to hire hackers to discover your weaknesses. I spoke with veteran pen tester and owner of Black Hills Information Se ...  Show more

11: Strictly Confidential
Darknet Diaries

What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.


 

Reaper looks like a criminal booter on the Chinese black market. BadRabbit shows some moves. Catch-All malicious Chrome extension. Android currency miners in Google Play. Indictments in Russia probe.
CyberWire Daily

In today's podcast, we hear that the Reaper botnet is still quiet, and looking like a booter-for-hire. BadRabbit shows some odd stealth, and some interesting strategic selectivity. A malicious Chrome extension steals everything you put on a website. Currency miners on phones seem ...  Show more