How To Beat Hackers at Their Own Game

How To Beat Hackers at Their Own Game

Up next

How To Never Miss a Deadline (Encore)

Avalon is driven, creative, and… can't meet a deadline to save her life. In her defense, she's a card-carrying member of the gig economy, juggling a complicated schedule as a DJ and visual artist. Avalon's tried to organize her life using a bullet journal, but procrastination kee ...  Show more

How To Know When to Quit Your Job (Encore)

Victor's job—at its core—is to change the world. But he feels like he's plateaued within his large humanitarian and development organization, and is now on the verge of jumping ship. On this episode of How To!, Annie Duke, author of Quit: The Power Of Knowing When to Walk Away, h ...  Show more

Recommended Episodes

Online Privacy, Creepy Social Media, & Cyber Security with Carole Theriault #271
How to Money

Chances are that you bought something recently, or maybe you paid a friend- but you likely didn’t do that with physical cash, you probably did it via a digital payment online or with an app like Venmo or the Cash app. Everything is going digital these days and this presents a who ...  Show more

How to Protect Yourself From Identity Theft
Everyone's Talkin' Money

Raise your hand right now if you’ve ever been a victim of identity fraud? I certainly have. In fact, did you know that identity fraud cost Americans $52 billion in 2021 and more than $1,500 in losses per victim? As our guest, John Buzzard, a nationally recognized financial indust ...  Show more

The Dark Secrets of a Hacking Hero
Uncanny Valley | WIRED

In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ...

  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more