How To Beat Hackers at Their Own Game

How To Beat Hackers at Their Own Game

Up next

How to Emmigrate as a Throuple

Dan Savage has built a legendary career giving sex and relationship advice, but as the U.S. political climate shifts, he's yearning to chase a very different dream: relocating his polyamorous family to Europe. He knows how to navigate complex relationship dynamics, but the leap t ...  Show more

How To Be a DJ, Not a Playlist with Tom Nash

Stewart has built a respectable career as a lawyer in Montreal, but he's yearning to chase a very different dream: becoming a club DJ. He knows how to curate a killer playlist, but the leap to commanding a live room feels intimidating and technically out of reach. On this episode ...  Show more

Recommended Episodes

Online Privacy, Creepy Social Media, & Cyber Security with Carole Theriault #271
How to Money

Chances are that you bought something recently, or maybe you paid a friend- but you likely didn’t do that with physical cash, you probably did it via a digital payment online or with an app like Venmo or the Cash app. Everything is going digital these days and this presents a who ...  Show more

How to Protect Yourself From Identity Theft
Everyone's Talkin' Money

Raise your hand right now if you’ve ever been a victim of identity fraud? I certainly have. In fact, did you know that identity fraud cost Americans $52 billion in 2021 and more than $1,500 in losses per victim? As our guest, John Buzzard, a nationally recognized financial indust ...  Show more

The Dark Secrets of a Hacking Hero
Uncanny Valley | WIRED

In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ...

  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more