139: D3f4ult

139: D3f4ult

Up next

169: MoD

Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the i ...  Show more

168: LoD

The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security cu ...  Show more

Recommended Episodes

Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Mystery and Murder: Analysis by Dr. Phil

Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ...  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more

The Dark Secrets of a Hacking Hero
Uncanny Valley | WIRED

In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ...

  Show more

The Original Internet Godfather: From FBI’s Most Wanted to Leading Security Expert
Rich Dad Radio Show: In-Your-Face Advice on Investing, Personal Finance, & Starting a Business

Online crime often succeeds because of failure across a variety of systems and as technology changes, cybersecurity becomes increasingly more difficult to maintain. Those that are committing online crime usually operate open source and somewhat freely exchange information. The re ...  Show more