Ep 2: The Peculiar Case of the VTech Hacker

Ep 2: The Peculiar Case of the VTech Hacker

Up next

170: Phrack

Phrack is legendary. It is the oldest, and arguably the most prestigious, underground hacking magazine in the world.It started in 1985 and is still running today. In this episode we interview the Phrack staff to hear some stories about what it’s like running a hacker magazine for ...  Show more

169: MoD

Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the i ...  Show more

Recommended Episodes

Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Mystery and Murder: Analysis by Dr. Phil

Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ...  Show more

Tech News: Gab gets Hacked and YouTube Copies TikTok
TechStuff

A hacker with a piratical handle hacked into Gab and stole 70 gigabytes of data. Meanwhile, China tests out a digital currency, Minneapolis backs off of an ill-advised plan to use influencers and YouTube decides to try and do TikTok only without as many editing tools. Learn more ...  Show more

Hacker conspiracies
Cyber Hacker

The rise of cyber-crime and technology brings with it false information and fear mongering. Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks teach us what information we should adhere to and what stories have been created to drive us into the arms of cli ...  Show more

[Bonus] Introducing CYBER, a Hacking Podcast by Motherboard
Radio Motherboard

Motherboard has launched a new podcast, called CYBER. It's available on Apple Podcasts and on whatever app you listen to.Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the inf ...  Show more