23: Vladimir Levin

23: Vladimir Levin

Up next

171: Melody Fraud

What if the music charts you see aren’t real? What if the numbers that define success can be manufactured? We talked to Andrew, a man who has spent his career on both sides of this battle. He once profited from the loopholes in streaming platforms, but now, his job is to close th ...  Show more

170: Phrack

Phrack is legendary. It is the oldest, and arguably the most prestigious, underground hacking magazine in the world.It started in 1985 and is still running today. In this episode we interview the Phrack staff to hear some stories about what it’s like running a hacker magazine for ...  Show more

Recommended Episodes

Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Mystery and Murder: Analysis by Dr. Phil

Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ...  Show more

Hacking and cybercrime
Start the Week

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the ...

  Show more

Scandal 50: Jack Abramoff
Political Scandals

In 2004, Jack Abramoff was on top of the lobbying game. He was also bilking his own clients out of millions of dollars. By January of 2006, he pled guilty to mail fraud, conspiracy, wire fraud, and tax evasion. But the most surprising part is where Abramoff is now. Learn more abo ...  Show more

The Original Internet Godfather: From FBI’s Most Wanted to Leading Security Expert
Rich Dad Radio Show: In-Your-Face Advice on Investing, Personal Finance, & Starting a Business

Online crime often succeeds because of failure across a variety of systems and as technology changes, cybersecurity becomes increasingly more difficult to maintain. Those that are committing online crime usually operate open source and somewhat freely exchange information. The re ...  Show more