23: Vladimir Levin

23: Vladimir Levin

Up next

174: Pacific Rim

For six years, Sophos fought a secret cyber war against a state-backed hacking group targeting its firewalls. This forced Sophos to drastically change tactics to properly secure their firewalls.Was it ethical? Was it effective? They disrupted nine zero-day attacks, exposed who wa ...  Show more

173: Tarjeteros

In the streets of the Dominican Republic, a new economy thrives in the shadows. It’s built not on tourism or sugar, but on stolen data. They call them tarjeteros. And they are making a lot of money from stolen credit cards. This is a story about one group of tarjeteros who came t ...  Show more

Recommended Episodes

Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Mystery and Murder: Analysis by Dr. Phil

Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ...  Show more

Hacking and cybercrime
Start the Week

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the ...

  Show more

Scandal 50: Jack Abramoff
Political Scandals

In 2004, Jack Abramoff was on top of the lobbying game. He was also bilking his own clients out of millions of dollars. By January of 2006, he pled guilty to mail fraud, conspiracy, wire fraud, and tax evasion. But the most surprising part is where Abramoff is now. Learn more abo ...  Show more

The Original Internet Godfather: From FBI’s Most Wanted to Leading Security Expert
Rich Dad Radio Show: In-Your-Face Advice on Investing, Personal Finance, & Starting a Business

Online crime often succeeds because of failure across a variety of systems and as technology changes, cybersecurity becomes increasingly more difficult to maintain. Those that are committing online crime usually operate open source and somewhat freely exchange information. The re ...  Show more