True stories from the dark side of the Internet This is a podcast about hackers, breaches, shadow government activity, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network. This is Darknet Diaries.
David Membrives Martínez’s Post
More Relevant Posts
-
If you're looking for a cyber podcast to learn more about the latest in cybercrime and all that's hiding on the network, check out Darknet Diaries. #DarknetDiaries #CyberPodcast #PearlTechnology #Cybersecurity
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
Studying cybersecurity has been an eye-opening journey, blending my passion for storytelling with the intricate world of digital protection. With a background in cinema and television production, I've always been captivated by the power of media to shape narratives and influence perspectives. As I delve deeper into the realm of cybercrime, hackers, hacktivism, and the broader cybersecurity landscape, I find myself at the intersection of technology and storytelling. Media like "Darknet Diaries" have been instrumental in this exploration, offering fascinating insights through interviews with intriguing guests and discussions on compelling topics. ... https://lnkd.in/guEBDM7k ... #cybercrime #cybereducation
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
I've been listening to this podcast called Darknet Diaries during my workouts and walks lately It is a series by a gentleman named Jack Rhysider The podcast is an investigated show meant to dive into real events in cybersecurity, specifically about people's experiences in areas considered "dark net" These include moments like a high school student who got all of the principal's passwords (including their personal Twitter account) because of their insecure drive on the network, teams hired by countries to spy on others, and how organisations track down criminals stealing money Every episode is different and offers a different takeaway. Episode 5 tells the story of how a man dived into how much exposure a line of ASUS routers came with by default. Including, but not limited to, accessing FTP servers remotely that contained the username and password to the router's settings. A standard example of the types of attacks routers are vulnerable if set by people who don't understand what they are enabling Episode 14 tells the story of how a hospital was hacked because of news reports of a girl's parents who weren't allowed to take/see their child. This sparked public outrage and led to groups like Anonymous attacking the hospital and causing technical issues with hospital equipment regardless of how they were being used at the time. The story with the little girl turned out to be exaggerated but the damage was already done. It's a creepy way to show how mobs cause damage even through hacking Episode 31 goes into the "Subscribe to PewDiePie" campaign (one that I remember from college) and how someone used their minimum knowledge of hacking to cause 50,000 printers around the world to print whatever they wanted. The very same person who conducted the attack even speaks on it and explains how they got caught up in their online attention to the point that they exposed too much of themselves and got into trouble. It was interesting to hear how they had to determine if their attack was successful by searching on Twitter for people posting asking why their printer is suddenly printer "Subscribe to PewDiePie" The podcast has almost 150 episodes to date and is not ending soon Personally I recommend it as a way to have an ear open in the area of cybersecurity. Learning different operating systems, best security practices, and even how to hack are all perfectly good ways to get into the field. But it is also good to get exposure to what is happening in the real world and how it is impacting people small and large. By learning what has happened or is happening, I can not only learn what is theoretically possible but also UNDERSTAND what is possible You can find the series on Spotify, YouTube, or their website: https://lnkd.in/g7rKHZ9z
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
New podcast episode! This month's instalment of The Dark Dive takes a listener question as the starting point to tackle a huge topic - data leaks on the dark web: https://lnkd.in/d4chvkdX Adam Wilson and Luke D. discuss noteworthy #dataleaks from over the years - impacting organizations such as 23andMe, Ashley Madison, and Yahoo! We look at how data such as credit card information, addresses, passwords, usernames, and even biometric information is stolen in the first place, how it is packaged and sold on the dark web, and the implications of highly sensitive data being leaked. Things are brought right up to the present day by looking at the recent data leaks on #BreachForums impacting Ticketmaster and Santander customers. You can find #TheDarkDivePodcast on all major podcast platforms: 🔸 Spotify: https://lnkd.in/dQ4iDPuJ 🔸 Apple Podcast: https://lnkd.in/dFDrgNs8 🔸 YouTube: https://lnkd.in/dU2_jcfT
The Dark Dive Podcast Episode 8: Dark Web Data Leaks
https://www.slcyber.io
To view or add a comment, sign in
-
Interesting listening... a good podcast that breaks down various arcane topics to help people better understand the economy in simplified terms. This was a good one that explains the illegal and legal markets for data collection and sale. One that hits home for all of us operating in the world of cybersecurity, or any person who is just concerned about data privacy. #datasecurity #dataprivacy #cybersecurity https://lnkd.in/gi9cDMPz
So your data was stolen in a data breach : Planet Money
npr.org
To view or add a comment, sign in
-
The past few days have been a significant learning experience for both end-users and vendors. We've gleaned numerous insights, from improving decision-making processes and refining solution evaluation criteria to better managing vendor risks and handling crises. As we move into a new week, it's clear that life continues, shaped by these valuable lessons. SecurityLAH gives you our thoughts on this most talked about subject since Friday... #cybersecurity #securitylah
Crowdstrike just made headlines all over the world. A faulty update caused Windows machine to experience the Blue-Screen-of-Death. What happened, how to resolve it, and most important, answers to questions your senior management or board might ask! Spotify - https://lnkd.in/gs267d2e Apple Podcast - https://bit.ly/SLAH-Apple https://lnkd.in/g_UNcFXg
S04.E1 - Crowdstrike - the global blue screen - SecurityLah - the Asian Cyber Security Show
buzzsprout.com
To view or add a comment, sign in
-
A Shot in the Bot with the IT Privacy and Security Weekly Update for the Week Ending May 7th., 2024 Episode 188 This week we blast off with a couple of stories that would make movies like Top Gun and Armageddon appear tame in comparison. This just might be where reality surpasses fiction. From there we move to a couple of US healthcare providers that are doing their utmost to help other nation states get familiar with your particulars. One was an actual breach but the other was just dumb. Then we learn about sharing... or… we learn we are sharing, as it seems that almost 50% of Internet traffic is not even of human origin…. and the growing pain of proving we are human! Google updates two factor authentication (2FA) so that you don’t have to worry about sim swaps compromising you and finally things to do to lessen the probability that you might have spyware running on your iPhone. This week’s update is a shot in the bot, but you know what? You’re going to love it! Find the podcast here: https://lnkd.in/e-3TvUdS And the blog here: https://lnkd.in/eQ3bxZ9n
A Shot in the Bot with the IT Privacy and Security Weekly Update for the Week Ending May 7th., 2024 by The IT Privacy and Security Weekly update.
podcasters.spotify.com
To view or add a comment, sign in
-
🔐 Is Your Password on the “Most Hacked” List? Some of the most hacked passwords globally are shockingly simple: 1️⃣ 123456 2️⃣ 123456789 3️⃣ QWERTY123 4️⃣ Password It takes less than a second for hackers to crack these. Don’t be part of the statistic—update your passwords now! 🎧📺 Watch/listen to S5E18 of Cash Flow Podcast for more 👇 https://lnkd.in/eFWVfKSb
To view or add a comment, sign in
-
Long-term lessons from global tech outage In July 2024, what is being called the biggest global tech outage was caused not by a malicious actor but by a cybersecurity company. A mere 40 KB faulty update pushed by CrowdStrike caused millions of devices running Windows operating system to crash. As the dust settles down, it becomes only timely to discuss the long-term lessons from the tech outage. In this episode of All Things Policy, Lokendra Sharma engages in a conversation with Dr Kailash Nadh (CTO of Zerodha) to distill the key lessons. They also discuss Kailash’s ideas on software as a discipline and his thoughts on open source software. YouTube: https://shorturl.at/upSCk Spotify: https://shorturl.at/uB71P Apple Podcasts: https://shorturl.at/TBwfr
To view or add a comment, sign in
-
😳Did you know major wireless carriers were fined $200 million by the FCC for sharing real-time location data? Tune in this week to the Shared Security Podcast to hear our discussion about financial penalties from the government and if they really make a difference. Plus, learn how Google is safeguarding your devices from malicious apps! All this and more on this week’s episode! Links to watch and listen below.👇
To view or add a comment, sign in