Player FM - Internet Radio Done Right
Checked 5d ago
Đã thêm cách đây ba năm
Nội dung được cung cấp bởi Many Worlds Productions. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Many Worlds Productions hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
How Hacks Happen
Đánh dấu tất cả (chưa) nghe ...
Manage series 3009097
Nội dung được cung cấp bởi Many Worlds Productions. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Many Worlds Productions hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
53 tập
Đánh dấu tất cả (chưa) nghe ...
Manage series 3009097
Nội dung được cung cấp bởi Many Worlds Productions. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Many Worlds Productions hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
53 tập
Tất cả các tập
×AI makes our lives more convenient in so many ways, but it also gives scammers the same conveniences. Host Michele Bousquet explains how scammers use AI audio, video, and text to better fool their victims. Send us a text Support the show Join our Patreon to listen ad-free!
The AI model Deepseek was all over the news in January 2025. Deepseek's developers claimed its costs to develop and run were a fraction of the costs for large popular AI models, which caused a big disruption in the stock market. But how true are these claims? In the first of a three-part series on AI, host Michele Bousquet dives in and give Deepseek a spin, and debunks some of the hype around this new export from China. Resources: DeepSeek-V3 Technical Report The Extreme Cost Of Training AI Models How Much Did It Cost to Train GPT-4? Let’s Break It Down OpenAI says it has proof DeepSeek used its technology to develop its AI model NASDAQ:NVDA Stock Falls on DeepSeek Fears – Is Wall Street Missing a 71% Upside? Send us a text Support the show Join our Patreon to listen ad-free!…
With so many social security breaches, we return to the original scene of the crime: the Equifax Breach of 2017. Enjoy this replay of one of our most popular episodes, where you'll learn about common hacking techniques, how routers work and why they're so important, and the most basic of cybersecurity measures like patch plans. Resources for this episode: Website where you can check if your identity was compromised in the Equifax breach Business Insider: Literally everyone should be thinking about suing Equifax . September 2017. U.S. House of Representatives Committee on Oversight and Government Reform: The Equifax Data Breach . December 2018. CHINESE PLA MEMBERS, 54th RESEARCH INSTITUTE - The fellas charged with the Equifax breach, now on the FBI's wanted list. United States Government Accountability Office Report to Congressional Requesters Send us a text Support the show Join our Patreon to listen ad-free!…
They're the kinds of cousins you wish you didn't have, but you don't really have a choice. What's the difference between hacks and scams, and how do they work together to part you from your valuables like personal information and money? In this episode, we look at the similarities and differences between these shady cousins, and how you can keep them from doing their dirty work. Resources: 91% of all cyber attacks begin with a phishing email to an unexpected victim Sony Hackers Used Phishing Emails to Breach Company Networks Social Engineering Attack Send us a text Support the show Join our Patreon to listen ad-free!…

1 Wildfire Clickbait: Milking a Disaster on Social Media 23:56
23:56
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích23:56
In the wake of the devastating California wildfires, conspiracy theories abound, some of them with no basis in fact. Just after her Pasadena home was threatened by the fires, author Su Falcon ran into a wall of disinformation in social media. Find out what she did about it, and how you can help keep the internet free of this kind of destructive garbage. Resources Website: California Fire Facts Website: Watch Duty Website: AirNow Book: How I Survived My First Year with Chickens Video: ‘They're Eating the Dogs:' Trump Makes False Claim About Migrants | WSJ News Send us a text Support the show Join our Patreon to listen ad-free!…
2025 promises to be an exciting year for scammers. From ridiculous job offers to the colorful family of Apple ID scams, join us on a whirlwind tour of schemes designed to part you and your money. Send us a text Support the show Join our Patreon to listen ad-free!
The Honey tool has been exposed as a scam, after dozens of YouTube influencers heavily promoted it. Honey was supposed to save online shoppers money by finding discount codes, but how could it make money doing that? By stealing from its own advertisers, of course! Find out how Honey did it, how they got exposed, and what the future holds for Honey's funny money and the stain upon its parent company PayPal. Resources Exposing the Honey Influencer Scam 'Biggest Influencer Scam of All Time'?: PayPal Accused of Poaching Commissions Via Its 'Honey' Browser Extension Send us a text Support the show Join our Patreon to listen ad-free!…
Romance scams aren't the only goals of a catfish. The catfish needs some way to get all that money delivered into their hands without leaving a trail. To accomplish this, they recruit unwitting victims into laundering their money. Meet Alice, who unknowingly becomes a money mule for Parker the Catfish. Resources What is a money mule? Catfished YouTube Channel Send us a text Support the show Join our Patreon to listen ad-free!…
How do catfish convince victims to send money? In this second of a three-part series on catfishing, we take a tour of the many tricks romance scammers use to separate victims from their hearts, and their cash. Resources Catfished YouTube Channel Scam Haters United website Send us a text Support the show Join our Patreon to listen ad-free!…
Catfishing scams have reached new heights, particularly romance scams. But how do they get away with it? This first of a three-part series on catfishing explores the technology these scammers use to fool their victims. Resources The man who "sold" The Brooklyn Bridge, Statue of Liberty, and Ulysses Grant's tomb All About Ethel Kennedy's 34 Grandchildren Catfished YouTube Channel Send us a text Support the show Join our Patreon to listen ad-free!…
Hackers have been releasing password leaks for years. But what exactly is a password leak, and should you be concerned? In this episode of How Hacks Happen, we look at how password security has changed over the years, and how you can keep yourself safe in the ever-changing world of online security. Resources Rockyou2024 analysis: Mega password list or just noise? Have I Been Pwned? Check your password NIST Special Publication: Digital Identity Guidelines Send us a text Support the show Join our Patreon to listen ad-free!…
With Netflix shining attention on the victims of the 2015 Ashley Madison breach, we're running a replay of our own coverage from 2021 that gets into the dark underbelly that Netflix skipped: lies Ashley Madison told about their services (and their CEO's fidelity), and blackmail attempts from enterprising hacker types. We also put forth evidence that the hacker, who was never caught, is most likely Canadian and a woman. Resources Impact Team Pastebin notice, July 20, 2015: https://pastebin.com/ZGXmk8R9 Krebs on Security report on breach: https://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/ Suicides attributed to Ashley Madison breach: https://money.cnn.com/2015/09/08/technology/ashley-madison-suicide/ https://www.bbc.com/news/technology-34044506 https://toronto.citynews.ca/2013/11/10/woman-hurt-typing-fake-profiles-for-dating-site-20m-suit-alleges/ https://krebsonsecurity.com/2015/08/ashleymadison-500k-bounty-for-hackers/ https://krebsonsecurity.com/2015/08/who-hacked-ashley-madison/ https://krebsonsecurity.com/2015/08/was-the-ashley-madison-database-leaked/ https://grahamcluley.com/ashley-madisons-leaked-database-available-download-read-this/ https://grahamcluley.com/ashley-madison-fake/ https://www.businessinsider.in/tech/the-strange-rise-and-sudden-fall-of-noel-biderman-the-former-ceo-of-ashley-madison/slidelist/48716152.cms https://www.priv.gc.ca/en/privacy-topics/business-privacy/safeguards-and-breaches/privacy-breaches/respond-to-a-privacy-breach-at-your-business/gd_pb_201810/ https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ https://grahamcluley.com/ashley-madison-wives-receiving-blackmail-let Send us a text Support the show Join our Patreon to listen ad-free!…
The medical records of 1/3 of Americans were stolen from Change Healthcare in February 2024, and leaked to the dark web. So who is Change Healthcare, and why did they have your data in the first place? Get the skinny on this week's episode. Resources Change Healthcare Cyberattack Affected 100 Million Individuals The Change Healthcare attack: Explaining how it happened Wyden Hearing Statement on Change Healthcare Cyberattack and UnitedHealth Group’s Response Testimony of Andrew Witty, Chief Executive Officer, UnitedHealth Group Before the House Energy and Commerce Committee Subcommittee on Oversight and Investigations “Examining the Change Healthcare Cyberattack” The impact of the Change Healthcare cyberattack: What to know Change Healthcare Cyberattack: What Consumers Should Know Received a letter from Change Healthcare? What you should do next Change Healthcare Attack Cost Estimate Reaches Nearly $2.9B Change Healthcare Finally Admits It Paid Ransomware Hackers $22 Million—and Still Faces a Patient Data Leak Send us a text Support the show Join our Patreon to listen ad-free!…
Credit card fraud is on the rise, but not in the usual way: hackers are cobbling together synthetic accounts from real and fake names, addresses, social security numbers, and credit histories. Children's social security numbers are particularly at risk. Find out how it all works, and what you can do to help prevent synthetic account fraud, and help with inflation in the process. Resources FBI: Combating Threats in the Cyberworld LawPay: Guide to Securely Storing Credit Card Information How Can Someone Use My Credit Card Without Having It? A Complete Guide to Theft Prevention Motley Fool: Identity Theft and Credit Card Fraud Statistics for 2024 Mastercard: What is Synthetic Identity Fraud? Send us a text Support the show Join our Patreon to listen ad-free!…
QR codes are a super convenient way to access a website or app from your phone without having to type anything in. And while some scammers use QR codes to try and steal your personal information and money, most QR codes are just fine. Learn how to spot a scammy QR code so you can use them safely, and confidently enjoy all the conveniences they offer. Resources: Thieves are using fake QR codes on parking meters to scam drivers. Here's how to protect yourself FBI issues new warning about QR code scams Alerts issued over a rise in QR code scams, known as ‘quishing’ 'I fell victim to clever scam when trying to park' Redondo Beach warns drivers of parking meter scam involving fake QR codes How to spot a fake QR code scam A brief history of QR codes What Is a Drive-by Download Malware Attack? Send us a text Support the show Join our Patreon to listen ad-free!…
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.