Afgespeeld
-
In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to Victor, Edwin, and Mattijs tell their story.
Sponsors
Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
Support for this show comes from Privacy.com. Privacy allows you to create anonymous debit cards instantly to use for online shopping. Visit privacy.com/darknet to get a special offer.
View all active sponsors.
-
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.
A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us.
Check out his book Social Engineering: The Science of Human Hacking, affiliate link here.
Check out his podcast called The Social-Engineer podcast.
Sponsors
This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.
Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
Sources
https://www.social-engineer.org/How phishing scammers manipulate your amygdala and oxytocin TEDxFultonStreetDEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SEhttps://en.wikipedia.org/wiki/George_C._ParkerBook Recommendations with affiliate links:
Social EngineeringInfluenceWhat Every Body is SayingEmotions RevealedPresenceIt’s Not About “Me”, Top 10 Techniques for Building Rapport -
Published on 15 Oct 2018. Ed Kemper is a serial killer who murdered 10 people. His victims included his grandparents and mother. Kemper is a huge man at 6'9" and almost 300 pounds. After being incarcerated, Kemper talked to the FBI about the reasons for committing his murders. This information greatly propelled the FBI profiling unit. The sessions played a large role in the first season of the hit Netflix series Mindhunter.
Join Mike and Gibby for the 100th TCATT episode as they discuss the life and crimes of Ed Kemper. Kemper had a miserable childhood and he grew to hate his mother. This hatred for his mother, coupled with violent sexual fantasies, would fuel his desire to murder.
You can help support the show by going to patreon.com/truecrimeallthetime
Visit the show's website at truecrimeallthetime.com for contact, merchandise, and donation information
Please help support our sponsors:
HomeChef - go to homechef.com/tcatt to get $30 off your first order -
On this week’s quilt episode, Karen and Georgia cover the Brown’s Chicken Massacre and Peggy Jo Tallas.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
This week’s hometowns include a Lizzie Borden connection and a trucker story.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.
For a good password manager, check out LastPass.
Sponsors
Support for this episode comes from Quadrant Information Security. If you need a team of around the clock analysts to monitor for threat in your network using a custom SIEM, check out what Quadrant can do for you by visiting www.quadrantsec.com.
Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.
Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.
-
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured.