Logo
    Search

    Podcast Summary

    • Hacking for Fun and Ethical PurposesTraveling on a budget is possible with creativity. This episode of Darknet Diaries shows the dual nature of hacking: it can be both ethical and unethical, with Alex sharing their experiences as a professional hacker.

      Traveling can be expensive but with some creativity, one can have fun on a limited budget. In this episode of Darknet Diaries, Alex, a hacker, discusses how they were asked to hack Tony Abbott, the former prime minister of Australia, just for fun. Alex also has a blog where they document different things they have hacked, including once when they got permission from a friend to hack into their stuff. By profession, Alex works on the red team, committing cyber crimes, but instead of selling data on the dark web, they show how they did it. This episode shows that hacking can be used for both ethical and unethical purposes.

    • Why sharing boarding pass on social media is risky?Don't post your boarding pass online as it contains personal information that can be used for identity fraud or burglary. Stay alert and protect yourself from malicious activities and potential risks.

      Posting pictures of boarding pass on social media platforms like Instagram can be dangerous because the bar code on the pass contains significant flight-related information, including booking reference number, which can be exploited by hackers for identity fraud. Despite airlines not emphasizing the secrecy of boarding passes and booking references, people should be cautious while sharing them online to avoid falling prey to malicious activities. Posting such information online can also invite robbers to break into one's home, knowing that the person is away on holiday. It is essential to understand the potential misuse of such information and take necessary precautions to keep it secure.

    • Airlines' negligence towards passenger data securityAirlines must prioritize passenger data security and educate them on keeping personal information confidential. Using only the booking reference and last name for login is not secure, and airlines should take necessary measures to safeguard sensitive information.

      Airlines print your booking reference on your boarding pass, which can be used as your login ID on their website's Manage Booking page. However, this is not being treated as sensitive information, as airlines are not advising passengers to keep it secret. Logging into the page with just the booking reference and last name is not really hacking, but rather security through obscurity. Although Alex was able to log into Tony Abbott's Qantas account, there wasn't any sensitive information or privacy problem found except for his frequent flyer number. Airlines should be more cautious regarding the security and privacy concerns of their passengers and educate them on keeping personal information secret.

    • Viewing a website's page source using 'Inspect' is legal and can reveal hidden information including sensitive data.Be cautious when sharing boarding passes online as they can contain personally identifiable information that may pose privacy risks if exposed.

      Viewing page source of a website using the 'Inspect' option is not illegal and anyone can do it. Though it is not an elite hacking skill and is primarily used by programmers to understand websites' HTML, it can help uncover hidden information not visible in the browser. For instance, JSON data is frequently hidden in website source code and reveals sensitive personal data like passport number and birth date that should not be disclosed publically as it poses a privacy risk. Hence, be mindful of such information when sharing boarding passes online as this might be exploited for malicious purposes.

    • Protecting Private Information on Social MediaAvoid posting boarding passes on social media as it can reveal private information. Understand the legal nuances before taking any action, notify authorities in case of breach and work towards fixing it. Be cautious and considerate while handling private information on social media.

      Posting boarding passes on social media is not advisable as it reveals private information. Accessing such information without authorization may be construed as a crime, hence taking legal advice before publishing it is crucial. Although legislation is written in a complex jargon, it is important to understand the legal nuances before taking any action. Alex's research helped in understanding the legality of accessing passport numbers and the consequences of publishing factual information. It is wise to notify the concerned authority in case of any breach and work towards fixing it. Therefore, it is important to be cautious and considerate while handling private information on social media.

    • Reporting Security Problems Responsibly and Seeking Legal AdviceWhen it comes to reporting security problems, it is essential to act responsibly and seek legal advice before interpreting the law. Motives matter, and it's crucial to ensure authorities are informed appropriately to avoid any legal repercussions.

      Interpreting the law is tricky. Reporting a security problem should be done responsibly. Motives matter when it comes to legality. ASD is the Australian equivalent of NSA, where people go to for stuff like this. ASD assigned a security rating called Security Level Sensitive to the e-mail which had information about the former prime minister's passport number. Calling the former prime minister and hacking his boarding pass isn't the right way, being responsible and reporting it to the authorities is. It's always better to seek legal advice before interpreting the law. Making sure that security would be addressing something with the former prime minister was the right thing to do.

    • Alex's Journey to Reporting a Vulnerability and Publishing a StoryReporting vulnerabilities can help improve website security, and anyone can be a victim of cybercrime. Seek permission before publishing sensitive information and use available resources to find the right contact person.

      Alex discovered a vulnerability on the Qantas website and reported it to the security team. Alex also wanted to publish the story on their blog, and to get permission for the same. Alex faced difficulty in finding the right person to seek permission from, but with the help of a journalist friend, Alex found the contact details of former ministers of Tony Abbott. Alex called the current prime minister's office to inquire about Tony Abbott's contact details. Alex was able to contact Tony Abbott's office and obtain permission to publish the story, with Tony Abbott's name attached to it. Alex's motivation to publish the story was to highlight the ease with which anyone can become a victim of cybercrime.

    • How Persistence and Resourcefulness led to a significant outcomeDetermination, patience, and resourcefulness are crucial traits that can help achieve objectives and create opportunities. Sharing knowledge and being open to feedback can lead to unexpected opportunities.

      Persistence and resourcefulness can lead to significant outcomes. Alex's determination aided in highlighting the security issue in Tony Abbott's boarding pass on Instagram, which eventually resulted in Abbott receiving a new passport number. Alex's passion for IT and willingness to share knowledge led to a half-hour conversation with Tony Abbott, where he sought advice on learning about IT. Additionally, Alex's eagerness to post about the situation allowed Abbott's personal assistant to review the post and make suggestions. Despite initial setbacks, Alex was able to achieve their objective through determination, patience, and resourcefulness.

    • Pushing Buttons: A Path to Tech ProficiencyFearless curiosity in exploring technology by pushing buttons and learning from mistakes can lead to success in the tech industry, but must be balanced with caution and respect to prevent harm.

      Fearlessly pushing buttons and learning from mistakes is a great way to become proficient with technology. The innate curiosity to see what buttons do is a useful trait, and even bad experiences like data loss can provide valuable lessons. Additionally, attending events like Defcon and interacting with others in the tech community can also be beneficial in gaining knowledge. Pushing buttons and figuring out how things work can ultimately lead to success in the tech industry. However, it is also important to understand the importance of respecting technology and being careful not to accidentally cause harm or data loss. The blog post about the dangers of posting boarding pass pictures was a successful lesson for many in the tech industry.

    • How TProphet Travelled The World For FreeBy using credit card points and optimizing rewards programs, you can save money and travel the world without breaking the bank. Follow TProphet's advanced travel hacks and turn points into tickets.

      TProphet has found a way to travel the world for free or at minimal cost by using points to book flights through credit cards. He banks on the points given by the banks and saves a considerable amount. Being an extreme couponer, he has applied the same approach to traveling, which enabled him to fulfill his goal of visiting 100 countries on all seven continents. By using the hacker's perspective, TProphet's travel blog, seat31B.com offers more advanced travel hacks that go beyond amateur-level tips, giving readers ideas to save money while traveling. Points banks can be turned into tickets that are worth way more than paid for, and airlines offer points or frequent-flyer miles as a marketing strategy.

    • How to Travel to St. Helena on a BudgetUpgrading to first class may offer luxury, but flying business class can still provide comfort and affordability. Use airline mileage points to save on pricey flights and enjoy nice amenities in any cabin class.

      Traveling to St. Helena requires a flight to Walvis Bay, Namibia which is around four and a half hours away. Upgrading to first class offers luxury items and access to exclusive lounges that cater to the elite, but it's expensive. TProphet took a personal lie-flat suite from Seattle to San Francisco, then another first class to Hong Kong. From there, he flew business class to Johannesburg as it's the only cabin available. A typical person would pay roughly $11,000 for the flight from Hong Kong to Johannesburg. However, TProphet used 70,000 Alaska Airline Mileage Plan points and paid around $22. First class seats provide more luxury items, but both cabins offer lie-flat seats and pretty nice food.

    • Maximizing rewards through credit card sign-ups and strategic planning.Signing up for airline and business credit cards, along with strategic planning, can lead to low-cost luxury flights through redeeming points and accessing airline partners not available with regular points.

      One can get a large amount of Alaska Airline bonus miles by signing up for their credit cards, after which all expenses can be put on the card to earn one mile per dollar spent. One can also get additional points on signing up for Bank of America business card and meeting the minimal spend requirement. With good credit and strategic planning, it is possible to redeem these points for luxury flights at very low taxes and fees. For instance, the interviewee used his points and extreme couponing to fly to Johannesburg for just $22.00 in taxes. Additionally, using Chase points through their Expedia portal can get access to flights with airline partners like Airlink not available with regular points.

    • Tips for Earning First-Class Flights with Credit CardsSigning up for credit cards to earn points for first-class flights requires strategic planning, attention to annual fees, and booking almost a year in advance due to limited availability. It's not for those with debt.

      Earning points for first-class flights through credit card sign-ups is not an easy task as one has to find availability, know the booking process, search on different airline websites and call agents to book flights. One needs to be strategic about signing up for credit cards and pay attention to the annual fees. These first-class services are not meant for everyone and require a considerable amount of effort and planning. Booking has to be done almost a year in advance, as Cathay Pacific releases only a handful of seats. Additionally, the game of earning points isn't for those who already have debt, as one may end up paying more in interest to the bank than saving through the flights.

    • Maximizing Credit Card Points for International FlightsUse credit card points for premium cabin international flights and calculate the value per point. Researching and booking flights can lead to significant savings, but prioritize personal priorities and bandwidth.

      To get the most value out of credit card points, it is important to use them to book premium cabin international flights instead of regular class tickets for domestic travel. When redeeming points, it is also important to calculate the value per point and use them on more expensive flights for a better value. Understanding all the options available and being willing to put in the effort to research and book flights can lead to significant savings and even free flights. However, it is also valid to prioritize convenience and use websites like Hipmunk to quickly find the cheapest flight. The key is to find an approach that works for individual priorities and bandwidth.

    • How to travel like a VIP without breaking the bankHiring a professional travel hacker can assist in redeeming travel points for extravagant first-class flights with exclusive VIP services, including free amenities like food buffets, drinks, massage chairs, and high-speed WiFi.

      Professional travel hackers can help you redeem travel points and miles to book extravagant trips on first class flights with exclusive VIP services such as fancy lounges, turndown services, and expedited security. TProphet's company, Award.Cat, is one such example. These services are especially useful if you do not want to learn the whole process on your own. The first class lounges have all the amenities for free, including high-speed WiFi, food buffets, free drinks, and even massage chairs. However, these trips may have their own issues, such as battery drain. Regardless, travel hacking can help you travel luxuriously without breaking the bank.

    • How to have a good trip despite a terrorist attack using airline points.Planning ahead and using airline points can provide more flight options to your destination and save you money, even in the face of unexpected events.

      Even in the face of a terrible terrorist attack, one can still have a good trip if they know how to navigate the airline points system, plan ahead, and stay flexible. The speaker used his knowledge of British Airways Avios program to book a flight on SriLankan Airlines to the Seychelles and was able to get out of Sri Lanka after the attacks. He also planned ahead and booked his return trip on Qatar Qsuites. Planning your trip far in advance and using airline points programs can save you money and provide more options for flights to your destination.

    • Tips for Luxurious Travel on a BudgetYou can enjoy personal living space, mood lighting, and more on a budget with Qsuite flights. Use points, check Award.Cat, and visit seath31B.com for more tips on traveling like a pro.

      TProphet shares tips on how to travel luxuriously for less. He talks about Qsuite flights that offer personal living space, mood lighting, fully lie-flat beds and multiple TV screens. He also shares how he was able to arrange his flight back using just points and how he managed a 14-hour layover at Qatar by paying around $70 to spend the night in the first-class lounge with little hotel rooms and fancy breakfast. TProphet recommends checking Award.Cat, their paid service, and seath31B.com to know more about how to travel on a budget like a pro.

    • Legal and Illegal Methods to Get Free FlightsBe aware of legal and ethical implications when trying to save money on flights. Pay credit card bills on time to earn points, participate in legal bug bounty rewards, but avoid misusing corporate discounts, refundable tickets, and hacking portals.

      There are legal and illegal ways of getting free flights. TProphet follows the letter and spirit of the rules to visit 100 countries. However, some hackers misuse corporate discounts, book refundable tickets, and steal points by hacking airlines or credit card rewards portals. These gray and black hat methods are illegal and airlines can cancel the return trip if caught. Credit card points can be earned by paying off credit card bills on time. United airlines offer legal bug bounty rewards in the form of points for finding vulnerabilities in their systems. Always be aware of the legal and ethical implications of the advice you follow to save money on flights.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    306 - Security Schemecurity (feat. Tanya Janca)

    306 - Security Schemecurity (feat. Tanya Janca)

    TnS lads invite special guest Tanya Janca to discuss the double standard between software developers and security professionals. While developers are expected to be both coding geniuses and security experts, Janca argues that it might not all be down to lazy developers saying bosses often prioritize feature delivery over security, leaving security analysts to deal with breaches and vulnerabilities. The conversation covers the challenges of prioritizing security in software development, including the tendency to cover every possible scenario, and the importance of understanding specific risks and impacts before taking action.

    Tanya's Links:

    https://twitter.com/shehackspurple

    https://shehackspurple.ca

    https://www.youtube.com/shehackspurple

    https://newsletter.shehackspurple.ca

    https://AliceandBobLearn.com

    https://www.linkedin.com/in/tanya-janca

    https://www.instagram.com/shehackspurple/

    https://www.facebook.com/tanya.janca/

    https://www.tiktok.com/@shehackspurple

     

    If you want to hear more episodes check out our website at https://tabsandspaces.io

    Tweet at us @tabsnspacesHQ

    Or join us for a chat on our discord server https://discord.gg/depv5npMTj

    Don't have discord? Shoot us an email at tabsandspacesHQ@gmail.com

    Contact us for free stickers as well!

    Show Intro music Unity by Fatrat: https://www.youtube.com/watch?v=n8X9_MgEdCg

    Amber Baldet on what blockchain technology can do for us beyond cryptocurrency

    Amber Baldet on what blockchain technology can do for us beyond cryptocurrency
    Verge editor-in-chief Nilay Patel interviews cryptocurrency expert Amber Baldet, co-founder of Clovyr and on the board of the Zcash foundation. Nilay and Amber discuss where cryptocurrencies on the blockchain are going, the potential of Facebook's Libra project, and how the blockchain can revive our trust in putting our data online. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pound Sand - SCW #41

    Pound Sand - SCW #41

    This week, we welcome Priya Chaudhry, Jedi Warrior Princess, at ChaudhryLaw PLLC (Criminal Defense Trial Lawyer), to discuss the Uber Indictments in a special two part interview!

     

    Show Notes: https://wiki.securityweekly.com/scw41

    Visit https://www.securityweekly.com/scw for all the latest episodes!

     

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly