Logo
    Search

    Podcast Summary

    • Struggling with Slow and Unreliable Internet AbroadThe digital divide exists even within developed regions, highlighting the importance of recognizing and addressing inadequate Internet infrastructure.

      The quality and accessibility of Internet connection can greatly vary from place to place, even between developed countries. The speakers shared their experiences of struggling with slow and unreliable Internet while traveling in Italy and Portugal. They joked about committing cybercrimes to explain their predicament, but the real issue was the stark contrast between the high-speed connections they were used to in North America and the poor Internet infrastructure they encountered abroad. This discussion highlights the importance of recognizing and addressing the digital divide that exists even within developed regions.

    • Contactless Payments and Cybersecurity Risks in EuropeItaly ranks low in ease of accessing high-speed Internet for foreign residents, but contactless payments through smartphones have become common and convenient. However, this convenience comes with cybersecurity risks.

      Despite Italy ranking low in ease of accessing high-speed Internet for foreign residents, contactless payments through smartphones have become increasingly common and convenient in countries like Italy, Greece, and Portugal. This convenience, however, comes with risks, as cybersecurity expertly noted. In other news, during your absence, we discussed an intriguing episode about a missing $2,000,000 in cryptocurrency and a man named Joe Grand, who attempted to recover it using hacking techniques. It's unfortunate that you missed this episode, as it resonated with the speaker's background in hacking and the history of notable hacking groups like the Cult of the Dead Cow and the LOFT. The Cult of the Dead Cow was a hacking group that emerged in the late 1990s and is known for creating some of the first notorious malware. If you're curious about this episode or any others you might have missed, please give them a listen. We'll continue to bring you fascinating stories and insights into the world of cybersecurity.

    • The Early Days of Hacking and CybersecurityFrom a time of exploration and learning to a professionally regulated field, cybersecurity has evolved significantly. The hacker community was more open and collaborative, but the potential for malicious use was always present. Today, we have a whole white hat army, with intelligence agencies and cybersecurity companies leading the charge.

      The early days of hacking and cybersecurity were vastly different from what we know today. Back then, groups like Cult of the Dead Cow and their projects, such as Back Orpheus, were seen as tools for exploration and learning. However, these same tools could have been used for malicious purposes. The hacker community was more open and collaborative, with a focus on problem-solving and puzzle-solving. The political climate was also vastly different, with lawmakers struggling to understand the potential threats and opportunities of computer technology. Fast forward to today, and the cybersecurity landscape is vastly different. We now have a whole white hat army, with intelligence agencies and cybersecurity companies playing a significant role. The times have changed, and so have the challenges and opportunities in the field of cybersecurity.

    • Hacking connections and creativity from the early daysAppreciate hacking as a puzzle-solving challenge and continue learning for personal growth.

      The speaker and the interviewee share a connection as part of the same generation and online community during the early days of hacking. They were likely influenced by the same sources and experiences. The speaker admires the interviewee's approach to hacking as a puzzle-solving challenge, rather than a means to chase after endless crypto rewards. The interviewee's username, derived from handles back then, reflects the creativity and unique names of that era. The speaker also notes the fascination with the quid pro quo nature of hacking, where solving a puzzle results in a reward. However, the interviewee's focus shifts to new challenges, demonstrating a desire for continuous learning and growth. The speaker encourages viewers to check out the interviewee's YouTube channel for more entertaining and educational content.

    • A hacked Samsung smartphone and the emotional rollercoaster it presentedThe digital world is full of unexpected twists and turns, from innovation and growth to ethical dilemmas and potential targeted attacks.

      The world of technology and cybersecurity can be full of unexpected twists and turns, as illustrated in a YouTube video about a hacked Samsung smartphone and the emotional rollercoaster it presented. The video, which touches on themes of innovation, growth, and the ethical implications of hacking, left a deep impact on the speaker. Moving on to the next episode of their podcast, the topic shifts to advertising and the existence of "Internet hitmen." The episode ends on a sad note, with the speaker reflecting on a disappointing experience involving the dark web. While the details of the hack remain unclear, the speaker expresses a desire to know more about it, suspecting that it may have been a targeted attack rather than a random occurrence. Overall, the discussions highlight the complex and often unpredictable nature of the digital world.

    • The Basement Mafia hack story: Real or Fake?The Basement Mafia hack story, while intriguing, highlights the growing prevalence of internet scams and the difficulty in distinguishing fact from fiction in the world of cryptocurrency.

      The Basement Mafia hack story, which gained significant attention online, raised intriguing questions about its authenticity. Some users, who had previously engaged with the content, suddenly claimed it was a fake hack, while others suggested it could be an attack from a real organized crime syndicate or even a competitor. At the same time, an influx of new internet researchers began looking into the story, coinciding with a large document leak. While the origins of the hack remain unclear, it highlights the growing army of internet con artists and the intrigue surrounding the world of cryptocurrency and online scams. As the trend of digital grifting continues, we can expect more fascinating stories to emerge. The Treasure Hunt episode's mention of people losing money in crypto resonated with me, as the story served as a reminder of the various ways individuals can lose significant funds in the digital world.

    • Navigating Cybersecurity Challenges in the Crypto SpacePrioritize security and compliance in the crypto space, utilize resources from organizations like CIS, and consider podcast advertising for targeted audience reach.

      The crypto space is currently facing a significant issue with hacks and grifts, leading to a negative perception and endless stream of bad news. With billions of dollars stolen in crypto hacks this year alone, it's become challenging to keep up with the constant stream of incidents. Despite the challenges, it's important for businesses to prioritize security and compliance in the ever-evolving digital landscape. The Center for Internet Security (CIS) is an organization dedicated to creating a safer world for people, businesses, and governments through collaboration and innovation. They offer resources and best practices to help organizations navigate the complexities of cybersecurity. Meanwhile, for those looking to reach a targeted audience, podcast advertising through Lipson Ads can be an effective solution. The speakers also shared some successes and appreciation for their loyal patrons, including Jimmy, who has been with them since November 2020 and is their single largest patron.

    • Listeners' support fuels podcast's successListeners' positive reviews, comments, and shares played a significant role in the podcast's growth, with social media, particularly Twitter, instrumental in spreading the word.

      The success of the podcast relaunch would not have been possible without the support of dedicated listeners, both old and new. From the initial days of the show's relaunch to reaching over a million downloads and trending in various countries' tech charts, the listeners' positive reviews, comments, and shares have played a significant role in the show's growth. Social media, particularly Twitter, has been instrumental in spreading the word about the podcast. Individuals like Torbin Storm Jensen and Daryl Knutsen have been particularly generous in hyping up the show. The podcast's team, Jordan and the speaker, express their gratitude to everyone who has supported them and helped the show reach a wider audience. The recent GTA 6 leaks, which tied back to one of their episodes, further emphasized the importance of understanding the complexities of game development and the potential consequences of breaches.

    • Leaked GTA 6 footage generates excitement and concernThe unexpected leak of GTA 6 footage brings excitement for fans while raising concerns about potential security breaches through verification tokens.

      The unexpected leak of development footage for an anticipated game like GTA 6 can be disheartening for the development team, but it can also generate excitement for fans. The multiple character control feature in Grand Theft Auto 5 was appreciated by many players, and its continuation in GTA 6 is a significant selling point. The rumored Bonnie and Clyde-style storyline adds an intriguing evolution to the game's narrative. However, the potential security breach through Okta, a verification token service, is a concerning issue that could impact the gaming industry as a whole. Theoretically, hackers were able to gain access by brute-forcing verification tokens, which highlights the importance of strong security measures. Despite the challenges, the anticipation for GTA 6 remains high.

    • Old techniques like social engineering can still pose significant risksDespite advanced security measures, human error and old tactics like social engineering can lead to serious breaches, with potential consequences ranging from debilitating projects to promotional tools.

      Even with advanced security measures in place, human error and old techniques can still pose significant risks. The recent hack on Okta was not due to any escalated permissions or complex exploits, but rather through social engineering using apartment building buzzers. This technique, as old as apartment buzzers themselves, was implemented with double factor authentication. The perpetrator, a minor, may be planning to use a similar hack against two new companies, highlighting the potential for repeated attacks. These hacks can have severe consequences, ranging from debilitating projects to serving as promotional tools. The leaks can be catastrophic or beneficial, depending on the situation. In the case of the Okta hack, the hacker was reportedly demanding a ransom and threatening to leak the game and source code. This tactic is reminiscent of ransomware attacks and adds another layer of complexity to the security landscape. Ultimately, it's crucial to remain vigilant against both new and old threats and to be prepared for the potential consequences of a breach.

    • Appreciating the process and accomplishments of video game developmentCelebrating the joy and entertainment video games bring despite the challenges, and encouraging feedback to improve the show

      Despite the challenges and imperfections that come with creating and releasing video games, it's important to appreciate the things that do work and celebrate the accomplishments. The process is chaotic and complex, with millions of lines of code and potential glitches, but the end result is a product that can bring joy and entertainment to millions of people. To all software developers, especially video game developers, the hosts empathize with the hard work and dedication that goes into creating these games, and they encourage feedback from the audience to help make the show better. So, keep listening and sharing your thoughts. And to our newest patrons, Noosh and Mark Horsfield, thank you for your support on Patreon. If you're interested in getting in touch or want to know where we get the music, check out our social media channels or patreon page.

    • Contacting the Hacked Podcast TeamEmail get@hackedpodcast.com for inquiries, music inquiries, or general communication. They do not use their Facebook page for messages.

      To contact the team behind Hacked Podcast, you should email them at get@hackedpodcast.com. They do not use their Facebook page for messages. Additionally, all the music in the podcast is custom scored by the creators themselves, so if you enjoy it, feel free to reach out for more information. Their email address is the best way to get in touch. They do not utilize their Facebook page for communication. Furthermore, the unique music in each episode is produced by the podcast creators, so if you're a fan, don't hesitate to contact them for more details. Their email address is get@hackedpodcast.com.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Mitch Landrieu, The Man Biden Hopes Can Rebuild America, Bring Broadband To Millions

    Mitch Landrieu, The Man Biden Hopes Can Rebuild America, Bring Broadband To Millions
    The Bipartisan Infrastructure Act is a $1.2 trillion law meant to spur a massive infrastructure renewal and rebuilding program complete with new bridges, railroads and highways.

    It also allocates $65 million to expand internet access to all.

    Mitch Landrieu, the former mayor of New Orleans, is the man Biden tapped to make sure the massive job gets done.

    In this episode from Consider This from NPR, Scott Detrow speaks with Landrieu about the Affordable Connectivity Program, which provides monthly $30 subsidies for lower-income individuals to buy Internet access, and with Kathryn de Wit, project director for the Pew Charitable Trust's Broadband Access Initiative, about why accessing the internet is no longer a luxury, but a necessity.

    Unlock access to this and other bonus content by supporting The NPR Politics Podcast+. Sign up via Apple Podcasts or at
    plus.npr.org.

    Connect:
    Email the show at nprpolitics@npr.org
    Join the NPR Politics Podcast Facebook Group.
    Subscribe to the NPR Politics Newsletter.

    Learn more about sponsor message choices: podcastchoices.com/adchoices

    NPR Privacy Policy


    Digital Decorum: Navigating Technology in Our Homes and Beyond

    Digital Decorum: Navigating Technology in Our Homes and Beyond

    In this episode of the Celebrate Kids podcast, Dr. Kathy talks about the importance of establishing a family code of conduct when it comes to technology, specifically artificial intelligence (AI). She discusses a new bill proposed by lawmakers to make AI literacy accessible through public schools, colleges, universities, and libraries. Dr. Kathy highlights the need for families to think through digital decorum and ethics surrounding AI, shedding light on how it can impact our lives and the world our children are growing up in. Tune in for valuable insights on navigating the digital landscape with AI.

    How mobile data can fix the digital divide

    How mobile data can fix the digital divide

    Our friend Mark Riddell, connectivity expert and Head of Indirect Channel at Abzorb, joined us to talk about mobile data and IoT’s role in eliminating the digital divide.

    The digital divide remains an issue around the world and here in the UK. Up to 6% of UK homes have no internet access, and many more still rely on choppy ADSL or even their mobile phones for connectivity. And the pandemic intensified the issue with the shift to working and studying online. 

    Tune in to find out how mobile data and IoT can help in ways fixed-line connectivity can’t, and what you can do to get involved if you’re a channel partner. 

    Joi Chaney & Alisa Valentin: The Digital Divide - How Technology Impacts Our Lives

    Joi Chaney & Alisa Valentin: The Digital Divide - How Technology Impacts Our Lives

    The digital divide is the gap between those who have access to digital technologies and resources and those who do not. 

    If you asked most people what the digital divide was, they would probably assume it’s a reference to Internet access or computer usage. While these are both accurate representations of the digital divide, there’s more to it than that. The digital divide is actually a social divide that exists between individuals based on their access to technology and its benefits. In other words, it’s the disparity in technological knowledge, skills, and usage among different social groups. 

    One of the areas in which this divide has massive implications is privacy. For example, state governments that surveil women who are seeking abortions can discourage them from going online and taking advantage of all of the benefits that technology has to offer for entrepreneurship, education, and remote work.  

    Bio

    Joi O. Chaney is a domestic legal policy expert, a political strategist, and currently the Executive Director of the Washington Bureau and Senior Vice President, Policy and Advocacy at the National Urban League. The Washington Bureau represents the League before the Legislative and Executive Branches, leads policy discussions that advance economic and social equality for the communities we serve, and engages the Urban League movement in advocacy campaigns aimed at achieving policy wins.

    Bios

    Dr. Alisa Valentin

    Twitter

    LinkedIn

    Instagram

    Dr. Alisa Valentin recently joined the National Urban League as the Senior Director of the Technology and Telecommunications Policy where she works on a broad range of issues including broadband, privacy, and media diversity. Alisa was previously the Special Advisor to FCC Commissioner Geoffrey Starks where she advised the Commissioner on broadband access and adoption, prison phone justice, and future of work policies.

    Joi Chaney

    Joi O. Chaney is a domestic legal policy expert, a political strategist, and currently the Executive Director of the Washington Bureau and Senior Vice President, Policy and Advocacy at the National Urban League. The Washington Bureau represents the League before the Legislative and Executive Branches, leads policy discussions that advance economic and social equality for the communities we serve, and engages the Urban League movement in advocacy campaigns aimed at achieving policy wins.

    Resources

    National Urban League Washington Bureau

    State of Black America Podcast

    Condé Nast (Wired), The US Has a Historic Opportunity to Bridge the Digital Dividec(2022), https://www.wired.com/story/digital-divide-broadband-fcc/ (last visited Aug 8, 2022).

     

     

     

    EP47 | 自己就是知識的主人!高中生使用數位學習經驗分享 feat. 其曄、瑜庭 & 以帆

    EP47 | 自己就是知識的主人!高中生使用數位學習經驗分享 feat. 其曄、瑜庭 & 以帆
    【本集重點】 體制內的數位學習(普通學生)v.s. 體制外的數位學習(自學生) 介紹生生用平板計畫(說明實驗教育參與計畫的狀況) 偏遠地區的數位落差,連結到疫情期間線上學習的教育不平等,再延伸至長輩智慧型產品的使用教學(以自身家鄉為例) 【本集來賓】 蔡其曄同學/國立金門高中 江瑜庭同學/臺東縣私立育仁高中 王以帆同學/臺中市政府教育局高級中等教育階段非學校型態實驗教育 📢 想瞭解更多資訊素養與倫理相關內容嗎? 歡迎來 eliteracy 官網找我們唷! 👉 eliteracy 傳送門 https://linktr.ee/funsurfing