Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/39/3e/0e/393e0e09-3d70-1754-d6a7-2de4e56e570c/mza_7769317693318020113.jpg/600x600bb.jpg
How Hacks Happen
Many Worlds Productions
79 episodes
1 week ago
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
Show more...
Technology
True Crime,
News,
Tech News
RSS
All content for How Hacks Happen is the property of Many Worlds Productions and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
Show more...
Technology
True Crime,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/39/3e/0e/393e0e09-3d70-1754-d6a7-2de4e56e570c/mza_7769317693318020113.jpg/600x600bb.jpg
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
How Hacks Happen
24 minutes
6 months ago
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's method for online connection, his Air Card, was both his downfall and his salvation. Take a deep dive into the data cell providers collect, how they share it with law enforcement, and the Fourth Amendment's role in protecting privacy. And tune in for Part...
How Hacks Happen
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...