Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
All content for Tech Overflow is the property of Hannah Clayton-Langton and Hugh Williams and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Inventing Tinder: How One Night of Coding Reshaped Dating
Tech Overflow
36 minutes
3 weeks ago
Inventing Tinder: How One Night of Coding Reshaped Dating
Send us a text Tinder's #swiperight gesture changed how millions decide and revolutionised dating. Tinder didn’t just explode into the public consciousness, it was also the most successful dating product in history and one of the fastest companies to $100m in revenue. Hannah and Hugh sit down with Tinder co‑founder Jonathan Badeen to trace the unexpected path from a flashcards epiphany to a cultural verb, and why #swiperight wasn’t meant to be the defining feature until a college studen...
Tech Overflow
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...