DiscoverCyber Minds
Cyber Minds
Claim Ownership

Cyber Minds

Author: Narrative.fm

Subscribed: 6Played: 5
Share

Description

Covering the stories behind the technologists, hackers, and coders that shaped our technological world we live in today.

Hosted on Acast. See acast.com/privacy for more information.

20 Episodes
Reverse
In 2012, LinkedIn—one of the world’s largest professional networking sites—suffered a massive data breach that exposed more than 6.5 million hashed passwords. What seemed at first like a contained incident would later be revealed as one of the largest security compromises of its time, with over 117 million accounts ultimately affected. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this landmark episode of Cyber Minds, we examine one of the most controversial figures in modern cyber history: Edward Snowden. In 2013, the former NSA contractor stunned the world by leaking classified documents that exposed sweeping global surveillance programs operated by the U.S. government. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cyber Minds, we unpack the origins of the Voting Village at DEF CON 25, which took place in July 2017 in Las Vegas. The event was conceived and organized by Jeff Moss (also known as “Dark Tangent,” the founder of DEF CON) and cybersecurity expert Jake Braun. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this debut episode covering the legendary DEF CON hacker convention, Cyber Minds takes you back to 1993—when a Las Vegas hotel lobby became ground zero for one of the most influential gatherings in cybersecurity history. Learn more about your ad choices. Visit megaphone.fm/adchoices
In April 2024, a quiet breach shook the core of American identity infrastructure. Millions of Social Security numbers—along with names, addresses, and dates of birth—were exposed in a sophisticated cyberattack targeting a third-party government contractor. Learn more about your ad choices. Visit megaphone.fm/adchoices
From its groundbreaking debut in 2007 to the cutting-edge technology of today, the iPhone has redefined how we communicate, work, and live. In this episode of Cyber Minds, we explore the evolution of Apple’s iconic device, the innovations that set it apart, and the lasting impact it has had. Learn more about your ad choices. Visit megaphone.fm/adchoices
In the summer of 2023, the glitzy world of Las Vegas was shaken by a cyber attack orchestrated by the hacker group Scattered Spider. Targeting major casino operators, this sophisticated breach disrupted operations, exposed vulnerabilities, and left an industry on edge. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cyber Minds, we uncover the intriguing story of Paige Thompson, the former Amazon engineer behind the infamous 2019 Capitol One data breach. Discover how Thompson exploited vulnerabilities to access the personal data of over 100 million individuals, the unconventional methods she used, and the cryptic online behavior that led to her capture. We’ll explore the complexities of her case, the ethical debates surrounding her actions, and the ripple effects it had on the world of cybersecurity. Was she a hacker, a whistleblower, or something in between? Tune in to find out. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cyber Minds, we dive into the incredible story of Marcus Hutchins, the young British cybersecurity researcher who halted the global WannaCry ransomware attack in 2017. From his unexpected rise to fame to his controversial past, we’ll explore how Hutchins’ quick thinking saved countless systems worldwide—and the challenges he faced when his own history came to light. This is a tale of redemption, resilience, and the blurred lines of ethical hacking in the fight against cybercrime. Learn more about your ad choices. Visit megaphone.fm/adchoices
In 2016, Uber faced one of the most infamous data breaches in tech history, exposing the personal information of 57 million riders and drivers. But what made this breach even more shocking was how it was handled—or mishandled—by those at the top. In this episode, we unravel the events leading up to the breach, the questionable decision to cover it up, and the fallout that reshaped Uber’s leadership and security practices. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cyber Minds, we delve into the complex and controversial life of Adrian Lamo, known as "The Homeless Hacker." Lamo's story is one of contradictions—celebrated for his hacking skills but criticized for his choices. From his high-profile intrusions into major corporate systems like Microsoft and The New York Times to his pivotal role in turning in whistleblower Chelsea Manning, Lamo's actions raise critical questions about the ethics of hacking and cyber justice. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cyber Minds, we delve into the incredible story of Kristoffer Wilhelm von Hassel, the five-year-old who made global headlines for uncovering a security flaw in Microsoft’s Xbox Live system. How did a child crack the code of one of the world’s biggest tech companies? We explore how his discovery reshaped cybersecurity discussions and the surprising reaction from Microsoft. Learn more about your ad choices. Visit megaphone.fm/adchoices
In 1999, NASA experienced a breach that sent shockwaves through the cybersecurity world. A 15-year-old hacker known as “c0mrade” infiltrated NASA's computer systems, gaining access to critical files and forcing the space agency to shut down its network for 21 days. This episode of "Cyber Minds" dives into the audacious hack that exposed vulnerabilities in one of the world’s most secure institutions. We’ll explore how the breach occurred, the hacker’s motivations, and the impact on NASA’s operations. Learn more about your ad choices. Visit megaphone.fm/adchoices
Y2K Bug

Y2K Bug

2023-08-0311:30

If you are a Millennial, Gen X’er, Baby Boomer, or from any generations prior, you most certainly remember the Y2K fears that dominated the culture. With computers having only operated within the span of the 1900s, we were told that the change in date when January 1st of 2000 would hit, would wreak havoc on computing systems worldwide. This was a result of how dates were stored in computing systems, which we will tackle more in-depth on this show. Learn more about your ad choices. Visit megaphone.fm/adchoices
How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device. Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
Blue Box

Blue Box

2022-08-0809:09

Steve Wozniak and Steve Jobs are best known as the founders of Apple Computer Company. Apple was founded on April 1, 1976, but the two had been friends for five years. Just months after meeting, the two were intrigued and fascinated by an article on the illegal 'blue box,' a device that allowed you to make free phone calls, plus other illicit uses. After many weeks of immersing themselves in finding out how to build such a device, they succeeded. Thus began a shady business endeavor between them, ultimately laying the groundwork for the world's second-largest company. Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
Trailer

Trailer

2021-01-2401:45

Hosted on Acast. See acast.com/privacy for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
Comments