DiscoverWhat the Hack with Adam Levin
What the Hack with Adam Levin
Claim Ownership

What the Hack with Adam Levin

Author: Loud Tree Media

Subscribed: 143,002Played: 980,349
Share

Description

"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice. 

182 Episodes
Reverse
Chester Frilich lost everything to scammers, and he didn’t just lose his money—he lost hope, too. Bob Sullivan joins us to recount this devastating case, revealing the IRS’s unintentional role in punishing victims, and how advocacy and legislation could turn things around. Learn more about your ad choices. Visit megaphone.fm/adchoices
What happens when social media platforms prioritize engagement over safety? How do drug dealers exploit apps like Snapchat to target teens? Amy Neville lost her son Alex to counterfeit Oxycodone pills that were laced with Fentanyl. He bought them from a Snapchat user. She talked with us about this hidden crisis and her mission to reform social media and protect future generations. Learn more about your ad choices. Visit megaphone.fm/adchoices
Tarah Wheeler lost her security badge. Deviant Ollam picked his way into "secure" spaces. Together, they show how humans make or break security and why layering defenses is key to surviving inevitable mistakes. What happens when security fails because of us? Two experts dive into the blind spots in physical, digital, and human security—and why fixing them starts with being honest about our mistakes. Learn more about your ad choices. Visit megaphone.fm/adchoices
What if your digital footprint made you a target? Jack Rhysider, host of "Darknet Diaries," shares how a fan turned his online presence into a personal puzzle—revealing just how easily your privacy can be pieced together and exploited. Learn more about your ad choices. Visit megaphone.fm/adchoices
This holiday season, privacy expert Jen Caltrider reveals how those shiny new AI gadgets under your tree with their mind-bending tech—not to mention the social media apps capturing every moment—are a privacy nightmare. Is going analog the only safe option? Learn how to protect your data, and your holidays, from the prying eyes of Big Tech. Learn more about your ad choices. Visit megaphone.fm/adchoices
What if the biggest threat to your privacy wasn’t some hacker in a hoodie—but a spy trained to infiltrate your life? Former FBI operative Eric O’Neill, the man who took down spy Robert Hanssen, explains how digital spies target us, offering along the way real-world tips to protect ourselves in a world where everyone’s a potential target. Learn more about your ad choices. Visit megaphone.fm/adchoices
Former House Democratic Leader Dick Gephardt is on a mission to kill Section 230, the legal shield that lets social media giants profit from chaos. If engagement-driven algorithms are fueling harmful content for the sake of profit, is it time for the U.S. to take bold action to rein in the Internet? (You know the answer, but this is a must listen!) Learn more about your ad choices. Visit megaphone.fm/adchoices
From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story about Director Easterly’s own experience being targeted.. Learn more about your ad choices. Visit megaphone.fm/adchoices
Adam, Beau, and Travis are joined by Mozilla’s Jen Caltrider to uncover the hidden dangers of the Internet of Things (IoT), showing how everyday devices—like smart glasses, baby monitors, and even toasters—have become a gateway for hackers, companies, and even stalkers to exploit your personal data. Learn more about your ad choices. Visit megaphone.fm/adchoices
Gretchen Peters, co-founder and executive director of the Alliance to Counter Crime Online, knows better than most how criminal networks flourish on social media platforms. From drug trafficking to child exploitation, we focus on something from 1996 called Section 230 that makes many crimes possible. Learn more about your ad choices. Visit megaphone.fm/adchoices
When Max Lebow received a chilling Instagram message detailing intimate information about him, he found himself pulled into a cyber nightmare. In this episode, Max shares his battle with a mysterious hacker who knew enough about him to coerce him into a terrifying journey of digital manipulation, paranoia, and, finally, survival. Learn more about your ad choices. Visit megaphone.fm/adchoices
Ava Smithing was eleven when she saw a swimsuit on Pinterest that she liked. That innocent click turned into an eating disorder. How? This episode explores the most dangerous thing children face today: Algorithms. On a mission to hold Big Tech accountable, Ava shares her journey as an activist with us, including her recent role providing Congressional testimony in support of the Kids Online Safety Act (KOSA). Learn more about your ad choices. Visit megaphone.fm/adchoices
From cyberbullying to harmful algorithms, the risks are real. This week, Senators Marsha Blackburn and Richard Blumenthal join us to discuss their bipartisan bill—the Kids Online Safety Act (KOSA). Together, they’re taking on Big Tech to ensure the safety of children online. Tune in to hear how KOSA could change the digital world for the better. Learn more about your ad choices. Visit megaphone.fm/adchoices
From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story about Director Easterly’s own experience being targeted.. Learn more about your ad choices. Visit megaphone.fm/adchoices
By the time Ken understood what happened, his similar-looking identity thief had walked off with $8,000. In this episode, we learn about a vulnerability courtesy the DMV and what an enterprising identity thief was able to do with it. Eva Velasquez from the Identity Theft Resource Center offers tips on safeguarding yourself. Plus: the pros and cons of password managers. Learn more about your ad choices. Visit megaphone.fm/adchoices
As technology is integrated deeper into classrooms, the lines between education and data privacy have been destroyed by for-profit data miners. This week, privacy advocate Shannon Edwards reveals how educational apps harvest sensitive information from children, commodify their data, and what parents can do to fight it. Learn more about your ad choices. Visit megaphone.fm/adchoices
Whim wanted to teach overseas. While based on the coast of Portugal, she was offered a teaching position from two employers. She didn’t know that she was about to end up with no job at all, narrowly avoiding getting taken for a bundle of dough. Also in this episode: Adam continues to hack Beau in every way imaginable. Learn more about your ad choices. Visit megaphone.fm/adchoices
The isolation caused by the Covid pandemic led to record pet adoptions, and more than usual activity online. It was like chum to sharks for scammers who flooded social media accounts with adoption opportunities for popular breeds. This week’s guest, Holly got in touch with us about her friend Carl who joins us too to talk about his St. Bernard-sized scam. To find out about his parting gift, you have to listen! Learn more about your ad choices. Visit megaphone.fm/adchoices
Elizabeth Warren put the kibosh on bad banking practices with her vision for the Consumer Financial Protection Bureau and now, with the Digital Consumer Protection Commission Act, she’s taking on Big Data. She joined us to talk about reigning in the Wild West of online life. Learn more about your ad choices. Visit megaphone.fm/adchoices
There are tens of millions of small and medium-size businesses in the United States alone, and depending on their state incorporation, many are in danger of business identity theft. Andy Pham is an American hero by many standards, for sure with regard to the right to become wildly successful. He’s truly living the American Dream. Having grown up in Communist Vietnam for the first ten years of his life, his mom sent him to the United States where she believed he would have a better life and avoid being drafted into the war in Cambodia. She was right. His story of success is eye-popping, but what happened to him on the scam front is almost beyond belief. Download the latest episode to hear how a nasty dentist managed to steal a five million dollar project from Pham, and how he got it back.  Learn more about your ad choices. Visit megaphone.fm/adchoices
loading
Comments (17)

Kyle Thompson

Media Matters??? Seriously? Definitely not the podcast for me.

Jul 4th
Reply

Tom Walters

I love reading through a post that will make people think. Also, thanks a lot for allowing me to comment here! If you want to know about https://run3game.io. Maybe this game will be useful to you after stressful working hours. Let's experience this fun with me.

May 15th
Reply

Abdolkarim Qani

https://damatajhiz.com/en/categories/293/vrfvrv-systems buy central ventilation system

May 7th
Reply

Linta 891

Absolutely! Here's a thoughtful comment you could leave: --- "As a listener of 'What the Hack with Adam Levin,' I can attest to the exceptional quality of the content. Each episode offers gripping narratives of real cybercrime incidents, coupled with invaluable advice to safeguard oneself in an increasingly digital world. The stories shared are not just memorable but serve as cautionary tales, reminding us of the importance of cyber awareness and vigilance. This podcast isn't just about entertainment; it's about empowerment through knowledge. Kudos to the team for consistently delivering such insightful and impactful episodes!"

May 6th
Reply

Cosy Group

Give the gift of warmth and comfort with our high-quality carpets that not only elevate any living space but also come with the assurance of a reputable and trustworthy brand. Unlike holiday scams lurking around every corner, our carpets are a genuine way to bring joy and comfort to your loved ones. Don't let the scammers dampen your spirits—wrap up the gift of Cosy Group's https://www.cosygroup.com.au/, your trusted flooring supplier, carpets for a truly cosy and secure holiday surprise!

Dec 6th
Reply

Michael Shane Moore

I don't normally post comments on here but, I couldn't get through episode 80 because the political stuff. I enjoyed the hacking talk , if I want to hear politics I subscribe to political podcast. Sorry I have to unscribe.

Jan 22nd
Reply

Michael Harrison

Just the other political end of misinformation pretending that they're not.

Jan 16th
Reply

ultimate flooring

Grand Oak Monarch https://www.ultimateflooringaustralia.com.au/ Herringbone - accomplished while situating wooden boards opposite to another board. Adjust them close by each other. An easier method for thinking about the Herringbone design is a crisscross which conveys a mark of distinction in your format plan.

Jan 11th
Reply

Mehran Nazari

very good

Aug 3rd
Reply

John G. Maxwell

There are tens of millions of small and medium-size businesses in the United States alone, and depending on their state incorporation, many are in danger of business identity theft. https://www.greatpeople-me.win/

Aug 2nd
Reply

Nano Dlay

really enjoy listening to all the stories and getting some helpful tips along the way guys! I would really like to contact y'all and share my hacking story if possible. keep up the good work!

Aug 1st
Reply

Kim L

Great topic but about a third of the episode goes by before they start getting to the point...

Mar 5th
Reply

R S

lol. Not the adam levine from Marron 5!

Aug 25th
Reply

Nola Leonidas

Thanks for sharing, I found a lot of interesting information here. A really good post, very thankful and helpful that you will write many more posts like this one. https://www.onevanilla.one/

Aug 25th
Reply (2)

K S

q.

Aug 24th
Reply