

Hacked
Hacked
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
Episodes
Mentioned books

May 16, 2024 • 59min
LockBitSupp Revealed? + The Cheyenne Supercomputer Gets Sold For Parts + FTX Gives a Bunch of Money Back
Unmasking the LockBit ransomware operator, sale of Cheyenne supercomputer, AI devices evolution, financial returns, cybersecurity breaches, legal complexities of AI music, and unique solar panel designs

May 2, 2024 • 1h 12min
Hotline Hacked Vol. 2
Topics include hacking e-bike networks, a 1970's prairie hack, how bots make everyone a commodities trader, security flaws in medical imaging portals, ethical dilemmas in reporting vulnerabilities, challenges of bike-sharing in cities, book recommendation on hacker mindset, productivity tools like Shopify and Notion AI, early days of computer hacking, voice filters and resellers, and Facebook's investment in GPUs for content delivery.

Apr 16, 2024 • 33min
The iSoon Leaks
Security researcher Mei Wandowski discusses the iSoon leaks, revealing China's state-sponsored hacking-for-hire operations. They explore the evolution of cyber espionage to a corporate model, connections to ABT41, CEO firings, and unethical business practices. They also touch on 2024 cyber threat trends and the complexities of cyber threat groups.

Apr 15, 2024 • 1h 9min
Gaming Chatty Chat
Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Apr 1, 2024 • 47min
The Real World
Experienced journalist Tim Hume discusses a potential cult operating within an online business school. Topics include unethical practices, manipulation, cult-like dynamics, financial struggles, the capabilities of Shopify for business growth, Notion benefits, AI integration, and exploitation on social platforms.

Mar 15, 2024 • 58min
Hong Kong Deepfake Heist + Three Million Toothbrush Botnet + Hacked Canada
The podcast discusses a deepfake heist in Hong Kong, a chatbot misleading an airline passenger, the Flipper Zero ban in Canada, and the ongoing Satoshi Nakamoto court trial. They also talk about car theft prevention, protecting children online, and top tech predictions.

Mar 8, 2024 • 45min
The Pokédex
From cloning a 90s Pokedex voice to exploring the Pokemon API, this podcast delves into the intersection of fan culture and technology innovation. It also discusses the reliability of Chachi Beauty API in identifying real animals like Charmander and explores the evolution of tech from sci-fi.

Mar 1, 2024 • 36min
Pretend: The Stalker - Part 1
Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows.Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

Feb 16, 2024 • 46min
The Malware Historian
Exploring the history and evolution of malware, the role of hobbyist programmers, and the potential risks of old viruses resurfacing. Delving into unsettling experiences researching computer viruses like WannaCry and NotPetya. Discussion on ethical boundaries of creating informative content about cybersecurity without encouraging malicious activities.

Feb 2, 2024 • 41min
BADBOX
In this podcast, the speakers discuss the infiltration of Triada malware in Android devices through the hardware supply chain. They explore an ad fraud scheme called Peach Pit and its use of compromised devices. The podcast also covers efforts to disrupt the malicious operation and speculates on new attack vectors in ad fraud. Additionally, the speakers trace the origin of the infected devices back to China and uncover a potential collaboration between manufacturers and operators.