100 episodes

Bite Sized Cyber Crime is a short true crime series about cyber crime, notorious viruses and scams, and dark web operations. You can learn how hackers are able to steal data from underneath your nose as well as ways to better protect your online life in manageable ways.

Bite Sized Cyber Crime Chloe Thonus

    • Technology
    • 5.0 • 3 Ratings

Bite Sized Cyber Crime is a short true crime series about cyber crime, notorious viruses and scams, and dark web operations. You can learn how hackers are able to steal data from underneath your nose as well as ways to better protect your online life in manageable ways.

    Threat Actors Bribing Mobile Carriers into SIM Swapping

    Threat Actors Bribing Mobile Carriers into SIM Swapping

    MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes.
     
    Sources: https://pastebin.com/h47Mijdt

    • 6 min
    Storm Worm: The Malware that Took Down Warnings of Itself

    Storm Worm: The Malware that Took Down Warnings of Itself

    In 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time.
    Sources: https://pastebin.com/nPbinx0i

    • 7 min
    Password Stuffing: Why you Should Use Unique Passwords for Every Site

    Password Stuffing: Why you Should Use Unique Passwords for Every Site

    There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down?
    What if I told you it doesn't have to be that difficult?

    • 10 min
    XZ Utils Contains a Backdoor on Unstable Linux Distros

    XZ Utils Contains a Backdoor on Unstable Linux Distros

    XZ Utils is an inconspicuous program in many Linux distributions that allows you to compress files. However, it seems one maintainer of the open source project had much more malicious plans.
     
    Sources: https://pastebin.com/awZzM7qk

    • 7 min
    New DoS Method Traps UDP Protocols in a Loop

    New DoS Method Traps UDP Protocols in a Loop

    Denial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine.
     
    Sources: https://pastebin.com/NS7RuYSi

    • 6 min
    ALPHV Disbands after Hacking Change Healthcare?

    ALPHV Disbands after Hacking Change Healthcare?

    Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown.
    Sources: https://pastebin.com/PRmnEGnL

    • 6 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

Svx RDX ,

Bite sized and delicious

Im not a very tech person but I’m very prone to diving into real crime rabbit holes. Cybercrime has been a difficult hole for me to dive into, but Chloe’s explanations make me crave more bite sized cybercrime tidbits.

TayLynn45 ,

Cyber crime for dummies (like me!)

First off, I don’t know anything about computers so I assumed this podcast wasn’t for me. But Chloe explains everything so well that even I know what is going on! Everything is well researched and relevant, and I can’t wait to hear more episodes!

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
The Neuron: AI Explained
The Neuron
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times

You Might Also Like

Risky Business
Patrick Gray
Cybersecurity Today
ITWC
Darknet Diaries
Jack Rhysider
Wall Street Breakfast
Seeking Alpha
Up First
NPR
LINUX Unplugged
Jupiter Broadcasting