In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From black hat exploits to state-sponsored surveillance, every episode explores the blurred boundaries between ethics and law, privacy and paranoia, control and chaos. This isn’t just about computers — it’s about the future of power itself. Join as we uncover 11 million untold true stories. Disclosure Statement: The National Media Archive and affiliated programs use Artificial Intelligence throughout areas of research, production, and editing. These tools are actively embraced as part of our approach to development and workflow. All outputs are subject to human review to ensure they meet our editorial standards. For more information about our use of AI, please visit our website at NationalMediaArchive.com/ai
What began as a Minecraft server rivalry among three young hackers escalated into the Mirai botnet, the most powerful DDoS tool in history. Infecting hundreds of thousands of unsecured IoT devices worldwide, Mirai launched record-breaking attacks on major companies and internet infrastructure in 2016. Its creators were caught, but the release of Mirai's code sparked a new era of botnet threats, highlighting vast security flaws and ...
In May 2021, the Colonial Pipeline, the largest refined oil pipeline in the US, was crippled by a ransomware attack exploiting weak VPN security and leaked credentials. The hack led to fuel shortages, panic buying, and a $4.4M ransom payment. Despite partial ransom recovery by the FBI, the incident exposed major gaps in US critical infrastructure cybersecurity. Two years on, cyber threats to essential systems persist, with little m...
Mustafe Al-Bassam was born in 1995, and was working with anonymous, he and his group Lulzsec an offspring from anonymous hacked many major companies such as the CIA. Exposing customers data from 25 million users.
There’s something thrilling about watching a kid stare down a billion-dollar corporation and win. It’s the kind of story Silicon Valley pretends to celebrate—until it doesn’t.
This episodes is part of the National Media Archive.
Before it became a badge of honor to disrupt, before venture-backed startups turned words like “hacker” into corporate slogans, there was a teenager in New Jersey with a screwdriver, a guitar pick, and an ...
David Pokora wasn’t the kind of kid who had to try very hard to get into trouble. By the age of three, he wasn’t reading stories — he was playing first-person shooters with more grace than most adults could manage with a controller. He wasn't interested in the aliens or the explosions. What grabbed him was the feeling. Press a key, make something happen. Left-click, and pixels obey. It was a language. One he understood fluently bef...
By age fourteen, he'd joined a basic hacking forum centered around chaos on MSN Messenger, the once-ubiquitous instant messaging service.
There, kids swapped code like other kids traded Pokémon cards.
Worms disguised as images.
Keyloggers wrapped in innocent-looking apps.
At first, Marcus didn’t understand what half of it did.
But he was curious.
Curious enough to write his own password stealer — code that could extract...
AI-driven hacking is rapidly approaching, with systems able to exploit vulnerabilities faster and in ways humans may not anticipate. As demonstrated in competitions like the Cyber Grand Challenge, AI can already find creative solutions outside human logic. Experts warn that soon, fully automated AI hackers could threaten financial, political, and social systems, requiring new, agile defenses. Ironically, AI may also be key to safeg...
Vladislav Klyushin, a wealthy Russian IT company owner, was convicted of wire fraud, unauthorized computer access, and securities fraud for leading a scheme that hacked U.S. computer networks to steal insider information from companies like Microsoft and Tesla. The group used the data to make nearly $90 million in illicit stock trades.
You're listening to the National Media Archive. To learn more or volunteer, go to nationalmediaa...
Red Golf, a Chinese state-sponsored hacking group closely linked to APT-41, has been highly active globally, targeting various industries like aviation, government, IT, and media. Security researchers identified infrastructure and malware, including the KeyPlug backdoor, used in cyber-espionage campaigns. While China denies involvement, evidence suggests Red Golf rapidly exploits new vulnerabilities and remains a persistent global ...
Popular YouTuber Linus Tech Tips was hacked, resulting in his channels being used to promote crypto scams and his videos deleted. The breach occurred after a team member downloaded malware disguised as a sponsorship PDF, giving hackers access to browser data and session tokens. The incident highlights the need for better security protocols, improved disaster response, and stricter YouTube authentication measures to prevent such att...
At age 15, Michael Calce, aka 'MafiaBoy', launched massive cyberattacks in 2000, crippling major sites like Yahoo, eBay, and Amazon, causing $1.7 billion in damages. Raised in Montreal, he learned hacking young, joined an elite group, and used social engineering to gain access. Eventually caught, he served 8 months in youth detention. Today, Calce is a reformed hacker, cybersecurity entrepreneur, and advocate for internet safety.
...
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
The official podcast of comedian Joe Rogan.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Special Summer Offer: Exclusively on Apple Podcasts, try our Dateline Premium subscription completely free for one month! With Dateline Premium, you get every episode ad-free plus exclusive bonus content.
Listen to 'The Bobby Bones Show' by downloading the daily full replay.
The latest news in 4 minutes updated every hour, every day.