100 episodes

Bite Sized Cyber Crime is a short true crime series about cyber crime, notorious viruses and scams, and dark web operations. You can learn how hackers are able to steal data from underneath your nose as well as ways to better protect your online life in manageable ways.

Bite Sized Cyber Crime Chloe Thonus

    • Technology
    • 5.0 • 3 Ratings

Bite Sized Cyber Crime is a short true crime series about cyber crime, notorious viruses and scams, and dark web operations. You can learn how hackers are able to steal data from underneath your nose as well as ways to better protect your online life in manageable ways.

    Dell Breach Exposed Data of 49 Million Customers

    Dell Breach Exposed Data of 49 Million Customers

    Dell is a massive provider of technology for organizations and home users alike, and although on first glance their data breach seems not to contain sensitive data it has likely opened the floodgates for scams and phishing opportunities.
    Sources: https://pastebin.com/6jSYQM4P

    • 7 min
    Fake USPS Sites Get Almost the Same Traffic as the Real One

    Fake USPS Sites Get Almost the Same Traffic as the Real One

    With online shopping being so popular, getting delivery updates is not so uncommon, but this has led to the rise of a prolific scam that is much bigger than you may think.
    Sources: https://pastebin.com/mW6kWtWx

    • 7 min
    Cloudbleed and the Vitality of Cloud Security

    Cloudbleed and the Vitality of Cloud Security

    The cloud is ever expanding and allowing people to easily scale up at rates previously impossible. However one thing that must be considered is that security becomes complicated. You have to really trust your cloud provider to hold up their end, and even trusted providers can have oversights.
    Sources: https://pastebin.com/2LJPjrVx

    • 8 min
    Threat Actors Bribing Mobile Carriers into SIM Swapping

    Threat Actors Bribing Mobile Carriers into SIM Swapping

    MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes.
     
    Sources: https://pastebin.com/h47Mijdt

    • 6 min
    Storm Worm: The Malware that Took Down Warnings of Itself

    Storm Worm: The Malware that Took Down Warnings of Itself

    In 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time.
    Sources: https://pastebin.com/nPbinx0i

    • 7 min
    Password Stuffing: Why you Should Use Unique Passwords for Every Site

    Password Stuffing: Why you Should Use Unique Passwords for Every Site

    There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down?
    What if I told you it doesn't have to be that difficult?

    • 10 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

Svx RDX ,

Bite sized and delicious

Im not a very tech person but I’m very prone to diving into real crime rabbit holes. Cybercrime has been a difficult hole for me to dive into, but Chloe’s explanations make me crave more bite sized cybercrime tidbits.

TayLynn45 ,

Cyber crime for dummies (like me!)

First off, I don’t know anything about computers so I assumed this podcast wasn’t for me. But Chloe explains everything so well that even I know what is going on! Everything is well researched and relevant, and I can’t wait to hear more episodes!

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider

You Might Also Like