28 min listen
61: Samy
FromDarknet Diaries
ratings:
Length:
63 minutes
Released:
Mar 17, 2020
Format:
Podcast episode
Description
Samy Kamkar is a hacker. And while he’s done a lot of stuff, he’s best known for creating the Samy Worm. Which spread its way through a popular social media site and had crazy results.
Thanks to our guest Samy Kamkar for telling his story. Learn more about him by visiting https://samy.pl/.
Sponsors
This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
Sources
Samy’s YouTube Channel
Video: MySpace Worm Animated Story
https://samy.pl/myspace/
https://www.vice.com/en_us/article/wnjwb4/the-myspace-worm-that-changed-the-internet-forever
Learn more about your ad choices. Visit megaphone.fm/adchoices
Thanks to our guest Samy Kamkar for telling his story. Learn more about him by visiting https://samy.pl/.
Sponsors
This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
Sources
Samy’s YouTube Channel
Video: MySpace Worm Animated Story
https://samy.pl/myspace/
https://www.vice.com/en_us/article/wnjwb4/the-myspace-worm-that-changed-the-internet-forever
Learn more about your ad choices. Visit megaphone.fm/adchoices
Released:
Mar 17, 2020
Format:
Podcast episode
Titles in the series (100)
Ep 3: DigiNotar, You are the Weakest Link, Good Bye!: The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached. by Darknet Diaries