8 Biggest Cyber Heists Ever Pulled Off
These days, you can rob a bank over the Internet, from the other side of the world. And cryptocurrency exchanges are a constant target for online thieves. These are the 8 biggest cyber heists ever pulled off by hackers.
If you like these kinds of stories, you'll love my podcast Darknet Diaries, which goes in-depth on many of these heists. Listen wherever you get your podcasts: https://darknetdiaries.com/
0:00 Intro
0:27 8. OPERATION HIGH ROLLER
1:53 7. THE BANGLADESH BANK HEIST
3:45 6. THE BITGRAIL BUG
5:23 5. KUCOIN
7:16 4. MT. GOX
9:23 3. COINCHECK
11:23 2. THE POLY NETWORK HEIST
14:05 1. CARBANAK
16:19 Wrap
#cryptocurrency #hackers
Видео 8 Biggest Cyber Heists Ever Pulled Off канала Jack Rhysider
If you like these kinds of stories, you'll love my podcast Darknet Diaries, which goes in-depth on many of these heists. Listen wherever you get your podcasts: https://darknetdiaries.com/
0:00 Intro
0:27 8. OPERATION HIGH ROLLER
1:53 7. THE BANGLADESH BANK HEIST
3:45 6. THE BITGRAIL BUG
5:23 5. KUCOIN
7:16 4. MT. GOX
9:23 3. COINCHECK
11:23 2. THE POLY NETWORK HEIST
14:05 1. CARBANAK
16:19 Wrap
#cryptocurrency #hackers
Видео 8 Biggest Cyber Heists Ever Pulled Off канала Jack Rhysider
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Highlights from ToorCamp 2018The Pig Butchering ScamHow one man took down AT&T's entire networkThe malware disguised as a Word documentYour credit card isn't really safe onlineEp 9: The Rise and Fall of Mt. GoxHow these hackers won a Tesla using a web browserHow the police spied on Europe's top criminalThe DLL hijacking attackHow hackers breach iPhone securityGoogle exposes your vulnerabilitiesThey made $2.5 million a week holding companies hostageThe Sewage Incident - When Operational Technology Isn't SecureHow "Mimikatz" worksGetting Started with MetasploitThe FBI's undercover phoneHow China Hacked Google (Part 2)There's 2 ways the U.S. military fights a warThe Russian cyberattack that crippled UkraineTracking down a cybercriminal through network logsThe "Magic Lantern" malware