Digital Crime - On the digital trail
The True Crime podcast enters its third season, highlighting all things cyber security and cyber crime in the latest cases.
Together with experts inside and outside Telekom, host Mag goes on a digital forensic hunt, delves into true events and provides behind-the-scenes insights. Authentic cases, a professional speaker, expert voices and interesting tidbits of knowledge presented in an exciting way.
Shortly after its launch in November 2020, the mixture was already delighting its listeners on all known audio platforms - and in more than 70 countries worldwide. And the podcast experts from the renowned Podcast Check are also full of praise: Telekom succeeds in giving "a respectable eardrum massage" with the new season of Digital Crime. We're also delighted that the second season of Digital Crime has now won over the experts and has been nominated for this year's NRW Audio Award.
Pegasus – the Spy in my pocket
In our newest episode we discover the case of Ahmed Mansoor, a now imprisoned, prominent human rights activist from the UAE, that recieved messages from his phone containing the pegasus spyware. Our experts Yuval Elovici, Director of Telekom Innovation Laboratories at Ben-Gurion University & Head of Ben-Gurion University Cyber Security Research Center, Zahra Asif, a research assistant at Amnesty Tech who leads their campaigning on targeted surveillance and Prof. Dr. Thorsten Holz, head of chair for...
2 years
Scamming Mails
“Congratulations! You’ve won 5 million dollars in lottery.” Sounds familiar? That’s not a surprise. We all have received a classic scamming mail, which actually causes hundreds of million dollars in damage per year. But who is behind those attacks and what happens, when you hit the reply button? In this episode, we get to look “behind the scenes” with IT-forensics and cyber security expert Alexander Schinner, as he describes in a thrilling story how he exposes the criminals behind the tempting but...
3 years
Finding the unexpected
Alexander Schinner works as an IT forensics expert. He and his team manage the Incident Response Service at Telekom Security, where one of their tasks is to identify and analyze malicious software. In this episode, we explore a case where a confiscated device revealed more than malware - images of naked children. Together with Alexander Schinner, we explore the background of the story and discuss what IT forensics experts are required to do in such extreme cases. Still curious? For more stories and...
3 years
Stuxnet
Ever heard of “Operation Olympic Games” in terms of a cyber attack? Behind this rather friendly name lurks one of the most complex, dangerous and targeted piece of malware ever discovered, causing noticeable harm in real life: Stuxnet. Because not only criminals hack themselves into computers – also nation states attack each other via software: The worm strategically sabotaged the centrifuges of the Iranian uranium enrichment facility and is the reason why nations today are challenged to not only protect...
3 years
WannaCry
In our second episode, we are talking about one of the most notable ransomware attacks in history, hitting 200.000 computers across 150 countries and around 8 billion dollars in damages, to be precise. We are talking about Wannacry. The self-propagating code is famous in the cyber world because it showed that if you start something on the worldwide Internet, it will affect everybody. WannaCry is the reason we learned to keep our systems updated and have backups. Rüdiger Peusquens, Head of Cyber Defense...
3 years
Emotet
The first episode of the new “Digital Crime” podcast revolves around the most well developed malware, or damaging software, that ever existed: Emotet. Since 2014 the “Emotet Gang” has made millions of dollars by hacking computers through Spam Mails, being the perfect example of how cybercrime gangs run their operations like professional businesses. Nobody knows who is behind those attacks – but Cyber Security experts are sure, that we haven’t seen the last of Emotet. You want to hear more? Check out the...
3 years