Connect with us

Entertainment

Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED

Cybersecurity architect and adjunct professor at NC State University Jeff Crume joins WIRED to answer the internet’s burning questions about the history of hacking. What was the first computer virus? Who is the most influential hacker in history? How did hacking work before the internet? Have hackers ever taken down a government website? Do VPNs…

Published

on

Cybersecurity architect and adjunct professor at NC State University Jeff Crume joins WIRED to answer the internet’s burning questions about the history of hacking. What was the first computer virus? Who is the most influential hacker in history? How did hacking work before the internet? Have hackers ever taken down a government website? Do VPNs really offer the anonymity we think they do? What is a firewall and how does it work? Answers to these questions and many more await on Hacking History Support.

0:00 Hacking History Support
0:19 The most influential hacker ever
1:00 Hack: Origins
2:08 Vintage hacking
3:37 Have hackers ever taken down a government website?
4:42 Signal encryption/open-source
6:07 How much cyber security was there in the 90s?
8:19 Stuxnet virus
9:37 Sarcasm level readings are off the charts, captain.
10:46 Would you ban TikTok
12:00 Election security
12:53 ILOVEYOU
13:16 WannaCry
14:20 How can hackers shut down a pipeline?
15:48 What is a firewall and how does it work?
16:40 Do VPNs really offer the anonymity we think they do?
18:55 Mom, Elmo needs to know our routing number
20:12 Are password managers secure
21:54 How likely are you to catch a computer virus?
23:01 What hack has caused the most damage?
23:40 the CIA triad
24:10 What was the name of the first computer virus?
24:50 Freakin’ Phone Phreaking
26:10 Shrek 2 (2004)

Director: Jackie Phillips
Director of Photography: Grant Bell
Editor: Alex Mechanik
Expert: Jeff Crume
Line Producer: Jamie Rasmussen
Associate Producer: Paul Gulyas
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Casting Producer: Nick Sawyer
Camera Operator: Shay Eberle-Gunst
Sound Mixer: Paul Cornett
Set Designer: Liliana Starck
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Stella Shortino
Supervising Editor: Erica DeLeo
Additional Editor: Samantha DiVito
Assistant Editor: Fynn Lithgow

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading
Advertisement
192 Comments

192 Comments

  1. @samanthadelahunt3698

    May 20, 2025 at 7:11 pm

    Honestly pretty little liars got a lot of hacking right. Caleb just waiting for hours for something to happen

  2. @revolution724

    May 20, 2025 at 7:16 pm

    And then there’s a red hat hacker, who make everything they do open source.

  3. @ishmello

    May 20, 2025 at 7:22 pm

    How fluent is Jeff in Japanese? 👀

    • @jeffcrume

      May 20, 2025 at 9:22 pm

      Not 😂

  4. @kenGPT

    May 20, 2025 at 7:24 pm

    20:55 Passkeys like FIDO or TOTP Time based one time passwords/keys are good, but are only one piece to a good authentication system.
    The constitution has what’s called the 5th amendment which allows you to refuse to incriminate yourself. ie. giving up your password. But that DOES NOT protect you if you use a fingerprint, faceID, The Gov can force you to use faceID or fingerprint to unlock data but cannot force you to remember what your password is.

    Always use a passPHRASE along with another form of auth such as a passkey or text, etc

    • @LimitedWard

      May 20, 2025 at 8:20 pm

      This is partly correct, but there’s nuance you’re ignoring. Authentication relies on proving 1 of 3 things: something you know (e.g. passwords/PINs), something you have (e.g. a cell phone or hardware key), or something you are (e.g. a fingerprint). Any time you require more than one proof of identity, that counts as “multi factor authentication”.

      All passkey implementations in practice are multi factor auth. In the case of hardware keys (e.g. Yubikeys), you are required to provide both a PIN (which provides something you know) as well as the Yubikey itself (something you have). In the case of software passkeys (e.g. a password manager), the exact factors will vary, but as long as you have MFA enabled to decrypt your passkey vault, then you are transitively providing multiple factors to prove your identity.

  5. @patrick.n.stover

    May 20, 2025 at 7:29 pm

    Although it’s not entirely realistic, I think Mr. Robot is worth a shoutout as a compelling show about hacking

    • @theringostarman

      May 20, 2025 at 8:10 pm

      I commented before I saw yours. They at least used real commands and legit verbiage in the show. Not like the movie Hackers where you’re in a 3D rendered Unix filesystem. lol. Side note to anyone reading: Mr. Robot is a top 5 show of all time. It doesn’t get the love Breaking Bad and the Sopranos gets, but it should!

  6. @VIRACYTV

    May 20, 2025 at 7:35 pm

    19:15 I don’t offer to help anyone. Problem solved.

  7. @wesc6755

    May 20, 2025 at 7:36 pm

    It’s not that Tik-tok violates privacy; it’s that China weaponizes it against our country. Disinformation causes actual harm, in case you haven’t been paying attention. We had a coup attempt because of it. Wagner’s “lock her up” campaign had an impact and was a full-on FSB op and worked because that demographic never bothers to ask for evidence or check facts. Read-up on Romania and how Russia used Tik-Tok. It’s not the same thing as “all companies violate privacy”. This is bigger than that.

  8. @DiggyDougSauce94

    May 20, 2025 at 7:40 pm

    “Those who know aren’t talking, and those who don’t keep talking” is BARS.

    • @jeffcrume

      May 20, 2025 at 9:24 pm

      I didn’t come up with that but I sure do like it

  9. @austinvines9636

    May 20, 2025 at 7:40 pm

    i was given the impression that shrek 2 would have the most realistic concept of hacking due to the title of the last timestamp in the video, I was wrong. I feel baited, yoinked, and bamboozled, smh

  10. @michaelmayhem350

    May 20, 2025 at 7:45 pm

    @26:00 what about hackers 😂😂 hack the planet.

  11. @JonDaTechDon

    May 20, 2025 at 7:51 pm

    People that think a VPN are critical to purchase are hilarious. Nothing is fully safe, nothing is fully secure.

  12. @Sameeer_Saker

    May 20, 2025 at 7:54 pm

    His opinions on voting are incredibly silly. Many countries, some with the best governmental systems out there, use electronic voting.
    And it is proved again and again how much safer electronic ballots are than using papers like in the 19th century.
    Once again US pretending their solution is the best just because “new thing scary, boo!”.

  13. @zeken4413

    May 20, 2025 at 7:58 pm

    Heeey. We are not make sure.
    There can catamagorillacally be no contradicsheen.
    We aahh croozing nicely.
    There aahh no nightmares.

  14. @rickaus_ttv

    May 20, 2025 at 8:01 pm

    To the last one, i feel like the remake of The Italian Job was fair in its portrayal of multiple hack elements. Especially how long it took to break into traffic control.

    A few B grade movies are also more realistic about it. But blockbuster movies certainly trivialise it.

  15. @LimitedWard

    May 20, 2025 at 8:03 pm

    20:12 I’m really glad he brought up passkeys, especially with regards to password managers. However he left out one critical detail: the passkeys you store in a password manager are only as secure as your master password. That’s why it’s CRITICALLY IMPORTANT to use multi factor authentication with a password manager.

    Ideally this MFA would be a hardware security key, which uses the same underlying FIDO protocol used by passkeys. Then you’d have a cryptographically secure chain which protects all your accounts:
    – your hardware key protects your password manager
    – your password manager protects your passkeys and passwords
    – your passkeys and passwords protect your online logins

    • @Mark-wd5zb

      May 20, 2025 at 8:42 pm

      He did mention this.

    • @LimitedWard

      May 20, 2025 at 8:52 pm

      ​@@Mark-wd5zbhe sort of hints at it but not directly. He mentions that password managers can store passkeys, but he fails to explicitly mention that you should secure your password vault using another passkey (ideally a hardware backed passkey, like a Yubikey). To be fair, he had a very limited time to cover the concept, so I can’t blame him for not expounding on every detail/nuance.

  16. @jayluck8047

    May 20, 2025 at 8:06 pm

    What’s your favourite hacker movie? And yes, you can say, “Hackers”.

  17. @theringostarman

    May 20, 2025 at 8:07 pm

    Mr. Robot is the closest to “real” hacking. They at least used real commands and verbiage for the show.

  18. @RenanSMello

    May 20, 2025 at 8:10 pm

    I don’t wanna be the guy that wants to look smarter than the specialist, but I think he is wrong about the paper ballot and elections one, just look how we do it here in Brazil, its the best and secure way in the world.

  19. @jays7761

    May 20, 2025 at 8:14 pm

    19:45 I got a crack that you can exploit, daddy.

  20. @NFSHeld

    May 20, 2025 at 8:14 pm

    Additional detail about the “Wannacry” kill switch:
    Security researchers usually analyze malware in a virtual machine that fakes network access by seemingly allowing every connection to go through and logging what the malware attempts to send to which IP. In order to defeat that scenario, malware pings “random” addresses (that shouldn’t exist), and if they see “successful ping”, they assume it must be a fake response inside a test environment and shut themselves down to make it harder to anaylze what would’ve happened thereafter. It is believed that the programmer of Wannacry made a mistake and forgot to randomize the address properly, causing the malware to always probe the same target. That’s why registering the target domain killed it. It’s also said that Marcus orginally registered the domain “just to see what would be sent there”, and only later realized it was an accidentially functioning kill switch for many instances.

  21. @shininio

    May 20, 2025 at 8:20 pm

    Fantastic guest. Kudos!

  22. @ronahgatling

    May 20, 2025 at 8:29 pm

    Did anyone else get like 20 capital one and amazon ads on this video?

  23. @jmongold3293

    May 20, 2025 at 8:41 pm

    Were the phreakers having phreak offs perchance?

  24. @nickie17301

    May 20, 2025 at 8:43 pm

    As an IT professional, This dude is legit.

  25. @unab84

    May 20, 2025 at 9:14 pm

    ”Password managers”……. Has anyone ever heard of pens and paper?

  26. @guilherme5094

    May 21, 2025 at 2:24 pm

    Just know that they don’t wear hats.

  27. @Soaptastesok

    May 21, 2025 at 2:36 pm

    * slams fingers down on random keys *
    “I’m in.”

  28. @tijuanaco

    May 21, 2025 at 2:53 pm

    Phone hackers = phackers?

  29. @dabeamer42

    May 21, 2025 at 3:16 pm

    Thanks for getting to the Morris worm. I remember that when it was happening…seems like ancient history.

    • @jeffcrume

      May 21, 2025 at 4:01 pm

      I do too

  30. @todorivanov317

    May 21, 2025 at 3:34 pm

    As soon as the guy said kevin mitnick is the worlds gratest hacker he instantly lost all credibility.

    • @jeffcrume

      May 21, 2025 at 4:02 pm

      Pretty sure that’s NOT what I said

  31. @bluegizmo1983

    May 21, 2025 at 3:43 pm

    I consider myself a gray hat… I never “hack” anything with the intention of causing damage or stealing anything, but I’m not fully a white hat because I do, at times, resort to unauthorized and unsolicited hacks (usually out of shear curiosity), but I always try to report what I find and never steal anything or cause damage.

  32. @dsoegiarto

    May 21, 2025 at 3:44 pm

    why is the last segment called “Shrek 2 (2004)”? was THAT the best movie that shows hacking???

    • @rose_and_thorns

      May 21, 2025 at 4:17 pm

      Pretty sure that was a joke, dude.

  33. @alexpleshy8565

    May 21, 2025 at 3:44 pm

    Matrix had some decent hacking – Trinity used nmap at least

  34. @jordanjackson6151

    May 21, 2025 at 3:45 pm

    Oh. It’s Crume! He was in the IBM 8 course of IT Security. That course needs a serious update now. But 2 years ago it helped me enough. Passed all 8 courses. Just needs to be updated now.

  35. @cl3ave

    May 21, 2025 at 4:02 pm

    18:13 The warning not to blindly trust VPN providers is very important and almost always forgotten

  36. @polesetter_01

    May 21, 2025 at 4:24 pm

    What is with these obnoxious white back grounds though? I’m getting flashbanged every time I watch a frikkin Wired video.

  37. @pete2861

    May 21, 2025 at 4:38 pm

    HEY.. That’s a Timex Sinclair 1000 computer!!! I had that.

  38. @krystek5247

    May 21, 2025 at 5:00 pm

    What do you think would have happend if someone would find a way to break discrete logarithm?

  39. @EconAtheist

    May 21, 2025 at 5:20 pm

    Kegseth: “Why you talking about Signal?” **hic**

  40. @LinusDropTips

    May 21, 2025 at 5:36 pm

    I see Jeff, I click

  41. @Sarah.Riedel

    May 21, 2025 at 6:57 pm

    “Ladies and gentlemen start your lawyers” 😂

  42. @danielpetzen

    May 21, 2025 at 7:04 pm

    Thoroughly enjoyable. Well done, Jeff.

  43. @bobbyb69

    May 21, 2025 at 7:08 pm

    Rip Mitnick, the real OG.

  44. @evanwilliams207

    May 21, 2025 at 7:27 pm

    He sounds so much like Owen Wilson 😂😂😂

  45. @12thDecember

    May 21, 2025 at 7:47 pm

    AI-controlled robots and hacking, what could possibly go wrong. 🤔

  46. @mcprt13

    May 21, 2025 at 8:12 pm

    11:01 hear hear

  47. @kirkshanghai

    May 21, 2025 at 8:26 pm

    TYRONE BIGGUMS?

  48. @AlyxGlide

    May 21, 2025 at 8:59 pm

    Virus (influencer code)

  49. @jayo3074

    May 21, 2025 at 9:09 pm

    I would ban all social media not just TikToK

  50. @jillcrowe2626

    May 21, 2025 at 9:17 pm

    Anyone interested need to read, “The Cuckoo’s Egg.”

  51. @AvengeTheBlade

    May 22, 2025 at 3:01 am

    Shrek 2 😂

  52. @ambyjim

    May 22, 2025 at 3:01 am

    I met Captain Crunch in the late 80s. Interesting chap – met him at a techno club in Sydney

  53. @baraka629

    May 22, 2025 at 4:18 am

    Hack journalists have caused the most damage

  54. @InservioLetum

    May 22, 2025 at 8:08 am

    Ballot machines are a tempest in a teacup. As long as the ACTUAL president is elected by closed committee after the fact, then voting is just performative public spectacle to distract the cattle.

  55. @ironheavenz

    May 22, 2025 at 8:43 am

    The most accurate hacking I’ve seen depicted was on To Aru Majutsu no Index novels, at some point a character named Uiharu (who is a teenage girl) is actually shown having a back and forth trying to break into a network and navigate its systems by running pre-made programs and commands and identifying breaking points, still I think it was exaggerated to add drama, as expected, pretty cool that she wasn’t just furiously typing stuff

  56. @Jbreezy646

    May 22, 2025 at 9:03 am

    Go Pack! 🐾

  57. @lukor-tech

    May 22, 2025 at 9:12 am

    I was dead after > Tyrone Biggums asks.
    I am still dead to this day.

  58. @ChrisOchieng

    May 22, 2025 at 10:14 am

    Do eye spy a zx spectrum??

  59. @PORRFNK

    May 22, 2025 at 10:46 am

    These are basic questions and answers, that even a noob is able to answer. I came here for the juicy stuff. Come on give us the crazy stories that are not publicly available

  60. @0002pA

    May 22, 2025 at 11:22 am

    17:35 He should have pointed out that HTTPS already takes care of encrypting the traffic.

  61. @jameswestgate416

    May 22, 2025 at 12:40 pm

    Mr Robot the tv series was pretty accurate, and so was The Matrix to some extent

  62. @tylerhoffman9856

    May 22, 2025 at 12:48 pm

    Can you use a vpn in a vpn in a vpn

  63. @LGElectronicsDummy

    May 22, 2025 at 1:58 pm

    Would love to see this guy react to Mr Robot.

  64. @stellapacifica

    May 22, 2025 at 2:01 pm

    I dunno about the rest of the compsci/IT/security community, but an embarrassing amount of the time, when I log into something (especially when I’m not confident I remember the pw) I do in fact whisper “I’m in”.

  65. @SimonJM

    May 22, 2025 at 2:02 pm

    “People. Have you met them?” Generally my answer to most issues!” 😁

  66. @jonathanmarois9009

    May 22, 2025 at 2:19 pm

    FREE KEVIN

  67. @tvwrectoss7724

    May 22, 2025 at 2:36 pm

    The fact that ads are allowed to roll without having to take any comments or criticisms, (not even votes matter on those!) just doesnt sit right with me, especially if we’re all interested in transparency. They could just lie and we wouldn’t even know unless it stood out or sounded wrong! With that being said, please comment on your ads here:(If you would like to, of course)

    For example, My ad this time was lying about cyber security and how everyone can appreciate less spending on security, and that 2-factor authentication is the best way to SECURE your account.

    Criticisms? Yeah, only the company cares if their own spending is low – the customer/user would much rather prefer that the company spends more for better security over less for just the basics.
    “We call ot hardening” – yes, hardening is done for online services, but the fact that some of the largest companies around are still getting hacked means that the current spending they do on security isn’t NEARLY enough.

    After all is said and done, we still get blamed when we dont use 2 factor auth to lock out our accounts, and get told there is no way to recover the account if we happen to forget the EXACT case sensitivity of our own password BECAUSE we decided to trust 2 factor auth.
    So, 2 factor auth is the most efficient way to lose your account by getting it locked out by an incomplete security implementation, not to secure it better..
    But that is all I wanted to say 🙂

  68. @gcvrsa

    May 22, 2025 at 4:09 pm

    In the 1990s, the US Army famous switched all their public-facing servers to MacOS, because it was by far the most secure operating system on the market, since there was no command shell that could be accessed remotely. If a hacker managed to pass bad data in such a way as to crash a process, the process would simply terminate, and they wouldn’t be able to gain privileged access to instantiate new processes.

  69. @konkeydonged

    May 22, 2025 at 4:13 pm

    4:53 – 5:00 I see what you did there

  70. @anthonyd6801

    May 22, 2025 at 4:21 pm

    2 unskippable ads every 90 seconds?? Come on. No thanks

  71. @Redleg122

    May 22, 2025 at 4:38 pm

    This is a cool video. I learned some stuff!

  72. @hannahh.

    May 22, 2025 at 5:13 pm

    Whoever put the chapter title “Shrek 2 (2004)” for the “What movie has the most realistic concept of hacking,” thank you.

  73. @toucansam3217

    May 22, 2025 at 5:30 pm

    Tyrone Biggums 😂

  74. @rorytribbet6424

    May 22, 2025 at 8:01 pm

    22:59 MY MAN 💩

  75. @tyrojames9937

    May 22, 2025 at 8:17 pm

    Prof. Crume, 😃👍.

  76. @বেড়াল

    May 23, 2025 at 8:04 am

    shout out Jeff calling out the bullies!

  77. @Ryan_CSL

    May 23, 2025 at 9:55 am

    Is nobody gonna mention shrek 2? 😂

  78. @daCubanaqt

    May 23, 2025 at 9:58 am

    18:53 “People, have you ever met them?” 😂😂

    24:50 The phone freaking and Captain Crunch story is fascinating!

  79. @christiancruz7137

    May 23, 2025 at 10:46 am

    Stuxnet was cyberterrorism

  80. @lostindixie

    May 23, 2025 at 10:56 am

    How can I tell if a number is random?

  81. @atompunk5575

    May 23, 2025 at 11:16 am

    Kinda wish he had a pheak box😅 a blue one😊

  82. @one-minute-code-4u

    May 23, 2025 at 11:25 am

    It is called Phreaking! and it is called Social Engineering@

  83. @vroomik

    May 23, 2025 at 11:47 am

    It’s a shame he didn’t mentioned WannaCry (known prev as EternalBlue), was initially developed by NSA and they withhold the exploit (so M$ couldn’t patch it). EternalBlue was stolen and leaked by a group called The Shadow Brokers. People probably died because of it – hospital systems locked etc.

  84. @cyanized0

    May 23, 2025 at 12:02 pm

    No Julian Assange in this talk, eh?

  85. @User-54631

    May 23, 2025 at 12:14 pm

    I don’t be holding doors for anybody.

  86. @SukhvirSingh-by3yq

    May 23, 2025 at 12:19 pm

    wow nice 🙏

  87. @independent-usa

    May 23, 2025 at 12:22 pm

    Can someone talk about SIM SWAPPING and IMSI CATCHER devices like those old STINGRAYS? There’s evidence that this is being done by the Department of Homeland Security.

  88. @sonalibhalshankar8782

    May 23, 2025 at 12:24 pm

    awesome 💫

  89. @independent-usa

    May 23, 2025 at 12:26 pm

    Where can we find Blue Leaks? All that data?

  90. @tpottrell

    May 23, 2025 at 12:28 pm

    Had to chuckle at the last chapter name 🙂

  91. @ping_shooter_v2

    May 23, 2025 at 12:38 pm

    phreaking mentioned 🤑🤑🤑🤑 yessss

  92. @MrEgodeist

    May 23, 2025 at 4:07 pm

    Great guy, but I want to know why he has a ZX81!!!

  93. @xileets

    May 23, 2025 at 4:39 pm

    We all try to be White Hat [hackers] everyday.
    Who hasn’t sought a “life hack”?

  94. @mypdf

    May 23, 2025 at 4:53 pm

    13:49 This is actually false. He registered the domain as he found it in the code and saw that it wasn’t registered yet. Only later it was discovered that this was what made the software stop.

  95. @sundhaug92

    May 23, 2025 at 5:56 pm

    13:43 he actually registered it without knowing what the effect would be

  96. @wewewewa

    May 23, 2025 at 6:24 pm

    Tyron Biggums???

  97. @Arnol-c2e

    May 23, 2025 at 6:58 pm

    I believe phone hackers should be called phackers

  98. @DianneYamamoto

    May 23, 2025 at 8:03 pm

    I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?

    • @Tonyflux

      May 23, 2025 at 8:04 pm

      I know someone that can help you

    • @DianneYamamoto

      May 23, 2025 at 8:05 pm

      Tell me, who is it?

    • @Tonyflux

      May 23, 2025 at 8:06 pm

      Creayxx, that what his known for, his a renowned tech guy

    • @DianneYamamoto

      May 23, 2025 at 8:07 pm

      Ok But please how do I get him?

    • @Tonyflux

      May 23, 2025 at 8:08 pm

      That’s him

  99. @paulgibbons2320

    May 23, 2025 at 8:07 pm

    Am I the most hacked person in the country ?

  100. @cgault11

    May 23, 2025 at 9:14 pm

    Go pack!

    • @jeffcrume

      May 23, 2025 at 10:05 pm

      🐺🐺🐺

  101. @missvidabom

    May 24, 2025 at 12:08 am

    This guy is so freaking brilliant, an absolute pleasure to watch!

    • @jeffcrume

      May 24, 2025 at 8:08 pm

      You are very kind to say so! 😊

  102. @intsoccersuperstar1

    May 24, 2025 at 1:39 am

    The editing on these videos is too distracting for me to even be able to enjoy them anymore without getting dizzy

  103. @pollyward98

    May 24, 2025 at 1:48 am

    Zero Cool, after he hacked the New York Stock Exchange. (Hackers. 1995 movie)

  104. @ankanroy2

    May 24, 2025 at 5:19 am

    Mr. robot is pretty realistic as far as series go

  105. @kurokage26

    May 24, 2025 at 7:52 am

    Imagine top-secret malware designed to disrupt Iran’s nuclear capabilities got caught by Windows Defender. LOL

  106. @Bkesal14

    May 24, 2025 at 7:56 am

    That captain crunch story is nuts 😂

  107. @nukedbaby

    May 24, 2025 at 9:32 am

    7:57 so… Americans?

  108. @itpatil

    May 24, 2025 at 10:00 am

    Electronic voting is the only way to go. It is unreasonable to suggest going back to paper voting.

  109. @LizzyToj

    May 24, 2025 at 12:09 pm

    I guess Miami-Dade county is FULL of M.I.T. black baseball caps, black clothes and black ring organization or cult causing HAVOC CHAOS to our American company’s computer programs, such as 2005 break down of Chrysler and other major companies that worked very hard to build those corporations. And they continue to cause documents entered into your system on a daily basis, to disappear to purposefully ruin an employees’ reputation in the firm, due to their own personal vendetta against a targeted individual(s) for their sick gain, or another’s payment thereof towards causing confusion in that targetted person or to ultimately make them go crazy to privilege a 3rd party paying and hiring that person to cause mental harm to the targeted party. Internet tests OR at any individual’s request. And it’s a web or cult, where they have many contacts, like an intertwined web full of people, spies, or communists to learn of our countries’ intelligence through your “private” IP address.

  110. @LizzyToj

    May 24, 2025 at 12:14 pm

    It has a name, but no man has wanted to tell me. It allows any person to read ALL of your emails as far as 10 years ago, texts, and listen to your voicemails on your cell phone. They can read the letters/emails inside your folders, track you, take over all of your app accounts and passwords, control your inbound and outbound calls, even during an emergency.

  111. @LizzyToj

    May 24, 2025 at 12:20 pm

    Which computer has the highest security?

  112. @KiraPerspectives

    May 24, 2025 at 12:37 pm

    FORTRAN, Cobol, Pascal, and Basic.
    The basic knowledge of learning programming for the 80’s.

  113. @KiraPerspectives

    May 24, 2025 at 12:48 pm

    I’m glad you finally talked about Captain Crunch.
    Frequency hoping box.

  114. @akakemushi439

    May 24, 2025 at 1:44 pm

    …..why does he have a Japanese book on his desk? Can he actually read that? (It just says “hacker’s secrets” btw).

    • @jeffcrume

      May 24, 2025 at 8:09 pm

      That’s the translation of the book I wrote called “What hackers don’t want you to know”

  115. @Thumper68

    May 24, 2025 at 4:39 pm

    Now the vpn has all your info😂

  116. @Thumper68

    May 24, 2025 at 4:39 pm

    Use quad 9.

    • @jeffcrume

      May 24, 2025 at 8:10 pm

      I like that one

  117. @mimih23

    May 24, 2025 at 5:08 pm

    What about red hat?

  118. @mimih23

    May 24, 2025 at 5:21 pm

    WannaCry’s dormant like HSV.

  119. @shlokagrawal6405

    May 24, 2025 at 5:34 pm

    why isnt there more appreciation for the chapter nomenclature

  120. @CamilaVanilla

    May 24, 2025 at 5:42 pm

    So don’t ever pay a ransom!

  121. @LeonMatthews

    May 24, 2025 at 9:19 pm

    What a breath of fresh-air! There is so much misinformation out there about information security, and so many so-called experts spreading it. So great to see an expert in the field being given a platform.

    • @jeffcrume

      May 25, 2025 at 3:07 pm

      Thanks so much for all the kind words!

  122. @OriginalQueer

    May 24, 2025 at 9:41 pm

    Who was behind the BlueYonder attack? Did they get the ransom or was it resolved another way?

  123. @firemanflorence

    May 24, 2025 at 10:25 pm

    I’m guessing he’s never seen NCIS… Hollywood never gets it right my butt

  124. @CrazyAboutLife

    May 25, 2025 at 1:27 am

    People…have you met them. 😂

    • @jeffcrume

      May 25, 2025 at 3:07 pm

      😂

  125. @slicken

    May 25, 2025 at 3:19 am

    you are wring with the voting system.

    blockchain with zero knowlage proof, is the best way to do voting.
    this way, you can proove if a user has votetd or not. and blockchain tech will prevent double voting.

  126. @KeaganNicolls

    May 25, 2025 at 3:52 am

    Do all these professors just know the answers off the top? Or do they practice answers the night before and they just pretend to read the question for the first time?

    • @jeffcrume

      May 25, 2025 at 3:10 pm

      I can’t speak for the others but I did look up a few answers beforehand mostly just to refresh my memory since a lot of these events took place decades ago

  127. @mymax43

    May 25, 2025 at 4:29 am

    As a former cybersecurity person, I remember the mantra: “There are two kinds of systems in the US, those that have been hacked by China and those that don’t know they have been hacked by China.”

  128. @HeCalledTheShitPewp

    May 25, 2025 at 5:29 am

    HACK THE PLANET!!!

  129. @DarkHorseSki

    May 25, 2025 at 9:58 am

    Cybersecurity in the 90’s was much more than just setting up a firewall. It was setting up file and folder rights. Limiting admin access. Scanning your PW databases for unsecure passwords. Testing your backups and disaster recovery. Checking logs for unusual access… The answer about the OPM question was stupid as employees of the government have very little choice if they want those jobs. Also dumb was his Tik Tok answer as it is VERY EASY for a company to control what can and cannot be on the assets it controls, including phones.

    • @jeffcrume

      May 25, 2025 at 3:11 pm

      It was that and much more but a lot of people never got much past the firewall in terms of their focus

    • @DarkHorseSki

      May 25, 2025 at 5:23 pm

      @@jeffcrume I disagree… in fact I would argue that in the 90’s, since few companies were even connected to the Internet to the second half of that decade, that the firewalls thing was really just a focus of the router folks. The admins were, almost certainly, most focused on passwords, file and folder rights as well as anti-virus stuff first whenever security became an issue.

  130. @dirkmanderin

    May 25, 2025 at 11:02 am

    Tyrone Biggums… 😂

  131. @AlonaAbaliaieva-n7k

    May 25, 2025 at 11:15 am

    Cool video

  132. @glennrobinson8061

    May 25, 2025 at 12:58 pm

    Can we talk more about key systems and how we would store keys 2009. key encryption methods

  133. @ctwatcher

    May 25, 2025 at 5:01 pm

    How do you build a ghost gun? Kidding, we learned it by ourselves, didn’t call anyone.

  134. @RifouDesigns

    May 25, 2025 at 7:26 pm

    Y’all need to bring Jeremy McDowell or NetworkChuck for “networking support”

  135. @uTubeNoITube

    May 25, 2025 at 7:42 pm

    No idea the phishing kink had sub-kinks to it!

  136. @sponjiplex4223

    May 26, 2025 at 7:33 am

    If your hack doesn’t involve Matthew Lillard skillfully rollerblading through traffic while The Prodigy plays, don’t even start.

  137. @marmictanghus

    May 26, 2025 at 8:51 am

    Hack. What about IKEA-hack 🙂

  138. @phrozzty

    May 26, 2025 at 1:00 pm

    How did Tyrone biggum get through?

  139. @AaronShowalterphoto

    May 26, 2025 at 1:20 pm

    Some of the most influential hackers are people you’ve never heard of…. like, say, for instance, KEVIN MITNICK.

    Ummmm……. ok

  140. @Caboose30

    May 26, 2025 at 8:11 pm

    I’m not an infosec expert, but fairly experienced. I’d say Sneakers probably hits the closest to real life hacking. Maybe not in its depictions, but it displays social engineering, direct hardware hacking ie intercepting phone calls, indirect hacking in the form of raising the temperature of a room to fool temperature sensing motion detectors, that kind of thing. And the braille display readout the blind guy uses actually did/does exist.

  141. @Panekmyrip

    May 27, 2025 at 1:08 am

    whoeever chose those questions should be fired… this guy just say stuff that u could find easly on surface… waste of potential.

  142. @ricksaint2000

    May 27, 2025 at 3:22 am

    Thank you Jeff

    • @jeffcrume

      May 29, 2025 at 9:33 am

      Glad you liked it!

  143. @Bovada-c3i

    May 27, 2025 at 4:18 am

    The hottest hacker of all time? Of course Angelina Jolie 😍

  144. @No.25811

    May 27, 2025 at 6:11 am

    良哥好!祝安!

  145. @valerianus1984

    May 27, 2025 at 7:55 am

    Shrek2 LoL:D

  146. @cosplayshop

    May 27, 2025 at 8:50 am

    A little sad facts about Marcus Hutchins (the person who stopped WannaCry Ransomware as Jeff pointed out) Hutchins was later indicted by the FBI for his association with Kronos Banking Malware, most likely because of the profile he received after stopping WannaCry, and FBI offer a deal for him to flip other hackers, but he refused, instead he pled guilty to two counts (hacking and fraud charge) he was sentenced to time serve as the judge had commented on how he had turned his corner.

  147. @jeffreyjacobs5738

    May 27, 2025 at 10:19 am

    Tyrone Biggums 😂

  148. @cantubloodaxe768

    May 27, 2025 at 2:09 pm

    Most definitely voted America 🦅

  149. @CleanYourRoomOrElse

    May 27, 2025 at 4:42 pm

    Back in the day my dad drove us crazy, he had no clue about security. He literally opened every single email anyone sent him. He would click on every link. If anyone sent him anything he would believe it. His computer was so full of viruses and stuff that he had to get a new one

    • @jeffcrume

      May 29, 2025 at 9:35 am

      I think we all have family members like this 🙄

  150. @emluvskpop

    May 27, 2025 at 5:15 pm

    what books are on the table?

    • @jeffcrume

      May 29, 2025 at 9:35 am

      Those are the various translations of the book I wrote back in 2000 entitled “What Hackers Don’t Want You to Know”

  151. @marrakesh1397

    May 27, 2025 at 5:16 pm

    As Always great topic and interesting video

  152. @tj_1260

    May 27, 2025 at 5:23 pm

    Yes finally

  153. @catt6614

    May 27, 2025 at 8:57 pm

    As a cybersecurity educator myself, love the approach to breaking down some of these examples!

    • @jeffcrume

      May 29, 2025 at 9:36 am

      Thanks so much for saying so!

  154. @pasteyourinjectionstringhere

    May 27, 2025 at 10:00 pm

    That’s quite amusing for describing what happened with WannaCry incorrectly (the order of events and reasons for each step) after talking about misinformation 😛
    Great interview, thanks for the content.

  155. @pasteyourinjectionstringhere

    May 27, 2025 at 10:04 pm

    17:00 sounds like false information? An ISP can’t see everything even if you don’t use a VPN. That implies all ISP’s have root level certificates in which to decrypt TLS traffic.
    Yes, they can see what websites you go to via unencrypted DNS (very typical) traffic and also see the plain/text SNI within the TLS handshake. But, no, they can’t simple look at all data, unless they have that root certificate, that’s my current understanding, correct me if I’m missing something!

    • @jeffcrume

      May 29, 2025 at 9:38 am

      You aren’t wrong, but in some cases, a person may not want it known which web sites they visit and when and how often, which can be seen by the ISP without a VPN. Also, not all web traffic is encrypted

  156. @johnlucas6683

    May 28, 2025 at 1:52 am

    Why phreakers and not phackers or phockers?

  157. @tmoore4075

    May 28, 2025 at 9:19 am

    “Don’t add people to your group chat if you don’t know who they are.” hmm….

    • @jeffcrume

      May 29, 2025 at 9:38 am

      😊

  158. @ddd-sx7pw

    May 28, 2025 at 9:25 am

    White hats – good.
    Black hats – bad.
    Remove the “hat” and it’s just like real life.

  159. @KirbyLouis

    May 28, 2025 at 2:27 pm

    capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one

  160. @curtisbme

    May 29, 2025 at 12:33 am

    @0:30. Incorrect. The most infuential hacker of all time was David Lightman. Saved the entire world by teaching AI that the only winning move is not to play.
    @26:13 – I’ll give him a technicality pass as it isn’t a movie, but he should have immediately mentioned Mr. Robot.

  161. @davidyusaku

    May 29, 2025 at 2:40 am

    if now we need to analyze the malware behavior instead of just the uniq id of the malware
    can’t we just use some deep learning algorithm to learn what the normal behavior is and block the weird/abnormal behavior?

  162. @sebemskream

    May 29, 2025 at 5:09 am

    wait wait wait, lets spread your prodigy, go anywhere without a belt and find a middlefinger. dont forget to pay the meter

  163. @surewhatever8843

    May 29, 2025 at 2:16 pm

    Love WIRED, enjoying this episode, but the volume and frequency of unskippable ads is brutal. Planned on binging WIRED episodes this afternoon, but if skipping the entire episode is the only way to skip *some* of the ads, well…?

Leave a Reply

Your email address will not be published. Required fields are marked *

Entertainment

Professional Birder Answers Birding Questions | Tech Support | WIRED

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear…

Published

on

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear in nature? What gear does Christian Cooper use while birding? Answers to these questions and plenty more await on Birding Support.

0:00 Quoth the raven…
0:30 Bird accents
1:34 Finding birds
2:52 Birding demonstration
4:20 Mating dances
5:25 Male coloring vs. Female
6:38 Sense of direction
7:06 Solo birding or group birding
8:01 Nothing but respect for pigeons
8:54 Rise and shine
9:33 Identifying bird calls
10:56 Christian Cooper’s birding gear essentials
12:24 Hummingbird brawls
13:06 How do I attract more birds to my garden?
14:03 Is it okay to put a baby bird back in its nest?
14:39 I hear you but I can’t see you
15:17 Bird feeders
17:06 Unique bird abilities
18:44 Who’s that corvid?
20:09 Spotting scope or binoculars?
20:50 Identifying nests and eggs
22:02 Faking bird calls to attract birds
22:57 Birding journals
24:44 Birds and big cities
26:16 IDing birds in flight
27:09 Birdhouse in your soul
28:20 Respect in birding
29:20 Best birding app
29:48 Best time of day for bird watching
30:42 Finding local birdwatching communities
31:03 The sighting that took the most effort for Christian Cooper
31:37 Bird law
32:34 Bucket list birding locations

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Former Deputy National Security Advisor Answers Geopolitics Questions | Tech Support | WIRED

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here. 0:00 Geopolitics Support 0:14 WW3 2:31 China and the AI Race 6:26 Why Iran and The U.S. are at odds 11:02…

Published

on

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here.

0:00 Geopolitics Support
0:14 WW3
2:31 China and the AI Race
6:26 Why Iran and The U.S. are at odds
11:02 Sanctions
13:34 When did “globalist” become derogatory?
15:40 The ascendency of The Right
19:28 Solutions for Gaza
22:37 Israel and The West Bank
24:47 Why do people use the term genocide to describe Israeli actions in Gaza?
30:20 Osama bin Laden and post-9/11 America
33:09 Nukes for peace
34:54 US/China relations timeline
38:13 When will Xi invade Taiwan?
45:42 China in the South China Sea
48:22 Why does Putin want Ukraine?
51:38 Ukraine War Outcomes
55:13 US/EU Troops in Ukraine
56:08 Is Putin playing Trump?
59:09 Trump’s Greenland aspirations
1:02:25 Trump’s accurate critiques
1:03:40 Why did the Biden Administration allow so many immigrants to enter the US?
1:08:52 Maduro
1:10:10 Who is running Venezuela right now?
1:11:46 What does the U.S. actually gain from intervening around the world?
1:14:09 Another Arab Spring?
1:15:17 Cyberattacks
1:18:08 Modi and Trump
1:22:46 The geopolitical implications of year round Arctic shipping

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Project Hail Mary: Why Is He All Alone?

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them? Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►► Want more WIRED? Get the magazine ►► Follow WIRED: Instagram ►► Twitter ►►…

Published

on

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them?

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending