Entertainment
Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED
Cybersecurity architect and adjunct professor at NC State University Jeff Crume joins WIRED to answer the internet’s burning questions about the history of hacking. What was the first computer virus? Who is the most influential hacker in history? How did hacking work before the internet? Have hackers ever taken down a government website? Do VPNs…
Entertainment
Professional Birder Answers Birding Questions | Tech Support | WIRED
Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear…
Entertainment
Former Deputy National Security Advisor Answers Geopolitics Questions | Tech Support | WIRED
Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here. 0:00 Geopolitics Support 0:14 WW3 2:31 China and the AI Race 6:26 Why Iran and The U.S. are at odds 11:02…
Entertainment
Project Hail Mary: Why Is He All Alone?
When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them? Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►► Want more WIRED? Get the magazine ►► Follow WIRED: Instagram ►► Twitter ►►…
-
Science & Technology6 years agoNitya Subramanian: Products and Protocol
-
People & Blogs4 years agoSleep Expert Answers Questions From Twitter ???? | Tech Support | WIRED
-
CNET6 years agoWays you can help Black Lives Matter movement (links, orgs, and more) ????????
-
Wired7 years agoHow This Guy Became a World Champion Boomerang Thrower | WIRED
-
Wired7 years agoNeuroscientist Explains ASMR’s Effects on the Brain & The Body | WIRED
-
Wired7 years agoWhy It’s Almost Impossible to Solve a Rubik’s Cube in Under 3 Seconds | WIRED
-
Wired7 years agoFormer FBI Agent Explains How to Read Body Language | Tradecraft | WIRED
-
CNET6 years agoSurface Pro 7 review: Hello, old friend ????

@samanthadelahunt3698
May 20, 2025 at 7:11 pm
Honestly pretty little liars got a lot of hacking right. Caleb just waiting for hours for something to happen
@revolution724
May 20, 2025 at 7:16 pm
And then there’s a red hat hacker, who make everything they do open source.
@ishmello
May 20, 2025 at 7:22 pm
How fluent is Jeff in Japanese? 👀
@jeffcrume
May 20, 2025 at 9:22 pm
Not 😂
@kenGPT
May 20, 2025 at 7:24 pm
20:55 Passkeys like FIDO or TOTP Time based one time passwords/keys are good, but are only one piece to a good authentication system.
The constitution has what’s called the 5th amendment which allows you to refuse to incriminate yourself. ie. giving up your password. But that DOES NOT protect you if you use a fingerprint, faceID, The Gov can force you to use faceID or fingerprint to unlock data but cannot force you to remember what your password is.
Always use a passPHRASE along with another form of auth such as a passkey or text, etc
@LimitedWard
May 20, 2025 at 8:20 pm
This is partly correct, but there’s nuance you’re ignoring. Authentication relies on proving 1 of 3 things: something you know (e.g. passwords/PINs), something you have (e.g. a cell phone or hardware key), or something you are (e.g. a fingerprint). Any time you require more than one proof of identity, that counts as “multi factor authentication”.
All passkey implementations in practice are multi factor auth. In the case of hardware keys (e.g. Yubikeys), you are required to provide both a PIN (which provides something you know) as well as the Yubikey itself (something you have). In the case of software passkeys (e.g. a password manager), the exact factors will vary, but as long as you have MFA enabled to decrypt your passkey vault, then you are transitively providing multiple factors to prove your identity.
@patrick.n.stover
May 20, 2025 at 7:29 pm
Although it’s not entirely realistic, I think Mr. Robot is worth a shoutout as a compelling show about hacking
@theringostarman
May 20, 2025 at 8:10 pm
I commented before I saw yours. They at least used real commands and legit verbiage in the show. Not like the movie Hackers where you’re in a 3D rendered Unix filesystem. lol. Side note to anyone reading: Mr. Robot is a top 5 show of all time. It doesn’t get the love Breaking Bad and the Sopranos gets, but it should!
@VIRACYTV
May 20, 2025 at 7:35 pm
19:15 I don’t offer to help anyone. Problem solved.
@wesc6755
May 20, 2025 at 7:36 pm
It’s not that Tik-tok violates privacy; it’s that China weaponizes it against our country. Disinformation causes actual harm, in case you haven’t been paying attention. We had a coup attempt because of it. Wagner’s “lock her up” campaign had an impact and was a full-on FSB op and worked because that demographic never bothers to ask for evidence or check facts. Read-up on Romania and how Russia used Tik-Tok. It’s not the same thing as “all companies violate privacy”. This is bigger than that.
@DiggyDougSauce94
May 20, 2025 at 7:40 pm
“Those who know aren’t talking, and those who don’t keep talking” is BARS.
@jeffcrume
May 20, 2025 at 9:24 pm
I didn’t come up with that but I sure do like it
@austinvines9636
May 20, 2025 at 7:40 pm
i was given the impression that shrek 2 would have the most realistic concept of hacking due to the title of the last timestamp in the video, I was wrong. I feel baited, yoinked, and bamboozled, smh
@michaelmayhem350
May 20, 2025 at 7:45 pm
@26:00 what about hackers 😂😂 hack the planet.
@JonDaTechDon
May 20, 2025 at 7:51 pm
People that think a VPN are critical to purchase are hilarious. Nothing is fully safe, nothing is fully secure.
@Sameeer_Saker
May 20, 2025 at 7:54 pm
His opinions on voting are incredibly silly. Many countries, some with the best governmental systems out there, use electronic voting.
And it is proved again and again how much safer electronic ballots are than using papers like in the 19th century.
Once again US pretending their solution is the best just because “new thing scary, boo!”.
@zeken4413
May 20, 2025 at 7:58 pm
Heeey. We are not make sure.
There can catamagorillacally be no contradicsheen.
We aahh croozing nicely.
There aahh no nightmares.
@rickaus_ttv
May 20, 2025 at 8:01 pm
To the last one, i feel like the remake of The Italian Job was fair in its portrayal of multiple hack elements. Especially how long it took to break into traffic control.
A few B grade movies are also more realistic about it. But blockbuster movies certainly trivialise it.
@LimitedWard
May 20, 2025 at 8:03 pm
20:12 I’m really glad he brought up passkeys, especially with regards to password managers. However he left out one critical detail: the passkeys you store in a password manager are only as secure as your master password. That’s why it’s CRITICALLY IMPORTANT to use multi factor authentication with a password manager.
Ideally this MFA would be a hardware security key, which uses the same underlying FIDO protocol used by passkeys. Then you’d have a cryptographically secure chain which protects all your accounts:
– your hardware key protects your password manager
– your password manager protects your passkeys and passwords
– your passkeys and passwords protect your online logins
@Mark-wd5zb
May 20, 2025 at 8:42 pm
He did mention this.
@LimitedWard
May 20, 2025 at 8:52 pm
@@Mark-wd5zbhe sort of hints at it but not directly. He mentions that password managers can store passkeys, but he fails to explicitly mention that you should secure your password vault using another passkey (ideally a hardware backed passkey, like a Yubikey). To be fair, he had a very limited time to cover the concept, so I can’t blame him for not expounding on every detail/nuance.
@jayluck8047
May 20, 2025 at 8:06 pm
What’s your favourite hacker movie? And yes, you can say, “Hackers”.
@theringostarman
May 20, 2025 at 8:07 pm
Mr. Robot is the closest to “real” hacking. They at least used real commands and verbiage for the show.
@RenanSMello
May 20, 2025 at 8:10 pm
I don’t wanna be the guy that wants to look smarter than the specialist, but I think he is wrong about the paper ballot and elections one, just look how we do it here in Brazil, its the best and secure way in the world.
@jays7761
May 20, 2025 at 8:14 pm
19:45 I got a crack that you can exploit, daddy.
@NFSHeld
May 20, 2025 at 8:14 pm
Additional detail about the “Wannacry” kill switch:
Security researchers usually analyze malware in a virtual machine that fakes network access by seemingly allowing every connection to go through and logging what the malware attempts to send to which IP. In order to defeat that scenario, malware pings “random” addresses (that shouldn’t exist), and if they see “successful ping”, they assume it must be a fake response inside a test environment and shut themselves down to make it harder to anaylze what would’ve happened thereafter. It is believed that the programmer of Wannacry made a mistake and forgot to randomize the address properly, causing the malware to always probe the same target. That’s why registering the target domain killed it. It’s also said that Marcus orginally registered the domain “just to see what would be sent there”, and only later realized it was an accidentially functioning kill switch for many instances.
@shininio
May 20, 2025 at 8:20 pm
Fantastic guest. Kudos!
@ronahgatling
May 20, 2025 at 8:29 pm
Did anyone else get like 20 capital one and amazon ads on this video?
@jmongold3293
May 20, 2025 at 8:41 pm
Were the phreakers having phreak offs perchance?
@nickie17301
May 20, 2025 at 8:43 pm
As an IT professional, This dude is legit.
@unab84
May 20, 2025 at 9:14 pm
”Password managers”……. Has anyone ever heard of pens and paper?
@guilherme5094
May 21, 2025 at 2:24 pm
Just know that they don’t wear hats.
@Soaptastesok
May 21, 2025 at 2:36 pm
* slams fingers down on random keys *
“I’m in.”
@tijuanaco
May 21, 2025 at 2:53 pm
Phone hackers = phackers?
@dabeamer42
May 21, 2025 at 3:16 pm
Thanks for getting to the Morris worm. I remember that when it was happening…seems like ancient history.
@jeffcrume
May 21, 2025 at 4:01 pm
I do too
@todorivanov317
May 21, 2025 at 3:34 pm
As soon as the guy said kevin mitnick is the worlds gratest hacker he instantly lost all credibility.
@jeffcrume
May 21, 2025 at 4:02 pm
Pretty sure that’s NOT what I said
@bluegizmo1983
May 21, 2025 at 3:43 pm
I consider myself a gray hat… I never “hack” anything with the intention of causing damage or stealing anything, but I’m not fully a white hat because I do, at times, resort to unauthorized and unsolicited hacks (usually out of shear curiosity), but I always try to report what I find and never steal anything or cause damage.
@dsoegiarto
May 21, 2025 at 3:44 pm
why is the last segment called “Shrek 2 (2004)”? was THAT the best movie that shows hacking???
@rose_and_thorns
May 21, 2025 at 4:17 pm
Pretty sure that was a joke, dude.
@alexpleshy8565
May 21, 2025 at 3:44 pm
Matrix had some decent hacking – Trinity used nmap at least
@jordanjackson6151
May 21, 2025 at 3:45 pm
Oh. It’s Crume! He was in the IBM 8 course of IT Security. That course needs a serious update now. But 2 years ago it helped me enough. Passed all 8 courses. Just needs to be updated now.
@cl3ave
May 21, 2025 at 4:02 pm
18:13 The warning not to blindly trust VPN providers is very important and almost always forgotten
@polesetter_01
May 21, 2025 at 4:24 pm
What is with these obnoxious white back grounds though? I’m getting flashbanged every time I watch a frikkin Wired video.
@pete2861
May 21, 2025 at 4:38 pm
HEY.. That’s a Timex Sinclair 1000 computer!!! I had that.
@krystek5247
May 21, 2025 at 5:00 pm
What do you think would have happend if someone would find a way to break discrete logarithm?
@EconAtheist
May 21, 2025 at 5:20 pm
Kegseth: “Why you talking about Signal?” **hic**
@LinusDropTips
May 21, 2025 at 5:36 pm
I see Jeff, I click
@Sarah.Riedel
May 21, 2025 at 6:57 pm
“Ladies and gentlemen start your lawyers” 😂
@danielpetzen
May 21, 2025 at 7:04 pm
Thoroughly enjoyable. Well done, Jeff.
@bobbyb69
May 21, 2025 at 7:08 pm
Rip Mitnick, the real OG.
@evanwilliams207
May 21, 2025 at 7:27 pm
He sounds so much like Owen Wilson 😂😂😂
@12thDecember
May 21, 2025 at 7:47 pm
AI-controlled robots and hacking, what could possibly go wrong. 🤔
@mcprt13
May 21, 2025 at 8:12 pm
11:01 hear hear
@kirkshanghai
May 21, 2025 at 8:26 pm
TYRONE BIGGUMS?
@AlyxGlide
May 21, 2025 at 8:59 pm
Virus (influencer code)
@jayo3074
May 21, 2025 at 9:09 pm
I would ban all social media not just TikToK
@jillcrowe2626
May 21, 2025 at 9:17 pm
Anyone interested need to read, “The Cuckoo’s Egg.”
@AvengeTheBlade
May 22, 2025 at 3:01 am
Shrek 2 😂
@ambyjim
May 22, 2025 at 3:01 am
I met Captain Crunch in the late 80s. Interesting chap – met him at a techno club in Sydney
@baraka629
May 22, 2025 at 4:18 am
Hack journalists have caused the most damage
@InservioLetum
May 22, 2025 at 8:08 am
Ballot machines are a tempest in a teacup. As long as the ACTUAL president is elected by closed committee after the fact, then voting is just performative public spectacle to distract the cattle.
@ironheavenz
May 22, 2025 at 8:43 am
The most accurate hacking I’ve seen depicted was on To Aru Majutsu no Index novels, at some point a character named Uiharu (who is a teenage girl) is actually shown having a back and forth trying to break into a network and navigate its systems by running pre-made programs and commands and identifying breaking points, still I think it was exaggerated to add drama, as expected, pretty cool that she wasn’t just furiously typing stuff
@Jbreezy646
May 22, 2025 at 9:03 am
Go Pack! 🐾
@lukor-tech
May 22, 2025 at 9:12 am
I was dead after > Tyrone Biggums asks.
I am still dead to this day.
@ChrisOchieng
May 22, 2025 at 10:14 am
Do eye spy a zx spectrum??
@PORRFNK
May 22, 2025 at 10:46 am
These are basic questions and answers, that even a noob is able to answer. I came here for the juicy stuff. Come on give us the crazy stories that are not publicly available
@0002pA
May 22, 2025 at 11:22 am
17:35 He should have pointed out that HTTPS already takes care of encrypting the traffic.
@jameswestgate416
May 22, 2025 at 12:40 pm
Mr Robot the tv series was pretty accurate, and so was The Matrix to some extent
@tylerhoffman9856
May 22, 2025 at 12:48 pm
Can you use a vpn in a vpn in a vpn
@LGElectronicsDummy
May 22, 2025 at 1:58 pm
Would love to see this guy react to Mr Robot.
@stellapacifica
May 22, 2025 at 2:01 pm
I dunno about the rest of the compsci/IT/security community, but an embarrassing amount of the time, when I log into something (especially when I’m not confident I remember the pw) I do in fact whisper “I’m in”.
@SimonJM
May 22, 2025 at 2:02 pm
“People. Have you met them?” Generally my answer to most issues!” 😁
@jonathanmarois9009
May 22, 2025 at 2:19 pm
FREE KEVIN
@tvwrectoss7724
May 22, 2025 at 2:36 pm
The fact that ads are allowed to roll without having to take any comments or criticisms, (not even votes matter on those!) just doesnt sit right with me, especially if we’re all interested in transparency. They could just lie and we wouldn’t even know unless it stood out or sounded wrong! With that being said, please comment on your ads here:(If you would like to, of course)
For example, My ad this time was lying about cyber security and how everyone can appreciate less spending on security, and that 2-factor authentication is the best way to SECURE your account.
Criticisms? Yeah, only the company cares if their own spending is low – the customer/user would much rather prefer that the company spends more for better security over less for just the basics.
“We call ot hardening” – yes, hardening is done for online services, but the fact that some of the largest companies around are still getting hacked means that the current spending they do on security isn’t NEARLY enough.
After all is said and done, we still get blamed when we dont use 2 factor auth to lock out our accounts, and get told there is no way to recover the account if we happen to forget the EXACT case sensitivity of our own password BECAUSE we decided to trust 2 factor auth.
So, 2 factor auth is the most efficient way to lose your account by getting it locked out by an incomplete security implementation, not to secure it better..
But that is all I wanted to say 🙂
@gcvrsa
May 22, 2025 at 4:09 pm
In the 1990s, the US Army famous switched all their public-facing servers to MacOS, because it was by far the most secure operating system on the market, since there was no command shell that could be accessed remotely. If a hacker managed to pass bad data in such a way as to crash a process, the process would simply terminate, and they wouldn’t be able to gain privileged access to instantiate new processes.
@konkeydonged
May 22, 2025 at 4:13 pm
4:53 – 5:00 I see what you did there
@anthonyd6801
May 22, 2025 at 4:21 pm
2 unskippable ads every 90 seconds?? Come on. No thanks
@Redleg122
May 22, 2025 at 4:38 pm
This is a cool video. I learned some stuff!
@hannahh.
May 22, 2025 at 5:13 pm
Whoever put the chapter title “Shrek 2 (2004)” for the “What movie has the most realistic concept of hacking,” thank you.
@toucansam3217
May 22, 2025 at 5:30 pm
Tyrone Biggums 😂
@rorytribbet6424
May 22, 2025 at 8:01 pm
22:59 MY MAN 💩
@tyrojames9937
May 22, 2025 at 8:17 pm
Prof. Crume, 😃👍.
@বেড়াল
May 23, 2025 at 8:04 am
shout out Jeff calling out the bullies!
@Ryan_CSL
May 23, 2025 at 9:55 am
Is nobody gonna mention shrek 2? 😂
@daCubanaqt
May 23, 2025 at 9:58 am
18:53 “People, have you ever met them?” 😂😂
24:50 The phone freaking and Captain Crunch story is fascinating!
@christiancruz7137
May 23, 2025 at 10:46 am
Stuxnet was cyberterrorism
@lostindixie
May 23, 2025 at 10:56 am
How can I tell if a number is random?
@atompunk5575
May 23, 2025 at 11:16 am
Kinda wish he had a pheak box😅 a blue one😊
@one-minute-code-4u
May 23, 2025 at 11:25 am
It is called Phreaking! and it is called Social Engineering@
@vroomik
May 23, 2025 at 11:47 am
It’s a shame he didn’t mentioned WannaCry (known prev as EternalBlue), was initially developed by NSA and they withhold the exploit (so M$ couldn’t patch it). EternalBlue was stolen and leaked by a group called The Shadow Brokers. People probably died because of it – hospital systems locked etc.
@cyanized0
May 23, 2025 at 12:02 pm
No Julian Assange in this talk, eh?
@User-54631
May 23, 2025 at 12:14 pm
I don’t be holding doors for anybody.
@SukhvirSingh-by3yq
May 23, 2025 at 12:19 pm
wow nice 🙏
@independent-usa
May 23, 2025 at 12:22 pm
Can someone talk about SIM SWAPPING and IMSI CATCHER devices like those old STINGRAYS? There’s evidence that this is being done by the Department of Homeland Security.
@sonalibhalshankar8782
May 23, 2025 at 12:24 pm
awesome 💫
@independent-usa
May 23, 2025 at 12:26 pm
Where can we find Blue Leaks? All that data?
@tpottrell
May 23, 2025 at 12:28 pm
Had to chuckle at the last chapter name 🙂
@ping_shooter_v2
May 23, 2025 at 12:38 pm
phreaking mentioned 🤑🤑🤑🤑 yessss
@MrEgodeist
May 23, 2025 at 4:07 pm
Great guy, but I want to know why he has a ZX81!!!
@xileets
May 23, 2025 at 4:39 pm
We all try to be White Hat [hackers] everyday.
Who hasn’t sought a “life hack”?
@mypdf
May 23, 2025 at 4:53 pm
13:49 This is actually false. He registered the domain as he found it in the code and saw that it wasn’t registered yet. Only later it was discovered that this was what made the software stop.
@sundhaug92
May 23, 2025 at 5:56 pm
13:43 he actually registered it without knowing what the effect would be
@wewewewa
May 23, 2025 at 6:24 pm
Tyron Biggums???
@Arnol-c2e
May 23, 2025 at 6:58 pm
I believe phone hackers should be called phackers
@DianneYamamoto
May 23, 2025 at 8:03 pm
I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?
@Tonyflux
May 23, 2025 at 8:04 pm
I know someone that can help you
@DianneYamamoto
May 23, 2025 at 8:05 pm
Tell me, who is it?
@Tonyflux
May 23, 2025 at 8:06 pm
Creayxx, that what his known for, his a renowned tech guy
@DianneYamamoto
May 23, 2025 at 8:07 pm
Ok But please how do I get him?
@Tonyflux
May 23, 2025 at 8:08 pm
That’s him
@paulgibbons2320
May 23, 2025 at 8:07 pm
Am I the most hacked person in the country ?
@cgault11
May 23, 2025 at 9:14 pm
Go pack!
@jeffcrume
May 23, 2025 at 10:05 pm
🐺🐺🐺
@missvidabom
May 24, 2025 at 12:08 am
This guy is so freaking brilliant, an absolute pleasure to watch!
@jeffcrume
May 24, 2025 at 8:08 pm
You are very kind to say so! 😊
@intsoccersuperstar1
May 24, 2025 at 1:39 am
The editing on these videos is too distracting for me to even be able to enjoy them anymore without getting dizzy
@pollyward98
May 24, 2025 at 1:48 am
Zero Cool, after he hacked the New York Stock Exchange. (Hackers. 1995 movie)
@ankanroy2
May 24, 2025 at 5:19 am
Mr. robot is pretty realistic as far as series go
@kurokage26
May 24, 2025 at 7:52 am
Imagine top-secret malware designed to disrupt Iran’s nuclear capabilities got caught by Windows Defender. LOL
@Bkesal14
May 24, 2025 at 7:56 am
That captain crunch story is nuts 😂
@nukedbaby
May 24, 2025 at 9:32 am
7:57 so… Americans?
@itpatil
May 24, 2025 at 10:00 am
Electronic voting is the only way to go. It is unreasonable to suggest going back to paper voting.
@LizzyToj
May 24, 2025 at 12:09 pm
I guess Miami-Dade county is FULL of M.I.T. black baseball caps, black clothes and black ring organization or cult causing HAVOC CHAOS to our American company’s computer programs, such as 2005 break down of Chrysler and other major companies that worked very hard to build those corporations. And they continue to cause documents entered into your system on a daily basis, to disappear to purposefully ruin an employees’ reputation in the firm, due to their own personal vendetta against a targeted individual(s) for their sick gain, or another’s payment thereof towards causing confusion in that targetted person or to ultimately make them go crazy to privilege a 3rd party paying and hiring that person to cause mental harm to the targeted party. Internet tests OR at any individual’s request. And it’s a web or cult, where they have many contacts, like an intertwined web full of people, spies, or communists to learn of our countries’ intelligence through your “private” IP address.
@LizzyToj
May 24, 2025 at 12:14 pm
It has a name, but no man has wanted to tell me. It allows any person to read ALL of your emails as far as 10 years ago, texts, and listen to your voicemails on your cell phone. They can read the letters/emails inside your folders, track you, take over all of your app accounts and passwords, control your inbound and outbound calls, even during an emergency.
@LizzyToj
May 24, 2025 at 12:20 pm
Which computer has the highest security?
@KiraPerspectives
May 24, 2025 at 12:37 pm
FORTRAN, Cobol, Pascal, and Basic.
The basic knowledge of learning programming for the 80’s.
@KiraPerspectives
May 24, 2025 at 12:48 pm
I’m glad you finally talked about Captain Crunch.
Frequency hoping box.
@akakemushi439
May 24, 2025 at 1:44 pm
…..why does he have a Japanese book on his desk? Can he actually read that? (It just says “hacker’s secrets” btw).
@jeffcrume
May 24, 2025 at 8:09 pm
That’s the translation of the book I wrote called “What hackers don’t want you to know”
@Thumper68
May 24, 2025 at 4:39 pm
Now the vpn has all your info😂
@Thumper68
May 24, 2025 at 4:39 pm
Use quad 9.
@jeffcrume
May 24, 2025 at 8:10 pm
I like that one
@mimih23
May 24, 2025 at 5:08 pm
What about red hat?
@mimih23
May 24, 2025 at 5:21 pm
WannaCry’s dormant like HSV.
@shlokagrawal6405
May 24, 2025 at 5:34 pm
why isnt there more appreciation for the chapter nomenclature
@CamilaVanilla
May 24, 2025 at 5:42 pm
So don’t ever pay a ransom!
@LeonMatthews
May 24, 2025 at 9:19 pm
What a breath of fresh-air! There is so much misinformation out there about information security, and so many so-called experts spreading it. So great to see an expert in the field being given a platform.
@jeffcrume
May 25, 2025 at 3:07 pm
Thanks so much for all the kind words!
@OriginalQueer
May 24, 2025 at 9:41 pm
Who was behind the BlueYonder attack? Did they get the ransom or was it resolved another way?
@firemanflorence
May 24, 2025 at 10:25 pm
I’m guessing he’s never seen NCIS… Hollywood never gets it right my butt
@CrazyAboutLife
May 25, 2025 at 1:27 am
People…have you met them. 😂
@jeffcrume
May 25, 2025 at 3:07 pm
😂
@slicken
May 25, 2025 at 3:19 am
you are wring with the voting system.
blockchain with zero knowlage proof, is the best way to do voting.
this way, you can proove if a user has votetd or not. and blockchain tech will prevent double voting.
@KeaganNicolls
May 25, 2025 at 3:52 am
Do all these professors just know the answers off the top? Or do they practice answers the night before and they just pretend to read the question for the first time?
@jeffcrume
May 25, 2025 at 3:10 pm
I can’t speak for the others but I did look up a few answers beforehand mostly just to refresh my memory since a lot of these events took place decades ago
@mymax43
May 25, 2025 at 4:29 am
As a former cybersecurity person, I remember the mantra: “There are two kinds of systems in the US, those that have been hacked by China and those that don’t know they have been hacked by China.”
@HeCalledTheShitPewp
May 25, 2025 at 5:29 am
HACK THE PLANET!!!
@DarkHorseSki
May 25, 2025 at 9:58 am
Cybersecurity in the 90’s was much more than just setting up a firewall. It was setting up file and folder rights. Limiting admin access. Scanning your PW databases for unsecure passwords. Testing your backups and disaster recovery. Checking logs for unusual access… The answer about the OPM question was stupid as employees of the government have very little choice if they want those jobs. Also dumb was his Tik Tok answer as it is VERY EASY for a company to control what can and cannot be on the assets it controls, including phones.
@jeffcrume
May 25, 2025 at 3:11 pm
It was that and much more but a lot of people never got much past the firewall in terms of their focus
@DarkHorseSki
May 25, 2025 at 5:23 pm
@@jeffcrume I disagree… in fact I would argue that in the 90’s, since few companies were even connected to the Internet to the second half of that decade, that the firewalls thing was really just a focus of the router folks. The admins were, almost certainly, most focused on passwords, file and folder rights as well as anti-virus stuff first whenever security became an issue.
@dirkmanderin
May 25, 2025 at 11:02 am
Tyrone Biggums… 😂
@AlonaAbaliaieva-n7k
May 25, 2025 at 11:15 am
Cool video
@glennrobinson8061
May 25, 2025 at 12:58 pm
Can we talk more about key systems and how we would store keys 2009. key encryption methods
@ctwatcher
May 25, 2025 at 5:01 pm
How do you build a ghost gun? Kidding, we learned it by ourselves, didn’t call anyone.
@RifouDesigns
May 25, 2025 at 7:26 pm
Y’all need to bring Jeremy McDowell or NetworkChuck for “networking support”
@uTubeNoITube
May 25, 2025 at 7:42 pm
No idea the phishing kink had sub-kinks to it!
@sponjiplex4223
May 26, 2025 at 7:33 am
If your hack doesn’t involve Matthew Lillard skillfully rollerblading through traffic while The Prodigy plays, don’t even start.
@marmictanghus
May 26, 2025 at 8:51 am
Hack. What about IKEA-hack 🙂
@phrozzty
May 26, 2025 at 1:00 pm
How did Tyrone biggum get through?
@AaronShowalterphoto
May 26, 2025 at 1:20 pm
Some of the most influential hackers are people you’ve never heard of…. like, say, for instance, KEVIN MITNICK.
Ummmm……. ok
@Caboose30
May 26, 2025 at 8:11 pm
I’m not an infosec expert, but fairly experienced. I’d say Sneakers probably hits the closest to real life hacking. Maybe not in its depictions, but it displays social engineering, direct hardware hacking ie intercepting phone calls, indirect hacking in the form of raising the temperature of a room to fool temperature sensing motion detectors, that kind of thing. And the braille display readout the blind guy uses actually did/does exist.
@Panekmyrip
May 27, 2025 at 1:08 am
whoeever chose those questions should be fired… this guy just say stuff that u could find easly on surface… waste of potential.
@ricksaint2000
May 27, 2025 at 3:22 am
Thank you Jeff
@jeffcrume
May 29, 2025 at 9:33 am
Glad you liked it!
@Bovada-c3i
May 27, 2025 at 4:18 am
The hottest hacker of all time? Of course Angelina Jolie 😍
@No.25811
May 27, 2025 at 6:11 am
良哥好!祝安!
@valerianus1984
May 27, 2025 at 7:55 am
Shrek2 LoL:D
@cosplayshop
May 27, 2025 at 8:50 am
A little sad facts about Marcus Hutchins (the person who stopped WannaCry Ransomware as Jeff pointed out) Hutchins was later indicted by the FBI for his association with Kronos Banking Malware, most likely because of the profile he received after stopping WannaCry, and FBI offer a deal for him to flip other hackers, but he refused, instead he pled guilty to two counts (hacking and fraud charge) he was sentenced to time serve as the judge had commented on how he had turned his corner.
@jeffreyjacobs5738
May 27, 2025 at 10:19 am
Tyrone Biggums 😂
@cantubloodaxe768
May 27, 2025 at 2:09 pm
Most definitely voted America 🦅
@CleanYourRoomOrElse
May 27, 2025 at 4:42 pm
Back in the day my dad drove us crazy, he had no clue about security. He literally opened every single email anyone sent him. He would click on every link. If anyone sent him anything he would believe it. His computer was so full of viruses and stuff that he had to get a new one
@jeffcrume
May 29, 2025 at 9:35 am
I think we all have family members like this 🙄
@emluvskpop
May 27, 2025 at 5:15 pm
what books are on the table?
@jeffcrume
May 29, 2025 at 9:35 am
Those are the various translations of the book I wrote back in 2000 entitled “What Hackers Don’t Want You to Know”
@marrakesh1397
May 27, 2025 at 5:16 pm
As Always great topic and interesting video
@tj_1260
May 27, 2025 at 5:23 pm
Yes finally
@catt6614
May 27, 2025 at 8:57 pm
As a cybersecurity educator myself, love the approach to breaking down some of these examples!
@jeffcrume
May 29, 2025 at 9:36 am
Thanks so much for saying so!
@pasteyourinjectionstringhere
May 27, 2025 at 10:00 pm
That’s quite amusing for describing what happened with WannaCry incorrectly (the order of events and reasons for each step) after talking about misinformation 😛
Great interview, thanks for the content.
@pasteyourinjectionstringhere
May 27, 2025 at 10:04 pm
17:00 sounds like false information? An ISP can’t see everything even if you don’t use a VPN. That implies all ISP’s have root level certificates in which to decrypt TLS traffic.
Yes, they can see what websites you go to via unencrypted DNS (very typical) traffic and also see the plain/text SNI within the TLS handshake. But, no, they can’t simple look at all data, unless they have that root certificate, that’s my current understanding, correct me if I’m missing something!
@jeffcrume
May 29, 2025 at 9:38 am
You aren’t wrong, but in some cases, a person may not want it known which web sites they visit and when and how often, which can be seen by the ISP without a VPN. Also, not all web traffic is encrypted
@johnlucas6683
May 28, 2025 at 1:52 am
Why phreakers and not phackers or phockers?
@tmoore4075
May 28, 2025 at 9:19 am
“Don’t add people to your group chat if you don’t know who they are.” hmm….
@jeffcrume
May 29, 2025 at 9:38 am
😊
@ddd-sx7pw
May 28, 2025 at 9:25 am
White hats – good.
Black hats – bad.
Remove the “hat” and it’s just like real life.
@KirbyLouis
May 28, 2025 at 2:27 pm
capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one capital one
@curtisbme
May 29, 2025 at 12:33 am
@0:30. Incorrect. The most infuential hacker of all time was David Lightman. Saved the entire world by teaching AI that the only winning move is not to play.
@26:13 – I’ll give him a technicality pass as it isn’t a movie, but he should have immediately mentioned Mr. Robot.
@davidyusaku
May 29, 2025 at 2:40 am
if now we need to analyze the malware behavior instead of just the uniq id of the malware
can’t we just use some deep learning algorithm to learn what the normal behavior is and block the weird/abnormal behavior?
@sebemskream
May 29, 2025 at 5:09 am
wait wait wait, lets spread your prodigy, go anywhere without a belt and find a middlefinger. dont forget to pay the meter
@surewhatever8843
May 29, 2025 at 2:16 pm
Love WIRED, enjoying this episode, but the volume and frequency of unskippable ads is brutal. Planned on binging WIRED episodes this afternoon, but if skipping the entire episode is the only way to skip *some* of the ads, well…?