Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Mr. Robot Podcast Hosts

show episodes
 
Hosts Ben Brock Johnson and Amory Sivertson dig into the internet's vast and curious ecosystem of online communities to find untold histories, unsolved mysteries, and other jaw-dropping stories online and IRL.
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
Almost Cancelled is a TV show review show by Peter and Connor of Mild Fuzz TV. This feed will host audio versions of their reviews of the bigger cable shows such as Twin Peaks, Better Call Saul, The Handmaid's Tale, The Expanse and more. We have a dedicated feed for Netflix original reviews as well as a dedicated Mr Robot feed.
  continue reading
 
Artwork

1
Brave New Planet

Pushkin Industries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Utopia or dystopia? It’s up to us.In the 21st century, powerful technologies have been appearing at a breathtaking pace—related to the internet, artificial intelligence, genetic engineering, and more. They have amazing potential upsides, but we can’t ignore the serious risks that come with them.Brave New Planet is a podcast that delves deep into the most exciting and challenging scientific frontiers, helping us understand them and grapple with their implications. Dr. Eric Lander, president a ...
  continue reading
 
Loading …
show series
 
While some people find Labubus terrifying, millions of others find their big eyes and furry features irresistibly adorable. Why? From Labubu dolls taking over TikTok, to emoji taking over our text messages, cuteness is all over the internet. Ben and Amory talk to Joshua Paul Dale, professor at Tokyo's Chuo University and the preeminent cuteness exp…
  continue reading
 
Everybody get up, it's time to slam now... again! Yes, we're revisiting our episode about the website for the 1996 movie "Space Jam," which is still up and functioning nearly 30 years later. Amory and Ben talk to the hilarious team behind this digital artifact and hear the unlikely story of its continued existence. Show notes: The Space Jam website…
  continue reading
 
Many women experience brain fog, forgetfulness, and sudden mood changes during midlife. Are these symptoms signs of dementia, ADHD, or are they simply our hormones at work? Dr. Elizabeth Poynor is joined by neuropsychologist Dr. Caroline Gurvich to unpack what’s really happening in the brain during perimenopause and menopause. They explore why more…
  continue reading
 
In keeping with Endless Thread tradition, Ben and Amory are celebrating spooky season with another installment of "Endless Dread." This time, we're bringing you along on both an actual haunted hayride — thanks to McCray's Farm in South Hadley, MA — and a digital one, through a handful of spooky stories from the internet. Ben introduces Amory to a T…
  continue reading
 
New to Endless Thread? Wooooo! We're revisiting some favorites from our archives to welcome you. First up: The cover art for the 1976 paperback edition of Madeleine L'Engle's classic, spooky sci-fi/fantasy novel "A Wrinkle in Time" — featuring a rainbow-winged centaur and a green, glowering, red-eyed face — is iconic. And yet, for nearly 50 years, …
  continue reading
 
Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to smart devices acting strangely. We explore polymorphic malware that changes based on its target, the risks posed by managed serv…
  continue reading
 
The final episode of Hidden Levels explores the story of SEGA developer Tez Okano and the bizarre, meta-game he created: Segagaga. Okano joined SEGA in 1992, witnessing firsthand the company's tumultuous experience in the "console wars" against Nintendo and Sony. In the mid-1990s, SEGA struggled to make hardware that kept up with its rivals. The SE…
  continue reading
 
Video games are arguably the antithesis of nature; highly constructed worlds, synthetic, inorganic. If you grew up gaming, you may recall grown-ups telling you to shut down the console, go outside, and touch some grass. These days, though, touching grass isn’t something you have to do outside. As gaming has grown into a 200 billion dollar industry,…
  continue reading
 
Dr. James "Butch" Rosser was a pioneer in minimally invasive surgery in the 1990s. When he credited his surgical skills to video games, people dismissed him. The prevailing narrative was that kids who played video games became killers, not doctors. So Butch set out on quest: to show how video games can help make better doctors. Show notes: The impa…
  continue reading
 
This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backe…
  continue reading
 
Machinima — a portmanteau of “machine” and “cinema” — refers to movies filmed inside video games. The art form had a renaissance in the 1990s, and many thought it had a future in Hollywood. Among the early pioneers were the New York animation collective the Ill Clan, who puppeteered characters in real-time inside the video game Quake, bypassing tra…
  continue reading
 
Today, Stef Sanjati is a creator on YouTube with over half a million subscribers. Her content mostly focuses on her two greatest loves — makeup and gaming — often combining the two with her otherworldly video game-inspired beauty tutorials. Growing up in small-town Ontario, though, Stef was a quiet, introverted kid who was bullied a lot. For one th…
  continue reading
 
For decades, the U.S. Army has been on edge about recruitment, hitting its goals for a few years, only to miss them again. As part of their strategy to combat recruiting concerns, the Army has turned its focus online: to the world of gaming and competitive eSports. With nearly 80% of Americans between the ages of 13 and 28 playing video games weekl…
  continue reading
 
We're sharing a preview of College Matters from The Chronicle, a podcast from The Chronicle of Higher Education. After 16 months in a federal prison camp, William (Rick) Singer has had time to reflect on his role as the architect of a college-admissions bribery scheme that became known as Varsity Blues. The college consultant has apologized for con…
  continue reading
 
In this second episode of Hidden Levels, Amory traces the history of the humble-yet-genius joystick — from early 20th century aviation, to 1970s video game consoles like the Atari 2600, to the Nintendo 64 thumbstick in the 1990s, to what some consider the joystick's greatest implementation: the dual-thumbstick controller. This optimal interface has…
  continue reading
 
Welcome to our all-new collaborative series, "Hidden Levels," in which we team up with 99% Invisible to explore how the world of video games has impacted the world beyond. We’ll dive deep into how games are made and designed, exploring everything from the history of the joystick to the faithful recreation of nature in digital spaces. Whether you ar…
  continue reading
 
Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire transfers and reset credentials. With nearly 50% of businesses already experiencing deepfake attacks, this isn't a future prob…
  continue reading
 
Have you ever jumped on something as you're moving through the real world, and heard that Mario bouncy sound in your head? Or maybe seen someone acting like an NPC when they're a real person? Maybe you know that the first real "in-app" purchase was actually a weapons store in an arcade game version of Double Dragon 3. Wherever you go in the real wo…
  continue reading
 
You've heard of the "Freshman 15"... how about the "DOGE 15"? This is how some federal employees have referred to the stress associated with the establishment of the Department of Government Efficiency back in January and the "restructurings, realignments, and reductions in force" that came with it, as announced in an email sent to nearly all feder…
  continue reading
 
When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why transparency beats secrecy every time. We examine real-world failures like LastPass and Rackspace, where poor communication s…
  continue reading
 
Ben and Amory share stories about potential pettiness from Reddit. Ben shares a post from r/weddinshaming post about a bride who changed her wedding to a weekday in another state. Amory counters with a teacher who used AI to foil his student's cheating. Petty or just? You be the judge. Credits: This episode was produced by Frannie Monahan. It was c…
  continue reading
 
Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of insider threats: compromised employees who get extorted or have their credentials stolen, disgruntled workers who want revenge afte…
  continue reading
 
In 2020, Jenna Marbles — one of the most popular YouTube creators of all time —posted her last video. Five years later, her devoted fanbase still wonders: where is she, and is she okay? We investigate the mystery behind one of YouTube's biggest disappearances, and why people still care so much. Show notes: r/JennaMarbles (Reddit) The Best, Fakest, …
  continue reading
 
Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised lap…
  continue reading
 
What is your relationship with the trash heap of digital history? Can you still connect your old hard drives? Still sifting through your old photos in the cloud? Do you ever low key snoop in the old electronics of other people, searching for treasure? That's what Noah Simmons was doing a while back when he discovered something compelling in its sim…
  continue reading
 
This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentatio…
  continue reading
 
As summer fades away, we bring you an encore episode about you shoreline companions and occasional bullies — gulls. Gulls are not beloved creatures. Consult social media, where they are deemed relentless, dirty pests who steal our food and crowd our beaches. As one TikTok user puts it, "Seagulls are the worst animals to ever exist." Such hatred ove…
  continue reading
 
Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats. A honeypot server works by creating an enticing target that …
  continue reading
 
Dun dun... This week, on Endless Thread... dun dun... something new is here... dun dun dun dun... a podcast mini-series about the 50th anniversary of the cinematic classic... DUN dun dun dun DUN dun dun dun..."Jaws!" Part 1 of this mini-series, Jaws Island, is right here, right now, and it's all about the "finatics" (yes, that's what they call them…
  continue reading
 
Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting…
  continue reading
 
What happens when we outsource aspects of our most personal moments to machines? In the second installment of our two-part series on AI and relationships, we hear from Rhiannon Williams, a reporter for MIT Technology Review who spoke to people all over the world about how they're using AI to relate to their loved ones, including a man who turns to …
  continue reading
 
This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities. The hosts analyze real-world implications…
  continue reading
 
Amir Mizroch spent years deconstructing fairy tales for his children — and thinking that maybe, he could create something out of his analysis and storytelling for a wider audience. In the first episode of our two-part series on AI and relationships, we hear what Amir finally created, and explore the questions it raises about connection in the digit…
  continue reading
 
Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social enginee…
  continue reading
 
In the past few years, videos from a new kind of camp have begun circulating the internet. They feature men participating in a variety of bizarre activities: from aggressively digging holes under floodlights, to collectively wailing in a pool of water. These are man camps, where men can pay up to $18,000 to undergo extreme boot-camp-like conditioni…
  continue reading
 
Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks. Learn how F Societ…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play